Skip to main content
U.S. flag

An official website of the United States government

Here’s how you know

Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

HTTPS

Secure .gov websites use HTTPS
A lock (LockA locked padlock) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

    • Environmental Topics
    • Air
    • Bed Bugs
    • Cancer
    • Chemicals, Toxics, and Pesticide
    • Emergency Response
    • Environmental Information by Location
    • Health
    • Land, Waste, and Cleanup
    • Lead
    • Mold
    • Radon
    • Research
    • Science Topics
    • Water Topics
    • A-Z Topic Index
    • Laws & Regulations
    • By Business Sector
    • By Topic
    • Compliance
    • Enforcement
    • Laws and Executive Orders
    • Regulations
    • Report a Violation
    • Environmental Violations
    • Fraud, Waste or Abuse
    • About EPA
    • Our Mission and What We Do
    • Headquarters Offices
    • Regional Offices
    • Labs and Research Centers
    • Planning, Budget, and Results
    • Organization Chart
    • EPA History

Breadcrumb

  1. Home
  2. Developer Central
  3. Requirements and Development Considerations

Security Requirements

EPA systems/applications must comply with federal information security requirements and standards including, but not limited to the Federal Information Security Modernization Act of 2014 (pdf), Federal Information Processing Standards and National Institute of Standards and Technology Special Publications and EPA Security Information Directives.

EPA begins security planning and system categorization activities from the beginning of the system development lifecycle and continues security assessment and monitoring activities through implementation and operations and maintenance. Before EPA systems/applications can be deployed, they must be reviewed and approved through Agency Assessment and Authorization processes. Ensuring compliance with EPA security policies/procedures is usually the responsibility of the federal project lead. EPA's Security-related policies and procedures are available on the IT/IM Information Directives site.

Developer Central

  • Digital Strategy
  • Guiding Principles for Application Development
  • Requirements and Development Considerations
    • Application Development/Hosting Environments
    • Electronic Signature Requirements
    • Enterprise Architecture
    • Information Collection Requirements
    • Open-Source Software and EPA Code Repository Requirements
    • Portfolio and Investment Management
    • Privacy Requirements
    • Section 508/Accessibility Requirements
    • Security Requirements
    • Web Application Development Requirements
  • Widgets
  • Contact Us
Contact Us About Developer Central
Contact Us to ask a question, provide feedback, or report a problem.
Last updated on February 25, 2025
  • Assistance
  • Spanish
  • Arabic
  • Chinese (simplified)
  • Chinese (traditional)
  • French
  • Haitian Creole
  • Korean
  • Portuguese
  • Russian
  • Tagalog
  • Vietnamese
United States Environmental Protection Agency

Discover.

  • Accessibility Statement
  • Budget & Performance
  • Contracting
  • EPA www Web Snapshot
  • Grants
  • No FEAR Act Data
  • Plain Writing
  • Privacy
  • Privacy and Security Notice

Connect.

  • Data
  • Inspector General
  • Jobs
  • Newsroom
  • Regulations.gov
  • Subscribe
  • USA.gov
  • White House

Ask.

  • Contact EPA
  • EPA Disclaimers
  • Hotlines
  • FOIA Requests
  • Frequent Questions
  • Site Feedback

Follow.