An official website of the United States government
Here's how you know
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
Chief Information Officer
U.S. Department of War
Chief Information Officer
Search
Search Chief Information Officer:
Search
Search Chief Information Officer:
Search
Home
About DoW CIO
Awards
Bios
History
In the News
Organization
DCIO C3
DCIO CS
DCIO IE
DCIO RA
Library
Cyber Workforce
Cyber Workforce Development
Framework
Management
CAEO
Cyber Apprenticeship Program
Rotational Programs
CITEP
FRCWP
Workforce Integration
Strategy
DoW Cyber Service Academy
Cyber Excepted Service (CES)
Resources
CMMC
About
Resources-Documentation
FAQs
Contact
Contact us
Speaking Engagements
Library
Policies & Relevant Documents
DoW CIO Charter
New Items
Business System Rationalization Playbook
DoW Business Enterprise Architecture Guidebook
Business Case Analysis (BCA)
DoW IT Business Case Analysis Template
Use of Enterprise IT Standard BCA, DoW CIO Memo w/ Attachment
Cyber Workforce
Cyber Apprenticeship Memo
Cyber Workforce Strategy Implementation Plan
DoWD 8140.01 - Cyberspace Workforce Management
DoWI 8140.02 - Identification, Tracking, and Reporting of Cyberspace Workforce Requirements
DoWM 8140.03 - Cyberspace Workforce Qualification & Management Program
Cybersecurity in the Adaptive Acquisition Framework
Acquisition of Services Pathway Integration with the RMF
Defense Business Systems Pathway Integration with RMF
Major Capability Acquisition Pathway Integration with RMF
Middle Tier of Acquisition Pathway Integration with RMF
Software Acquisition Pathway Integration with RMF
Transitioning from the Urgent Capability Acquisition Pathway to another Pathway Program of Record
Urgent Capability Acquisition Pathway Integration with RMF
Defend Against Cyber Attacks
ATO 101 for Small Businesses
Cybersecurity Reciprocity Playbook
DOW AI Cybersecurity Risk Management Tailoring Guide
DoW CISO Special Session Town Hall (Feb 2022)
DoW Cybersecurity Activities Performed for Cloud Service Offerings
DoW Cybersecurity Reference Architecture
DoWI 5205.13, Defense Industrial Base (DIB) Cybersecurity (CS) Activities
DoWI 8310.01, Information Technology Standards in the DoW
DoWI 8500.01, Cybersecurity
DoWI 8510.01, Risk Management Framework (RMF) for DoW Systems
DoWI 8530.01-M, DoW Computer Network Defense Service Provider Certification and Accreditation
DoWI 8540.01, Cross Domain (CD) Policy
DoWI 8582.01, Security of Non-DoW Info Sys. Processing Unclass Non-Public DoW Information
Memo: Continuous Authorization To Operate (cATO)
Memo: FEDRAMP Equivalency for Cloud Service Providers
Memo: Reciprocity
Standards Guide for Foreign Partners
Zero Trust Capabilities and Activities
Zero Trust Capability Execution Roadmap
Zero Trust for Operational Technology Activities and Outcomes
Zero Trust PfMO Newsletter - Nov2024
Zero Trust Strategy Placemats
Digital Capabilities Acquisition Guidance
Memo: COTS Information and Communication Supply Chain Risk Management
Requirements for the Acquisition of Digital Capabilities Guidebook
DoW CIO and DoW CISO Policy memos
Memos
(CAC required)
Efficiently Using Cloud
Cloud Access
DoW Cloud Native Access Point (CNAP) Reference Design (RD)
Memo - DoW JWCC & Next Steps to Rationalize Cloud Use Across the DoW
Cloud Security
DoW Cloud Security Playbook Overview
DoW Cloud Security Playbook Volume 1
DoW Cloud Security Playbook Volume 2
FinOps
DoW Cloud FinOps Strategy
Empower Mobile Data Access
DoWI 8100.02, Use of Commercial Wireless Devices, Services, and Technologies in the Department of War
DoWI 8420.01, Commercial Wireless Local-Area Network (WLAN) Devices, Systems, and Technologies
DoW Unclassified Wireless Mobile Services and Devices Spiral 4
Memo: Use of Non-Government Owned Mobile Devices
Memo: Use of Text Messages on Mobile Devices and RM
Memo: Use of Unclassified Mobile Applications in the DoW
Securing Your Home Network
Telework Do's & Don'ts
Enterprise Architecture & Portfolio Rationalization
Business System Rationalization Playbook
DoW Business Enterprise Architecture Guidebook
Identity, Credential, and Access Management (ICAM)
DoW CIO ICAM Placemat
DoW CIO Memorandum: DoW Mobile Public Key Infrastructure (PKI) Credentials
DoW Enterprise Identity, Credential, and Access Management (ICAM) Reference Design
DoWI 8520.02, Public Key Infrastructure (PKI) and Public Key (PK) Enabling
DoWI 8520.03, Identity Authentication for Information Systems
DoWI 8520.04, Access Management for DoW Information Systems
ICAM Workflow Implementation Guide: Automated Account Provisioning and Access Governance
Identity, Credential, and Access Management (ICAM) Federation Framework
Identity, Credential, and Access Management (ICAM) Strategy
Memo: Accelerating Adoption of Identity, Credential, and Access Management
Memo: Implementation of Enterprise Identity, Credential, and Access Management for the DoW Secret Fabric
Memo: Modernizing System Access Authorization Requests and Account Provisioning through ICAM Workflows
Memo: Multi-Factor Authentication (MFA) for Unclassified & Secret DoW Networks
Memo: Remediation of Information Technology-based Material Weaknesses Impacting Financial Auditability
Modernizing the Common Access Card - Streamlining Identity and Improving Operational Interoperability
Maximize Spectrum Access to Enhance Operational Effectiveness
2020 DoW EMS Superiority Strategy
DoW Principles on Mission Effectiveness and Spectrum Efficiency with attachment
DoW Emerging Mid-Band Radar Spectrum Sharing (EMBRSS) Feasibility Assessment Report (Redacted)
DoWI 3222.03 Electromagnetic Environmental Effects (E3) Program
DoWI 4650.01, Policy and Procedures for Management and Use of the Electromagnetic Spectrum
DoWI 8320.05, Electromagnetic Sharing Data
Enterprise Satellite Communications Management and Control Implementation Plan
Modern Software Practices
DoW Software Modernization Strategy
DoW Software Modernization Implementation Plan Summary for FY25-26
Memo: Accelerating Secure Software
Memo: Preparing for Migration to Post Quantum Cryptography
Software Fast Track RFI Combined Summary
DevSecOps Document Set
DoW Enterprise DevSecOps Fundamentals
DoW Enterprise DevSecOps Activities & Tools Guidebook
DevSecOps Fundamentals Guidebook: Activities & Tools (xlsx)
DevSecOps Playbook
The State of DevSecOps Report
DevSecOps Reference Designs
DoW Enterprise DevSecOps Reference Design: CNCF Kubernetes
DoW Enterprise DevSecOps Reference Design: CNCF Multi-Cluster Kubernetes
DRAFT: DOW AWS Managed Service
DRAFT: DOW Cloud IaC + GitHub + Azure
Pathway to Reference Design
Open Source Software
Software Development and Open Source Software Memorandum
Continuous Authority to Operate
Memo: Continuous Authorization to Operate (cATO)
DevSecOps Continuous Authorization to Operate (cATO) Evaluation Criteria
DevSecOps Continuous Authorization Implementation Guide
Modernize the Networks
DoWI 5000.82, Acquisition of Information Technology (IT)
DoWD 8000.01, Management of the Department of War Information Enterprise
DoWI 8010.01, Department of War Information Network (DOWIN) Transport
DoWI 8330.01, Interoperability of Information Technology (IT), Including National Security Systems
DoWI 8410.01, Internet Domain Name and Internet Protocol Address Space Use and Approval
DoWI 8551.01, Ports, Protocols, and Services Management (PPSM)
Memo: Enterprise Architecture Requirements for DoW Emergency Mass Warning and Notification (EMWN) Systems
Share with Mission Partners
DoWI 8110.01, Mission Partner Environment (MPE) Information Sharing Capability Implementation
DoWI 8170.01, Online Information Management and Electronic Messaging
Architectures & Strategies
DIB CS Strategy
DoW Architecture Framework
DoW C3 Strategy
DoW Private 5G Deployment Strategy
DoW Cyber Workforce Strategy
DoW Cybersecurity Reference Architecture
DoW OCONUS Cloud Strategy
DoW Privacy Impact Assessments (PIA)
DoW Records Strategy
DoW Software Modernization Strategy
DoW Zero Trust Strategy
DoW Zero Trust Reference Architecture
Fulcrum: DoW IT Advancement Strategy
ICT-SCRM Strategy
Related Strategies
DoW AI Strategy (Summary)
DoW Cyber Strategy (Summary)
DoW Data Strategy