X hits on this document

29 views

0 shares

0 downloads

0 comments

6 / 12

<Project Name>

3 TEAM Members

3.1 Certification and Accreditation Team

Project Role

Name

Chief Information Officer

<name>

Information System Owner

<name>

Senior Information Security Officer

<name>

Chief Information Security Officer

<name>

Authorizing Official

<name>

3.2 Security Team

[Define the security stakeholders in this section.  Include names, roles and contact information]

Name

Project Role

Security

<name>

System Security Manager

<system name(s) within scope of responsibility if applicable>

Developer

Security Critical Partner

C&A Authority

4 System categorization

4.1 Core Systems

Description – <System Name> is a new system under development intended to [describe system purpose].  

Security Manager – [Identify the security manager for this system]

Characterization – <System Name> is characterized as a <GSS, MA, or Other>.  

EPLC Security Approach (v<1.0>)Page 5 of 12

[Insert appropriate disclaimer(s)]

Document info
Document views29
Page views29
Page last viewedMon Dec 05 14:08:45 UTC 2016
Pages12
Paragraphs226
Words1820

Comments