DATA ITEM DESCRIPTION
Title: JOINT SPECIAL ACCESS PROGRAM IMPLEMENTATION GUIDE (JSIG) SYSTEM
AUTHORIZATION PACKAGE (SAP)
Office of Primary Responsibility: 20 (AFRL/RYS)
Use/Relationship:
The JSIG SAP is used to identify, control, and authorize a contractor’s
proposed stand-
alone computer systems and/or networks created and used during the
performance of this contract.
The contract Information System Security Officer (ISSO) or
Information System Security Manager (ISSM) must submit the SAP documentation for a
proposed system or network to the Authorizing Official (AO), Delegated Authorizing Official
(DAO), or the Program Security Officer (PSO).
The AO, DAO, or the PSO must provide
written approval of any new information system or network before processing can begin.
a. The SAP describes the methods to: (1) identify systems, security responsibilitie
s and
requirements; (2) define overall security standard practice guidance and procedures; (3)
identify potential problem areas and determine solutions; and (4) develop security awareness
inputs into the overall system security process.
b. This Data Item Description (DID) defines
the data required to obtain information systems
authorization in accordance with the JSIG. A copy of the JSIG can be obtained from the
government program office.
c. This DID contains the format and content preparation instructions
generated by the specific and discrete task requirements delineated in the contract.
Requirements:
1. Reference documents: The applicable issue of the documents cited herein, including their
approval dates and dates of any applicable amendments, notices, and revisions, shall be as
cited in the ASSIST at the time of the solicitation or contract.
a. Department of Defense (DoD) JSIG
b. DoD JSIG Template Handbook.
c. Government Program Office Guidance.
(Copies of these documents are available
from the Government Agency awarding the
contract.)
2. Format: The JSIG SAP Documentation shall be presented in Microsoft Word formats
outlined by the DoD JSIG, DoD JSIG Template Handbook and the Government Information
Assurance Officer (IAO). The ini
tially used format arrangement shall be used for all
subsequent submissions.
3. Content: A JSIG system/network authorization package typically consists of:
a. Authorization Package Cover Letter.
DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited.
1
Downloaded from http://www.everyspec.com