Office of the Chief Information Officer

United States Department of Agriculture

How We Serve Our Customers

 

Protecting all technology assets and information, the Security Sensor Array shields the USDA network keeping unwanted intruders from infecting the environment, gaining access to intellectual property, or releasing information to cyber criminals.


Incident Handling Division (IHD) manages the central repository for tracking, processing, reporting, validating, and closing all security incidents.

Oversight and Compliance Division (OCD) is leading the shift to a continuous assessment and authorization model. All systems entering service in the USDA must undergo a complete assessment and authorization (A&A) via the risk management framework (RMF) process described in NIST SP 800-37 Revision 1. This effort requires resources and presents a snapshot of the risk the system presents to the department at that point in time. Once through the initial RMF process during the first year of operation, the system can then enter the newly adopted continuous A&A process being implemented at USDA.

Security Engineering and Operations Division (SEOD) focuses on systems engineering support and architecture of security related products and interfaces; installation of security software; and security engineering solutions for the Enterprise as well as individual agency, offices, and mission-critical applications and systems.

Monitoring and Analysis Division (MAD) manages the on-going operation of the USDA enterprise-wide comprehensive monitoring, data analysis, and situational awareness capability.

Security Integration Division (SID) assumes the overall responsibility to ensure the selection and implementation of appropriate security controls and to demonstrate the effectiveness of satisfying their stated security requirements.  Provides outreach and reporting activities.

Program Management Office (PMO) provides mission support services and oversight of the ASOC security initiatives to manage the risks that may affect USDA’s information technology security services capabilities.