Security should be built into and funded as part of the system architecture. Agencies should make
security's role explicit in information technology investments and capital programming. These
actions are entirely consistent with and build upon the principles outlined in OMB Memorandum
97-02. Accordingly, investments in the development of new or the continued operation of
existing information systems, both general support systems and major applications, proposed for
funding in the President's budget must:
1. Be tied to the agency's information architecture. Proposals should demonstrate that the
security controls for components, applications, and systems are consistent with and an integral
part of the information technology architecture of the agency.
2. Be well-planned, by:
a) Demonstrating that the costs of security controls are understood and are explicitly
incorporated in the life-cycle planning of the overall system in a manner consistent with
OMB guidance for capital programming.
b) Incorporating a security plan that discusses:
- the rules of behavior for the system and the consequences for violating those rules;
- personnel and technical controls for the system;
- methods for identifying, appropriately limiting, and controlling interconnections with other
systems and specific ways such limits will be monitored and managed;
- procedures for the on-going training of individuals that are permitted access to the system;
- procedures for the on-going monitoring of the effectiveness of security controls;
- procedures for reporting and sharing with appropriate agency and government authorities
indications of attempted and successful intrusions into agency systems;
- provisions for the continuity of support in the event of system disruption or failure.
3. Manage risks, by:
a) Demonstrating specific methods used to ensure that risks and the potential for loss are
understood and continually assessed, that steps are taken to maintain risk at an acceptable
level, and that procedures are in place to ensure that controls are implemented effectively
and remain effective over time.
b) Demonstrating specific methods used to ensure that the security controls are
commensurate with the risk and magnitude of harm that may result from the loss, misuse,
or unauthorized access to or modification of the system itself or the information it
manages.
c) Identifying additional security controls that are necessary to minimize risks to and
potential loss from those systems that promote or permit public access, other externally
accessible systems, and those systems that are interconnected with systems over which
program officials have little or no control.
4. Protect privacy and confidentiality, by:
a) Deploying effective security controls and authentication tools consistent with the
protection of privacy, such as public-key based digital signatures, for those systems that
promote or permit public access.
b) Ensuring that the handling of personal information is consistent with relevant
government-wide and agency policies, such as privacy statements on the agency's web
sites.
5. Account for departures from NIST Guidance. For non-national security applications, to
ensure the use of risk-based cost-effective security controls, describe each occasion when
employing standards and guidance that are more stringent than those promulgated by the National
Institute for Standards and Technology.
In general, OMB will consider new or continued funding only for those system investments that
satisfy these criteria and will consider funding information technology investments only upon
demonstration that existing agency systems meet these criteria. Agencies should begin now to
identify any existing systems that do not meet these decision criteria. They should then work
with their OMB representatives to arrive at a reasonable process and timetable to bring such
systems into compliance. Agencies should begin with externally accessible systems and those
interconnected systems that are critical to agency operations. OMB staff are available to work
with you if you or your staff have questions or need further assistance in meeting these
requirements.
Privacy Statement
The Budget Legislative Information Management Reform/GPRA Grants Management Financial Management Procurement Policy Information & Regulatory Policy Contact the White House Web Master
Help
Site Map
Graphic Version
T H E W H I T E H O U S E