Skip to main content

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Share your experience with the FAS IT-Playbook by taking this brief survey

Ongoing Authorization (OA) Program

What is the Ongoing Authorization (OA) Program? GSA has established an Ongoing Authorization (OA) Program to achieve Ongoing Authorization to Operate (OATO) for GSA managed information systems. OA provides a more frequent view into the security posture of the onboarded systems. The OA Program uses biannual reviews to ensure all responsible parties are executing their responsibilities according to the defined OA Program requirements and system OATOs are maintained.

For more information, visit the IT Security and Privacy Site.

OA Program Qualification

GSA information systems must meet the following requirements before it can be considered for onboarding into the OA Program. The following prerequisites are part of the pre-assessment conducted by the OA Team and determine the eligibility of the system to receive an OATO.

The information system must have had all of its NIST SP 800-53 Revision B security controls for its applicable FIPS 199 level, and any additional controls required by the GSA CISO assessed within the past 18 months and issued an ATO.

The information system must have deployed GSA's enterprise Information System Continuous Monitoring (ISCM) tools, based on applicable system requirements, defined within the GSA ISCM Enterprise Security Management Tools.

Request the OA template through your ISSM or via https://ociso.gsa.gov/ for more insight into qualification. The OA Checklist is completed by the OA Team in coordination with the system team members (SO, OA ISSO and OA ISSM).

OATO vs. 3-Year cycle ATO

The key difference between the classic 3-Year ATO and an OATO is that the latter does not require re-authorization every three years, however an event driven reauthorization will be required if the system:

Has a significant change as defined in NIST SP 800-37, Appendix F.

Has a security breach that impacts the security posture of the system.

Important: GSA information systems that do not meet the qualifying requirements for transitioning into the OA Program must follow one of the A&A processes defined by CIO-IT Security-06-30.

Figure 1: Ongoing Authorization Steps

Figure 2: OA RACI Legend

Letter Role Description
(R) esponsible Responsible This team member does the work to complete the task. Every task needs at least one Responsible party, but it's okay to assign more.
(A) ccountable Accountable This person delegates work and is the last one to review the task or deliverable before it's deemed complete. On some tasks, the Responsible party may also serve as the Accountable one.
(C) onsulted Consulted Consulted parties are the people who provide input based on either how it will impact GSA work or their domain of expertise on the item itself.
(I) nformed Informed These team members simply need to be kept in the loop on progress, rather than roped into the details of everything.

Figure 3: OA Program Tasks and Responsibilities RACI Table

Phase Tasks ISCM Team ISSO/SO ISSM ISP CISO AO
Pre OA Define GSA's ISCM Strategy & Program (CIO-IT Security-12-66) CIIACRAI
Preliminary Vetting RCIAII
ISCM Kick Off RCCAIII
Full Performance Metric Review / ISCM Checklist RRCIACII
ISCM OAR ACRARCII
OA Letter Draft CCRAIII
Signed OA Letter IICCRAR
Onboarding Documentation RCCRAII
OA Maintenance and updates of System Documentation CRACIII
ISCM Annual ISSO Checklist IRACIII
Biannual PMR RRCACII
ISCM documentation maintenance RCICIAII
ISCM Process/Program improvements RCCAII