Special Access Program Security Annual Refresher Student Guide
September 2021 Center for Development of Security Excellence Page 2-2
DODI 5205.11 provides for management, administration, and oversight of DOD SAPs and Title
10, Section 119, of the U.S. Code provides requirements for congressional oversight of special
access programs.
Types of SAPs
SAP Categories
In what kind of SAP do you work? SAPs are categorized based on what type of programs they
encompass. Some SAPs encompass acquisition programs of sensitive technology to include research,
development, testing and evaluation, modification, or procurement activities which ensure the U.S.
maintains its leading technological edge. Some SAPs protect the planning for, execution of, and
support to especially sensitive military operations to ensure they are completed without disclosure.
These SAPs may protect organizations, property, operational concepts, plans, or activities. Other
SAPs protect the planning and execution of especially sensitive intelligence (SI) or counterintelligence
(CI) operations or collection activities which keeps us ahead of our adversaries.
SAP Protection Levels
Do you know the protection level of your SAP? A protection level communicates how a SAP is
acknowledged and protected. Although the specific program details of all SAPs are very closely
protected, there are SAPs whose mere existence is closely guarded and others whose existence may
be publicly acknowledged to a certain extent.
A SAP that is acknowledged is one whose existence may be openly recognized. Its purpose may be
identified. However, the details of the program – including its technologies, materials, and
techniques - are classified as dictated by their vulnerability to exploitation and the risk of
compromise. Therefore, individuals may disclose that they work for a SAP on their resume or to
family members or friends, but may not disclose the specifics of their SAP to any of those
individuals. However, prior to disclosing, discuss with your security officer.
An unacknowledged SAP is one whose existence and purpose are protected. As with acknowledged
SAPs, the details, technologies, materials and techniques of unacknowledged SAPs are classified.
Under extremely limited circumstances, unacknowledged SAPs may also be waived.
DOD Joint SAP Implementation Guide (JSIG)
The security policy and procedures contained in this document are to be used by all
personnel with a responsibility for protecting the confidentiality, integrity, and
availability of DOD SAP information, information systems, and networks. This document
applies to the DOD SAP Community and all networks, information systems, and
applications for which the cognizant SAPCO has management or oversight responsibility
regardless of the physical location. This includes Service elements, contractor sites, and
DOD organizations that connect to a SAP-managed network which includes weapons
systems, test equipment and multifunction devices such as printer-copier-fax-scanners.