DoD OPSEC Manual
DoD OPSEC Manual
MANUAL
NUMBER 5205.02
November 3, 2008
Incorporating Change 2, Effective October 29, 2020
USD(I&S)
1. PURPOSE. In accordance with the authority in DoD Directive (DoDD) 5205.02 (Reference
(a)), this Manual implements policy, assigns responsibilities, and provides procedures for
managing DoD OPSEC programs.
2. APPLICABILITY. This Manual applies to OSD, the Military Departments, the Office of the
Chairman of the Joint Chiefs of Staff and the Joint Staff, the Combatant Commands, the Office
of the Inspector General of the Department of Defense, the Defense Agencies, the DoD Field
Activities, and all other organizational entities within the Department of Defense (hereafter
referred to collectively as the “DoD Components”).
4. POLICY. It is DoD policy according to Reference (a) to establish and maintain OPSEC
programs to ensure national security-related missions and functions are protected. This Manual
lists baseline requirements. Nothing in this Manual abrogates or limits the authority of the Heads
of DoD Components to apply more stringent OPSEC standards as commanders and/or directors
deem necessary.
8. RELEASEABILITY. Cleared for public release. This manual is available on the Directives
Division Website at https://www.esd.whs.mil/DD/
9. SUMMARY OF CHANGE 2. This administrative change updates the title of the Under
Secretary of Defense for Intelligence to the Under Secretary of Defense for Intelligence and
Security in accordance with Public Law 116-92 (Reference (d)).
Enclosures
1. References
2. Responsibilities
3. Program Management
4. OPSEC Assessments and Surveys
5. Information Protection Requirements
6. Contract Requirements
7. OPSEC Education, Training and Awareness
Glossary
Change 2, 10/292020 2
DoDM 5205.02, November 3, 2008
TABLE OF CONTENTS
REFERENCES ................................................................................................................................5
RESPONSIBILITIES ......................................................................................................................6
INTRODUCTION .....................................................................................................................9
DoD COMPONENT OPSEC PROGRAM MANAGER ..........................................................9
SUBCOMPONENT OPSEC PROGRAM LEVELS .................................................................9
INTRODUCTION ...................................................................................................................33
PROCEDURES........................................................................................................................33
3
Change 2, 10/292020 CONTENTS
DoDM 5205.02, November 3, 2008
INTRODUCTION ...................................................................................................................35
EDUCATION AND TRAINING ............................................................................................35
AWARENESS TRAINING .....................................................................................................36
GLOSSARY ..................................................................................................................................37
TABLES
4
Change 2, 10/292020 CONTENTS
DoDM 5205.02, November 3, 2008
ENCLOSURE 1
REFERENCES
(a) DoD Directive 5205.02E, “DoD Operations Security (OPSEC) Program,” June 20, 2012, as
amended
(b) National Security Decision Directive No. 298, “National Operations Security Program,”
January 22, 1988
(c) DoD Manual 8910.01, Volume 1 “DoD Information Collections Manual: Procedures for
DoD Internal Information Collections,” June 30, 2014, as amended
(d) Public Law 116-92, “National Defense Authorization Act for Fiscal Year 2020,”
December 20, 2019
(e) DoD Directive 3020.40, “Mission Assurance (MA),” November 29, 2016, as amended
(f) DoD Instruction 5230.09, “Clearance of DoD Information for Public Release,”
January 25, 2019
(g) DoD Instruction 5230.29, “Security and Policy Review of DoD Information for Public
Release,” August 13, 2014, as amended
(h) Deputy Secretary of Defense Memorandum, “DoD Web Site Administration Policies and
Procedures,” November 25, 1998, as amended 1
(i) DoD Manual 5200.01, Volume 1, “DoD Information Security Program: Overview,
Classification, and Declassification,” February 24, 2012, as amended
(j) DoD Manual 5220.22, Volume 2, “National Industrial Security Program: Industrial
Security Procedures for Government Activities,” August 1, 2018, as amended
(k) DoD Instruction 3608.12, “Joint Information Operations (IO) Education,”
November 4, 2005, as amended
(l) Office of the Chairman of the Joint Chiefs of Staff, “DoD Dictionary of Military and
Associated Terms,” current edition
(m) Section 552a of title 5, United States Code
1
Copies may be obtained from the Internet at https://www.defenselink.mil/webmasters/
5
Change 2, 10/292020 ENCLOSURE 1
DoDM 5205.02, November 3, 2008
ENCLOSURE 2
RESPONSIBILITIES
a. Establish and oversee the DoD OPSEC Program and provide policies and procedures for
DoD Component implementation of the program, including monitoring, evaluating, and
periodically reviewing all DoD Component OPSEC programs.
b. Provide reporting guidance to the Heads of the DoD Components prior to the end of each
fiscal year.
c. Compile and analyze DoD Component reports, and report annually to the Secretary of
Defense on the status of the DoD OPSEC Program.
3. DIRECTOR, DEFENSE SECURITY SERVICE (DSS). Under the authority, direction, and
control of the USD(I&S), the Director, DSS, shall carry out responsibilities set forth in
Reference (a).
a. Support the DoD Components in establishing OPSEC programs and conducting OPSEC
surveys and assessments.
6
Change 2, 10/292020 ENCLOSURE 2
DoDM 5205.02, November 3, 2008
b. Review all combatant commander operations and contingency plans to ensure OPSEC
integration.
6. HEADS OF THE DoD COMPONENTS. The Heads of the DoD Components shall:
a. Implement the procedures prescribed in this Manual and ensure that supplemental
guidance and procedures are in accordance with Reference (a) and this Manual.
(1) Integrate OPSEC in all activities and operations that prepare, sustain, or employ U.S.
Armed Forces during war, crisis, or peace including, but not limited to, research, development,
test, and evaluation; special access programs; DoD contracting; treaty verification;
nonproliferation protocols; international agreements; force protection; and release of information
to the public.
(2) Maintain an OPSEC program managed by a full-time program manager at the senior
level who shall be responsible for the direction and administration of the program consistent with
Enclosure 3.
(3) Identify critical information and develop policies and procedures for its protection.
(4) Plan, program, and budget for implementing and maintaining OPSEC programs.
(5) Determine OPSEC assessment and survey requirements for activities within their
Components, establish guidance for conducting assessments and surveys, and supplement the
provisions of this Manual to meet specific needs consistent with Enclosure 4.
(6) Ensure that compliance with policy for content reviews of information intended for
release outside the control of the organization, including release to the public, is appropriately
evaluated during program reviews and other oversight activities consistent with Enclosure 5.
Evaluation shall include assessment of the quality and effectiveness of integrating OPSEC into
the organization’s policies and procedures to identify and protect critical information.
(7) Ensure guidance is established that requires OPSEC planning be integrated into the
planning, development, and implementation stages of net-centric programs and operating
environments, and that data aggregation concerns are assessed and risk-management strategies
applied consistent with Enclosure 5.
(9) Ensure OPSEC programs are reviewed annually and evaluated during inspections and
other oversight activities at all levels of command. Annual reviews should assess if adequate
7
Change 2, 10/292020 ENCLOSURE 2
DoDM 5205.02, November 3, 2008
resources are on hand to establish and maintain a successful program, if OPSEC Support
Elements are being utilized and how effective they are, and if education, training, and awareness
is being conducted throughout the workforce.
(10) Report to the USD(I&S) annually on the status of their Component OPSEC
programs covering the previous fiscal year.
(12) Integrate OPSEC into critical infrastructure protection (CIP) planning in accordance
with DoDD 3020.40 (Reference (e)) and this Manual.
(13) Coordinate and integrate OPSEC with other core Information Operations (IO)
capabilities as applicable.
(14) Identify OPSEC requirements and coordinate with the USD(P) when establishing
international cooperation agreements.
b. Coordinate with the USD(P) and support the Combatant Commands in planning and
integrating joint OPSEC into their operations, to include:
(1) Planning for and executing OPSEC measures in support of assigned missions across
the range of military operations.
8
Change 2, 10/292020 ENCLOSURE 2
DoDM 5205.02, November 3, 2008
(4) Coordinating OPSEC measures and their execution with those activities that cross
command boundaries, such as strategic command and control and counter-drug operations, with
other commands and agencies.
9
Change 2, 10/292020 ENCLOSURE 2
DoDM 5205.02, November 3, 2008
ENCLOSURE 3
PROGRAM MANAGEMENT
1. INTRODUCTION. Each DoD Component shall maintain an OPSEC program, resourced and
focused on the protection of critical information through the establishment of procedures and the
conduct of education and training.
(3) Advising the Head of the DoD Component in determining the program levels
required for subcomponents as outlined in section 3 of this enclosure and in identifying which
subcomponents require additional full- or part-time program managers and coordinators.
(4) Conducting program reviews to evaluate and assess the effectiveness and efficiency
of the OPSEC program. OPSEC programs should be reviewed at least annually.
(5) Identifying and protecting critical information related to the CIP with appropriate
OPSEC measures and advising supporting contractors of information protection requirements.
In fulfilling this responsibility, program managers shall:
(a) Work with CIP planners to identify and protect, through the use of OPSEC
measures, critical information related to CIP plans and programs and to integrate CIP into
OPSEC assessments and surveys as needed.
b. The DoD Component OPSEC program manager shall participate in training and education
reviews and shall work with the USD(I&S) and the IOSS in identifying DoD OPSEC
requirements.
10
Change 2, 10/292020 ENCLOSURE 3
DoDM 5205.02, November 3, 2008
a. Level I. A Level I program is a baseline OPSEC program for which the commander has
determined a minimal level of OPSEC management and resources are required. A Level I
program may fall under the oversight of a Level II or Level III program.
(1) A program coordinator (as defined in Reference (a)) shall be appointed in writing via
a local policy letter signed by the commander or director. The policy letter shall be distributed to
managers and supervisors, periodically reviewed, and updated when necessary.
(a) Maintain and update the critical information list (CIL) that has been approved by
the commander or director. Assigned personnel shall be knowledgeable of the designated critical
information and measures in place to protect it.
(b) When necessary, implement the OPSEC process to protect a specific mission or
activity. (See Appendix 1 of this enclosure for the OPSEC process.)
(c) Conduct an annual program review of the program. (See Appendix 2 of this
enclosure for the program review checklist.) Program managers may supplement the Program
Review Checklist at Appendix 2 of this enclosure with additional DoD Component-specific
requirements.
(d) Participate in the review process of information intended for public release.
(e) Ensure that initial and annual refresher training on OPSEC is administered to all
employees and contractors identified by the DoD Component.
b. Level II. A Level II program is a midlevel OPSEC program that requires a moderate
amount of program management and dedicated resources. A Level II program shall meet all the
Level I requirements. In addition, it shall be headed by a program manager (defined in
Reference (a)), who shall:
(1) Develop supplemental guidance to this Manual on how the OPSEC program will be
administered locally. Guidance shall be signed by the commander or director and distributed
accordingly to organizational personnel.
(2) Ensure that initial and annual refresher training on OPSEC is provided to all
employees and identified contractors; coordinate training for Level I OPSEC coordinators.
11
Change 2, 10/292020 ENCLOSURE 3
DoDM 5205.02, November 3, 2008
c. Level III. A Level III program consists of a full-time managed and resourced OPSEC
program. Due to the level of oversight it has for subordinate units and/or the sensitivity of the
mission, this program requires substantial effort. A Level III program shall meet all the Level I
and Level II requirements. In addition, the full-time program manager shall:
(1) Ensure newly-assigned program managers are trained within 90 days of assignment.
(3) Maintain a budget and have resources available to effectively implement and sustain
the program.
(4) Provide support and guidance to other OPSEC managers and coordinators for whom
he or she has oversight.
Appendixes
1. OPSEC Process
2. Program Review Checklist
12
Change 2, 10/292020 ENCLOSURE 3
DoDM 5205.02, November 3, 2008
APPENDIX 1 TO ENCLOSURE 3
OPSEC PROCESS
1. PURPOSE. The OPSEC process is a systematic method used to identify, control, and protect
critical information. This appendix presents the five elements of the OPSEC process as steps.
These steps may or may not be used in sequential order but all elements must be present to
conduct OPSEC analysis.
(1) Critical information will vary based on the organization’s role within the Department
of Defense. Critical information in operational organizations is often easy to recognize, however
in support or administratively focused organizations, critical information may be more difficult
to identify. When going through the process of identifying critical information, be sure to
consider all functional areas within the organization. The organization’s administrative staff
may have valuable information that should also be assessed for its criticality.
(2) Critical information is best identified by the individuals responsible for planning and
executing the organization’s mission. Using an adversarial approach and asking what
information an adversary would want to know about the mission is a helpful method when trying
to identify what information is critical. The questions an adversary may ask are called “essential
elements of friendly information.” The answers to those questions are the critical information.
(3) Critical information is information that the organization has determined is valuable to
an adversary. If obtained, this information will either impact the success of the organization or
improve the likelihood of an adversary meeting their goals. For example:
(a) Military operations: The adversary learns of the time and location of a planned
attack. As a result, losing the element of surprise could lead to significant casualties.
(b) Acquisition: The adversary learns of a new missile in the development phase that
cannot be detected by adversary capabilities. As a result, the adversary begins development of
countermeasures to defeat the new technology.
13
Change 2, 10/292020 APPENDIX 1 TO ENCLOSURE 3
DoDM 5205.02, November 3, 2008
(4) From the examples given above, there are many areas within an organization where
elements of critical information can be obtained. Commanders and directors, administrative
staff, operational personnel, even personnel not directly assigned to the organization may handle
portions of the organization’s critical information. Therefore, it is important to have personnel
from each functional area involved in the process of identifying critical information.
(5) Once the critical information has been identified, it should be compiled into a CIL
approved by the commander or director and disseminated so that organizational personnel know
what information is critical and requires protection.
(1) When conducting a threat analysis, organizations should seek support from their
security, intelligence, and counterintelligence experts.
(a) Who is the adversary? What is the adversary’s intent and capability?
(d) What does the adversary already know about the unit’s mission? What critical
information has already been exposed and is known by the adversary?
d. Conduct a Risk Assessment. The risk assessment is the process of evaluating the risks to
information based on susceptibility to intelligence collection and the anticipated severity of loss.
It involves assessing the adversary’s ability to exploit vulnerabilities that would lead to the
exposure of critical information and the potential impact it would have on the mission.
Determining the level of risk is a key element of the OPSEC process and provides justification
for the use of countermeasures. Once the amount of risk is determined, consider cost, time, and
effort of implementing OPSEC countermeasures to mitigate risk. Factors to consider include:
(1) The benefit and the effect of the countermeasure on reducing risk to the mission.
(2) The cost of the proposed countermeasure compared with the cost associated with the
impact if the adversary exploited the vulnerability.
14
Change 2, 10/29/2020 APPENDIX 1 TO ENCLOSURE 3
DoDM 5205.02, November 3, 2008
(3) The possibility that the countermeasure could create an OPSEC indicator.
(1) Given the examples presented earlier with regard to military operations, acquisition,
and administration; adversary exploitation of information could have been prevented with simple
no-cost countermeasures. Proper safeguarding, limiting distribution, and shredding information
when no longer needed are just a few examples of easily applied countermeasures.
(2) There are many best practices for countermeasures throughout the Department of
Defense. Organizations may consult with OPSEC practitioners, security specialist, information
technology specialists, and organizations with similar missions. However, countermeasures
should not be regarded as risk-avoidance measures to be pulled from a list and implemented.
Prior to recommending countermeasures, commanders or directors must carefully consider cost
and their potential to degrade mission accomplishment.
15
Change 2, 10/29/2020 APPENDIX 1 TO ENCLOSURE 3
DoDM 5205.02, November 3, 2008
APPENDIX 2 TO ENCLOSURE 3
1. PURPOSE. This appendix provides a checklist at Table 1 that program managers and
coordinators shall use to assess compliance with Reference (a) and this Manual. Program
managers and coordinators should use this checklist upon assignment to their duties and annually
thereafter.
16
Change 2, 10/29/2020 APPENDIX 2 TO ENCLOSURE 3
DoDM 5205.02, November 3, 2008
17
Change 2, 10/29/2020 APPENDIX 2 TO ENCLOSURE 3
DoDM 5205.02, November 3, 2008
ENCLOSURE 4
1. OPSEC ASSESSMENTS
a. Introduction
(a) When there is a need for an evaluation based on the sensitivity of the operation or
program.
(c) Prior to the development of an OPSEC program or OPSEC plan. The assessment
can establish an OPSEC profile by showing indicators that present vulnerabilities for an
adversary to exploit. This will allow the program to be developed with fact-based knowledge of
threats and vulnerabilities that must be addressed.
b. Procedures
(1) Heads of the DoD Components may supplement this Manual and stipulate more
detailed procedures for conducting OPSEC assessments.
(b) The assessment process shall examine the actual practices and procedures
employed at an activity to determine if critical information may be inadvertently disclosed
through the performance of normal organizational functions. The primary purpose is to evaluate
and improve organizational effectiveness and control vulnerabilities of friendly actions or
information.
18
Change 2, 10/29/2020 ENCLOSURE 4
DoDM 5205.02, November 3, 2008
director of the organization being assessed. Commanders and directors are encouraged to share
lessons learned.
(a) Consideration for the scope and limitations of the assessment. Provisions shall be
made for factors such as the subordinate commander’s intent for the assessment, resources
available, size of the activity being assessed, and time available to conduct the assessment.
(b) The requirement to utilize the five-step OPSEC process in accordance with
Appendix 1 of Enclosure 3.
(c) Designated checklists, evaluation criteria, and procedures for a planning phase,
assessment phase, and analysis phase.
(d) Required use of the analysis ratings criteria in the appendix to this enclosure
when analyzing assessed information.
2. OPSEC SURVEYS
a. Introduction
(1) This section establishes procedures for conducting OPSEC surveys. Surveys involve
analyzing the activities associated with specific operations or programs to determine if there is
adequate protection of critical information from adversary intelligence exploitation during the
planning, preparation, execution, and post-execution phases of an operation or program.
(2) The depth and breadth of a survey depends on the degree of threat, the importance of
the mission, and the harm that an adversary could inflict.
b. Procedures
(1) The Heads of DoD Components may supplement this Manual and stipulate more
detailed procedures for conducting OPSEC surveys.
(a) An OPSEC survey shall be conducted every 3 years or when required by the
commander or director. A survey seeks to reproduce the intelligence image in light of the known
collection capabilities of potential adversaries.
19
Change 2, 10/29/2020 ENCLOSURE 4
DoDM 5205.02, November 3, 2008
(b) Surveys may be resource- and time-intensive. The DoD Components shall
determine which activities in their command require surveys and develop implementing
guidance for conducting them.
(c) The survey shall require that a team of experts look at an activity from an
adversarial perspective to determine if critical information may be disclosed through normal
operations and functions, to identify vulnerabilities, and to propose countermeasures to mitigate
them.
(d) At the commander or director’s discretion, the survey may focus on human
intelligence (HUMINT), signals intelligence (SIGINT), measurement and signature intelligence
(MASINT), open-source intelligence (OSINT), and/or geospatial intelligence (GEOINT)
collection capabilities. These may include telecommunications monitoring, radio frequency
monitoring, network and computer systems assessment, and open-source collection. Survey
team members shall use collection techniques of known adversaries. Commanders and directors
are encouraged to use existing OPSEC support capabilities to conduct surveys, if available.
(2) DoD Component guidance for conducting OPSEC surveys shall include:
(d) Required use of the analysis ratings criteria in the appendix to this enclosure
when analyzing information.
20
Change 2, 10/29/2020 ENCLOSURE 4
DoDM 5205.02, November 3, 2008
Appendix
Analysis Rating Criteria
21
Change 2, 10/29/2020 ENCLOSURE 4
DoDM 5205.02, November 3, 2008
APPENDIX TO ENCLOSURE 4
1. INTRODUCTION. The OPSEC analysis methodology uses a five-step OPSEC process. The
basic risk analysis process allows the OPSEC manager to plan an effective OPSEC risk
management strategy by analyzing and organizing information within each step of the process.
An effective analysis is derived from using a basic calculation formula to establish specific risk
levels relative to vulnerabilities based on the impact of the loss of the information, the threat
posed to the information, and the susceptibility of the information to collection. Follow the steps
and Tables 3 through 7 to determine the level of risk. Table 8 gives an example of application of
the five steps.
22
Change 2, 10/29/2020 APPENDIX TO ENCLOSURE 4
DoDM 5205.02, November 3, 2008
23
Change 2, 10/29/2020 APPENDIX TO ENCLOSURE 4
DoDM 5205.02, November 3, 2008
Of MINOR
LOW importance to an MED HI LOW LOW LOW LOW
adversary
3. STEP 2 – THREAT MATRIX. Step 2 measures the threat posed by a specific adversary
based on the adversary’s (or adversaries’) known capabilities and intent to collect. Based on the
scale in Table 4, assign a value from high to low for the threat severity of known adversaries.
24
Change 2, 10/29/2020 APPENDIX TO ENCLOSURE 4
DoDM 5205.02, November 3, 2008
CAPABILITY
HI MED HI MED MED LOW LOW
The The
The
adversary’s The adversary’s
adversary’s
collection is adversary’s collection
collection The
highly collection capability is
capability is adversary
developed capability is probably not
significantly collection
and MOST possibly developed and
developed and capability is
LIKELY in developed and MOST
PROBABLY NOT
place OR the LIKELY in LIKELY
ADVERSARY in place OR developed
adversary place OR the NOT in place
the adversary OR does
receives adversary OR the
receives NOT
equivalent receives adversary
equivalent data receive data
data equivalent data may receive
collection support
collection collection equivalent
support from a from a 3rd
support from support from a data
SIGNIFICAN party
a HIGHLY CAPABLE 3rd collection
TLY capable
capable 3rd party from a 3rd
3rd party
party party
The adversary
INTENT
is HIGHLY
motivated and
a successful
outcome
HI SIGNIFICAN HI MED HI MED HI MED MED LOW
TLY
contributes to
meeting
adversary
objectives
The adversary
is
SIGNIFICAN
TLY
motivated and
MED a successful
MED HI MED HI MED HI MED LOW
HI outcome
GREATLY
contributes to
meeting
adversary
objectives
25
Change 2, 10/29/2020 APPENDIX TO ENCLOSURE 4
DoDM 5205.02, November 3, 2008
CAPABILITY
HI MED HI MED MED LOW LOW
The The
The
adversary’s The adversary’s
adversary’s
collection is adversary’s collection
collection The
highly collection capability is
capability is adversary
developed capability is probably not
significantly collection
and MOST possibly developed and
developed and capability is
LIKELY in developed and MOST
PROBABLY NOT
place OR the LIKELY in LIKELY
ADVERSARY in place OR developed
adversary place OR the NOT in place
the adversary OR does
receives adversary OR the
receives NOT
equivalent receives adversary
equivalent data receive data
data equivalent data may receive
collection support
collection collection equivalent
support from a from a 3rd
support from support from a data
SIGNIFICAN party
a HIGHLY CAPABLE 3rd collection
TLY capable
capable 3rd party from a 3rd
3rd party
party party
The adversary
INTENT
is
SUFFICIENT
LY motivated
and a
successful
MED MED HI MED MED MED LOW LOW
outcome
WILL
contribute to
meeting
adversary
objectives
The adversary
is
MODERATE
LY motivated
and a
MED
successful MED MED LOW MED LOW MED LOW LOW
LOW
outcome CAN
contribute to
meeting
adversary
objectives
26
Change 2, 10/29/2020 APPENDIX TO ENCLOSURE 4
DoDM 5205.02, November 3, 2008
CAPABILITY
HI MED HI MED MED LOW LOW
The The
The
adversary’s The adversary’s
adversary’s
collection is adversary’s collection
collection The
highly collection capability is
capability is adversary
developed capability is probably not
significantly collection
and MOST possibly developed and
developed and capability is
LIKELY in developed and MOST
PROBABLY NOT
place OR the LIKELY in LIKELY
ADVERSARY in place OR developed
adversary place OR the NOT in place
INTENT
27
Change 2, 10/29/2020 APPENDIX TO ENCLOSURE 4
DoDM 5205.02, November 3, 2008
5. STEP 4 – RISK ASSESSMENT. Step 4 brings the entire process together. Risk is assessed
as a measure of the probability that an adversary will be successful in collecting critical
information and the resultant cost to the mission (impact).
b. Use Table 6 as a decision chart for probability, combining the values for threat and
vulnerability.
Threat
HI MED HI MED MED LOW LOW
Vulnerability
HI HI MED HI MED MED LOW LOW
MED HI MED HI MED MED MED LOW LOW
MED MED MED MED LOW LOW
MED LOW MED LOW MED LOW LOW LOW LOW
LOW LOW LOW LOW LOW LOW
c. Determine the risk by multiplying probability times impact. The measure of impact in this
example can be determined by reviewing the value of the critical information that is susceptible
to HUMINT collection. Should multiple items of critical information be susceptible to
exploitation by a given vulnerability, the analyst makes a decision on the combined value of that
critical information. Most often, the combined value is the highest value placed on any one
critical information item. For example, if the threat is high and the vulnerability is medium high,
28
Change 2, 10/29/2020 APPENDIX TO ENCLOSURE 4
DoDM 5205.02, November 3, 2008
the probability of compromise is medium high. If the threat probability is medium high and the
value of the critical information is medium high, the risk is medium.
d. Use Table 7 as a decision chart for risk, combining the values for probability and impact.
Probability
Impact HI MED HI MED MED LOW LOW
(CI Value)
HI HI MED HI MED MED LOW LOW
MED HI MED HI MED MED MED LOW LOW
MED MED MED MED LOW LOW
MED LOW MED LOW MED LOW LOW LOW LOW
LOW LOW LOW LOW LOW LOW
29
Change 2, 10/29/2020 APPENDIX TO ENCLOSURE 4
DoDM 5205.02, November 3, 2008
30
Change 2, 10/29/2020 APPENDIX TO ENCLOSURE 4
DoDM 5205.02, November 3, 2008
ENCLOSURE 5
a. The OPSEC program manager or coordinator will work closely with public affairs,
information security, Web administrators, and other officials designated by the DoD Component
who also share responsibility for the release of information. Commanders and directors are
responsible for ensuring there is a valid mission need to disseminate the information and that
review procedures are implemented.
b. The Heads of the DoD Components shall develop, establish, and implement policies and
procedures to deny adversaries the opportunity to take advantage of publicly available
information, especially when aggregated. Policies and procedures shall include:
(1) A formal review of content for its sensitivity (e.g., critical information, For Official
Use Only, or other controlled unclassified information categories), sensitivity in the aggregate,
determination of appropriate and/or intended audience, and distribution and release controls.
(2) The designation of individuals who have received the appropriate training in OPSEC,
security, and release requirements to be responsible for reviewing information intended for
public release, or the inclusion of the OPSEC program manager or coordinator as part of the
formal review process.
(4) The requirement that release of information on DoD (or DoD Component) Web sites
and Web-based applications shall be in accordance with Reference (h). Release officials shall
consider the intended audience and appropriate Web domain (e.g. publicly accessible,
government restricted, internal to the DoD Component) and shall restrict the information to that
domain.
31
Change 2, 10/29/2020 ENCLOSURE 5
DoDM 5205.02, November 3, 2008
a. System owners shall address OPSEC and information security during initial planning
stages. Information security managers, systems security, information assurance, and OPSEC
personnel shall be engaged during initial planning and definition stages to advise on
classification, assess vulnerabilities and risks, and provide guidance on mitigation strategies.
b. The DoD Components shall review those information systems or applications and/or
programs designed for net-centric interoperability for data aggregation and classification issues
in accordance with Volume 1 of DoDM 5200.01 (Reference (i)). The DoD Components shall
engage security and information assurance experts and integrate security options when
developing new systems, applications, and net-centric environments (such as collaboration
portals, data sharing environments, data mining tools, and other tools that aggregate or permit the
aggregation of large quantities of data).
3. HANDLING REQUIREMENTS
a. Handling and Safeguarding. Information that has been identified by the DoD Component
as critical information should be handled accordingly. Components shall provide guidance on
handling and safeguarding requirements for critical information.
32
Change 2, 10/29/2020 ENCLOSURE 5
DoDM 5205.02, November 3, 2008
ENCLOSURE 6
CONTRACT REQUIREMENTS
1. INTRODUCTION
a. Commanders and directors shall ensure that contractors supporting DoD activities use
OPSEC to protect critical information for specified contracts and subcontracts. The requiring
organization and Government Contracting Activity (GCA) shall impose OPSEC measures as
contractual requirements when necessary.
(1) Determine what OPSEC measures and requirements are essential to protect critical
information for specific contracts.
(3) Ensure the GCA identifies those OPSEC measures and requirements in the resulting
solicitations and contracts.
2. PROCEDURES. Heads of the DoD Components shall establish procedures to ensure that
contract requirements properly reflect OPSEC responsibilities and that those responsibilities are
included in both classified and unclassified contracts when appropriate.
a. Requiring organizations must determine if there is critical information associated with the
contract or activities involved in the contract that warrants the inclusion of OPSEC requirements.
Consideration shall be given to the type of work being performed and the environment and
circumstances in which contract performance will occur. In some cases, contractors may simply
be required to receive threat awareness briefings or basic security training for employees.
c. Requirements for OPSEC must be included in the contract solicitation and resulting
contract in sufficient detail to ensure complete contractor understanding of all OPSEC provisions
required. OPSEC requirements levied on contractors may include but are not limited to:
33
Change 2, 10/29/2020 ENCLOSURE 6
DoDM 5205.02, November 3, 2008
d. For classified contracts, the command or unit and GCA will specify OPSEC requirements
on DD Form 254, “Department of Defense Contract Security Classification Specification.”
OPSEC requirements apply to National Industrial Security Program (NISP) contractors when it
is determined that additional safeguards are essential for specific contracts; they are imposed in
addition to the standard requirements of the NISP.
(1) The command or unit will state OPSEC requirements on the DD Form 254 in
sufficient detail to ensure complete contractor understanding of the exact OPSEC provisions or
measures required. Full disclosure of these requirements is essential so that contractors can
comply and charge attendant costs to the specific contracts for which these measures have been
ordered.
(2) If the command or unit requires the contractor to adhere to the command or unit
OPSEC requirements, the DD Form 254 must have OPSEC checked as a requirement. The
contractor must also be provided with a copy of the command or unit OPSEC requirements or
plan.
(3) Commands and units shall ensure contractors do not disclose classified or
unclassified information pertaining to a classified contract to the public without prior review and
clearance as specified in the requirements in block 12 of the DD Form 254.
(4) Commands and units shall assist the Defense Security Service in ensuring adequacy
of industrial security efforts for OPSEC applied to classified contracts in accordance with
Volume 2 of DoDM 5220.22 (Reference (j)).
34
Change 2, 10/29/2020 ENCLOSURE 6
DoDM 5205.02, November 3, 2008
ENCLOSURE 7
1. INTRODUCTION
a. In accordance with Reference (a), OPSEC education and training is required for personnel
assigned OPSEC responsibilities. Awareness training shall be provided to the work force.
(1) Provide necessary knowledge, skills, and information to enable quality performance
of OPSEC functions.
(2) Promote understanding of OPSEC program policies and requirements and their
importance to overall security.
(3) Instill and maintain within the DoD workforce a continuing awareness of OPSEC
requirements and the intelligence threat.
a. OPSEC Program Managers. All OPSEC program managers who have OPSEC duties as
their primary job shall complete the OPSEC Fundamentals Course within 30 days of assignment.
Within 90 days of assignment, all OPSEC program managers shall attend the IOSS program
manager course or other DoD Component equivalent course.
b. OPSEC Coordinators. All OPSEC coordinators who have OPSEC duties as part of their
job shall complete the OPSEC Fundamentals Course within 30 days of assignment. Components
shall determine additional OPSEC education and training requirements.
35
Change 2, 10/29/2020 ENCLOSURE 7
DoDM 5205.02, November 3, 2008
(1) The Heads of DoD Components shall submit proposed (joint) education curriculum
for IO career force personnel to the IO Education Board of Advisors for approval in accordance
with DoDI 3608.12 (Reference (k)). Upon approval, the Heads of DoD Components shall
establish OPSEC education and training requirements for IO career force personnel in
Component guidance.
(2) For DoD Component-only IO courses, the DoD Components shall at a minimum
include the following OPSEC objectives as part of IO education and training.
(a) Understand the OPSEC process and provide a general knowledge of OPSEC,
threats, vulnerabilities, and individual responsibilities for protecting critical information.
(b) Demonstrate how OPSEC integrates with other core, supporting, and related
capabilities of IO from mission and operations conception through post mission and operation
actions.
3. AWARENESS TRAINING
d. As a minimum, all personnel shall receive annual refresher OPSEC training that
reinforces understanding of OPSEC policies and procedures, critical information, and procedures
covered in initial and specialized training. Refresher training should also address the threat and
techniques employed by adversaries attempting to obtain classified and sensitive information.
36
Change 2, 10/29/2020 ENCLOSURE 7
DoDM 5205.02, November 3, 2008
GLOSSARY
IO information operations
IOSS Interagency OPSEC Support Staff
Unless otherwise noted, these terms and their definitions are for the purpose of this Manual.
CIL. A list of critical information that has been fully coordinated within an organization and
approved by the senior decision maker, and is used by all personnel in the organization to
identify unclassified information requiring application of OPSEC measures.
37
Change 2, 10/29/2020 GLOSSARY
DoDM 5205.02, November 3, 2008
critical information. Defined in the DoD Dictionary of Military and Associated Terms
(Reference (l)).
indicator. Data derived from friendly detectable actions and open-source information that
adversaries can interpret and piece together to reach conclusions or estimates of critical or
classified information concerning friendly intentions, capabilities, or activities.
OPSEC plan. A plan that provides the organization a living document that can be used to
implement the appropriate countermeasures given the mission, assessed risk, and resources
available to the unit. OPSEC plans generally take two forms; both should be updated as
circumstances and personnel change over time.
An OPSEC program plan provides guidelines for implementation of routine procedures and
measures to be employed during daily operations or activities of a given unit. The plan should
be endorsed by the unit commander.
OPSEC process. A process that examines a complete activity to determine what, if any,
exploitable evidence of classified or sensitive activity may be acquired by adversaries. It is an
analytical, risk-based process that incorporates five distinct elements.
Threat analysis.
Vulnerability analysis.
Risk assessment.
OPSEC countermeasures.
38
Change 2, 10/29/2020 GLOSSARY
DoDM 5205.02, November 3, 2008
risk. A measure of the potential degree to which protected information is subject to loss through
adversary exploitation.
risk management. The process of identifying, assessing, and controlling risks by making
decisions that balance risk costs with mission benefits. Costs may be measured in financial cost,
loss of assets, loss of information, or loss of reputation.
sensitive information. Information that the loss, misuse, unauthorized access, or modification
could adversely affect the national interest, the conduct of Federal programs, or the privacy to
which individuals are entitled under section 552a of title 5, United States Code (Reference (m)),
but that has not been specifically authorized under criteria established by an Executive order or
an Act of Congress to be kept secret in the interest of National defense or foreign policy.
threat analysis. A process that examines an adversary’s technical and operational capabilities,
motivation, and intentions, designed to detect and exploit vulnerabilities.
vulnerability analysis. A process that examines a friendly operation or activity from the point of
view of an adversary, seeking ways in which the adversary might determine critical information
in time to disrupt or defeat the operation or activity.
39
Change 2, 10/29/2020 GLOSSARY