2022-12-13美国网络空间安全政策体系大图

ID:27410

大小:0.84 MB

页数:1页

时间:2022-12-23

金币:1

上传者:战必胜
DoDD 5200.47E
Anti-Tamper (AT)
DoDD 5200.47E
Anti-Tamper (AT)
DoDD 5200.47E
Anti-Tamper (AT)
DoDI 5000.02
Operation of the Adaptive Acquisition
Framework
DoDI 5000.02
Operation of the Adaptive Acquisition
Framework
DoDI 5000.02
Operation of the Adaptive Acquisition
Framework
DoDD 8140.01
Cyberspace Workforce Management
DoDD 8140.01
Cyberspace Workforce Management
DoDD 8140.01
Cyberspace Workforce Management
DoDI 8510.01
Risk Management Framework
for DoD IT
DoDI 8510.01
Risk Management Framework
for DoD IT
DoDI 8580.1
Information Assurance (IA) in the
Defense Acquisition System
DoDI 8580.1
Information Assurance (IA) in the
Defense Acquisition System
DoDD 3100.10
Space Policy
DoDD 3100.10
Space Policy
DoDI 1000.25
DoD Personnel Identity Protection
(PIP) Program
DoDI 1000.25
DoD Personnel Identity Protection
(PIP) Program
CNSSP-12
National IA Policy for Space Systems
Used to Support NSS
CNSSP-12
National IA Policy for Space Systems
Used to Support NSS
DoDD 8115.01
IT Portfolio Management
DoDD 8115.01
IT Portfolio Management
DoDD 8115.01
IT Portfolio Management
DoDI 8320.02
Sharing Data, Info, and IT Services in
the DoD
DoDI 8320.02
Sharing Data, Info, and IT Services in
the DoD
DoDI 8320.02
Sharing Data, Info, and IT Services in
the DoD
DoDI 8115.02
IT Portfolio Management
Implementation
DoDI 8115.02
IT Portfolio Management
Implementation
DoDI 8115.02
IT Portfolio Management
Implementation
DoDI S-5200.16
Objectives and Min Stds for COMSEC
Measures used in NC2 Comms
DoDI S-5200.16
Objectives and Min Stds for COMSEC
Measures used in NC2 Comms
CJCSI 6510.02F
Cryptographic Modernization Planning
CJCSI 6510.02F
Cryptographic Modernization Planning
CJCSI 6510.06C
Communications Security Releases to
Foreign Nations
CJCSI 6510.06C
Communications Security Releases to
Foreign Nations
CNSSI-4012
National IA Training Standard for
Senior Systems Managers
CNSSI-4012
National IA Training Standard for
Senior Systems Managers
DoDI 8170.01
Online Information Management and
Electronic Messaging
DoDI 8170.01
Online Information Management and
Electronic Messaging
DoDI 8170.01
Online Information Management and
Electronic Messaging
CNSSI-4013
National IA Training Standard For
System Administrators (SA)
CNSSI-4013
National IA Training Standard For
System Administrators (SA)
CNSSI-4016
National IA Training Standard For Risk
Analysts
CNSSI-4016
National IA Training Standard For Risk
Analysts
FIPS 199
Standards for Security Categorization
of Federal Info. and Info. Systems
FIPS 199
Standards for Security Categorization
of Federal Info. and Info. Systems
CNSSP-11
Natl Policy Governing the Acquisition
of IA and IA-Enabled IT
CNSSP-11
Natl Policy Governing the Acquisition
of IA and IA-Enabled IT
CNSSP-14
National Policy Governing the Release
of IA Products/Services
CNSSP-14
National Policy Governing the Release
of IA Products/Services
NIST SP 800-53 R5
Security & Privacy Controls for
Information Systems and Orgs.
NIST SP 800-53 R5
Security & Privacy Controls for
Information Systems and Orgs.
NIST SP 800-53A R5
Assessing Security & Privacy Controls
in Information Systems & Orgs.
NIST SP 800-53A R5
Assessing Security & Privacy Controls
in Information Systems & Orgs.
NIST SP 800-37 R2
Guide for Applying the Risk Mgt
Framework to Fed. Info. Systems
NIST SP 800-37 R2
Guide for Applying the Risk Mgt
Framework to Fed. Info. Systems
NIST SP 800-60, Vol 1, R1
Guide for Mapping Types of Info and
Info Systems to Security Categories
NIST SP 800-60, Vol 1, R1
Guide for Mapping Types of Info and
Info Systems to Security Categories
NIST SP 800-59
Guideline for Identifying an Information
System as a NSS
NIST SP 800-59
Guideline for Identifying an Information
System as a NSS
DoDI 8100.04
DoD Unified Capabilities (UC)
DoDI 8100.04
DoD Unified Capabilities (UC)
DoDI 4650.01
Policy and Procedures for Mgt and Use
of the Electromagnetic Spectrum
DoDI 4650.01
Policy and Procedures for Mgt and Use
of the Electromagnetic Spectrum
DoDD 7045.20
Capability Portfolio Management
DoDD 7045.20
Capability Portfolio Management
HSPD-12
Policy for a Common ID Standard for
Federal Employees and Contractors
HSPD-12
Policy for a Common ID Standard for
Federal Employees and Contractors
DoDI 5200.48
Controlled Unclassified
Information(CUI)
DoDI 5200.48
Controlled Unclassified
Information(CUI)
DoDI 5200.48
Controlled Unclassified
Information(CUI)
DoDI 5200.08
Security of DoD Installations and
Resources and the DoD PSRB
DoDI 5200.08
Security of DoD Installations and
Resources and the DoD PSRB
DoDI 5200.08
Security of DoD Installations and
Resources and the DoD PSRB
DoDI 5205.13
Defense Industrial Base (DIB) Cyber
Security (CS) / IA Activities
DoDI 5205.13
Defense Industrial Base (DIB) Cyber
Security (CS) / IA Activities
CNSSI-4008
Program for the Mgt and Use of Natl
Reserve IA Security Equipment
CNSSI-4008
Program for the Mgt and Use of Natl
Reserve IA Security Equipment
NSTISSI-4015
National Training Standard for System
Certifiers
NSTISSI-4015
National Training Standard for System
Certifiers
Build and Operate a Trusted DoDIN Build and Operate a Trusted DoDIN
DoDI 8420.01
Commercial WLAN Devices, Systems,
and Technologies
DoDI 8420.01
Commercial WLAN Devices, Systems,
and Technologies
DoDI 8420.01
Commercial WLAN Devices, Systems,
and Technologies
DFARS
Subpart 208.74, Enterprise Software
Agreements
DFARS
Subpart 208.74, Enterprise Software
Agreements
CJCSI 5123.01H
Charter of the JROC and
Implementation of the JCID
CJCSI 5123.01H
Charter of the JROC and
Implementation of the JCID
CJCSI 5123.01H
Charter of the JROC and
Implementation of the JCID
DoDI 7000.14
Financial Management Policy and
Procedures (PPBE)
DoDI 7000.14
Financial Management Policy and
Procedures (PPBE)
CNSSI-1253
Security Categorization and Control
Selection for Natl Security Systems
CNSSI-1253
Security Categorization and Control
Selection for Natl Security Systems
Common Criteria Evaluation and
Validation Scheme (CCEVS)
Common Criteria Evaluation and
Validation Scheme (CCEVS)
ABOUT THIS CHART
This chart organizes cybersecurity policies and guidance by Strategic Goal
and Office of Primary Responsibility (see Color Key). Double-clicking* on
the box directs users to the most authoritative publicly accessible source.
Policies in italics indicate the document is marked for limited distribution or
no authoritative public-facing hyperlink is currently available.
The linked sites are not controlled by the developers of this chart. We
regularly check the integrity of the links, but you may occasionally
experience an error message due to problems at the source site or the site's
decision to move the document. Please let us know if you believe the link is
no longer valid.
CNSS policies link only to the CNSS site.
Boxes with red borders reflect recent updates.
*Note: It is best to open this PDF directly in a browser. However, if you are
unable to open the links directly from this PDF document, place your cursor
over the target box and right-click to copy the link location. Open a web
browser and paste the copied link into the address bar.
For the latest version of this chart or email alerts to updates go to https://
dodiac.dtic.mil/dod-cybersecurity-policy-chart/
ABOUT THIS CHART
This chart organizes cybersecurity policies and guidance by Strategic Goal
and Office of Primary Responsibility (see Color Key). Double-clicking* on
the box directs users to the most authoritative publicly accessible source.
Policies in italics indicate the document is marked for limited distribution or
no authoritative public-facing hyperlink is currently available.
The linked sites are not controlled by the developers of this chart. We
regularly check the integrity of the links, but you may occasionally
experience an error message due to problems at the source site or the site's
decision to move the document. Please let us know if you believe the link is
no longer valid.
CNSS policies link only to the CNSS site.
Boxes with red borders reflect recent updates.
*Note: It is best to open this PDF directly in a browser. However, if you are
unable to open the links directly from this PDF document, place your cursor
over the target box and right-click to copy the link location. Open a web
browser and paste the copied link into the address bar.
For the latest version of this chart or email alerts to updates go to https://
dodiac.dtic.mil/dod-cybersecurity-policy-chart/
FIPS 140-3
Security Requirements for
Cryptographic Modules
FIPS 140-3
Security Requirements for
Cryptographic Modules
DoDI 8582.01
Security of Non-DoD Info Sys Processing
Unclassified Nonpublic DoD Information
DoDI 8582.01
Security of Non-DoD Info Sys Processing
Unclassified Nonpublic DoD Information
CJCSI 6211.02D
Defense Information System Network:
(DISN) Responsibilities
CJCSI 6211.02D
Defense Information System Network:
(DISN) Responsibilities
DoDD 8100.02
Use of Commercial Wireless Devices,
Services, and Tech in the DoD GIG
DoDD 8100.02
Use of Commercial Wireless Devices,
Services, and Tech in the DoD GIG
DoDD 8100.02
Use of Commercial Wireless Devices,
Services, and Tech in the DoD GIG
DoDI 8330.01
Interoperability of IT and National
Security Systems (NSS)
DoDI 8330.01
Interoperability of IT and National
Security Systems (NSS)
DoDI 8330.01
Interoperability of IT and National
Security Systems (NSS)
DoDI 8520.03
Identity Authentication for Information
Systems
DoDI 8520.03
Identity Authentication for Information
Systems
DoDI 8520.03
Identity Authentication for Information
Systems
CJCSI 3213.01D,
Joint Operations Security
CJCSI 3213.01D,
Joint Operations Security
RMF Knowledge ServiceRMF Knowledge ServiceRMF Knowledge Service
NIST 800-160, Vol.1 Rev.1,
Engineering of Trustworthy Secure
Systems
NIST 800-160, Vol.1 Rev.1,
Engineering of Trustworthy Secure
Systems
NIST 800-160, Vol.1 Rev.1,
Engineering of Trustworthy Secure
Systems
Distribution Statement A: Approved for Public Release.
Distribution is unlimited.
Design for the Fight Design for the Fight
ORGANIZE ORGANIZE
Partner for Strength Partner for Strength
Prevent and Delay Attackers
and Prevent Attackers from Staying
Prevent and Delay Attackers
and Prevent Attackers from Staying
Understand the Battlespace Understand the Battlespace
ANTICIPATE ANTICIPATE
Secure Data in Transit Secure Data in Transit
ENABLE ENABLE
DoDM 1000.13, Vol. 1
DoD ID Cards: ID Card Life-cycle
DoDM 1000.13, Vol. 1
DoD ID Cards: ID Card Life-cycle
Manage Access Manage Access
Assure Information Sharing Assure Information Sharing
Develop and Maintain Trust Develop and Maintain Trust
Strengthen Cyber Readiness Strengthen Cyber Readiness
PREPARE PREPARE
Sustain Missions Sustain Missions
CJCSM 6510.01B
Cyber Incident Handling Program
CJCSM 6510.01B
Cyber Incident Handling Program
CJCSM 6510.01B
Cyber Incident Handling Program
DoDI 8530.01, Cybersecurity Activities
Support to DoD Information Network
Operations
DoDI 8530.01, Cybersecurity Activities
Support to DoD Information Network
Operations
DoD O-8530.1-M (CAC reqd)
CND Service Provider Certification and
Accreditation Program
DoD O-8530.1-M (CAC reqd)
CND Service Provider Certification and
Accreditation Program
DoDI 5200.39
CPI Identification and Protection within
RDT&E
DoDI 5200.39
CPI Identification and Protection within
RDT&E
DoDI 5200.39
CPI Identification and Protection within
RDT&E
CJCSI 6510.01F
Information Assurance (IA) and
Computer Network Defense (CND)
CJCSI 6510.01F
Information Assurance (IA) and
Computer Network Defense (CND)
CNSSP-21
National IA Policy on Enterprise
Architectures for NSS
CNSSP-21
National IA Policy on Enterprise
Architectures for NSS
DoDI 8500.01
Cybersecurity
DoDI 8500.01
Cybersecurity
DoDD 8521.01E
Department of Defense Biometrics
DoDD 8521.01E
Department of Defense Biometrics
DoDD 8521.01E
Department of Defense Biometrics
DoDI 8523.01
Communications Security (COMSEC)
DoDI 8523.01
Communications Security (COMSEC)
ORGANIZE ORGANIZE
Lead and Govern Lead and Govern
DoDI 8560.01
COMSEC Monitoring
DoDI 8560.01
COMSEC Monitoring
DoDI 8560.01
COMSEC Monitoring
DoDD S-3710.01
National Leadership Command
Capability
DoDD S-3710.01
National Leadership Command
Capability
DoDD 3700.01
DoD Command and Control (C2)
Enabling Capabilities
DoDD 3700.01
DoD Command and Control (C2)
Enabling Capabilities
NIST SP 800-30, R1
Guide for Conducting Risk
Assessments
NIST SP 800-30, R1
Guide for Conducting Risk
Assessments
NIST SP 800-18, R1
Guide for Developing Security Plans
for Federal Information Systems
NIST SP 800-18, R1
Guide for Developing Security Plans
for Federal Information Systems
CNSSP-18
National Policy on Classified
Information Spillage
CNSSP-18
National Policy on Classified
Information Spillage
CNSSP-22, IA Risk Management
Policy for National Security Systems
CNSSP-22, IA Risk Management
Policy for National Security Systems
DoDD 3020.44
Defense Crisis Management
DoDD 3020.44
Defense Crisis Management
CNSSP-300
National Policy on Control of
Compromising Emanations
CNSSP-300
National Policy on Control of
Compromising Emanations
NSA IA Directorate (IAD) Management
Directive MD-110
Cryptographic Key Protection
NSA IA Directorate (IAD) Management
Directive MD-110
Cryptographic Key Protection
DODAF (Version 2.02)
DoD Architecture Framework
DODAF (Version 2.02)
DoD Architecture Framework
DODAF (Version 2.02)
DoD Architecture Framework
NIST SP 800-119
Guidelines for the Secure Deployment
of IPv6
NIST SP 800-119
Guidelines for the Secure Deployment
of IPv6
Joint Publication 6-0
Joint Communications System
Joint Publication 6-0
Joint Communications System
NIST SP 800-39
Managing Information Security Risk
NIST SP 800-39
Managing Information Security Risk
NIST SP 800-92
Guide to Computer Security Log
Management
NIST SP 800-92
Guide to Computer Security Log
Management
FIPS 200
Minimum Security Requirements for
Federal Information Systems
FIPS 200
Minimum Security Requirements for
Federal Information Systems
NSTISSI-3028
Operational Security Doctrine for the
FORTEZZA User PCMCIA Card
NSTISSI-3028
Operational Security Doctrine for the
FORTEZZA User PCMCIA Card
CNSSP-3
National Policy for Granting Access to
Classified Cryptographic Information
CNSSP-3
National Policy for Granting Access to
Classified Cryptographic Information
CNSSP-16
National Policy for the Destruction of
COMSEC Paper Material
CNSSP-16
National Policy for the Destruction of
COMSEC Paper Material
CNSSI-4001
Controlled Cryptographic Items
CNSSI-4001
Controlled Cryptographic Items
CNSSI-4003
Reporting and Evaluating COMSEC
Incidents
CNSSI-4003
Reporting and Evaluating COMSEC
Incidents
CNSSI-5000
Voice Over Internet Protocol (VoIP)
Computer Telephony (Annex I, VoSIP)
CNSSI-5000
Voice Over Internet Protocol (VoIP)
Computer Telephony (Annex I, VoSIP)
CNSSI-5001
Type-Acceptance Program for VoIP
Telephones
CNSSI-5001
Type-Acceptance Program for VoIP
Telephones
NACSI-6002
Natl COMSEC Instruction Protection of
Govt Contractor Telecomms
NACSI-6002
Natl COMSEC Instruction Protection of
Govt Contractor Telecomms
NSTISSP-101
National Policy on Securing Voice
Communications
NSTISSP-101
National Policy on Securing Voice
Communications
CNSSP-1
National Policy for Safeguarding and
Control of COMSEC Material
CNSSP-1
National Policy for Safeguarding and
Control of COMSEC Material
CNSSP-17
Policy on Wireless Communications:
Protecting Natl Security Info
CNSSP-17
Policy on Wireless Communications:
Protecting Natl Security Info
CNSSP-15
Use of Pub Standards for Secure
Sharing of Info Among NSS
CNSSP-15
Use of Pub Standards for Secure
Sharing of Info Among NSS
CNSSP-15
Use of Pub Standards for Secure
Sharing of Info Among NSS
CNSSP-25
National Policy for PKI in National
Security Systems
CNSSP-25
National Policy for PKI in National
Security Systems
CNSSI-7003
Protected Distribution Systems (PDS)
CNSSI-7003
Protected Distribution Systems (PDS)
CNSSP-19
National Policy Governing the Use of
HAIPE Products
CNSSP-19
National Policy Governing the Use of
HAIPE Products
NACSI-2005
Communications Security (COMSEC)
End Item Modification
NACSI-2005
Communications Security (COMSEC)
End Item Modification
CNSSI-4006
Controlling Authorities for COMSEC
Material
CNSSI-4006
Controlling Authorities for COMSEC
Material
DoDD 3020.40
Mission Assurance
DoDD 3020.40
Mission Assurance
DoDD 3020.40
Mission Assurance
DoDD 5144.02
DoD Chief Information Officer
DoDD 5144.02
DoD Chief Information Officer
DoDI 8410.02
NetOps for the Global Information
Grid (GIG)
DoDI 8410.02
NetOps for the Global Information
Grid (GIG)
Defense Acquisition Guidebook
Program Protection
Defense Acquisition Guidebook
Program Protection
CNSSI-1001
National Instruction on Classified
Information Spillage
CNSSI-1001
National Instruction on Classified
Information Spillage
CNSSI-4004.1, Destruction and
Emergency Protection Procedures for
COMSEC and Class. Material
CNSSI-4004.1, Destruction and
Emergency Protection Procedures for
COMSEC and Class. Material
CNSSI-7000
TEMPEST Countermeasures for
Facilities
CNSSI-7000
TEMPEST Countermeasures for
Facilities
NSTISSI-7001
NONSTOP Countermeasures
NSTISSI-7001
NONSTOP Countermeasures
DoDD 3020.26
DoD Continuity Policy
DoDD 3020.26
DoD Continuity Policy
NSTISSD-501
National Training Program for
INFOSEC Professionals
NSTISSD-501
National Training Program for
INFOSEC Professionals
CNSSI-4000
Maintenance of Communications
Security (COMSEC) Equipment
CNSSI-4000
Maintenance of Communications
Security (COMSEC) Equipment
NSTISSI-4011
National Training Standard for
INFOSEC Professionals
NSTISSI-4011
National Training Standard for
INFOSEC Professionals
CNSSI-4014
National IA Training Standard For
Information Systems Security Officers
CNSSI-4014
National IA Training Standard For
Information Systems Security Officers
CNSSI-4007
Communications Security (COMSEC)
Utility Program
CNSSI-4007
Communications Security (COMSEC)
Utility Program
NIST SP 800-128
Guide for Security-Focused
Configuration Mgt of Info Systems
NIST SP 800-128
Guide for Security-Focused
Configuration Mgt of Info Systems
NIST SP 800-126, R3
SCAP Ver. 1.3
NIST SP 800-126, R3
SCAP Ver. 1.3
NIST SP 800-137
Information Security Continuous
Monitoring (ISCM)
NIST SP 800-137
Information Security Continuous
Monitoring (ISCM)
Security Technical Implementation
Guides (STIGs)
Security Technical Implementation
Guides (STIGs)
Security Technical Implementation
Guides (STIGs)
Component-level Policy
(Directives, Instructions, Publications,
Memoranda)
Component-level Policy
(Directives, Instructions, Publications,
Memoranda)
NSA IA GuidanceNSA IA Guidance
OPERATIONAL/SUBORDINATE POLICY OPERATIONAL/SUBORDINATE POLICY
Security Configuration Guides
(SCGs)
Security Configuration Guides
(SCGs)
CNSSD-900, Governing Procedures of
the Committee on National Security
Systems
CNSSD-900, Governing Procedures of
the Committee on National Security
Systems
Executive Order 13691
Promoting Private Sector
Cybersecurity Information Sharing
Executive Order 13691
Promoting Private Sector
Cybersecurity Information Sharing
FAR
Federal Acquisition Regulation
FAR
Federal Acquisition Regulation
NIST Special Publication 800-Series NIST Special Publication 800-Series
NSD 42, National Policy for the
Security of Natl Security Telecom and
Information Systems
NSD 42, National Policy for the
Security of Natl Security Telecom and
Information Systems
A-130, Management of Fed Info
Resources
A-130, Management of Fed Info
Resources
NSPD 54 / HSPD 23
Computer Security and Monitoring
NSPD 54 / HSPD 23
Computer Security and Monitoring
NATIONAL / FEDERAL NATIONAL / FEDERAL
CNSSD-901
Natl Security Telecomms and Info Sys
Security (CNSS) Issuance System
CNSSD-901
Natl Security Telecomms and Info Sys
Security (CNSS) Issuance System
CNSSD-502
National Directive On Security of
National Security Systems
CNSSD-502
National Directive On Security of
National Security Systems
Computer Fraud and Abuse Act
Title 18 (§1030)
Computer Fraud and Abuse Act
Title 18 (§1030)
Federal Wiretap Act
Title 18 (§2510 et seq.)
Federal Wiretap Act
Title 18 (§2510 et seq.)
Pen Registers and Trap and Trace
Devices
Title 18 (§3121 et seq.)
Pen Registers and Trap and Trace
Devices
Title 18 (§3121 et seq.)
Executive Order 13526
Classified National Security Information
Executive Order 13526
Classified National Security Information
Foreign Intelligence Surveillance Act
Title 50 (§1801 et seq)
Foreign Intelligence Surveillance Act
Title 50 (§1801 et seq)
Stored Communications Act
Title 18 (§2701 et seq.)
Stored Communications Act
Title 18 (§2701 et seq.)
Ethics RegulationsEthics Regulations
National Strategy to Secure
Cyberspace
National Strategy to Secure
Cyberspace
CNSSI-4009
Cmte on National Security Systems
Glossary
CNSSI-4009
Cmte on National Security Systems
Glossary
AUTHORITIES AUTHORITIES
Title 10, US Code
Armed Forces
(§§2224, 3013(b), 5013(b), 8013(b))
Title 10, US Code
Armed Forces
(§§2224, 3013(b), 5013(b), 8013(b))
Title 32, US Code
National Guard
(§102)
Title 32, US Code
National Guard
(§102)
Title 40, US Code
Public Buildings, Property, and Works
(Ch. 113: §§11302, 11315, 11331)
Title 40, US Code
Public Buildings, Property, and Works
(Ch. 113: §§11302, 11315, 11331)
Title 50. US Code
War and National Defense
(§§3002, 1801)
Title 50. US Code
War and National Defense
(§§3002, 1801)
Title 50. US Code
War and National Defense
(§§3002, 1801)
Title 44, US Code
Federal Information Security Mod. Act,
(Chapter 35)
Title 44, US Code
Federal Information Security Mod. Act,
(Chapter 35)
Clinger-Cohen Act, Pub. L. 104-106 Clinger-Cohen Act, Pub. L. 104-106 Clinger-Cohen Act, Pub. L. 104-106
Title 14, US Code
Cooperation With Other Agencies
(Ch. 7)
Title 14, US Code
Cooperation With Other Agencies
(Ch. 7)
Title 14, US Code
Cooperation With Other Agencies
(Ch. 7)
UCP
Unified Command Plan
(US Constitution Art II, Title 10 & 50)
UCP
Unified Command Plan
(US Constitution Art II, Title 10 & 50)
CNSSI-4005
Safeguarding COMSEC Facilities and
Materials, amended by CNSS-008-14
CNSSI-4005
Safeguarding COMSEC Facilities and
Materials, amended by CNSS-008-14
NIST SP 800-153
Guidelines for Securing Wireless Local
Area Networks
NIST SP 800-153
Guidelines for Securing Wireless Local
Area Networks
CNSSI-1300
Instructions for NSS PKI X.509
CNSSI-1300
Instructions for NSS PKI X.509
NIST SP 800-144
Guidelines on Security and Privacy in
Public Cloud Computing
NIST SP 800-144
Guidelines on Security and Privacy in
Public Cloud Computing
CNSSI-1253F, Atchs 1-5
Security Overlays
CNSSI-1253F, Atchs 1-5
Security Overlays
CNSSI-5002, Telephony Isolation Used
for Unified Comms. Implementations w/
in Physically Protected Spaces
CNSSI-5002, Telephony Isolation Used
for Unified Comms. Implementations w/
in Physically Protected Spaces
CNSSAM IA 1-10, Reducing Risk of
Removable Media in NSS
CNSSAM IA 1-10, Reducing Risk of
Removable Media in NSS
MOA between DoD CIO and ODNI CIO
Establishing Net-Centric Software
Licensing Agreements
MOA between DoD CIO and ODNI CIO
Establishing Net-Centric Software
Licensing Agreements
MOA between DoD CIO and ODNI CIO
Establishing Net-Centric Software
Licensing Agreements
NIST SP 800-61, R2
Computer Security Incident Handling
Guide
NIST SP 800-61, R2
Computer Security Incident Handling
Guide
Executive Order 13231
as Amended by EO 13286 - Critical
Infrastructure Protection in the Info Age
Executive Order 13231
as Amended by EO 13286 - Critical
Infrastructure Protection in the Info Age
Executive Order 13587
Structural Reforms To Improve
Classified Nets
Executive Order 13587
Structural Reforms To Improve
Classified Nets
DoDI 5200.44
Protection of Mission Critical Functions
to Achieve TSN
DoDI 5200.44
Protection of Mission Critical Functions
to Achieve TSN
DoDI 5200.44
Protection of Mission Critical Functions
to Achieve TSN
DoDM 5105.21V1, SCI Admin Security
Manual: Info and Info Sys Security
DoDM 5105.21V1, SCI Admin Security
Manual: Info and Info Sys Security
DoDD 8000.01
Management of the DOD Information
Enterprise
DoDD 8000.01
Management of the DOD Information
Enterprise
DoDD 8000.01
Management of the DOD Information
Enterprise
DoDM O-5205.13
DIB CS/IA Program Security
Classification Manual
DoDM O-5205.13
DIB CS/IA Program Security
Classification Manual
NISTIR 7298, R3, Glossary of Key
Information Security Terms
NISTIR 7298, R3, Glossary of Key
Information Security Terms
NIST SP 800-124, R1
Guidelines for Managing the Security of
Mobile Devices in the Enterprise
NIST SP 800-124, R1
Guidelines for Managing the Security of
Mobile Devices in the Enterprise
PPD 28, Signals Intelligence ActivitiesPPD 28, Signals Intelligence Activities
Develop the Workforce Develop the Workforce
PPD 21: Critical Infrastructure Security
and Resilience
PPD 21: Critical Infrastructure Security
and Resilience
PPD 21: Critical Infrastructure Security
and Resilience
EO 13800: Strengthening
Cybersecurity of Fed Nets and CI
EO 13800: Strengthening
Cybersecurity of Fed Nets and CI
EO 13800: Strengthening
Cybersecurity of Fed Nets and CI
CNSS
National Secret Fabric Architecture
Recommendations
CNSS
National Secret Fabric Architecture
Recommendations
NISTIR 7693
Specification for Asset Identification 1.1
NISTIR 7693
Specification for Asset Identification 1.1
NIST SP 800-171, R2
Protecting CUI in Nonfederal Systems
and Organizations
NIST SP 800-171, R2
Protecting CUI in Nonfederal Systems
and Organizations
DoDI 5200.01
DoD Information Security Program and
Protection of SCI
DoDI 5200.01
DoD Information Security Program and
Protection of SCI
DoDI 5200.01
DoD Information Security Program and
Protection of SCI
PPD 41: United States Cyber Incident
Coordination
PPD 41: United States Cyber Incident
Coordination
PPD 41: United States Cyber Incident
Coordination
DoDI 8310.01
Information Technology Standards
in the DoD
DoDI 8310.01
Information Technology Standards
in the DoD
DoDI 8310.01
Information Technology Standards
in the DoD
CJCSM 6510.02
IA Vulnerability Mgt Program
CJCSM 6510.02
IA Vulnerability Mgt Program
NIST SP 800-88, R1,Guidelines for
Media Sanitization
NIST SP 800-88, R1,Guidelines for
Media Sanitization
DTM 17-007, Ch. 2, Defense Support
to Cyber Incident Response
DTM 17-007, Ch. 2, Defense Support
to Cyber Incident Response
DoDI S-5240.23
Counterintelligence (CI) Activities in
Cyberspace
DoDI S-5240.23
Counterintelligence (CI) Activities in
Cyberspace
CNSSP-28
Cybersecurity of Unmanned National
Security Systems
CNSSP-28
Cybersecurity of Unmanned National
Security Systems
DoDI 8551.01
Ports, Protocols, and Services
Management (PPSM)
DoDI 8551.01
Ports, Protocols, and Services
Management (PPSM)
DoDI 8551.01
Ports, Protocols, and Services
Management (PPSM)
Joint Special Access Program (SAP)
Implementation Guide (JSIG)
Joint Special Access Program (SAP)
Implementation Guide (JSIG)
CNSSP-24
Policy on Assured Info Sharing (AIS)
for National Security Systems(NSS)
CNSSP-24
Policy on Assured Info Sharing (AIS)
for National Security Systems(NSS)
CNSSP-24
Policy on Assured Info Sharing (AIS)
for National Security Systems(NSS)
JFHQ-DODIN OrdersJFHQ-DODIN OrdersCYBERCOM OrdersCYBERCOM Orders
NIST SP 800-163, R1
Vetting the Security of
Mobile Applications
NIST SP 800-163, R1
Vetting the Security of
Mobile Applications
DoD Information Technology
Environment Strategic Plan
DoD Information Technology
Environment Strategic Plan
EO 13873: Securing the Information
and Communications Technology and
Services Supply Chain
EO 13873: Securing the Information
and Communications Technology and
Services Supply Chain
ICD 503
IT Systems Security Risk Management
and C&A
ICD 503
IT Systems Security Risk Management
and C&A
ICD 503
IT Systems Security Risk Management
and C&A
DoD 5220.22-M, Ch. 2
National Industrial Security Program
Operating Manual (NISPOM)
DoD 5220.22-M, Ch. 2
National Industrial Security Program
Operating Manual (NISPOM)
CNSSD-506
National Directive to Implement PKI on
Secret Networks
CNSSD-506
National Directive to Implement PKI on
Secret Networks
NIST SP 800-101, R1
Guidelines on Mobile Device Forensics
NIST SP 800-101, R1
Guidelines on Mobile Device Forensics
CNSSD-520
Use of Mobile Devices to Process Natl
Sec.Info Outside Secure Spaces
CNSSD-520
Use of Mobile Devices to Process Natl
Sec.Info Outside Secure Spaces
UFC 4-010-06,
Cybersecurity of Facility-Related
Control Systems
UFC 4-010-06,
Cybersecurity of Facility-Related
Control Systems
NIST SP 800-82, R2
Guide to Industrial Control Systems
(ICS) Security
NIST SP 800-82, R2
Guide to Industrial Control Systems
(ICS) Security
NIST SP 800-34, R1
Contingency Planning Guide for
Federal Information Systems
NIST SP 800-34, R1
Contingency Planning Guide for
Federal Information Systems
DoD 8570.01-M
Information Assurance Workforce
Improvement Program
DoD 8570.01-M
Information Assurance Workforce
Improvement Program
DoD 8570.01-M
Information Assurance Workforce
Improvement Program
DoDI 8520.02
Public Key Infrastructure (PKI) and
Public Key (PK) Enabling
DoDI 8520.02
Public Key Infrastructure (PKI) and
Public Key (PK) Enabling
DoDI 8520.02
Public Key Infrastructure (PKI) and
Public Key (PK) Enabling
NIST SP 800-63 series
Digital Identity Guidelines
NIST SP 800-63 series
Digital Identity Guidelines
NIST SP 800-125A, R1, Security
Recommendations for Hypervisor
Platforms
NIST SP 800-125A, R1, Security
Recommendations for Hypervisor
Platforms
EO 13636: Improving Critical
Infrastructure Cybersecurity
EO 13636: Improving Critical
Infrastructure Cybersecurity
Cybersecurity-Related Policies and Issuances
Developed by the DoD Deputy CIO for Cybersecurity
Last Updated: December 13, 2022
Send questions/suggestions to contact@csiac.org
Cybersecurity-Related Policies and Issuances
Developed by the DoD Deputy CIO for Cybersecurity
Last Updated: December 13, 2022
Send questions/suggestions to contact@csiac.org
CNSSD-507
National Directive for ICAM
Capabilities...
CNSSD-507
National Directive for ICAM
Capabilities...
DoDI 8531.01, DoD Vulnerability
Management
DoDI 8531.01, DoD Vulnerability
Management
DoDI 8531.01, DoD Vulnerability
Management
NIST SP 800-181 R1
Workforce Framework for
Cybersecurity
NIST SP 800-181 R1
Workforce Framework for
Cybersecurity
DoDI 5205.83
DoD Insider Threat and Management
and Analysis Center
DoDI 5205.83
DoD Insider Threat and Management
and Analysis Center
DoDI 5205.83
DoD Insider Threat and Management
and Analysis Center
DoDM 5205.02
DoD Operations Security (OPSEC)
Program Manual
DoDM 5205.02
DoD Operations Security (OPSEC)
Program Manual
DoDI 5000.87
Operation of the Software Acquisition
Pathway
DoDI 5000.87
Operation of the Software Acquisition
Pathway
DoDI 5000.87
Operation of the Software Acquisition
Pathway
DoDD O-5100.19 (CAC reqd)
Critical Information Communications
(CRITCOM) System
DoDD O-5100.19 (CAC reqd)
Critical Information Communications
(CRITCOM) System
DoDD O-5100.19 (CAC reqd)
Critical Information Communications
(CRITCOM) System
DoDM 3305.09
Cryptologic Accreditation and
Certification
DoDM 3305.09
Cryptologic Accreditation and
Certification
NIST SP 1800-16
Securing Web Transactions: TLS
Server Certificate Management
NIST SP 1800-16
Securing Web Transactions: TLS
Server Certificate Management
NIST SP 800-207
Zero Trust Architecture
NIST SP 800-207
Zero Trust Architecture
NIST SP 800-210
General Access Control Guidance for
Cloud Systems
NIST SP 800-210
General Access Control Guidance for
Cloud Systems
NIST SP 800-209
Security Guidelines for Storage
Infrastructure
NIST SP 800-209
Security Guidelines for Storage
Infrastructure
NIST SP 800-209
Security Guidelines for Storage
Infrastructure
2019 National Intelligence Strategy 2019 National Intelligence Strategy 2019 National Intelligence Strategy
DoD
Artificial Intelligence Strategy
(unclass summary)
DoD
Artificial Intelligence Strategy
(unclass summary)
Cybersecurity Maturity Model
Certification (CMMC)
Cybersecurity Maturity Model
Certification (CMMC)
DoD Information Sharing Strategy DoD Information Sharing Strategy
United States Intelligence
Community Information Sharing
Strategy
United States Intelligence
Community Information Sharing
Strategy
United States Intelligence
Community Information Sharing
Strategy
DoDI 5000.83
Technology & Program Protection to
Maintain Technological Advantage
DoDI 5000.83
Technology & Program Protection to
Maintain Technological Advantage
NIST SP 1800-26
Data Integrity: Detecting & Responding
to Ransomware
NIST SP 1800-26
Data Integrity: Detecting & Responding
to Ransomware
NIST SP 800-172A
Enhanced Security Requirements for
Protecting CUI
NIST SP 800-172A
Enhanced Security Requirements for
Protecting CUI
MOA Between DoD and DHS
(Jan. 19, 2017)
MOA Between DoD and DHS
(Jan. 19, 2017)
DTM 20-004 Enabling Cyberspace
Accountability of DoD Components and
Information Systems
DTM 20-004 Enabling Cyberspace
Accountability of DoD Components and
Information Systems
DoDI 5000.90, Cybersecurity for
Acquisition Decision Authorities and
Program Managers
DoDI 5000.90, Cybersecurity for
Acquisition Decision Authorities and
Program Managers
NIST SP 1800-25 Data Integrity:
Identifying and Protecting Assets
Against Ransomware
NIST SP 1800-25 Data Integrity:
Identifying and Protecting Assets
Against Ransomware
EO 14028: Improving the Nations
Cybersecurity
EO 14028: Improving the Nations
Cybersecurity
DoDD 5101.21E
Unified Platform and Joint
Cyber Command and Control (JCC2)
DoDD 5101.21E
Unified Platform and Joint
Cyber Command and Control (JCC2)
CNSSP-10
Natl Policy Gov. Use of Approved Sec.
Containers in Info Security Applications
CNSSP-10
Natl Policy Gov. Use of Approved Sec.
Containers in Info Security Applications
CNSSD-504 Protecting National
Security Systems from Insider Threat
CNSSD-504 Protecting National
Security Systems from Insider Threat
CNSSD-505
Supply Chain Risk Management
CNSSD-505
Supply Chain Risk Management
CNSSD-520
The Use of Mobile Devices to Process
National Security Information Outside...
CNSSD-520
The Use of Mobile Devices to Process
National Security Information Outside...
CNSSI-1011
Implementing Host-Based Security
Capabilities on NSS
CNSSI-1011
Implementing Host-Based Security
Capabilities on NSS
CNSSI-1013
Network Intrusion Detection Sys &
Intrusion Prevention Sys (IDS/IPS)
CNSSI-1013
Network Intrusion Detection Sys &
Intrusion Prevention Sys (IDS/IPS)
DoDI 8140.02 Identification, Tracking,
And Reporting of Cyberspace
Workforce Requirements
DoDI 8140.02 Identification, Tracking,
And Reporting of Cyberspace
Workforce Requirements
NIST SP 800-213
IoT Device Cybersecurity Guidance for
the Federal Government
NIST SP 800-213
IoT Device Cybersecurity Guidance for
the Federal Government
FIPS 201-3
Personal Identity Verification (PIV) of
Federal Employees and Contractors
FIPS 201-3
Personal Identity Verification (PIV) of
Federal Employees and Contractors
CNSSP-200
National Policy on Controlled Access
Protection
CNSSP-200
National Policy on Controlled Access
Protection
CNSSD-600 Communications Security
Monitoring
CNSSD-600 Communications Security
Monitoring
CNSSP-32 Cloud Security for National
Security Systems
CNSSP-32 Cloud Security for National
Security Systems
DoDD 5000.01
Defense Acquisition Framework
DoDD 5000.01
Defense Acquisition Framework
DoDD 5000.01
Defense Acquisition Framework
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭