CIO - Library An official website of the United States government Here's how you know Official websites use .gov A .gov website belongs to an official government organization in the United States. Secure .gov websites use HTTPS A lock ( lock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites. Skip to main content (Press Enter). Toggle navigation Chief Information Officer U.S. Department of War Chief Information Officer Search Search Chief Information Officer: Search Search Chief Information Officer: Search Home About DoW CIO Awards Bios History In the News Organization DCIO C3 DCIO CS DCIO IE DCIO RA Library Cyber Workforce Cyber Workforce Development Framework Management CAEO Cyber Apprenticeship Program Rotational Programs CITEP FRCWP Workforce Integration Strategy DoW Cyber Service Academy Cyber Excepted Service (CES) Resources CMMC About Resources-Documentation FAQs Contact Contact us Speaking Engagements Library Policies & Relevant Documents DoW CIO Charter Business Case Analysis (BCA) DoW IT Business Case Analysis Template Use of Enterprise IT Standard BCA, DoW CIO Memo w/ Attachment Cyber Workforce Cyber Apprenticeship Memo Cyber Workforce Strategy Implementation Plan DoWD 8140.01 - Cyberspace Workforce Management DoWI 8140.02 - Identification, Tracking, and Reporting of Cyberspace Workforce Requirements DoWM 8140.03 - Cyberspace Workforce Qualification & Management Program Cybersecurity in the Adaptive Acquisition Framework Acquisition of Services Pathway Integration with the RMF Defense Business Systems Pathway Integration with RMF Major Capability Acquisition Pathway Integration with RMF Middle Tier of Acquisition Pathway Integration with RMF Software Acquisition Pathway Integration with RMF Transitioning from the Urgent Capability Acquisition Pathway to another Pathway Program of Record Urgent Capability Acquisition Pathway Integration with RMF Defend Against Cyber Attacks ATO 101 for Small Businesses Cybersecurity Reciprocity Playbook DOW AI Cybersecurity Risk Management Tailoring Guide DoW CISO Special Session Town Hall (Feb 2022) DoW Cybersecurity Activities Performed for Cloud Service Offerings DoW Cybersecurity Reference Architecture DoWI 5205.13, Defense Industrial Base (DIB) Cybersecurity (CS) Activities DoWI 8310.01, Information Technology Standards in the DoW DoWI 8500.01, Cybersecurity DoWI 8510.01, Risk Management Framework (RMF) for DoW Systems DoWI 8530.01-M, DoW Computer Network Defense Service Provider Certification and Accreditation DoWI 8540.01, Cross Domain (CD) Policy DoWI 8582.01, Security of Non-DoW Info Sys. Processing Unclass Non-Public DoW Information Memo: Continuous Authorization To Operate (cATO) Memo: FEDRAMP Equivalency for Cloud Service Providers Memo: Reciprocity Standards Guide for Foreign Partners Zero Trust Capabilities and Activities Zero Trust Capability Execution Roadmap Zero Trust for Operational Technology Activities and Outcomes Zero Trust PfMO Newsletter - Nov2024 Zero Trust Strategy Placemats Digital Capabilities Acquisition Guidance Memo: COTS Information and Communication Supply Chain Risk Management Requirements for the Acquisition of Digital Capabilities Guidebook DoW CIO and DoW CISO Policy memos Memos (CAC required) Efficiently Using Cloud Cloud Access DoW Cloud Native Access Point (CNAP) Reference Design (RD) Memo - DoW JWCC & Next Steps to Rationalize Cloud Use Across the DoW Cloud Security DoW Cloud Security Playbook Overview DoW Cloud Security Playbook Volume 1 DoW Cloud Security Playbook Volume 2 FinOps DoW Cloud FinOps Strategy Empower Mobile Data Access DoWI 8100.02, Use of Commercial Wireless Devices, Services, and Technologies in the Department of War DoWI 8420.01, Commercial Wireless Local-Area Network (WLAN) Devices, Systems, and Technologies DoW Unclassified Wireless Mobile Services and Devices Spiral 4 Memo: Use of Non-Government Owned Mobile Devices Memo: Use of Text Messages on Mobile Devices and RM Memo: Use of Unclassified Mobile Applications in the DoW Securing Your Home Network Telework Do's & Don'ts Identity, Credential, and Access Management (ICAM) DoW CIO ICAM Placemat DoW CIO Memorandum: DoW Mobile Public Key Infrastructure (PKI) Credentials DoW Enterprise Identity, Credential, and Access Management (ICAM) Reference Design DoWI 8520.02, Public Key Infrastructure (PKI) and Public Key (PK) Enabling DoWI 8520.03, Identity Authentication for Information Systems DoWI 8520.04, Access Management for DoW Information Systems ICAM Workflow Implementation Guide: Automated Account Provisioning and Access Governance Identity, Credential, and Access Management (ICAM) Federation Framework Identity, Credential, and Access Management (ICAM) Strategy Memo: Accelerating Adoption of Identity, Credential, and Access Management Memo: Implementation of Enterprise Identity, Credential, and Access Management for the DoW Secret Fabric Memo: Modernizing System Access Authorization Requests and Account Provisioning through ICAM Workflows Memo: Multi-Factor Authentication (MFA) for Unclassified & Secret DoW Networks Memo: Remediation of Information Technology-based Material Weaknesses Impacting Financial Auditability Modernizing the Common Access Card - Streamlining Identity and Improving Operational Interoperability Maximize Spectrum Access to Enhance Operational Effectiveness 2020 DoW EMS Superiority Strategy DoW Principles on Mission Effectiveness and Spectrum Efficiency with attachment DoW Emerging Mid-Band Radar Spectrum Sharing (EMBRSS) Feasibility Assessment Report (Redacted) DoWI 3222.03 Electromagnetic Environmental Effects (E3) Program DoWI 4650.01, Policy and Procedures for Management and Use of the Electromagnetic Spectrum DoWI 8320.05, Electromagnetic Sharing Data Enterprise Satellite Communications Management and Control Implementation Plan Modern Software Practices DoW Software Modernization Strategy DoW Software Modernization Implementation Plan Summary for FY25-26 Memo: Accelerating Secure Software Memo: Preparing for Migration to Post Quantum Cryptography Software Fast Track RFI Combined Summary DevSecOps Document Set DoW Enterprise DevSecOps Fundamentals DoW Enterprise DevSecOps Activities & Tools Guidebook DevSecOps Fundamentals Guidebook: Activities & Tools (xlsx) DevSecOps Playbook The State of DevSecOps Report DevSecOps Reference Designs DoW Enterprise DevSecOps Reference Design: CNCF Kubernetes DoW Enterprise DevSecOps Reference Design: CNCF Multi-Cluster Kubernetes DRAFT: DOW AWS Managed Service DRAFT: DOW Cloud IaC + GitHub + Azure Pathway to Reference Design Open Source Software Software Development and Open Source Software Memorandum Continuous Authority to Operate Memo: Continuous Authorization to Operate (cATO) DevSecOps Continuous Authorization to Operate (cATO) Evaluation Criteria DevSecOps Continuous Authorization Implementation Guide Modernize the Networks DoWI 5000.82, Acquisition of Information Technology (IT) DoWD 8000.01, Management of the Department of War Information Enterprise DoWI 8010.01, Department of War Information Network (DOWIN) Transport DoWI 8330.01, Interoperability of Information Technology (IT), Including National Security Systems DoWI 8410.01, Internet Domain Name and Internet Protocol Address Space Use and Approval DoWI 8551.01, Ports, Protocols, and Services Management (PPSM) Memo: Enterprise Architecture Requirements for DoW Emergency Mass Warning and Notification (EMWN) Systems Share with Mission Partners DoWI 8110.01, Mission Partner Environment (MPE) Information Sharing Capability Implementation DoWI 8170.01, Online Information Management and Electronic Messaging Architectures & Strategies DIB CS Strategy DoW Architecture Framework DoW C3 Strategy DoW Private 5G Deployment Strategy DoW Cyber Workforce Strategy DoW Cybersecurity Reference Architecture DoW OCONUS Cloud Strategy DoW Privacy Impact Assessments (PIA) DoW Records Strategy DoW Software Modernization Strategy DoW Zero Trust Strategy DoW Zero Trust Reference Architecture Fulcrum: DoW IT Advancement Strategy ICT-SCRM Strategy Related Strategies DoW AI Strategy (Summary) DoW Cyber Strategy (Summary) DoW Data Strategy About DoW CIO Contact Us War.gov DoW Careers External Links Disclaimer FOIA Information Quality No FEAR Act Open Government Plain Writing Privacy Impact Assessments Privacy Policy Privacy Program Public Use Notice Section 508 Site Map Social Media Strategic Plan USA.gov Web Policy Stay Connected Hosted by Department of War Information Activity - WEB.mil