5 FAM 100
INFORMATION TECHNOLOGY (IT) MANAGEMENT
5 FAM 110
IT MANAGEMENT
(CT:IM-254; 12-03-2018)
(Office of Origin: IRM/BMP/GRP)
5 FAM 111 GENERAL POLICY
(CT:IM-143; 07-12-2013)
a. Department officials identified in 5 FAM 115 have
primary responsibilities for the development, oversight, and implementation of
the Departments IT program and activities.
b. System managers must follow 5 FAM 800
for their specific responsibilities. IT project managers must follow
requirements in 5 FAM 600
and website managers must follow requirements in 5 FAM 700.
5 FAM 112 SCOPE
(CT:IM-143; 07-12-2013)
All Department organizations must follow the guidance in
this subchapter when establishing the Bureau Resource Request (BRR) and the
mission Resource Request (MRR) for information technology investments.
5 FAM 113 AUTHORITIES
(CT:IM-254; 12-03-2018)
The authorities for this policy include:
(1) Government Performance and Results Modernization Act of 2010, Public Law 111-352;
(2) Paperwork Reduction Act of 1995, Public Law 104-13
(44 U.S.C. 3501, et seq.);
(3) Clinger-Cohen Act of 1996, Public Law 104-106
(formerly known as the Information Technology Reform Act of 1996, renamed by
section 808, Public Law 104-208) (40 U.S.C. 1401, et seq.);
(4) Federal Financial Management Improvement Act of
1996, Public Law 104-208, sections 802 and 803 (31 U.S.C. 3512 note);
(5) Electronic Freedom of Information Act (FOIA)
Amendments of 1996, Public Law 104-231;
(6) Federal Information Security Modernization Act of 2014 (FISMA), Public
Law 113-283, (44 U.S.C. 3551);
(7) Omnibus Diplomatic Security and Anti-Terrorism Act
of 1986, Public Law 99-399, as amended (22 U.S.C. 4802(a));
(8) E.O. 13403 (Federal
Information Technology);
(9) OMB Memoranda (M-04-04), E-Authentication
Guidelines for Federal Agencies;
(10) OMB Circular A-11, Preparation, Submission and
Execution of the Budget (issued annually by OMB), including Part 7, Planning,
Budgeting, Acquisition, and Management of Capital Assets and Capital
Programming Guide, Version 1.0 Supplement to Part 7;
(11) OMB Circular A-123, Managements Responsibility
for Internal Control;
(12) OMB Circular A-123
Appendix D;
(13) OMB Circular A-130, Managing
Information as a Strategic Resource;
(14) Federal Information Technology Acquisition Reform
(FITARA) is Title VIII Subtitle D Sections 831-837 of Public Law 113-291 - Carl
Levin and Howard P. "Buck" McKeon National Defense Authorization Act
for Fiscal Year 2015;
(15) OMB Memorandum (M-15-14); Management and Oversight
of Federal Information Technology;
(14) Rehabilitation Act of 1973, Public Law 93-113, as
amended, Section 508 (29 U.S.C. 794d);
(15) 36 CFR Part 1194, Electronic and Information
Technology Accessibility Standards;
(16) Homeland Security Presidential Directive (HSPD-7),
Critical Infrastructure Identification, Prioritization, and Protection,
December 17, 2003;
(17) Homeland Security Presidential Directive
(HSPD-12), Policy for a Common Identification Standard for Federal Employees
and Contractors, August 27, 2004;
(18) National Institute of Standards and Technology
(NIST) Special Publication (SP) 800-59, Guidelines for Identifying an
Information System as a National Security System, August 2003;
(19) Federal Information Processing Standards (FIPS)
Publication 201, Personal Identity Verification (PIV) of Federal Employees and
Contractors, February 25, 2005; and
5 FAM 114 DEFINITIONS
(CT:IM-143; 07-12-2013)
Bureau Resource Request (BRR):
Formerly the Bureau Performance Plans (BPPs). A process where regional and
functional bureaus assess their multi-year budgeting needs.
Electronic and information technology
(EIT): Defined in 5 FAM 913.
Enterprise architecture (EA):
Defined in 5 FAM
674.
Firewall rule set: A set of
rules or operating conditions encoded into the firewall device to allow and/or
disallow TCP/IP traffic to and from the public network. Rule sets are based
upon either senior management or IT management defined policy.
Information life cycle:
Defined in 5 FAM
913.
Information resources: Defined
in 5 FAM 913.
Information system: Defined in
5 FAM 913.
Information technology (IT):
Defined in 5 FAM
913.
Mission Resource Request (MRR):
Formerly the Mission Strategic and Resource Plan (MSRP). This document is the
first and critical step in the annual planning process that informs the Senior
Review process and culminates in the submission of the Presidents Budget to Congress.
Personal identity verification (PIV)
card: A secure, electronic, rapid, and verifiable means of individual
identification that is resistant to fraud, tampering, counterfeiting, and
terrorist exploitation.
Public Key Infrastructure (PKI):
Defined in 5 FAM
140.
5 FAM 115 WHO HAS PRIMARY
RESPONSIBILITY FOR IT MANAGEMENT?
(CT:IM-143; 07-12-2013)
The principal management officials and organizations that
manage, advise, and support IT activities are:
(1) Under Secretary for Management (M);
(2) Chief Information Officer (CIO):
(a) Deputy CIO for Business, Management and
Planning/Chief Knowledge Officer (DCIO/BMP);
(b) Deputy CIO for Operations/Chief Technology Officer (DCIO/OPS);
and
(c) Deputy CIO for Information Assurance (DCIO/IA);
(3) E-Gov Program Board (E-GovPB):
(a) E-Gov Advisory Group; and
(b) E-Gov Program Management Office (E-Gov PMO);
(4) Assistant Secretary, Diplomatic Security (DS);
(5) Chief Financial Officer (CFO);
(6) Information Technology Configuration Control Board
(IT CCB) including local CCBS;
(7) Department program managers; and
(8) Other Department organizations (see 5 FAM 115.8
for details).
5 FAM 115.1 Under Secretary for
Management (M)
(CT:IM-73; 05-02-2006)
The Under Secretary for Management (M) directs and
administers the Departments worldwide IT resources and chairs the E-GovPB. M
has responsibility and authority over the IT budget.
5 FAM 115.2 Chief Information
Officer (CIO)
(CT:IM-143; 07-12-2013)
The Chief Information Officer (CIO; equivalent to an
Assistant Secretary) heads the Bureau of Information Resource Management (IRM)
and serves as the principal information technology adviser to the Secretary of
State and M. The CIO ensures development; implementation; and as necessary,
revision of IT policies, plans, and programs. (See 1 FAM 271 for
additional CIO duties and responsibilities.)
5 FAM 115.2-1 Deputy CIO for
Business, Management and Planning/Chief Knowledge Officer (DCIO/BMP)
(CT:IM-245; 11-20-2018)
The Deputy CIO for Business, Management and Planning/Chief
Knowledge Officer (DCIO/BMP) provides assistance and advice in the execution of
the CIOs responsibilities. Additional duties include ensuring that the
Departments information resource management decisions reflect the needs of the
Departments business sponsors by anticipating changes in both technology and
the business practices of the Department. Performing these duties validate
that the Departments information resource programs fully meet information,
E-Government and knowledge management objectives. (See 1 FAM 275 for more information on this office.)
5 FAM 115.2-2 Deputy CIO for
Operations/Chief Technology Officer (DCIO/OPS)
(CT:IM-245; 11-20-2018)
The Deputy CIO for Operations/Chief Technology Officer
(DCIO/OPS) provides the day-to-day operations for the Department's worldwide
technology infrastructure and assists and advises the CIO concerning technical
operations. Additional duties include providing direction and policy guidance
on operational activities in IRM to ensure that the Department and other
foreign affairs agencies receive rapid, reliable, responsive, and secure,
classified and unclassified voice and data information management operating
systems, networks, and programs. (See 1 FAM 276.)
5 FAM 115.2-3 Deputy CIO for
Information Assurance (DCIO/IA)/Chief Information Security Officer (CISO)
(CT:IM-254; 12-03-2018)
The Deputy CIO for Information Assurance (DCIO/IA)/Chief
Information Security Officer (CISO) carries
out the information security responsibilities of the CIO under the supervision
of the CIO (see 44 U.S.C. 3544). The CISO heads IRMs Office of Information
Assurance (IRM/IA) ensuring agency compliance with the Federal Information
Security Modernization Act of 2014 (FISMA) (Public
Law 113-283), and other applicable laws. (See 1 FAM 273.)
5 FAM 115.3 Electronic Government
Program Board (E-GovPB)
(CT:IM-128; 04-09-2012)
The Electronic Government Program Board (E-GovPB) is the
principal IT advisory entity to the Under Secretary for Management (M), and
functions as the Departments IT capital planning Executive Review Board. It
ensures systematic selection, control, and evaluation of the Departments
E-Gov/IT plans, programs and investments; approves the Departments IT
Strategic Plan; and reviews and recommends IT funding priorities and budget
requests. (See eGOV Charter.)
5 FAM 115.3-1 E-Gov Advisory
Group
(CT:IM-128; 04-09-2012)
The E-Gov Advisory Group provides a business, technical,
and investment evaluation of IT initiatives before submission to the E-GovPB.
The group also considers potential risk, cost, benefit, alignment with the
Departments enterprise architecture, and priority of IT investments. This
group also identifies and provides information on IT initiatives to the
E-GovPB.
5 FAM 115.4 Assistant Secretary,
Bureau of Diplomatic Security (DS)
(CT:IM-254; 12-03-2018)
a. All IT activities and programs must have a secured
environment for conducting U.S. diplomacy and promoting U.S. interests worldwide. To support this objective, the Bureau of Diplomatic Security
(DS) helps ensure that a secure, comprehensive, technically current and cost
effective IT security program is maintained according to FISMA, and other
applicable laws and National Security Directives. (See Omnibus Diplomatic
Security and Anti-Terrorism Act of 1986, as amended (22 U.S.C. 4802(a)) and
Delegation of Authority 214 of September 20, 1994, Section 8).
b. DS provides:
Network Monitoring
Cyber Incident Handling
Cyber Threat Analysis
Compliance Verification and Vulnerability Analysis
Cyber Security Policy and Configuration Development
Cyber Security Awareness and Training
Regional Computer Security Officer (RCSO) program
c. DS is also responsible for the physical, technical,
information, and personnel security programs that enable a secure IT
environment, and administers the Cyber Security Incident Program. These
actions help maintain a secured environment for conducting U.S. diplomacy and
promoting U.S. interests worldwide.
5 FAM 115.5 Chief Financial Officer
(CFO)
(CT:IM-143; 07-12-2013)
a. The Chief Financial Officer (CFO), along with the
CIO, provides complete and accurate accounting of IT expenditures, related
expenses, and results in accordance with the Paperwork Reduction Act of 1995
(see 44 U.S.C. 3506(b)(3)(B)). The CFO implements systems and financial
policies that control the Departments costs. The CFO, along with the CIO, is
deputy co-chair of the E-GovPB. (See Sections 802 and 803 of the Federal
Financial Management Improvement Act of 1996 (FFMIA) (31 U.S.C. 3512 note).)
b. The CFO publishes Department policy for identifying
specific financial thresholds and other criteria to determine when software
must be capitalized.
c. The CFO also provides advice on current and
prospective intelligence resources and critical infrastructure protection
matters, including developing strategies and initiatives for the Department.
5 FAM 115.6 Configuration Control
Boards
5 FAM 115.6-1 Departments
Information Technology Configuration Control Board (IT CCB)
(CT:IM-143; 07-12-2013)
The Departments Information Technology Configuration
Control Board (IT CCB) manages
standardization of the Departments global IT environment that consists of
classified and unclassified upgrades and addresses issues of configuration
tracking, change control, and network planning and operations. It sets the
standard for the Departments classified and unclassified technical baselines
and monitors compliance with that standard.
5 FAM 115.6-2 Local Configuration
Control Board (CCB)
(CT:IM-143; 07-12-2013)
a. Bureaus and posts must establish and maintain a
local configuration control board (CCB). A local CCB reviews changes affecting
systems or applications for which the bureaus or posts are responsible. The
local CCB can be in the form of a committee or it can consist solely of IRM
representative(s) at post. The local CCB determines whether a change request
can be approved locally or should be submitted to the IT CCB.
b. The post security officer should supplement a CCB
with only a sole IRM representative to avoid conflicts of interest problems.
c. Local CCBs must report local/post activity and
approval of IT items to their IT CCB voting representatives and the IT CCB
change manager.
5 FAM 115.7 Department Program
Managers
(CT:IM-128; 04-09-2012)
Department program managers, in consultation with the CIO
and CFO, as well as the CISO, SPO, and DS, determine IT program information
resource needs and develop strategies, systems, and capabilities to meet and
comply with those needs. (See the Paperwork Reduction Act of 1995 (44 U.S.C.
3506(a)(4)).) These program managers must comply with all applicable Federal
laws, regulations, and mandates on managing IT activities.
5 FAM 115.8 Department
Organizations that Support IT Management
(CT:IM-143; 07-12-2013)
Department organizations that are also involved in the
management and oversight of IT activities and provide major additional advice
and support include the Firewall Advisory Board (FAB), the Personal Identity
Verification (PIV) Implementation Board, and the Smart Card Public Key
Infrastructure (PKI) Biometric Governance Board (SCPBGB).
5 FAM 115.8-1 Firewall Advisory
Board (FAB)
(CT:IM-143; 07-12-2013)
a. The Firewall Advisory Board (FAB) reviews, approves,
and tracks configuration changes to the Department-level firewalls. The
Perimeter Security Division (IRM/OPS/ENM/PSD) is the chair of the FAB. Other
members include the Virus Incident Response Team (VIRT), IA, DS, and other ENM
personnel.
b. The offices responsible for the FAB are IRM DCIO for
Operations and IRM/OPS/ENM/PSD. The responsibilities of the board include the
following:
(1) Establishing baseline configurations for all
Department-level firewall installations;
(2) Establishing criteria to control connectivity of non-Department of State organizations to Department networks;
(3) Receiving all requests for changes to the Firewall
Rule Set, performing a risk assessment of each request, and authorizing
appropriate changes to the rule set;
(4) Recommending changes to the firewalls and network
architecture to improve network security;
(5) Providing assistance in developing
firewall-related solutions to meet the operational requirements of new network
applications; and
(6) Reviewing the Firewall Rule Set annually.
5 FAM 115.8-2 Personal Identity
Verification (PIV) Implementation Board
(CT:IM-143; 07-12-2013)
a. The Personal Identity Verification (PIV)
Implementation Board was established to implement the requirements of Homeland
Security Presidential Directive (HSPD-12). The Board is co-chaired by the
Deputy Assistant Secretary and Director of Countermeasures (DS/C) and the
Deputy CIO for Operations (IRM/OPS). Other Department officials are board
members.
b. A PIV working group was also established and
governed by the board. The groups purpose is to plan, coordinate, and ensure
implementation of the Departments PIV Program in compliance with HSPD-12 and
National Institute of Standards and Technology, Federal Information Processing
Standards (FIPS) 201. The group also provides responses on behalf of the Department
of State to reporting agencies.
c. HSPD-12 was issued to help standardize the form and
level of security by which Federal employees and contractors are identified for
access to Federal facilities and information systems. HSPD-12 establishes U.S.
Government policy to:
(1) Enhance security against potential terrorist
threats;
(2) Reduce identity fraud;
(3) Increase government efficiency through
standardization; and
(4) Protect the personal privacy of individuals.
d. HSPD-12 mandates that the Department establish a
program to ensure that identification issued to State employees and contractors
meets FIPS 201.
e. The Department must also require the use of
identification by State employees and contractors that meets FIPS 201 to gain
physical and logical access to federally controlled facilities and information
systems, respectively.
f. Federal Information Processing Standards (FIPS) 201
implements HSPD-12 by specifying the architecture and technical requirements
for a common identification standard for Federal employees and contractors.
g. The PIV program is composed of systems and processes
that support a common smart card-based identity authentication platform for
accessing multiple types of physical and logical access environments. Smart
cards will be the vehicle that carries the physical and digital components that
form the users PIV credentials. (See 5 FAM 115.8-3.)
5 FAM 115.8-3 Smart Card Public
Key Infrastructure (PKI) Biometric Governance Board (SCPBGB)
(CT:IM-172; 12-15-2015)
a. The Smart Card Public Key Infrastructure (PKI)
Biometric Governance Board (SCPBGB), along with the PIV Implementation Board,
coordinates a centralized approach for PIV implementation through the smart
card technology for physical access, logical access, PKI, and other Department
applications.
b. The PIV Working Group and DS Security Technology,
Facility Security Engineering Division, Domestic Management and Engineering
(DS/ST/FSE/DME) have primary roles to manage the physical access to Department
domestic facilities, including the use of appropriate technologies to
accomplish that mission.
c. The Under Secretary for Management designated the
PKI Program Team, created under IRM/FO/ITI/SI, as the sole entity within the
Department to implement public key infrastructure utilizing smart card
technology.
d. The board will operate in compliance with Department
policies and procedures and under the auspices of the PIV Implementation Board
by
(1) Identifying smart card requirements, recommending
policy and procedures, and developing standards that support the use of smart
cards at the Department;
(2) Providing clear, strong leadership during the
development and implementation phases of the Smart Card Program;
(3) Providing guidance and assistance in implementing
smart card related applications; and
(4) Providing oversight of the Departments smart card
activities, and establishing interoperability, technical, and security
requirements for products related to the Departments Smart Card Program.
e. The PIV Implementation Board and other authorities
and regulations may result in additional specific responsibilities.
5 FAM 116 ROLE OF Governance and Policy
(GP) in IT MANAGEMENT
(CT:IM-128; 04-09-2012)
a. IRM/BMP/GRP/GP oversees the process for collecting,
analyzing, and corroborating IT policy and related inquiries from respondents,
and other internal and external contacts as deemed appropriate. The results of
these activities are documented and compiled for dissemination.
b. The office location to submit IT policy questions or
to request IT-related information on these activities is the GPs website or
email inquiries are generated automatically through the GAL via AskIRMITPolicy@state.gov.
Department organizations, both domestic and abroad, must use this website for
IT policy or email for all related IT issues.
5 FAM 117 POLICY FOR ACCESS TO IT FOR
INDIVIDUALS WITH DISABILITIES
(CT:IM-143; 07-12-2013)
a. Section 508 of the Rehabilitation Act of 1973 (29
U.S.C. 794d) and relevant implementing regulations (36 CFR 1194) require
Federal departments and agencies that develop, procure, maintain, or use
electronic and information technology to ensure that Federal employees and
members of the public with disabilities have access to and use of information
and data, comparable to that of the employees and members of the public without
disabilities unless it is an undue burden to do so. If an agency invokes the
undue burden exception, the statute requires that the information and data be
provided to individuals with disabilities by an alternative means of access.
b. The Information Resource Management Program for
Accessible Computer/Communication Technology (IMPACT) initiative provides
access to IRM technology, information, and programs for all customers,
including individuals with disabilities. (Contact the IMPACT Outreach
Center for more information on the IMPACT initiative.)
5 FAM 118 Information Technology (IT)
Skills Incentive Program (Sip)
(CT:IM-143; 07-12-2013)
The Information Technology (IT) Skills Incentive Program
(SIP) was established to foster the development of advanced industry standard
skills, certifications, and credentials by IT professionals who must maintain
certain skills and requirements to continue in the SIP. (NOTE:
IT professionals must be Department employees working in certain IT-related job
series to be eligible for SIP.) The Department provides monetary incentives to
those IT professionals who achieve designated skill sets. The Foreign Service
Institutes School of Applied Information Technology (FSI/SAIT) administers the
SIP, including the IT Skills Incentive Panel (see 5 FAM 118.1)
and the Senior Advisory Panel (see 5 FAM 118.2).
These organizations review SIP continuously, along with sustainment training,
to meet the Departments needs (see the SIP website for more information on SIP
including eligibility and approved job series.)
5 FAM 118.1 IT Skills Incentive
Program Panel
(CT:IM-94; 02-05-2008)
The Director, Foreign Service Institute (FSI), selects an
FSI senior manager to chair the IT Skills Incentive Program Panel. The bureaus
of Human Resources (HR), Information Resource Management (IRM), a functional
and regional bureau, and the U.S. Agency for International Development (USAID)
are panel member representatives. The respective heads of the above bureaus
appoint their representatives, except that each functional and regional bureau
will appoint one representative on an annual rotational basis when that bureau
is scheduled to have a representative on the panel. The IT Skills Incentive
Program Panel makes policy recommendations to the Senior Advisory Panel. The
recommendations are not limited to policies, but include other changes such as adding
or deleting certifications and/or credentials, and limiting or extending the
timeframes of these certifications/credentials.
5 FAM 118.2 IT Skills Incentive
Program Senior Advisory Panel
(CT:IM-94; 02-05-2008)
The IT Skills Incentive Program Senior Advisory Panel
adjudicates policy recommendations made by the IT Skills Incentive Panel. The
Chief Information Officer (CIO), the Deputy Assistant Secretary (DAS) for HR,
and the Dean of FSI/SAIT comprise the membership of this advisory panel.
5 FAM 119 Information Security STeering
Committee (ISSC)
(CT:IM-254; 12-03-2018)
a. The Information Security Steering Committee (ISSC)
was established by the Under Secretary for Management (M) in 2005. The ISSC is
a Department-wide deputy assistant secretary-level group consisting of owners
of information systems. The ISSC is co-chaired by the Chief Information
Security Officer and the Senior Coordinator for Security Infrastructure.
b. ISSC members advise and instruct in a consultative
and collaborative manner that stresses transparency, responsiveness, and
cooperation. This enables an information security program that is
service-oriented, cost-effective and meets statutory, regulatory, and business
needs in a timely manner. The ISSC:
(1) Develops priorities and advocates for the
availability of resources for the security of Department information systems;
(2) Recommends to the E-Gov Program Board revisions or
development of specific operating policies, objectives and priorities as
required by Federal information security standards and guidance;
(3) Provides clearance on high-impact documents (e.g.,
Information Security Program Plan and Security Architecture);
(4) Coordinates strategic direction of the
Departments information security efforts;
(5) Offers recommendations to the Department
concerning identified duplication and omissions relating to information
security;
(6) Supports Department funding/budget mechanisms as
they relate to information security;
(7) Establishes common or type metrics for information
security-related activities;
(8) Ensures that processes and procedures are in
effect to address Department information security requirements throughout the
lifecycle; and
(9) Empowers integrated information security teams
(IISTs) to pursue efficient implementation of and or address challenges in
meeting the Departments information security objectives.
c. The ISSC establishes integrated information
security teams (IISTs) that consist of cross-bureau working-level
subject-matter experts from varied information security areas. Teams may be
established or dissolved with the approval of the ISSC.