- PPSM Registry available on the SIPRNet at https://pnp.cert.smil.mil.
The Ports, Protocols, and Services Management (PPSM), is a DoD-level program that is currently hosted by the Network Services Enterprise Connection Division, but has unique reporting responsibilities outside of DISA. All of the Enterprise Connection Division's branches have important links into each other's roles and responsibilities that can be better leveraged in support of the warfighter and mission partners for applications, information systems, and networks that have been designed, configured, and authorized to operate on the enterprise infrastructure.
The PPSM program provides implementation guidance on the use of IP protocols and application and data services that traverse the DoD Networks in a manner that supports net-centric operations. The PPSM program also provides vulnerability and risk assessment information, compliance guidance, and technical assistance to achieve compliance for all information systems, applications, and services connected to the Department of Defense Information Networks (DoDIN). This type of support is given to senior DoD security officials, the intelligence community, and network administrators.
The PPSM program maintains a central registry database to track the Ports, Protocols, and Services (PPS) used by each DoD Information Systems (DoD IS). It also assesses and evaluates the inherent vulnerabilities associated with the use of specific PPS across network boundaries. In addition, the PPSM program aims to ensure that use of PPS on DoD networks are controlled and regulated, safeguarding DoD operations and interests while ensuring both the interoperability of joint applications and the security of the overall DoD information infrastructure.
For questions regarding PPSM, contact the PPSM Secretariat by phone at (301) 225-2904, DSN 312-375-2904 or send messages to firstname.lastname@example.org (NIPRNET) or email@example.com (SIPRNET).
|Information Assurance Support Environment (IASE)
||For additional information about Ports, Protocols, and Services Management, please visit the PPSM page on IASE.|
|PPSM Read Board
||PPSM has developed a Read Board in an effort to enhance the Program's communication and community involvement. The Read Board will be distributed at the end of each month and will provide details of the latest policy updates, PPSM PM comments and the results of that month's eVote.|
|Processes and Policies|
|Component Local Services Assessment (CLSA) Process
||The Component Local Services Assessment (CLSA) Process Is to be used by Department of Defense (DoD) Components and Mission Partners to generate an assessment for Local Services in order for it to be it added to the Category Assurance List (CAL) by the PPSM office. A Local Service is a Data Service that operates solely within the Site's Enclave boundary; the Authorizing Official (AO) acceptance of risk is required and boundary protection mechanisms must be configured to prevent traffic from traversing the Defense Information Network System (DISN) or traverse a PPSM approved tunnel where both enclaves are controlled by the same AO (i.e. Boundary 16). A Local Service is prohibited from exiting the enclave to traverse the DISN.|
|Exception Management Process
||The PPSM Exception Management Process provides the community with a mechanism to request the use of a Banned protocol or service for an operational need. The DSAWG reviews the exception request and makes a determination whether to accept or deny the shared risk to DoD Networks. |
|DoD Instruction 8551.01
||PPSM operates under the authority of the DoDI 8551.01, Ports, Protocols, and Services Management (PPSM).|
|Category Assurance List (CAL)
||The Category Assurance List (CAL) provides a collective list of all IP Protocols, Data Services, and associated Ports (that have been approved by the PPSM CCB) for use within the DoD on classified and unclassified networks. The CAL also contains the network boundary and assurance designations of each protocol or data service, which can be different on classified and unclassified networks.|
|Vulnerability Assessment (VA) Report
||Vulnerability Assessment (VA) reports documents the relative strength and weaknesses of the security features of an applications's data service; and identifies required DoD Network implementation strategies for: |
- Acquisition and Development processes (Program Manager and engineering)
- Certification and Accreditation processes (Component/Enclave)
- Organization, System, and Enterprise DAA
- Connection approval processes (UCAO/CCAO/DSAWG/DISN PAA)
- Perimeter and boundary defense engineering and analysis
|PPSM Registry User Guide
||This guide provides instructions for performing functions associated with initiating, submitting, and updating a Department of Defense Information System (DoD IS) registration in the PPSM Registry.|
|PPSM Network Boundaries
||This folder provides links to the latest PPSM Network Boundaries definitions document and PPSM Network Boundaries map for reference.|