Non-State Technology and Computing Devices (SS-12-002)

Rules of appropriate use and all other governance regarding information and data security apply to non-State issued technology devices used to access non-public State information and technology resources

Operational Change Control (SS-08-026)

Requires that changes to operational systems be controlled and monitored

Outsourced Facilities Management (PS-08-019)

Establishes requirements over outsourcing data processing facilities

Outsourced IT Services and Third-Party Interconnections (SS-08-044)

Requires third-party adherence to established State security requirements

Password Authentication (PS-08-006)

Establishes use of passwords as primary authentication mechanism

Password Security (SS-08-007)

Establishes standards for protecting passwords

Performance Lifecycle Framework (SM-10-006)

The Performance Lifecycle Framework for investments in information technology

Performance Lifecycle Management (SM-10-007)

Minimum processes to manage IT investments using the Enterprise Performance Lifecycle

Performance Lifecycle Stage Gate (SM-10-008)

Formal investment reviews at predetermined points in IT investment lifecycle

Personnel Identity Verification and Screening (SS-08-017)

Standards for verifying identities of state personnel and contractors