Ports and Protocols FAQ
|
|
- Robyn Townsend
- 6 years ago
- Views:
Transcription
1 CLASSIFICATION: UNCLASSIFIED Ports and Protocols FAQ 1. What is the timeline for closing ports and protocols? 2. What TCP/UDP ports are affected? 3. What about ports ,535? 4. Will outbound data requests be affected by the Ports and Protocols Program? 5. What about protocols? 6. If DoD is going to close a port, can I change the port the service or application uses to a port number that is open? 7. Who has access to the Ports and Protocols Registration System? 8. Who are the authorized organizational POC's? 9. What if a DoD Component POC doesn't have access to the SIPRNET? 10. How do I register my Ports and Protocols Utilization? 11. If another Component has an approved waiver for a port that I am also interested in, do I need to submit a waiver request? 12. What happens if, at 0200 hours, I discover that a port has been closed and I need it opened immediately? 13. What are the guidelines being used to determine that a port will be opened? 14. If a DoD Component requires a port to be opened, will it be opened only for that Component? 15. What will happen to the DoD Ports and Protocols Program if the DoD undertakes significant operational missions? 16. What about backdoors and non-niprnet DoD networks? 17. Where can I find additional information? 18. What happens after a Component POC submits a request? 19. What happens after the DSAWG makes a decision on a system? 20. What is the Appeal process? 21. Does the DoD PnP Program affect DoD-to-DoD network traffic? What is the timeline for closing ports and protocols? The inbound port blocking will commence approximately 13 April 2003, (60 days following the release of the implementation message by STRATCOM, which was released on 13 February 2003). (1 of 9)6/1/2005 6:57:26 AM
2 The JTF-GNO will start with ports on approximately 13 April The remainder of ports will be based on the success of the first block closures. It is intended to increase the number of ports closed into larger blocks in order to facilitate completing the process. Inbound transport layer protocol blocking will begin following the initial port blocking effort. What TCP/UDP ports are affected? Only inbound requests for ports in the range What about ports ,535? A few selective ports are blocked if they represent a clear and present danger to DoD networks. Blocking all of the high ports would cause the TCP/IP protocol suite to fail resulting in the NIPRNET failing to operate. Will outbound data requests be affected by the Ports and Protocols Program? The Ports and Protocols Program only deals with inbound requests at this time. Outbound requests are not addressed. What about Protocols? (2 of 9)6/1/2005 6:57:26 AM
3 DoD Components are required to register automated information systems (AIS), as well as their associated transport layer protocols (TCP, UDP, etc.) in the DoD Ports and Protocol Registration System. Transport layer protocols that are not registered will be denied at the Internet access points. At this time, due to technical limitations, we are not able to differentiate between TCP and UDP port numbers on the router access control lists. In the very near future, we will be able to differentiate protocols on every port at the Internet gateways, and therefore need to ensure the proper protocols are registered in the database. If DoD is going to close a port, can I change the port the service or application uses to a port number that is open? No! Reassigning an application or service port number from its normal well known port number to another port number is call port redirection. In accordance with the DoD NIPRNET Ports, Protocols, and Services (PPS) Security Technical Guidance, section 4.4; recognized data services should operate on their accepted well known (system) ports they should not be redirected. For a complete listing of well known port numbers and associated services, please visit Who has access to the Ports and Protocols Registration System? DoD Component-authorized POCs designated to the JTF-GNO will be issued a logon ID and Password. The Primary POC for each Component may add or remove secondary POCs as necessary. If you have any questions on Registration System access contact DISA at baseld@ncr. disa.mil. (3 of 9)6/1/2005 6:57:26 AM
4 Who are the authorized organizational POC's? The PnP Points of Contact are posted on the introduction page. What if a DoD Component POC doesn't have access to the SIPRNET? A Microsoft Excel spreadsheet was developed that mirrors the requirements for the Registration System. Component POCs will complete the spreadsheet with the information required for submitting a waiver request. The POC will this completed spreadsheet to baseld@ncr.disa. mil. This information will be entered into the DoD PNP Registration System. Queries on a PNP request status and copies of the spreadsheet may be obtained by contacting baseld@ncr.disa.mil (703) How do I register my Ports and Protocols utilization? 1) As the authorized Component POC, you will be provided with an ID and Password based upon the information provided to the JTF-GNO 2) You will receive an with your Login and Password information and procedures on the SIPRNET. 3) Enter the information into the Login screen on pnp.cert.smil.mil (if you do not have access to the SIPRNET, see above FAQ entry). 4) Enter ports and protocol requests information into the registration system. 5) Ensure your system is accredited IAW the DoD Information Technology Security Certification and Accreditation Process (DITSCAP) DODI ) Check back later to verify request status. If another Component has an approved request for a port or protocol that I (4 of 9)6/1/2005 6:57:26 AM
5 am also interested in, do I need to submit a request? Yes! Should the other Component remove the request, or the DSAWG later revoke the request, and no other port/protocol request are contained within the registration system, the JTF-GNO would order the port/protocol blocked. What happens if, at 0200 hours, I discover that a port/protocol is being blocked and I need it opened immediately? The component should go through normal process to debug the problem, usually working through the DISA GNOSC. If it is discovered that the problem is a closed port, the component or GNOSC will contact the JTF-GNO watch officer and inform the watch officer of the port. The JTF-GNO watch officer will order the port opened. The DISA GNOSC will direct the port opened. Be advised, it will take at least 2 hours to open a port. The JTF-GNO will direct either to open only that port, or rollback the entire router access control list (ACL). This decision will be based on the criticality of the service or application. A Component POC will have 30 days to submit a formal request using the process specified in this document. Should the Component fail to submit the request the port will be closed. Should the Component submit a request for a service/application that was denied by the CCB, the JTF- GNO will not open that port. What are the guidelines being used to determine that a port or protocol will be opened? IAW the DoD NIPRNET Ports, Protocols, and Services (PPS) Security Technical Guidance, section E5.2, to obtain approval, a DoD Information System-related port or protocol must: Demonstrate a need to exist. (5 of 9)6/1/2005 6:57:26 AM
6 Not conflict with other ports or protocols. Not increase security risks associates with specific ports and protocols Comply with DoD instructions and the prescribed approval process. Use approved ports and protocols in a manner approved by a designated authority (the DoD CCB). Comply with required testing and/or vulnerability assessment procedure for new DoD information systems prior to approval. A port/protocol will be opened only if the DSAWG determines that the port/protocol is being used by a DoD mission critical and properly registered Automated Information System (AIS). It is the responsibility of the Component Ports and Protocols POC to express the importance of the port/service/application in the DoD Accreditation System. Additionally, it is the responsibility of the components to ensure all port/protocol requests are associated with an accredited AIS. If a Component requires a port to be opened, will it be opened only for that Component? No. Once the DSAWG determines that a Port is being used by a legitimate mission critical application or service, the port will be open for all. What will happen to the DoD Ports and Protocols Program if the DoD undertakes significant operational missions? The Commander JTF-GNO (CJTF) will constantly reevaluate the PNP initiative based on DoD operational tempo (OPTEMPO). Should the CJTF decide that continued implementation of the PNP initiative might have detrimental effects on current operations it will order a strategic pause until operations slow. The JTF-GNO will contact all POCs if this action is necessary. (6 of 9)6/1/2005 6:57:26 AM
7 What about backdoors and non-niprnet DoD networks? The DoD Ports and Protocols Program pertains to all DoD Internet access points all points connected to the Internet. All routers connected to the Internet must be as secure as directed by the DoD Ports and Protocols program. Where can I find additional information? The information on this web page will be updated frequently. Additional information can be obtained on the SIPRNET at Finally, there is a DoD Ports and Protocol Workshop for DoD Component POCs on 28 March Contact the JTF-GNO POC for more information. What happens after a Component POC submits a request? The JTF-GNO will not direct a port/protocol blocked if a there is a pending request from any DoD Component for a system that utilizes that port or protocol. Requests are consolidated by the Technical Applications Group (TAG) and passed to the PNP Configuration Control Board (CCB). The CCB will process requests by automated information system (AIS), in IP ranges as specified by the JTF-GNO. Any system that utilizes a port in that IP range will be reviewed by the CCB. The CCB, utilizing the TAG, will contact the system owners as specified in the PNP Registration System (typically the program manager or designated approval authority). The CCB will verify that the system is accredited, has a valid operational necessity, and will review operational impact if denied. Finally, the CCB will provide a recommendation to the DSAWG to approve or disapprove the request. The DSAWG will then make a decision on approving or disapproving the port utilization by the system (7 of 9)6/1/2005 6:57:26 AM
8 in question. What happens after the DSAWG makes a decision on a system? The DSAWG will approve or disapprove the system, and in some cases validate the decision with the DISN Flag Panel. The DSAWG will forward the results to the CCB. The CCB will forward the decision by to the relevant Component POC and the JTF-GNO. Finally the CCB will update the status of the request in the PnP Registration System to "Approved" or "Disapproved". Each decision will be valid for a specified period of time, normally 12 months. One of two actions may occur: 1. If the DSAWG approves the request, the ports/protocols used by that request will remain open for the time specified by the DSAWG. Before the exception approval expires the Component POC must resubmit the request to ensure the ports/protocols remain opened. Such resubmissions will be processed following the same registration process. 2. If the DSAWG disapproves a request, a Component POC has 30 days from the date of the DSAWG decision to submit an appeal to the DISN Flag Panel (see below). After 30 days, should an appeal not be submitted and no outstanding requests exist that utilizes those ports, the JTF-GNO will order the DISA GNOSC and all components that maintain Internet gateways to deny the port(s)/protocol(s). Once an appeal is submitted, the JTF-GNO will not take action until the DISN Flag Panel adjudicates the appeal. What is the Appeal process? Should a Component wish to present an appeal to the DISN Flag Panel, they should contact the DSAWG Chair directly, and, if appropriate, inform their representative on the DSAWG. More information on the DSAWG can be found at Under most circumstances the Component POC will be required to present an appeal in person to the DISN Flag Panel. IAW the direction of the ASD-C3I, as the DoD CIO, the decision of the DISN Flag Panel is final. Additional details on the appeals process will be added soon. (8 of 9)6/1/2005 6:57:26 AM
9 Does the DoD PnP program affect DoD-to-DoD network traffic? No. The DoD PnP Program only affects the DoD Internet access points - all points connected to the Internet. All routers connected to the Internet must be as secure as directed by the DoD Ports and Protocols program. CLASSIFICATION: UNCLASSIFIED (9 of 9)6/1/2005 6:57:26 AM
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8551.1 August 13, 2004 ASD(NII)/DoD CIO SUBJECT: Ports, Protocols, and Services Management (PPSM) References: (a) DoD Directive 8500.1, "Information Assurance (IA),"
More informationPorts, Protocols, and Services Management Process for the Department of Defense. Dana Foat Defense-Wide Information Assurance Program Office
Software Engineering Technology David R. Basel Defense Information Systems Agency Ports, Protocols, and Services Management Process for the Department of Defense Dana Foat Defense-Wide Information Assurance
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Port Security Port Security helps to control access to logical and physical ports, protocols, and services. This
More informationDefense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form
Defense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form Page 1 of 5 Submitted to DISA s DoD Cloud Support Office by: Signature (Prefer CAC
More informationSIPRNet Contractor Approval Process (SCAP) December 2011 v2. Roles and Responsibilities
Roles and Responsibilities PARTICIPANT RESPONSIBILITIES Defense Security Service (DSS) DAA for Information Systems (IS) used to process classified information in the National Industrial Security Program
More informationICE. Office of Investigations SEVP. Recertification
Recertification 1 Agenda Overview Before Recertification Recertification process Question and Answer Session 2 Recertification Simple process Risk management Overview School Officials Review data for accuracy
More informationPartner Information Manager Supplier Guide October 2017
Partner Information Manager Supplier Guide October 2017 Copyright 2017 Exostar, LLC All rights reserved. Contents Exostar s Partner Information Manager (PIM)... 2 Cybersecurity Questionnaire... 2 NIST
More informationCONNECTION PROCESS GUIDE
Defense Information Systems Agency A Combat Support Agency NETWORK SERVICES DIRECTORATE (NS) CONNECTION APPROVAL DIVISION (NSC) CONNECTION PROCESS GUIDE Version 3 May 2010 Defense Information Systems Agency
More informationPart 1: Items that Contracted Parties Need from ICANN before May 25 - Prior to Implementation
Contracted Parties House GDPR Discussion Group Input to ICANN on Implementation Timeline for Interim GDPR Compliance Model March 26, 2018 Introduction In response to ICANN Staff s request during ICANN
More informationGradintelligence student support FAQs
Gradintelligence student support FAQs Account activation issues... 2 I have not received my activation link / I cannot find it / it has expired. Please can you send me a new one?... 2 My account is showing
More informationTraining Manual for HR Managers ( Business Unit Admin level)
UK Umbrella Service Ltd online DBS applications Training Manual for HR Managers ( Business Unit Admin level) UK Umbrella Service Ltd Page 1 of 12 1 Accessing the system: From the Log In page: https://ukdbschecks.employmentcheck.org.uk/user_login.php
More information1st Reviewer. Last Updated: March 31, 2015
1st Reviewer Last Updated: March 31, 2015 Table of Contents Introduction... 3 Roles... 4 Login... 5 Main Screen... 6 Home menu... 7 Search for an Equivalency Request... 8 Search for an Equivalency Request
More informationE X O S T A R L L C D A T E : N O V E M B E R V E R S I O N : 2.0
SECURE ACCESS MAN AG E R PRO VIDER AD M I NISTRAT I ON GUI DE E X O S T A R L L C D A T E : N O V E M B E R 2 0 1 6 V E R S I O N : 2.0 1 S E C U R E A C C E S S M A N A G E R SECURE ACCESS MANAGER OVERVIEW...
More informationBEEDS portal Bank of England Electronic Data Submission portal. User guide. New PRA Authorisations Version 1.1
BEEDS portal Bank of England Electronic Data Submission portal User guide New PRA Authorisations Version 1.1 May 2018 Contents Document versions 3 1. Introduction 3 a. Bank of England contact details 4
More informationUNCLASSIFIED. FY 2016 Base FY 2016 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Defense Security Service Date: February 2015 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 7: Operational Systems Development COST
More informationDelegation for Approving Human Resources Transactions on My HUB
Delegation for Approving Human Resources Transactions on My HUB Manage Delegation Introduction Submitting a Delegation Request Reviewing Proxies Reviewing and Accepting Delegation Authorities Frequently
More informationSection K: Registration Error Override Request System
Section K: Registration Error Override Request System 1. REGISTRATION ERROR OVERRIDE SYSTEM... 2 1. 1 INTRODUCTION... 2 1. 2 THE NEW AND IMPROVED SYSTEM... 2 2. CARLETON CENTRAL PAGES... 6 2.1 REGISTRATION
More informationPearsonAccess User Guide PARCC
PearsonAccess User Guide PARCC Copyright 2013, Pearson Education, Inc. Published December 16, 2013 1.0 Document Revisions... 5 2.0 Getting Started... 6 2.1 Getting Started - Introduction... 7 2.2 Getting
More informationAVAYA LEARNING CENTER END USER GUIDE. Avaya Learning License Registration Guideline
AVAYA LEARNING CENTER END USER GUIDE Avaya Learning License Registration Guideline 1 Avaya Learning Center Virtual Campus Registration Guide March 2014 v.2 ENROLLMENT REGISTRATION PROCESS Enrollment is
More information1- How do you register for an account with Alberta Transportation s Online Services?
1- How do you register for an account with Alberta Transportation s Online Services? Go to Online Services Home Page at https://www.trans.gov.ab.ca/travisweblogin/redirect.htm and select Register under
More informationSecure Access Manager User Guide September 2017
Secure Access Manager User Guide September 2017 1 1 INTRODUCTION... 3 1.1 SUMMARY... 3 2 BASIC FUNCTIONS... 3 2.1 LOGIN TO YOUR SAM ACCOUNT... 3 2.1.1 How to Activate your Account... 3 2.1.2 How to Login
More informationEligibility & Certification Process ELIGIBILITY CONFIRMING ELIGIBILITY ELIGIBILITY CRITERION 1: BUILDING CHARACTERISTICS
ELIGIBILITY To be eligible for Green Star SA Existing Building Performance Rating assessment, buildings must meet each of the following four Eligibility Criteria. 1. Building Characteristics 2. Building
More informationWCCPv2 and WCCP Enhancements
WCCPv2 and WCCP Enhancements Release 12.0(11)S June 20, 2000 This feature module describes the Web Cache Communication Protocol (WCCP) Enhancements feature and includes information on the benefits of the
More informationGuidelines for Submitting NERC Reliability Standards Required Documents to the SPP Reliability Coordinator and the SPP Balancing Authority Version 1
Guidelines for Submitting NERC Reliability Standards Required Documents to the SPP Reliability Coordinator and the SPP Balancing Authority Version 1 Revision History Version Effective Date Summary of Revisions
More informatione-survey System User Manual for AML/CFT COMPLIANCE REPORT
BANK NEGARA MALAYSIA CENTRAL BANK OF MALAYSIA e-survey System User Manual for AML/CFT COMPLIANCE REPORT VERSION 1.0 Table of Content BNM e-survey System User Manual for AML/CFT COMPLIANCE REPORT 1. Introduction...
More informationClient Services Procedure Manual
Procedure: 85.00 Subject: Administration and Promotion of the Health and Safety Learning Series The Health and Safety Learning Series is a program designed and delivered by staff at WorkplaceNL to increase
More informationAdding and Editing Chapter and Adviser Information Logging in for the first time (Existing chapters)... 2
Chapter Advisers CONTENTS Adding and Editing Chapter and Adviser Information... 2 Logging in for the first time (Existing chapters)... 2 How to edit a chapter s information:... 2 How to view all chapter
More informationSection K: Registration Override Request System
Section K: Registration Override Request System 1. REGISTRATION OVERRIDE SYSTEM... 2 1. 1 INTRODUCTION... 2 2. CARLETON CENTRAL PAGES... 3 2.1 INFORMATION PAGE... 3 2.2 REGISTRATION OVERRIDE REQUEST SUMMARY
More informationAccess Control List Network Solution for Cleveland Branch Offices Kevin O Neal DeVry University NETW208: Accessing the WAN
1 Access Control List Network Solution for Cleveland Branch Offices Kevin O Neal DeVry University NETW208: Accessing the WAN Submitted to: Professor: Hopkins Date: 10.-7-2012 Implementation and Creation
More informationDepartment of Defense INSTRUCTION. DoD Information Assurance Certification and Accreditation Process (DIACAP)
Department of Defense INSTRUCTION NUMBER 8510.01 November 28, 2007 ASD(NII)/DoD CIO SUBJECT: References: DoD Information Assurance Certification and Accreditation Process (DIACAP) (a) Subchapter III of
More informationNRMCA Sustainable Concrete Plant Certification Policies and Procedures
NRMCA Sustainable Concrete Plant Certification Policies and Procedures February 2011 1 Introduction 1.1 As interest in sustainable development grows, the ready mixed concrete industry must be able to support
More informationUniversity of Sunderland Business Assurance PCI Security Policy
University of Sunderland Business Assurance PCI Security Policy Document Classification: Public Policy Reference Central Register IG008 Policy Reference Faculty / Service IG 008 Policy Owner Interim Director
More informationBEEDS portal Bank of England Electronic Data Submission portal. User guide. Credit unions Version 1.2
BEEDS portal Bank of England Electronic Data Submission portal User guide Credit unions Version 1.2 May 2018 Contents Document versions 3 1. Introduction 4 a. Bank of England contact details 4 2. General
More informationQatar Financial Centre- Regulatory Authority (QFCRA) Electronic Submission System (ESS) User Guide Version 1.2 Dated Feb
Qatar Financial Centre- Regulatory Authority (QFCRA) Electronic Submission System (ESS) User Guide Version 1.2 Dated Feb-06-2013 Intellectual Property of QFC-Regulatory Authority Page 1 Table of Contents
More informationIT Security Evaluation and Certification Scheme Document
IT Security Evaluation and Certification Scheme Document June 2015 CCS-01 Information-technology Promotion Agency, Japan (IPA) IT Security Evaluation and Certification Scheme (CCS-01) i / ii Table of Contents
More informationApplication for Membership of the Association for Solution Focused Hypnotherapy
Therapist Reference: (Association use only) Application for Membership of the Association for Solution Focused Hypnotherapy Please complete using block capitals. See attached Guidance Notes for further
More informationTitle: Information Assurance (IA) Design Review Information Package (DRIP) Number: DI-MGMT Approval Date:
DATA ITEM DESCRIPTION Title: Information Assurance (IA) Design Review Information Package (DRIP) Number: DI-MGMT-81845 Approval Date: 20111108 AMSC Number: N9222 Limitation: N/A DTIC Applicable: N/A GIPDEP
More informationity Information Assurance Vulnerabil DISA ItY Alert Internal Process and SYstem
IA-00109. Information Assurance Vulnerabil DISA Internal Process and ity I ItY Alert Sy SYstem Jacqueline Price Snouffer jackie.snouffer@ritchie.disa.mil (7 17) 267-9997 9 February 1999 Form SF298 Citation
More informationPORTAL TRANSITION GUIDE. 1 February 2019
PORTAL TRANSITION GUIDE 1 February 2019 PORTAL TRANSITION GUIDE Portal Transition Guide - 1 February 2019 1 WELCOME The Pharmacy Programs Administrator welcomes you to the new Registration and Claiming
More informationPhysical Security Reliability Standard Implementation
Physical Security Reliability Standard Implementation Attachment 4b Action Information Background On March 7, 2014, the Commission issued an order directing NERC to submit for approval, within 90 days,
More informationWebsite Logon Page 2. Candidates Online Assessment Home Page 5. Attempting Online Assessments Page 6. Previous Online Assessment Results Page 10
IMI Awards Candidate Website Logon Page 2 Candidates Online Assessment Home Page 5 Attempting Online Assessments Page 6 Previous Online Assessment Results Page 10 Centre Personnel Website Logon Page 13
More informationRISP Consultant Registration Guide
RISP Consultant Registration Guide Prepared By: Document Location: Ministry of Transportation and Infrastructure, Engineering Branch Visit http://www.th.gov.bc.ca/erisp/usermanual.htm for latest version
More informationAdministrative Changes to TINKERAFBI , Automated Information System (AIS) Access and Data Release Requirements
Administrative Changes to TINKERAFBI 33-110, Automated Information System (AIS) Access and Data Release Requirements OPR: 72 ABW/SCP: Special Mission Division References throughout to https://wwwmil.tinker.af.mil/ites/opr.asp
More information2 Creating New CCQAS 2.8 User Accounts
2 Creating New CCQAS 2.8 User Accounts The deployment of CCQAS 2.8 which introduced the online privilege application, review, and approval functionality, significantly expanded the number of CCQAS users
More informationVirginia State University Policies Manual. Title: Information Security Program Policy: 6110
Purpose Virginia State University (VSU) uses information to perform the business services and functions necessary to fulfill its mission. VSU information is contained in many different mediums including
More informationDefense Information System for Security (DISS) Frequently Asked Questions (FAQs)
Defense Manpower Data Center Personnel Security & Assurance Defense Information System for Security (DISS) Frequently Asked Questions (FAQs) Document Version 1.3 28 March 2017 Document History Version
More informationSecurity Professional Education Development (SPēD) DoD Personnel Security Adjudicator Professional Certification (APC) Program Maintenance Procedures
Security Professional Education Development (SPēD) DoD Personnel Security Adjudicator Professional Certification (APC) Program Maintenance Procedures DATE 4 November 2014 SUBJECT: Maintenance and Renewal
More informationSt. Christopher (St. Kitts) & Nevis. FATCA Portal User Guide
St. Christopher (St. Kitts) & Nevis FATCA Portal User Guide Dated issued: February 19, 2016 Contact us: St. Kitts and Nevis Competent Authority 1-869 465 8485 or FATCA@sknird.com TABLE OF CONTENTS Introduction...
More informationSWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ
SWIFT Customer Security Controls Framework and self-attestation via The KYC Registry Security Attestation Application FAQ 1 SWIFT Customer Security Controls Framework Why has SWIFT launched new security
More informationSecure Access Manager User Guide December 2017
Secure Access Manager User Guide December 2017 Copyright 2017 Exostar, LLC All rights reserved. 1 INTRODUCTION... 3 SUMMARY... 3 BASIC FUNCTIONS... 3 LOGIN TO YOUR SAM ACCOUNT... 3 How to Activate your
More informationProvider Monitoring Report. City and Guilds
Provider Monitoring Report City and Guilds 22 May 2017 to 3 August 2017 Contents 1 Background 1 1.1 Scope 1 1.2 Provider Monitoring Report Timeline 2 1.3 Summary of Provider Monitoring Issues and Recommendations
More informationENVIRONMENTAL LABORATORY APPROVAL PROGRAM CERTIFICATION MANUAL DATE
1 of 6 List of Topics Covered in this Item: Primary and Secondary Accreditation...1 Personnel...2 Fields of Accreditation...2 Interim Accreditation...3 Notification and Reporting...3 Corrective Actions
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file
More informationDISADVANTAGED BUSINESS ENTERPRISE PROGRAM. Unified Certification Program OKLAHOMA
DISADVANTAGED BUSINESS ENTERPRISE PROGRAM Unified Certification Program OKLAHOMA TABLE OF CONTENTS General... 1 Ratification Process... 1 Implementation Schedule... 2 Regulatory Requirements... 2 DBE Directory...
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file
More informationSCS FSC Chain-of-Custody Guidance for Certification of Multiple Sites FSC-STD V2-1
2000 Powell Street, Ste. 600 Emeryville, CA 94608 USA +1.510.452.8000 main +1.510.452.8001 fax www.scsglobalservices.com SCS FSC Chain-of-Custody Guidance for Certification of Multiple Sites FSC-STD-40-003
More informationCanada Education Savings Program (CESP) Data Interface Operations and Connectivity
(CESP) Version Number: 7.0 Version Date: November 24, 2016 Version History Version Release Date Description R 1.0 September 30, 1998 Initial version for HRSDC internal reviews. D 2.0 March 15, 1999 Ongoing
More informationBTEC Centre Guide to Standards Verification
BTEC Centre Guide to Standards Verification 2017-2018 Contents Introduction How to use this guide 1. What you need to do 2. What you need to know Standards verification 1. Allocation of your Standards
More informationPlease go to to complete the threshold questions. Click Here for the PIMS Users Manual
The 2019 HOME Application will be completely online this year! In order to apply online, all users must register/login to PIMS and submit their Threshold & Self Certification questions. Once approved,
More informationISFD Release Notices Industrial Security Facilities Database (ISFD) v Metrics Release Notes [Effective February 22, 2014]:
ISFD Release Notices Industrial Security Facilities Database (ISFD) v4.0.0.4 Metrics Release Notes [Effective February 22, 2014]: The ISFD system provides a centralized web-based platform for the Industrial
More informationNEW USER GUIDE. 1 February 2019
NEW USER GUIDE 1 February 2019 NEW USER GUIDE New User Guide / 1 February 2019 i WELCOME Welcome from the Pharmacy Programs Administrator. We administer, process and pay claims associated with the 23 Community
More informationTable of Contents. Overview of the TEA Login Application Features Roles in Obtaining Application Access Approval Process...
TEAL Help Table of Contents Overview of the TEA Login Application... 7 Features... 7 Roles in Obtaining Application Access... 7 Approval Process... 8 Processing an Application Request... 9 The Process
More informationEnabling Smart Card Logon for Linux Using Centrify Suite
DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Linux Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/
More informationGuide to Form 9: Project Completion Form. Submitting a project completion through ENTRUST online
Guide to Form 9: Project Completion Form Submitting a project completion through ENTRUST online February 2015 1. Introduction 1.1 You are required to submit a project completion form for each project which
More informationCloud Overview. Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 UNITED IN SERVICE TO OUR NATION UNCLASSIFIED 1
Cloud Overview Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 1 DoD Cloud Deployment Models DoDIN On-Premise Commercial Cloud Commercially provided cloud service hosted within DoD facilities
More informationBTEC Centre Guide to Standards Verification
BTEC Centre Guide to Standards Verification 2016-2017 Contents Introduction How to use this guide 1. What you need to do 2. What you need to know Standards verification 1. Allocation of your Standards
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Network Hunting The Network Hunting is employed to proactively look for indicators of an active threat or exploitation
More informationPatient Safety Reporting Program. User Guide
Patient Safety Reporting Program User Guide for Account Management A how-to guide for healthcare facilities using the Patient Safety Reporting Program account management feature Table of Contents Table
More informationProposed Interim Model for GDPR Compliance-- Summary Description
Proposed Interim Model for GDPR Compliance-- Summary Description (The Calzone Model, 28 February 2018) Prepared by: ICANN Org I. Introduction The Proposed Interim Model balances competing elements of models
More informationPort Forwarding Setup (RTA1025W)
Port Forwarding Setup (RTA1025W) Port Forwarding Port forwarding enables programs or devices running on your LAN to communicate with the internet as if they were directly connected. This is most commonly
More informationOnline CDC service. HowTo guide for applicants
Online CDC service HowTo guide for applicants Disclaimer While every reasonable effort has been made to ensure that this document is correct at the time of printing, the State of NSW, its agents and employees,
More informationICSA Labs Network Firewall Certification Testing Report Corporate Criteria Version 4.2. Huawei Technologies. USG Series/Eudemon-N Series
ICSA Labs Huawei Technologies USG Series/Eudemon-N Series 4/20/2015 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com FWXX HUAWEITECH-2015-0420-01 Table of
More informationRED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2. 3 June 2013
RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW Version 1, Release 2 3 June 2013 Developed by Red Hat, NSA, and DISA for the DoD Trademark Information Names, products,
More informationDISA Network Services - Data http://www.disa.mil/services/network-services/data/secret-ip 1 of 2 6/28/2012 10:33 AM SERET IP DATA Sign up to receive Secret IP Data email updates SERVIE SUPPORT DISN Global
More informationUNCLASSIFIED // FOUO Pegasus 101 Brief
Pegasus 101 Brief Multi-National Information Sharing Program Management Office March 2015 2 Outline Pegasus Defined Pegasus Requirements Pegasus Today Product / Service update Pegasus Improved Service
More informationSTUDENT GUIDE Risk Management Framework Step 5: Authorizing Systems
Slide 1 - Risk Management Framework RMF Module 5 Welcome to Lesson 5 - RMF Step 5 Authorizing Systems. Once the security controls are assessed, the POA&M and security authorization package must be finalized
More informationInformation Systems Security Requirements for Federal GIS Initiatives
Requirements for Federal GIS Initiatives Alan R. Butler, CDP Senior Project Manager Penobscot Bay Media, LLC 32 Washington Street, Suite 230 Camden, ME 04841 1 Federal GIS "We are at risk," advises the
More information13241 Woodland Park Road, Suite 400 Herndon, VA USA A U T H O R : E X O S T A R D ATE: M A R C H V E R S I O N : 3.
SECURE ACCESS MAN AG E R FIRST TIME LOGIN GUIDE A U T H O R : E X O S T A R D ATE: M A R C H 2 0 1 5 V E R S I O N : 3.0 1 S E C U R E A CCESS M A N A G E R SECURE ACCESS MANAGER OVERVIEW... 3 SUMMARY...
More informationICON Laboratory Services, Inc. isite User Guide
ICON Laboratory Services, Inc. isite User Guide TABLE OF CONTENTS Section 1 Introduction and Creating an Account in isite... 2 Section 2 Log In... 3 2.1 Selecting a Study... 3 Section 3 Viewing Lab Reports...
More informationInterac e-transfer for Business User Guide
Interac e-transfer for Business User Guide User Guide - Interac e-transfer for Business 1 Contents Welcome to ATB Online Business 2 Sending & Receiving with Interac e-transfer 3 Initial Access 3 Not authorized
More information2 ACCREDITED AUDITORS
2 ACCREDITED AUDITORS 2.1 Auditor Accreditation 2.1.1 IBAC will issue auditor accreditation and appropriate credentials to individuals that apply for such accreditation and who meet the requirements established
More informationThe New IRB Form System Completing IRB Forms the IRB Application (Thesis/Dissertation)
The New IRB Form System Completing IRB Forms the IRB Application (Thesis/Dissertation) When you select to complete a new form the form will automatically be created and assigned an identification number.
More informationInformation Technology Resource Management Council (ITRMC) ENTERPRISE GUIDELINES G950 SECURITY PROCEDURES
Information Technology Resource Management Council (ITRMC) ENTERPRISE GUIDELINES G950 SECURITY PROCEDURES Category: G950A Server Operating System; Initial Security Requirements CONTENTS: I. Definition
More informationOEL PROVIDER SERVICES PORTAL
OEL PROVIDER SERVICES PORTAL FREQUENTLY ASKED QUESTIONS February 2018 1. What is the Office of Early Learning (OEL) Provider Services Portal? The OEL Provider Services Portal is a statewide online system
More informationFOR OFFICIAL USE ONLY DEPARTMENT OF THE AIR FORCE HEADQUARTERS AIR FORCE NETWORK INTEGRATION CENTER (AFNIC) SCOTT AIR FORCE BASE ILLINOIS
DEPARTMENT OF THE AIR FORCE HEADQUARTERS AIR FORCE NETWORK INTEGRATION CENTER (AFNIC) SCOTT AIR FORCE BASE ILLINOIS 62225-5222 MEMORANDUM FOR AFNIC/NVI FROM: AFNIC/NW 203 West Losey Street, Room 3100 Scott
More informationHow to Complete a MARMS Assessment. User s Guide v.0.1, 2018
How to Complete a MARMS Assessment User s Guide v.0.1, 2018 1 Introduction This User s Guide is intended to provide users with a step by step tutorial on recording an assessment using the MARMS tool Other
More informationContinuing Professional Development Program Guidelines
Continuing Professional Development Program Guidelines Much of what is learned in obtaining a qualification in today s rapidly changing business environment can quickly become obsolete. Most would agree
More informationSTUDENT GUIDE Risk Management Framework Step 1: Categorization of the Information System
Slide 1 RMF Overview RMF Module 1 RMF takes into account the organization as a whole, including strategic goals and objectives and relationships between mission/business processes, the supporting information
More informationAgency Guide for FedRAMP Authorizations
How to Functionally Reuse an Existing Authorization Version 1.0 August 5, 2015 Revision History Date Version Page(s) Description Author 08/05/2015 1.0 All Initial Publication FedRAMP PMO 06/06/2017 1.0
More informationUNSW Apply Online agent homepage
UNSW Apply Online agent homepage Counsellor manual Part A: Requesting access STEP 1 Go to applyonline.unsw.edu.au/ agent-login and click Register Now STEP 2 At the following screen, accept Terms & Conditions
More informationUCEM Postgraduate Diploma in Facilities Management
UCEM Postgraduate Diploma in Facilities Management Assessment, progression and award regulations Reference: DipFM regs Version: 04.00 Status: Final Author: G Fogg Date: 06/01/2016 Effective From: February
More informationE X O S T A R, LLC D A T E : M AY V E R S I O N : 4.0
SECURE ACCESS MAN AG E R USER GUI DE E X O S T A R, LLC D A T E : M AY 2 0 1 7 V E R S I O N : 4.0 1 S E C U R E AC C E S S M A N A G E R 1 INTRODUCTION... 3 1.1 SUMMARY... 3 2 BASIC FUNCTIONS... 3 2.1
More informationDEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND Joint Interoperability Test Command (JTE) 10 Aug 15
DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND 20755-0549 IN REPLY REFER TO: Joint Interoperability Test Command (JTE) 10 Aug 15 MEMORANDUM FOR DISTRIBUTION SUBJECT: Extension of
More informationCMS RETROACTIVE ENROLLMENT & PAYMENT VALIDATION RETROACTIVE PROCESSING CONTRACTOR (RPC) STATE AND COUNTY CODE UPDATE STANDARD OPERATING PROCEDURE
CMS RETROACTIVE ENROLLMENT & PAYMENT VALIDATION RETROACTIVE PROCESSING CONTRACTOR (RPC) STATE AND COUNTY CODE UPDATE STANDARD OPERATING PROCEDURE TABLE OF CONTENTS RETROACTIVE PROCESSING CONTRACTOR (RPC)
More informationThe University of Adelaide. Contractor Online Induction - User Guide
The University of Adelaide Contractor Online Induction - User Guide Overview Dear Contractor, The University of Adelaide has recently reviewed its Contractor Induction system. As a result, we have implemented
More informationSTEPS FOR CANDIDATE FOR SCHEDULING ITB EXAM
STEPS FOR CANDIDATE FOR SCHEDULING ITB EXAM 1. Candidates can start registering through the Register for an ITB Certification link on www.pearsonvue.com/itb or directly by clicking on Enrollment link of
More informationAuthAnvil for Retail IT. Exploring how AuthAnvil helps to reach compliance objectives
AuthAnvil for Retail IT Exploring how AuthAnvil helps to reach compliance objectives AuthAnvil for Retail IT Exploring how AuthAnvil helps to reach compliance objectives As companies extend their online
More informationNOTE: This includes Aerospace Auditors (AAs) and Aerospace Experienced Auditors (AEAs)
Purpose: Provide supplemental rules for all stakeholders to facilitate the transition to the 9100/9110/9120:2009 Aerospace Quality Management Systems (AQMS) standards, including use of the updated 9101.
More informationProgram Overview. Oregon Government Finance Officers Association Professional Finance Officer Certification Program
Program Overview Oregon Government Finance Officers Association Professional Finance Officer Certification Program OGFOA Administrative Services 6745 SW Hampton, Suite 101 Portland, OR 97223 Phone: 503-601-2777
More informationIncome Tax Department
Income Tax Department User Guide for Verification of Cash Transactions on AIMS Module (Verification Guide) Version 1.0 (February 21, 2017) Document Version Control Version Date Remarks 1.0 21 st February
More information