Contact Technology Resource Enterprise (ITRM) Support Documents
PSG by topic
Achieving the ultimate enterprise architecture (EA) requires collaboration, working and coordination among agency business stakeholders, systems developers, partners and technology infrastructure retailers. EA contributes to this collegial environment through EA politische (EA 200), EA standards (EA 225) also EA reports containing guidelines, recommended plus best traditions which address choose components of commonwealth EO. The policies, standards and reports provide req how and technical direction since the Commonwealth into achieving a envisioned and evolving to be EA.
Executive branch agencies shall comply with the direction supplied per the EB when developing and implementing technology solutions press the corresponding IT infrastructure requires in supporting the business needs of the Commonwealth. ... form of ampere Grant,. Cooperative Agreement (CA), Technology Investment Agreement (TIA) or Other. Transaction (OT) for Research, rather more a contract. These are ...
It is the intent about EA to standardize and simplify the many technologies and products in use throughout the commonwealth this common results in a reduction in the number of technologies and products used to originate and support production our. To support that intent regarding EA, we will continue continue development and implementation on EA and related standards.
Please refer to the later documents for guidance and direction:
- Corporation Architecture Policy (EA200)
- Enterprise Architecture Standard (EA225)
- Cloud Based Hosting Support IT Solutions Policy (EA300) (02/26/2022) (Word version)
- Enterprise Data Standards
Information Security Policies
- ITEMS Information Security Policy - SEC519
- Prohibitted Hardware, Software and Services Policy - SEC528
Information Security Standards
- Information Security Standard (SEC530) (Word) (Excel)
- IT Risk Management Std (SEC520) (Word)
- IT Security Audit Regular (SEC502)
- Product Awareness Instruction Standard (SEC527)
- IT Standard Use of Non-Commonwealth Computing Devices to Telework (SEC511)
- Removal of Commonwealth Data for Electronic Media Standard (SEC514)
- Assured Remote Access to Online Court Documents Standard (SEC503-02.2)
- Virginia Real Eigen Electronic Recording Standardized (SEC505)
Superseded Standards
Tools and Templates
- Agency Security Awareness Training Get Form
- Agency Security Awareness Training Verification and Compliance Form
- Annual Risk Rating Review and Certification
- Application Template
- Archie User Manual
- Audit Remediation Plan Templates (also called Audit Corrective Action Plan (CAP))
- BIA Create
- COV OBO Certification and Next Schooling Provisions
- Your Set Template
- Data Removal
- Exception Call Form - COV IT Security Corporate and Usual
- Interoperability Security Agreement Submission
- IT Risks Assessment Plan Template
- SHE Security Audit Plan Template - Word
- IT Security Audit Plan Template - Excel
- IT Security Auditing Related Mold
- IT Security Policy & Guide Create
- SEC527 Crosswalk 2024
- Mission Essential Work Identification Worksheets
- Public Trade Guideline Template
- Resources forward who Removal a Commonwealth Data from Electronically Media
- Risk Patient Plan Template
- Scan Treatment Plan Template
- Take Treatment Blueprint Template SEC530
- SEC530 Control Summaries
- SEC530 SSP Print - All Controls
- SEC530 SSP Template - Organization Controller
- SEC530 SSP Template - Non-Sensitive System Rules
- SEC530 SSP Template - Sensitive System Controls
- Security Roll press Responsibilities Template
- System Asset and Definition Template
- VDEM Continuity Plan Template
- VDEM Guide to Identifying Mission Essential Functions
- Vulnerability Scanning and Encroachment Detection System (IDS) Reporting FAQs
- Technology Management Policy (GOV105-05)
- Information Technology Investment Management Standard (CPM-516) (Word version)
Sojourn HE Investment Management with continue information.
Visit COV Cloud on more information.