June 16, 2022

DD Form 2875 Update, May 2022

DD Form 2875 Update, May 2022

After 13 years, the DD 2875 SAAR form has been modified by the Federal government to include additional fields.

What is a SAAR form?

Department of Defense’s System Authorization Access Request (SAAR) form, or DD Form 2875, is used to request access to computer systems.  The SAAR form includes:

  • The name, title, and contact information of the individual requesting access
  • The name, title, and contact information of the supervisor
  • The reason for requesting access to the system
  • The level of access requested

Once the SAAR form is completed and signed, it must be submitted for approvals. Approvers can be the owners of the information requested, the Information Assurance group, and the Security Manager.

 

How does Feith handle SAAR forms?

Historically, agencies handled the DD 2875 process with paper forms.  Now, Feith Systems has developed entirely electronic forms and workflows to manage the SAAR process.

  • An online form that can be completed and submitted electronically
  • Feith’s Workflow routes the SAAR to the appropriate authorities for approval
  • Electronic authorization is issued to the individual once access is approved
  • Feith maintains a complete list of authorizations requested per user and per system

It starts with a simplified online version of the SAAR form.  Known fields fill automatically.     

Once the requestor fills in and signs their portions of the form, Feith converts it into a working Adobe PDF file.  Workflow sends the SAAR the right person or people for signature with their CAC Card. 

Powers of authority can then either approve or deny the staff member’s request.  If they deny it, Feith sends the form back for corrections.  If the power of authority approves it, Feith marks the requestor as having access to the system or information requested.  The system saves each version of the SAAR form for auditing purposes and keeps a record of every action taken on it.

Feith’s SAAR solution keeps a running list of all the groups, systems, and information a staff member has access to throughout their time at the organization.  When the person leaves the agency, Feith makes it easy for IT to deactivate them everywhere.