DoDI 8520.03, May 19, 2023
REFERENCES 45
REFERENCES
Committee on National Security Systems Instruction 4009, “Committee on National Security
Systems (CNSS) Glossary,” March 2, 2022
Committee on National Security Systems Policy No. 11, “Acquisition of Information Assurance
(IA) and IA-Enabled Information Technology (IT) Products,” current edition
Department of Defense Cloud Computing Security Requirements Guide (SRG), March 6, 2017
DoD Directive 5144.02, “DoD Chief Information Officer (DoD CIO),” November 21, 2014, as
amended
DoD Enterprise Identity, Credential, and Access Management (ICAM) Reference Design,
June 2020
1
DoD Identity, Credential, and Access Management (ICAM) Strategy, March 30 2020
DoD Instruction 1000.13, “Identification (ID) Cards for Members of the Uniformed Services,
Their Dependents, and Other Eligible Individuals,” January 23, 2014, as amended
DoD Instruction 1000.25, “DoD Personnel Identity Protection (PIP) Program,” March 2, 2016
DoD Instruction 5230.09, “Clearance of DoD Information for Public Release,” January 25, 2019,
as amended
DoD Instruction 5230.29, “Security and Policy Review of DoD Information for Public Release,”
August 13, 2014, as amended
DoD Instruction 8500.01, “Cybersecurity,” March 14, 2014, as amended
DoD Instruction 8510.01, “Risk Management Framework for DoD Systems ,” July 19, 2022
DoD Instruction 8520.02, “Public Key Infrastructure (PKI) and Public Key (PK) Enabling,”
May 24, 2011
DoD Instruction 8530.01, “Cybersecurity Activities Support to DoD Information Network
Operations,” March 7, 2016, as amended
Executive Order 12333, “United States Intelligence Activities,” December 4, 1981
Memorandum of Agreement between the Department of Defense and the Department of
Homeland Security Regarding Department of Defense and U.S. Coast Guard Cooperation on
Cybersecurity and Cyberspace Operations, January 17, 2017
National Information Assurance Partnership “Protection Profile Module for SSL/TLS Inspection
Proxy,” August 23, 2019
National Institute of Standards and Technology Federal Information Processing Standard
(FIPS) 140-3, “Security Requirements for Cryptographic Modules,” March 22, 2019
National Institute of Standards and Technology Federal Information Processing Standard
(FIPS) 199, “Standards for Security Categorization of Federal Information and Information
Systems,” February 2004
National Institute of Standards and Technology Federal Information Processing Standard (FIPS)
201-2, “Person Identity Verification (PIV) of Federal Employees and Contractors,”
August 2013
1
Available at https://dodcio.defense.gov/Library/