- Ensure that all information systems are managed, operated, and used IAW DISA STIGS and other applicable policies and procedures.
- Provide access control and account provisioning for all information systems.
- Promptly report security violations IAW with specific security requirements for reporting incidents and violations.