Defining the Financial Management Line of Business at the General Services Administration Report GS10T2 January 2006
The GSA Enterprise Data Model diagram
FMEA Information Model
The following documents provide additional relevant information, but require that a non-disclosure agreement be signed and submitted before they can be obtained:
GSA IT Security Policy
GSA CIO Instructional Letter – Safeguarding Personally Identifiable Information (CIO IL 06-02)
GSA Homeland Security Presidential Directive – 12, Personal Identity Verification and Credentialing, Standard Operating Procedure – Document Version 2.1
Password Generation and Protection (CIO IT Security 01-01)
Security Incident Handling Guide: (CIO IT Security 01-02) Rev. 5
Developing a Configuration Management Plan (CIO IT Security 01-05)
GSA Contingency Plan Testing (CIO-IT-Security 06-29) Rev 1
Access Control (CIO IT Security 01-07)
Auditing & Monitoring (CIO IT Security 01-08)
Termination Transfer Guide (CIO IT Security 03-23)
Managing Enterprise Risk (Security Categorization, Risk Assessment, & Certification and Accreditation) (CIO IT Security 06-30)
Media Sanitation Guide (CIO IT Security 06-32)
Web Application Security Guide: (CIO-IT Security-07-35) Rev. 1
IT Security Procedural Guide: Windows XP Professional Hardening (CIO-IT Security 03-23) Revision 6a
IT Security Procedural Guide: Oracle Database Hardening (CIO-IT Security 05-28)
Windows 2003 Server Hardening Guide Package (CIO IT Security 04-25) Revision 2
Windows 2000 Server Hardening Guide Package (CIO IT Security 02-16/17)
Microsoft IIS 5.0 Server Hardening Guide Package (CIO IT Security 02-18/19)
Sun Solaris Server Hardening Guide Package (CIO IT Security 02-20)
OCFO IBM AIX Hardening Procedure Guide
Center for Internet Security (CIS) Red Hat Linux Benchmark and Scoring Tool