An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock
( )
or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
To make sure we are protecting GSA systems from hackers and other cyber attacks at all times, each of us plays an important part in this security effort. The policies linked on this page will help you understand these efforts.
DevSecOps Model Separation of Duties - CIO IL-22-01 DevSecOps Model Separation of Duties [PDF - 50 KB] (03-10-2022)
This instructional letter (IL) is to provide the security practice instructions and procedure guidance for teams to achieve Separation of Duty (SOD) in a Development Operations/Development Security Operations (DevOps/DevSecOps) working model.
2183.1 CIO Order (10-19-2021)
Enterprise Identity, Credential, and Access Management (ICAM) Policy.
IT Security Policy - CIO 21001N GSA Information Technology Security Policy [PDF - 816 KB] (Sept 21, 2022)
Newly updated IT Security Policy outlines all aspects of IT security required to keep GSA’s assets protected. Objectives of the policy are to ensure the confidentiality, integrity, and availability of all IT resources by employing security controls and managing risk.
GSA Information Technology (IT) Rules of Behavior - CIO 2104.1B [PDF - 247 KB] (April 2, 2019)
This Order sets forth GSA's policy on user responsibilities for the secure use of the agency's IT assets. The General Rules of Behavior implement federal policies and GSA Directives and are included in GSA mandatory training.