3.13 PROGRAM MANAGEMENT
Quick link to Program Management Summary Table
Table of contents
- -- PM-1 INFORMATION SECURITY PROGRAM PLAN
- -- PM-2 INFORMATION SECURITY PROGRAM LEADERSHIP ROLE
- -- PM-3 INFORMATION SECURITY AND PRIVACY RESOURCES
- -- PM-4 PLAN OF ACTION AND MILESTONES PROCESS
- -- PM-5 SYSTEM INVENTORY
- -- PM-6 MEASURES OF PERFORMANCE
- -- PM-7 ENTERPRISE ARCHITECTURE
- -- PM-8 CRITICAL INFRASTRUCTURE PLAN
- -- PM-9 RISK MANAGEMENT STRATEGY
- -- PM-10 AUTHORIZATION PROCESS
- -- PM-11 MISSION AND BUSINESS PROCESS DEFINITION
- -- PM-12 INSIDER THREAT PROGRAM
- -- PM-13 SECURITY AND PRIVACY WORKFORCE
- -- PM-14 TESTING, TRAINING, AND MONITORING
- -- PM-15 SECURITY AND PRIVACY GROUPS AND ASSOCIATIONS
- -- PM-16 THREAT AWARENESS PROGRAM
- -- PM-17 PROTECTING CONTROLLED UNCLASSIFIED INFORMATION ON EXTERNAL SYSTEMS
- -- PM-18 PRIVACY PROGRAM PLAN
- -- PM-19 PRIVACY PROGRAM LEADERSHIP ROLE
- -- PM-20 DISSEMINATION OF PRIVACY PROGRAM INFORMATION
- -- PM-21 ACCOUNTING OF DISCLOSURES
- -- PM-22 PERSONALLY IDENTIFIABLE INFORMATION QUALITY MANAGEMENT
- -- PM-23 DATA GOVERNANCE BODY
- -- PM-24 DATA INTEGRITY BOARD
- -- PM-25 MINIMIZATION OF PERSONALLY IDENTIFIABLE INFORMATION USED IN TESTING, TRAINING, AND RESEARCH
- -- PM-26 COMPLAINT MANAGEMENT
- -- PM-27 PRIVACY REPORTING
- -- PM-28 RISK FRAMING
- -- PM-29 RISK MANAGEMENT PROGRAM LEADERSHIP ROLES
- -- PM-30 SUPPLY CHAIN RISK MANAGEMENT STRATEGY
- -- PM-31 CONTINUOUS MONITORING STRATEGY
- -- PM-32 PURPOSING