National Industrial Security System (NISS)

Deployment Schedule

Update June 26, 2018:

*NISS is currently unavailable as we prepare for full deployment. Please do not attempt to create new accounts or log into the system as you will be unable to do so until full deployment.

Over the past several months, DSS has been finalizing the NISS application for deployment. We appreciate your patience throughout this period as we continue to resolve unforeseen critical issues with the NISS Application. At this time, the Industrial Security Facilities Database (ISFD) and Electronic Facility Clearance System (e-FCL) remain the systems of record for facility clearance information until further notice. Once DSS has validated that the critical issues are resolved, DSS will inform the user community of the NISS transition dates and guidance. At this time, DSS is not ready to announce firm transition dates and we apologize for any inconvenience this may cause.

*The National Industrial Security System (NISS) External User Training Course (Course ID: IS127.16) is available in STEPP! Log into STEPP to view this course.



User Roles for External Users

The following user roles will be available for External users. An external user can request multiple roles, if required for their job duties.


NISS is DSS’ future information system architecture and will replace Industrial Security Facilities Database (ISFD) and Electronic Facilities Clearance System (e-FCL) capabilities to develop an on-demand, data-driven environment with automated workflows accessible to Industry and Government partners.

NISS is being developed and released in increments, allowing users to experience benefits quickly. The initial increment of NISS will replace and expand upon capabilities of two legacy systems, ISFD and e-FCL, and automate the Initial Facility Clearance process. This increment will also provide expanded access and transparency to security professionals’ facility information. Increment 1 will be followed by additional enhancements to the system’s functionality and integration, ultimately automating many core DSS and Industry security functions.

NISS solution has been developed in-line with Deputy Chief Management Officer (DCMO) requirements to maximize value while minimizing costs. DSS conducted Business Process Reengineering (BPR) of 22 core DSS functions to create streamlined and efficient workflows. The BPR efforts engaged over 300 DSS, Industry, and Government stakeholders to generate true system requirements tied to optimized business processes.

NISS is a top DSS priority and will modernize the National Industrial Security Program (NISP) Information Environment and provide the USG and Industry stakeholders with a data-driven, collaborative, integrated capability to assess and mitigate risk.

NISS Benefits

Additional Information


June 26, 2018
Update to the deployment schedule posted.

June 9, 2018
Update to the deployment schedule posted.

September 12, 2017
Update to the deployment schedule posted.

August 21, 2017
Update to the soft launch deployment schedule posted.

July 25, 2017
Information on this page was updated. The Schedule section was added.

May 24, 2017 Page Updated
Information on this page was updated.

May 9, 2017 Change in URLs for Information Systems
In an effort to avoid confusion when the Defense Information System for Security goes live later this year, the URLs for the information systems linked from the dropdown menu of the DSS main page were recently updated. If you bookmarked a URL for an information system, please update it accordingly.

September 1, 2016 Initial Update
The development of NISS is underway! Increment 1, which consists of replacing the Industrial Security Facilities Database (ISFD), the Electronic Facility Clearance System (e-FCL), and enhancing the Facility Clearance (FCL) process, is scheduled to deploy in Q4 FY2017. A robust testing period including DSS, Government, and Industry personnel will begin in June 2017. We will update this website if there are any changes to the schedule.

Additional functionality to include enhancing the Security Vulnerability Assessment (SVA) process, submitting Suspicious Contact Reports, requesting Safeguarding approvals, and mobile capabilities will be deployed in future increments.