Federal Information Systems

Review the security controls in each system when significant modifications are made to the system, but at least every three years.

This document represents the Security Assessment Report (SAR) for HBWC as required by NIH for security authorization. This SAR contains the results of the comprehensive security test and evaluation of HBWC. This assessment report, and the results documented herein, supports program goals, efforts, and activities necessary to achieve compliance with organizational security requirements. The SAR […]

Develop standard operating procedures based on what the team identifies as the most critical to least critical to continue business operations.

To help ease the concerns of the CISO and other executive officials tied into cyber operations, the chief technology officer (CTO) is asking for processes and procedures regarding exposed systems. Use the attached security baseline as a reference, as it is a necessary part of determining mission priorities and identifying critical systems in the event […]

Scroll to top