Access Control Policy (AC-1) |
2024/07 |
â— |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Access Control Procedures for Users (AC-2) |
2024/12 |
â— |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Application Deployment Certification Guidelines |
2025/02 |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Application Deployment Certification Policy |
2023/12 |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Application Deployment Certification Templates |
2015/08 |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Architecture Compliance Policy |
2023/04 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Business Continuity and Disaster Recovery Policy |
2017/10 |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
â— |
Change Management Policy |
2024/07 |
Ìý |
Ìý |
â— |
Ìý |
Ìý |
â— |
Ìý |
Configuration Management Policy (CM-1) |
2024/03 |
Ìý |
Ìý |
â— |
Ìý |
Ìý |
â— |
Ìý |
Copyrightable Works Policy |
2025/02 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
â— |
COTS-Cloud Policy |
2019/07 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Data Centers Access Control Procedure |
2019/04 |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Data Classification Policy |
2024/10 |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Data Exchange Policy |
2025/01 |
â— |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Digital Accessibility Policy |
2024/02 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Domain Name Policy & Procedure |
2022/12 |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Drone (Unmanned Aerial Vehicle) Policy |
2024/08 |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Enterprise Name Resolution Procedure |
2019/04 |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
FOAA Policy |
2017/10 |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Forensic Investigation Workflow Policy |
2023/11 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
GenAI Policy |
2025/02 |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Global Address List Standard |
2024/03 |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Hosting & Housing Policy |
2020/11 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Hosting-Customization Policy |
2019/07 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Information Privacy Policy |
2017/09 |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Information Security Policy |
2024/05 |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
InforME Network Services Policy |
2022/03 |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Infrastructure Deployment Certification Policy |
2022/03 |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Major Incident Procedure |
2023/12 |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Ìý |
Microsoft Low-Code Governance |
2023/12 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Microsoft Power Platform Governance: Quick Start |
2021/10 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Microsoft Power Platform: Escalation Path |
2021/10 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Mobile Device Policy |
2024/03 |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Network Device Management Policy |
2023/03 |
â— |
â— |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Off-Hours Coverage Policy |
2018/08 |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
OIT Building Access Procedures |
2019/04 |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Personnel Security Policy and Procedures (PS-1) |
2024/12 |
â— |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
â— |
Physical and Environmental Protection Policy (PE-1) |
2024/12 |
â— |
Ìý |
â— |
Ìý |
Ìý |
â— |
Ìý |
Policy, Standard or Procedure Creation Process |
2019/09 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Program Management Policy and Procedures (PM-1) |
2024/12 |
â— |
Ìý |
â— |
Ìý |
Ìý |
â— |
Ìý |
Public Data Jack Policy |
2018/07 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Remote Hosting Policy |
2025/01 |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Risk Assessment Policy and Procedures (RA-1) |
2024/12 |
â— |
Ìý |
â— |
Ìý |
â— |
Ìý |
Ìý |
Rules of Behavior Policy (PL-4) |
2024/10 |
Ìý |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
â— |
Salesforce Governance: Background |
2021/09 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Salesforce Governance: Details |
2021/09 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Salesforce Governance: Executive Summary |
2021/09 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
SDLC Policy |
2017/03 |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
SDLC Procedure |
2018/03 |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Security Assessment and Authorization Policy and Procedures (CA-1) |
2024/09 |
â— |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Security Awareness and Training Policy and Procedures (AT-1) |
2024/12 |
â— |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Security Planning Policy (PL-1) |
2024/08 |
â— |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Site-to-Site VPN Policy |
2024/10 |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Social Media for Personal Use Policy |
2015/05 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Social Media for State Business Policy |
2024/06 |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
System and Communications Protection Policy and Procedures (SC-1) |
2024/11 |
â— |
â— |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
System and Communications Protection Policy and Procedures for Defense in Depth (SC-2, 4, 5, 20, 21, 22, 23, 28, 32, 39) |
2024/03 |
â— |
â— |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
System and Communications Protection Policy and Procedures for Encryption Mechanisms (SC-12, 13, 17) |
2024/03 |
â— |
â— |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
System and Communications Protection Policy and Procedures for Specific Technologies (SC-6, 10, 15, 18, 19) |
2024/11 |
â— |
â— |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
System and Information Integrity Policy and Procedures (SI-1) |
2025/02 |
â— |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
System and Services Acquisition Policy and Procedures (SA-1) |
2024/12 |
â— |
Ìý |
â— |
â— |
Ìý |
â— |
â— |
Telecommunications Facilities and Wiring Specifications |
2021/12 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
User Device and Commodity Application Policy |
2025/02 |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Vendor Identity System Integration Policy |
2024/10 |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Vulnerability Scanning Procedure (RA-5) |
2024/12 |
â— |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Waiver Policy |
2024/09 |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
â— |
Ìý |
Web Standards |
2020/01 |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |
Website Acceptance Policy |
2020/01 |
Ìý |
â— |
Ìý |
Ìý |
Ìý |
Ìý |
Ìý |