![]() PROGRAM MANAGEMENT Following Project Management Institute principles Pax Advisory's PMP certified consultants can support iterative, scalable process advice or implementation with experience in solution configuration and architecture for IT hardware and software lifecycles. IT PROJECT LIFECYCLE Project Managers can tailor processes the project lifecycle that fits the objectives by strategic goal setting through:
METHODS Pax Advisory help your organization reach your goals by creating a series of management plans by objectives utilizing progressive elaboration. Proactively manage and guide using milestones & other project controls. We work with change control boards to control the impacts of scope change. Sometimes corrective action is necessary to repair plan defects. We measure performance against performance measurement baselines. It is essential to establish integrated change control. We can work to facilitate the resolution of conflicting objectives. We will guide you through plan initiation, stakeholder communication, scope development, and execution of projects. CONSIDERATIONS IT PROGRAM LIFECYCLE SUPPORT Pax Advisory Project Management Office effectively manage the lifecycle of your hardware and software assets. Capture your software inventory – Quickly find the software installed on your network and match it to what has been purchased and actually used. Make informed business decisions on software assets when you have all the right information. Pax Advisory can identify and track your hardware inventory – Find and monitor hardware details on Windows and Mac OS desktops and servers. You can also do this with all other IT assets, including mobile devices, printers and routers or switches. Manage the entire lifecycle of assets with reports and alerts that notify you when they need to be replaced, upgraded or are close to the end of their warranty or lease periods. Assist your support team and track purchases – With Pax Advisory, you can reconcile IT assets against purchase contracts. This solution allows you to also assign assets to users, departments or locations. Provide the help desk with valuable hardware and software for fast troubleshooting and quicker responsiveness. PARTNERSHIPS FOR BETTER SOLUTIONS DOD IT REFERENCES 8.1 Department of Defense Global Information Grid Architecture Architectural Vision 6/1/2007 8.2 Army Information Architecture Version 4.1 6/5/2013 ArmyInformationArchitecturev4-1dtd2013-06-05 8.3 DoD Information Enterprise Architecture (Version 2.0) 7/1/2012 DoD IEA v2.0_Volume I_Description Document_Final_20120730 8.4 DoD Directive 8320.02, "Data Sharing in a Net-Centric Department of Defense 12/2/2004 8.5 The Department of Defense Architecture Framework (DoDAF) version 2.02 3/1/2011 8.6 The Clinger-Cohen Act (Chapter 25 of title 40, United States Code) see 8.7 OMB Circular A-130 Revised, "Management of Federal Information Resources, Transmittal 4 11/28/2000 8.8 CJCSM 3170.01H: Joint Capabilities Integration and Development System Net-Centric-Data-Strategy-2003-05-092 8.9 Department of Defense Net-Centric Data Strategy 5/9/2003 http://dodcio.defense.gov/Portals/0/Documents/DIEA/Net-Centric-Data-Strategy-2003-05- 092.pdf 8.10 OASD(NII), Net-Centric Checklist, Version 2.1.3 5/1/2004 8.11 Joint Net-Centric Operations (JNO) Capability Portfolio Management (CPM), Business Plan Version 1.0 4/16/2007 JNO Business Plan Version 1 April 2007 (2) 9. Unified Capabilities and IPv6 9.1 Internet Protocol version 6 (IPv6) for the GSCR 9.2 Unified Capabilities Approved Product List Process 9.3 Unified Capabilities Approved Product List – DISA 9.4 DoD CIO Memorandum, DoD Internet Protocol Version 6 (IPv6) Definitions 6/26/2008 dod-ipv6-definitions-memo-bw-rev 9.5 OMB Memorandum M-05-22, Transition Planning for Internet Protocol Version 6 (IPv6) 8/2/2005 9.6 DoD CIO Memorandum, DoD Internet Protocol Version 6 (IPv6) Interim Transition Guidance 9/29/2003 http://www.hpc.mil/images/hpcdocs/ipv6/dod_cio_september_23_policy_ltr.pdf 9.7 DoD CIO Memorandum, DoD Internet Protocol Version 6 (IPv6) 6/9/2003 http://www.defense.gov/news/Jun2003/d20030609nii.pdf 9.8 Federal Register / Vol. 74, No. 236 / Rules and Regulations 12/10/2009 10. Collaboration Tools 10.1 Department of Defense (DOD) Collaboration Policy Update 12/21/2005 2007_03_07_the_smart_card_update 10.2 Collaboration products certified for use on DoD SIPRNet Networks 10.3 DCTS CMO Product Exemption List CACRelease1ReaderSpecificationv1Specification 11. Smart Cards 11.1 Army CAC/PKI Program Card Reader Specifications, Rev. 3/7/2007 DoD_Suppliers_Passive_RFID_Info_Guide_v15update 11.2 Personal Identity Verification (PIV) of Federal Employees and Contractors, FIPS Pub 201-1, 3/1/2006 11.3 Access Card Office (ACO); Common Access Card (CAC) Release 1.0 Reader Specifications, Version 1.0 9/25/2000 11.4 Government Smart Card Interoperability Specification. Version 2.1 7/16/2003 uid_signed_policy_memo_2003.07.29 12. Radio Frequency Identification (RFID) 12.1 DOD 4140.1-R DOD Supply Chain Materiel Management Regulation 5/23/2003 12.2 Department of Defense Standard Practice - Military Marking For Shipment and Storage (MIL-STD-129P w/CHANGE 4) 19 9/19/2007 http://www.acq.osd.mil/log/sci/ait/mil-std-129pch4.pdf 12.3 RF-Tag Format (Version 2.0) 5/10/2002 12.4 Policy for Unique Identification (UID) of Tangible Items – New Equipment, Major Modifications, and Reprocurements of Equipment and Spares 7/29/2003 http://www.acq.osd.mil/dpap/UID/uid_signed_policy_memo_2003.07.29.pdf 12.5 Update to Policy For Unique Identification (UID) of Tangible Items – New Equipment, Major Modifications, and Reprocurements of Equipment and Spare 9/3/2004 http://www.acq.osd.mil/dpap/Docs/uid/Sep.%203%20UID%20%20Policy%20Update.pdf 12.6 Policy For Unique Identification (UID) of Tangible Personnel Property Legacy Items in Inventory and Operational Use, Including Government Furnished Property (GFP) 12/23/2004 http://www.acq.osd.mil/dpap/Docs/uid/UID%20Policy%20Update%20Legacy%20Items% 2012-23-2004.pdf 12.7 Department of Defense Guide to Uniquely Identifying Items (Version 1.4) 4/16/2004 http://www.acq.osd.mil/dpap/Docs/uid/guide_1_4.pdf 12.8 Department of Defense Standard Practice – Identification Marking of US Military Property (MIL-STD-130L) 12/20/2004 http://www.acq.osd.mil/dpap/Docs/uid/MIL-STD-130L%20Change1.pdf 12.9 Unique Identification 101 – The Basics 11/1/2004 http://www.acq.osd.mil/dpap/Docs/uid/UID 101.pdf 12.10 Passive RFID DFARS Clause 252.211-7006 http://www.acq.osd.mil/dpap/dars/dfars/html/current/252211.htm#252.211-7006 12.11 DOD Supplier's Passive RFID Information Guide, Version 15.0 http://www.acq.osd.mil/log/sci/ait/DoD_Suppliers_Passive_RFID_Info_Guide_v15update.pdf 12.12 Radio Frequency Identification (RFID) Policy 7/30/2004 https://acc.dau.mil/adl/en-US/142796/file/27748/RFIDPolicy07-30-2004.pdf 13. Logistics 13.1 DoD 4140.1-R DoD Supply Chain Materiel Management Regulation 5/23/2003 13.2 Deputy Under Secretary of Defense (Logistics and Materiel Readiness) Logistics Enterprise Integration and Transformation 11/1/2001 14. Voice Over IP (VOIP) 14.1 Security Considerations for Voice Over IP Systems, Special Publication 800-58 1/1/2005 14.2 DISA Memo, Voice Video over Internet Protocol (VVoIP) Security Technical Implementation Guide (STIG), Version 3 12/23/2009 14.3 Voice and Video over Internet Protocol (VVoIP) Security Technical Implementation Guide (STIG), Version 3 Release 3 4/15/2014 http://iase.disa.mil/stigs/Documents/u_vvoip_v3r3_stig.zip 15. Wireless 15.1 Use of Commercial Wireless Devices, Services, and Technologies in the Department of Defense (DoD) Global Information Grid (GIG) (DoD Directive 8100.2) 4/23/2007 http://www.dtic.mil/whs/directives/corres/pdf/810002p.pdf 15.2 Security Requirements for Cryptographic Modules (FIPS PUB 140-2) 5/25/2001 http://csrc.nist.gov/publications/fips/fips140-2/fips1402.pdf 15.3 FIPS 140-1 and FIPS 140-2 Cryptographic Modules Validation List 3/10/2009 http://csrc.nist.gov/groups/STM/cmvp/ 15.4 Wireless - Security Technical Implementation Guide (Version 6, Release 8) 7/25/2014 http://iase.disa.mil/stigs/Documents/u_wireless_v6r8_stig.zip 15.5 Information Assurance Best Business Practice, Wireless Security Standards, Version 4 (09- EC-M-0010) 6/26/2013 16. Section 508 16.1 Section 508 16.2 Workforce Investment Act of 1998, Section 508 – Electronic and Information Technology 12/21/2000 Energy Star 6.0 Computers Program Requirements (Rev. Oct-2013) 16.3 Guide to the Section 508 Standards for Electronic and Information Technology: Software Applications and Operating Systems (1194.21) Web-based Intranet and Internet Information and Applications (1194.22) Telecommuications Products (1194.23) Video and Multimedia Products (1194.24) Self Contained, Closed Products (1194.25) Desktop and Portable Computers (1194.26) 17. Energy Star and Electronic Product Environmental Assessment Tool (EPEAT) 17.1 Executive Order 13221, Energy-Efficient Standby Power Devices 7/31/2001 Desktop Management Interface Specification DSP0005 17.2 ENERGY STAR Program Requirements for Computers Partner Commitments and ENERGY STAR Program Requirements Product Specification for Computers Eligibility Criteria Version 6.0 Rev. Oct-2013 6/2/2014 17.3 Computer – Key Product Criteria http://www.energystar.gov/index.cfm?c=computers.pr_crit_computers 17.4 Imaging Equipment http://www.energystar.gov/products/certified-products/detail/imaging-equipment 17.5 Computers http://www.energystar.gov/products/certified-products/detail/computers 17.6 Displays http://www.energystar.gov/products/certified-products/detail/displays 17.7 Data Center Energy Efficiency Initiatives http://www.energystar.gov/index.cfm?c=prod_development.server_efficiency 17.8 Enterprise Server Key Product Criteria http://www.energystar.gov/index.cfm?c=ent_servers.pr_crit_enterprise_servers 17.9 Electronic Product Environmental Assessment Tool (EPEAT) 17.10 Executive Order 13423, Strengthening Federal Environmental, Energy, and Transportation Management 1/24/2007 http://www.gsa.gov/portal/content/102452 17.11 Federal Acquisition Regulation; FAR Case 2006–030, Electronic Products Environmental Assessment Tool. Federal Register / Vol. 74, No. 10 / Thursday, January 15, 2009 / Rules and Regulations (EPEAT) http://www.epa.gov/oppt/epp/pubs/guidance/fr74no10.pdf 18. Other Regulatory and Commercial Requirements 18.1 Distributed Management Task Force Desktop Management Interface Specification (DMI Version 2.0.1s) National Industry Security Program Operating Manual 18.2 Trusted Computing Group, Trusted Platform Module (TPM v1.2) https://www.trustedcomputinggroup.org/developers/trusted_platform_module/specifications 18.3 FCC Part 15 Class B http://www.gpo.gov/fdsys/pkg/CFR-2009-title47-vol1/pdf/CFR-2009- title47-vol1-part15.pdf 18.4 Electromagnetic Compatibility (EMC) Directive 89/336/EEC http://www.conformance.co.uk/directives/ce_emc.php 19. System Security 19.1 Security requirements that shall be accomplished by the Contractor will be per the DoD Information Assurance Certification and Accreditation Process (DIACAP) DoD Instruction 8510.01 3/12/2014 The Contractor shall transmit and deliver any classified material/reports IAW the National Industrial Security Program Operations Manual (NISPOM) and the Industrial Security Regulation (DoD 5220.22-R). Individual system security requirements shall be accomplished as specified in the Task/Delivery Order. National Industrial Security Program Operations Manual (NISPOM)
C- Industrial Security Regulation |