Cybersecurity Job Aids


Assured File Transfer
PDF icon December 2025. 2 pages. The Assured File Transfer job aid lists approved file formats and outlines the steps and considerations for securely transferring files. 

Sample Incident Handling Checklist
PDF icon December 2025. 1 page. The Sample Incident Handling Checklist provides a guide for responding to and managing a cybersecurity incident. It is designed to help ensure that all critical procedures are followed during an event to minimize damage and restore normal operations effectively.

Enhanced Security Requirements
PDF icon August 2025. 5 pages. The Enhanced IS Requirements job aid identifies the security families and their requirements, as well as technical and procedural controls that could apply to system connections. 

Plan of Action and Milestones (POA&M)
PDF icon July 2025. 6 pages. This job aid is a tool to help information system security professionals understand how to create and use the Plan of Action and Milestones (POA&M)

Identifying Phishing Smartcard
PDF icon July 2025. 3 pages. The Identifying Phishing Smart Card job aid offers a quick reference guide to boost your online security against phishing attacks. It outlines key indicators of phishing attempts, provides actionable steps to stay safe online, and even includes a "Spot the Red Flags" activity to sharpen your phishing detection skills!

Security Configuration Assessment of Information Systems
PDF icon April 2025. 6 pages. Provides an overview of the process for assessing the technical security controls and system configuration of contractor information systems (IS) using the Defense Information System Agency (DISA) vulnerability scanning protocols in accordance with the National Industrial Security Program (NISP)

Social Media Safety Smart Card
PDF icon May 2025. The Social Media Safety Smart Card job aid is designed for easy reference to enhance social media safety. It covers key areas such as using strong passwords, reporting scammers and fake accounts, using multi-factor authentication (MFA), reviewing account permissions, and identifying common warning signs of scams.

DOD Cybersecurity Policy Chart
PDF icon March 2025. Up to date chart that captures the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme.