Berkely Lab Authority to Operate

Summary

Since 2011, Berkeley Lab has operated under a continuous authorization model where authorization is a Laboratory function, based on a risk agreement with the Berkeley Lab Site Office. This model is consistent with the Department of Energy Office of Science Risk Management Approach under DOE Order 205.1C and National Institute of Standards and Technology guidance. 


The continuous authorization model is reaffirmed each year through an annual risk assessment process, as outlined in the Policy on Certification and Accreditation (System Authorization). This website contains the current System Authorization documents that support that risk assessment process.

These documents were updated to NIST 800-53 r5 in 2021. The Berkeley Lab Chief Information Officer reaffirmed continuous authorization to BSO on October 18, 2022. The annual PEMP and RASA processes form the artifact that marks continuous authorization.


Enclaves

The Berkeley Lab CIO has granted Authority to Operate under continuous authorization to the following Berkeley Lab enclaves:

Research and Operations Enclave (ROE)
• Enterprise Systems and Infrastructure (ESI) Enclave
• Energy Sciences Network (ESnet)
• National Energy Research Scientific Computing (NERSC)

Authorization Documents

The System Authorization Documents are organized into the following six groups:

1. Risk Acceptance and Understanding
2. Planning Documents
3. Testing and Remediation
4. Compliance
5. Security and Controls Catalog
6. References

As part of the continuous authorization model, the System Authorization Documents are subject to ongoing modifications either annually or as needed. 

1. Risk Acceptance and Understanding

Original signed risk agreement with BSO
March 2024 Updated Risk Agreement from BSO

Letter granting enclaves authority to operate
Research and Operations Enclave
Enterprise Systems and Infrastructure (ESI) Enclave
ESnet
NERSC

2. Planning Documents

Research and Operations Enclave
Enterprise Systems and Infrastructure Enclave
ESnet
NERSC

3. Testing and Remediation

4. Compliance

5. Security Controls Catalog

NIST SP 800-37 permits the grouping of systems that have similar risk factors and that are under that same management control into an accreditation boundary, which the DOE refers to as an enclave.

To determine LBNL's enclaves, we assessed the data processed by each system for confidentiality, integrity, and availability (CIA) in accordance with guidance from FIPS 199 and NIST 800-60 (View FIPS 199 Definitions). We established enclaves based not only on the CIA levels of the systems, but also on the management structure, technical architecture, and mission of the organization. This allows LBNL to group like systems together and to push security responsibility down to organizational managers. For purposes of Certification and Accreditation, the LBNL network is viewed logically as four enclaves.

NIST SP 800-53 Revision 5 requires management, operational, and technical security controls for NIST systems. Both common and enclave-specific controls exist and each control is selected, documented, and implemented appropriate to its FIPS 199 Categorization. Detailed descriptions of these security controls can be found at the following link:

6. References

Guidance documents and standards used to develop the ATO.


For questions or comments about this site please contact itpolicy@lbl.gov