SlideShare a Scribd company logo
1 of 20
Controlled Unclassified Information (CUI) Leslie Bethune Information Security Manager Headquarters U.S. Marine Corps March 2010
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CUI Governing Organizations
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
CUI Framework Implementation Timeline  Overview  (as of 11/17/08)   Presidential CUI Memo May 9 NARA CUI Memo May 21 Background CUI Framework May 20 Outreach to Departments & Agencies Jun-Aug Dept Agency Letter Jun 27  CUI Council Letter Jul 9  Updated data call  to Departments & Agencies Aug 8  CUIO Brief  to ISC Jul 16  Phase  Stand-up  Initial Outreach  Planning  Implementation – Phase I  Implementation –  Phase II Date  May 08  Jun  Jul  Aug  Sep 08  Oct  Nov  Dec 08………Sep 09  Oct 09  Oct 10  Oct 11  Oct 12 FY 08   FY09  FY10  FY 11  FY12  FY 13 CUI Council Initial Meeting Aug 21  CUIC Sep 18  Data call due Sep 8 CUIO Review Data call Updates/ Outreach CUIO at PM- ISE PR Aug 28  CUIC Oct 16  CUIC VM Nov 19  CUIC Dec 4  Guiding Documents CUI Council Meetings Stand-up Outreach Phase Planning Phase Implementation Phase Departments & Agencies Identify reps Every 3 rd Thurs as needed Milestones and Plan Draft Implementing Guidance Safeguarding Dissemination Designating Marking Initiate CUI 101Training Design Registry Review Department & Agency Plans Annual Report Finalize Department & Agency Plans Activate Registry Initiate CUI 201Training Identify and designate CUI  Alignment of Policy-based  Markings Begin federal rule-making process Annual Report FY09 FY10 Alignment of Policy Markings with Exceptions Alignment of Regulatory  Markings Confirm necessary changes  to regulation and statute  Annual Report  FY11 Department & Agencies submit Plans to CUIO Monitor Department &  Agency compliance with CUI policy, standards, and markings Evaluate effectiveness of  CUI Implementation  Policy and Guidance Update Policy and Guidance as necessary Annual Report FY12 – FY 13 Full Implementation of CUI Framework May 2013
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]

More Related Content

Similar to Controlled Unclassified Information Framework Overview

A Practical GuidetoFederal Enterprise ArchitectureCh.docx
A Practical GuidetoFederal Enterprise ArchitectureCh.docxA Practical GuidetoFederal Enterprise ArchitectureCh.docx
A Practical GuidetoFederal Enterprise ArchitectureCh.docxevonnehoggarth79783
 
TechniClick - GWEA & EA Governance
TechniClick - GWEA & EA GovernanceTechniClick - GWEA & EA Governance
TechniClick - GWEA & EA Governanceguestea68b0
 
HD - @uncl3dumby - Anatomy of a Megabreach: Equifax Report
HD - @uncl3dumby - Anatomy of a Megabreach: Equifax ReportHD - @uncl3dumby - Anatomy of a Megabreach: Equifax Report
HD - @uncl3dumby - Anatomy of a Megabreach: Equifax ReportBronson Peto
 
IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...
IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...
IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...Chris Furton
 
2015 ILDS Annual Report and 18-Month Plan
2015 ILDS Annual Report and 18-Month Plan2015 ILDS Annual Report and 18-Month Plan
2015 ILDS Annual Report and 18-Month PlanIllinois workNet
 
March 2010: FedSources HUD CIO Jerry Williams
March 2010: FedSources HUD CIO Jerry WilliamsMarch 2010: FedSources HUD CIO Jerry Williams
March 2010: FedSources HUD CIO Jerry WilliamsChristopher Dorobek
 
Ise enterprise architecture and common standards program
Ise enterprise architecture and common standards programIse enterprise architecture and common standards program
Ise enterprise architecture and common standards programKaye Beach
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryDuane Blackburn
 
WHAT IS THE INFORMATION SYSTEM AUDIT.pdf
WHAT IS THE INFORMATION SYSTEM AUDIT.pdfWHAT IS THE INFORMATION SYSTEM AUDIT.pdf
WHAT IS THE INFORMATION SYSTEM AUDIT.pdfAxelKAPITA1
 
Mountainview ITSM: Enabling MAF with IT Governance Frameworks
Mountainview ITSM: Enabling MAF with IT Governance FrameworksMountainview ITSM: Enabling MAF with IT Governance Frameworks
Mountainview ITSM: Enabling MAF with IT Governance FrameworksJerry Kopan
 
Developing an International OHS Management System Standard
Developing an International OHS Management System StandardDeveloping an International OHS Management System Standard
Developing an International OHS Management System StandardSue Trebswether
 
Binary Group Corp Capabilities 11.16.09
Binary Group Corp Capabilities 11.16.09Binary Group Corp Capabilities 11.16.09
Binary Group Corp Capabilities 11.16.09gpdavis32
 
@uncl3dumby - Anatomy of a Megabreach: Equifax Report
@uncl3dumby - Anatomy of a Megabreach: Equifax Report@uncl3dumby - Anatomy of a Megabreach: Equifax Report
@uncl3dumby - Anatomy of a Megabreach: Equifax ReportBronson Peto
 
Role of Biometric Standards in IdM
Role of Biometric Standards in IdMRole of Biometric Standards in IdM
Role of Biometric Standards in IdMjbhkwtc
 
Contingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docxContingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docxmaxinesmith73660
 

Similar to Controlled Unclassified Information Framework Overview (20)

2001-annual-report
2001-annual-report2001-annual-report
2001-annual-report
 
Information Sharing and Protection
Information Sharing and ProtectionInformation Sharing and Protection
Information Sharing and Protection
 
A Practical GuidetoFederal Enterprise ArchitectureCh.docx
A Practical GuidetoFederal Enterprise ArchitectureCh.docxA Practical GuidetoFederal Enterprise ArchitectureCh.docx
A Practical GuidetoFederal Enterprise ArchitectureCh.docx
 
2004-annual-report
2004-annual-report2004-annual-report
2004-annual-report
 
2004-cost-report
2004-cost-report2004-cost-report
2004-cost-report
 
TechniClick - GWEA & EA Governance
TechniClick - GWEA & EA GovernanceTechniClick - GWEA & EA Governance
TechniClick - GWEA & EA Governance
 
2002-annual-report
2002-annual-report2002-annual-report
2002-annual-report
 
HD - @uncl3dumby - Anatomy of a Megabreach: Equifax Report
HD - @uncl3dumby - Anatomy of a Megabreach: Equifax ReportHD - @uncl3dumby - Anatomy of a Megabreach: Equifax Report
HD - @uncl3dumby - Anatomy of a Megabreach: Equifax Report
 
IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...
IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...
IT Capital Planning: Enterprise Architecture and Exhibit 300 processes for th...
 
2015 ILDS Annual Report and 18-Month Plan
2015 ILDS Annual Report and 18-Month Plan2015 ILDS Annual Report and 18-Month Plan
2015 ILDS Annual Report and 18-Month Plan
 
March 2010: FedSources HUD CIO Jerry Williams
March 2010: FedSources HUD CIO Jerry WilliamsMarch 2010: FedSources HUD CIO Jerry Williams
March 2010: FedSources HUD CIO Jerry Williams
 
Ise enterprise architecture and common standards program
Ise enterprise architecture and common standards programIse enterprise architecture and common standards program
Ise enterprise architecture and common standards program
 
NSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive SummaryNSTC Identity Management Task Force Report Executive Summary
NSTC Identity Management Task Force Report Executive Summary
 
WHAT IS THE INFORMATION SYSTEM AUDIT.pdf
WHAT IS THE INFORMATION SYSTEM AUDIT.pdfWHAT IS THE INFORMATION SYSTEM AUDIT.pdf
WHAT IS THE INFORMATION SYSTEM AUDIT.pdf
 
Mountainview ITSM: Enabling MAF with IT Governance Frameworks
Mountainview ITSM: Enabling MAF with IT Governance FrameworksMountainview ITSM: Enabling MAF with IT Governance Frameworks
Mountainview ITSM: Enabling MAF with IT Governance Frameworks
 
Developing an International OHS Management System Standard
Developing an International OHS Management System StandardDeveloping an International OHS Management System Standard
Developing an International OHS Management System Standard
 
Binary Group Corp Capabilities 11.16.09
Binary Group Corp Capabilities 11.16.09Binary Group Corp Capabilities 11.16.09
Binary Group Corp Capabilities 11.16.09
 
@uncl3dumby - Anatomy of a Megabreach: Equifax Report
@uncl3dumby - Anatomy of a Megabreach: Equifax Report@uncl3dumby - Anatomy of a Megabreach: Equifax Report
@uncl3dumby - Anatomy of a Megabreach: Equifax Report
 
Role of Biometric Standards in IdM
Role of Biometric Standards in IdMRole of Biometric Standards in IdM
Role of Biometric Standards in IdM
 
Contingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docxContingency Planning Guide for Federal Information Systems Maria.docx
Contingency Planning Guide for Federal Information Systems Maria.docx
 

More from Kaye Beach

North america toll interoperability ati aamva e z p ass ibtta
North america toll interoperability ati aamva e z p ass ibttaNorth america toll interoperability ati aamva e z p ass ibtta
North america toll interoperability ati aamva e z p ass ibttaKaye Beach
 
Nlets implementation of xml candle aamva
Nlets implementation of xml candle aamvaNlets implementation of xml candle aamva
Nlets implementation of xml candle aamvaKaye Beach
 
Ky fusion center
Ky fusion centerKy fusion center
Ky fusion centerKaye Beach
 
Iclei programmesreport-14june2009-090626152055-phpapp02
Iclei programmesreport-14june2009-090626152055-phpapp02Iclei programmesreport-14june2009-090626152055-phpapp02
Iclei programmesreport-14june2009-090626152055-phpapp02Kaye Beach
 
Intelligence warfighter summit 16 dec09-institutionalizing-agility-keeping-i...
Intelligence warfighter summit  16 dec09-institutionalizing-agility-keeping-i...Intelligence warfighter summit  16 dec09-institutionalizing-agility-keeping-i...
Intelligence warfighter summit 16 dec09-institutionalizing-agility-keeping-i...Kaye Beach
 
Rapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfareRapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfareKaye Beach
 
Sensor nets the business of surveillance
Sensor nets the business of surveillanceSensor nets the business of surveillance
Sensor nets the business of surveillanceKaye Beach
 
New sensor technologies mems wireless texas
New sensor technologies  mems wireless texasNew sensor technologies  mems wireless texas
New sensor technologies mems wireless texasKaye Beach
 
Nist piv data model testing
Nist piv data model testingNist piv data model testing
Nist piv data model testingKaye Beach
 
GISAC GA Information Sharing and Analysis Ceneter
GISAC GA Information Sharing and Analysis CeneterGISAC GA Information Sharing and Analysis Ceneter
GISAC GA Information Sharing and Analysis CeneterKaye Beach
 
State CIO health it 2010
State CIO health it 2010State CIO health it 2010
State CIO health it 2010Kaye Beach
 
Robotics in future warfare 09 finkelstein
Robotics in future warfare 09 finkelsteinRobotics in future warfare 09 finkelstein
Robotics in future warfare 09 finkelsteinKaye Beach
 
NORAD NORTHCOM Experimentation Activities Key Results 2007
NORAD NORTHCOM Experimentation Activities Key Results 2007NORAD NORTHCOM Experimentation Activities Key Results 2007
NORAD NORTHCOM Experimentation Activities Key Results 2007Kaye Beach
 
Rapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfareRapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfareKaye Beach
 
IARPA automated low level analysis and description of diverse intelligence vi...
IARPA automated low level analysis and description of diverse intelligence vi...IARPA automated low level analysis and description of diverse intelligence vi...
IARPA automated low level analysis and description of diverse intelligence vi...Kaye Beach
 
Darpa minds eye program Industry Day Announcement
Darpa minds eye program Industry Day AnnouncementDarpa minds eye program Industry Day Announcement
Darpa minds eye program Industry Day AnnouncementKaye Beach
 
Controlled unclassified information
Controlled unclassified informationControlled unclassified information
Controlled unclassified informationKaye Beach
 
Office for state and local government coordination-and preparedness 2004
Office for state and local government coordination-and preparedness 2004Office for state and local government coordination-and preparedness 2004
Office for state and local government coordination-and preparedness 2004Kaye Beach
 
Network of corruption the cdc who and big pharma
Network of corruption the cdc who and big pharmaNetwork of corruption the cdc who and big pharma
Network of corruption the cdc who and big pharmaKaye Beach
 

More from Kaye Beach (20)

North america toll interoperability ati aamva e z p ass ibtta
North america toll interoperability ati aamva e z p ass ibttaNorth america toll interoperability ati aamva e z p ass ibtta
North america toll interoperability ati aamva e z p ass ibtta
 
Nlets implementation of xml candle aamva
Nlets implementation of xml candle aamvaNlets implementation of xml candle aamva
Nlets implementation of xml candle aamva
 
N dex
N dex N dex
N dex
 
Ky fusion center
Ky fusion centerKy fusion center
Ky fusion center
 
Iclei programmesreport-14june2009-090626152055-phpapp02
Iclei programmesreport-14june2009-090626152055-phpapp02Iclei programmesreport-14june2009-090626152055-phpapp02
Iclei programmesreport-14june2009-090626152055-phpapp02
 
Intelligence warfighter summit 16 dec09-institutionalizing-agility-keeping-i...
Intelligence warfighter summit  16 dec09-institutionalizing-agility-keeping-i...Intelligence warfighter summit  16 dec09-institutionalizing-agility-keeping-i...
Intelligence warfighter summit 16 dec09-institutionalizing-agility-keeping-i...
 
Rapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfareRapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfare
 
Sensor nets the business of surveillance
Sensor nets the business of surveillanceSensor nets the business of surveillance
Sensor nets the business of surveillance
 
New sensor technologies mems wireless texas
New sensor technologies  mems wireless texasNew sensor technologies  mems wireless texas
New sensor technologies mems wireless texas
 
Nist piv data model testing
Nist piv data model testingNist piv data model testing
Nist piv data model testing
 
GISAC GA Information Sharing and Analysis Ceneter
GISAC GA Information Sharing and Analysis CeneterGISAC GA Information Sharing and Analysis Ceneter
GISAC GA Information Sharing and Analysis Ceneter
 
State CIO health it 2010
State CIO health it 2010State CIO health it 2010
State CIO health it 2010
 
Robotics in future warfare 09 finkelstein
Robotics in future warfare 09 finkelsteinRobotics in future warfare 09 finkelstein
Robotics in future warfare 09 finkelstein
 
NORAD NORTHCOM Experimentation Activities Key Results 2007
NORAD NORTHCOM Experimentation Activities Key Results 2007NORAD NORTHCOM Experimentation Activities Key Results 2007
NORAD NORTHCOM Experimentation Activities Key Results 2007
 
Rapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfareRapid reaction technology 2009 irregular warfare
Rapid reaction technology 2009 irregular warfare
 
IARPA automated low level analysis and description of diverse intelligence vi...
IARPA automated low level analysis and description of diverse intelligence vi...IARPA automated low level analysis and description of diverse intelligence vi...
IARPA automated low level analysis and description of diverse intelligence vi...
 
Darpa minds eye program Industry Day Announcement
Darpa minds eye program Industry Day AnnouncementDarpa minds eye program Industry Day Announcement
Darpa minds eye program Industry Day Announcement
 
Controlled unclassified information
Controlled unclassified informationControlled unclassified information
Controlled unclassified information
 
Office for state and local government coordination-and preparedness 2004
Office for state and local government coordination-and preparedness 2004Office for state and local government coordination-and preparedness 2004
Office for state and local government coordination-and preparedness 2004
 
Network of corruption the cdc who and big pharma
Network of corruption the cdc who and big pharmaNetwork of corruption the cdc who and big pharma
Network of corruption the cdc who and big pharma
 

Controlled Unclassified Information Framework Overview

  • 1. Controlled Unclassified Information (CUI) Leslie Bethune Information Security Manager Headquarters U.S. Marine Corps March 2010
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 16.
  • 17.
  • 18. CUI Framework Implementation Timeline Overview (as of 11/17/08) Presidential CUI Memo May 9 NARA CUI Memo May 21 Background CUI Framework May 20 Outreach to Departments & Agencies Jun-Aug Dept Agency Letter Jun 27 CUI Council Letter Jul 9 Updated data call to Departments & Agencies Aug 8 CUIO Brief to ISC Jul 16 Phase Stand-up Initial Outreach Planning Implementation – Phase I Implementation – Phase II Date May 08 Jun Jul Aug Sep 08 Oct Nov Dec 08………Sep 09 Oct 09 Oct 10 Oct 11 Oct 12 FY 08 FY09 FY10 FY 11 FY12 FY 13 CUI Council Initial Meeting Aug 21 CUIC Sep 18 Data call due Sep 8 CUIO Review Data call Updates/ Outreach CUIO at PM- ISE PR Aug 28 CUIC Oct 16 CUIC VM Nov 19 CUIC Dec 4 Guiding Documents CUI Council Meetings Stand-up Outreach Phase Planning Phase Implementation Phase Departments & Agencies Identify reps Every 3 rd Thurs as needed Milestones and Plan Draft Implementing Guidance Safeguarding Dissemination Designating Marking Initiate CUI 101Training Design Registry Review Department & Agency Plans Annual Report Finalize Department & Agency Plans Activate Registry Initiate CUI 201Training Identify and designate CUI Alignment of Policy-based Markings Begin federal rule-making process Annual Report FY09 FY10 Alignment of Policy Markings with Exceptions Alignment of Regulatory Markings Confirm necessary changes to regulation and statute Annual Report FY11 Department & Agencies submit Plans to CUIO Monitor Department & Agency compliance with CUI policy, standards, and markings Evaluate effectiveness of CUI Implementation Policy and Guidance Update Policy and Guidance as necessary Annual Report FY12 – FY 13 Full Implementation of CUI Framework May 2013
  • 19.
  • 20.