Newsletter HomePrevious articleNext


Newsletter Topics

  • The Security Standard Version 10 of the Security Manual Template Released - FIPS 199 Compliant

  • The Security Standard - Version 10 of the Security Manual Template Released - FIPS 199 Compliant

    FIPS (Federal Information Processing Standards) is a standard that describes document processing, encryption algorithms and other information technology standards for use within non-military government agencies and by government contractors and vendors

    Security Policies

    FIPS's purpose is to support key security standards and guidelines for the implementation of and compliance with the Federal Information Security Management Act (FISMA) including:

    • Standards for categorizing information and information systems by mission impact
    • Standards for minimum security requirements for information and information systems
    • Guidance for selecting appropriate security controls for information systems
    • Guidance for assessing security controls in information systems and determining security control effectiveness
    • Guidance for the security authorization of information systems
    • Guidance for monitoring the security controls and the security authorization of information systems

    Version 10.0 of the Security Manual template has just been released and is compliant with mandated requirements.  It now contains 16 electronic forms and is the one tool that CIOs, CTOs, and IT managers need to meet all mandated compliance requirements. The electronic forms included with this latest update are:

    • Blog Policy Compliance
    • BYOD Access and Use
    • Company Asset Employee Control Log
    • Email - Employee Acknowledgment
    • Employee Termination Checklist
    • FIPS 199 Assessment Electronic Form
    • Internet Access Request
    • Internet Use Approval
    • Internet & Electronic Communication - Employee Acknowledgment
    • Mobile Device Access and Use Agreement
    • Employee Security Acknowledgement Release
    • Preliminary Security Audit Checklist
    • Security Access Application
    • Security Audit Report
    • Security Violation Reporting
    • Sensitive Information Policy Compliance Agreement

    Order Security ManualDownload Security Table of Contents