Information System Security Officer (ISSO)
Overview
As an Information System Security Officer (ISSO) at CMS, you oversee the security posture of the FISMA system(s) entrusted to your care. Following CMS policies and frameworks for risk management, you help Business Owners and system teams comply with federal regulations for keeping information safe.
This page provides links to the programs, documents, and training you need to be successful in your role. For a detailed description of ISSO responsibilities, see the ISSO Handbook and the CMS IS2P2. For questions or help, contact the ISSO Support and Advocacy team.
All resources in Information System Security Officer (ISSO)
General Information
- Authorization to Operate (ATO)
- Breach Response
- CMS Computer Matching Agreement (CMA)
- CMS CyberWorks
- CMS Enterprise Data Encryption (CEDE)
- CMS Information Exchange Agreement (IEA)
- CMS Information Security Advisory Board (CISAB)
- CMS Information System Risk Assessment (ISRA)
- CMS Interconnection Security Agreement (ISA)
- CMS ISSO Journal
- CMS Risk Management Framework (RMF)
- CMS Security and Privacy Handbooks
- CMS Technical Reference Architecture (TRA)
- Data Sharing Agreements
- Email Encryption Requirements at CMS
- Federal Information Security Modernization Act (FISMA)
- Federal Risk and Authorization Management Program (FedRAMP)
- Health Insurance Portability and Accountability Act of 1996 (HIPAA)
- ISSO Appointment Letter
- Ongoing Authorization (OA)
- Plan of Action and Milestones (POA&M)
- Privacy Impact Assessment (PIA)
- Rapid Cloud Review (RCR)
- Role Based Training (RBT)
- Security and Privacy Requirements for IT Procurements
- Security Controls Assessment (SCA)
- Security Impact Analysis (SIA)
- Software Bill of Materials (SBOM)
- Supply Chain Risk Management (SCRM)
- System Audits
- Zero Trust
Policies and Handbooks
- Access Control (AC)
- Audit and Accountability (AU)
- Awareness and Training (AT)
- CMS Acceptable Risk Safeguards (ARS)
- CMS Breach Analysis Team (BAT) Handbook
- CMS Breach Response Handbook
- CMS Cyber Risk Management Plan (CRMP)
- CMS Cybersecurity and Privacy Training & Awareness Handbook
- CMS Guide to Federal Laws, Regulations, and Policies
- CMS Information System Security Officer (ISSO) Handbook
- CMS Information Systems Security & Privacy Policy (IS2P2)
- CMS Key Management Handbook
- CMS Plan of Action and Milestones (POA&M) Handbook
- CMS Privacy Impact Assessment (PIA) Handbook
- CMS Privacy Program Plan
- CMS Risk Management Framework (RMF): Assess Step
- CMS Risk Management Framework (RMF): Authorize Step
- CMS Risk Management Framework (RMF): Categorize Step
- CMS Risk Management Framework (RMF): Implement Step
- CMS Risk Management Framework (RMF): Monitor Step
- CMS Risk Management Framework (RMF): Prepare Step
- CMS Risk Management Framework (RMF): Select Step
- CMS Threat Modeling Handbook
- Configuration Management (CM)
- HHS Policy for Rules of Behavior for Use of Information & IT Resources
- Identification and Authentication (IA)
- Incident Response (IR)
- Information System Contingency Plan (ISCP) Exercise Handbook
- Information System Contingency Plan (ISCP) Handbook
- Maintenance (MA)
- Media Protection (MP)
- Personnel Security (PS)
- Physical & Environmental Protection (PE)
- Responsible Use of AI within CMS for Cybergeek
- Risk Assessment (RA)
- Risk Management Handbook Chapter 12: Security & Privacy Planning (PL)
- Risk Management Handbook Chapter 15: System & Services Acquisition
- Risk Management Handbook Chapter 2: Awareness and Training (AT)
- Risk Management Handbook Chapter 8: Incident Response (IR)
- RMH Chapter 16: System & Communications Protection
- RMH Chapter 4: Security Assessment & Authorization
- System and Services Acquisition (SA)
Tools and Services
- Advanced Cybersecurity Concepts
- CMS Cybersecurity Integration Center (CCIC)
- CMS FISMA Continuous Tracking System (CFACTS)
- Continuous Diagnostics and Mitigation (CDM)
- Cyber Risk Reports (CRR)
- Cybersecurity and Risk Assessment Program (CSRAP)
- ISSO As A Service
- ISSO Boot Camp
- ISSO Mentorship Program
- Penetration Testing (PenTesting)
- SaaS Governance (SaaSG)
- Threat Modeling
Latest articles and updates
- 10/1/2025UpdatesFrom Policy
System & Information Integrity RMH Retirement and the Info Guide Implementation
This blog post introduces the System & Information Integrity Informational Guide
- 9/26/2025UpdatesFrom Policy
Information & Authentication RMH Retirement and Implementation of the Info Guide
We're retiring all the ARS control family handbooks and replacing them with informational guides.
- 8/20/2025UpdatesFrom Zero Trust
Bridging the Gap: Introducing the CMS Zero Trust Forge
An introduction to a new tool to scope granular, least privilege Kion Cloud AWS IAM Policies and Roles