Cybersecurity is the ability to protect or defend the use of cyberspace from attacks.

How to ATO Backlog Filter

How to ATO Backlog Filter
PDF icon November 2016. 2 pages. How to ATO Backlog Filter Any Region or Field Office – DSS Internal User

Plan of Action and Milestones

Plan of Action and Milestones
PDF icon September 2016. 7 pages. Developing a POA&M in accordance with DSS standards as a part of the Assessment and Authorization (A&A) process.

Security Configuratiion Assessment of Information Systems

Security Configuration Assessment of Information Systems
PDF icon September 2016. 5 pages. Conducting a security configuration assessment using the Security Content Automation Protocol (SCAP) tool.

LinkedIn Smartcard

LinkedIn Smartcard
PDF icon September 2016. 2 pages. Trifold brochure.

Enhanced IS Controls Job Aid

Enhanced IS Security Controls Job Aid
PDF icon May 2016. 2 pages. Enhanced controls are those controls that are based on contractual requirements, requirements by a Government Contracting Activity (GCA)-sponsored circuit connection or an endorsement by management.

Facebook Trifold

Facebook Smartcard
PDF icon April 2016. Trifold brochure. Social networking site configuration guide.

Facebook Security Settings

Facebook Smartcard (Configuration Guide)
PDF icon April 2016. 2 pages. Describes the recommended and optional security settings offered by Facebook, as well as general social media security concepts.

Twitter Smartcard (Trifold)

Twitter Smartcard
PDF icon April 2016. Trifold brochure.

Twitter Smartcard (Configuration Guide)

Twitter Smartcard (Configuration Guide)
PDF icon April 2016. 2 pages. CDSE Cybersecurity Training Curriculum's recommended Twitter security settings.

How to Cancel Pending Submissions

How to Cancel Pending Submissions
PDF icon March 2016. 1 page. Cancel a submission after it’s been submitted but before approval.

How to Find Drafts and Plans Returned

How to Find Drafts and Plans Returned
PDF icon March 2016. 1 page. Reviewing and submitting accreditation packages returned by the ISSP.

How to Submit an Administrative Edit

How to Submit an Administrative Edit
PDF icon February 2016. 1 page. Instructs the ISSM on submitting non-security relevant changes, such as system counts or certain equipment changes, for ISSP acknowledgement.

How to Terminate/Disestablish Plans in OBMS for the Submitter Role

How to Terminate/Disestablish Plans in OBMS for the Submitter Role
PDF iconJuly 2015. 1 page. Identify and terminate/disestablish existing approved accreditation packages when no longer required or active.

How to Add a Profile to an Existing MSSP

How to Add a Profile to an Existing MSSP
PDF iconMay 2015. 1 page. Adding a new IS/ Profile to an existing MSSP that requires AO authorization before processing.

How to Go From an IATO to an ATO in OBMS

How to Go From an IATO to an ATO in OBMS
PDF iconMay 2015. 1 page. Submitting required information for AO consideration to upgrade an IATO to an ATO.

How to Self-Certify a Profile to an Existing MSSP

How to Self-Certify a Profile to an Existing MSSP
PDF iconMay 2015. 1 page. Self-certifying a New IS/Profile under an Approved MSSP.

How to Submit an Initial Submittal in OBMS

How to Submit an Initial Submittal in OBMS
PDF iconMay 2015. 1 page. How to create and submit and initial submission package for Authorizing Official (AO) approval.

DoD Cybersecurity Policy Chart

DoD Cybersecurity Policy Chart
October 2015. 1 page.

DSS Blackberry Clearing Procedure

DSS Blackberry Clearing Procedure
PDF icon September 2006. 14 pages.