U.S. flag

An official website of the United States government

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock () or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Websites

If you would like to submit a relevant resource for the cloud community, please click here.


Acquisitions.gov

  • Authorship: Acquisitions.gov
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions
Description:

Acquisitions.gov is the collection and publication of the Federal Acquisition Regulations (FAR) and individual federal agency acquisition regulations (e.g., Defense Federal Acquisition Regulations (DFAR), General Services Acquisition Manual (GSAM)).


Department of Defense (DoD), Defense Acquisition University (DAU)

  • Authorship: Department of Defense (DoD), Defense Acquisition University (DAU)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .mil
  • Information: Acquisitions, Appropriations, Governance, Management, Operations, Workforce
Description:

The Department of Defense (DoD), Defense Acquisition University (DAU) provides a global learning environment to develop qualified acquisition, requirements, and contingency professionals who deliver and sustain effective and affordable warfighting capabilities. DoD, DAU provides specialized training focused on: acquisitions, auditing, business management, contracting, contracts management, engineering, earned value management, executive, facilities engineering, grants, information systems acquisitions, logistics, program management, production, requirements management, small business program, science and technology management, and test and evaluation.


Department of Defense (DoD), Defense Information Systems Agency (DISA)

  • Authorship: Department of Defense (DoD), Defense Information Systems Agency (DISA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .mil
  • Information: Acquisitions, Management, Operations, Security, Technology
Description:

Department of Defense (DoD), Defense Information Systems Agency (DISA) provides information technology (IT) and communications support to the President, Vice President, Secretary of Defense, the military services, the combatant commands, and any individual or system contributing to the defense of the United States.


Department of Defense (DoD), Defense Information Systems Agency (DISA), Computing Services, Cloud Computing, Cloud Service Support

  • Authorship: Department of Defense (DoD), Defense Information Systems Agency (DISA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .mil
  • Information: Security, Technology
Description:

The DoD Cloud Authorization Services (DCAS) team provides support in cloud service pre-screening, assessment, validation, and authorization process to ensures the Cloud Service Providers (CSPs) and Cloud Service Offering (CSOs) have met DoD Cloud Information Systems (IS) connection requirements and maintains a list of authorized services, under "Standard Offering" by DoD Impact Level (IL) and cloud service model (i.e., Infrastructure as a Service, Platform as a Service, Software as a Service).


Department of Defense (DoD), Defense Information Systems Agency (DISA), Computing Services, Cloud Computing

  • Authorship: Department of Defense (DoD), Defense Information Systems Agency (DISA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .mil
  • Information: Acquisitions, Management, Operations, Security, Technology
Description:

Department of Defense (DoD), Defense Information Systems Agency (DISA), Computing Services, Cloud Computing provides mature and standardized processes, centralized management, and partner-focused support for our mission partners' cloud environments. DoD, DISA performs data management of hardware components, software, and labor to create the stable environment within which cloud applications can operate.


Department of Defense (DoD), Department of the Air Force (AF), Office of the Chief Software Officer

  • Authorship: Department of Defense (DoD), Department of the Air Force (AF)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .mil
  • Information: Acquisitions, Appropriations, Community, Governance, Management, Operations, Security, Technology, Workforce
Description:

The Department of Defense (DoD), Department of the Air Force (AF), Office of the Chief Software Officer servers: As the AF's focal point for software, cloud and cybersecurity related impediments and enablers.
Provides software enterprise services that facilitate the implementation and adoption of innovative software best practices, cybersecurity solutions, Artificial Intelligence (AI), and Machine Learning (ML) technologies across AF Programs. Support AF Program Executive Officers and AF Program Managers. Coordinate policy efforts across DoD as the Co-lead for the DoD Enterprise DevSecOps Initiative with the DoD Chief Information Officer.


Department of Defense (DoD), Department of the Air Force (AF), Office of the Chief Software Officer, Cloud One Program Office

  • Authorship: Department of Defense (DoD), Department of the Air Force (AF)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .mil
  • Information: Acquisitions, Appropriations, Community, Governance, Management, Operations, Security, Technology, Workforce
Description:

The Department of Defense (DoD), Department of the Air Force (AF), Office of the Chief Software Officer, Cloud One Program Office provides state-of-the-art cloud computing platforms, technologies, approaches, and solutions. The Cloud One Program Office delivers and sustains war-winning IT capabilities to the DoD through the provisioning of common secure computing environments, standardized platforms, system migration and support services, and data management.


Department of Defense (DoD), Department of the Army, Enterprise Cloud Management Agency (ECMA)

  • Authorship: Department of Defense (DoD), Department of the Army
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .mil
  • Information: Acquisitions, Appropriations, Community, Governance, Management, Operations, Security, Technology, Workforce
Description:

The Department of Defense (DoD), Department of the Army, Enterprise Cloud Management Agency (ECMA) provides oversight and management for all Army cloud processes and activities. The ECMA increases Army readiness and lethality by continuously enhancing digital literacy; driving data, software and process transformation; and delivering a secure, globally dominant cloud ecosystem (e.g., cARMY), foundational to the Army modernization strategy and digital overmatch.


Department of Defense (DoD), Department of the Navy (DON), Program Executive Office for Digital and Enterprise Services (PEO Digital)

  • Authorship: Department of Defense (DoD), Department of the Navy (DON)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .mil
  • Information: Acquisitions, Governance, Management, Operations, Technology
Description:

The Department of Defense (DoD), Department of the Navy (DON), Program Executive Office for Digital and Enterprise Services (PEO Digital) is the DON's enterprise-wide information technology acquisition agent. PEO Digital is digitally transforming systems to evolve and deliver modern capabilities and technologies with speed, agility, and affordability to maintain the competitive edge while meeting demand signals from our user communities.

PEO Digital oversees a portfolio of enterprise-wide information technology programs designed to provide standard IT capabilities to Sailors at sea, Marines in the field and their support systems. PEO Digital ensures that these programs maximize value to warfighters by balancing costs with the capability delivered to the end-user.


Department of Defense (DoD), Enterprise Software Initiative (ESI)

  • Authorship: Department of Defense (DoD), Chief Information Officer (CIO)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .mil
  • Information: Acquisitions, Technology
  • Sub-Information: Software
Description:

The Department of Defense (DoD), Enterprise Software Initiative (ESI) is an official DoD initiative sponsored by the DoD Chief Information Officer (CIO) to lead in the establishment and management of enterprise Commercial Off The Shelf (COTS) Information Technology (IT) agreements, assets, and policies. DoD ESI lowers the total cost of ownership across the DoD, Coast Guard and Intelligence Communities for commercial software, IT hardware, and services.


Department of Homeland Security (DHS), Cybersecurity & Infrastructure Security Agency (CISA)

  • Authorship: Department of Homeland Security (DHS), Cybersecurity & Infrastructure Security Agency (CISA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Governance, Management, Operations, Security, Technology, Workforce
Description:

The Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA) builds the national capacity to defend against cyber-attacks and works with the federal government to provide cybersecurity tools, incident response services and assessment capabilities to safeguard the '.gov' networks that support the essential operations of partner departments and agencies.

CISA coordinates security and resilience efforts using trusted partnerships across the private and public sectors, and delivers technical assistance and assessments to federal stakeholders as well as to infrastructure owners and operators nationwide. CISA also delivers insights on these assessments related to current capabilities to identify gaps, which - along with an examination of emerging technologies - help determine the demand for future capabilities (both near- and long-term).

CISA enhances public safety interoperable communications at all levels of government to help partners across the country develop their emergency communications capabilities.

Working with stakeholders across the country, CISA conducts extensive, nationwide outreach to support and promote the ability of emergency response providers and relevant government officials to continue to communicate in the event of a natural disaster, act of terrorism, or other man-made disaster.

The National Risk Management Center (NRMC) is housed within the Cybersecurity and Infrastructure Security Agency (CISA). NRMC is a planning, analysis, and collaboration center working to identify and address the most significant risks to our nation's critical infrastructure.

NRMC works in close coordination with the private sector and other key stakeholders in the critical infrastructure community to: Identify; Analyze; Prioritize; and Manage the most strategic risks to our National Critical Functions - the functions of government and the private sector so vital to the United States that their disruption, corruption, or dysfunction would have a debilitating impact on security, national economic security, national public health or safety, or any combination.


Department of Homeland Security (DHS), Cybersecurity & Infrastructure Security Agency (CISA), Secure by Design and Secure by Default Program

  • Authorship: Department of Homeland Security (DHS), Cybersecurity & Infrastructure Security Agency (CISA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Security
  • Sub-Information: Information Protection Processes and Procedures, Risk Management, Supply Chain Risk Management (SCRM)
Description:

The Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Secure by Design and Secure by Default Program works with governments (i.e., Australia, Canada, United Kingdom, Germany, Netherlands, New Zealand) and industry partners (e.g., technology manufactures, software manufacturers) to make technology products (e.g., cloud, hardware, IoT, SaaS, software) secure-by-design and secure-by-default.

"Secure-by-Design” means that technology products are built in a way that reasonably protects against malicious cyber actors successfully gaining access to devices, data, and connected infrastructure.

“Secure-by-Default” means products are resilient against prevalent exploitation techniques out of the box without additional charge.


Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Continuous Diagnostics and Mitigation (CDM) Program

  • Authorship: Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Governance, Operations, Security, Technology, Workforce
Description:

The Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Continuous Diagnostics and Mitigation (CDM) Program provides a dynamic approach to fortifying the cybersecurity of government networks and systems. The CDM Program delivers cybersecurity tools, integration services, and dashboards that help participating agencies improve their security posture by: Reducing agency threat surface, increasing visibility into the federal cybersecurity posture, improving federal cybersecurity response capabilities, and streamlining Federal Information Security Modernization Act (FISMA) reporting.

The CDM Program was developed in 2012 to support government-wide and agency-specific efforts to provide risk-based, consistent, and cost-effective cybersecurity solutions to protect federal civilian networks across all organizational tiers.


Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM)

  • Authorship: Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Governance, Management, Operations, Security, Technology
Description:

The Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Information and Communications Technology (ICT) Supply Chain Risk Management (SCRM) works with government and industry partners to enhance the security and resilience of the global ICT supply chain composed of hardware, software, managed services from third-party vendors, suppliers, service providers, and contractors.


Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Trusted Internet Connection (TIC)

  • Authorship: Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Governance, Management, Operations, Security, Technology
Description:

The Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Trusted Internet Connection (TIC) initiative emphasis agile and responsive security solutions for external connections and the deployment of common tools at these access points that support the accelerated adoption of cloud, mobile, and other emerging technologies. The TIC initiative provides guidance to federal government agencies with the flexibility to secure distinctive computing scenarios in accordance with their unique risk tolerance levels.


Federal Acquisition Institute (FAI)

  • Authorship: Federal Acquisition Institute (FAI)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions, Workforce
Description:

The Federal Acquisition Institute (FAI) is responsible for fostering and promoting the development of a federal acquisition workforce. FAI facilitates and promotes career development and strategic human capital management for the acquisition workforce.

FAI coordinates with organizations such as the Office of Federal Procurement Policy, Chief Acquisition Officer Council, and the Interagency Acquisition Career Management Council to develop and implement strategies to meet the needs of the current and future acquisition workforce. In conjunction with its partners, FAI seeks to ensure availability of exceptional training, provide compelling research, promote professionalism, and improve acquisition workforce management.


Federal CIO Council

  • Authorship: Federal CIO Council
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions, Appropriations, Community, Governance, Management, Operations, Security, Technology, Workforce
Description:

The Federal CIO Council is the principal interagency forum for improving agency practices related to the design, acquisition, development, modernization, use, sharing, and performance of Federal Information Technology (IT) resources.


Federal CIO Council, Cloud & Infrastructure Community of Practice (C&I CoP)

  • Authorship: Federal CIO Council
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions, Appropriations, Community, Governance, Management, Operations, Security, Technology, Workforce
Description:

The Federal CIO Council, Cloud & Infrastructure Community of Practice (C&I CoP) provides a forum for federal cloud professionals to share informational resources as well as discuss and collaborate on cloud and infrastructure topics, such as cloud adoption, technologies, planning, migration, operations, training, and more. Access is restricted to authorized persons, Federal government employees and contractors with a Federal government email address.


General Services Administration (GSA), Federal Risk and Authorization Management Program (FedRAMP)

  • Authorship: General Services Administration (GSA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Security
  • Sub-Information: Assessment & Analysis (A&A), Cybersecurity Monitoring, Information Protection Processes and Procedures, Risk Management
Description:

The General Services Administration (GSA), Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. FedRAMP enables the government (e.g., agencies) to shift from old insecure legacy IT to mission-enabling, secure, and cost effective cloud-based solutions. FedRAMP manages a core set of processes to ensure effective, repeatable cloud security for the government and has established a mature marketplace to increase utilization and familiarity with cloud services while facilitating collaboration across government through open exchanges of lessons learned, use cases, and tactical solutions.


General Services Administration (GSA), Office of Government-wide Policy (OGP), Data Center and Cloud Optimization Initiative Program Management Office (DCCOI PMO)

  • Authorship: General Services Administration (GSA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions, Appropriations, Community, Governance, Management, Operations, Security, Technology, Workforce
Description:

The General Services Administration (GSA), Office of Government-wide Policy (OGP), Data Center and Cloud Optimization Initiative Program Management Office (DCCOI PMO) assists federal agencies with complying with federal policies impacting data center, cloud, and IT infrastructure optimization by acquiring technologies, tools, and evidence-based best practices to meet requirements in "Office of Management and Budget (OMB) Memorandum M-19-19: Update to Data Center Optimization Initiative (DCOI)" and the Federal Cloud Computing Strategy "Cloud Smart".


General Services Administration (GSA), Procurement Innovation Resource Center (PIRC)

  • Authorship: General Services Administration (GSA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions
  • Sub-Information: Commercial Solutions Opening (CSO)
Description:

The General Services Administration (GSA), Procurement Innovation Resource Center (PIRC) is an internal GSA resource center that provides guidance and tools to assist GSA acquisition teams with incorporating innovation into procurements. Section 880 of the Fiscal Year 2017 (FY17) National Defense Authorization Act (NDAA) authorized GSA to implement a pilot program to competitively procure innovative commercial items, technologies, and services using Commercial Solutions Opening (CSO) procedures.


General Services Administration (GSA), Tech at GSA

  • Authorship: General Services Administration (GSA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Operations, Technology
Description:

The General Services Administration (GSA), Tech at GSA provides resources and access to Guides (e.g., Agile, DevSecOps), Playbooks (e.g., Cloud, Database, Identity, Robotic Process Automation), and GSA Office of the Chief Technology Officer Tech Talks presentations that support the modernization of GSA technology.


General Services Administration (GSA), Technology Transformation Services (TTS)

  • Authorship: General Services Administration (GSA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions, Appropriations, Community, Governance, Management, Operations, Security, Technology, Workforce
Description:

The General Services Administration (GSA), Technology Transformation Services (TTS) applies modern methodologies and technologies to improve delivery of information and services to the public. TTS helps agencies make their services more accessible, efficient, and effective with modern applications, platforms, processes, personnel, and software solutions. TTS Offices and Programs include: 18F, IT Modernization Centers of Excellence (CoE), Presidential Innovation Fellowship (PIF), and TTS Solutions.


General Services Administration (GSA), Technology Transformation Services (TTS), 18F

  • Authorship: General Services Administration (GSA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions, Management, Operations, Security, Technology, Workforce
Description:

The General Services Administration (GSA), Technology Transformation Services (TTS), 18F partners with governments to improve the user experience of government services by helping them build and buy technology. 18F helps the government define their strategy and work towards a solution, from discovery through acquisition. By sharing design and procurement best practices, we coach our partners to build successful projects now and prepare them to continue their modernization efforts into the future. Governments partner with 18F to deliver projects that fulfill their mission, stay within budget, and use leading technology practices.


General Services Administration (GSA), Technology Transformation Services (TTS), IT Modernization Centers of Excellence (CoE)

  • Authorship: General Services Administration (GSA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions, Community, Governance, Management, Operations, Security, Technology, Workforce
Description:

The General Services Administration (GSA), Technology Transformation Services (TTS), IT Modernization Centers of Excellence (CoE) accelerate IT modernization at federal agencies by leveraging private sector innovation and government services while centralizing best practices and expertise for holistic transformation. The GSA, TTS, CoE leverage commercially available solutions and expertise from industry to deliver enterprise transformation initiatives in partnership with agencies in the areas of Artificial Intelligence (AI), Cloud Adoption (CA), Contact Center, Customer Experience (CX), Data and Analytics, and Infrastructure Optimization (IO).


General Services Administration (GSA), Technology Transformation Services (TTS), IT Modernization Centers of Excellence (CoE), Cloud Adoption (CA)

  • Authorship: General Services Administration (GSA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions, Appropriations, Community, Governance, Management, Operations, Security, Technology, Workforce
Description:

The General Services Administration (GSA), Technology Transformation Services (TTS), IT Modernization Centers of Excellence (CoE), Cloud Adoption (CA) facilitates successful integration of cloud services by helping agencies select and design the right migration path. To support the implementation process, the Cloud Adoption team has developed a set of services based on best practices and successful use cases, both in the commercial and government sectors.


General Services Administration (GSA), Technology Transformation Services (TTS), IT Modernization Centers of Excellence (CoE), Infrastructure Optimization (IO)

  • Authorship: General Services Administration (GSA)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions, Appropriations, Community, Governance, Management, Operations, Security, Technology, Workforce
Description:

The General Services Administration (GSA), Technology Transformation Services (TTS), IT Modernization Centers of Excellence (CoE), Infrastructure Optimization (IO) supports partner agencies in assessing existing infrastructure and business needs, identifying modernization opportunities, and orchestrating efforts as they evolve. Services include consolidating federated data centers into a single enterprise facility, modernizing the application landscape, driving out IT infrastructure cost inefficiencies, improving security, and positioning agencies for future improvements.


Government Accountability Office (GAO)

  • Authorship: Government Accountability Office (GAO)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions, Appropriations, Governance, Management, Operations, Security, Technology, Workforce
Description:

The Government Accountability Office (GAO) is an independent nonpartisan agency that works for Congress. Often called the "Congressional watchdog" GAO examines how taxpayer dollars are spent and provides Congress and federal agencies with objective, non-partisan, fact-based information to help the government save money and work more efficiently.


Government Accountability Office (GAO), Bid Protests & Appropriations Law

  • Authorship: Government Accountability Office (GAO)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions, Appropriations, Governance
Description:

The Government Accountability Office (GAO), Bid Protests & Appropriations Law issues legal opinions and decisions to Congress and federal agencies on the use of, and accountability for, public funds, including ruling on potential violations of the Antideficiency Act (ADA). This section includes appropriations law opinions and decisions, as well as GAO's Red Book "Principles of Federal Appropriations Law", information on our appropriations law training, and more.


National Counterintelligence and Security Center (NCSC)

  • Authorship: National Counterintelligence and Security Center (NCSC)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Management, Operations, Security
Description:

The National Counterintelligence and Security Center (NCSC), is led and staffed by a cadre of professionals with decades of national security and law enforcement expertise and varied analytic, investigative and policymaking backgrounds. Working with partners across the Executive Branch Departments and Agencies and the private sector, NCSC provides expertise in several mission areas including insider threat, supply chain risk management, and personnel security.


National Counterintelligence and Security Center (NCSC), Supply Chain Risk Management (SCRM)

  • Authorship: National Counterintelligence and Security Center (NCSC)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Management, Operations, Security
Description:

The National Counterintelligence and Security Center (NCSC), Supply Chain Risk Management (SCRM) works with its partners to assess and mitigate the activities of foreign intelligence entities and other adversaries who attempt to compromise the supply chains (e.g., steal America's intellectual property, corrupt software, surveil critical infrastructure, and carry out other malicious activities) of government and industry.


National Institute of Standards and Technology (NIST)

  • Authorship: National Institute of Standards and Technology (NIST)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Governance, Management, Operations, Security, Technology, Workforce
Description:

The National Institute of Standards and Technology (NIST) promotes US innovation and industrial competitiveness by advancing measurement science, standards, and technology in ways that enhance economic security and improve quality of life.


National Institute of Standards and Technology (NIST), Computer Security Resource Center (CSRC)

  • Authorship: National Institute of Standards and Technology (NIST)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Governance, Management, Operations, Security, Technology, Workforce
Description:

The National Institute of Standards and Technology (NIST), Computer Security Resource Center (CSRC) provides resources on computer, cyber, information security, and information privacy.

The Computer Security Division (CSD) conducts research, development and outreach to provide standards and guidelines, mechanisms, tools, metrics, and practices to protect information and information systems. It consists of the following groups: Cryptographic Technology, Secure Systems and Applications, Security Components and Mechanisms, Security Engineering and Risk Management, and Security Testing, Validation, and Measurement.

The Applied Cybersecurity Division (ACD) implements practical cybersecurity and privacy through outreach and the effective application of standards and best practices necessary for the adoption of cybersecurity capabilities. It consists of the following groups: Cybersecurity and Privacy Applications, National Cybersecurity Center of Excellence (NCCoE), and National Initiative for Cybersecurity Education (NICE).


National Institute of Standards and Technology (NIST), Cybersecurity Framework

  • Authorship: National Institute of Standards and Technology (NIST)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Security
Description:

The National Institute of Standards and Technology (NIST), Cybersecurity Framework focuses on using business drivers to guide cybersecurity activities and considering cybersecurity risks as part of the organization's risk management processes. The Framework consists of three parts: the Framework Core, the Implementation Tiers, and the Framework Profiles. The Framework Core is a set of cybersecurity activities, outcomes, and informative references that are common across sectors and critical infrastructure. Elements of the Core provide detailed guidance for developing individual organizational Profiles. Through use of Profiles, the Framework will help an organization to align and prioritize its cybersecurity activities with its business/mission requirements, risk tolerances, and resources. The Tiers provide a mechanism for organizations to view and understand the characteristics of their approach to managing cybersecurity risk, which will help in prioritizing and achieving cybersecurity objectives.


National Institute of Standards and Technology (NIST), National Initiative for Cybersecurity Education (NICE)

  • Authorship: National Institute of Standards and Technology (NIST)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Workforce
  • Sub-Information: Development, Identification, Knowledge Skills and Abilities (KSAs), Management, Qualifications, Recruitment, Retention, Training
Description:

The National Institute of Standards and Technology (NIST), National Initiative for Cybersecurity Education (NICE) mission is to energize, promote, and coordinate a robust community working together to advance an integrated ecosystem of cybersecurity education, training, and workforce development.

NICE coordinates with government, academic, and industry partners to build on existing successful workforce programs, facilitate change and innovation, and bring leadership and vision to increase the number of skilled cybersecurity professionals. NICE also works to provide organizations with a common, consistent lexicon that categorizes and describes cybersecurity work to improve the communications needed to identify, recruit, and develop cybersecurity talent.


Office of Management and Budget (OMB)

  • Authorship: Office of Management and Budget (OMB)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions, Appropriations, Community, Governance, Management, Operations, Security, Technology, Workforce
Description:

The Office of Management and Budget (OMB) serves the President of the United States in overseeing the implementation of the President's vision across the Executive Branch. Specifically, OMB's mission is to assist the President in meeting his policy, budget, management and regulatory objectives and to fulfill the agency's statutory responsibilities.


Office of Management and Budget (OMB), Best-In-Class (BIC)

  • Authorship: Office of Management and Budget (OMB)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions
Description:

The Office of Management and Budget (OMB), Best-In-Class (BIC) designation identifies acquisition vehicles that satisfy key criteria defined by the OMB. Acquisition vehicles are designated BIC based on their ability to maximize the government's shared purchasing power (e.g., volume discounts), facilitate efficiencies (e.g., reduced administrative costs), and support the sharing of government-wide buying data. BIC acquisition vehicles are recommended - and in some cases required -for use.


Office of Management and Budget (OMB), Office of Federal Procurement Policy (OFPP)

  • Authorship: Office of Management and Budget (OMB)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions, Governance
Description:

The Office of Management and Budget (OMB), Office of Federal Procurement Policy (OFPP) plays a central role in shaping the policies and practices federal agencies use to acquire the goods and services they need to carry out their responsibilities. OFPP was established by Congress in 1974 to provide overall direction for government-wide procurement policies, regulations, and procedures and to promote economy, efficiency, and effectiveness in federal acquisitions.


Office of Personnel Management (OPM)

  • Authorship: Office of Personnel Management (OPM)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Workforce
Description:

The Office of Personnel Management (OPM) serves as the chief human resources agency and personnel policy manager for the Federal Government. OPM provides human resources leadership and support to Federal agencies and helps the Federal workforce achieve their aspirations as they serve the American people. OPM directs human resources and employee management services, administers retirement benefits, manages healthcare and insurance programs, oversees merit-based and inclusive hiring into the civil service, and provides a secure employment process.


US Digital Service (USDS)

  • Authorship: US Digital Service (USDS)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions, Governance, Management, Operations, Security, Technology, Workforce
Description:

The US Digital Service (USDS) deploys small, responsive groups of designers, engineers, product managers, and bureaucracy specialists to work with and empower civil servants. These multi-disciplinary teams bring best practices and new approaches to support government technology and design modernization efforts.


US Digital Service (USDS), TechFAR Hub

  • Authorship: US Digital Service (USDS)
  • Status: Active
  • Resource Type: Website
  • Sub-Resource Type: .gov
  • Information: Acquisitions, Workforce
Description:

The US Digital Service (USDS), TechFAR Hub provides a connection between those who are doing digital service acquisitions and those who want to. It is part of a greater collaborative effort with the Office of Federal Procurement Policy, Acquisition Innovation Labs, and GSA's Acquisition Gateway to bring together a vibrant and curious community who want to do the best for their respective agencies and the US citizen through improved acquisition processes.