Cyber Security

Management System: Safeguards, Security, and Emergency Management

Subject Area: Cyber Security

Point of Contact: WALTER DYKAS
Management System Owner: EARL HICKS
Secondary Management System Owner:     THOMAS GRADLE
JOHN MEDLOCK

SCMS Home Page | Revision History | Subject Area Definitions

Issue Date:  04/05/2011
SCMS Revision:  2.5

1.0 Introduction

The subject area describes how the Cyber Security Program protects the confidentiality, integrity and availability of U.S. Department of Energy (DOE) Information Systems and the data processed on those systems. The primary requirements for Office of Science (SC) Federal and Contractor Laboratory Facilities are defined by the Program Cyber Security Plan (PCSP). In addition to the PCSP, the implementation of Federally mandated certification and accreditation is addressed through facility Cyber Security Program Plans and System Security Plans. This included both unclassified and National Security Systems.

2.0 Contents

Procedures

Procedure Content

1. Maintaining the Office of Science (SC) Threat and Risk Statement
  • Obtain latest threat information from the Federal Intelligence Community.
  • Evaluate and assess the information.
  • Interpret and document the evaluation.
  • Disseminate the Threat and Risk Statement to SC Facilities.
  • Update and re-evaluate threat information and determine if updates to the Threat and Risk Assessment are needed.
2. Monitoring for Unclassified Systems
  • Develop and coordinate a continuous monitoring plan for site reviews with the Integrated Support Center (ISC).
  • Evaluate Plans of Action and Milestones (POA&Ms), SC metrics, status reporting, and self assessments for each facility and establish priorities.
  • Assign resources and schedule site reviews.
  • Perform site reviews to address program requirements and accreditation status.
  • Report the result of site reviews, update status of prior deficiencies, and establish POA&M actions to address identified gaps.
3. Monitoring for Classified Systems
  • Develop and coordinate a continuous monitoring plan for site reviews with the ISC.
  • Evaluate POA&Ms, SC metrics, status reporting, self assessments for each facility, and establish priorities.
  • Assign resources and schedule site reviews.
  • Perform site reviews to address program requirements and accreditation status.
  • Report the result of site reviews, update status of prior deficiencies, and establish POA&M actions to address identified gaps.
4. Identifying Cyber Security Requirements for Unclassified Systems
  • Identify Program requirements in the PCSP.
  • Follow the National Institute of Standards and Technology (NIST) Special Publication (SP) 800 series.
  • Adhere to Office of Management and Budget (OMB) guidance as applicable.
5. Identifying Cyber Security Requirements for Classified Systems
  • Identify Program requirements in the PCSP and the SC National Security Systems Manual.
  • Adhere to applicable Committee on National Security Systems (CNSS) requirements.
6. Performing Designated Approving Authority (DAA) Responsibilities
  • Identify Designated Approving Authority (DAA) responsibilities in the PCSP. This section deals with how the DAA carries out responsibilities not specified elsewhere.
7. Maintaining the Office of Science (SC) Program Cyber Security Plan (PCSP)
  • Identify changes in requirements.
  • Evaluate the impact of these changes on operations and how new requirements can be implemented at SC facilities.
  • Update the PCSP.

3.0 Exhibits/Forms

4.0 Related Information

5.0 Requirements

Document Title Requirement Decision Record
OMB Circular A-130

Management of Federal Information Resources

Completed

CNSSD-500

Information Assurance (IA) Education, Training, and Awareness

Completed

DOE M 200.1-1, Chapter 9 (restricted access)

Public Key Cryptography And Key Management (Unclassified)

Completed

DOE P 205.1

Departmental Cyber Security Management Policy

Completed

E.O. 13103

Computer Software Piracy

Completed

61 Federal Regulation 6428

Policies on Management of Federal Information Resources ([OMB] Circular no. A-130), dated 02-20-1996 (Final Action)

Completed

DOE-HQ Memo 06/25/2010

Office of Science (SC) Program Cyber Security Plan (PCSP)

Completed

NSD 42

National Policy for the Security of National Security Telecommunications and Information Systems

Completed

OMB M 04-26

Personal Use Policies and "File Sharing" Technology

Completed

OMB M-06-19

Reporting Incidents Involving Personally Identifiable Information and Incorporating the Cost for Security in Agency Information Technology Investments

Completed

P.L. 107-347, 116 Stat. 289

E-Government Act of 2002 - Federal Information Security Management Act (FISMA)

Completed

6.0 Definitions

Definitions.


This is the online OFFICIAL SCMS COPY of this file. Before using a printed copy, verify that it is the most current version by checking the Last Major Revision and Last Minor Revision dates (at the bottom of each document) on the SCMS Web site.

Send a question or comment to the SCMS Help Desk.
Disclaimer

Filename: /OrbitSearch/SubjArea/CS/CS_SA.cfm
Last Major SCMS Revision: 11/05/2009