Title: F/A-18 - EA-18 Aircraft / System Program Protection Implementation Plan. Number: DI-MGMT-81826A Approval Date:

Similar documents
Title:F/A-18 - EA-18 Aircraft / System Program Protection Implementation Plan

DATA ITEM DESCRIPTION

Title: F/A-18 - EA-18 AIRCRAFT / SYSTEM PROGRAM PROTECTION IMPLEMENTATION PLAN. Number: DI-MGMT-81826C Approval Date:

Department of Defense INSTRUCTION

Department of Defense DIRECTIVE

The DD254 & You (SBIR)

Department of Defense DIRECTIVE. SUBJECT: Electronic Warfare (EW) and Command and Control Warfare (C2W) Countermeasures

SECNAVINST A DON CIO 20 December Subj: DEPARTMENT OF THE NAVY INFORMATION ASSURANCE (IA) POLICY

Department of Defense DIRECTIVE

COMMUNICATIONS SECURITY MONITORING OF NAVY TELECOMMUNICATIONS AND INFORMATION TECHNOLOGY SYSTEMS

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

Department of Defense MANUAL

Acquisitions and Contracting Basics in the National Industrial Security Program (NISP)

Security Asset Protection Professional Certification (SAPPC) Competency Preparatory Tools (CPT)

Department of Defense INSTRUCTION

Subj: DEPARTMENT OF THE NAVY (DON) INFORMATION SECURITY PROGRAM (ISP) INSTRUCTION

INTEGRATING OPSEC INTO CONTRACTS. A Companion Guide to the OPSEC Practitioner s Toolbox

Department of Defense MANUAL

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

Department of Defense DIRECTIVE

DEPARTMENT OF THE NAVY INSIDER THREAT PROGRAM. (1) References (2) DON Insider Threat Program Senior Executive Board (DON ITP SEB) (3) Responsibilities

CHIEF NATIONAL GUARD BUREAU INSTRUCTION

Subj: COMMUNICATIONS SECURITY (COMSEC) MONITORING OF NAVY TELECOMMUNICATIONS AND AUTOMATED INFORMATION SYSTEMS (AIS)

General Security. Question Answer Policy Resource

Department of Defense MANUAL

INSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems

Department of Defense INSTRUCTION

Operations Security (OPSEC) Guide for Defense Contractors (Rev B)

Department of Defense DIRECTIVE. DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3)

DEPARTMENT OF THE NAVY FFIC EN AGON C Q

SECNAVINST E OUSN 17 May 12 SECNAV INSTRUCTION E. From: Secretary of the Navy

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

DoD M, March 1994

Department of Defense DIRECTIVE. SUBJECT: DoD Electromagnetic Environmental Effects (E3) Program

Department of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems

Department of Defense INSTRUCTION

Department of Defense

Department of Defense INSTRUCTION. Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN)

Department of Defense DIRECTIVE

Encl: (1) References (2) Department of the Navy Security Enterprise Governance (3) Senior Director for Security (4) Definitions (5) Responsibilities

Subj: RELEASE OF COMMUNICATIONS SECURITY MATERIAL TO U.S. INDUSTRIAL FIRMS UNDER CONTRACT TO THE DEPARTMENT OF THE NAVY

PREPARATION OF A DD FORM 254 FOR SUBCONTRACTING. Cal Stewart ISP

Number: DI-MGMT Approval Date:

Export-Controlled Technology at Contractor, University, and Federally Funded Research and Development Center Facilities (D )

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION. 1. PURPOSE. This Instruction, issued under the authority of DoD Directive (DoDD) 5144.

CHAPTER 3 NATIONAL DISCLOSURE POLICY A. INTRODUCTION. International Programs Security Handbook 3-1

Subj: ELECTRONIC WARFARE DATA AND REPROGRAMMABLE LIBRARY SUPPORT PROGRAM

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION

Department of Defense DIRECTIVE

Department of Defense DIRECTIVE

Department of Defense INSTRUCTION. SUBJECT: Physical Security Equipment (PSE) Research, Development, Test, and Evaluation (RDT&E)

WARFIGHTER MODELING, SIMULATION, ANALYSIS AND INTEGRATION SUPPORT (WMSA&IS)

Definitions. Each of the following terms, as used in the board s regulations, (a) AEMT means advanced emergency medical technician.

a. To promulgate policy on cost analysis throughout the Department of the Navy (DON).

Subj: MISSION, FUNCTIONS, AND TASKS OF NAVAL SPECIAL WARFARE COMMAND

DEPARTMENT OF THE NAVY COUNTERINTELLIGENCE

Department of Defense INSTRUCTION

Department of Defense DIRECTIVE

SECURITY OF CLASSIFIED MATERIALS W130119XQ STUDENT HANDOUT

SUBPART ORGANIZATIONAL AND CONSULTANT CONFLICTS OF INTEREST (Revised December 29, 2010)

Department of Defense MANUAL

Rapid Innovation Fund (RIF) Program

Department of Defense INSTRUCTION

DOD INSTRUCTION MANAGEMENT OF LASER ILLUMINATION OF OBJECTS IN SPACE

February 11, 2015 Incorporating Change 4, August 23, 2018

Department of Defense INSTRUCTION. SUBJECT: DoD Information Security Program and Protection of Sensitive Compartmented Information

Department of Defense DIRECTIVE

UNCLASSIFIED. FY 2017 Base FY 2017 OCO. Quantity of RDT&E Articles Program MDAP/MAIS Code: Project MDAP/MAIS Code(s): N42

PRIVACY IMPACT ASSESSMENT (PIA) For the

Subj: DEPARTMENT OF THE NAVY COMPUTER NETWORK INCIDENT RESPONSE AND REPORTING REQUIREMENTS

PRIVACY IMPACT ASSESSMENT (PIA) For the

1. Purpose. To implement the guidance set forth in references (a) through (e) by:

Department of Defense DIRECTIVE

CHIEF NATIONAL GUARD BUREAU INSTRUCTION

Industrial Security Program

Department of Defense MANUAL

Definitions. The following words and phrases shall have the following

DEPARTMENT OF THE NAVY DEPUTY CHIEF INFORMATION OFFICER MARINE CORPS ROLES AND RESPONSIBILITIES

Department of Defense DIRECTIVE

REPORT ON COST ESTIMATES FOR SECURITY CLASSIFICATION ACTIVITIES FOR 2005

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION

Contract Security Classification Specification. DD-254 Guidance

SECURITY OF CLASSIFIED MATERIALS B STUDENT HANDOUT

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

UNCLASSIFIED. R-1 Program Element (Number/Name) PE F / NAVSTAR Global Positioning System (User Equipment) (SPACE) Prior Years FY 2013 FY 2014

Department of Defense DIRECTIVE

DEPUTY INSPECTOR GENERAL FOR INTELLIGENCE AND SPECIAL PROGRAM ASSESSMETS

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC

(Revised January 15, 2009) DISCLOSURE OF INFORMATION (DEC 1991)

PRIVACY IMPACT ASSESSMENT (PIA) For the

DEPARTMENT OF THE ARMY HEADQUARTERS, UNITED STATES ARMY MATERIEL COMMAND 5001 EISENHOWER AVENUE, ALEXANDRIA, VA

Security Classification Guidance v3

Department of Defense INSTRUCTION

IMPERIAL VALLEY COLLEGE REGULAR MEETING OF THE CURRICULUM AND INSTRUCTION COMMITTEE AGENDA FOR APRIL 1, :05 p.m. Board Room

Department of Defense DIRECTIVE. SUBJECT: Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L))

PRIVACY IMPACT ASSESSMENT (PIA) For the

Report from an Evaluation of the Florida Agricultural and Mechanical University Loss Prevention Program REPORT NUMBER SFLPP-33-15/16-FAMU

Transcription:

DATA ITEM DESCRIPTION Title: F/A-18 - EA-18 Aircraft / System Program Protection Implementation Plan Number: Approval Date: 20110322 AMSC Number: N9187 Limitation: N/A DTIC Applicable: N/A GIDEP Applicable: N/A Office of Primary Responsibility: AS/PEO (T) PMA265 / AIR-7.4.3 Applicable Forms: N/A Use/relationship: The Contractors F/A-18 (All Series) and EA-18G Program Protection Implementation shall be defined within the F/A-18 - EA-18 Aircraft / System Contractors Program Protection Implementation Plan (PPIP) which is a result of the program protection requirements set forth in the DD-254, Statement of Work (SOW), DoD Contract, the Government s F/A-18 E/F and EA-18G Program Protection Plan (PPP) (including Annexes)) most current issuance, the Security Guidance for F/A-18 Hornet (All Series) and the EA-18G Growler Aircraft / Systems and Security Classification Guides applicable for the F/A-18 (All Series) and EA-18G. This Data Item Description (DID) contains the format, content, and intended information for the data product resulting from the work task described in the contract SOW. This DID cancels and replaces DI-MGMT-81826. Requirements: 1. Reference Documents: The applicable issue of the documents cited herein, including their approval dates and dates of any applicable amendments, notices, and revisions, shall be as available at the time of the solicitation. The contractor is required to utilize the available databases for all updated/superseded amendments, notices and/or revisions of the reference documents identified below: Note: For Reference Documents see: For OPNAV / SECNAV / Navy Documents see: http://doni.daps.dla.mil/default.aspx For MIL Documents see: https://assist.daps.dla.mil/online/start/ For PMA / Classified Documents formally request from PCO / PMA265. a. CJCSI 3312.01A Joint Military Intelligence Requirements Certification (23 Feb 07)

b. CJCSI 6510.01E Chairman of the Joint Chiefs of Instruction, Information Assurance (IA) and Computer Network Defense (CND) (15 Aug 07) (Directive current as of 12 Aug 08)) c. CJCSI 6211.02C Chairman of the Joint Chiefs of Instruction, Defense Information System Network (DISN): Policy, Responsibilities and Processes (9 July 08) d. CJCSI 6212.01E Interoperability and Supportability of Information Technology and National Security Systems (Dec 08) e. CJCSM 6510.01A Information Assurance (IA) and Computer Network Defense (CND) Volume I (Incident Handling Program) (24 June 09) f. DoD 5200.1-M Acquisition System Protection Program (16 Mar 94) g. DoD 5200.1R DoD Information Security Program (Certified current 24 Nov 03) h. DoD 5205.02M DoD OPSEC Program (3 Nov 08) i. DoD 5220.22 M National Industrial Security Program Operating Manual (NISPOM) (1 Feb 06) j. DoDI 5000.02 Operation of the Defense Acquisition System (8 Dec 08) k. DoDI 5200.01 DoD Information Security Program and Protection of Sensitive Compartmented Information (9 Oct 08) (cnx DoDD 5200.1) l. DoDI 5200.39 Critical Program Information (CPI) Protection Within the Department of Defense (16 Jul 08) Incorporating Change 1, December 28, 2010 m. DoDI 8500.2 Information Assurance (IA) Implementation (6 Feb 03) n. DoDI 8510.01 DoD Information Assurance Certification and Accreditation Process (DIACAP) (28 Nov 07) o. DoDI 8520.2 Public Key Infrastructure (PKI) Enabling (1 Apr 04) p. DoDI 8580.1 Information Assurance (IA) in the Defense Acquisition System (9 Jul 04) q. DoDD 5000.01 The Defense Acquisition System (12 May 03; Certified Current as of 20 Nov 2007) r. DoDD 5205.02 DoD OPSEC Program (6 Mar 06) s. DoDD 5230.09 Clearance of DoD Information for Public Release (22 Aug 08) t. DoDD 5230.11 Disclosure of Classified Military Information to Foreign Governments and International Organizations (16 Jun 92) u. DoDD 5230.20 Visits and Assignments of Foreign Nationals (22 Jun 05) v. DoDD 5230.24 Distribution Statements on Technical Documents (18 Mar 87) w. DoDD 5230.25 Withholding of Unclassified Technical Data From Public Disclosure (6 Nov 84; Incorporating Change 1, 18 Aug 95) x. DoDD 8500.01E Information Assurance (IA) (24 Oct 02; Certified Current as of 23 Apr 07) Page 2 of 8

y. DoDD 8570.01 Information Assurance Training, Certification, and Workforce Management (15 Aug 04; Certified Current as of April 23, 2007) z. DoD S-5230.28 Low Observable (LO) and Counter Low Observable (CLO) Programs (U), CLASSIFIED DOCUMENT (26 May 05) Authorized users may contact the OPR identified below. (OPR: USD (AT&L), 703-697-0016) aa. EO 13526 CLASSIFIED NATIONAL SECURITY INFORMATION (Dec 29, 2009) bb. SECNAVINST 5239.3B Department of the Navy Information Assurance (IA) Policy (17 June 09) cc. OPNAVINST 5239.3A Navy Implementation of DoD Intelligence Information System Public Key Infrastructure (PKI) (18 Jan 08) dd. SECNAVINST 5510.36A Department of the Navy (DoN) Information Security Program (ISP) Instruction (6 Oct 06) ee. SECNAV M- 5510.36 Department of the Navy (DoN) Information Security Program (6 Oct 06) ff. OPNAVINST 5513.2C Security Classification Guide (SCG) (21 Jul 08) (Encl (02-26) for the F/A-18 Hornet (All Series) and Electronic Attack EA-18G Aircraft, (25 Jan 2010) gg. MCTL The Military Critical Technologies List hh. MIL-STD-461F DoD Interface Standard: Requirements for the Control of Electromagnetic Interference Characteristics of Subsystems and Equipment (Dec 07) ii. MIL-STD-464A DoD Interface Standard: Electromagnetic Environmental Effects Requirements for Systems (19 Dec 02) jj. NSTISSAM TEMPEST/2-95 with NSTISSAM TEMPEST/2-95A Amendment, Red/Black Installation Guidance, 2/3/00 (Document is FOUO) kk. NSTISSAM TEMPEST/1-92, Compromising Emanations Laboratory Test Requirements, Electromagnetics, 12/15/92 (Document is Confidential) ll. CNSS Advisory Memorandum TEMPEST 01-02, NONSTOP Evaluation Standard, 10/1/02 (Document is Confidential) mm. CNSS No. 7000 TEMPEST Countermeasures for Facilities (18 Jun 94) (U) (CLASSIFIED DOCUMENT) nn. NSTISSI 7001 NONSTOP Countermeasures (15 Jun 94) (CLASSIFIED DOCUMENT) oo. NSTISSI 1000 National Information Assurance Certification and Accreditation Process (NIACAP) (Apr 00) pp. NSDD 298 NATIONAL OPERATIONS SECURITY PROGRAM (22 Jan 88) qq. FISMA Federal Information Security Management Act of 2002 (FISMA) Page 3 of 8

rr. OMB A-130 Appendix III, Security of Federal Automated Information Resources (Circular No A-130) ss. Pub L. 104-106 Information Technology Management Reform Act Division E, (Clinger-Cohen Act) tt. Title 18 Section 1831 et seq of, Economic Espionage (Jan 08) uu. DoD Anti-Tamper Guidelines (available through the DoD Anti-Tamper website www.at.dod.mil) vv. Department of the Navy Anti-Tamper Desk Reference (available from DoN AT Office at anti.tamper@navy.mil) ww. The Defense Acquisition Guidebook (DAG) (Interim) Chapter 8 (15 Jun 09) xx. F/A-18E/F and EA-18G Program Protection Plan (PPP) (14 Mar 07) (PMA265) yy. Security Guidance F/A-18 Hornet (All Series) and the EA-18G Growler Aircraft / Systems, (6 Jan 10) (PMA265) 2. Format. The required document shall be in Contractor format: a. The PPIP shall be used as a focal point for the Contractors Program Security. The PPIP is derived from the PPP and should not restate what is written in the PPP but simply state how the contractor will implement Program Protection. b. The PPIP is used to identify and monitor how a Contractor develops and performs Program Protection activities during performance of the contract. 3. Content. The Contractor s PPIP shall contain the following: a. Security Management b. Critical Program Information (CPI) / Critical Technologies (CT) / Critical Systems (CS) c. Operational Security (OPSEC) d. Information Assurance (IA) e. A section detailing the Contractors approach to the PPIP f. General methodologies that will be applied to the protection requirements g. The Contactor s process for identifying any existing / proposed CPI during developmental and RDT&E phases, and its protection / identification in the ECP process prior to ECP acceptance by the Government h. A section describing an effective and efficient protection of CPI, CT and CS, which shall include the following: (1) The Contractor s Program Security / OPSEC Management structure, including relationships with the corporate hierarchy and program subcontractors and suppliers. Page 4 of 8

(2) An overview of all Contractor s activities, operations, tests, and other associated activities to be undertaken in performance of the contract; identifying those in which classified information will manifest itself; identify the topics of the classification guide that specify the information that is classified; determine how, where, and when the classified information is embodied in the hardware, software or operations; determine what type access (visual, physical) permits knowledge of the classified information. (3) Identification of the CPI physical locations under the Contractor s or its subcontractors control and how the CPI is to be managed / tracked / secured throughout the CPIs life-cycle. (4) Assess the vulnerability of the CPI to intelligence collection in the following areas: Human Intelligence (HUMINT), Open Source Intelligence (OSINT), Signals Intelligence (SIGINT), Imagery Intelligence (IMINT), and Computer Network Operations (CNO). (5) Identify the planned countermeasures at each site where CPI is utilized / secured from the following security domains: Physical security; personnel security; telecom and network security, application, systems development, cryptography, and security architectures. (6) Address any special handling procedures required for CPI, and procedures for recovering CPI in the event of a mishap; address these procedures for all phases of the program, including: Program / System Technology Development, System Development & Demonstration, RDT&E, Production Deployment, Operations, Maintenance, Logistics, Transportation, Training, and Disposal under this contract for which the Contractor has control. (7) Describe the process that shall be used to assess new acquisitions (Incremental / Spiral upgrades, Engineering Change Proposal(s) (ECP s)) for CI / CPI and CT. (8) Describe how the Contractor shall comply with procedures for ensuring compliance with U.S. Government export statutes and regulations that affect CPI in a contracted program. (9) Describe the Contractor s procedures for public release of program information. (10) Describe the Contractor s Information Security Program (ISP) as a part of their PPIP. As an integral part of the ISP, describe the Contractor procedures for identifying, reporting and resolution of Facility Security Breaches; Classified Information Compromises, and Spillages including notification of DSS, DCMA, and Government Program Security Manager / Information Assurance Officer SECNAVINST 5510.36A, SECNAV M- 5510.36 and within the constraints specified in the DD 254 / CDRL / Contract (DoD 5220.22 M). (11) The OPSEC portion of the PPIP shall include establishment of an OPSEC support capability that provides for program development, planning, training, assessment, surveys, and readiness training. Additionally the contractor shall include the results of the five-step OPSEC analysis Identifying CI, CPI, and CT; Analyzing Threats, Analyzing Vulnerabilities, Assessing Risk, and Applying Countermeasures, Page 5 of 8

including those aspects of the foreign intelligence threat that are applicable to the specific contract. The following shall also be addressed: (a) General. Details of the OPSEC management concept to include contract identification, assignment of responsibilities, definition of milestones with target dates, provisions for continuous analysis, and how periodic revision as the contract activities evolve and become more specific and detailed. (b) Threat. The known threats to the contracting activity and include only that portion deemed applicable to the specific contract activities. The PPIP shall identify how these threats will be mitigated. (c) Sensitive Aspects of the Contract. An overview of all activities, operations, tests, etc. to be undertaken in performance of the contract; identifying those in which classified information will manifest itself; identify the topics of the classification guide that specify the information that is classified; determine how, where, and when the classified information is embodied in the hardware, software or operations; determine what type access (visual, physical) permits knowledge of the classified information, what tools / equipment / capability are required, and the specific national defense advantage provided by that information if it is protected. Use of electromechanical equipment is an operation that shall be included, as are subcontracting, hardware-in-the-loop testing, calibration and check-out, fabrication, static tests, breadboard and brassboard fabrication and testing, and laboratory experiments. A list of critical information, based on the above analysis, shall include all the information considered essential to the success of the effort, and all the information that must be protected to preserve the military advantage potentially provided by the effort. Additionally, the list shall include all the activities, operations, and tests that could reveal the critical information to foreign intelligence. (d) Vulnerabilities. The vulnerabilities derived by comparing identified threats to sensitive activities to determine which activities can be observed by foreign intelligence. Observe is defined to include all physical and chemical properties that can be noted and recorded by any type sensor. One such property is unintentional electromagnetic emanations, which may convey classified information. On this basis, TEMPEST is a part of OPSEC, and TEMPEST vulnerabilities shall be identified and mitigated. National security information shall not be compromised by emanations from Classified Information Processing Systems (CLIPS). NSTISSAM TEMPEST/2-95 with NSTISSAM TEMPEST/2-95A Amendment of 3 Feb 2000 shall be used as guidance for the installation of CLIPS. The Aircraft / System shall meet the requirements of CNSS AM TEMPEST 01-02 of 1 Oct 2002, and NSTISSAM TEMPEST/1-92 Level II of 15 Dec 1992. (e) Countermeasures. The unacceptable risks of the vulnerabilities identified above shall include; the protective measures deemed appropriate to negate or reduce the potential damage to the project. Page 6 of 8

(f) Organizational OPSEC Communications and Interfaces: A description as to how the Plan will be communicated to personnel supporting the program. (i) Internal: The Plan shall identify all OPSEC interfaces internal to the corporation such as Senior Corporate Leadership, OPSEC Working Group, OPSEC Coordinators, and program personnel. (ii) External: The Plan shall identify all external points of contact; Contracting activity, Defense Contract Management Agency (DCMA), defense Security Service (DSS), Federal Bureau of Investigation (FBI) and local Law Enforcement. The Plan shall identify the contacts primary role within the OPSEC program. Subcontractor and supplier OPSEC points of contact shall be similarly identified. (g) The categories of Potential Critical Information that shall be protected and planned for in the PPIP are: (i) Current and Future Operations (ii) Travel Itineraries (iii) Usernames and Passwords (iv) Access / Identification Cards (v) Operations Planning Information (vi) Personal Identification Information (vii) Entry / Exit (Security) Procedures (viii)capabilities and Limitations (ix) Address and Phone Lists (x) Budget Information (xi) Building Plans (xii) VIP / Distinguished Visitor Schedules i. Information Assurance (IA) section of the PPIP shall: (1) Contain a section that identifies the countermeasures at each site where CI, CPI, and CT is utilized / secured, from the following security domains (as applicable): Network Security and Information Technology (IT) access control and tracking. Describe the network architecture the Contractor shall use to support the contracted program and the architecture for connectivity with subcontractors and suppliers. (2) Define how Information Assurance (IA) practices are to be implemented. (3) Define how the Contractor and its subcontractors shall implement a plan for complying with the Department of Defense (DoD) PKI policy. (4) Define how the Contractor shall implement the following IA, IT and INFOSEC standards where applicable CJCSM 6510.01A, DoDD 8500.01E: Page 7 of 8

(a) Process for identifying any existing / proposed CI, CPI, and CT during developmental and RDT&E phases, and its protection / identification in the ECP process prior to ECP acceptance by the Government. (b) Coordination with the Program Manager (PM), Information Assurance Officer (IAO) for newly developed systems to determine the Information Assurance (IA) requirements for Certification and Accreditation (C&A), or Platform Information Technology (PIT). This is to include Platform IT systems including all ground-based support systems that connect to the platform. (c) Process for appropriately marking Government documents developed for this effort in accordance with the appropriate Security Classification Guide (SCG) and DoD document(s) including storage. (d) Security training program, including types of training, frequency, methods, course material, topics, and venues (e.g. classroom, virtual) j. Anti-Tamper (AT) is identified in a separate SOW, CDRL, DID requirement, when contractually required. 4. END OF. Page 8 of 8