Computer Security (COMPUSEC) compliance ensures appropriate implementation of measures to protect all Air Force information system resources and information. The focus of this publication is on end-point security and ports, protocols, and services management within the Air Force (AF).

What is Compusec Air Force?

Computer Security (COMPUSEC) compliance ensures appropriate implementation of measures to protect all Air Force information system resources and information. The focus of this publication is on end-point security and ports, protocols, and services management within the Air Force (AF).

What Air Force directive governs the emergency response procedures for facilities?

Emergency Support Function responsibilities are further defined in Attachment 2, the Homeland Security Presidential Directive-5, National Incident Management System, Air Force Instruction 10-2501, and Air Force Tactics, Techniques, and Procedures 3-2.83.

What replaced AFI 31 401?

In advance of rewrite of AFI 31-401, or publication of AFI 16-1401, Enterprise Information Protection, the attachment to this AFGM provides guidance changes that are effective immediately.

What Air Force instruction provides a listing of real property equipment?

AFI 32-9002 Management of Real Property.

What AFI governs the security requirements for facilities?

Authority for these standards is derived from AFI 32-1024 and AFMAN 32-1084. They provide guidance for determining space allocations for Air Force facilities and may be used to program new facilities or evaluate existing spaces. Download the AF CATCode Spreadsheet for a complete list of all CATCodes.

What does MTO stand for Air Force?

MD Medical Department
M/T Manning Tables
MTD Military Training Division
Mtg Meeting
MTO Mediterranean Theater of Operations

What does emergency management do in the Air Force?

Air Force emergency management specialists are trained to handle recovery and response operations after natural disasters and man-made crises. Their goal is to reduce casualties and help those affected by a disaster to reach safety.

Which AFI governs emergency operations records?

AFI 33-322
AFI 33-322, which implements this CFR requirement, requires Commanders and Civilian Directors at all levels to provide a Records Management Plan “within 60 days of taking command” for implementing the RM Program for their units.

What is considered real property in the Air Force?

A complete real property inventory consists of all sites, including all lands and facilities, for which the Air Force has real property accountability, regardless of the organization using or funding the facility or land. Reference: AFI 32-9005.

What Air Force Instruction governs the security requirements for facilities?

What are the S functions in security forces?

The 628th SFS is organized into five S-Functions and staff: the Commander’s Staff, S-1 Personnel, S-2 Intelligence, S-3 Operations and Training, S-4 Logistics and S-5 Plans and Programs. The supply section falls under the S-4 section.

What is real property in the Air Force?

A complete real property inventory consists of all sites, including all lands and facilities, for which the Air Force has real property accountability, regardless of the organization using or funding the facility or land. Reference: AFI 32-9005. 1.2.

What is the DOJ policy on processing of classified information?

We identified three areas of concern with DOJ policy Standard 1.6. First, although Standard 1.6 was written to address the processing of classified information, it uses references to policies that do not apply to portable or standalone computers that process, store, or transmit classified information.

What does COMPUSEC stand for?

Computer Security (COMPUSEC) By Order of the Secretary of the Air Force, this Department of the Air Force Guidance Memorandum immediately changes Air Force Manual (AFMAN) 17-1301, Computer Security (COMPUSEC). Compliance with this Memorandum is mandatory.

What are the DoD’s security policies and procedures?

The report shows that the DoD has policies, procedures, and practices related to logical access controls, including multifactor authentication; software and license inventories; monitoring and threat detection capabilities; and information security requirements for third-party service providers.

What is the Office of the Inspector General doing about classified information?

PROCESSING CLASSIFIED INFORMATION ON PORTABLE COMPUTERS IN THE DEPARTMENT OF JUSTICE EXECUTIVE SUMMARY This Office of the Inspector General audit examines the policies and practices in the Department of Justice (DOJ or Department) regarding classified information on portable computers.