Maintenance window scheduled to begin at February 14th 2200 est. until 0400 est. February 15th

(e.g. yourname@email.com)

Forgot Password?

    Or login with Facebook
    Defense Visual Information Distribution Service Logo

    Fast Track ATO

    Advanced Embed Example

    Add the following CSS to the header block of your HTML document.

    Then add the mark-up below to the body block of the same document.

    OH, UNITED STATES

    03.03.2022

    Video by Dave Pope 

    AF SBIR/STTR

    Welcome back!

    My name is Kelley Kiernan and I'm here representing the Department of the Air Force Chief Information Security Officer and AFWERX.

    This is number 5 in the Blue Cyber Series: Fast Track ATO. In our discussion today, we're going to be talking about ATOs or authorization to operate.

    Let me explain. An ATO is the official management decision given by a senior organizational official to authorize operation of an information system and to explicitly accept the risk to organizational operations, organizational assets, individuals, other organizations, and the nation based upon the implementation of an agreed upon set of security controls.

    ATOS often have conditions and assumptions which must be continually monitored by the program office which applied for the ATO. A fast-track ATO is based upon a cyber security baseline, a threat risk assessment, and an information system continuous monitoring strategy. These three factors allow for a risk-based decision on an ATO.

    Let's back up and talk about risk management framework or RMF. The RMF is a criteria that describes the processes for architecture, security, and monitoring of U.S. government IT systems. The RMF was created by the Department of Defense in 2010. It has been documented by NIST and serves as the foundation for federal data security strategy. The RMF requires secure data governance strategies and the performance of cyber risk modeling to identify cyber risk threat areas.

    The fast-track ATO accelerates RMF steps select through authorize. It does this by focusing on operationally relevant risk identification and threat informed risk assessments for Department of the Air Force systems and missions. What this means practically is that if there are items of low risk that are not quite secure an ATO can be issued with a due date for those items to become secure.

    You might be wondering: how do I get an ATO? Again, an ATO is a relationship between a Department of the Air Force program office and an authorizing official. The program office is a Department of the Air Force program of record which has the leadership and resources such as cybersecurity resources which can accept and manage the risk outlined in the ATO.

    You might be wondering where does the vendor come in? The vendor comes in when they complete the AO Determination Briefing. That briefing is a set of slides where the vendor describes comprehensively their IT and the risk to operations.

    How does the process begin? The process begins when an Airman or Guardian decides to acquire a vendor’s IT. They go then to their program office and inquire about how to begin. If there is no program office, go to the wing cybersecurity office to begin.
    Thanks for spending time with me during this discussion today. Today, we talked about the fast-track ATO and how to begin the process.

    A reminder that this presentation is not a substitute for reading the FAR and DFARS in your small business contract. My name is Kelly Kiernan and I'm here representing the Department of the Air Force Chief Information Security Officer and AFWERX.

    LEAVE A COMMENT

    VIDEO INFO

    Date Taken: 03.03.2022
    Date Posted: 03.11.2022 15:34
    Category: Video Productions
    Video ID: 834424
    VIRIN: 220304-F-WY291-1194
    Filename: DOD_108855250
    Length: 00:03:47
    Location: OH, US

    Video Analytics


    Downloads: 1
    High-Res. Downloads: 1

    PUBLIC DOMAIN