EPRM is the approved application for Air Force Antiterrorism and IDRMP assessments; effective 1 July 2019 all such assessments are to be entered in EPRM.
AFI 31-101 directs the designation of an approved automated Integrated Defense Risk Management Process (IDRMP) application to facilitate the ID risk management process. In June 2018, the "DoD Antiterrorism" module of EPRM was fielded at several Air Force installations to evaluate its ability to satisfy IDRMP requirements. AF/A4S identified many changes that were incorporated into the current IDRMP module.
Please refer to the NOTAM and respective documents below for more information.
Web Training: Available Now
E-mail firstname.lastname@example.org for details.
FREQUENTLY ASKED QUESTIONS:
ATFP or IDRMP
I’m confused why ‘ATFP or IDRMP’ is one assessment type in EPRM.In the last year DoD has aligned their process with IDRMP. Because of that, A4S is aligning their policies regarding IDRMP with DoD. In the latest release both are now a single process.Completion of the “ATFP or IDRMP v2” objective in EPRM satisfies your requirement for an annual IDRMP risk assessment.
Tracking Vulnerabilities in EPRM
Do I have to start an assessment to track my vulnerabilities and remediations? Yes, you have to complete an assessment to track your vulnerabilities.For any vulnerability question (i.e. benchmark) for which the answer is ‘no’ (i.e. ‘not satisfied’), the assessor uses the comment field(s) to document the vulnerability.In the analysis section all ‘no’ answers feed a list of possible remediations.• Assessor can add them to the plan of action, assign it to an individual for completion, calculate the ‘revised’ risk that will result from remediation, and track its status. When remediation is complete, it will also provide updated risk scores for the installation.Is there a way for me to enter a vulnerability without starting an assessment?No, you have to complete an assessment to track your vulnerabilities.In the previous AT vulnerability management system (CVAMP), all vulnerabilities ‘should’ have been associated with a local or HHQ assessment. However, in practice, many commands would put in ‘ad hoc’ observations/vulnerabilities. Those entries, though somewhat useful, were of limited value at HHQ because they could not be viewed in the context of the other protections that were in-place and the totality of the risk resulting from that vulnerability.Now, when an assessment is entered, commands will document the protections in-place and those that are not by responding to the list of relevant DoD Benchmarks (like with ForcePRO). For those protections that are not in-place (i.e. the benchmark is not being met), commands can propose mitigation. All vulnerabilities will thereby be associated with the DoD benchmark to which they are most closely related, for tracking and reporting purposes. Enforcing the need to address vulnerabilities as part of an overall assessment, allows each vulnerability to be viewed more completely within the context of the risk (asset/threat/vulnerability) at the installation.Is there a process for documenting emerging (ad hoc) vulnerabilities?Yes, between the annual risk assessments, vulnerabilities may arise that were not identified in the previous assessment. Document those vulnerabilities by updating the last assessment by adding the newly identified vulnerability:1. Make a copy of the last assessment.2. Navigate to the ‘conduct assessment section, and identify the benchmark that is most closely related to the vulnerability3. Mark the benchmark ‘no’ (i.e. ‘not satisfied’) then use the ‘comment’ field(s) to document the vulnerability.4. Lock the assessment.5. In the analysis & remediation section, add the vulnerability (benchmark) to your plan of action, assign it to an individual for completion, and track its status. Upon remediation completion, the system will also provide updated risk scores for the installation.
Is the MAAP assessment capability available in EPRM?For MAAP assessments, the Joint Staff is in the process of developing a separate module that executes the very specific MAA process. (Expected fielding date is late summer 2019.)• When fielded, the module will be used for a more comprehensive assessment (all benchmarks) of the identified Task Critical Assets (TCA) and Task Assets (TA) on the installation for their MAA assessments.• Training and guidance will be provided to MAA teams when the module is fielded• We do not anticipate Installation-level use of the MAA moduleWho needs to do a MAAP assessment?Currently, MAAP assessments are not an installation-level responsibility and are conducted by Service/CCMD/Joint MAA teams
Interagency Security Committee (ISC) Assessments
What is the ISC module?The ISC module is very similar to the DoD ATFP/IDRMP module, but it has the necessary modifications to make it ISC compliant, which includes a separate set of benchmarks, a Facility Security Level (FSL) calculation, and DHS baseline threat preload.Is EPRM ISC compliant?Yes, EPRM is certified to be an ISC compliant tool to do risk assessments of off-base facilities to DHS' ISC standardsDo I have to follow ISC standards?DoDI 2000.12 change 3, requires use of the ISC standards for some DoD facilities. Specifically paragraph 4.o., says: "Unit commanders or civilian managers and directors responsible for DoD elements occupying leased facility space, or space in buildings owned or operated by the U.S. General Services Administration (GSA) not located on DoD property, WILL COMPLY with the applicable Federal Interagency Security Committee standards..."When completing an ISC assessment, why is selecting ‘no’ to a threat not an option?The ISC Design Basis Threat (DBT) dictates that all threats will apply. You are to confirm the rating of the threat. If you deviate from the DBT rating you have to justify the reason (normally based on a local assessment) by adding a comment.
How do I know if my asset is a Task Critical Asset (TCA)?There are two ways to determine what the TCAs are on your installation.1. Within the system, when you look at the hierarchy if your installation has any TCAs that were imported from the authoritative database (SMADS) they will already be listed with their tier level. To find them, you can search SMADS on the hierarchy either as the node manager (“Node Management”) or on the screen that comes up right after you select “Start Assessment”.2. Consult with the installations operations department which will have access to the list of TCAs in either SMADS or AF-CAMs. You will typically find the POC for the systems to be the Critical Asset Risk Management (CARM) program manager who also has access to Critical Asset Identification Process (CAIP) documents.What are the things called “TCAs” or “SMADS” in my hierarchy?Task Critical Assets (TCAs) and Task Assets (TAs) are assets that are related to specific missions and are nominated and approved at the Service and Joint Staff level. In preparation for the Mission Assurance Assessment Module (MAA) those TCAs/ TAs have been added to the EPRM hierarchy from the Strategic Mission Assurance Data System (SMADS). These items are for the MAA module and should be left as is.
Copyright © 2020 Alion Science & Technology. All rights reserved.