Official websites use .mil
Secure .mil websites use HTTPS
The National Access Elsewhere Security Oversight Center (NAESOC) is designed to provide consistent oversight and security management for select facilities who do not possess classified information on-site ("access elsewhere").
Please review the below tabs to identify tools that can assist you in supporting your facility's security program. All tabs are “self-help” tabs and you will find, topics, tools, questions and answers that will prepare you for meeting your needs and requests. If you cannot find what you are looking for, please email the NAESOC General Mailbox.
Schedule local ISAC or NCMS speaking request
Learn more about the NAESOC
NISS Messenger always available
Expanded hours are here to be able to talk to a LIVE AGENT at the NAESOC. You can now speak to a Security Specialist at the NAESOC Monday through Thursday from 9:00 a.m. to 3:00 p.m. and Friday from 8:00 a.m. to 2:00 p.m. at (888) 282-7682, Option 7.
The NAESOC Help Desk will be deploying to support the NCMS 59th Annual Training Seminar in New Orleans on June 6-8. Stop by and visit for a chance to get your questions answered and check on any issues you may be interested in!
The National Background Investigation Services (NBIS) is the federal government's one-stop-shop IT system for end-to-end personnel vetting - from initiation and application to background investigation, adjudication, and continuous vetting. NBIS is one consolidated system designed to deliver robust data protection, enhance customer experience, and better integrate data across the enterprise.
Click here to find the Onboarding Readiness Checklist.
NBIS training resources are migrating from the CounterMeasures website to ServiceNow.
When users have a registered account and have logged in, they will be redirected to the ServiceNow homepage:
Once logged in and on the homepage, users should go to https://dcsa.servicenowservices.com/nbis
Select the “Tour” tab in the top right, which provides a guided walkthrough of the training resources available.
Industry partners can find training materials including job aids, knowledge articles, e-learnings, and video shorts. The knowledge articles provide a direct link to the e-learnings, video shorts, and interactive events on the STEPP NBIS homepage. New training content and registration for upcoming live events are added regularly.
Access to ServiceNow and STEPP requires two separate active accounts. If users have not done so, they are encouraged to set up their respective accounts.
On October 1, 2023, NBIS eApp will replace the Electronic Questionnaires for Investigations Processing (e-QIP) system for completing and processing investigative forms (SF85, SF85P, SF85PS, and SF86). After October 1, 2023, e-QIP will no longer be accessible. The Department of the Air Force is requiring transition by 1 August 2023.
Keep checking here or at the NBIS website for updates.
DoD 5220.22-M defines a security violation as a failure to comply with the policy and procedures established by the NISPOM that reasonably could result in the loss or compromise of classified information. Security incidents involving classified information must be appropriately reported to DCSA.
Facilities assigned to the NAESOC must immediately report security violations via NISS Messenger. The Security Incident Job Aid provides recommendations and guidance on security incident response and remediation and submitting initial and final security violation reports.
Contractors shall report all relevant and available information indicative of a potential or actual insider threat. Please ensure reporting is made via NISS messenger when including Personally Identifiable Information.
The Reporting the Threat job aid and CDSE Insider Threat Content have been developed to support reporting and Establishing Insider Threat Programs.
You can find additional information on Insider Threat reporting on the new Counterintelligence Awareness and Reporting for NAESOC Facilities webex
Facilities shall report cyber incidents or intrusions regardless of classification level of information or information systems involved in the intrusion provided the contractor determined that 1) circumstance of intrusion are sufficient to qualify as actual, probable, or possible espionage, sabotage terrorism, or subversive activities, and 2) these activities constitute a threat to the protection of classified information, systems, or programs that are otherwise covered by the NISPOM.
NAESOC Facilities shall report cyber intrusions via NISS messenger.
All Suspicious Contact Reporting shall be reported to your local DCSA CI Special Agent.
Foreign Vetting in Academia: A tri-fold
Counterintelligence Awareness and Reporting: A tri-fold
Counterintelligence Best Practices for Industry Booklet
Counterintelligence Awareness and Reporting for NAESOC Facilities
NEW! Your Threat Baseball Cards:
As reported in the Voice of Industry, click here for a resource you can use to enhance your security awareness and reporting program.
Adverse information consists of any information that negatively reflects on the integrity or character of a cleared employee, that suggests that his or her ability to safeguard classified information may be impaired, or that his or her access to classified information clearly may not be in the interest of national security. https://www.dcsa.mil/Portals/91/Documents/CTP/tools/ISL-2011-04-Revised.pdf It should be via DISS.
Change Conditions are those organizational changes that could affect the Facility Clearance.
Ownership, including stock transfers
Key Management Personnel
Foreign Ownership, Control, or Influence (FOCI)
Cage Code changes (rare)
Formal submission of Changed Conditions are required to be completed in NISS as an FCL Change Condition Package. Please ensure all business documentation is submitted to substantiate the reporting.
*Note: When entering discussions, consultations, or agreements that may reasonably lead to effective ownership or control by a foreign interest, the contractor shall immediately report the details to DCSA via NISS messenger.
Facility Profile Update Requests–Information that can be edited by Industry users includes, but is not limited to new contracts, program assets, and essential Key Management Personnel and security staff contact information. Facility profile updates have replaced Requests For Information (RFI); so ensure that you review your profile and submit timely updates.
*Note: Please ensure all of your appropriate DD Form 254s are submitted via NISS. *Note: FCL Change Conditions should not be submitted as a Facility Profile Update Request.
You can reach us via NISS Messenger, phone 888-282-7682 (Option 7), or email at DCSA.NAESOC.GeneralMailbox@mail.mil
Defense Counterintelligence and Security Agency (DCSA)
P.O. Box 644
Hanover, MD 2107
You will not have an individual ISR, however, you will have the NAESOC team as your DCSA POC.
It is very important to identify your local CI Special Agent (CISA) in NISS Some of the information CI shares with Reps is for information only and should not be released to industry. CI issues should be directly coordinated with your local CISA. If you require assistance in locating your CISA, please reach out to the NAESOC Help Desk.
Instructions for updating you facility can be found in the NISS Knowledge Base with the Job Aid, “Submitting a Facility Profile Update Request”
NAESOC FSOs will benefit from completion of FSO Orientation for Non-Possessing Facilities (IS020.CU) curriculum.
Try the Industrial Security Short: You're a new FSO: Now What? ISS0047. CDSE updated this Industrial Security short that introduces the CDSE Facility Security Officer (FSO) program (minimum of 13 eLearning courses required for all FSOs). This short also provides newly appointed FSOs a high-level overview of their responsibilities and guides them to essential resources. (https://www.cdse.edu/Training/Security-Shorts/Industrial-Security-Shorts/)
Here is a collection of Industry tools at your fingertips.
And you can find the FSO Toolkit here
You can start with a Best Practice of using the "Self Inspection Handbook for Contractors" which can be found at https://www.dcsa.mil/mc/isd/tools/. In it you will find eight checklists that are common to ALL NAESOC companies:
- Procedures [117.7]
- Reporting Requirements [117.8]
- Entity eligibility determination for access... [117.9]
- (Contractor) eligibility for access to classified... [117.10]
- Foreign Ownership, Control, or Influence (FOCI) [117.11]
- Security training and briefings [117.12]
- Classification [117.13]
- Visits and meetings [117.16]
Courier briefings are required by your GCA or per guidance found on your DD Form 254. Please review those for guidance.
Access the Foreign visit Brochure. You can also email us for specific guidance.
The change condition package shall include the purchase agreement/Member Interest transfer, an updated operating agreement, updated legal organization chart, exclusion resolutions (as applicable) as well as any additional business documentation to support subsequent changes to the facility post acquisition. If there is any foreign ownership associated with the acquiring company, please provide immediate notice so that we can begin the FOCI action plan prior to the close of the acquisition.
These monthly briefings will be held on the second Thursday of each month. Locations will be the same, unless new ones are added or some are taken off the list due to IT issues or COVID-19 Health Protection Measures. The topics are fluid because they wait to send the announcements until they have confirmation from the briefers, and do not send them out until its confirmed. The topic is locked in about 30 days prior to the SVTC an email will be sent out asking for attendees. They will then send a link to a registration page. On that page, there will be the lists of locations hosting the SVTC.
Please continue to monitor the DCSA website for updated information. The following FAQ is the current guidance: "Are contractors in states that have enacted laws authorizing the medical use of marijuana, or in states that have enacted laws authorizing the use, possession, production, processing and distribution of marijuana, required to report use, possession, production, processing, or distribution of marijuana by cleared contractor personnel? YES, any of these activities must be reported as adverse information in accordance with NISPOM paragraph 1-302.a." The same guidance applies for CBD.
No. However, all new DD Form 254s must reflect NAESOC as the Cognizant Security Office.
You will need to request the FCV Industry role in NISS to have ability to verify FCLs. You will then be able to verify that FCL within NISS.
FAQs for Controlled Unclassified Information (CUI) have been published. Download this Quick Start Guide for a greater understanding of CUI and your part in protecting it.
Answer on the Cybersecurity Maturity Model Certification (CMMC) can be found on the DCSA website at: Controlled Unclassified Information.
The National Access Elsewhere Security Oversight Center (NAESOC) is a centralized office providing consolidated and consistent oversight and security management for select access elsewhere companies in the National Industrial Security Program (NISP). This office handles communications, guidance, and education for its assigned facilities and associated Government Partners. The relationships and partnerships created by the new oversight center optimize communications, threat reporting, and vulnerability identification and mitigation.
The NAESOC offers many advantages for an Access Elsewhere facility. It is a centralized office, providing consistent oversight and security management for select facilities who do not possess classified information on-site. It: Coordinates: Communications, guidance, and education to facilities and government partners. Provides: Continuous outreach, consistent direction. Creates: Improved communications, threat reporting, and vulnerability identification and mitigation. Some may consider it a disadvantage they are no longer assigned to an ISR within a local Field Office. DCSA discovered that formerly, most AE facilities had not received effective risk prioritization because of capacity limits on that relationship. The lack of interaction with government security oversight resulted in an unidentified vulnerability factor. The NAESOC reviews risk in a non-traditional way of doing business…a tiered response approach. Being assigned to a risk team ensures that your issues are addressed soonest by the correct expert.
Yes. If your facility is assigned to the NAESOC, your Facility Security Officer (FSO) will be notified by an automated notification from National Industrial Security System (NISS). In addition, the NAESOC will send a “Welcome Letter” via email to the FSO.
Yes, if necessary. Assignment to the NAESOC is based on many factors, including risk criteria. If specific thresholds are exceeded, your facility will be considered for assignment to a local field office.
Please refer to the 32 CFR section 117.12 Security Training and Briefings.
The NAESOC supports and attends local security councils. Please stay involved locally and feel free to ask for opportunities for the NAESOC to provide presentations and support for those meetings. The procedures to ask for the NAESOC to present can be found on our website.
The National Industrial Security System (NISS) External User Training is now available in STEPP. Log into STEPP to view this course.
Training job aids are available for Industry and Government users within the NISS application’s Knowledge Base. Examples include: How to Submit a Sponsorship Request, How to Submit a Facility Verification Request, How to Message my ISR, and Facility Profile Update Request. Please note, this is not an all-encompassing list of training products.
The Industrial Facility Profile Updates Feature in NISS provides Industry with the ability to update information formerly collected using the paper Request for Information (RFI) and eliminates the need to complete the RFI form. The job aid for Industrial Facility Profile Updates can be found in the NISS Knowledge Base under "Facility Profile Update Request - Full Operational Capability." Log in today!
Click here to be redirected to the DCSA NISS page: Registering for a NISS account
Contact the NAESOC Knowledge Center for support: phone 888-282-7682 (Option 7), or email DCSA.NAESOC.GeneralMailbox@mail.mil
Within the NISS dashboard view, NISS Training Repository, go to External Resources and look for topic area “Messaging in NISS – Industry.” If you need further instructions please email us.
Within the NISS dashboard view, NISS Training Repository, go to External Resources and look for topic area “Reporting a Change of Condition.” If you need further instructions please email us.
NISS only allows one Change Condition package opened at any given time. If a draft package exists, archive the package and start a new Change Condition package. Check out the DCSA DISS Information Page for general DISS training and issues.
DISS serves as the enterprise-wide solution for personnel security, suitability, and credentialing management for DoD military, civilian, and contractors. Support and all of the latest information can be found HERE. Please check out their wide-ranging list of FAQs.
Click DISS Account Request to be redirected to the DISS Resources page where you can find the “access request” tab.
A minimum of interim secret eligibility is required to access DISS. Account Managers within each Component/Agency/Company will determine the specific DISS customer user base and assign user roles based on Component/Agency/Company guidance and responsibilities.
If you need assistance, contact the Customer Engagements Team (CET), from 6 am – 6 pm Eastern Time. The CET team provides support for DISS, DCII, and SWFT systems. Telephone: 724-794-7765 Email: email@example.com
An insider threat program plan endorsed by the Insider Threat Program Senior Official (ITPSO) (32 CFR Section 117.7(b)(4))
Formal appointment by the contractor of an ITPSO who is a U.S. citizen employee and a senior official of the company (32 CFR Section 117.7(b)(1)(iii)).
Contractor reviews, certified annually (32 CFR Section 117.7(h)(2))
Reporting (32 CFR Section 117.8).
Insider threat training (32 CFR Section 117.12 (g))
User activity monitoring on classified information systems (as required) (32 CFR Section 117.18 (b)(4)(i).
Risk Management Framework (RMF) (as required) (32 CFR Section 117.18 (e)
CDSE recently released the 2023 Insider Threat Vigilance Campaign job aid. The job aid promotes a different vigilance theme each month. CDSE will provide awareness materials relevant to each monthly theme to be shared with your workforce. Use the job aid to jump-start your 2023 annual vigilance campaign or tailor it to your organization using resources from our Insider Threat Toolkit Vigilance Tab located at https://www.cdse.edu/Training/Toolkits/Insider-Threat-Toolkit/#vigilance
Insider Threat Program (ITP) for Industry. This job aid provides an overview of the insider threat program requirements for industry as outlined in the NISPOM, training, definitions, resources, and more.
Sample Insider Threat Program Plan for Industry. This sample plan provides recommendations for creating an InT program and can be tailored around your organization’s specific rules and guidelines.
Establishing a Program Toolkit. This toolkit provides information on how to establish an InT Program and procedures for responding to an InT action.
Insider Threat Reporting Job Aid. This job aid explains the reporting requirements and procedures for Federal agency employees and cleared contractors, and the consequences of failing to meet these guidelines.
Insider Threat and Industry Webinar. This webinar addresses the requirements for establishing an InT program, which includes developing an implementation plan to gather, share, and report relevant InT information from offices across the contractor’s organization.
Establishing an Insider Threat Program for Your Organization INT122.16 (cdse.edu). CDSE’s course provides guidance for organizational InT program managers on how to organize and design their specific program.
Insider Threat Definitions Job Aid. This job aid acts as a quick reference glossary of commonly used words within the InT space in an easily accessible format for InT professionals.
INSIDER THREAT WEBEX. In order to identify the risks and mitigations regarding Insider Threat for Access Elsewhere facilities, the NAESOC has specifically prepared this webex for the requirements of the non-possesing facility.
CHECK OUT INSIDER THREAT CASE STUDIES
CDSE has added a new case study to the case study library:
Ahmedelhadi Serageldin – A case of an insider’s mishandling of classified information
Russel Langford – A case study of an insider’s kinetic violence
In conjunction with the Center for Development of Security Excellence, the NAESOC has developed the below listed resources for your reference and use on the CDSE webinar web site:
NEW! Tips for Setting Up Your Access Elsewhere Security Program
FCL Oversight and Excluded Parent Companies
Introduction to the National Access-Elsewhere Security Oversight Center Field Office
National Access Elsewhere Security Oversight Center, now what?
National Access Elsewhere Security Oversight Center for Facility Security Officers
National Access Elsewhere Security Oversight Center for Government Contracting Authorities
Lessons Learned and Best Practices for FSOs