SSA Permitted Entity Security Posture. Prior to the redisclosure of NDNH information by SSA to any authorized entity, SSA shall demonstrate, and OCSE shall review and approve, the security posture of the entity’s systems and processes. All information systems and applications that process, transmit, or store NDNH information shall be fully compliant with FISMA, OMB directives, and NIST guidelines. Prior to receiving NDNH information, entities shall have implemented the minimum security controls required for a system categorized as “moderate” in accordance with FIPS 199. All systems and applications handling NDNH information shall first be granted the ATO through the authorization process according to NIST SP 800-37 Revision 1. In addition, if applicable, federal agencies that share NDNH information with entities specified in the agreement shall ensure the specified contractors meet the same safeguarding requirements. The authorizing official of the agency that re-discloses NDNH information to the permitted entity may grant them the ATO or security authorization. The security authorization process shall have been conducted according to the NIST SP 800-37 Revision 1, as appropriate. Federal agencies shall comply with NIST SP 800-37 Revision 1, including implementing a continuous monitoring program for permitted entities. Agencies shall conduct the authorization process at least every three years or when there are major changes to a system. Agencies must verify privacy protection periodically through audits and reviews of the systems and procedures. By signing the security addendum, SSA signatories confirm that SSA has reviewed the entities specified in the agreement, reviewed the security controls in place to safeguard information and information systems, and determined that the risk to federal data is at an acceptable level. The security controls in place at all entities specified in the agreement are commensurate with those of a federal system categorized as “moderate” according to FIPS 199. See also XXX X-00-00, Fiscal Year 2017-2018 Guidance on Federal Information Security and Privacy Management Requirements, October 16, 2017.
Appears in 1 contract
Samples: Computer Matching Agreement
SSA Permitted Entity Security Posture. Prior to the redisclosure of NDNH information by SSA to any authorized entity, SSA shall must demonstrate, and OCSE shall must review and approve, the security posture of the entity’s systems and processes. All information systems and applications that process, transmit, transmit or store NDNH information shall must be fully compliant with FISMA, OMB directives, and NIST guidelines. Prior to receiving NDNH information, entities shall must have implemented the minimum security controls required for a system categorized as “moderate” in accordance with FIPS 199. All systems and applications handling NDNH information shall must first be granted the ATO through the authorization process according to NIST SP 800-37 Revision 12. In addition, if applicable, federal agencies that share NDNH information with entities specified in the agreement shall must ensure the specified contractors meet the same safeguarding requirements. The authorizing official of the agency that re-discloses NDNH information to the permitted entity may grant them the ATO or security authorization. The security authorization process shall must have been conducted according to the NIST SP 800-37 Revision 12, as appropriate. Federal agencies shall must comply with NIST SP 800-37 Revision 12, including implementing a continuous monitoring program for permitted entities. Agencies shall must conduct the authorization process at least every three years or when there are major changes to a system. Agencies must verify privacy protection periodically through audits and reviews of the systems and procedures. By signing the security addendum, SSA signatories confirm that SSA has reviewed the entities specified in the agreement, reviewed the security controls in place to safeguard information and information systems, systems and has determined that the risk to federal data is at an acceptable level. The security controls in place at all entities specified in the agreement are commensurate with those of a federal system categorized as “moderate” according to FIPS 199. See also XXX X-00also: OMB M-22-0005, Fiscal Year 20172021-2018 2022 Guidance on Federal Information Security and Privacy Management RequirementsPrivacy, October 16December 6, 20172021.
Appears in 1 contract
Samples: Computer Matching Agreement
SSA Permitted Entity Security Posture. Prior to the redisclosure of NDNH information by SSA to any authorized entity, SSA shall must demonstrate, and OCSE shall must review and approve, the security posture of the entity’s systems and processes. All information systems and applications that process, transmit, transmit or store NDNH information shall must be fully compliant with FISMA, OMB directives, and NIST guidelines. Prior to receiving NDNH information, entities shall must have implemented the minimum security controls required for a system categorized as “moderate” in accordance with FIPS 199. All systems and applications handling NDNH information shall must first be granted the ATO through the authorization process according to NIST SP 800-37 Revision 12. In addition, if applicable, federal agencies that share NDNH information with entities specified in the agreement shall must ensure the specified contractors meet the same safeguarding requirements. The authorizing official of the agency that re-discloses NDNH information to the permitted entity may grant them the ATO or security authorization. The security authorization process shall must have been conducted according to the NIST SP 800-37 Revision 12, as appropriate. Federal agencies shall must comply with NIST SP 800-37 Revision 1, including implementing a continuous monitoring program for permitted entities. Agencies shall must conduct the authorization process at least every three years or when there are major changes to a system. Agencies must verify privacy protection periodically through audits and reviews of the systems and procedures. By signing the security addendum, SSA signatories confirm that SSA has reviewed the entities specified in the agreement, reviewed the security controls in place to safeguard information and information systems, systems and has determined that the risk to federal data is at an acceptable level. The security controls in place at all entities specified in the agreement are commensurate with those of a federal system categorized as “moderate” according to FIPS 199. See also XXX X-00also: OMB M-22-0005, Fiscal Year 20172021-2018 2022 Guidance on Federal Information Security and Privacy Management RequirementsPrivacy, October 16December 6, 20172021.
Appears in 1 contract
Samples: Computer Matching Agreement
SSA Permitted Entity Security Posture. Prior to the redisclosure of NDNH information by SSA to any authorized entity, SSA shall demonstrate, and OCSE shall review and approve, the security posture of the entity’s systems and processes. All information systems and applications that process, transmit, or store NDNH information shall be fully compliant with FISMA, OMB directives, and NIST guidelines. Prior to receiving NDNH information, entities shall have implemented the minimum security controls required for a system categorized as “moderate” in accordance with FIPS 199. All systems and applications handling NDNH information shall first be granted the ATO through the authorization process according to NIST SP 800-37 Revision 12. In addition, if applicable, federal agencies that share NDNH information with entities specified in the agreement shall ensure the specified contractors meet the same safeguarding requirements. The authorizing official of the agency that re-discloses NDNH information to the permitted entity may grant them the ATO or security authorization. The security authorization process shall have been conducted according to the NIST SP 800-800- 37 Revision 1, 2 as appropriate. Federal agencies shall comply with NIST SP 800-37 Revision 12, including implementing a continuous monitoring program for permitted entities. Agencies shall conduct the authorization process at least every three years or when there are major changes to a system. Agencies must verify privacy protection periodically through audits and reviews of the systems and procedures. By signing the security addendum, SSA signatories confirm that SSA has reviewed the entities specified in the agreement, reviewed the security controls in place to safeguard information and information systems, and determined that the risk to federal data is at an acceptable level. The security controls in place at all entities specified in the agreement are commensurate with those of a federal system categorized as “moderate” according to FIPS 199. See also XXX X-00-00, Fiscal Year 20172018-2018 2019 Guidance on Federal Information Security and Privacy Management Requirements, October 1625, 20172018.
Appears in 1 contract
Samples: Computer Matching Agreement
SSA Permitted Entity Security Posture. Prior to the redisclosure of NDNH information by SSA to any authorized entity, SSA shall demonstrate, and OCSE shall review and approve, the security posture of the entity’s systems and processes. All information systems and applications that process, transmit, or store NDNH information shall be fully compliant with FISMA, OMB directives, and NIST guidelines. Prior to receiving NDNH information, entities shall have implemented the minimum security controls required for a system categorized as “moderate” in accordance with FIPS 199. All systems and applications handling NDNH information shall first be granted the ATO through the authorization process according to NIST SP 800-37 Revision 1. In addition, if applicable, federal agencies that share NDNH information with entities specified in the agreement shall ensure the specified contractors meet the same safeguarding requirements. The authorizing official of the agency that re-discloses NDNH information to the permitted entity may grant them the ATO or security authorization. The security authorization process shall have been conducted according to the NIST SP 800-37 Revision 1, as appropriate. Federal agencies shall comply with NIST SP 800-37 Revision 1, including implementing a continuous monitoring program for permitted entities. Agencies shall conduct the authorization process at least every three years or when there are major changes to a system. Agencies must verify privacy protection periodically through audits and reviews of the systems and procedures. By signing the security addendum, SSA signatories confirm that SSA has reviewed the entities specified in the agreement, reviewed the security controls in place to safeguard information and information systems, and has determined that the risk to federal data is at an acceptable level. The security controls in place at all entities specified in the agreement are commensurate with those of a federal system categorized as “moderate” according to FIPS 199. See also XXX X-00OMB M-17-0005, Fiscal Year 20172016-2018 2017 Guidance on Federal Information Security and Privacy Management Requirements, October 16November 4, 20172016.
Appears in 1 contract
Samples: Computer Matching Agreement
SSA Permitted Entity Security Posture. Prior to the redisclosure of NDNH information by SSA to any authorized entity, SSA shall demonstrate, and OCSE shall review and approve, the security posture of the entity’s systems and processes. All information systems and applications that process, transmit, or store NDNH information shall be fully compliant with FISMA, OMB directives, and NIST guidelines. Prior to receiving NDNH information, entities shall have implemented the minimum security controls required for a system categorized as “moderate” in accordance with FIPS 199. All systems and applications handling NDNH information shall first be granted the ATO through the authorization process according to NIST SP 800-37 Revision 1. In addition, if applicable, federal agencies that share NDNH information with entities specified in the agreement shall ensure the specified contractors meet the same safeguarding requirements. The authorizing official of the agency that re-discloses NDNH information to the permitted entity may grant them the ATO or security authorization. The security authorization process shall have been conducted according to the NIST SP 800-37 Revision 1, as appropriate. Federal agencies shall comply with NIST SP 800-37 Revision 1, including implementing a continuous monitoring program for permitted entities. Agencies shall conduct the authorization process at least every three years or when there are major changes to a system. Agencies must verify privacy protection periodically through audits and reviews of the systems and procedures. By signing the security addendum, SSA signatories confirm that SSA has reviewed the entities specified in the agreement, reviewed the security controls in place to safeguard information and information systems, and has determined that the risk to federal data is at an acceptable level. The security controls in place at all entities specified in the agreement are commensurate with those of a federal system categorized as “moderate” according to FIPS 199, Standards for Security Categorization of Federal Information and Information Systems (February 2002). See also XXX X-00OMB M-17-0005, Fiscal Year 20172016-2018 2017 Guidance on Federal Information Security and Privacy Management Requirements, October 16November 4, 20172016.
Appears in 1 contract
Samples: Computer Matching Agreement