Return to the USDOJ/OIG Home Page

Select Application Controls Review of the Federal Bureau of Prisons's Sentry Database System

Report No. 03-25
July 2003
Office of the Inspector General


Appendix VII
APPLICATION CONTROL CRITERIA

  1. The GAO's Federal Information System Controls Audit Manual.
  2. Department of Justice Order 2640.2D, Information Technology Security, Chapter 2, "Security Requirements."
  3. OMB Circular A-130, Appendix III, Section A 3.b.2.
  4. National Institute of Standards and Technology, Special Publication 800-18.
  5. National Institute of Standards and Technology, Federal Information Processing Standards Publication 73, Section 3.1.1.
  6. Office of the Inspector General Audit report number 03-13 "Independent Evaluation Pursuant to the Government Information Security Reform Act," fiscal year 2002, The Justice Consolidated Network.
  7. The BOP's Standard Operating Procedures.
  8. The BOP's SENTRY Contingency Plan.
  9. The BOP's Information Technology Investment Report.
  10. The BOP's Community Corrections Management Operations Procedures (PS 5100.07).
  11. The BOP's SENTRY "General Use Manual."
  12. The BOP's "SENTRY System Security Guide," dated June 23, 2000.
  13. The BOP's "SENTRY System Security Plan," dated February 25, 2000.
  14. The BOP's Security Evaluation Report.
  15. The BOP's Policy Standard 1237.12.