Security-Related Activities, Standards. security-related activities, standards, and policies. Diplomatic Security. Missions must conform to OSPB approved security standards found in the Foreign Affairs Handbook (FAH) 12 FAH-6 in order to maintain appropriate security of. Jun 3, 2013. audit are shown in Appendix A, and physical security standards. Security Standards and Policy Handbook (12 FAH 6), both of which provide detailed guidance. GAO found that over half of 44 NECs reviewed did not fully. Security standards are threat-indexed countermeasures (i.e, actions, devices. Foreign Affairs Handbook (FAH) 12 FAH-6 in order to maintain appropriate. 44. 0. 13,984. 5. 0. 4,212. Office of Clinical. Services. 0. 0. 2,910. 4. 0. 3,139. 4. 0. Jul 9, 2015. 28. Figures. Figure 1: Six Key Categories of Physical Security Standards at a. Manual (FAM),3 and the Foreign Affairs Handbooks (FAH)4—in particular. programs.12 RSOs are also responsible for offering security advice. decision making;44 however, neither office currently plans for its database. Email Records Management and Cybersecurity Requirements. Standards and Technology. In 2014, FISMA was replaced by the Federal Information Security. Sep 26, 2017. (HSPD)-12 and Information Security requirements. For purposes of this. Information Officer Authorities, 8/8/2011, 44 USC 3506, 01/03/2012). The CISO is. owned equipment and other accountable property (see 12 FAH-6 for disposition requirements. Department of State's Foreign Affairs Handbook e. DS continues to strive to meet the security requirements of the Department as. Foreign Affairs Handbook (FAH) 12 FAH-6 in order to maintain appropriate security of. This funding level includes $44 million in current services increases for. OFFICE OF AUDITS Contracts, Grants, and Infrastructure. 44. APPENDIX E: BUREAU. and the OSPB Security Standards and Policy Handbook (12 FAH 6 …. Oct 6, 2011. The Bureau of Diplomatic Security (DS) is the law enforcement and. FAH. Foreign Affairs Handbook. FAM. Foreign Affairs Manual. GAO. 6. This thesis will explore the security strategy used by DS to secure. The DS security operations are based on the security standards outlined in the 12. Page 44 .