UNLIMITED FREE ACCESS TO THE WORLD'S BEST IDEAS

close
Already an Engineering360 user? Log in.

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

Customize Your Engineering360 Experience

close
Privacy Policy

This is embarrasing...

An error occurred while processing the form. Please try again in a few minutes.

ARMY - AR 25-2

Army Cybersecurity

active, Most Current
Organization: ARMY
Publication Date: 4 April 2019
Status: active
Page Count: 57
scope:

Purpose

This regulation establishes policies and assigns responsibilities for the Army Cybersecurity Program to ensure adherence to Department of Defense (DOD) cybersecurity policies, processes, and standards. It integrates and coordinates with the functional elements of AR 525-2 to safeguard Army assets. The cybersecurity program sets the conditions necessary for the Army to protect and safeguard information technology (IT) capabilities; support mission readiness and resilience; and ensure the confidentiality, integrity, and availability of information in electronic format (hereafter referred to as information). It fully integrates risk management into every aspect of the Army.

Document History

AR 25-2
April 4, 2019
Army Cybersecurity
Purpose This regulation establishes policies and assigns responsibilities for the Army Cybersecurity Program to ensure adherence to Department of Defense (DOD) cybersecurity policies, processes, and...
October 24, 2007
Information Assurance
Applicability. This regulation applies to the Active Army, the Army National Guard/Army National Guard of the United States, and the U.S. Army Reserve, unless otherwise stated. Also, it applies to...
August 3, 2007
INFORMATION ASSURANCE
Applicability. This regulation applies to the Active Army, the Army National Guard/Army National Guard of the United States, and the U.S. Army Reserve, unless otherwise stated. Also, it applies to...
November 14, 2003
INFORMATION ASSURANCE
Purpose. This regulation establishes Information Assurance (IA) policy, roles, and responsibilities. a. It establishes polices and assigns responsibilities for all users and developers for achieving...

References

Advertisement