Information Requirements (Reports) Manual


Book Description

SECNAV M-5214.1: This Manual provides guidance to program managers and action officers who need to obtain information from the public, other Federal agencies, and within the DON and provides them with the procedures necessary to license their information requirements. It also provides guidance to assist information management control managers on the operation of their information collection programs.







DoD Procedures for Management of Information Requirements


Book Description

This Manual guides action officers who need to establish reports or obtain information from the public, other Federal agencies, or DoD Components and provides them with the necessary information to license their information requirements. In addition, it contains information to assist program managers in the operation of their reports management programs.




Marine Corps Manual, 1940


Book Description













Chairman of the Joint Chiefs of Staff Manual


Book Description

This manual describes the Department of Defense (DoD) Cyber Incident Handling Program and specifies its major processes, implementation requirements, and related U.S. government interactions. This program ensures an integrated capability to continually improve the Department of Defense's ability to rapidly identify and respond to cyber incidents that adversely affect DoD information networks and information systems (ISs). It does so in a way that is consistent, repeatable, quality driven, measurable, and understood across DoD organizations.




SIDPERS User Manual


Book Description




Federal Information System Controls Audit Manual (FISCAM)


Book Description

FISCAM presents a methodology for performing info. system (IS) control audits of governmental entities in accordance with professional standards. FISCAM is designed to be used on financial and performance audits and attestation engagements. The methodology in the FISCAM incorp. the following: (1) A top-down, risk-based approach that considers materiality and significance in determining audit procedures; (2) Evaluation of entitywide controls and their effect on audit risk; (3) Evaluation of general controls and their pervasive impact on bus. process controls; (4) Evaluation of security mgmt. at all levels; (5) Control hierarchy to evaluate IS control weaknesses; (6) Groupings of control categories consistent with the nature of the risk. Illus.