Click here
      Home    DAG Tutorial    Search    Available Downloads     Feedback
 
The DAG does not reflect the changes in the DoDI5000.02. Work is in progress to update the content and will be completed as soon as possible.
 
.

7.5.6. Program Manager (PM) Responsibilities

Topic
Previous Page Next Page

Previous and Next Page arrows

DEFENSE ACQUISITION GUIDEBOOK
Chapter 7 - Acquiring Information Technology

7.5.6. Program Manager (PM) Responsibilities

7.5.6.1. Platform Information Technology (IT) Systems

7.5.6.2. Automated Information Systems (AIS)

7.5.6.3. Outsourced Information Technology (IT)-based Processes

7.5.6.4. Privacy Impact Assessment (PIA)

7.5.6.1. Platform Information Technology (IT) Systems

PMs for acquisitions of platforms with internal IT (including platforms such as weapons systems, sensors, medical technologies, or utility distribution systems) remain ultimately responsible for the platform's overall IA protection. If the Platform IT has an interconnection to the GIG, in accordance with DoD Instruction 8500.2, the PM must identify all assurance measures needed to ensure both the protection of the interconnecting GIG enclave, and the protection of the platform from connection risks (such as unauthorized access), that may be introduced from the enclave. However, connecting enclaves have the primary responsibility for extending needed IA services (such as Identification and Authentication) to ensure an assured interconnection for both the enclave and the interconnecting platform. These IA requirements should be addressed as early in the acquisition process as possible.

PMs for acquisitions of platforms with IT that does not interconnect with the GIG retain the responsibility to incorporate all IA protective measures necessary to support the platform's combat or support mission functions. The definition of the GIG recognizes "non-GIG IT that is stand-alone, self-contained or embedded IT that is not or will not be connected to the enterprise network." Non-GIG IT may include "closed loop" networks that are dedicated to activities like weapons guidance and control, exercise, configuration control or remote administration of a specific platform or collection of platforms. The primary test between whether a network is part of the GIG or is non-GIG IT is whether it provides enterprise or common network services to any legitimate GIG entity. In any case, PMs for systems that are not connected to GIG networks should consider the IA program provisions in DoD Directive 8500.01E and DoD Instruction 8500.2, and should employ those IA controls appropriate to their system.

7.5.6.2. Automated Information Systems (AIS)

PMs for acquisitions of AIS applications are responsible for coordinating with enclaves that will host (run) the applications early in the acquisition process to address operational security risks which the system may impose upon the enclave, as well as identifying all system security needs that may be more easily addressed by enclave services than by system enhancement. The baseline IA Controls serve as a common framework to facilitate this process. The Designated Accrediting Authority for the enclave receiving an AIS application is responsible for incorporating the IA considerations for the AIS application into the enclave's IA plan. The burden for ensuring that an AIS application has adequate assurance is a shared responsibility of both the AIS application PM and the Designated Accrediting Authority for the hosting enclave; however, the responsibility for initiation of this negotiation process lies clearly with the PM. PMs should, to the extent possible, draw upon the common IA capabilities that can be provided by the hosting enclave.

7.5.6.3. Outsourced Information Technology (IT)-based Processes

PMs for acquisitions of Outsourced IT-based Processes must comply with the IA requirements in the 8500 policy series. They are responsible for delivering outsourced business processes supported by private sector information systems, outsourced information technologies, or outsourced information services that present specific and unique challenges for the protection of the GIG. The PM for an Outsourced IT-based process should carefully define and assess the functions to be performed and identify the technical and procedural security requirements that must be satisfied to protect DoD information in the service provider's operating environment and interconnected DoD information systems.

A unique type of Outsourced IT-based Process is "Managed Enterprise Services." These are defined as "Private sector information systems, outsourced information technologies, or outsourced information services managed, maintained and administered as a performance-based service (whether delivered from vendor facilities or within DoD facilities) that delivers a DoD-wide service included within the Enterprise Information Environment Mission Area (EIEMA), as an outsourced IT-based process." Managed Enterprise Services envision two broad categories of implementation scenarios:

  • In one scenario, the service is hosted at vendor facilities, and accordingly, DoD does not have significant control of the operations of the Managed Enterprise Service.
  • In the second scenario, the Managed Enterprise Service is hosted in a DoD facility, but operations are provided by one or more vendors. Managed services that are DoD Component-wide or that belong to the warfighter or business mission areas are outside the scope of Managed Enterprise Services. If your acquisition includes Managed Enterprise Services, see DoD CIO Memorandum "Certification and Accreditation Requirements for DoD-wide Managed Enterprise Services Procurements," dated June 22, 2006.

7.5.6.4. Privacy Impact Assessment (PIA)

A PIA is an analysis of whether personally identifiable information (PII) when collected in electronic form is stored, shared, and managed in a manner that protects the privacy of individuals. Section 208 of Public Law 107-347 requires that a PIA be conducted prior to developing or purchasing any DoD information system that will collect, maintain, use, or disseminate PII about members of the public.  The DoD Instruction 5400.16 provides procedures for completing and approving PIAs and expanded the requirement to include federal personnel, DoD contractors and, in some cases, foreign nationals.

Previous and Next Page arrows

List of All Contributions at This Location

No items found.

Popular Tags

Browse

https://acc.dau.mil/UI/img/bo/minus.gifWelcome to the Defense Acquisition...
https://acc.dau.mil/UI/img/bo/plus.gifForeword
https://acc.dau.mil/UI/img/bo/minus.gifChapter 1 -- Department of Defense...
https://acc.dau.mil/UI/img/bo/plus.gif1.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif1.1. Integration of the DoD Decision...
https://acc.dau.mil/UI/img/bo/plus.gif1.2. Planning Programming Budgeting and...
https://acc.dau.mil/UI/img/bo/plus.gif1.3. Joint Capabilities Integration and...
https://acc.dau.mil/UI/img/bo/plus.gif1.4. Defense Acquisition System
https://acc.dau.mil/UI/img/bo/plus.gifChapter 2 -- Program Strategies
https://acc.dau.mil/UI/img/bo/minus.gifChapter 3 -- Affordability and...
https://acc.dau.mil/UI/img/bo/plus.gif3.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif3.1. Life-Cycle Costs/Total Ownership...
https://acc.dau.mil/UI/img/bo/plus.gif3.2. Affordability
https://acc.dau.mil/UI/img/bo/plus.gif3.3. Analysis of Alternatives
https://acc.dau.mil/UI/img/bo/plus.gif3.4. Cost Estimation for Major Defense...
https://acc.dau.mil/UI/img/bo/plus.gif3.5. Manpower Estimates
https://acc.dau.mil/UI/img/bo/plus.gif3.6. Major Automated Information Systems...
https://acc.dau.mil/UI/img/bo/plus.gif3.7. Principles for Life-Cycle Cost...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 4 -- Systems Engineering
https://acc.dau.mil/UI/img/bo/plus.gif4.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif4.1. Introduction
https://acc.dau.mil/UI/img/bo/plus.gif4.2. Systems Engineering Activities in...
https://acc.dau.mil/UI/img/bo/plus.gif4.3. Systems Engineering Processes
https://acc.dau.mil/UI/img/bo/minus.gifChapter 5 -- Life-Cycle Logistics
https://acc.dau.mil/UI/img/bo/plus.gif5.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif5.1. Life-Cycle Sustainment in the...
https://acc.dau.mil/UI/img/bo/plus.gif5.2. Applying Systems Engineering to...
https://acc.dau.mil/UI/img/bo/plus.gif5.3. Supportability Design...
https://acc.dau.mil/UI/img/bo/plus.gif5.4. Sustainment in the Life-Cycle...
https://acc.dau.mil/UI/img/bo/plus.gif5.5. References
https://acc.dau.mil/UI/img/bo/minus.gifChapter 6 -- Human Systems Integration...
https://acc.dau.mil/UI/img/bo/plus.gif6.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif6.1. Total System Approach
https://acc.dau.mil/UI/img/bo/plus.gif6.2 HSI - Integration Focus
https://acc.dau.mil/UI/img/bo/plus.gif6.3. Human Systems Integration Domains
https://acc.dau.mil/UI/img/bo/plus.gif6.4. Human Systems Integration (HSI)...
https://acc.dau.mil/UI/img/bo/plus.gif6.5. Manpower Estimates
https://acc.dau.mil/UI/img/bo/plus.gif6.6. Additional References
https://acc.dau.mil/UI/img/bo/minus.gifChapter 7 -- Acquiring Information...
https://acc.dau.mil/UI/img/bo/plus.gif7.0. Overview
https://acc.dau.mil/UI/img/bo/minus.gif7.1. Introduction
https://acc.dau.mil/UI/img/bo/plus.gif7.2. DoD Information Enterprise
https://acc.dau.mil/UI/img/bo/minus.gif7.3. Interoperability and Supportability...
https://acc.dau.mil/UI/img/bo/plus.gif7.3.2. Mandatory Policies
https://acc.dau.mil/UI/img/bo/minus.gif7.3.3. Interoperability and...
https://acc.dau.mil/UI/img/bo/plus.gif7.3.4. Net-Ready Key Performance...
https://acc.dau.mil/UI/img/bo/plus.gif7.3.5. Net-Ready Key Performance...
https://acc.dau.mil/UI/img/bo/minus.gif7.3.6. Information Support Plan (ISP)...
https://acc.dau.mil/UI/img/bo/plus.gif7.3.6.2. Information Support Plan (ISP)...
https://acc.dau.mil/UI/img/bo/plus.gif7.3.6.3. Estimated Information Support...
https://acc.dau.mil/UI/img/bo/plus.gif7.3.6.6. Points of Contacts
https://acc.dau.mil/UI/img/bo/plus.gif7.3.6.7. Information Support Plan (ISP)...
https://acc.dau.mil/UI/img/bo/plus.gif7.3.6.8. Tailored Information Support...
https://acc.dau.mil/UI/img/bo/plus.gif7.3.6.9. Information Support Plan (ISP)...
https://acc.dau.mil/UI/img/bo/plus.gif7.4. Sharing Data, Information, and...
https://acc.dau.mil/UI/img/bo/minus.gif7.5. Information Assurance (IA)
https://acc.dau.mil/UI/img/bo/plus.gif7.5.3. Information Assurance (IA)...
https://acc.dau.mil/UI/img/bo/plus.gif7.5.4. Estimated Information Assurance...
https://acc.dau.mil/UI/img/bo/plus.gif7.5.5. Integrating Information Assurance...
https://acc.dau.mil/UI/img/bo/minus.gif7.5.6. Program Manager (PM)...
https://acc.dau.mil/UI/img/bo/plus.gif7.5.7. Information Assurance (IA)...
https://acc.dau.mil/UI/img/bo/plus.gif7.5.8. Information Assurance (IA)...
https://acc.dau.mil/UI/img/bo/plus.gif7.5.10. Information Assurance (IA)...
https://acc.dau.mil/UI/img/bo/plus.gif7.5.12. Implementing Information...
https://acc.dau.mil/UI/img/bo/plus.gif7.5.13. Information Assurance (IA)...
https://acc.dau.mil/UI/img/bo/plus.gif7.6. Electromagnetic Spectrum
https://acc.dau.mil/UI/img/bo/plus.gif7.7. Accessibility of Electronic and...
https://acc.dau.mil/UI/img/bo/minus.gif7.8. The Clinger-Cohen Act (CCA) --...
https://acc.dau.mil/UI/img/bo/plus.gif7.8.4. Title 40/Clinger-Cohen Act (CCA)...
https://acc.dau.mil/UI/img/bo/plus.gif7.8.5. Other Title 40/Clinger-Cohen Act...
https://acc.dau.mil/UI/img/bo/plus.gif7.8.6. Title 40 Subtitle...
https://acc.dau.mil/UI/img/bo/plus.gif7.8.7. Procedure for Risk-Based...
https://acc.dau.mil/UI/img/bo/minus.gif7.9. Post-Implementation Review (PIR)
https://acc.dau.mil/UI/img/bo/plus.gif7.10. Commercial Off-the-Shelf (COTS)...
https://acc.dau.mil/UI/img/bo/plus.gif7.11. Space Mission Architectures
https://acc.dau.mil/UI/img/bo/minus.gifChapter 8 -- Intelligence Analysis...
https://acc.dau.mil/UI/img/bo/plus.gif8.0. Introduction
https://acc.dau.mil/UI/img/bo/plus.gif8.1. Threat Intelligence Support
https://acc.dau.mil/UI/img/bo/plus.gif8.2. Signature and other Intelligence...
https://acc.dau.mil/UI/img/bo/plus.gif8.3. Support to the Intelligence...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 9 -- Test and Evaluation (T&E)
https://acc.dau.mil/UI/img/bo/plus.gif9.0 Overview
https://acc.dau.mil/UI/img/bo/plus.gif9.1 OSD T&E Organization
https://acc.dau.mil/UI/img/bo/plus.gif9.2 Service-Level T&E Management
https://acc.dau.mil/UI/img/bo/plus.gif9.3 Test and Evaluation
https://acc.dau.mil/UI/img/bo/plus.gif9.4 Integrated Test and Evaluation
https://acc.dau.mil/UI/img/bo/plus.gif9.5 Test and Evaluation Planning
https://acc.dau.mil/UI/img/bo/plus.gif9.6 T&E Reporting
https://acc.dau.mil/UI/img/bo/plus.gif9.7 Special Topics
https://acc.dau.mil/UI/img/bo/plus.gif9.8. Best Practices
https://acc.dau.mil/UI/img/bo/plus.gif9.9. Prioritizing Use of Government Test...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 10 -- Decisions Assessments and...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 11 -- Program Management...
https://acc.dau.mil/UI/img/bo/plus.gif11.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif11.1. Joint Programs
https://acc.dau.mil/UI/img/bo/plus.gif11.2. International Programs
https://acc.dau.mil/UI/img/bo/plus.gif11.3. Integrated Program Management
https://acc.dau.mil/UI/img/bo/plus.gif11.4. Knowledge-Based Acquisition
https://acc.dau.mil/UI/img/bo/plus.gif11.5. Technical Representatives at...
https://acc.dau.mil/UI/img/bo/plus.gif11.6. Contractor Councils
https://acc.dau.mil/UI/img/bo/plus.gif11.7 Property
https://acc.dau.mil/UI/img/bo/plus.gif11.8. Modeling and Simulation (M&S)...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 12 - Defense Business System...
https://acc.dau.mil/UI/img/bo/plus.gif12.0 Overview
https://acc.dau.mil/UI/img/bo/plus.gif12.1 Business Capability Definition...
https://acc.dau.mil/UI/img/bo/plus.gif12.2 Investment Management (IM) Phase
https://acc.dau.mil/UI/img/bo/plus.gif12.3 Execution
https://acc.dau.mil/UI/img/bo/plus.gif12.4 DBS-specific Criteria
https://acc.dau.mil/UI/img/bo/plus.gif12.5 Tools and Methods
https://acc.dau.mil/UI/img/bo/plus.gifChapter 13 -- Program Protection
https://acc.dau.mil/UI/img/bo/minus.gifChapter 14 -- Acquisition of Services
https://acc.dau.mil/UI/img/bo/plus.gif14.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif14.1. Introduction to the Acquisition of...
https://acc.dau.mil/UI/img/bo/plus.gif14.2. The Planning Phase
https://acc.dau.mil/UI/img/bo/plus.gif14.3. The Development Phase
https://acc.dau.mil/UI/img/bo/plus.gif14.4. The Execution Phase
https://acc.dau.mil/UI/img/bo/plus.gifAppendix A -- REQUIREMENTS ROADMAP...
https://acc.dau.mil/UI/img/bo/plus.gifAppendix B -- SERVICE ACQUISITION...
https://acc.dau.mil/UI/img/bo/plus.gifAppendix C -- SERVICE ACQUISITION MALL...
https://acc.dau.mil/UI/img/bo/plus.gifAppendix D -- MARKET RESEARCH RESOURCES
https://acc.dau.mil/UI/img/bo/plus.gifAppendix E -- GLOSSARY
https://acc.dau.mil/UI/img/bo/minus.gifDoD Directive 5000.01
https://acc.dau.mil/UI/img/bo/plus.gifENCLOSURE 1 ADDITIONAL POLICY
https://acc.dau.mil/UI/img/bo/minus.gifDoD Instruction 5000.02
https://acc.dau.mil/UI/img/bo/plus.gifTABLE OF CONTENTS
https://acc.dau.mil/UI/img/bo/plus.gifEnclosure 1 -- References
https://acc.dau.mil/UI/img/bo/plus.gifEnclosure 2 -- Procedures
https://acc.dau.mil/UI/img/bo/plus.gifEnclosure 3 -- Acquisition Category...
https://acc.dau.mil/UI/img/bo/plus.gifEnclosure 4 -- Statutory and Regulatory...
https://acc.dau.mil/UI/img/bo/plus.gifEnclosure 5 -- IT Considerations
https://acc.dau.mil/UI/img/bo/plus.gifEnclosure 6 -- Integrated T&E
https://acc.dau.mil/UI/img/bo/plus.gifEnclosure 7 -- Resource Estimation
https://acc.dau.mil/UI/img/bo/plus.gifEnclosure 8 -- Human Systems Integration...
https://acc.dau.mil/UI/img/bo/plus.gifEnclosure 9 -- Acquisition of Services
https://acc.dau.mil/UI/img/bo/plus.gifEnclosure 10 -- Program Management
https://acc.dau.mil/UI/img/bo/plus.gifEnclosure 11 -- Management of Defense...
https://acc.dau.mil/UI/img/bo/plus.gifEnclosure 12 -- Systems Engineering
https://acc.dau.mil/UI/img/bo/plus.gifRecent Policy and Guidance
https://acc.dau.mil/UI/img/bo/plus.gifCurrent JCIDS Manual and CJCSI 3170.01 I
https://acc.dau.mil/UI/img/bo/minus.gifDefense Acquisition Guidebook Key...
ACC Practice Center Version 3.2
  • Application Build 3.2.9
  • Database Version 3.2.9