Ready to Prove Your Competency? Start Here. As a core component of the Information Security Role-Based Certification (RBC), the Activity Security Manager (ASM)-INFOSEC VILT course is designed to formally validate your on-the-job competence. The curriculum moves beyond theory, mapping directly to the real-world behaviors required of an effective Activity Security Manager. Through a series of practical, scenario-based assessments, you will consistently prove your ability to perform your duties. This course ensures that upon completion, you are not just 'trained', but officially verified as competent in your critical security role. InfoSec Specialist Roles and Responsibilities: Information Security Specialists are responsible for implementing and maintaining the Department of Defense Information Security Program, as defined in DOD Manual (DODM) 5200.01 (Volumes 1-3). This role aligns with the Office of Personnel Management (OPM) core discipline of "Information Security" and focuses on the protection of national security information (NSI). Typically classified under OPM occupational series 0080 (Security Administration), this individual ensures the proper handling and safeguarding of classified and unclassified NSI. This RBC is appropriate for Security Managers who oversee a DOW Information Security Program (ISP). It provides the essential knowledge to develop the skillset to effectively manage the full spectrum of information security responsibilities.
Category
Skills
Risk Management
Risk Mitigation and Management Strategies
Information Life cycle
Classification, Declassification, Downgrading, Storage, Destruction, Records Management
Access & Control
Safeguarding, Handling, Dissemination, Transmission, and Transportation
Program Management
Incident Response, Accountability, Security Education & Training Awareness, Inspections and Oversight
Coordination
Collaboration and communication with internal/external stakeholders
Phase 3: Successfully Complete the Course To pass the course, you must earn a cumulative average of 80% or higher on all graded coursework. This includes all practical exercises, activities, discussion questions, and the final capstone project. Phase 4: Pass the Final Certification Exam After successfully completing the ASM-InfoSec VILT (IF203.10) course, you will be eligible to take the final certification exam. You must pass this exam with a minimum score of 80% to earn the Information Security Certification. To understand the specific responsibilities of an Information Security Specialist and grasp what effective implementation looks like in practice, select a topic from the chart below. Each section details the duties and responsibilities covered in the certification.
Responsibility
Implementation looks like...
Manage the ISP
Following guidelines in policy to effectively manage and supervise the ISP on behalf of your activity head. This includes giving equal priority to protecting information and demonstrating a commitment to transparency and openness in government operations.
Advise Your Activity Head
Advising and representing your activity head on all DOD information security policy matters.
Mitigate Risk
Conducting risk assessment to evaluate the potential risks and vulnerabilities associated with protecting classified information throughout its life cycle.
Remain Cognizant of Policy
Staying informed about all aspects related to information security, personnel security, information systems security, physical security, and industrial security functions.
Communicate Policy
Ensuring that individuals with security duties are kept informed of any changes in policy and procedures and understand how to implement changes.
Manage Classified Information
Reviewing and assessing all of your activity's classified products on a regular basis to ensure adherence to policy.
Implement Security Education and Training Awareness (SETA)
Establishing and maintaining an effective SETA program for all personnel that includes a continuous security awareness component that addresses real-time security risks.
Create Internal Policy Guidance
Creating a written activity security instruction that clearly defines the procedures for safeguarding classified information during emergency situations and military operations, if applicable.
Original Classification Authority (OCA) Policy
Implementing the policy guidance for OCAs.
OCA Training
OCA Oversight
Ensuring OCAs meet the guidelines for correctly marking, designating, or electronically labeling classified information in your activity, and maintain full cognizance of the information itself.
OCA Coordination
Coordinating procedures when personnel have classified information that is not properly marked to ensure they resolve them through the OCA to get the correct markings applied. Staying informed about all aspects related to information security, personnel security, information systems security, physical security, and industrial security functions.
OCA Reporting
Submitting an annual report to the Under Secretary of War for Intelligence and Security (USW(I&S)) by October 31 that includes a comprehensive list of officials in your activity who hold an OCA.
Safeguarding Expectations
Establishing expectations within your ISP that personnel have a true understanding of their responsibility to safeguard Classified National Security Information(CNSI) which includes providing clear guidance to personnel on how to identify, mark, and appropriately handle all levels of classified information.
Implement SETA
Unauthorized Disclosure Protection
Ensuring classified information, including collateral, Sensitive Compartmented Information (SCI), and Special Access Program (SAP) information, is properly classified, declassified when necessary, and protected from unauthorized access or disclosure.
Misclassification Oversight
Authorizing designated officials to correct any instances of misclassification of information as applicable.
Derivative Policy Implementation
Protecting OCA Guidance
Ensuring personnel understand their individual responsibility to implement OCA guidance in source documents and Security Classification Guides (SCGs) by applying all required markings on derivative documents including banner, portion markings, and the classification authority block (CAB) information.
Derivative Training
Ensuring personnel meet annual derivative classification training requirements and document completion.
SCG Coordination
Coordinating with OCAs as applicable on:
Classified Contracts Support
Coordinating with the Contracting Officer (KO) to support the communication of specific classified contract requirements to industry partners throughout the contracting process when classified information is shared with industry partners at activity facilities or other locations. This includes:
Public Release Coordination
Collaborating with your Public Affairs and Operational Security officers to ensure all information intended for public release is reviewed in accordance with DODI 5230.09, Clearance of DOD Information for Public Release; DOD Instruction (DODI) 5230.29, Security and Policy Review of DOD Information for Public Release; and DODI 8550.01, DOD Internet Services and Internet-Based Capabilities.
Foreign Disclosure Coordination
Collaborating with your Foreign Disclosure Officer (FDO) to ensure your activity complies with the regulations outlined in DOD Directive (DODD) 5230.11, Disclosure of Classified Military Information to Foreign Governments and International Organizations, regarding the disclosure of classified information to foreign governments and international organizations.
Social Media Considerations
Coordinating with the PAO to ensure information released on external official present social media platforms follows the DOD ISP requirements and aligns with guidance in DODI 5400.17, Official Use of Social Media for Public Affairs Purposes.
Enforce Protection of CNSI
Consistently enforcing requirements for safeguarding, storing, destroying, transmitting, and transporting classified information.
Storage Methods
Deterring and detecting unauthorized access to classified information through effective storage methods to include:
Unauthorized Disclosure Reporting Cognizance
Proactively minimizing potentially negative consequences of unauthorized access to classified information at your activity by ensuring reporting and investigating procedures are in place.
Consistent Security Checks
Conducting security checks at the end of each duty to verify that areas where classified information is handled or stored are secure. This includes using SF 701, Activity Security Checklist and SF 702, Security Container Check Sheet.
Handling Accountability
Ensuring procedures are in place at your activity for regularly handling and sharing to include:
Destruction Accountability
Ensuring procedures and best practices for destroying classified information are in place to include:
CUI Policy
Implementing the policy guidance for CUI.
CUI Protection
Ensuring personnel have a clear understanding of the processes involved in protecting CUI, including:
CUI Training
Meeting the training requirements for CUI by ensuring all relevant information is effectively communicated to personnel, enabling them to:
CUI Information Technology (IT) Considerations
Coordinating with IT personnel to ensure system requirements for storing and sharing CUI electronically are in place and communicated to personnel per DODI 5200.48, Controlled Unclassified Information.
CUI Unauthorized Disclosure Reporting
Completing incident reporting for the unauthorized disclosure of CUI.
Security Incident Accountability
Spillage Coordination
Incident Reporting Coordination
Process Management
Ensuring the security inquiry process is followed and completed within the designated timeline—10 business days. If additional time is needed to complete the initial inquiry, initiate a request for an extension. It's important to note that ASMs are typically not assigned to conduct security investigations when they are warranted, but as noted earlier, should oversee the process through completion.
Risk Management Framework (RMF) Coordination
Ensuring your activity follows DODI 8510.01, Risk Management Framework for DOD Systems and National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37 and 800-39.
Reporting Accountability
Remaining accountable and ensuring requirements for reporting spillage of classified and unauthorized disclosure of CUI on IT systems are met. Remember spillage reports must be Unclassified. Remain cognizant of other actions related to reporting that may also need to be taken depending on the type and level of the cyber incident, including notifying:
Access Monitoring
IT Coordination
Manage Access
Ensuring only personnel who have the appropriate security eligibility with a legitimate need-to-know and signed SF 312 are granted access to classified information. Also manage access by:
Manage Classified Visits
Developing security measures and protocols at your activity in accordance with DODD 5230.20, DODI 5200.08, and other relevant policies that address the considerations of visitors who require access to classified information to include at a minimum:
Cognizance of Industry Access
Ensuring compliance is maintained when providing access to classified information to industry personnel at your activity and affiliated locations in relation to classified contracts. If the classified information is shared with industry personnel at the contractor's facility, it is important to adhere to the provisions outlined in 32 CFR, Part 117 National Industrial Security Program (NISPOM).
Manage Classified Meetings
Ensuring classified meetings related to your activity are conducted only for specific government purposes and are held at appropriately cleared facilities. Classified meetings requirements include:
SCI Cognizance
SETA Management and Supervision
Developing, coordinating, and implementing the SETA program by:
Special Training Management
Ensuring, as applicable, any special training that may be required for personnel in your activity who have DOD ISP specific duties or job responsibilities takes place as outlined in DODM 5200.01 Volume 3, Protection of Classified Information, Enclosure 5. Special training includes:
Self-Inspection Accountability
Managing Reporting Requirements
Submitting annual reports of self-inspections to the ISOO or USW(I&S), as required. The self-inspection reports must include the following information:
ISP Personnel Integrity and Accountability
Contractors:
Security Oversight Coordination
Designate as applicable, Top Secret Control Officer (TSCO), Top Secret Control Assistants (TSCAs), and Security Assistants:
Foreign National Personnel Cognizance
Foreign Nationals: Recognizing and enforcing the restrictions that apply to foreign nationals in relation to the ISP. Foreign nationals should not:
Preventing the inadvertent disclosure of DOD information to unauthorized individuals, by coordinating with your AO and IT staff to establish proper procedures for the disposal of computer hard drives when remediating a spillage. These procedures should specifically address the removal of U.S. Government data from hard drives prior to disposal.
Stakeholder Coordination
Working with all stakeholders and officials both internally and externally to ensure the proper security measures for the classification, safeguarding, transmission, declassification, and destruction of all classified information. These individuals include the SSO, the SAP Security Officer, the Information Systems Security Officer (ISSO), Counterintelligence (CI), and OPSEC.
Department of Energy (DOE) Coordination
Ensuring, as applicable, DOE classified information is protected and handled by personnel that have access as required by the Atomic Energy Act (AEA).
Ensuring SCG Coordination:
Leadership Coordination
Coordinating with the head of your activity and component on a regular basis to ensure effective communication about all program oversight and implementation practices that they are ultimately responsible for.
FDO Coordination
Collaborate, as necessary, with the FDO to address all aspects related to the disclosure of classified information and CUI to foreign governments and international organizations as outlined in DODD 5230.11, Disclosure of Classified Military Information to Foreign Governments and International Organizations.