Doc:M-08-05

From FISMApedia
Jump to: navigation, search
EXECUTIVE OFFICE OF THE PRESIDENT
OFFICE OF MANAGEMENT AND BUDGET
WASHINGTON, D.C. 20503


M-08-05 Implementation of Trusted Internet Connections (TIC)

November 20, 2007

M-08-05


MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES

FROM: Clay Johnson III
SUBJECT: Implementation of Trusted Internet Connections (TIC)


I am announcing the Trusted Internet Connections (TIC) initiative to optimize our individual network services into a common solution for the federal government. This common solution facilitates the reduction of our external connections, including our Internet points of presence, to a target of fifty. Additionally, the role of the US-CERT will be enhanced to improve our response capabilities. Each agency will be required to develop a comprehensive plan of action and milestones (POA&M) with a target completion date of June 2008. Initial agency POA&Ms must be sent to the Department of Homeland Security’s (DHS’s) National Cyber Security Division (NCSD) by January 8, 2008, for review and agreement with OMB, DHS, and the agency.

To discuss this initiative further, we are planning a government-wide meeting on Friday, November 30, 2007. I have asked Karen Evans, Administrator of the Office of Electronic Government and Information Technology and Robert Jamison, Deputy Under Secretary for National Protection & Programs Directorate, DHS, to ensure adequate collaboration among the various interested parties such as the Chief Information Officers and Chief Acquisition Officers.

Karen will be sending out the details for the government-wide meeting, including the agenda, to your Chief Information Officers and I will be inviting the President’s Management Council to attend the meeting as well.

With the work completed to date in the Lines of Business (LOB) initiatives for Information Systems Security and IT Infrastructure, the General Services Administration (GSA) award of the NETWORX contract for telecommunications service, and your current initiative to implement the secure desktop configurations (i.e. Federal Desktop Core ConfigurationFDCC), we are presented with a unique opportunity to optimize our network delivery capabilities. I ask for you to devote people from your agency to work on the development and implementation of TIC throughout the federal government.

Information assurance and cyber security are important priorities and a responsibility shared by all officials. If you have any questions, please contact Karen Evans at 202-395-1181.


References


Source