US Army CSE Mission

The U.S. Army Intelligence and Security Command, DCS, G-2, through the Contractor Support Element (CSE) or its successor organization, acting on behalf of DCS, G-2 is the Cognizant Security Agency (CSA) for the Department of the Army (DA) and has exclusive administrative security oversight responsibility for all SCI released to the contractor or developed under the DA contract and provides oversight of the Army SCI Industrial Security Program. The CSE provides dedicated SCI Security support to Army Commands (ACOM), Army Service Component Commands (ASCC), Direct Reporting Units (DRU), Joint Service Commands, and to affiliated contractors. The CSE uses the Army Centralized Contracts and Security Portal (ACCS) to process and monitor the entirety of the Army SCI contracting business processes and oversight mission.

Point of Contact

Chief, CSE 703-428-4372

Training & Staff Assistance Visits/Accreditations 703-428-4762

Personnel Security 703-428-4756

Industrial Security Specialists 703-428-4811/4380/4982/4753/5696/4806/4355


Authorized Users

For all log in issues and certificate registration, contact the
Enterprise Service Desk at

For all other account related issues (i.e., adding/changing a company/agency, name change) please contact CSE by sending an email to

New Users
New ACCS users click the link above to register for an account with CSE.

This is a DoD interest computer system. All DoD computer systems and related equipment are intended for communications, transmissions, processing and storage of official U. S. Government or other authorized information only. All DoD interest computer systems are subject to monitoring at all times to ensure proper functioning of equipment and systems including security devices and systems to prevent unauthorized use and violations of statutes and security regulations, to deter criminal activity, and for other similar purposes. Any user of a DoD interest computer system should be aware that any information placed in the system is subject to monitoring and is not subject to any expectation of privacy. Monitoring of this or any other DoD interest computer system reveals possible evidence of violation of criminal statutes, this evidence and any other related information, including identification information about the user, may be provided to law enforcement officials and are subject to disciplinary action.