1. Purpose
This policy establishes the Enterprise Security Planning Policy, for managing risks from inadequate security planning through the establishment of an effective security planning program.
2. Authority
DC Official Code § 1-1401 et seq., provides the Office of the Chief Technology Office (hereafter called OCTO) with the authority to provide information technology (IT) services, write and enforce IT policies, and secure the network and IT systems for the District’s government agencies under the authority of the District’s Mayor. This document can be found at: https://code.dccouncil.us/dc/council/code/sections/1-1402.html.
3. Applicability
This policy applies to all the District’s workforce members (including contractors, vendors, consultants, temporary staff, interns, and volunteers) performing official functions on behalf of the District’s Government, and/or any District Government agency/entity (e.g. subordinate and independent agencies, Council of the District of Columbia, D.C. Charter Schools, etc.) who receive enterprise services from the District of Columbia Office of the Chief Technology Officer (OCTO).
This Policy also applies to any providers and third-party entities with access to the District’s information, networks, and applications.
4. Policy
4.1 System Security Plan
The District’s Agencies must:
- Develop a security plan for the information system that:
- Is consistent with the organization’s enterprise architecture;
- Explicitly define the authorization boundary for the system;
- Describes the operational context of the information system in terms of missions and business processes;
- Provides the security categorization of the information system including supporting rationale;
- Describes the operational environment for the information system;
- Provides an overview of the security requirements for the system;
- Identifies any relevant overlays, if applicable
- Describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring and supplementation decisions; and
- Is reviewed and approved by the authorizing official or designated representative prior to plan implementation;
- Distributes copies of the security plan and communicates subsequent changes to the plan to the system owner.
- Reviews the security plan for the information system on an annual basis or whenever there is a proposed change to an information system.
- Updates the plan to address changes to the information system/environment of operation or problems identified during plan implementation or security control assessments
- Protects the security plan from unauthorized disclosure and modification.
4.2 Rules of Behavior
The District’s Agency:
- Establishes and makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage
- Signed acknowledgement from users indicating that they have read, understand, and agree to abide by the ROB must be received before they receive access to the information system;
- Reviews and updates the rules of behavior annually
- Requires individuals who have signed a previous version of the rules of behavior to read and resign when the rules of behavior are revised/updated.
4.3 Rules of Behavior | Social Media And Networking Restrictions
The District’s agencies include in the rules of behavior, explicit restrictions on the use of social media/networking sites and posting organizational information on public websites.
4.4 Information Security Architecture
The District’s Agency must:
- Develops an information security architecture for the information system that:
- Describes the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information;
- Describes how the information security architecture is integrated into and supports the enterprise architecture; and
- Describes any information security assumptions about, and dependencies on, external services
- An annual review and update of the information security architecture to reflect changes in the enterprise architecture; and
- Ensures that planned information security architecture changes are reflected in the security plan, the security Concept of Operations (CONOPS), and organizational procurements/acquisitions.
5. Exemptions
Exceptions to this policy shall be requested in writing to the Agency’s CIO and the request will be escalated to the OCTO Chief Information Security Officer (“CISO”).
6. Definitions
The definition of the terms used in this document can be found in the Glossary section of the OCTO Policy Website and appendix 3 below.

