DoD 8500 – EBBD-2 – Boundary Defense Overview Boundary defense mechanisms, to include firewalls and network intrusion detection systems (IDS) are deployed at the enclave boundary to...
DoD 8500 – DCPB-1 – IA Program and Budget Overview A discrete line item for Information Assurance is established in programming and budget documentation. Threat Not having the ability...
DoD 8500 – EBBD-3 – Boundary Defense Overview Boundary defense mechanisms to include firewalls and network intrusion detection systems (IDS) are deployed at the enclave boundary to...
DoD 8500 – DCPD-1 – Public Domain Software Controls Overview Binary or machine executable public domain software products and other software products with limited or no warranty such as...
DoD 8500 – EBCR-1 – Connection Rules Overview The DoD information system is compliant with established DoD connection rules and approval processes. Threat A connection between any...
DoD 8500 – DCPP-1 – Ports, Protocols, and Services Overview DoD information systems comply with DoD ports, protocols, and services guidance. AIS applications, outsourced IT-based processes and platform IT...
DoD 8500 – EBPW-1 – Public WAN Connection Overview Connections between DoD enclaves and the Internet or other public or commercial wide area networks require a demilitarized zone...
DoD 8500 – DCPR-1 – CM Process Overview A configuration management (CM) process is implemented that includes requirements for: Threat Numerous security threats have the potential to...
DoD 8500 – DCSD-1 – IA Documentation Overview All appointments to required IA roles (e.g., DAA and IAM/IAO) are established in writing, to include assigned duties and...
DoD 8500 – DCSL-1 – System Library Management Controls Overview System libraries are managed and maintained to protect privileged programs and to prevent or minimize the introduction of unauthorized...