USA Banner

Official US Government Icon

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure Site Icon

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

United States Department of Transportation United States Department of Transportation

ato

Left Nav - Air Traffic Organization

AMS Information Systems & Security Checklist

Note:

  • This is the complete checklist throughout your ISS Engineering activities during the AMS Lifecycle phases.
  • The symbol "*" indicates that the FAA firewall access is required to view this link.

Initiate

FAA Information Systems Security (ISS) Activities Process:
  1. If any questions, please contact 9-ATOP-HQ-ISSE-Info@faa.gov, ATO-P Information Systems Security Chief Scientist Engineer.
  2. Go to the last page of this checklist to review:
    • Appendix 1: "AMS Logo Map - FAA Lifecycle Management Process".
      • Use the map to follow the numbered AMS decision points in the process with this checklist.
    • Appendix 2: "Security Activities during AMS Phases"
      • It is a quick overview of deliverable security related products for each AMS Phases.
  3. Use this checklist to map the security activities along with your appendix 1 & 2.
  4. Review the lettered content of the "FAA Information Systems Security (ISS) Engineering Process".

Resources

  1. The ATOISS related websites:
  2. SCAP Templates and FAQs

Quick Links


Begin Service Analysis (SA) - AMS decision point: #1

(Start: Service Analysis activities for the Mission Needs Decision (MND))

Note: The symbol "*" indicates that the FAA firewall access is required to view this link.

Review

Initiate

Deliverable(s)

  1. Statement of security policy and threat environment stipulation incorporated into the SLMN.

End SA for AMS decision point: #1


Begin Concept and Requirement Definition (CRD) - AMS decision point: #2

(Start:OMB Exhibit 300 Attachment 1 for the Investment Analysis Readiness Decision (IARD))

Review

Coordinate

  • Service Unit/Service Area Certification Team Lead to determine plans and strategy for SCAP activities including determining the level of effort and security activities.
    • ATO Information System Security Manager (ISSM)
    • ATO Designated Approving Authority (DAA), Information System Security Certifier (ISSC), and Information System Security Manager (ISSM)
    • ATO Service Unit/Service Area Certification Team Lead
    • ATO Service Unit/Service Area ISSO.
      • The individual is responsible for all the security functions for the program and is designated by the Program Manager.

Generate

Deliverable(s)

  1. OMB Exhibit 300, Attachment 1: Preliminary Program Requirements (pPR)
    • ISS Section of the Preliminary requirements. (pPR)

End CRD for AMS decision point: #2 & AMS Phase Mission Analysis (MA)


Begin Initial Investment Analysis (IIA) - AMS decision point: #3

(Start:OMB Exhibit 300 Attachment 2 for the Initial Investment Decision (IID))

Review

Update

  • CONOPS of system.
  • ISS section of the Preliminary Requirements. (pPR document).
    • Apply 800-53.
      • Tailor 800-53 security requirements to your acquisitions.

Generate

Deliverable(s)

  1. BOE on security cost estimates for alternatives.
  2. OMB Exhibit 300, Attachment 2: Business Case Analysis Report (BCAR)
  3. Updated OMB Exhibit 300, Attachment 1: (pPR)
    • Requirements for the ISS section of the (pPR) to include the 800-53 controls.
  4. Preliminary vulnerability and risk assessment.
  5. Preliminary SCAPs document
    • Preliminary ISSP with security policy statement.
    • Preliminary System Characterization/Categorization.

End IIA for AMS decision point: #3


BEGIN Final Investment Analysis (FIA) - AMS decision point: #4

(Start:OMB Exhibit 300 Attachment 3 for the Final Investment Decision (FID))

Review

Update

  • SCAP with your Service Unit/Service Area Certification Team Lead.
  • CONOPS of system.
  • ISS section of the Preliminary Requirements for the Final Requirement Document (fPR).
    • Security Interfaces document for inclusion in Interface Requirement Document (IRD).
  • The ISSP.
  • System characterization/categorization.(FIPS-199)
  • Vulnerability and risk assessment.

Generate

  • Initial Security Test Plan & Report.
  • Support for system addition to the ATO Five Year SCAP Plan with your Service Unit/Service Area Certification Team Lead and ISSO.
    • Proposed schedule, security characterization/categorization (FIPS-199) and planned sites where a system would be fielded to the ISSM
  • Security Information for Solicitation Information Request (SIR), Contract Statement of Work (SOW) and Contract Data Requirement List (CDRL).

Obtain

  • Stakeholders’ buy-ins and signing of the final security documents.

Deliverable(s)

  1. Updated OMB Exhibit 300, Attachment 1:
    • (pPR) transformed into Final Requirement Document (fPR).
  2. OMB Exhibit 300, Attachment 2:Business Case Analysis Report (BCAR)
  3. OMB Exhibit 300, Attachment 3:Implementation Strategy/Planning (ISP)
  4. Final security vulnerability and risk assessment.
  5. SCAP documents
    • ISSP with security policy statement.
    • System characterization/categorization.
    • Security Test Plan & Report (See note above.)
  6. Proposal of schedule, FIPS-199, and plan toward ATO Five Year SCAP Plan for your added system.
  7. The security information for SIR, SOW & CDRL.
  8. Stakeholders’ signatures on all finalized security documents

End FIA for AMS decision point: #4 & Phase: IA


BEGIN Solution Implementation (SI) - AMS decision point: #5

(Re-baseline:OMB Exhibit 300, Attachment 1, 2 & 3 for the In-Service Decision (ISD))

Note: The symbol "*" indicates that the FAA firewall access is required to view this link.

Review

Update

Generate

Obtain

  • DAA signature(s) of Certification and Authorization to connect and operate system in the NAS.

Deliverables

  1. SCAP Implementation Guide(Reference: SCAP implementation guide - Section 4.1.1 *)
  2. Baselined OMB Exhibit 300, Attachment 1:
    • ISS section of the Final Requirement Document(fPR).
      • Security Interfaces in the IRD.
  3. Baselined OMB Exhibit 300, Attachment 2, & 3
  4. The security information for SIR, SOW & CDRL.
  5. DAA signature(s) of Certification and Authorization to connect and operate the system in the NAS.

End SI for AMS decision point: #5 & AMS Phase: SI


BEGIN In-Service Management (ISM) – Systems Engineering Milestones: Technology Refresh Assessment (TRA)

(Determine: To continue, update (Tech refresh, P3I) or end the Systems Development Lifecycle needs for the (ISM))

Review

Update

  • ISS section of the Final Requirement Document (fPR).
  • Vulnerability and risk assessment for the Security Risk Assessment (SRA).
  • SCAP with your Service Unit/Service Area Certification Team Lead.
    • Verify if recertification is required.

Generate

Obtain

  • DAA signature(s) of Certification and Authorization package (SCAP).
    • Service Unit/Service Area Certification Team Lead and ISSO.
    • ATO Designated Approving Authority (DAA), Information System Security Certifier (ISSC), and Information System Security Manager (ISSM).

Deliverables

  1. Updated OMB Exhibit 300, Attachment 1, 2, & 3
    • ISS section of the Final Requirement Document (fPR).
  2. Updated Security vulnerability and threat assessment for the SRA.
  3. Updated SCAP documents.
  4. DAA signature(s) of the SCAP documents.

End ISM for Systems Engineering Milestones: TRA & AMS Phase: ISM

Kenai Flight Service Station

470 N. Willow St.
Kenai AK, 99611-7707

Air Traffic Manager:
Lucas Barnlund

Home Page

Below -20°C

 

Celsius to Fahrenheit Temperature Conversion
(-20°C to +39°C)

 

Celcius to Fahrenheit (-20° to -1° C / -4.0° to 30.2° F)

Deg CDeg F
-130.2
-228.4
-326.6
-424.8
-523.0
-621.2
-719.4
-817.6
-915.8
-1014.0
-1112.2
-1210.4
-138.6
-146.8
-155.0
-163.2
-171.4
-180.4
-19-2.2
-20-4.0

Celcius to Fahrenheit (0° to 19° C / 32.0° to 66.2° F)

Deg CDeg F
1966.2
1864.4
1762.6
1660.8
1559.0
1457.2
1355.4
1253.6
1151.8
1050.0
948.2
846.4
744.6
642.8
541.0
439.2
337.4
235.6
133.8
032.0

Celcius to Fahrenheit (20° to 39° C / 68.0° to 102.2° F)

Deg CDeg F
39102.2
38100.4
3798.6
3696.8
3595.0
3493.2
3391.4
3289.6
3187.8
3086.0
2984.2
2882.4
2780.6
2678.8
2577.0
2475.2
2373.4
2271.6
2169.8
2068.0

 

 

 

Celsius to Fahrenheit Temperature Conversion
(Below -20°C)

Celcius to Fahrenheit (-36° to -21° C / -32.8° to -5.8° F)

Deg CDeg F
-21-5.8
-22-7.6
-23-9.4
-24-11.2
-25-13.0
-26-14.8
-27-16.8
-28-18.4
-29-20.2
-30-22.0
-31-23.8
-32-25.6
-33-27.4
-34-29.2
-35-31.0
-36-32.8

Celcius to Fahrenheit (-55° to -37° C / -61.6° to -34.6° F)

Deg CDeg F
-37-34.6
-38-36.4
-39-38.2
-40-40.0
-41-41.8
-42-43.6
-43-45.4
-44-47.2
-45-49.0
-46-50.8
-47-52.6
-48-54.4
-49-56.2
-50-58.0
-51-59.8
-52-61.6

Celcius to Fahrenheit (-68° to -53° C / -90.4° to -63.4° F)

Deg CDeg F
-53-63.4
-54-65.2
-55-67.0
-56-68.8
-57-70.6
-58-72.4
-59-74.2
-60-76.0
-61-77.8
-62-79.6
-63-81.4
-64-83.2
-65-85.0
-66-86.8
-67-88.6
-68-90.4

Top of Page


Questions or Comments Welcome

Kenai Flight Service Station

470 N. Willow St.
Kenai AK, 99611-7707

Air Traffic Manager:
Lucas Barnlund

Home Page

Alaska Daylight Savings Time to UTC Conversion

ADT to UTCADT to UTC
Midnight = 0800ZNoon = 2000Z
1:00am = 0900Z1:00pm = 2100Z
2:00am = 1000Z2:00pm = 2200Z
3:00am = 1100Z3:00pm = 2300Z
4:00am = 1200Z4:00pm = 0000Z
5:00am = 1300Z5:00pm = 0100Z
6:00am = 1400Z6:00pm = 0200Z
7:00am = 1500Z7:00pm = 0300Z
8:00am = 1600Z8:00pm = 0400Z
9:00am = 1700Z9:00pm = 0500Z
10:00am = 1800Z10:00pm = 0600Z
11:00am = 1900Z11:00pm = 0700Z

Current Date: 11/3/21 (U.S. Eastern Time)

Top of Page


Questions or Comments Welcome

Kenai Flight Service Station

Wednesday, August 27, 2025

470 N. Willow St.
Kenai AK, 99611-7707

Air Traffic Manager:
Lucas Barnlund

Home Page

Alaska Flight Service Master Flight Plans

Master Flight Plan Worksheet

After completing the applicable data fields in the form use an email button to send it to the
appropriate Flight Service Station. It may also be sent via FAX, or mailed directly to the Flight Service Station. Forwarding information can be found on page 2 of the form.

Top of Page


Questions or Comments Welcome

Kenai Flight Service Station

470 N. Willow St.
Kenai AK, 99611-7707

Air Traffic Manager:
Jim Betts

Home Page

Kenai FSS User Comment Form

   





     

Air Traffic Organization

Monday, March 03, 2025

The Air Traffic Organization (ATO) is the operational arm of the FAA. It is responsible for providing safe and efficient air navigation services to 29.4 million square miles of airspace. This represents more than 17 percent of the world's airspace and includes all of the United States and large portions of the Atlantic and Pacific Oceans and the Gulf of America.

Our stakeholders are commercial and private aviation and the military. Our employees are the service providers – the 35,000 controllers, technicians, engineers and support personnel whose daily efforts keep aircraft moving safely through the nation's skies.

Aviation is essential to our way of life and is a driving force in our economy. Entire industries rely on the successful operation of the national airspace system. Aviation accounts for 11 million jobs and is responsible for more than 5 percent of our gross domestic product.

The U.S. air traffic system is experiencing the safest period in its history. This is the result of the ATO's robust safety culture. With the implementation of its proactive Safety Management System, the ATO is now able to identify precursors of risk before there is a safety problem.

Mission Analysis

highlighted: Corporate Mission Analysis - AMS Lifecycle Phase The Information Systems Security (ISS) engineering process starts in the Corporate Mission Analysis. In this phase, the ISSE process focuses on:

  • the proposed system's operating environment
  • system boundaries
  • information assets and functions
  • and the potential threat and vulnerability sources to the system's information assets and functions.

Basic system security policy flows from FAA organizational directives, such as FAA Order 1370.82A, "ISS Program Policy" as well as from FAA operating procedures and instructions. Basic system security policy is the set of rules governing control, access, and use of system information. For example, a basic security policy statement may be that only authorized FAA users shall access the system.

The ISS engineering process applies NIST Federal Information Processing Standards (FIPS) 199, "Standards for Security Categorization of Federal Information and Information Systems" to categorize the information system assets and functions. The ISSE process analyzes the NAS system concept of operations (CONOPS) and mission need statement (MNS) to formulate a basic security policy.

The security planning aspects of ISS engineering also begins in this phase, following guidance of NIST Special Publication (SP) 800-18, "Guide for Developing Security Plans for Federal Information Systems". Security requirements, based on security policy, are in the Preliminary Program Requirements (pPR) document.

Solution Implementation

highlighted: Solution Implementation - AMS Lifecycle Phase The Information Systems Security (ISS) engineering activities during the earlier phases provide the basis for the updating, monitoring, and controlling system security risks and the respective mitigation measures or controls that are implemented during this phase of the system development. A summary of ISS engineering activities for this phase includes the following:

  • Revise the security related statement in the CONOPS and security requirements based on functional analysis performed during early stages of the Solution Implementation phase.
  • Analyze the physical/system architecture, resulting in an allocation of the securityfeatures to be implemented in the system under development. Security trade studies may be needed to identify the appropriate security controls to be implemented that balance system and security requirements.
  • Integrate the security features into the security architecture to balance them with the system architecture and design. Security trade studies, interface securityrequirements, and other Systems Engineering (SE) outputs contribute to successful integration of security architecture into system design. System design reviews are key milestones for ensuring that security controls are integrated into system development.
  • Update the ISSP, one of the SCAP documents based on the expected ISS functional and assurance controls derived from the system architecture and design. Refine the system test planning and procedures to ensure that all security requirements and controls are addressed. The ISSP supports Validation (SEM Section: 4.12, subsection 4.12.1) and Synthesis (SEM Section: 4.5) to assess controls and assurance as being cost effective and meeting the ISS requirements. Use Risk Management (SEM Section: 4.10) and Requirements Management (SEM Section: 4.3) to mitigate security risk to acceptable levels. The criticality/sensitivity of the system and its information assets guides the type and level of controls and testing.
  • Develop a user's guide, training plans, and Contingency/Disaster Recovery Plans (C/DRP). Security procedures, rules, training, and planning for C/DRP operations may be integrated into the integrated logistics support and lifecycle planning for systems.
  • Conduct security testing. Security controls and mechanisms may be testedincrementally and as a part of system development testing. For mission-criticalsystems, a third party shall conduct independent testing of system vulnerabilities.
  • Create final the Security Certification and Authorization Package (SCAP) documents. The results of ISSE activities-including relevant results from related SE elements such as Integrated Technical Planning (SEM Section: 4.2), Synthesis (SEM Section: 4.5), Validation and Verification (SEM Section: 4.12), and Lifecycle Engineering (SEM Section: 4.13)-shall be considered as final SCAP documents. The Air Traffic Organization provides templates for collecting and presenting the SCAP documentation.

Investment Analysis

highlighted: Investment Analysis - AMS Lifecycle Phase Integrating the Information Systems Security (ISS) engineering process with the SE elements is essential. During the Initial Investment Analysis (IIA), ISSE develops and documents the need for security in the CONOPS and the initial security requirements for the Preliminary Requirements document (pPR). The Investment Analysis (IA) team uses the system program CONOPS and the security requirements to evaluate the system alternatives. The security engineers in the product team conduct a preliminary vulnerability and security risk assessment using updated threat and vulnerability data to determine the specific risks that must be controlled or mitigated. The security trade studies are performed to evaluate the system alternatives and to assess the security risk controls/mitigation measures related to the system alternatives. Also, the security trade studies identify the native, existing system, and/or network features that reduces the likelihood of the system threats successfully exploiting a vulnerability. These trade studies compare the costs and benefits of the system features/security controls in terms of risk reduction. Trade studies may evaluate the cost-effectiveness of different controls for a given risk or set of risks. Also, system alternatives may require different types of controls to balance the system performance and security requirements against the security risks/costs of the different alternatives. The different system alternatives may have significantly different physical and/or system architectures that would require different security controls that may lead to different security costs and effectiveness.

During the final stage of the IA phase, the ISS engineering refines and updates the preliminary vulnerability and security risk assessment. Updated threat and vulnerability data is applied, analyzing the costs and effectiveness of system features and security controls that are associated with each of the final system alternatives. ISS engineering provides the final security requirements for the final Program Requirements document (fPR) and the system specification, as well as special requirements for the Solicitation Information Request (SIR) and contract Statement of Work (SOW). In developing the final system requirements, ISS engineering analyzes and establishes the appropriate assurance level to be proven during system implementation. The assurance in this context addresses the required level of confidence in the security function, performance and ensures that the security controls function in an integrated fashion. The assurance can be gained through many techniques, including conformance testing, independent verification testing, and employing diverse and/or redundant capability.

The ISS engineering shall support a documented agreement among the FAA stakeholders regarding the necessity and sufficiency of the security requirements. It should clearly document the agreement to the security requirements before the investment decision becomes the foundation for the Security Certification and Authorization Package (SCAP), which shall be completed before the In-Service Decision (ISD). During the IA, ISS engineering identifies the technically qualified, senior FAA official who shall certify that the system security controls meet the minimum FAA/NASISS requirements (see DAA discussion in SEM section: 4.8.6). The ISSP, which was based on the NISTSP 800-18 and was a conceptual draft during the Mission Analysis of the AMS phase, is updated to become an initial draft.

The ISS engineering products from this phase include the updated preliminary and vulnerability security risk assessment, final security program requirements, security trade studies to support cost-benefit/investment analysis of security controls, and input to the SIR, SOW, system specification, and Contract Data Requirements List (CDRL) for systems to be acquired. These products support the AMS milestone decision for transition into the Solution Implementation phase.

In-Service Management

highlighted: In-Service Management - AMS Lifecycle Phase Activities during this phase include the following:

  • Follow and conform to the final SCAP template as required for the final SCAP documents.
  • Obtain the security Certification and Authorization (C&A). Stakeholder C&A review shall ensure that the DAA is in a position to certify and authorize the system as meeting the security requirements and as presenting an acceptable risk to the FAA mission and NAS operations.
  • Conduct the performance measurement, monitoring, and reporting of the security controls and incidents. Ensure that the monitoring of ISS performance and assurance for the respective NAS service/capability has not degraded and that the new vulnerabilities have not been introduced to the operational system.
  • Update the SCAP to reflect any major configuration changes at least every 3 years, assessing the changes in the environment and system for previously unforeseen risks from new threats and vulnerabilities. Plan and take corrective action as necessary.
  • For disposal of the system, the following types of activities may be addressed in the Information System Security Plan, and conducted at the appropriate stage of the System Development Lifecycle
    • Archive Information - Retain information as necessary, keeping in mindlegal requirements and future technology changes that render the retrievalmethod obsolete.
    • Sanitize Media - Ensure data is deleted, erased, or written over asnecessary.
    • Dispose of Hardware and Software - Dispose of the hardware and software in accordance with ISS policy.