National Oceanic and Atmospheric Administration, United States Department of Commerce

 

Policies, Regulations and Laws

 

 

Office of Management and Budget Regulations

Image Denoting External Link Circular No. A-130, Management of Federal Information Resources
BulletAppendix III to Circular A-130, "Security of Federal Automated Information Resources"
BulletSynopsis of the A-130, Appendix III
Image Denoting External Link Other OMB Circulars

 

Department of Commerce Policies

NOAA - Department of Commerce Intranet Proxy:
The Department of Commerce IT Security Policies are located on a non-NOAA network inaccessible from off NOAA sites. NOAA has implemented a web proxy to allow NOAA users access to Department intranet based documentation using NEMS authentication at:

Proxy Link to Department of Commerce IT Security Documentation

The proxy link will require you to accept a self-signed certificate for secure web access. The Certificate presented has the following attributes:

Issued By
Common Name (CN): access.portal.noaa.gov
Organization (O): NOAA.GOV
Organizational Unit (OU): Web Operation Center

Fingerprints
SHA1 Fingerprint:
83:38:43:AB:F2:E3:6E:EC:5E:25:A7:A5:DB:29:AB:0F:FB:75:DC:AC
MD5 Fingerprint: C8:AC:0C:C0:2D:28:27:9B:85:F9:B8:0C:63:5D:72:C0

Ensure the certificate attributes are appropriate prior to accepting the certificate for your session. The proxy server will require your NEMS authentication, your NOAA e-mail address without the @noaa.gov part and e-mail password, to proceed to the linked document.


Image Denoting External Link DOC IT Security Documentation
Image Denoting External Link 2009 DOC IT Security Program Policy - FINAL PDF File
Image Denoting External Link DOC IT Management Handbook Management Plan
Image Denoting External Link DOC Internet Use Policy
Image Denoting External Link Web Standards, Best Practices, and Policies
Image Denoting External Link DOC Standard on Password Management PDF File
BulletDOC Breach Notification Response Plan PDF File
BulletDOC Procurement Memo 2003-09 PDF File- Contract Requirements for IT Security
    BulletSecurity Clauses - CAR1352.239-73 PDF File & CAR1352.239-74 PDF File

 

Executive Orders

Image Denoting External Link Executive Order 13231 February 28, 2003, Critical Infrastructure Protection in the Information Age
Image Denoting External Link Executive Order 13130 of July 14, 1999 - National Infrastructure Assurance Council
Image Denoting External Link Executive Order 13111 of January 12, 1999 - Technology uses to improve training opportunities for employees
Image Denoting External Link Executive Order 13103 of September 30, 1998 - Computer Software Piracy
Image Denoting External Link Executive Order 13011 of July 16, 1996 - Chief Information Officers Council
Image Denoting External Link Executive Order 13010 of July 15, 1996 - Critical Information Protection 
Image Denoting External Link Executive Order Search from the National Archives and Records Administration

 

NIST Publications

Image Denoting External Link NIST Special Publication 800-18 Guide for Developing Security Plans for Information Technology Systems, December 1998

NIST SP 800-30 - Risk Management Guide for IT Systems

NIST SP 800-53 - Recommended Security Controls for Federal Information Systems
NIST SP 800-60 - Guide for Mapping Types of Information and Information Systems to Security Categories (Vol. 1)

 

 

Valid XHTML 1.0 Strict
Document last modified 2013-02-11 22:52:54 +0000