How to Gain an Absolutely Unfair Advantage at Security Reviews

 


By: Jeffrey W. Bennett, SAPPC, SFPC, ISOC, ISP

Demonstrating NISPOM compliance requires both an in-depth knowledge of NISPOM requirements and the ability to grasp administrative tasks.

For example, the cleared company’s Senior Management Official (SMO) and Facility Security Officer (FSO) implement the NISPOM within their organization to address risk to classified information. While these leaders oversee and execute NISPOM requirements, there may be issues with demonstrating how they are meeting compliance. With a bit of organization, compliance can be easily demonstrated with the correct artifacts and documentation.

In my newsletter, I tackle NISPOM compliance and lead with three pillars. One of which is a continuous study of NISPOM and application of FSO and NISPOM professional development; both critical to technically proficiency. The other resource is the Self-Inspection Handbook for NISP Contractors, which covers all NISPOM topics.

Using the handbook as a professional development and assessment strategy, let’s tackle how to demonstrate compliance under the “Procedures” topics.

One task is the identification of a Senior Management Official (SMO) who is responsible for overseeing the security and Insider Threat programs, reporting requirements and security operations.

Compliance is measured by the SMO's execution of their role and delegation of tasks. When Defense Counterintelligence and Security Agency (DCSA) conducts the security review, they will determine how SMO is exercising their role, approving procedures and resourcing programs.

The SMO appoints the FSO and the Insider Threat Program Senior Official (ITPSO) in writing. Additionally, the SMO should sign, endorse and require the implementation of the following NISPOM required procedures:

  • Insider Threat Program
  • SEAD-3 Reporting
  • Standards, Practices and Procedures (SPP)

These procedures should be tailored for the organization. Once they signed and implemented, they can be incorporated into training, presentations and available to employees. Appointment memos and policies can be signed and available to DCSA for review. However, let’s level up.

For example, one question asks, "Has the company developed and implemented an Insider Threat Program endorsed by the SMO". The answers are: YES, NO or NA. You can select an option and move to the next question.

However, I always recommend populating the narrative space with how the practices are implemented. That way the FSO can rehearse answers, provide written documentation and verbally demonstrate how requirements are met. Let’s proceed to the narrative.

How Implemented/Notes: _________________________________

This provides a white space for answers. Take the opportunity to write explanations as completely as possible. Most answers may translate to address DCSA’s Gold Standard Criteria, allowing the facility to possibly meet Commendable and Superior rating criteria.

For example:

How Implemented/Notes: “Our ITPSO developed a robust program policy and briefed it to the SMO who approved and signed it. The policy is available to each employee and referenced in Insider Threat Program training and Insider Threat Program Working Group training. Our organization also analyzes insider threat information with IXN Solutions or other third party vendor software"

Again, this narrative assists with the future DCSA review. However, it takes a well educated FSO to be up to the task. FSOs should incorporate professional development that provides increasing and measurable technical proficiency. This NISPOM foundation also provides understanding the application of The Self-Inspection Handbook for NISP Contractors. Attend professional development opportunities and use the handbook to verify education and compliance.

For professional development ideas visit NISPOM Central for more helpful hints and study resources, NISPOM books and NISPOM Training all available at NISPOM Central



Visit NISPOM Central for training resource

Comments

Popular posts from this blog

Appointing the Threat Program Senior Official (ITPSO)

How Contractors Get Facility Security Clearances

Protecting CUI on work Computers