DoD 8500 – DCMC-1 – Mobile Code Overview The acquisition, development, and/or use of mobile code to be deployed in DoD systems meets the following requirements: Threat...
DoD 8500 – COTR-1 – Trusted Recovery Overview Recovery procedures and technical system features exist to ensure that recovery is done in a secure and verifiable manner....
DoD 8500 – DCNR-1 – Non-repudiation Overview NIST FIPS 140-2 validated cryptography (e.g., DoD PKI class 3 or 4 token) is used to implement encryption (e.g.,...
DoD 8500 – DCAR-1 – Procedural Review Overview An annual IA review is conducted that comprehensively evaluates existing policies and processes to ensure procedural consistency and to...
DoD 8500 – DCAS-1 – Acquisition Standards Overview The acquisition of all IA- and IA-enabled GOTS IT products is limited to products that have been evaluated by...
DoD 8500 – DCBP-1 – Best Security Practices Overview The DoD information system security design incorporates best security practices such as single sign-on, PKE, smart card, and biometrics....
DoD 8500 – DCCB-1 – Control Board Overview All DoD information systems are under the control of a chartered configuration control board that meets regularly according to...
DoD 8500 – DCCB-2 – Control Board Overview All information systems are under the control of a chartered Configuration Control Board that meets regularly according to DCPR-1....
DoD 8500 – DCCS-1 – Configuration Specifications Overview A DoD reference document, such as a security technical implementation guide or security recommendation guide constitutes the primary source...
DoD 8500 – DCCS-2 – Configuration Specifications Overview A DoD reference document such as a security technical implementation guide or security recommendation guide constitutes the primary source...