Friday 28 February 2014

Commanders of Army components, Army commands, Army service component commands

 The Army CIO/G–6, Army Cyber Command/Second U.S. Army, and ACOM, ASCC, and DRU (as authorized by their respective HQDA elements) commanders are strategic partners. Together, they achieve the standardization, compatibili-ty, interoperability Enterprise Email, security, and resourcing of the LandWarNet global network enterprise to ensure Warfighter decision superiority. For the internal IM and IT responsibilities of their commands, commanders will—

a. Establish a senior IM official who is responsible for implementing the command’s IM and IT program in accordance with IM and IT policies, as prescribed by the Army CIO. Command senior IM officials will directly supervise the IM staff, related programs, and activities as prescribed by the Army Cyber Command/Second U.S. Army, including to—
http://www.nationalguard.mil/news/archives/2012/04/images/043012-Kuwait-full.jpg
(1)    Provide, as required, representation to the Army CIO EB and associated working groups and committees.

(2)    Identify the command’s IT requirements and ensure that mission requirements are validated, coordinated, and integrated in accordance with AR 71–9. Collaborate with NECs to obtain command-unique IT requirements beyond common-use services and when acquiring any mission-unique IT products.

(3)    Monitor command mission-related IM requirements throughout their life cycle, including those requirements for subordinate organizations located on other installations for IT requirements not included as part of established, common use IT.
(4)    Submit requests and requirements for mission-driven, installation-level IT infrastructure implementations (out-side cable plant connectivity, campus area switching upgrades, and so forth) to the local installation NEC for processing through NETCOM to the Army CIO/G–6 for ultimate approval or disapproval (see DA Pam 25–1–1 for complete process).

(5)    Fund command-unique IT requirements in support of mission and business, including long-haul communications, IA, and other IT requirements not identified as part of common-use IT or LandWarNet global network enterprise capability.

(6)    Coordinate IT plans, programs, and requirements with appropriate information assurance managers in accordance with AR 25–2.

(7)    Develop, manage, and maintain IT contingency plans, as prescribed by NETCOM, to ensure the uninterrupted execution of essential missions and functions under all conditions (see DA Pam 25–1–2).

(8)    Obtain certificates of networthiness supported by the application Security Technical Implementation Guide (STIG), authority to operate, and AIC.

Validate IP address requests from subordinates and ensure that only IP addresses registered by the Army through the procedures published by Army Cyber Command/Second U.S. Army are employed on networks within their purview.
http://usarmy.vo.llnwd.net/e2/rv5_images/yearinphotos/2011/photos/october/full/army_2011_1008-2.jpg
(10)    Develop AEA artifacts for respective command-unique functions and act as the integrator for any “system of systems” under their purview, as prescribed by the Army CIO (see DA Pam 25–1–1).

(11)    Enforce DISR compliance for designated systems.

Analyze and revise mission-related and administrative work processes necessary to complement pending, significant IT investments.

No comments:

Post a Comment