Page tree
Title: Get Started - PIM  
Author: Murad Khan Jul 19, 2019
Last Changed by: Stephanie Rooney May 05, 2021
Tiny Link: (useful for email)
Export As: Word · PDF  
Incoming Links
MyExostar (95)
    Page: 3.5.4 Replay-Resistant Authentication for Accounts
    Page: 3.1.9 Provide privacy and security notices consistent with applicable CUI rules
    Page: Partner Information Manager (PIM)
    Page: Form Grouping
    Page: PIM 2.4 Release Notes
    Page: 3.12.3 Monitor security controls on an ongoing basis
    Page: PIM Forms FAQs
    Page: 3.8.7 Control the use of removable media on system components
    Page: PIM 2.7 Release Notes
    Page: View Partner Information
    Page: Invite - PIM
    Page: PIM Form Renewal
    Page: 3.1.18 Control connection of mobile devices
    Page: 3.2.2 Personnel Adequately Trained to Carry out Duties
    Page: Cyber Security Questionairre (CSQ) Completion
    Page: 3.10.1 Limit physical access to organizational information systems
    Page: PIM Form Scoring
    Page: PIM Supplier Dashboard
    Page: Conflict Minerals Form Completion
    Page: PIM Organization Profile Update FAQs
    Page: 3.4.9 Control and monitor user-installed software
    Page: PIM Groups (Buyer Only)
    Page: 3.3.5 Correlate Audit Review, Analysis, and Reporting
    Page: 3.14.5 Perform periodic scans of the information systems
    Page: PIM General Navigation FAQs
    Page: 3.5.7 Enforce a minimum password complexity
    Page: DFARS, NIST, and Incident Reporting
    Page: PIM 3.0 Release Notes
    Page: 3.1.13 Employ cryptographic mechanisms to protect remote sessions
    Page: 3.9.2 Ensure that CUI and organizational systems containing CUI are protected
    Page: PIM 2.6 Release Notes
    Page: 3.5.9 Allow temporary password use for system logons with an immediate change
    Page: Cyber Supply Chain Risk Management Questionnaire (CSCRMQ) Completion
    Page: Supplier Information -PIM
    Page: 3.5.5 Prevent reuse of identifiers for a defined period
    Page: DFARS 252 CS Form Completion
    Page: 3.5.2 Authenticate (or verify) the identities of users, processes, or devices
    Page: 3.13.12 Prohibit remote activation of collaborative computing devices
    Page: PIM Form Renewal FAQs
    Page: 3.6.3 Testing Organizational Incident Response Capability
    Page: 3.1.17 Protect wireless access using authentication and encryption
    Page: NIST 800-171 Controls Information
    Page: 3.1.8 Limit unsuccessful logon attempts
    Page: PIM Access FAQs
    Page: PIM Supplier Application Administrator
    Page: Buyer Information - PIM
    Page: 3.4.2 Establish and Enforce Security Configuration Settings
    Page: 3.1.19 Encrypt CUI on mobile devices
    Page: PIM FAQs
    Page: 3.5.6 Disable identifiers after a defined period of inactivity
    Page: 3.6.1 Establish an operational incident-handling capability
    Page: Release Notes - PIM
    Page: 3.10.6 Enforce safeguarding measures for CUI at alternate work sites
    Page: PIM Supplier Profile
    Page: PIM Buyer Dashboard
    Page: 3.13.7 Preventing Simultaneous Remote Connections from Devices
    Page: 3.13.5 Sub-Networks for Publicly Accessible System Components
    Page: 3.14.1 Reporting Information and System Flaws
    Page: PIM Form Resources
    Page: 3.13.1 Monitor, control, and protect communications
    Page: 3.13.15 Protect the Authenticity of Communications Sessions
    Page: 3.8.3 Sanitize or destroy system media containing CUI
    Page: Partner Information Manager (PIM) Overview
    Page: 3.1.20 Verify and control/limit connections to and use of external systems
    Page: 3.10.5 Managing Physical Access Devices
    Page: 3.12.2 Develop and implement plans of action
    Page: 3.13.4 Prevent Unintended Information Transfer
    Page: 3.14.2 Provide protection from malicious code
    Page: Form Assignments
    Page: 3.4.8 Applying Deny-by-Exception (Blacklisting) or Permit-by-Exception (Whitelisting) Policies
    Page: 3.11.1 Assess Risk to Organizational Operations
    Page: 3.12.4 Develop, document, periodically update, and implement system security plans
    Page: 3.5.3 Multi-Factor Authentication
    Page: 3.7.5 Multi-Factor Authentication to Establish Non-Local Maintenance Sessions
    Page: PIM 2.3 Release Notes
    Page: PIM Buyer Activities
    Page: PIM 2.3.1 Release Notes
    Page: PIM Buyer Application Administrator
    Page: 3.4.4 Analyzing the Security Impact of Changes
    Page: 3.8.1 Protect (i.e., physically control and securely store)
    Page: Form Reports
    Page: PIM Form Renewal FAQ
    Page: 3.11.2 Scan for Vulnerabilities
    Page: 3.1.6 Accessing Non-Security Functions
    Page: MDA Pilot Program Form Completion UAT
    Page: PIM 2.5 Release Notes
    Page: Prime Contractor Information
    Page: 3.5.8 Prohibit password reuse
    Page: Downloadable Guides - PIM
    Page: 3.5.10 Store and transmit only encrypted representation of passwords
    Page: 3.13.8 Implement cryptographic mechanisms to prevent unauthorized disclosure of CUI
    Page: 3.13.11 FIPS-Validated Cryptography
    Page: NIST 800 Form Completion
    Page: Videos - PIM
    Page: 3.4.1 Establishing and Maintaining Baseline Configurations and Inventories
Parent Page
    Page: Partner Information Manager (PIM)