What is the approved products list?
What is the approved products list?
The Department of Defense Information Network (DoDIN) Approved Products List (APL) is the single consolidated list of products that have completed Cybersecurity (CS) and Interoperability (IO) certification.
What is the DISA APL?
The DoDIN APL is an acquisition decision support tool for DoD organizations interested in procuring equipment to add to the DISN to support their mission. The DoDIN APL is managed by the Approved Products Certification Office (APCO). Contact us: disa.meade.ie.list.approved-products-certification-office@mail.mil.
What is DISA approval?
The purpose of Department of Defense Information Network Approved Products List (DODIN APL) is to maintain a single consolidated list of products that have completed Interoperability (IO) and Cybersecurity certification.
Is WhatsApp DoD approved?
“The use of WhatsApp violates the strict compliance requirements across most government agencies like the DoD,” Wallenstrom says. “Consumer products like WhatsApp have no interest in adhering to the compliance rules that govern a large organization.
What is Jfhq DoDIN?
The Joint Force Headquarters-Department of Defense Information Network (JFHQ-DODIN) is partnering with a broad base of national security organizations and industry to counter an increasing threat to U.S. forces and their operations worldwide.
Is Ubuntu DoD approved?
The Ubuntu operating system must implement DoD-approved encryption to protect the confidentiality of remote access sessions.
Can US Army use Instagram?
Detailed Summary: The U.S. Army On Instagram The official U.S. Army account on Instagram is at: https://www.instagram.com/usarmy. They state that the account is for “exclusive photos & videos of Soldiers around the globe!” The US Army’s website: www.army.mil.
Can you use Instagram in the army?
Policies and Guidance Do not use non-DoD-controlled electronic messaging services to process nonpublic DoD information, regardless of the service’s perceived appearance of security (e.g., “private” Instagram accounts, “protected” tweets, “private” Facebook groups, “encrypted” WhatsApp messages).
What is a Cyber Tasking Order?
A cyber tasking order (CTO) is a. [t]asking document used by the AF cyber component commander to task assigned AF cyber forces to perform specific actions at specific time frames in support of AF and Joint requirements.
What is Jfhq C?
Janovic assumed duty as the deputy commander of Joint Force Headquarters – Cyber (JFHQ-C), U.S. Army Cyber Command on Aug. 16, 2019. The JFHQ-C provides cyberspace support to U.S. Central Command, U.S. Africa Command and U.S. Northern Command.
What is a Stig benchmark?
A Security Technical Implementation Guide (STIG) is a configuration standard consisting of cybersecurity requirements for a specific product. The use of STIGs enables a methodology for securing protocols within networks, servers, computers, and logical designs to enhance overall security.
What is LTS Stig?
The Canonical Ubuntu 18.04 LTS Security Technical Implementation Guide (STIG) is published as a tool to improve the security of the Department of Defense (DoD) information systems. The requirements were developed from the General Purpose Operating System Security Requirements Guide (GPOS SRG).