cdocutils.nodes document q)q}q(U nametypesq}q(Xdataone cybersecurity planqNXapproval workflowqNX4cybersecurity milestones in dataone project year oneqNXKdataone cybersecurity planning posture progression through project lifetimeq NX(institutional cybersecurity requirementsq NXgeneral principlesq NX dataone institutional componentsq NXdataone management planq X'dataone wide cybersecurity requirementsqNuUsubstitution_defsq}qUparse_messagesq]qUcurrent_sourceqNU decorationqNUautofootnote_startqKUnameidsq}q(hUdataone-cybersecurity-planqhUapproval-workflowqhU4cybersecurity-milestones-in-dataone-project-year-oneqh UKdataone-cybersecurity-planning-posture-progression-through-project-lifetimeqh U(institutional-cybersecurity-requirementsqh Ugeneral-principlesqh U dataone-institutional-componentsqh Udataone-management-planqhU'dataone-wide-cybersecurity-requirementsq uUchildrenq!]q"cdocutils.nodes section q#)q$}q%(U rawsourceq&UUparentq'hUsourceq(Xi/var/lib/jenkins/jobs/API_Documentation_trunk/workspace/api-documentation/source/design/security-plan.txtq)Utagnameq*Usectionq+U attributesq,}q-(Udupnamesq.]Uclassesq/]Ubackrefsq0]Uidsq1]q2haUnamesq3]q4hauUlineq5KUdocumentq6hh!]q7(cdocutils.nodes title q8)q9}q:(h&XDataONE Cybersecurity Planq;h'h$h(h)h*Utitleqcdocutils.nodes Text q?XDataONE Cybersecurity Planq@qA}qB(h&h;h'h9ubaubcdocutils.nodes field_list qC)qD}qE(h&Uh'h$h(h)h*U field_listqFh,}qG(h.]h/]h0]h1]h3]uh5Kh6hh!]qHcdocutils.nodes field qI)qJ}qK(h&Uh'hDh(h)h*UfieldqLh,}qM(h.]h/]h0]h1]h3]uh5Kh6hh!]qN(cdocutils.nodes field_name qO)qP}qQ(h&XAboutqRh'hJh(h)h*U field_nameqSh,}qT(h.]h/]h0]h1]h3]uh5Kh!]qUh?XAboutqVqW}qX(h&hRh'hPubaubcdocutils.nodes field_body qY)qZ}q[(h&XNThis document forms Appendix C of the `DataONE management plan`_, version 3.0 h,}q\(h.]h/]h0]h1]h3]uh'hJh!]q]cdocutils.nodes paragraph q^)q_}q`(h&XMThis document forms Appendix C of the `DataONE management plan`_, version 3.0h'hZh(h)h*U paragraphqah,}qb(h.]h/]h0]h1]h3]uh5Kh!]qc(h?X&This document forms Appendix C of the qdqe}qf(h&X&This document forms Appendix C of the h'h_ubcdocutils.nodes reference qg)qh}qi(h&X`DataONE management plan`_UresolvedqjKh'h_h*U referenceqkh,}ql(UnameXDataONE management planUrefuriqmXWhttps://docs.dataone.org/member-area/documents/management/project-management-plans-pmp/qnh1]h0]h.]h/]h3]uh!]qoh?XDataONE management planqpqq}qr(h&Uh'hhubaubh?X , version 3.0qsqt}qu(h&X , version 3.0h'h_ubeubah*U field_bodyqvubeubaubcdocutils.nodes target qw)qx}qy(h&Xt.. _DataONE management plan: https://docs.dataone.org/member-area/documents/management/project-management-plans-pmp/U referencedqzKh'h$h(h)h*Utargetq{h,}q|(hmhnh1]q}hah0]h.]h/]h3]q~h auh5Kh6hh!]ubh#)q}q(h&Uh'h$h(h)h*h+h,}q(h.]h/]h0]h1]qhah3]qh auh5K h6hh!]q(h8)q}q(h&XGeneral Principlesqh'hh(h)h*h}r?(h&j;h,}r@(h.]h/]h0]h1]h3]uh'j9h!]rAh?XStandards BodiesrBrC}rD(h&Uh'j>ubah*hubaubh^)rE}rF(h&XzDataONE will use several data and computing standards both for operations and as cybersecurity policy and plan guidelines.rGh'hh(h)h*hah,}rH(h.]h/]h0]h1]h3]uh5Kgh6hh!]rIh?XzDataONE will use several data and computing standards both for operations and as cybersecurity policy and plan guidelines.rJrK}rL(h&jGh'jEubaubh^)rM}rN(h&X**DataNet Partners**rOh'hh(h)h*hah,}rP(h.]h/]h0]h1]h3]uh5Kjh6hh!]rQh)rR}rS(h&jOh,}rT(h.]h/]h0]h1]h3]uh'jMh!]rUh?XDataNet PartnersrVrW}rX(h&Uh'jRubah*hubaubh^)rY}rZ(h&XAll DataNet awardees will, in concert, develop appropriate uniform approaches to data management and curation for the DataNet program. DataONE cybersecurity policies and posture will need to be compatible with DataNet guidelines.r[h'hh(h)h*hah,}r\(h.]h/]h0]h1]h3]uh5Klh6hh!]r]h?XAll DataNet awardees will, in concert, develop appropriate uniform approaches to data management and curation for the DataNet program. DataONE cybersecurity policies and posture will need to be compatible with DataNet guidelines.r^r_}r`(h&j[h'jYubaubh^)ra}rb(h&X.**The U.S. National Science Foundation (NSF)**rch'hh(h)h*hah,}rd(h.]h/]h0]h1]h3]uh5Kph6hh!]reh)rf}rg(h&jch,}rh(h.]h/]h0]h1]h3]uh'jah!]rih?X*The U.S. National Science Foundation (NSF)rjrk}rl(h&Uh'jfubah*hubaubh^)rm}rn(h&XDataONE and DataNet project and program sponsor. DataONE is responsible to NSF for cybersecurity operations and any Foundation specific policies or practices.roh'hh(h)h*hah,}rp(h.]h/]h0]h1]h3]uh5Krh6hh!]rqh?XDataONE and DataNet project and program sponsor. DataONE is responsible to NSF for cybersecurity operations and any Foundation specific policies or practices.rrrs}rt(h&joh'jmubaubeubh#)ru}rv(h&Uh'h$h(h)h*h+h,}rw(h.]h/]h0]h1]rxhah3]ryh auh5Kxh6hh!]rz(h8)r{}r|(h&X(Institutional Cybersecurity Requirementsr}h'juh(h)h*h(h&j9h'j7ubaubah*jubeh*U bullet_listr?ubeubh^)r@}rA(h&XIn this fashion, DataONE will attempt to create an integrated cybersecurity environment that meets its needs while not being overly burdensome.rBh'jh(h)h*hah,}rC(h.]h/]h0]h1]h3]uh5Kh6hh!]rDh?XIn this fashion, DataONE will attempt to create an integrated cybersecurity environment that meets its needs while not being overly burdensome.rErF}rG(h&jBh'j@ubaubeubh#)rH}rI(h&Uh'h$h(h)h*h+h,}rJ(h.]h/]h0]h1]rKhah3]rLh auh5Kh6hh!]rM(h8)rN}rO(h&XKDataONE Cybersecurity Planning Posture Progression Through Project LifetimerPh'jHh(h)h*h