An official website of the United States government
Here's how you know
A .mil website belongs to an official U.S. Department of Defense organization in the United States.
A lock (lock ) or https:// means you’ve safely connected to the .mil website. Share sensitive information only on official, secure websites.

Home : News : News
JBSA News
NEWS | April 30, 2024

JBSA-Fort Sam Houston prepares for Cyber Operational Readiness Assessment June 3-14

U.S. Army Signal Network Enterprise Center

From June 3-14, the Defense Information Systems Agency, or DISA, will conduct a Cyber Operational Readiness Assessment at Joint Base San Antonio-Fort Sam Houston and its ancillary sites.

These sites include JBSA-Camp Bullis, Camp Stanley, Camp Shelby, McAlester Army Ammunition Point, Corpus Christi Army Depot, and Red River Army Depot, which receive Nonsecure Internet Protocol Router Network (NIPRNet) or Secret Internet Protocol Router Network (SIPRNet) services from the Network Enterprise Center.

The focus of the inspection will be on the unclassified and classified network, standalone computer systems, servers, classified processing areas, communication closets, organization specific systems, VTC Endpoints, traditional security practices and policies and process used to secure the network.  

The agency will visit tenant organizations to inspect offices, looking for adherence to standards and to verity information protection compliance. 

In addition, DISA will inspect technical and operational adherence to the Department of Defense standard practices and policies, which includes secure and non-secure cyber security network compliance and physical security practices.

To ensure JBSA-Fort Sam Houston passes the inspection successfully, every unit and network user has a responsibility for being knowledgeable on proper cyber security, traditional security, and physical security practices. 

Commanders and senior civilian leaders at all levels within their organizations are asked to check and re-check that these standards are being adhered to, down to the individual user, to ensure awareness and compliance with cyber security measures.

The following are some tips network users can follow to ensure compliance success:

Cyber Security

  • Read your Acceptable Use Policy, or AUP. As users of the Army network, you sign an AUP when first being allowed access to any Army network. It contains all the basics you need to know to keep you compliant when using Government computer systems. Mobile device users are required to sign an additional AUP tailored for the device usage. 
  • At the conclusion of the business day, log computers off the NIPRNet system and reboot at the beginning of the next duty day ensure security patch compliance.
  • Power on and log in to SIPRNet systems during mandatory SIPRNet “uptime” periods as established by the senior commander’s operation order. Staying connected during the entire period is essential to systems getting the required updates.
  • Do not pass any information, especially critical operational traffic, over unclassified communications, such as phone, email, Facebook, etc.
  • Remove Common Access Cards, SIPRNet tokens and secure all SIPRNet drop lockboxes and hard drives prior to leaving computers unattended.
  • Do not plug unauthorized electronic devices, like thumb drives, hard drives, portable media players or cell phones into a government NIPRNet or SIPRNet computer system unless you have an approved exemption letter.

Traditional Security

  • Know who your security manager, information management officer, and information assurance support officer are and how to contact them.
  • Verify security clearances and escort unauthorized personnel.
  • Properly safeguard classified systems to include proper completion of applicable Standard Form 700 (security container information), SF 701 (activity security checklist) and SF 702 (security container check sheet).
  • Use proper document cover sheets and face your monitors away from your doors and windows to eliminate viewing by unauthorized personnel.
  • Properly label disc media and have proper classification markings, such as a Department of Defense Form 2056 (telephone monitoring notification decal) on communications equipment like computers, monitors, phones, etc., in a mixed environment.
  • Know how to identify and respond to a network security incident or classified message incident by using the network incident reporting aid located on the NEC-JBSA Information Assurance SharePoint site at https://armyeitaas.sharepoint-mil.us/sites/FtSamHouston_NEC/Cyber%20Ops%20Shared%20Document/Forms/AllItems.aspx?id=%2Fsites%2FFtSamHouston%5FNEC%2FCyber%20Ops%20Shared%20Document%2FNETWORK%20INCIDENT%20REPORTING%20AID%2Epdf&parent=%2Fsites%2FFtSamHouston%5FNEC%2FCyber%20Ops%20Shared%20Document.
  • Never bring portable or wireless electronic devices within three meters of a classified system. For more information or assistance on keeping your areas inspection ready, contact your unit’s G2/S2/security manager or your unit technical support G6/S6/information mission officer or internet assurance training officer.
  • Ensure all Common Access Cards and SIPRNET tokens are not left unattended in personal computers. They must be with you at all times.

For NEC support, call 210-808-8000 or email usarmy.jbsa.106-sig-bde.mbx.fsh-nec-operations-center@army.mil.