Banner - CIO/HPCC IT Security Office
Search CIO Sites

NOAA CIO Homepage
Home - IT Security Office

 

Graphic Divider  for IT Security Office  Section

Bullet NOAA IT Security Conference 2004
Bullet Mission Statement
Bullet Staff
Bullet IT Security Officers
Graphic Divider for IT Security Program Section
Bullet Policies, Regulations & Laws
Bullet Action Items & Due Dates
Bullet IT Security Committee
Bullet Antivirus Software
Bullet Personal Firewall Software
Graphic Divider for Computer Incident Response Team Section
Bullet N-CIRT
Bullet Watches and Warnings
Bullet Form 47-43
Bullet Warning Banners 
Bullet Web Resources
Bullet N-CIRT TechNotes
Graphic Divider for Training, Education and Awareness Section
Bullet Visible Statement Screensaver Software
Image Denoting External Link 2004 IT Security Awareness Course
Image Denoting External Link SANS On-line Training Courses, Certification and Conferences
Bullet Unix Effective Security Measures Course
Bullet Frontline Bulletins
Bullet Other TEA
   

 

Policies, Regulations and Laws

 

Image Denoting External Link = External Link
Bullet Denoting Internal Link = Link to document on this server
PDF File = Needs Acrobat Reader - click here

 

NOAA Policies

Image Denoting External Link NAO 212-13, Information Technology Security Policy
BulletNOAA 212-1300, (Final) IT Security Manual (5 parts) ( HTML | PDF File )

Bullet Personal Digital Assistant (PDA) Policy
Bullet NOAA Enterprise Messaging Guidelines
Image Denoting External Link NOAA Web Policies
Bullet
NAO 212-12a, Telecommunications Standards: NOAA Interoperability Profile
Bullet NAO 212-12b, Telecommunications Standards: Names, Addresses, and Gateways in Electronic Mail Systems
BulletNAO 212-14, Use of the Internet
Bullet
NAO 212-14(1), Internet Services Resource Management: Service Aquisition, Security and Name Services
BulletComputer User's Guide For Protecting Information Resources ( PDF File | HTML )
BulletNOAA's IT Security Incident Reporting Form #47-43

BulletSpam E-Mail Guidelines
BulletWarning Banner Requirements

Federal Links

Image Denoting External Link Department of Homeland Security
Image Denoting External Link GAO Special Publications and Software
Image Denoting External Link Chief Information Officers Council
Image Denoting External Link NIST Computer Security Resource Center Special Publications

 

 

Regulations
Office of Management and Budget Regulations

Image Denoting External Link OMB Memorandum M-04-04, dated December 16, 2003, and entitled "E-Authentication for Federal Agencies,t." This Guidance document addresses those Federal government services accomplished using the Internet online, instead of on paper. To make sure that online government services are secure and protect privacy, some type of identify verification or authentication is needed. This guidance directs agencies to conduct "e-authentication risk assessments" on electronic transactions to ensure that there is a consistent approach across government. PDF Format
Image Denoting External Link OMB Memorandum M-01-24 dated June 22, 2001 and entitled "Reporting Instructions for the Government Information Security Reform Act." These instructions will assist agencies in reporting the results of their annual system and program reviews by agency CIOs and program officials and independent evaluations by the agency Inspectors General. PDF Format
Image Denoting External Link Memorandum from the Director of OMB, "Guidance on Implementing the Government Information Security Reform Act". PDF Format.
Image Denoting External Link Circular No. A-130, Management of Federal Information Resources
BulletAppendix III to Circular A-130, "Security of Federal Automated Information Resources"
BulletSynopsis of the A-130, Appendix III
Image Denoting External Link Other OMB Circulars

 

Department of Commerce Policies

Image Denoting External Link DOC IT Security Program Policy
Image Denoting External Link DOC IT Management Handbook (Under Construction)
Image Denoting External Link Policy on Password Management - Attachment 1
Image Denoting External Link Managing Your Passwords - Attachment 2
Image Denoting External Link Memorandum: DOC Policy on Password Management
Image Denoting External Link Scott Gudes memo on Issuance of Internet Use Policy
Image Denoting External Link Web Standards, Best Practices, and Policies
Image Denoting External Link Peer-to-Peer (P2P) Security Policy
BulletDOC Broadcast E-mail Policy
Image Denoting External Link DOC Internet Use Policy
BulletDesignated Agency Representatives for Telecommunications Services
BulletDOC Telecommunications Management
BulletPolicy on Use of Cookies on Commerce Web Sites PDF File
BulletPolicy on Use of Cookies on Commerce Web Sites (Wordperfect)

BulletDOC Memo on Final Remote Access Security Policy
BulletDOC Remote Access Security Policy
BulletDOC Procurement Memo 2003-09 PDF File- Contract Requirements for IT Security
    BulletSecurity Clauses - CAR1352.239-73 PDF File & CAR1352.239-74 PDF File

 

Executive Orders

Image Denoting External Link Summary of PDD 62 and PDD 63
Image Denoting External Link Presidential Decision Directive 63 (PDD-63) - Protecting America's Critical Infrastructures, dated May 1998
Image Denoting External Link Executive Order 13231 February 28, 2003, Critical Infrastructure Protection in the Information Age
Image Denoting External Link Executive Order 13130 of July 14, 1999 - National Infrastructure Assurance Council
Image Denoting External Link Executive Order 13111 of January 12, 1999 - Technology uses to improve training opportunities for employees
Image Denoting External Link Executive Order 13103 of September 30, 1998 - Computer Software Piracy
Image Denoting External Link Executive Order 13011 of July 16, 1996 - Chief Information Officers Council
Image Denoting External Link Executive Order 13010 of July 15, 1996 - Critical Information Protection 
Image Denoting External Link Executive Order Search from the National Archives and Records Administration

OTHER Agency policies

BulletNational Information Systems Security (INFOSEC) Glossary

Image Denoting External Link NIST Special Publication 800-18 Guide for Developing Security Plans for Information Technology Systems, December 1998

Image Denoting External Link National Security Telecommunications and Information Systems Security Instruction (NSTISSI) No. 1000, National Information Assurance Certification and Accreditation Process (NIACAP) - establishes the minimum national standards for certifying and accrediting national security systems. This process provides a standard set of activities, general tasks, and a management structure to certify and accredit systems that will maintain the Information Assuranca (IA) and security posture of a system or site.

 


Publication of the IT Security Office, Office of the CIO/HPCC, National Oceanic & Atmospheric Administration (NOAA), U.S. Department of Commerce

Privacy Statement | Disclaimer | Contact Info | N-CIRT PGP Public Key

Last Update: October 8, 2004 1:56 PM