US Army CSE Mission

The U.S. Army Intelligence and Security Command, DCS, G-2, through the Contractor Support Element (CSE) or its successor organization, acting on behalf of DCS, G-2 is the Cognizant Security Agency (CSA) for the Department of the Army (DA) and has exclusive administrative security oversight responsibility for all SCI released to the contractor or developed under the DA contract and provides oversight of the Army SCI Industrial Security Program. The CSE provides dedicated SCI Security support to Army Commands (ACOM), Army Service Component Commands (ASCC), Direct Reporting Units (DRU), Joint Service Commands, and to affiliated contractors. The CSE uses the Army Centralized Contracts and Security Portal (ACCS) to process and monitor the entirety of the Army SCI contracting business processes and oversight mission.


At this time, we are aware that users are experiencing issues logging in. We ask that you report the issue by e-mailing the INSCOM Enterprise Service Desk at: Please note that e-mailing the CSE team will create a delay in support. We want to ensure that all issues are reported so that we can address them as soon as possible.

Point of Contact

Chief, CSE 703-428-4372

Training & Staff Assistance Visits/Accreditations 703-428-4762

Personnel Security 703-428-4756

Industrial Security Specialists 703-428-4811/4380/4982/4753/5696/4806/4355


Authorized Users

For all log in issues and password resets, contact the
Enterprise Service Desk at

For all other account related issues (i.e., adding/changing a company/agency, name change) please contact CSE by sending an email to

New Users
New ACCS users click the link above to register for an account with CSE.

This is a DoD interest computer system. All DoD computer systems and related equipment are intended for communications, transmissions, processing and storage of official U. S. Government or other authorized information only. All DoD interest computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems including security devices and systems to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of a DoD interest computer system should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy. Monitoring of this or any other DoD interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials and are subject to disciplinary action.