Source document in MS Word: here. NOTE: This document is no longer current. It has been superseded by the DoD Joint Security Implementation Guide (DJSIG).


Joint DoDIIS/Cryptologic SCI Information Systems Security Standards

 

 

 


 

 

 

 

 

 

 


                                                                                   31 March 2001

Revision 2


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

This Page Intentionally Blank


EXECUTIVE SUMMARY

(U) The policy of the U.S. Government is that all classified information must be appropriately safeguarded to assure the confidentiality, integrity, and availability of that information. This document provides procedural guidance for the protection, use, management, and dissemination of Sensitive Compartmented Information (SCI), and is applicable to the Department of Defense (DoD) to include DoD components and Government contractors who process SCI. The combination of security safeguards and procedures used for Information Systems (IS) shall assure compliance with DCID 6/3, NSA/CSS Manual 130-1 and DIAM 50-4. The JDCSISSS is a technical supplement to both the NSA/CSS Manual 130-1 and DIAM 50-4.

(U) The prime purpose of this document is to provide IS security implementation guidance relative to the management of SCI and the automated infrastructure used to process this information at the organizational level.

(U) Nothing in this document shall be construed to countermand or waive provisions of any Executive Order, National Policy, Department of Defense (DoD) Directive, or other provisions of regulatory policies or laws which are beyond the scope of authority of the Directors of the Defense Intelligence Agency (DIA) and the National Security Agency/Central Security Service (NSA/CSS).

 


TABLE OF CONTENTS

Paragraph

Executive Summary

 

Chapter 1--General Information

BACKGROUND................................................................................................................................................................. 1.1

POLICY................................................................................................................................................................................ 1.2

SCOPE AND APPLICABILITY....................................................................................................................................... 1.3

REFERENCES, ACRONYMS, AND DEFINITIONS..................................................................................................... 1.4

ROLES AND RESPONSIBILITIES.................................................................................................................................. 1.5

Principal Accrediting Authority (PAA)...................................................................................................................... 1.5.1

Data Owner...................................................................................................................................................................... 1.5.2

Designated Approving Authority (DAA).................................................................................................................. 1.5.3

DAA Representative (Rep)/Service Certifying Organization (SCO)....................................................................... 1.5.4

NSA/CSS Senior Information Systems Security Program Manager (SISSPM)..................................................... 1.5.5

Service Cryptologic Element (SCE) Information Systems Security Program Manager (ISSPM)........................ 1.5.6

Commander/Commanding Officer Responsibility...................................................................................................... 1.5.7

Information Systems Security Manager (ISSM)........................................................................................................ 1.5.8

Information Systems Security Officer (ISSO)............................................................................................................. 1.5.9

Program Management Office (PMO)/Program manager (PM)............................................................................... 1.5.10

Privileged Users (e.g., System Administrator (SA))................................................................................................ 1.5.11

General Users................................................................................................................................................................ 1.5.12

Prohibited Activities.................................................................................................................................................... 1.5.13

CONFIGURATION CONTROL BOARD (CCB) OVERSIGHT..................................................................................... 1.6

OTHER DOCUMENTATION SUPERSESSION............................................................................................................ 1.7

Chapter 2--Life Cycle Security

PURPOSE............................................................................................................................................................................ 2.1

SCOPE................................................................................................................................................................................. 2.2

PROCEDURES.................................................................................................................................................................... 2.3

Concepts Development Phase...................................................................................................................................... 2.3.1

IS Security Design....................................................................................................................................................... 2.3.1.1

Statement of Work (SOW) Requirements................................................................................................................ 2.3.1.2

Additional Documentation......................................................................................................................................... 2.3.1.3

Design Phase................................................................................................................................................................... 2.3.2

Levels-of-Concern....................................................................................................................................................... 2.3.2.1

Protection Levels......................................................................................................................................................... 2.3.2.2

Development Phase........................................................................................................................................................ 2.3.3

Test, Certification and Accreditation Phase............................................................................................................... 2.3.4

Time Line for Certification Activities........................................................................................................................ 2.3.4.1

Deployment and Operations Phase............................................................................................................................. 2.3.5

Recertification Phase...................................................................................................................................................... 2.3.6

Disposal Phase................................................................................................................................................................ 2.3.7

Chapter 3--Signals Intelligence (SIGINT) Systems Accreditation Process and Procedures

PURPOSE............................................................................................................................................................................ 3.1

SCOPE................................................................................................................................................................................. 3.2

DISCUSSION...................................................................................................................................................................... 3.3

Accreditation................................................................................................................................................................... 3.3.1

Configuration Management.......................................................................................................................................... 3.3.2

ACCREDITATION IN GENERAL................................................................................................................................... 3.4

Formal Accreditation...................................................................................................................................................... 3.4.1

Issuing Accreditation.................................................................................................................................................... 3.4.2

Reaccreditation............................................................................................................................................................... 3.4.3

Rescinding Accreditation.............................................................................................................................................. 3.4.4

Accreditation 3-Year Anniversary Review................................................................................................................. 3.4.5

Authorized Exemptions From Accreditation.............................................................................................................. 3.4.6

IS Approval-To-Operate................................................................................................................................................ 3.4.7

TEMPEST........................................................................................................................................................................ 3.4.8

ACCREDITATION PROCEDURES................................................................................................................................. 3.5

Accreditation Requests................................................................................................................................................. 3.5.1

Accreditation Requests Initiated at the Unit Level................................................................................................ 3.5.1.1

Accreditation Initiated Through Downward-Directed Programs......................................................................... 3.5.1.2

Accreditation at a Single-Service Site Including the Regional SIGINT Operation Centers............................. 3.5.1.3

Accreditation at a Multi-Service Site........................................................................................................................ 3.5.1.4

Operational Systems Under Control of the Commander/Commanding Officer............................................... 3.5.1.4.1

SCE Unique Systems Not Directly Supporting The Primary Mission.............................................................. 3.5.1.4.2

Assignment of a HSO at a Multi-Service Site...................................................................................................... 3.5.1.4.3

Accreditation by SCE Tenants Located at Non-SCE Interservice or Intercommand Sites.............................. 3.5.1.5

Submitting The System Security Plan (SSP)............................................................................................................... 3.5.2

Single Accreditation.................................................................................................................................................... 3.5.2.1

Type Accreditation..................................................................................................................................................... 3.5.2.2

Format and Content..................................................................................................................................................... 3.5.2.3

SSP and Database Classification.................................................................................................................................. 3.5.3

Database Classification.............................................................................................................................................. 3.5.3.1

SSP Classification........................................................................................................................................................ 3.5.3.2

Chapter 4--Department of Defense Intelligence Information Systems (DoDIIS) Site-Based Accreditation

PURPOSE............................................................................................................................................................................ 4.1

SCOPE................................................................................................................................................................................. 4.2

SYSTEM CERTIFICATION AND ACCREDITATION PROCEDURES..................................................................... 4.3

System Certification and Accreditation Compliance................................................................................................. 4.3.1

The System Certification and Accreditation Process............................................................................................... 4.3.2

Phase 1.......................................................................................................................................................................... 4.3.2.1

Phase 2.......................................................................................................................................................................... 4.3.2.2

Phase 3.......................................................................................................................................................................... 4.3.2.3

Phase 4.......................................................................................................................................................................... 4.3.2.4

SITE-BASED ACCREDITATION METHODOLOGY................................................................................................... 4.4

Site-Based Accreditation Methodology Compliance............................................................................................... 4.4.1

The Site-Based Accreditation Process........................................................................................................................ 4.4.2

(Site Initial Visit) Initial Site Certification Visit........................................................................................................ 4.4.2.1

(Site Evaluation Visit) Site Security and Engineering Certification Testing and Evaluation and Site Accreditation   4.4.2.2

(Site Compliance Visit) Vulnerability Assessment and Compliance Verification............................................... 4.4.2.3

CONTRACTOR ACCREDITATION............................................................................................................................... 4.5

ACCREDITATION REVIEW........................................................................................................................................... 4.6

MINIMUM SECURITY REQUIREMENTS.................................................................................................................... 4.7

Chapter 5--TEMPEST

PURPOSE............................................................................................................................................................................ 5.1

SCOPE................................................................................................................................................................................. 5.2

DEFINITIONS.................................................................................................................................................................... 5.3

TEMPEST COMPLIANCE............................................................................................................................................... 5.4

ACCREDITATION............................................................................................................................................................ 5.5

TEMPEST Countermeasures Review.......................................................................................................................... 5.5.1

General Documentation................................................................................................................................................. 5.5.2

TEMPEST/ISD Accreditation....................................................................................................................................... 5.5.3

Installation Requirements................................................................................................................................................. 5.6

Chapter 6--Security Requirements for Users

PURPOSE............................................................................................................................................................................ 6.1

SCOPE................................................................................................................................................................................. 6.2

MINUMUM SECURITY REQUIREMENTS.................................................................................................................. 6.3

Identification and Authentication Requirements...................................................................................................... 6.3.1

Password Requirements................................................................................................................................................ 6.3.2

IS Warning Banner......................................................................................................................................................... 6.3.3

Configuration Requirements......................................................................................................................................... 6.3.4

Malicious Code Detection............................................................................................................................................. 6.3.5

Virus Scanning Requirements....................................................................................................................................... 6.3.6

Information Storage Media........................................................................................................................................... 6.3.7

Label Placement........................................................................................................................................................... 6.3.7.1

Data Descriptor Label................................................................................................................................................. 6.3.7.2

Classification Markings.............................................................................................................................................. 6.3.7.3

Control and Accounting of Media............................................................................................................................ 6.3.7.4

Information Storage Media Control....................................................................................................................... 6.3.7.4.1

Inspections................................................................................................................................................................ 6.3.7.4.2

Control Procedures................................................................................................................................................... 6.3.7.4.3

Other Categories of Storage Media....................................................................................................................... 6.3.7.4.4

Hardware Labeling Requirements................................................................................................................................ 6.3.8

Security Training Requirements................................................................................................................................... 6.3.9

Security Awareness and Training Program............................................................................................................. 6.3.9.1

Awareness Level...................................................................................................................................................... 6.3.9.1.1

Performance Level.................................................................................................................................................... 6.3.9.1.2

Destruction of Media................................................................................................................................................... 6.3.10

Information Transfer and Accounting Procedures................................................................................................. 6.3.11

Chapter 7--Security Guidelines for the Privileged User and General User (GU)

PURPOSE............................................................................................................................................................................ 7.1

SCOPE................................................................................................................................................................................. 7.2

SECURITY TRAINING..................................................................................................................................................... 7.3

General Users Training.................................................................................................................................................. 7.3.1

Privileged Users Training.............................................................................................................................................. 7.3.2

Security Awareness Training Program........................................................................................................................ 7.3.3

Awareness Level......................................................................................................................................................... 7.3.3.1

Performance Level....................................................................................................................................................... 7.3.3.2

PROCEDURES.................................................................................................................................................................... 7.4

Identification and Authentication Requirements...................................................................................................... 7.4.1

Documenting USERIDs and Passwords.................................................................................................................. 7.4.1.1

USERID and Password Issuing Authority and Accountability........................................................................... 7.4.1.2

Supervisor Authorization........................................................................................................................................... 7.4.1.3

Access Requirements Validation.............................................................................................................................. 7.4.1.4

Control Guidelines.......................................................................................................................................................... 7.4.2

System Access Removal Procedures.......................................................................................................................... 7.4.3

Audit Trail Requirements.............................................................................................................................................. 7.4.4

Automated Audit Trail Information Requirements................................................................................................. 7.4.4.1

Manual Audit Trail Implementation.......................................................................................................................... 7.4.4.2

Products of Audit Trail Information......................................................................................................................... 7.4.4.3

Audit Trail Checks and Reviews............................................................................................................................... 7.4.4.4

Audit Trail Records Retention................................................................................................................................... 7.4.4.5

Automatic Logout Requirements................................................................................................................................. 7.4.5

Limited Access Attempts.............................................................................................................................................. 7.4.6

Use of Windows Screen Locks.................................................................................................................................... 7.4.7

Testing, Straining, and Hacking................................................................................................................................... 7.4.8

Warning Banners............................................................................................................................................................ 7.4.9

Network Monitoring..................................................................................................................................................... 7.4.10

Maintenance Monitoring......................................................................................................................................... 7.4.10.1

Targeted Monitoring................................................................................................................................................. 7.4.10.2

Chapter 8--Information Systems (IS) Incident Reporting

PURPOSE............................................................................................................................................................................ 8.1

SCOPE................................................................................................................................................................................. 8.2

PROCEDURES.................................................................................................................................................................... 8.3

Reporting Decision......................................................................................................................................................... 8.3.1

Types of IS Incidents and Reports.............................................................................................................................. 8.3.2

Reporting Incidents........................................................................................................................................................ 8.3.3

Report Format and Content........................................................................................................................................... 8.3.4

Follow-On Action........................................................................................................................................................... 8.3.5

Chapter 9--Information System (IS) Monitoring Activities

PURPOSE............................................................................................................................................................................ 9.1

SCOPE................................................................................................................................................................................. 9.2

PROCEDURES.................................................................................................................................................................... 9.3

IS Warning Banner......................................................................................................................................................... 9.3.1

Warning Labels............................................................................................................................................................... 9.3.2

Action To Be Taken In A Monitoring Incident......................................................................................................... 9.3.3

Review System Specific Security Features................................................................................................................. 9.3.4

Chapter 10--Malicious Code Prevention

PURPOSE.......................................................................................................................................................................... 10.1

SCOPE............................................................................................................................................................................... 10.2

DEFINITIONS.................................................................................................................................................................. 10.3

Malicious Code............................................................................................................................................................. 10.3.1

Mobile Code.................................................................................................................................................................. 10.3.2

Malicious Mobile Code............................................................................................................................................... 10.3.3

Mobile Code Technologies......................................................................................................................................... 10.3.4

Trusted Source.............................................................................................................................................................. 10.3.5

Screening....................................................................................................................................................................... 10.3.6

PROCEDURES.................................................................................................................................................................. 10.4

Preventive Procedures................................................................................................................................................. 10.4.1

Malicious Code Detection........................................................................................................................................... 10.4.2

MALICIOUS CODE SECURITY REQUIREMENTS................................................................................................... 10.5

Prevention Steps to be Taken..................................................................................................................................... 10.5.1

Chapter 11--Software

PURPOSE.......................................................................................................................................................................... 11.1

SCOPE............................................................................................................................................................................... 11.2

PROCEDURES.................................................................................................................................................................. 11.3

LOW RISK SOFTWARE................................................................................................................................................ 11.4

HIGH RISK SOFTWARE................................................................................................................................................ 11.5

Public Domain Software............................................................................................................................................... 11.5.1

Unauthorized Software................................................................................................................................................ 11.5.2

EMBEDDED SOFTWARE............................................................................................................................................. 11.6

POLICY EXCEPTIONS.................................................................................................................................................... 11.7

Chapter 12--Information Storage Media Control and Accounting Procedures

PURPOSE.......................................................................................................................................................................... 12.1

SCOPE............................................................................................................................................................................... 12.2

PROCEDURES.................................................................................................................................................................. 12.3

Information Storage Media Control........................................................................................................................... 12.3.1

Inspections................................................................................................................................................................. 12.3.1.1

Control Procedures.................................................................................................................................................... 12.3.1.2

Other Categories of Storage Media........................................................................................................................ 12.3.1.3

Audits and Reports...................................................................................................................................................... 12.3.2

Destruction of Media................................................................................................................................................... 12.3.3

Chapter 13-- Information Storage Media Labeling and Product Marking Requirements

PURPOSE.......................................................................................................................................................................... 13.1

SCOPE............................................................................................................................................................................... 13.2

PROCEDURES.................................................................................................................................................................. 13.3

Information Storage Media......................................................................................................................................... 13.3.1

Label Placement......................................................................................................................................................... 13.3.1.1

Data Descriptor Label............................................................................................................................................... 13.3.1.2

Classification Markings............................................................................................................................................... 13.3.2

Chapter 14--Information Systems (IS) Maintenance Procedures

PURPOSE.......................................................................................................................................................................... 14.1

SCOPE............................................................................................................................................................................... 14.2

PROCEDURES.................................................................................................................................................................. 14.3

Maintenance Personnel............................................................................................................................................... 14.3.1

Maintenance by Cleared Personnel........................................................................................................................ 14.3.1.1

Maintenance by Uncleared (or Lower-Cleared) Personnel................................................................................. 14.3.1.2

General Maintenance Requirements.......................................................................................................................... 14.3.2

Maintenance Log....................................................................................................................................................... 14.3.2.1

Location of Maintenance......................................................................................................................................... 14.3.2.2

Removal of Systems/Components.......................................................................................................................... 14.3.2.3

Use of Network Analyzers....................................................................................................................................... 14.3.2.4

Use of Diagnostics.................................................................................................................................................... 14.3.2.5

Introduction of Maintenance Equipment Into a Sensitive Compartmented Information Facility (SCIF)..... 14.3.2.6

Maintenance and System Security............................................................................................................................ 14.3.3

Remote Maintenance................................................................................................................................................... 14.3.4

Maintenance Performed With The Same Level of Security................................................................................ 14.3.4.1

Maintenance Performed With a Different Level of Security............................................................................... 14.3.4.2

Initiating and Terminating Remote Access........................................................................................................... 14.3.4.3

Keystroke Monitoring Requirements..................................................................................................................... 14.3.4.4

Other Requirements/Considerations...................................................................................................................... 14.3.4.5

Life Cycle Maintenance............................................................................................................................................... 14.3.5

Chapter 15--Portable Electronic Devices

PURPOSE.......................................................................................................................................................................... 15.1

SCOPE............................................................................................................................................................................... 15.2

PROCEDURES.................................................................................................................................................................. 15.3

Approval Requirements............................................................................................................................................... 15.3.1

Handling Procedures.................................................................................................................................................... 15.3.2

Standard Operating Procedure (SOP) Development............................................................................................ 15.3.2.1

Classified Processing................................................................................................................................................ 15.3.2.2

Standard Operating Procedures (SOP) Approval.................................................................................................... 15.3.3

Chapter 16—Security Procedures for Information Systems (IS) and Facsimile (FAX) use of the Public Telephone Network

PURPOSE.......................................................................................................................................................................... 16.1

SCOPE............................................................................................................................................................................... 16.2

PROCEDURES.................................................................................................................................................................. 16.3

DAA Rep/SCO Validation and Approval................................................................................................................. 16.3.1

UNCLASSIFIED CONNECTIVITY................................................................................................................................ 16.4

Unclassified Facsimile Guidelines.............................................................................................................................. 16.4.1

Unclassified Facsimile Approval............................................................................................................................. 16.4.1.1

Request for Unclassified Fax Approval.............................................................................................................. 16.4.1.1.1

Physical Disconnect of Unclassified Fax Equipment........................................................................................... 16.4.1.2

Fax Header Information............................................................................................................................................. 16.4.1.3

Unclassified Computer FAX/modem - telephone guidelines................................................................................ 16.4.2

Unclassified Computer FAX/modem accreditation support............................................................................... 16.4.2.1

Physical Disconnect of Unclassified Computer Fax/Modem equipment.......................................................... 16.4.2.2

Fax/Modem header Information.............................................................................................................................. 16.4.2.3

Data Retrieval............................................................................................................................................................. 16.4.2.4

Importation of High Risk software.......................................................................................................................... 16.4.2.5

Publicly Accessible Unclassified Open Source Information Systems................................................................. 16.4.3

Open Source Information Systems Connectivity ................................................................................................ 16.4.3.1

CLASSIFIED CONNECTIVITY...................................................................................................................................... 16.5

Secure Telephone Unit (STU)-III/Data Port Security Procedures......................................................................... 16.5.1

Identification and Authentication.............................................................................................................................. 16.5.2

Use of the Defense Switching Network (DSN) with a STU-III.............................................................................. 16.5.3

STU-III Data Port/Fax Connectivity........................................................................................................................... 16.5.4

Request for STU-III/Fax Connectivity.................................................................................................................... 16.5.4.1

STU-III Fax Audit Logs............................................................................................................................................ 16.5.4.2

STU-III Connectivity Restrictions.......................................................................................................................... 16.5.4.3

STU-III Data Port Connectivity within a SCIF......................................................................................................... 16.5.5

Connectivity Requirements...................................................................................................................................... 16.5.5.1

STU-III Data Port Audit Logs............................................................................................................................... 16.5.5.1.1

Connectivity Restrictions...................................................................................................................................... 16.5.5.1.2

Chapter 17-Interconnecting Information Systems

PURPOSE.......................................................................................................................................................................... 17.1

SCOPE............................................................................................................................................................................... 17.2

DISCUSSION.................................................................................................................................................................... 17.3

Interconnected Information Systems........................................................................................................................ 17.3.1

Inter-Domain Connections.......................................................................................................................................... 17.3.2

Controlled Interface...................................................................................................................................................... 17.3.3

One-Way Connections............................................................................................................................................. 17.3.3.1

Equal Classification Connection.......................................................................................................................... 17.3.3.1.1

Low to High Connections..................................................................................................................................... 17.3.3.1.2

High to Low Connections..................................................................................................................................... 17.3.3.1.3

Other Unequal Classification Level Connections.............................................................................................. 17.3.3.1.4

Dual-Direction Connections.................................................................................................................................... 17.3.3.2

Multi-Domain Connections...................................................................................................................................... 17.3.3.3

Review Procedures....................................................................................................................................................... 17.3.4

Reliable Human Review............................................................................................................................................ 17.3.4.1

Automated Review.................................................................................................................................................... 17.3.4.2

Chapter 18-Information Transfer and Accounting Procedures

PURPOSE.......................................................................................................................................................................... 18.1

SCOPE............................................................................................................................................................................... 18.2

PROCEDURES.................................................................................................................................................................. 18.3

Reliable Human Review of Data................................................................................................................................. 18.3.1

Media Transfers In/Out of an Organization............................................................................................................. 18.3.2

Disposition of Excess or Obsolete COTS Software................................................................................................. 18.3.3

High to Low Data Transfers by Media...................................................................................................................... 18.3.4

PL-3 and Below Functionality.................................................................................................................................. 18.3.4.1

PL-4 and Above Functionality................................................................................................................................ 18.3.4.2

Low to High Data Transfers by Media...................................................................................................................... 18.3.5

Demonstration Software.............................................................................................................................................. 18.3.6

Chapter 19--Multi-Position Switches

PURPOSE.......................................................................................................................................................................... 19.1

SCOPE............................................................................................................................................................................... 19.2

POLICY.............................................................................................................................................................................. 19.3

RESPONSIBILITIES........................................................................................................................................................ 19.4

DAA Rep....................................................................................................................................................................... 19.4.1

ISSM............................................................................................................................................................................... 19.4.2

ISSO/System Administrator........................................................................................................................................ 19.4.3

AIS Requirements............................................................................................................................................................ 19.5

Labels............................................................................................................................................................................. 19.5.1

Desktop Backgrounds................................................................................................................................................. 19.5.2

Screenlocks.................................................................................................................................................................... 19.5.3

Smart Keys/Permanent Storage Medium.................................................................................................................. 19.5.4

Hot Key Capability....................................................................................................................................................... 19.5.5

Scanning Capability..................................................................................................................................................... 19.5.6

Wireless or Infrared Technology............................................................................................................................... 19.5.7

Unique Password Requirement.................................................................................................................................. 19.5.8

Data Hierarchy.............................................................................................................................................................. 19.5.9

Security CONOPS....................................................................................................................................................... 19.5.10

Training........................................................................................................................................................................ 19.5.11

TEMPEST.................................................................................................................................................................... 19.5.12

Procedures for LOGON/Switching Between Systems........................................................................................... 19.5.13

KVM SWITCH USER AGREEMENT........................................................................................................................... 19.6

Chapter 20--Clearing, Sanitizing, and Releasing Computer Components

PURPOSE.......................................................................................................................................................................... 20.1

SCOPE............................................................................................................................................................................... 20.2

RESPONSIBILITIES........................................................................................................................................................ 20.3

PROCEDURES.................................................................................................................................................................. 20.4

Review of Terms........................................................................................................................................................... 20.4.1

Clearing....................................................................................................................................................................... 20.4.1.1

Sanitizing (Also Purging)......................................................................................................................................... 20.4.1.2

Destruction................................................................................................................................................................. 20.4.1.3

Declassification.......................................................................................................................................................... 20.4.1.4

Periods Processing.................................................................................................................................................... 20.4.1.5

Overwriting Media........................................................................................................................................................ 20.4.2

Overwriting Procedure.............................................................................................................................................. 20.4.2.1

Overwrite Verification............................................................................................................................................... 20.4.2.2

Degaussing Media....................................................................................................................................................... 20.4.3

Magnetic Media Coercivity..................................................................................................................................... 20.4.3.1

Types of Degausser.................................................................................................................................................. 20.4.3.2

Degausser Requirements.......................................................................................................................................... 20.4.3.3

Use of a Degausser................................................................................................................................................... 20.4.3.4

Sanitizing Media........................................................................................................................................................... 20.4.4

Destroying Media......................................................................................................................................................... 20.4.5

Expendable Item Destruction................................................................................................................................... 20.4.5.1

Destruction of Hard Disks and Disk Packs............................................................................................................ 20.4.5.2

Hard Disks............................................................................................................................................................... 20.4.5.2.1

Shipping Instructions............................................................................................................................................ 20.4.5.2.2

Disk Packs................................................................................................................................................................ 20.4.5.2.3

Optical Storage Media........................................................................................................................................... 20.4.5.2.4

Malfunctioning Media................................................................................................................................................. 20.4.6

Release of Memory Components and Boards.......................................................................................................... 20.4.7

Volatile Memory Components................................................................................................................................. 20.4.7.1

Nonvolatile Memory Components.......................................................................................................................... 20.4.7.2

Other Nonvolatile Media.......................................................................................................................................... 20.4.7.3

Visual Displays....................................................................................................................................................... 20.4.7.3.1

Printer Platens and Ribbons.................................................................................................................................. 20.4.7.3.2

Laser Printer Drums, Belts, and Cartridges......................................................................................................... 20.4.7.3.3

Clearing Systems for Periods Processing................................................................................................................. 20.4.8

Release of Systems and Components....................................................................................................................... 20.4.9

Documenting IS Release or Disposal..................................................................................................................... 20.4.9.1

Chapter 21--Other Security Requirements

PURPOSE.......................................................................................................................................................................... 21.1

SCOPE............................................................................................................................................................................... 21.2

REQUIREMENTS............................................................................................................................................................ 21.3

Contingency Planning................................................................................................................................................. 21.3.1

Backup......................................................................................................................................................................... 21.3.1.1

Responsibilities.......................................................................................................................................................... 21.3.1.2

Foreign National Access to Systems Processing Classified Information............................................................ 21.3.2

Tactical/Deployable Systems..................................................................................................................................... 21.3.3

Resolving Conflicting Requirements...................................................................................................................... 21.3.3.1

Specific Conflicting Requirements.......................................................................................................................... 21.3.3.2

Guest Systems in a SCIF.............................................................................................................................................. 21.3.4

SCI Systems With Certification............................................................................................................................... 21.3.4.1

SCI Systems Without Certification......................................................................................................................... 21.3.4.2

Unclassified or Collateral Systems.......................................................................................................................... 21.3.4.3

Other Requirements...................................................................................................................................................... 21.3.5

Chapter 22--Information Systems (IS) and Network Security Self-Inspection Aid

PURPOSE.......................................................................................................................................................................... 22.1

SCOPE............................................................................................................................................................................... 22.2

APPLICABILITY............................................................................................................................................................. 22.3

PROCEDURES.................................................................................................................................................................. 22.4


 

Figures                                                                                                                                                                                     Page

3.1  General Accreditation Review and Approval Cycle....................................................................................................... 14

3.2  Multi-Service Accreditation Flow..................................................................................................................................... 17

7.1  Sample NSA/CSS Form G6521............................................................................................................................................ 30

8.1  Sample Incident Report Message...................................................................................................................................... 36

9.1  Information System Warning Banner............................................................................................................................... 38

9.2  Warning Label...................................................................................................................................................................... 38

19.1  KVM Switch User Agreement Form................................................................................................................................ 65

20.1  Sample NSA/CSS Form G6522.......................................................................................................................................... 72

Tables

9.1.  Recommended Incident Response Actions.................................................................................................................... 39

9.2.  Sample Monitoring Investigation Questions................................................................................................................. 39

20.1.  Sanitizing Data Storage Media........................................................................................................................................ 67

20.2.  Sanitizing System Components...................................................................................................................................... 68

22.1.  Is and Network Security Self-Inspection Checklist..................................................................................................... 78

 

Appendices

Appendix A--References......................................................................................................................................................... A-1

Appendix B--Glossary of Acronyms, Abbreviations, and Terms..................................................................................... B-1

Appendix C--Summary of Revisions...................................................................................................................................... C-1


 

CHAPTER 1

 

GENERAL INFORMATION

 

1.1.  (U) BACKGROUND.  The DIA DoDIIS Information Assurance (IA) Program (Air Force, Army, and Navy Service Certification Organizations -- SCO -- and NIMA Certification Authority) and NSA/CSS Information Assurance (IA) Program (Air Force, Army, and Navy Service Cryptologic Elements - SCE) identified a requirement to standardize security procedures used in the management of Sensitive Compartmented Information (SCI) systems and the information they process. SCI is defined as information and materials requiring special community controls indicating restricted handling within present and future community intelligence collection programs and their end products. These special community controls are formal systems of restricted access established to protect the sensitive aspects of sources, methods, and analytical procedures of foreign intelligence programs. It was also determined that by standardizing procedural guidelines, it would significantly improve support to the increasingly interconnected customer base of the Joint Services. This document describes the protection philosophy and functional procedures essential in the implementation of an effective Information Assurance (IA) Program.  Further, it provides implementation guidelines and procedures applicable to the protection, use, management, and dissemination of SCI; assigns responsibilities; and establishes procedures for the development, management, and operations of systems and networks used for processing SCI. The primary purpose of this supplemental guidance is to address day-to-day IS security issues and provide support to those responsible for managing SCI and the automated infrastructure used to process this information at the organizational level.

1.2. (U) POLICY. U.S. Government policy requires all classified information be appropriately safeguarded to ensure the confidentiality, integrity, and availability of the information. Safeguards will be applied such that information is accessed only by authorized persons and processes, is used only for its authorized purpose, retains its content integrity, is available to satisfy mission requirements, and is marked and labeled as required. SCI created, stored, processed, or transmitted in or over Information Systems (ISs) covered by DCI policy and supplementing directives shall be properly managed and protected throughout all phases of a system's life cycle.  The combination of security safeguards and procedures shall assure that the system and users are in compliance with DCID 6/3, NSA/CSS Manual 130-1, DIAM 50-4, and the JDCSISSS supplement to NSA/CSS Manual 130-1 and DIAM 50-4. This document shall not be construed to countermand or waive provisions of any Executive Order, National Policy, Department of Defense (DoD) Directive, or other provisions of regulatory policies or laws which are beyond the scope of authority of the Directors of the Defense Intelligence Agency (DIA) and the National Security Agency/Central Security Service (NSA/CSS).  Any perceived contradictions with higher-level policy should be forwarded to the appropriate Designated Approving Authority (DAA) Representative (Rep)/Service Certifying Organization (SCO) for resolution.

1.3. (U) SCOPE AND APPLICABILITY. This document contains procedures and identifies requirements that shall be applied to all systems processing Sensitive Compartmented Information (SCI) under the cognizance of the Department of Defense (DoD), to include: Office of the Secretary of Defense (OSD), the Chairman of the Joint Chiefs of Staff and the Joint Staff, the United and Joint Commands, the Defense Agencies and Field Activities, the Military Departments (including their National Guard and Reserve components), National Security Agency (NSA)/Central Security Service (CSS) and Service Cryptologic Elements, National Image and Mapping Agency (NIMA), the Inspector General of the DoD, and Government contractors supporting DoD who process SCI. This includes systems that are: airborne, mobile, afloat, in-garrison, tactical, mission, administrative, embedded, portable, Government purchased, Government leased, or on loan from other Government sources.  Contained also within this document is a collective set of procedures and protection mechanisms for Information Systems (ISs) and networks used in SCI processing that must be enforced throughout all phases of the IS life-cycle, to include:

·         Concept Development

·         Design

·         Development

·         Deployment

·         Operations

·         Recertification

·         Disposal

1.4. (U) REFERENCES, ACRONYMS, AND DEFINITIONS.  Appendix A provides a comprehensive list of national, department, and agency publications that are used in conjunction with this document and augments these reference sources.  The acronyms used in this document are contained in part 1 of Appendix B. The terminology extracted from various IS related documents are included as part 2 of Appendix B.

1.5. (U) ROLES AND RESPONSIBILITIES.  The roles and responsibilities of the personnel involved with IS security are summarized in the paragraphs below.  Personnel in the roles defined below must attend training and certification as directed by DoD and meet DCID 6/3 prerequisites.

1.5.1. (U) Principal Accrediting Authority (PAA). The PAA has ultimate security responsibility for his/her organization.  This responsibility includes IA program oversight, development, and implementation. In general, much of this person's operational authority is delegated to DAAs.  Responsibilities of the PAA shall include:

·         Establishing a department or agency IA Security Program.

·         Appointing DAAs.

·         Approving or disapproving further delegation of the DAA's authority.

·         Ensuring that the DAA is supported by individuals knowledgeable in all areas of security such that a technically correct assessment of the security characteristics of new ISs can be formalized.

·         Ensuring the implementation of the requirements set forth in U.S. Government IS security policy.

·         Ensuring accountability for the protection of the information under his/her purview.

·         Ensuring availability of security education, training, and awareness, to ensure consistency and reciprocity.

·         Establishing a joint compliance and oversight mechanism to validate the consistent implementation of IS security policy.

·         Approving the operation of system(s) that do not meet the requirements specified in DoD and Intelligence Community (IC) IS security documents. However, such approval shall be in writing, and the PAA granting such approval shall also document, in writing, his/her responsibility for the resulting residual risk(s) and inform other PAAs responsible for systems interconnected to this system.

·         Overseeing the management of new IS development and implementation.

·         Ensuring that security is incorporated as an element of the IS life-cycle process.

1.5.2.  (U) Data Owner.  Responsibilities of the Data Owner shall include, but are not limited to:

·         Providing guidance to the PAA/DAA concerning:

·         the sensitivity of information under the Data Owner's purview;

·         the PAA/DAA's decision regarding the Levels-of-Concern for confidentiality, integrity, and availability; and

·         specific requirements for managing the owner's data (e.g., incident response, information contamination to other systems/media, and unique audit requirements).

·         Determining whether foreign nationals may access information systems accredited under this manual.  Access must be consistent with DCID 1/7 and DCID 5/6.

1.5.3. (U) Designated Approving Authority (DAA). The DAA shall:

·         Be a U.S. citizen;

·         Be an employee of the United States Government; and

·         Hold U.S. Government security clearance/access approvals commensurate with the level of information processed by the system.

Responsibilities of the DAA shall include, but are not limited to:

·         Ensuring each system is properly accredited/certified based on system environment, sensitivity levels and security safeguards.

·         Issuing written accreditation/certification statements.

·         Ensuring records are maintained for all IS accreditations/certifications under his/her purview to include use of automated information assurance tools.

·         Ensuring all of the appropriate roles and responsibilities outlined in this directive are accomplished for each IS.

·         Ensuring that operational information systems security policies are in place for each system, project, program, and organization or site for which the DAA has approval authority.

·         Ensuring that a security education, training, and awareness program is in place.

·         Ensuring that security is incorporated as an element of the life-cycle process.

·         Ensuring that the DAA Representatives (Rep)/Service Certifying Organization (SCO) members are trained and certified to properly perform their responsibilities.

·         Providing written notification to the cognizant PAA and Data Owner prior to granting any foreign national access to the system.

·         Ensuring that organizations plan, budget, allocate, and spend adequate resources in support of IS security.

·         Ensuring consideration and acknowledgement of Counter-Intelligence activities during the C&A process.

·         Reporting security-related events to affected parties (i.e., interconnected systems), data owners, and all involved PAAs.

1.5.4. (U) DAA Representative (Rep)/Service Certifying Organization (SCO)

·         The DAA Rep/SCO member shall be a U.S. citizen and

·         Hold U.S. Government security clearance/access approvals commensurate with the level of information processed by the system.

Responsibilities of the DAA Rep/SCO, under the direction of the DAA, shall include:

·         Developing and overseeing operational information systems security implementation policy and guidelines.

·         Ensuring that security testing and evaluation is completed and documented.

·         Advising the DAA on the use of specific security mechanisms.

·         Maintaining appropriate system accreditation documentation.

·         Overseeing and periodically reviewing system security to accommodate possible changes that may have taken place.

·         Advising the Information Systems Security Managers (ISSMs) and Information System Security Officers (ISSOs) concerning the levels of concern for confidentiality, integrity, and availability for the data on a system.

·         Evaluating threats and vulnerabilities to ascertain the need for additional safeguards.

·         Ensuring that a record is maintained of all security-related vulnerabilities and ensuring serious or unresolved violations are reported to the DAA.

·         Ensuring that certification is accomplished for each IS.

·         Evaluating certification documentation and providing written recommendations for accreditation to the DAA.

·         Ensuring all ISSMs and ISSOs receive technical and security training to carry out their duties.

·         Assessing changes in the system, its environment, and operational need that could affect the accreditation.

1.5.5. (U) NSA/CSS Senior Information Systems Security Program Manager (SISSPM)

·         The SISSPM shall be a U.S. citizen and

·         Hold U.S. Government security clearance/access approvals commensurate with the level of information processed by the system.

The SISSPM responsibilities shall include but are not limited to the following:

·         Developing metrics, measuring and reporting progress on improving ISS in operational systems and networks.

·         Establishing and maintaining career development and training for ISS personnel under their purview.

·         Serving as the operational representative to the NSA/CSS Information System Security Incident Board (NISSIB).

·         Representing the operational ISS view to the Operational Information Systems Security Steering Group.

·         Directing Field, SCE and regional ISSPMs in actions related to the NSA/CSS Operational IS Security Program.

·         Assisting the NISIRT in managing ISS incidents and in implementing fixes to identified vulnerabilities in operational ISs.

·         Promoting general operational information systems security awareness.

·         Providing technical and policy guidance to ISS Security personnel.

·         Providing a forum for information exchange on computer security issues with the Information Systems Security Managers.

1.5.6. (U) Service Cryptologic Element (SCE) Information Systems Security Program Manager (ISSPM).

·         The SCE ISSPM shall be a U.S. citizen and

·         Hold U.S. Government security clearance/access approvals commensurate with the level of information processed by the system.

The SCE ISSPM responsibilities include:

·         Acting as liaison on matters concerning IS and Network security to the NSA/CSS Senior Information Systems Security Program Manager (SISSPM) and to the appropriate military headquarters.

·         Ensuring the accreditation of all SCE ISs.

·         Reviewing all certification/accreditation support documentation for proof of adequate IS and Network security procedures and, based upon the review, recommending approval or disapproval to the appropriate DAA.

·         Forwarding reviewed certification/System Security Plan (SSP) for ISs to the NSA/CSS SISSPM, as required.

·         Granting interim approval-to-operate and formal accreditation of ISs as authorized by NSA/CSS DAA.

·         Reviewing requests to bypass, strain, or test security mechanisms, or conduct network monitoring or keystroke monitoring and obtaining approval/disapproval for SCI requests from the NSA/CSS SISSPM and approving/disapproving requests for unclassified and collateral systems.

·         Ensuring life-cycle security integrity of all SCE ISs.

·         Developing procedures necessary to implement higher level regulations and directives.

·         Providing guidance and policy to all subordinate SCE organizations.

·         Promoting the nomination of SCE personnel for NSA/CSS Security Achievement Awards.

·         Managing the SCE IS and Network Security Training Program to include:

·         Ensuring all SCE ISSMs and ISSOs attend the National Cryptologic School ND-225 course, “Operational IS Security” or equivalent.

·         Coordinating the training of nominees with the National Cryptologic School.

·         Publishing SCE annual training schedules for the ND-225 course, which is published in October-November for the following calendar year.

·         Reporting name, organization, and address of all students to the National Cryptologic School for certificates of completion.

·         Developing unique SCE courses and materials for training, as necessary.

·         Maintaining a level of expertise by attending IS and Network security conferences, symposiums, and training courses sponsored by other agencies.

·         Augmenting SCE inspections, both Inspector General (IG) and others, upon request.

·         Reviewing requirements for approving public-domain software before its use on any SCE IS.

1.5.7. (U) Commander/Commanding Officer (CO)/Senior Intelligence Officer (SIO) Responsibility.  Commanders/CO/SIOs, in conjunction with their ISSM/ISSOs/System Administrators (SA), will work together to present a cohesive training program, both for users and IS & network security personnel. If well developed, and effectively implemented, the security program can help neutralize IS security threats, prevent the compromise or loss of classified information, and produce users who act effectively to secure system resources.  The responsibilities of the Commander/CO/SIO include:

·         Appointing an ISSM in writing and, where applicable, ensuring a copy of orders are forwarded to the SCE organization's ISSPM or the DIA DAA Rep/SCO.

·         Ensuring the establishment and funding of an effective and responsive IS Security (ISS) Program.

·         Participating as an active member of the organization's CCB or appoint a representative to act in his/her absence.

·         Ensuring that users and ISS personnel receive DoD-mandated certification training IAW their responsibilities as part of an approved ISS training program.

·         Ensuring ISS policies are enforced and implemented.

1.5.8. (U) Information Systems Security Manager (ISSM). The ISSM is appointed in writing by the authority at a site responsible for information system security. ISSM responsibilities should not be assigned as collateral duties, if at all possible. The ISSM shall:

·         Be a U.S. citizen;

·         Hold U.S. Government security clearance/access approvals commensurate with the level of information processed by the system; and

·         Attend ND-225 training or equivalent.

The ISSM responsibilities include:

·         Forwarding a copy of his/her appointment letter to the DAA Rep/SCO.

·         Developing and maintaining a formal IS security program.

·         Implementing and enforcing IS security policies.

·         Reviewing and endorsing all IS accreditation/certification support documentation packages.

·         Overseeing all ISSOs to ensure they follow established IS policies and procedures.

·         Ensuring ISSM/ISSO review weekly bulletins and advisories that impact security of site information systems to include, AFCERT, ACERT, NAVCIRT, IAVA, and DISA ASSIST bulletins.

·         Ensuring that periodic testing (monthly for PL-5 systems) is conducted to evaluate the security posture of the ISs by employing various intrusion/attack detection and monitoring tools (shared responsibility with ISSOs).

·         Ensuring that all ISSOs receive the necessary technical (e.g., operating system, networking, security management, SysAdmin) and security training (e.g., ND-225 or equivalent) to carry out their duties.

·         Assisting ISSOs to ensure proper decisions are made concerning the levels of concern for confidentiality, integrity, and availability of the data, and the protection levels for confidentiality for the system.

·         Ensuring the development of system accreditation/certification documentation by reviewing and endorsing such documentation and recommending action to the DAA Rep/SCO.

·         Ensuring approved procedures are in place for clearing, purging, declassifying, and releasing system memory, media, and output.

·         Maintaining, as required by the DAA Rep/SCO, a repository for all system accreditation/certification documentation and modifications.

·         Coordinating IS security inspections, tests, and reviews.

·         Investigating and reporting (to the DAA/DAA Rep/SCO and local management) security violations and incidents, as appropriate.

·         Ensuring proper protection and corrective measures have been taken when an IS incident or vulnerability has been discovered.

·         Ensuring data ownership and responsibilities are established for each IS, to include accountability, access and special handling requirements.

·         Ensuring development and implementation of an effective IS security education, training, and awareness program.

·         Ensuring development and implementation of procedures in accordance with configuration management (CM) policies and practices for authorizing the use of hardware/software on an IS.  Any changes or modifications to hardware, software, or firmware of a system must be coordinated with the ISSM/ISSO and appropriate approving authority prior to the change.

·         Developing procedures for responding to security incidents, and for investigating and reporting (to the DAA Rep/SCO and to local management) security violations and incidents, as appropriate.

·         Serving as a member of the configuration management board, where one exists (however, the ISSM may elect to delegate this responsibility to the ISSO.)

·         Working knowledge of system functions, security policies, technical security safeguards, and operational security measures.

·         Accessing only that data, control information, software, hardware, and firmware for which they are authorized access and have a need-to-know, and assume only those roles and privileges for which they are authorized.

1.5.9. (U) Information Systems Security Officer (ISSO). The ISSO shall:

·         Be a U.S. citizen and

·         Hold U.S. Government security clearance/access approvals commensurate with the level of information processed by the system.

Responsibilities of the ISSO shall include:

·         Ensuring systems are operated, maintained, and disposed of in accordance with internal security policies and practices as outlined in the accreditation/certification support documentation package.

·         Attending required technical (e.g., operating system, networking, security management, SysAdmin) and security (e.g., ND-225 or equivalent) training relative to assigned duties.

·         Ensuring all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS.

·         Ensuring that proper decisions are made concerning levels of concern for confidentiality, integrity, and availability of the data, and the protection level for confidentiality for the system.

·         Reporting all security-related incidents to the ISSM.

·         Initiating protective and corrective measures when a security incident or vulnerability is discovered, with the approval of the ISSM.

·         Developing and maintaining an accreditation/certification support documentation package for system(s) for which they are responsible.

·         Conducting periodic reviews to ensure compliance with the accreditation/certification support documentation package.

·         Ensuring Configuration Management (CM) for IS software and hardware, to include IS warning banners, is maintained and documented. 

·         Serving as member of the Configuration Management Board if so designated by the ISSM.

·         Ensuring warning banners are placed on all monitors and appear when a user accesses a system.

·         Ensuring system recovery processes are monitored and that security features and procedures are properly restored.

·         Ensuring all IS security-related documentation is current and accessible to properly authorized individuals.

·         Formally notifying the ISSM and the DAA Rep/SCO when a system no longer processes classified information.

·         Formally notifying the ISSM and the DAA Rep/SCO when changes occur that might affect accreditation/certification.

·         Ensuring system security requirements are addressed during all phases of the system life cycle.

·         Following procedures developed by the ISSM, in accordance with configuration management (CM) policies and practices, for authorizing software use prior to its implementation on a system.  Any changes or modifications to hardware, software, or firmware of a system must be coordinated with the ISSM and appropriate approving authority prior to the change.

·         Establishing audit trails and ensuring their review.

·         Administering user identification (USERID) and authentication mechanisms of the IS or network.

·         Ensuring the most feasible security safeguards and features are implemented for the IS or network.

·         Ensuring no attempt is made to strain or test security mechanisms, or perform network line monitoring, or keystroke monitoring without appropriate authorization.

·         Performing network monitoring for the purpose of identifying deficiencies, but only with approved software, and after notifying the ISSM and other appropriate authority.

·         Accessing only that data, control information, software, hardware, and firmware for which they are authorized access and have a need-to-know, and assume only those roles and privileges for which they are authorized.

1.5.10. (U) The Program Management Office (PMO)/Program Manager (PM). 

·         The PM/PMO shall be a U.S. citizen and

·         Hold U.S. Government security clearance/access approvals commensurate with the level of information processed by the system.

The responsibilities of the PMO/PM will include:

·         Ensuring compliance with current IA policies, concepts, and measures when designing, procuring, adopting, and developing new ISs. This includes systems that are developed under contracts with vendors or computer services organizations and includes those systems that store, process, and/or transmit intelligence information.

·         Ensuring that the Configuration Management process is addressed and used when new SCI ISs are under development, being procured, or delivered for operation. An integral part of configuration management is the System Accreditation process.  Therefore, it is imperative that accreditation authorities be advised of configuration management decisions. This will ensure systems are fielded or modified within acceptable risk parameters and the latest security technology is being incorporated into system designs. This participation is most important at the Preliminary Design Review (PDR) and the Critical Design Review (CDR).

·         Performing a risk assessment on the IS while under development and keep the risk assessment current throughout the acquisition development portion of the life cycle.

·         Enforcing security controls that protect the IS during development.

·         Ensuring all steps involved in the acquisition and delivery of a certifiable IS are followed.  These include:

·         Evaluating interoperability with other systems.

·         Describing the IS mission so that it is clearly understood.

·         Determining the protection level of the new IS.

·         Fully defining the security requirements for the IS. This must include any measures that have to be implemented to ensure the confidentiality, integrity, and availability of the information being processed.

·         Formulating an approach for meeting the security requirements.

·         Incorporating security requirements during system development.

·         Developing accreditation Support documentation to be fielded with the IS.

·         Ensuring the IS undergoes Certification and/or Accreditation (C&A) Testing and Evaluation (T&E) prior to operation.

1.5.11. (U) Privileged Users (e.g., System Administrator (SA)). The responsibilities inherent to IS administration are demanding, and require a thorough knowledge of the IS. These responsibilities include various administrative and communications processes that, when properly carried out, will result in effective IS utilization, adequate security parameters, and sound implementation of established IA policy and procedures. System administrators shall:

·         Be U.S. citizens;

·         Be IA trained and certified in compliance with DoD requirements; and

·         Hold U.S. Government security clearance/access approvals commensurate with the level of information processed by the system.

In addition to the requirements for a general user, responsibilities of the system administration personnel shall include:

·         Implementing the IS Security guidance and policies as provided by the ISSM/ISSO.

·         Maintaining IS and networks to include all hardware and software (COTs/GOTs).

·         Monitoring system performance ensuring that system recovery processes are monitored to ensure that security features and procedures are properly restored.

·         Reporting all security-related incidents to the ISSM/ISSO.

·         Ensuring that all users have the requisite security clearances, authorization, need-to-know, and are aware of their security responsibilities before granting access to the IS.

·         Performing equipment custodian duties by providing other system unique requirements that may be necessary.  Ensuring systems are operated, maintained, and disposed of in accordance with internal security policies and practices outlined in the accreditation/certification support documentation package.

·         Maintaining software licenses and documentation.

·         Notifying the ISSM/ISSO and the SCO formally when changes occur that might affect accreditation/certification.

·         Ensuring  Configuration Management (CM) for security-relevant IS software and hardware, to include IS warning banners, is maintained and documented.

·         Monitoring hardware and software maintenance contracts.

·         Establishing user identification (USERID) and authentication mechanisms of the IS or network and issue user logon identifications and passwords.

·         Ensuring adequate network connectivity by ensuring that proper decisions are made concerning levels of concern for confidentiality, integrity, and availability of the data, and the protection level for confidentiality for the system.

·         Establishing audit trails and conducting reviews and archives as directed by the ISSM/ISSO.

·         Providing backup of system operations.

·         Assisting the ISSM/ISSO in developing and maintaining accreditation/certification support documentation package for system(s) for which they are responsible.

·         Conducting periodic reviews to ensure compliance with the accreditation/certification support documentation package.

·         Ensuring all IS security-related documentation is current and accessible to properly authorized individuals.

·         Formally notifying the ISSM/ISSO and the SCO when a system no longer processes classified information.

·         Following procedures developed by the ISSM/ISSO, authorizing software use before implementation on the system.

·         Assisting the ISSM/ISSO in maintaining configuration control of the systems and applications software ensuring the most feasible security safeguards and features are implemented on the IS or network.

·         Prohibiting attempts to strain or test security mechanisms, or perform network line monitoring or keystroke monitoring without appropriate authorization.

·         Performing network monitoring for the purpose of rectifying deficiencies, but only with approved software, and after notifying the ISSM and other appropriate authority and advising the ISSM/ISSO of security anomalies or integrity loopholes.

·         Participating in the Information Systems Security incident reporting program and with the approval of the ISSM/ISSO, initiate protective or corrective measures when a security incident or vulnerability is discovered.

1.5.12. (U) General Users. General users must hold U.S. Government security clearance/access approvals commensurate with the level of information processed by the system.  The responsibilities of a general user shall include:

·         Using the system for official use, only.  Appropriate personal use of IS must be approved first by the individual's supervisor.

·         Participating, at a minimum, in annual computer security awareness briefings/training.

·         Providing appropriate caveat and safeguard statements on all IS files, output products, and storage media.

·         Protecting ISs and IS peripherals located in his/her respective areas.

·         Safeguarding and reporting any unexpected or unrecognizable output products to the ISSO/SA as appropriate.  This includes both display and printed products.

·         Safeguarding and reporting the receipt of any media received through any channel to the appropriate ISSO/SA for subsequent virus inspection and inclusion into the media control procedures.

·         Reporting all security incidents to the ISSO/SA or ISSM.

·         Protecting passwords at the same level as the highest classification of material which the system is accredited to process.

·         Protecting passwords by never writing passwords down and destroying the original password documentation following initial review.

·         Protecting passwords from inadvertent disclosure.

·         Protecting all files containing classified data.

·         Notifying the system ISSO/SA if he or she suspects that a possible IS and/or network security problem exists.

·         Ensuring access doors, covers, plates and TEMPEST seals are properly installed on ISs to eliminate security hazards.

·         Protecting their authenticators and reporting any compromise or suspected compromise of an authenticator to the appropriate ISSO.

1.5.13. (U) Prohibited Activities. In general, there are activities which all users shall not perform on any Government systems:

·         Use networked ISs for personal gain, personal profit or illegal activities.

·         Release, disclose, or alter information without the consent of the data owner or the disclosure officer's approval.  Violations may result in prosecution of military members under the Uniform Code of Military Justice, Article 92 or appropriate disciplinary action for civilian employees.

·         Attempt to strain or test security mechanisms, or perform network line monitoring or keystroke monitoring without proper authorization.

·         Attempt to bypass or circumvent computer security features or mechanisms. For example, when users leave their workstation unattended without using appropriate screenlock, other users shall not use the system.

·         Modify the system equipment or software or use it in any manner other than its intended purpose.

·         Relocate or change IS equipment or the network connectivity of IS equipment without proper security authorization.

·         Introduce malicious code into any IS or network and will comply with rules and regulations for scanning all magnetic media that he/she introduces, mails, or transports into or out of the organization.

1.6. (U) CONFIGURATION CONTROL BOARD (CCB) OVERSIGHT. This document is under the purview of a Joint Service CCB consisting of the Services SCOs, SCEs, and a representative from DIA, NSA and NIMA.  Any recommended changes to the document should be forwarded to the appropriate CCB member.

1.7. (U) OTHER DOCUMENTATION SUPERSESSION.  This document supersedes Supplement 1 to NSA/CSS Manual 130-1, Information System and Network Security Procedures for Service Cryptologic Elements (SCEs), current edition, and Joint DoDIIS/Cryptologic SCI Information Systems Security Standards, all previous editions.


CHAPTER 2

LIFE CYCLE SECURITY

2.1. (U) PURPOSE. The Director of Central Intelligence Directive (DCID) 6/3, for the Intelligence Community is used to provide a system of evaluating the degree of trust needed for an Information System (IS) processing classified and sensitive information.  It is the basis for specifying security requirements in acquisition specifications, both for existing and planned systems. The Program Manager (PM), during acquisition, will require that security be an integral part of any contract used for acquisition consistent with the security requirements of the system. The PM and IS developers involved in the acquisition process of new ISs must ensure these new systems operate as intended and are accredited. They must ensure that systems are designed to meet user requirements, are developed economically, and contain appropriate security controls and audit trails.  Procedures must be implemented and precisely followed to ensure new ISs are created and can be readily approved for operation at an acceptable level of risk. Acquisition procedures must address all aspects of IS development, to include the security requirements that must be met, the IS security features required, the IS operating environment, and a plan that properly tracks the process by which IS definition, development, and security testing are to take place.  The purpose of this chapter is to address acquisition security requirements and includes:

·         National security policy requirements as they pertain to system development.

·         The responsibilities involved in the accreditation process.

·         Levels of Concern and Protection Levels.

·         Guidance that appropriate security requirements are identified early in the acquisition process.

2.2. (U) SCOPE. The early and complete identification of security requirements for an IS is a major security objective in all phases of the IS life cycle. These guidelines apply to all security personnel who must consider, improve, or change security throughout the life cycle to ensure continued adequate protection. These procedures are effective in the following life cycle phases:

 

CONCEPTS DEVELOPMENT PHASE

YES

 

DESIGN PHASE

YES

 

DEVELOPMENT PHASE

YES

 

DEPLOYMENT PHASE

YES

 

OPERATIONS PHASE

YES

 

RECERTIFICATION PHASE

YES

 

DISPOSAL PHASE

YES

 

2.3. (U) PROCEDURES.  Within each organization, life-cycle security requirements will be related to one of the seven life cycle phases which apply to all systems; Government owned, leased, or on loan from other organizations. Designated Approving Authority (DAA) Representatives (Reps)/Service Certifying Organizations (SCOs) must review and approve detailed system or subsystem security specifications.

2.3.1. (U) Concepts Development Phase. During the conceptual phase, security personnel must determine the data sensitivity and criticality of the IS being planned. This is accomplished by conducting sensitivity, risk/threat, interoperability, and economic assessments.   The results of these assessments provide the data necessary to perform the analysis and design of the next phase.  These guidelines apply to all personnel performing acquisition of ISs with the objective of fielding ISs with the appropriate security requirements identified early in the acquisition process.

2.3.1.1. (U) IS Security Design. The PMO/PM should ensure all IS security requirements are incorporated in the Critical Design Review, the System Security Plan (SSP)/Systems Security Authorization Agreement (SSAA) and the Security Concept of Operations (SECONOPS) (see DCID 6/3, 4.B.1.c.(1)). In concert with the Systems Design Security Officer (SDSO)/ Information Systems Security Engineer (ISSE), the PMO/PM will ensure the IS security design meets the requirements of DCID 6/3.

2.3.1.2. (U) Statement of Work (SOW) Requirements.  The SOW will include a DD Form 254 and address contractor related issues pertaining to contractor personnel security, physical security, contractor ISs in support of the contract, TEMPEST requirements, and applicable security regulations.  A Government official, either the SDSO/ISSE or DAA Rep/SCO, will coordinate these specific requirements depending on the particular acquisition.

2.3.1.3. (U) Additional Documentation.  Additional documentation based on the system's identified Protection Level to include guide(s) or manual(s) for the system's privileged users (test plans, procedures and results) and a general user's guide may be required.

2.3.2. (U) Design Phase.  During this phase of the life-cycle, the certification and accreditation process should begin.  The DAA first determines the Levels of Concern (LOC) for Confidentiality, Availability, and Integrity based on the information characteristics determined in the Concepts Development Phase.  The DAA then determines the required Protection Level for confidentiality based on the need-to-know, formal access approval(s), and clearance level(s), if applicable, of system users as compared to the sensitivity, formal compartments, and classification of the data to be stored, processed, or transmitted on the system. The Levels of Concern and Protection Levels are:

Security Features

Level of Concern

Protection Levels

Confidentiality

(Basic/Medium not used in Intelligence ISs) High

PL-1, PL-2, PL-3, PL-4, PL-5

Integrity

Basic, Medium, High

 

Availability

Basic, Medium, High

 

2.3.2.1. (U) Levels-of-Concern. Based on the characteristics of the information in the IS, a Level-of-Concern must be determined in each of three categories: confidentiality, integrity, and availability. The available Level-of-Concern ratings are Basic, Medium or High. The DAA determines the Level-of-Concern separately for each category based on the following:

·         The Confidentiality Level-of-Concern rating for all ISs that process intelligence information is, by definition, High.

·         The Integrity Level-of-Concern is determined by the necessary degree of resistance to unauthorized modification of the data in the IS. The greater the need for data integrity, the higher the Level of Concern.

·         The Availability Level-of-Concern rating is based on the need of ready access to the system data.  The greater the need for rapid data availability, the higher the Level-of-Concern.

·         A detailed description of the determination and assignment of Levels-of-Concern can be found in DCID 6/3, section 3.B. and Table 3.1, with even greater detail of each category in Chapters 4 (Confidentiality), 5 (Integrity), and 6 (Availability).

2.3.2.2. (U) Protection Levels. The Protection Level of an IS is the implicit level of trust placed in the system's technical capabilities, and applies only to confidentiality.  After determining that the Level-of-Concern for confidentiality must be high (since the system processes intelligence data), the DAA must then determine the necessary Protection Level based on:

·         Required clearances,

·         Formal access approval, and

·         Need-to-know of all IS users.

2.3.2.2.1. (U) The DAA must explicitly determine the Protection Level for each IS to be accredited.  DCID 6/3, Section 3.C. and Table 4.1 differentiate between the five Protection Levels (PL1 - PL5).  Chapter 4 details the security features required for each Protection Level.

2.3.2.2.2. (U) The LOCs for Availability and Integrity and the PL for Confidentiality are identified using DCID 6/3 Chapters 4-6. During the design phase, the Project Management Office (PMO) develops the System Security Plan (SSP)/System Security Authorization Agreement (SSAA).  This is a living document and should be updated throughout the IS's life cycle. It incorporates security documentation requirements found in DCID 6/3 and includes the mission need, system and environment description, intended system users, system security requirements, and development schedule.  A template for the SSAA can be found in the DoD Intelligence Information System (DoDIIS) Security Certification and Accreditation Guide, Appendix D. A template for the SSP can be found in the NSA/CSS Information System Certification and Accreditation Process (NISCAP).  The initial draft of the SSP/SSAA must be approved by the DAA Rep/SCO prior to system development. Actions must be taken by the Program Managers (PM) and SDSO/ISSE to ensure compliance with directives according to DCID 6/3.

2.3.3. (U) Development Phase. Adequate implementation of the necessary security measures is ensured during the development phase. The Development Security Manager, appointed by the PMO, has the major responsibility during the development phase.  He should ensure a test plan is prepared and participate in all project meetings including site surveys. Security support from the certifying organization and/or DIA is required based on the Protection Level of the IS. Hardware, software, telecommunications and the entire operational environment must comply with the System Security Authorization Agreement (SSAA). This extends beyond the system itself; the proposed or existing facility that will house the system must be considered to ensure that proper physical security is available. During the development phase, design reviews may identify security considerations which were overlooked in the initial system design. If so, the SSAA must be updated accordingly. If major security considerations are discovered, the development may return to a previous phase for rework.

2.3.4. (U) Test, Certification and Accreditation Phase.  During the test phase, the entire system is critically reviewed to ensure compliance with all specified security measures. A Security Test and Evaluation (ST&E) is conducted to certify that the system's security and contingency operations are properly implemented.  Any shortcomings and/or vulnerabilities are identified, and a risk analysis is conducted. Based upon the outcome of the risk analysis, a plan addressing the shortcomings (fixes, work-arounds, etc.) is developed. All this is detailed in the Security Certification Test Report, which is used by the DAA when making the approval decision. A template for the Security Certification Test Report is located in the DoDIIS Security Configuration and Accreditation Guide, Appendix G.  Following the resolution of any shortcomings, the conclusion of security testing, and after the appropriate Designated Approval Authority (DAA) grants accreditation approval, the system is released for operational use.

2.3.4.1. (U) Time Line for Certification Activities. A 90-day period is the basis for providing enough time for certifiers to properly prepare for and conduct a system certification evaluation and recommendation to the DAA. The 90 day timetable begins with the submission of the Request for Certification from the Program Manager (PM/PMO) to the Service Cryptologic Element (SCE)/Service Certification Office (SCO).

 

90 days

60 days

30 days

0 days

PM Request for Certification/Accreditation

X

 

 

 

SSP/SSAA

X

 

 

 

SCE/SCO approval of SSP/SSAA

 

X

 

 

SRTM & Test Procedures (SFUG if necessary)

 

X

 

 

SCE/SCO approval of Test Procedures

 

 

X

 

SCE/SCO submits Test Report and Test Memo

 

 

 

X

2.3.5. (U) Deployment and Operations Phase. Once the system is operational, the site operations staff and ISSO/ISSM are responsible for monitoring its security.  They do this by controlling changes to the system via strict Configuration Management. IS users are responsible for operating the system in compliance with the security guidelines found in the SSP/SSAA.  As required by DCID 6/3, the DAA Rep/SCO periodically reviews the adequacy of system security as required by all applicable regulations for unclassified, sensitive-unclassified, collateral, and SCI material. This review will take into account any system modifications and changes, including both hardware and software, to ensure that security requirements are adequate to meet any identified risks, threats to, or vulnerabilities of the system.  All changes are updated in the SSP/SSAA as they occur. If any changes significantly affect the system's security posture, the DAA is notified so that the need for recertification can be determined.

2.3.6. (U) Recertification Phase.  As required by the DAA, a system must be recertified whenever security changes occur in the LOC and PL, technical or non-technical security safeguards, threats to the system, operational environment, operational concept, interconnections, or any other significant increases in the level of residual risk. The recertification process includes: a review of existing security documentation to verify that these documents still accurately represent the system, a reevaluation of the system vulnerabilities, threat and risk, and a complete ST&E, or a subset of the original ST&E will be conducted.  Even if no security-significant changes occur, recertification and accreditation of a system must be re-evaluated every three years after the issuance of an accreditation. Site Based accreditation provides for continued reevaluation.

2.3.7. (U) Disposal Phase. When an IS is no longer needed, disposition can occur in several ways:  purging information residue from an IS or a component; releasing the IS or a component for reuse within the Intelligence Community; destroying an IS or a component through authorized channels; or, the method of shipment for an IS or component. All of the above actions must be approved by the DAA Rep/SCO.  While emergency destruction of an IS is a possibility that occurs during the normal operational phase, it is considered a special case during the disposal phase.

 


 

CHAPTER 3

 

SIGNALS INTELLIGENCE (SIGINT) SYSTEMS

ACCREDITATION PROCESS AND PROCEDURES

 

3.1. (U) PURPOSE. This chapter provides the accreditation processing requirements and procedures that, when implemented, will ensure Information Systems (ISs) do not operate without proper authority and effective security controls.  All SIGINT ISs must be formally accredited or granted an approval-to-operate before they legally may be used to process, store, transmit, or receive data of any classification, to include sensitive-but-unclassified (SBU). This is in accordance with the NSA/CSS Information Systems Certification and Accreditation Process (NISCAP). Note:  This chapter does not apply to intelligence information systems under the cognizance of the Director, Defense Intelligence Agency (DIA).

3.2. (U) SCOPE. These procedures are effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

NO

DESIGN PHASE

YES

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

YES

3.3. (U) DISCUSSION:

3.3.1. (U) Accreditation. Accreditation is the official authorization granted by the appropriate Designated Approving Authority (DAA), on a case‑by‑case basis, permitting the processing of information on an IS.  Approval is based upon the DAA's review of the System Security Plan (SSP). Under certain conditions interim approval-to-operate (IATO) may be granted by the DAA/designee in accordance with section 9.D.4 of DCID 6/3.

3.3.2. (U) Configuration Management. The accreditation process and associated security concerns are integral to configuration management enforcement. Therefore, accreditation authorities will be included in configuration management decisions to ensure systems are fielded or modified within acceptable risk parameters and the latest security technology is incorporated into system designs. This participation is most important at the Preliminary Design Review (PDR) and the Critical Design Review (CDR). Where there is no formal configuration management process in an acquisition or system modification, the Program Manager (PM) will coordinate all relevant activities with the accreditation authority.

3.4. (U) ACCREDITATION IN GENERAL.  Figure 3.1, General Accreditation Review and Approval Cycle, outlines the current cryptologic accreditation process.  As the figure indicates, accreditation may be initiated from one of three different logical points: Unit, Service Cryptologic Element (SCE), and the National Security Agency (NSA)/Central Security Service (CSS).

3.4.1. (U) Formal Accreditation.  Formal accreditation for any cryptologic IS can only be granted by the DAA, or DAA designee, after a site visit and only after a full test of the security controls of the entire system.  This applies to ISs processing any classification level of information and those which may currently have an IATO.

3.4.2. (U) Issuing Accreditation.  Once an SSP has been submitted and reviewed, the next step in the process is to issue accreditation/approval.  The Information Systems Security Program Manager (ISSPM) and certain accrediting action officers have the authority to accredit all unclassified systems, collateral systems, and certain Sensitive Compartmented Information (SCI) systems within SCI Facilities (SCIFs).  For certain systems, the ISSPM has the authority to issue accreditation on behalf of the NSA/CSS DAA.


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


FIGURE 3.1. (U) GENERAL ACCREDITATION REVIEW AND APPROVAL CYCLE.

 

3.4.3. (U) Reaccreditation.  When certain operational changes are made to an accredited IS, it must be submitted for reaccredidation by the Information System Security Officer (ISSO)/System Administrator (SA).  If this is not done, the DAA may rescind the current accreditation. Reaccredidation is required when:

·         The type of Central Processing Unit (CPU) and/or IS operating system changes.

·         The IS is relocated to another area or TEMPEST zone.

·         The IS Protection Level (PL) changes.

·         The classification of material processed by the IS is changed.

·         The IS is being connected to another IS or a network not previously connected.

·         When users with a lower security clearance are added to the system.

·         Any change to the IS which impacts security.

3.4.4. (U) Rescinding Accreditation.  The DAA may cancel the accreditation of an operational IS if violations are found in the operational status of the IS. However, there are acceptable reasons for operational changes that do not normally constitute rescinding accreditation. Accreditation is not rescinded for:

·         The substitution of similar components while components are in maintenance. However, if the original CPU is not returned to the IS when repair is completed, then an update to the SSP must be accomplished to reflect the correct serial numbers of the replacement CPU.

·         The addition of new terminals, peripheral devices, or relocation of an IS providing the SSP is updated within 90 days to reflect the system additions or relocation. These actions can only be done with appropriate coordination (TEMPEST, Physical Security Office, etc.) and with Information Systems Security Manager (ISSM) approval.

3.4.5. (U) Accreditation 3-Year Anniversary Review.  Each IS accreditation will be reviewed every 3 years.  The ISSM is responsible for ensuring that recertification of each accredited IS is completed upon its 3-year anniversary. The SSP will be updated to reflect any undocumented changes and will be coordinated and forwarded to the appropriate DAA for approval.

3.4.6. (U) Authorized Exemptions From Accreditation. As stated, all ISs must be accredited before they may legally process any information.  However, certain computers are never exposed to, contain, or process national security information (NSI) and are exempted from accreditation. The current approved list for accreditation exemptions is as follows:

·          Computerized test equipment.

·          Computers used in driving drill presses and their operations.

·          Computers used in engraving devices or machines.

3.4.7. (U) IS Approval-to-Operate. Once an SSP has been submitted, you may receive an IATO or formal accreditation (see paragraph 3.1), based on the circumstances involved.  The IATO is typically the first step in the accreditation process.  An IATO may be granted based upon a preliminary review of the SSP. Upon review, temporary waivers may be granted, on a case-by-case basis, for the operation of an IS which has security deficiencies if the waiver supports the time-critical, mission-essential processing requirements.  An IATO may be issued with an expiration date for temporary projects. Upon approval of the IATO, approval letters or messages are sent by the DAA directly to the organizational-level ISSM with information copies as necessary to ensure proper notification. The issuing of any approval is based upon the DAA's willingness to accept the risk for the IS based upon the documented evidence that adequate security measures have been taken to safeguard NSI. An IATO should not exceed 180 days. If required, an additional 180-day extension may be granted by the DAA Rep, but may not exceed 360 days.

3.4.8. (U) TEMPEST.  Refer to Chapter 5 for applicable TEMPEST procedures involved with IS accreditation.

3.5. (U) ACCREDITATION PROCEDURES. It is imperative that all cryptologic ISs operate with appropriate approval and with the security controls necessary to protect the information they process.  To ensure this is accomplished, well-defined and effective procedures must be established and followed.

3.5.1. (U) Accreditation Requests:

3.5.1.1. (U) Accreditation Requests Initiated at the Unit Level:

3.5.1.1.1. (U) The ISSO/SA obtains a new IS through channels such as supply, local purchase, or from the unit's Headquarters (HQ) through a planned program. The ISSO/SA completes an SSP for the new system and forwards it to the organization ISSM.  The ISSM ensures proper organizational‑level coordination with the SCIF manager for approval to use within the SCIF and with the TEMPEST officer for proper red/black installation.  The ISSM coordinates with other local personnel as necessary to ensure that the SSP is properly coordinated.  Once coordination is complete, and the package is approved at the unit level, the ISSM forwards the package to the DAA Rep for formal review.

3.5.1.1.2. (U) The DAA Rep reviews each SSP to ensure that adequate IS and network security measures have been implemented.  The DAA Rep then coordinates with other personnel, as required, in the final approval process. Examples include, but are not limited to:

·         A review by the TEMPEST Officer of each accreditation package to assess TEMPEST and technical security concerns.

·         A review by the SCIF Manager or Physical Security Office to identify any facility security concerns.

·         A review of the accreditation support documentation by the ISSM for proof of adequate network security measures and properly authorized connections.

3.5.1.1.3. (U) Following coordination, the SSP is then returned to the DAA Rep for final review and appropriate action.  This is the critical point in the review process. If any non-concurrence exists, the SSP may be returned to the originator for correction.  A non-concurrence can create an undesired delay in meeting a proposed operational capability.  Therefore, it is important that the ISSM ensures the completeness and accuracy of each SSP before it leaves the organization.

3.5.1.2. (U) Accreditation Initiated Through Downward-Directed Programs. The other logical points from which an SSP may be generated and submitted relate to downward‑directed programs.  Within the SCEs, the DAA has the responsibility to ensure that all IS acquisitions are reviewed for IS and Network security concerns.  A Systems Design Security Officer (SDSO) should be appointed to ensure that adequate built-in security capabilities are developed, tested, and implemented.  This ensures that the new system is accreditable prior to its deployment. Ideally, the formal accreditation or an approval-to-operate should be delivered with the system at the time of installation. However, on occasion, ISs are fielded to NSA field sites by outside installation teams and often delivered without an SSP. This directly impacts the Initial Operational Capability (IOC) of the IS being delivered. To prevent this type of situation, unit involvement in the downward-directed program is critical to successful installation and operation of the IS.

It is unrealistic for an organization Commander/Commanding Officer and the ISSM/ISSO/SA to generate an SSP for these systems before the installation team departs the organization. However, without accreditation the newly fielded system cannot legally operate.  To assist in eliminating this problem, the organization Commander/Commanding Officer will ensure the following guidelines are followed:

·         The organization fielding the new system will be notified 90 days prior to the planned installation if an SSP has not been received. Ensure that survey teams understand the requirements of this chapter and that they must submit an SSP to the ISSM prior to their arrival for installation.  The SSP will identify all communications connections to be made at the unit and must be coordinated with the DAA.

NOTE:  In implementing the provisions of NSA Directive 130-1 and its references, the organization Commander/Commanding Officer is authorized to deny access, or refuse country clearance, if overseas, to any team installing an IS being fielded without proper accreditation documentation.

·         Coordination with the DAA and PM should be accomplished to determine the IS security impact of planned delivery of new ISs and/or changes to existing systems.

·         Ensure that an ISSO/SA for the new system is assigned. The ISSM or ISSO/SA should be an active participant during all site survey team visits, upgrade meetings, etc.

3.5.1.3. (U) Accreditation at a Single-Service Site Including the Regional SIGINT Operation Centers. Processing of SSPs for ISs located at an organization controlled by only one military authority for SCIF management, TEMPEST, and IS and Network security will be handled by organization personnel through their chain of command.  Accreditation of ISs belonging to a particular SCE can only be approved through the DAA/DAA Rep.  At the RSOCs, a courtesy copy of the accreditation document will be provided to the parent service DAA.

3.5.1.4. (U) Accreditation at a Multi-Service Site.  The processing of SSPs for ISs located at a SCE-site with two or more collocated SCE elements and controlled by one military authority (either an Air Intelligence Agency (AIA), Intelligence and Security Command (INSCOM), or Commander, Naval Security Group (COMNAVSECGRU) Commander/Commanding Officer), will follow the guidelines depicted in Figure 3.2.  The following rules apply:

 

 

3.5.1.4.1. (U) Operational Systems Under Control of the Commander/Commanding Officer.  All ISs directly supporting operations of the SCE-site, regardless of the functional user, are either under the ownership of, or the direct responsibility of the Commander/CO, regardless of his/her military affiliation. As such, all ISs supporting the direct mission of the site will be accredited by the DAA of the Commander/CO or the NSA/CSS SISSPM, as appropriate.  This includes all ISs used for typical administrative support.

3.5.1.4.2. (U) SCE Unique Systems Not Directly Supporting The Primary Mission.  The SSP on unique Mission ISs, belonging to a particular SCE, will be forwarded by the Host Security Office (HSO) to the SCE owning the IS. The owning SCE DAA will ensure the accreditation of the IS.

3.5.1.4.3. (U) Assignment of a HSO at a Multi-Service Site.  Each multi-Service SCE site will assign a single office to perform the entire IS and Network security function for the site.  All SSPs, regardless of the originating ISSO/SA, will be forwarded to the HSO for local review and coordination (See Figure 3.2). Once coordinated, the HSO will forward the SSP to the appropriate DAA to ensure proper approval.  The HSO will maintain the complete database of all SSPs generated by the site.

3.5.1.5. (U) Accreditation by SCE Tenants Located at Non-SCE Interservice or Intercommand Sites. Accreditation of a cryptologic IS, functionally managed by any SCE, can only be approved by the appropriate DAA/DAA Rep, unless a separate written Memorandum of Understanding (MOU) provides different policy. The processing of SSPs for SCE ISs installed at interservice or intercommand sites will be handled according to the following procedures:

3.5.1.5.1. (U) The host Service is responsible for accreditation of the facility as a SCIF and facility TEMPEST certification. Therefore, the host Service facility manager and TEMPEST officer will be the coordinating authority on SSPs for cryptologic ISs located in facilities under their authority.

3.5.1.5.2. (U) The tenant organization functionally managing the cryptologic IS is responsible for obtaining accreditation through his/her chain of command. The HQ-level ISSPM will provide a copy of the IATO or final accreditation to the host Service facility manager and TEMPEST officer for their files.

3.5.2. (U) Submitting the SSP. Before full operation of the IS, and during the test phase, an SSP describing the IS must be prepared and submitted to the DAA/DAA Rep to document the IS use and the control mechanisms which are implemented to safeguard the system.  The SSP should be submitted not later than 60-90 days prior to the desired IOC or as soon as the required information is known on specific components, configuration, and interfaces. On large ISs, where the purchase contract calls for a CDR, the SDSO should submit the package in the development phase immediately after the CDR.  There are two ways of submitting SSPs; each is based upon organization requirements.

3.5.2.1. (U) Single Accreditation. This method of requesting accreditation is to submit only one IS accreditation per package. The reasons for submission vary, but range from the complexity of accrediting a large IS to the simplicity of being able to manage accountability easier by having only one IS accreditation per package. Under the Single Accreditation method there are no restrictions.  For example, a system may be a standalone personal computer or any mainframe IS with personal computers being used as terminals or multiple personal computers connected on a local area network.

3.5.2.2. (U) Type Accreditation.  This method permits the submission of one package requesting accreditation of multiple standalone ISs at one time. There are certain restrictions on a type accreditation submission. These restrictions are that all the ISs:

·         Must be standalone and used for the same mission.

·         Must be installed in the same general location.

·         Are operating at the same protection level.

·         Are processing the same data classification levels.

·         Have the same basic hardware configuration.

·         Are assigned to the same ISSO/SA.

3.5.2.3. (U) Format and Content. The acceptable format to present an SSP to the DAA/DAA Rep is the System Security Plan (SSP) Version 1.3, dated 11 October 2000.

3.5.3. (U) SSP and Database Classification. The classification of the accreditation database and an SSP, while directly related, are not necessarily the same. The following rules apply:

3.5.3.1. (U) Database Classification. The overall classification for the accreditation database is logically determined by the highest classification contained within any SSP in the database.  The database may become classified SCI if the packages are independently classified at that level.

3.5.3.2. (FOUO) SSP Classification.  An individual SSP may become classified for any of the following reasons:

·         CONFIDENTIAL--If it contains a valid SIGINT Address (SIGAD).

·         CONFIDENTIAL NOFORN--If it contains a valid TEMPEST zone in the building database.

·         CONFIDENTIAL--If it pinpoints a particular building and room as being an SCI accredited area.


 

CHAPTER 4

DODIIS SITE-BASED ACCREDITATION AND SYSTEM CERTIFICATION

4.1. (U) PURPOSE.  The DoDIIS Information Assurance Program has two components: The DoDIIS Systems Security Certification and Accreditation Process and the DoDIIS Site-Based Accreditation Methodology.  This applies to all systems that process, store, or communicate intelligence information under the purview of the Director, DIA. Note: This chapter does not apply to intelligence information systems under the cognizance of the Director, National Security Agency/Chief, Central Security Service (NSA/CSS). The DoDIIS Systems Security Certification and Accreditation (C&A) Process addresses information systems being developed or undergoing modification that are evaluated prior to being fielded to DoDIIS sites. The DoDIIS Security Certification and Accreditation Guide describes the process for determining the appropriate security requirements that the new or modified system must meet, provides information on the requisite security documentation needed to support system security certification, and outlines the process for testing and fielding systems within the DoDIIS community.  All Information Systems within DoDIIS will be tested and evaluated prior to achieving approval to operate or being granted formal certification and fielding to a DoDIIS site. The DoDIIS Site-Based Accreditation Methodology examines and establishes a baseline of all eligible information systems within a defined area, and designates this as a “Site”.  An Information System Security Manager (ISSM) is appointed by the Command authority for the site, and that individual, in coordination with the cognizant Certification Organization, manages all security related issues impacting the site's accredited baseline.  Details of the Site-Based Accreditation Process can be found in DIA Manual (DIAM) 50-4.

4.2. (U) SCOPE.  These procedures are effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

NO

DESIGN PHASE

NO

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

YES

4.3. (U) SYSTEM CERTIFICATION AND ACCREDITATION PROCEDURES:

4.3.1. (U) System Certification and Accreditation Compliance: The DoDIIS Security Certification and Accreditation Guide requires that all ISs be certified and accredited to ensure the IS meets the documented security requirements and that the security of the IS, as accredited, is maintained throughout its life cycle. The certification process validates that appropriate Levels-of-Concern for Integrity and Availability and an appropriate Protection Level have been selected for the IS from the descriptions in DCID 6/3 and the required safeguards have been implemented on the IS as described in the associated security documentation. The DoDIIS security certification and accreditation process has been harmonized with the DoD Information Technology Security Certification and Accreditation Process (DITSCAP).

4.3.2. (U) The System Certification and Accreditation Process:

4.3.2.1. (U) Phase 1.  Definition - Focuses on understanding the IS requirement, the environment in which the IS will operate, the users of the IS, the security requirements that apply to the IS, and the level of effort necessary to achieve accreditation. The objective of Phase 1 is to agree on the intended system mission, security requirements, C&A boundary, schedule, level of effort, and resources required for the certification effort.  This information is captured in the SSP/SSAA which is developed by the Program Manager.

4.3.2.2. (U) Phase 2.  Development and Verification - Focuses on the system development activity and ensures that the system complies with the security requirements and constraints previously agreed during definition phase. This includes Beta-I system testing.

4.3.2.3. (U) Phase 3.  Validation and Testing - Confirms compliance of the IS with the security requirements stated in the SSP/SSAA.  The objective of this phase is to produce the required evidence to support the DAA in making an informed decision whether or not to grant approval to operate the system with an acceptable level of residual security risk. This includes Beta-II system testing.

4.3.2.4. (U) Phase 4.  Post Accreditation - This phase starts after the system has been certified and accredited for operation.  The Post Accreditation phase includes several activities to ensure an acceptable level of residual security risk is preserved. These activities include security documentation, configuration management, compliance validation reviews, and monitoring any changes to the system environment and operations. Changes to the security configuration of the system will require security review by the DAA.

4.4. (U) SITE-BASED ACCREDITATION METHOLODOGY:

4.4.1. (U) Site-Based Accreditation Methodology Compliance: The DoDIIS Site-Based Accreditation Process uses management techniques to assess risk by establishing a security domain called a "DoDIIS Site".  This concept incorporates Site Security Management as a function of the DoDIIS Site's Configuration Management (CM) process.  A DoDIIS Site Security Baseline defining the systems infrastructure is required, and any changes to the baseline must be documented in a timely manner. Before a DoDIIS site can establish a Site Security Baseline and be accredited, all system(s) must go through the security C&A process.   The Site Security Baseline begins with the evaluation and accreditation of all individual ISs at the site. All ISs are then consolidated into this single management entity and evaluated as part of the security environment in which they operate.  Site-Based Accreditation examines the ability of the organization to maintain a secure site baseline and environment. The maturity of site security policies, procedures, configuration management, system integration management, and risk management determines the site's ability to successfully establish and control a secure baseline.  The certification process has a number of steps which, once successfully completed, will result in a Site Accreditation by the Director, Defense Intelligence Agency (DIRDIA), the Principal Accreditation Authority (PAA) for all DoDIIS Sites. DIAM 50-4 describes the step-by-step process to perform the Site-Based Accreditation and identifies documentation required to be maintained at the Site.   Under Site-Based accreditation, intelligence mission applications entering the site will have already been certified by the responsible DAA Rep/SCO. All other agency systems are considered “Guest” systems at the site and are approved to operate as long as the agency has provided the appropriate documentation (see Chapter 21).

4.4.2. (U) The Site-Based Accreditation Process. The Site-Based Accreditation process consists of the following:

4.4.2.1. (U) Initial Site Visit (Initial Site Certification Visit).   During this visit each site will be officially notified by the SCO that it was selected to undergo a Site-Based accreditation. A Certification Team will initiate the accreditation process by visiting the site. The purpose of this visit is to gather important baseline information.  This function may be incorporated or combined in the Site Accreditation and Site Security and Engineering Certification Testing and Evaluation.

4.4.2.2. (U) Site Evaluation Visit (Site Security and Engineering Certification Testing and Evaluation and Site Accreditation). This visit will normally be conducted within 60-90 days following the Initial Site Certification Visit; however if the site has its site documentation, baseline, and security posture in order, it may be performed during the initial visit. It will consist of system security certification testing and/or security documentation review on each system.

4.4.2.3. (U) Site Compliance Visit (Vulnerability Assessment and Compliance Verification).  This visit includes a vulnerability assessment of the networks, ISs, and linked operational elements.  Assessments may be performed remotely or onsite. In addition, this periodic visit by the DAA Rep/SCO ensures that the site properly maintains control of the site security baseline.  Vulnerability Assessment and Compliance Verification are normally conducted simultaneously as required. 

4.5. (U) CONTRACTOR ACCREDITATION. Contractor facilities will not be site-based.  Contractors should submit accreditation documentation in accordance with the National Industrial Security Program (NISP) Operating Manual (NISPOM). 

4.6. (U) ACCREDITATION REVIEW.   The ISSM is responsible for ensuring that the certification/recertification of each accredited IS is kept current based on the DoDIIS Security Certification and Accreditation Guide.  The accreditation security documentation package will be updated to reflect any undocumented changes and will be coordinated and forwarded to the appropriate SCO.

4.7. (U) MINIMUM SECURITY REQUIREMENTS. All DoDIIS systems and networks processing SCI shall be protected according to DCID 6/3 by the continuous employment of appropriate administrative, environmental, and technical security measures. These measures will provide individual accountability, access control, enforcement of least privilege, auditing, labeling, and data integrity.


 

CHAPTER 5

 

TEMPEST

 

5.1. (U) PURPOSE. Information Systems (ISs), peripherals, associated data communications, and networks which may be used to process national security or security‑related information may need to meet certain procurement and installation specifications as required by national TEMPEST policies and procedures applicable to the sensitivity level of the data being processed. This applies to all systems installed or planned.  The objective of this area of security control is to minimize the risk of Hostile Intelligence Services (HOIS) exploiting unintentional emanations from intelligence systems. TEMPEST is a short name referring to investigations and studies of compromising emanations.

5.2. (U) SCOPE. These procedures are effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

NO

DESIGN PHASE

YES

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

YES

5.3. (U) DEFINITIONS.  Certified TEMPEST Technical Authority (CTTA). An experienced, technically qualified U.S. Government employee who has met established certification requirements in accordance with National Security Telecommunications Information Systems Security Committee (NSTISSC)-approved criteria and has been appointed by a U.S. Government Department or Agency to fulfill CTTA responsibilities.

·         Compromising Emanations. Unintentional intelligence-bearing signals which if intercepted and analyzed disclose the national security information being transmitted, received, handled, or otherwise processed by any information processing equipment.

·         Inspectable Space. The three-dimensional space surrounding equipment that processes classified and/or sensitive information within which TEMPEST exploitation is not considered practical or where legal authority to identify and/or remove a potential TEMPEST exploitation exists.

·         Routine Changes.  Changes which have a minimal effect on the overall TEMPEST security of the Sensitive Compartmented Information (SCI) Facility (SCIF). Adding a different type of electronic information processing equipment (unless the equipment added is known to have an unusually large TEMPEST profile), movement of the equipment within the facility, and minor installation changes are examples of routine changes.

·         Security Environment Changes. Changes which have a detrimental effect on the facility.  Changes to the inspectable space, addition of a radio transmitter or a modem for external communications, removal or reduction of an existing TEMPEST countermeasure (Radio Frequency Interference [RFI] Shielding, Filters, Control/Inspectable space, etc.) would be changes to the security environment.

5.4. (U) TEMPEST COMPLIANCE.  All facilities processing SCI will be reviewed by a CTTA for initial TEMPEST accreditation and/or Inspectable Space according to National Security Telecommunications Information Systems Security Policy (NSTISSP) 300, National Policy on Control of Compromising Emanations, and National Security Telecommunications and Information Systems Instruction (NSTISSI) 7000, TEMPEST Countermeasures for Facilities.  The CTTA is authorized to make acceptable risk determinations for specific facilities when justified.

5.5. (U) ACCREDITATION:

5.5.1. (U) TEMPEST Countermeasures Review. A CTTA must conduct or validate all TEMPEST countermeasure reviews.  However, the requirement for a CTTA to conduct or validate such reviews does not imply the need to implement TEMPEST countermeasures.  The recommended countermeasures will be threat driven and based on risk management principles.  The inspectable space, as determined by a CTTA, will be the primary countermeasure.

 

 

 

5.5.2. (U) General Documentation.  The local SCI security official will complete documentation in accordance with local TEMPEST Manager requirements. The local TEMPEST Manager will submit documentation in accordance with (IAW) service directives.  A record of the TEMPEST security accreditation or inspectable space determination (ISD) will be retained within the SCIF.

5.5.3. (U) TEMPEST/ISD Accreditation. When an inspectable site houses multiple IS facilities and has a relatively protected and uniform TEMPEST security environment, the CTTA may grant a TEMPEST site accreditation or ISD for electronic processing of SCI.  Each SCIF within the inspectable site must be evaluated separately on its own merits and cannot be approved automatically by being inside an inspectable space. The accreditation/ISD could range from a building to a base/post if all space is inspectable. Compliance is reported within the SCIF Fixed Facility Checklist.

5.6.  (U) INSTALLATION REQUIREMENTS:

5.6.1. (U) All computer equipment and peripherals must meet the requirements of National Security Telecommunications Information Systems Security Advisory Memorandum (NSTISSAM) TEMPEST/1-92 and be installed IAW NSTISSAM TEMPEST/2-95, RED/BLACK separation criteria or as determined by a CTTA. The local TEMPEST Manager will oversee all such installations and coordinate on all accreditation documents resulting from the installation.

5.6.2. (U) Use all equipment as intended.  All TEMPEST access doors, covers, and plates must be closed and fastened. Unauthorized modifications, even for testing purposes, are strictly forbidden.

5.6.3. (U) Additional TEMPEST requirements may exist if the equipment is not TEMPEST approved. In such a case, your local TEMPEST Manager should be contacted for further guidance.

5.6.4. (U) The local TEMPEST Manager must inspect all equipment installations.

5.6.5. (U) Special prohibitions and installation requirements exist for all transmitters, modems, and other networking and communications devices or equipment. Because of the broad range of this category, coordinate all requests for these devices with your local TEMPEST Manager.

5.6.6. (U) Do not consider a RED IS for any network which has any direct connection to a BLACK IS or other communications medium such as administrative telephone lines except through an approved cryptographic device.

5.6.7. (U) Do not use acoustically coupled modems and transmitters or locate them in any secure area without specific written approval from your Designated Approving Authority (DAA).

5.6.8. (U) You may use nonacoustic wireline modems with stand-alone, dedicated BLACK ISs providing that all appropriate telephone security requirements are met, consult with your local TEMPEST Manager.


 

CHAPTER 6

 

MINIMUM SECURITY REQUIREMENTS FOR USERS

 

6.1. (U) PURPOSE.  The purpose of this chapter is to identify the minimum security requirements for a user of Information Systems. This chapter is designed so that it may be used as a general user reference for IS security training and awareness.

6.2. (U) SCOPE. Identifies the minimum security requirements for a general user necessary to operate an IS.  These requirements are effective in the following life cycle phases:

 

CONCEPTS DEVELOPMENT PHASE

YES

 

DESIGN PHASE

YES

 

DEVELOPMENT PHASE

YES

 

DEPLOYMENT PHASE

YES

 

OPERATIONS PHASE

YES

 

RECERTIFICATION PHASE

YES

 

DISPOSAL PHASE

YES

 

6.3. (U) MINIMUM SECURITY REQUIREMENTS. Users of ISs connected to networks shall use the system for official and appropriate use, only.  Appropriate personal use of an IS must be approved by the user's supervisor.

6.3.1. (U) Identification and Authentication Requirements. Individual accountability is required for all users of IS that process SCI information.  An IS user is identified through a unique User Identification (USERID) and a corresponding authenticator.   The uniqueness of the USERID facilitates auditing and access controls.  Group accounts (shared access through a single USERID) are prohibited unless a DAA approves this as an exception.  An authenticator may be something the user knows, something the user possesses, or some physical characteristic about the user. The most common authenticator is a password. Users will comply with the following requirements to access IS:

6.3.1.1. (U) Users are required to login to all systems with a USERID and password.

6.3.1.2. (U) Users are required to logout of all systems at the end of each workday or for an extended absence.

6.3.1.3. (U) Protect Information against unattended operation. Protect information against unattended operation by locking your screen with a password protected screen saver/screen lock if the terminal is left unattended for any period of time. All systems are required to have a 15 minute timeout which invokes your password protected screen saver/screen lock if your terminal is left unattended for at least 15 minutes.

6.3.2. (U) Password Requirements. The following policy will be used when issuing, controlling, and changing passwords:

6.3.2.1. (U) Passwords must be at least eight alphanumeric mixed characters long.

6.3.2.2. (U) Upon initial logon (first time ever logged on to a system) the password must be changed.

6.3.2.3. (U) Users shall not share their passwords with other users.

6.3.2.4. (U) Passwords should not be easily associated with an individual. Do not use words found in a dictionary. Do not use nicknames, spouse names, street names, vanity plate names, parts of the SSAN, telephone number, etc.

6.3.2.5. (U) All passwords must be protected at the same security classification as the accreditation level of the IS.

6.3.2.6. (U) A password must be changed if it has been compromised or has been in use for six months or less. A user account will be deactivated when that account is idle for an extended period (recommend 60 days) or when the user departs for temporary duty for an extended period, is permanently transferred, has a change in need to know status or loses security clearance.

6.3.2.7. (U) Never write down passwords; destroy the original password documentation following initial review.  Never type passwords onto an IS when being observed by other people.

6.3.2.8. (U) The following guidelines should be used when selecting a password:

 

DO:

·         Include both upper and lower case characters.

·         Include digits and punctuation marks.

·         Include something which can be remembered without writing it down.

·         Include combined words and characters (e.g. robot4my, eye-con).

·         Consider special-acronyms (e.g. Notf#swvw - None of this fancy # stuff works very well; or A4PEGCED - All 4 Programmers Eat Green Cheese Every Day).

DO NOT:

·         Use any form of your logon name (e.g. initials).

·         Use first, middle, last or maiden names.

·         Use the name of a spouse, child, girl/boy friend.

·         Use anything publicly available about you (e.g. address, car license plate number, car make, SSAN, etc.).

·         Use all the same type of characters (e.g. 123245678, AAAAAAAA, etc.).

·         Use a single word from a dictionary.

·         Use substitution of characters by switching ones (1) for "ells" (l) or zeros (0) for "ohs" (o).

·         Use names or characters from fantasy and science fiction stories (Quagmire, etc.).

6.3.3. (U) IS Warning Banner. All systems are required to display a logon warning banner. When the user logs on to a system, the user agrees to accept the conditions of the warning.

6.3.3.1. (U) A logon warning banner is required on all networked and standalone DoD interest computer systems (Government and contractor). The warning banner must be displayed before a successful logon and should include an option that allows the user to halt the logon process and a keystroke to continue processing. The intent of the banner is to confirm to the user that all data contained on DoD interest computer systems is subject to review by law enforcement authorities, DoD security personnel, and/or System Administrator, IAW Chapter 9. The banner is designed to inform all users, prior to accessing a DoD system, that by logging in they expressly consent to authorized monitoring.

6.3.3.2. (U) ISs supporting DoD operations have very specific warning banner requirements, and must include, at a minimum, the information shown in Figure 9.1.

6.3.3.3. (U) Whenever system administration personnel suspect that a system is being inappropriately used, either by authorized or unauthorized personnel, or some improper activity is being conducted, the matter will be reported immediately to the Information Systems Security Manager (ISSM).

6.3.4. (U) Configuration Requirements. The following policy will be used for the Configuration Management of all systems.

6.3.4.1. (U) Modifying, relocating, or reconfiguring the hardware of any computer system must be approved by the Configuration Control Board (CCB) or the Configuration Management Board (CMB) for your site. Hardware will not be connected to any system/network without the express written consent of the ISSM and the CMB/CCB. Examples of unauthorized hardware are: LAPTOP computers, PDA's, external peripherals, etc.

6.3.4.2. (U) Modifying, installing, or downloading of any software on any computer system may affect system accreditation and must be evaluated and approved by the ISSM with the local CMB/CCB.

6.3.4.2.1. (U) Authorized Software. Software that may be authorized includes that which has been:

·         Provided officially by another U.S. Government Agency that has equivalent standards.

·         Provided under contract to organizations involved with the processing of SCI and related intelligence information.

·         Developed within a Government-approved facility.

·         Provided through appropriate procurement channels, i.e. Commercial Off-the-Shelf (COTS) software.

·         Distributed through official channels.

·         Acquired from a reputable vendor for official use or evaluation (i.e. maintenance diagnostic software).

6.3.4.2.2. (U) Unauthorized Software.  Types of software that are not authorized include:

·         Games (See paragraph 11.6.).

·         Public domain software or "shareware" which have been obtained from unofficial channels.

·         Software applications that have been developed outside Government approved facilities, such as those developed on personally owned computers at home or software acquired via non-U.S. Government "bulletin boards".

·         Personally owned software (either purchased or gratuitously acquired).

·         Software purchased using employee funds (from an activity such as a coffee fund).

·         Software from unknown sources.

·         Illegally copied software in violation of copyright rules.

·         Music and video or multimedia compact disks, not procured through official Government channels.

6.3.5. (U) Malicious Code Detection. Users of IS play a very important role in the prevention of malicious codes.  For details, see Chapter 10.   To actively participate in the prevention of malicious codes on an IS, users must be made aware of, and comply with, basic security requirements. Warnings and advisories frequently provide guidance on preventing infection from malicious code or viruses -- obey these. If a malicious code is detected or a presence of malicious code is suspected on any SCI IS, immediately report it to the ISSM for further instruction in accordance with Chapter 8. Do nothing that might cause the further spread of the malicious code.

6.3.6. (U) Virus Scanning Requirements. The user is responsible for ensuring that the following procedures are followed to minimize the risk of viruses:

·         Use automated scanning applications, e.g., virus scanning, which will monitor media upon introduction to a system and data being transferred into the IS. If the media cannot be scanned then it is considered high risk and cannot be used on any SCI system without approval from the Service Certifying Organization (SCO).

·         Check and review the IS operating environment for the presence of malicious code on a frequent basis.

·         Avoid hostile mobile code through use of only authorized/verified and registered mobile code.

·         Will not knowingly or willfully introduce malicious code into systems.

·         Will not import or use unauthorized data, media, software, firmware, or hardware on systems.

·         Will conduct screening of all incoming data (e.g., E-Mail and attachments) if this process is not automated.

·         Will not use personal-owned media (e.g., music, video, or multimedia compact disks) in Government-owned IS.

·         Will immediately report all security incidents and potential threats and vulnerabilities involving malicious code on ISs to the ISSM.

Note: Controlled Interfaces with malicious code scanning capability does not relieve the management of the receiving IS from the responsibility of also checking for malicious code.

6.3.7. (U) Information Storage Media. Removable information storage media and devices used with an Information System (IS) shall have external labels clearly indicating the classification of the information and applicable associated markings (e.g., digraphs, trigraphs). Examples include magnetic tape reels, cartridges, cassettes; removable discs, disc cartridges, disc packs, diskettes, magnetic cards and electro-optical (e.g., CD) media. Labeling exemption for operational security (OPSEC) requirements may be granted within local policy with DAA/DAA Rep/SCO concurrence.   All removable information storage media and devices will be marked with the appropriate Standard Form (SF) 700-series classification and descriptor labels.  These are:

·         SF 706, Top Secret Label (Collateral only)

·         SF 707, Secret Label (Collateral only)

·         SF 708, Confidential Label (Collateral only)

·         SF 710, Unclassified Label

·         SF 711, Data Descriptor (On all magnetic media)

·         SF 712, Classified SCI Label (All classification levels)

6.3.7.1. (U) Label Placement. See the Federal Register 2003 and applicable military department regulations for exact placement procedures. Labels will be affixed to all media in a manner that does not adversely affect operation of the equipment in which the media is used. Labels may be trimmed to fit the media. Labels for Compact Disks (CDs) must NOT be placed on the CD itself, but on the CD container or envelope. Record the accounting number in the "Control” block of the SF 711 and write the same number on the CD with a Paint-pen, CD labelmaker or permanent marker. The number should not interfere with the operation of the CD.  Notice: Do not use pens that contain toluene.

6.3.7.2. (U) Data Descriptor Label. The SF 711, Data Descriptor Label, is used to identify the content of a specific media to include unclassified, collateral‑classified, and Sensitive Compartmented Information (SCI). An SF 711 is not required if the disk bears the following information: Organization, office symbol, classification, and media sequence number (if locally required).  The user fills in the "Classification”, "Dissem”, "Control”, and "Compartments/Codewords" blocks as appropriate.

6.3.7.3. (U) Classification Markings. All documents residing or processed on information storage media/ISs will be marked in accordance with Director of Central Intelligence (DCI) Directive (DCID) 6/3, Sensitive Compartmented Information Administrative Security Manual, or appropriate Service regulations.

6.3.7.4. (U) Control and Accounting of Media. For any system that operates with PL-3 or lower functionality, media which is not write-protected and is placed into that system must be classified at the highest level of information on the system until reviewed and validated.  Media accountability will be based on the determined classification level of the media.

6.3.7.4.1. (U) Information Storage Media Control. In addition to the labeling of information storage media according to Chapter 13, there is a requirement to control and account for certain information storage media within functional categories. The organization Commander/CO/SIO is responsible for development of a unit-level Standard Operating Procedure (SOP) for control and accountability of media.

6.3.7.4.2. (U) Inspections.  The organization must be able to demonstrate positive control and accounting of information storage media according to its SOP when reviewed by inspection authorities.

6.3.7.4.3. (U) Control Procedures. Control of information storage media should begin upon introduction into the organization according to the SOP.

6.3.7.4.3.1. (U) Information storage media accountability is required for Top Secret BRAVO and permanent Collateral Top Secret files.

6.3.7.4.3.2. (U) Information storage accountability as a security protection measure is eliminated for collateral classified information (to include Top Secret non-permanent files), all classification levels of Special Intelligence (SI) (to include GAMMA and ENDSEAL), Talent-Keyhole (TK), and BRAVO material below Top Secret.

6.3.7.4.3.3. (U) Requirements for controls of specific Special Access Program (SAP) information will be defined by the respective Program Manager.

6.3.7.4.4. (U) Other Categories of Storage media. The following major categories of information storage media should be considered for accountability control in compliance with copyright and licensing with procedures documented in the SOP:

·         Commercial Off-The-Shelf (COTS) and vendor software.

·         Government developed software.

·         Other organization unique software and data.

6.3.8. (U) Hardware Labeling Requirements. Labels will be displayed on all components of an IS, including input/output devices that have the potential for retaining information, terminals, standalone microprocessors, and word processors used as terminals, bear conspicuous external labels stating the highest classification level and most restrictive classification category of the information accessible to the components in the IS. The labels should be the standard form (SF) 700 series media classification labels or equivalent. The labeling may consist of permanent markings on the component or a sign placed on the terminal.

6.3.9. (U) Security Training Requirements. An integral part of the IS security program is the mandatory training required by public law. Users shall receive initial training on prescribed IS security restrictions and safeguards prior to accessing corporate IS assets. General users require system security training to safeguard systems and information on those systems/networks. As a follow-up to this initial training, users must be provided, and actively participate in an ongoing security education, training, and awareness program which will keep them cognizant of system changes and associated security requirements as they occur. General users training will include but is not  limited to the following:

·         An awareness of system threats, vulnerabilities, risks, system data, and access controls associated with the IS being used.

·         How to protect the physical area, media, and equipment (e.g., locking doors, care of diskettes).

·         How to protect authenticators and operate the applicable system security features (e.g., setting access control rights to files created by user).

·         How to recognize and report security violations and incidents, see Chapter 8.

6.3.9.1. (U) Security Awareness and Training Program.  The key to protecting Information Systems (ISs) & Networks and the information they process is the development of an effective Security, Education, Training and Awareness Program. The program is intended to provide two levels of knowledge:

6.3.9.1.1. (U) Awareness Level. Creates a sensitivity to the threats and vulnerabilities of national security information systems, and a recognition of the need to protect data, information and the means of processing them; and builds a working knowledge of principles and practices in IA.  Awareness level training will be conducted when:

·         In-processing.  Site specific information will be briefed based on the mission and the requirement of the job responsibility.

·         Receipt of USERID and Password.  Privilege User/ISSO will brief the user on his/her responsibilities.

·         Annual Awareness Refresher Training.  Classroom, Briefings, Computer Based Training, or Seminars will be used and documented to ensure all users comply with this requirement.

6.3.9.1.2. (U) Performance Level. Provides the employee with the skill or ability to design, execute, or evaluate agency IA security procedures and practices. This level of understanding will ensure that employees are able to apply security concepts while performing their tasks.

6.3.10. (U) Destruction of Media.  When destruction of information storage media is required, it must be accomplished in accordance with approved procedures and the organization's media accounting system must be updated to reflect this change. See Chapter 20, Paragraph 20.4.5. Destroying Media, for additional guidance.

6.3.10.1. (U) Destruction certificates are required for accountable material and will be retained as a permanent record. 

6.3.10.2. (U) Non-accountable material no longer requires destruction certificates.

6.3.11. (U) Information Transfer and Accounting Procedures.  Users should be knowledgeable of procedures for the transfer of information or software among Information Systems (ISs) of different classification levels using information storage media. The procedures are intended to protect the confidentiality of information on the media as well as other data on the end-point IS at different levels, prevent transfers of malicious code (Chapter 10 is germane), and prevent violation of legal copyright or license rights. For any system that operates with PL-3 and below functionality, media which is placed into that system must be classified at the highest level of information on the system until reviewed and validated. See Chapter 18.

 


 

CHAPTER 7

SECURITY GUIDELINES FOR THE PRIVILEGED AND GENERAL USER

7.1. (U) PURPOSE.  The Privileged User is assigned by management personnel (at NSA/CSS the Office of Security approves Privileged Users) and is the single point of contact for the administration of a specifically defined Information System (IS).  The privileged user is responsible for maintaining the IS throughout day-to-day operations, ensuring that the system operates within established accreditation criteria, and keeping the system in an operational mode for general users.  System administration personnel are the primary interface between the users of an IS and the organization's Information Systems Security (ISS) management personnel. This chapter provides the privileged user with the security guidance and procedures necessary to implement an effective System Administration program.

7.2. (U) SCOPE.  These procedures are effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

NO

DESIGN PHASE

YES

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

YES

7.3. (U) SECURITY TRAINING. The individual assigned the responsibility for IS administration must be knowledgeable in the basic security concepts and procedures necessary to effectively monitor IS activity and the environment in which it operates.  To satisfy these requirements, General users require different training than those employees with specialized responsibilities:

7.3.1. (U) General Users training. General users training will include but is not limited to the following:

7.3.1.1. (U) How to protect the physical area, media, and equipment (e.g., locking doors, care of diskettes).

7.3.1.2. (U) How to protect authenticators and operate the applicable system security features (e.g., setting access control rights to files created by user).

7.3.1.3. (U) How to recognize and report security violations and incidents.

7.3.1.4. (U) The organization's policy for protecting information and systems.

7.3.2. (U) Privileged Users training. Privileged users training will include but is not limited to the following:

7.3.2.1. (U) How to protect the physical area, media, and equipment (e.g. locking doors, care of diskettes, etc.)

7.3.2.2. (U) Understand security consequences and costs so that security can be factored into their decisions.

7.3.2.3. (U) Have a thorough understanding of the organization's policy for protecting information and systems, and the roles and responsibilities of various organizational units with which they may have to interact.

7.3.2.4. (U) Have a thorough understanding of system security regulations and policies.

7.3.2.5. (U) Be aware of what constitutes misuse or abuse of system privileges.

7.3.2.6. (U) Have an understanding of how to protect passwords, or other authentication devices, and be familiar with operating system security features of the system.

7.3.2.7. (U) Know how to recognize and report potential security vulnerabilities, threats, security violations, or incidents.

7.3.2.8. (U) Understand how to implement and use specific access control products.

7.3.2.9. (U) Have an understanding of how to protect the media and equipment (e.g. system maintenance and backup, care of diskettes).

7.3.2.10. (U) How to protect authenticators and operate the applicable system security features.

7.3.3. (U) Security Awareness and Training Program.  The key to protecting Information Systems (ISs) & Networks and the information they process is the development of an effective Security, Education, Training and Awareness Program. The program is intended to provide two levels of knowledge:

7.3.3.1 (U) Awareness Level. Creates a sensitivity to the threats and vulnerabilities of national security information systems, and a recognition of the need to protect data, information and the means of processing them; and builds a working knowledge of principles and practices in IA. Awareness level training will be conducted when:

·         Inprocessing.  Site specific information will be briefed based on the mission and the requirement of the job responsibility.

·         Receipt of USERID and Password. Privilege User/ISSO will brief the user on his/her responsibilities.

·         Annual Awareness Refresher Training. Classroom, Briefings, Computer Based Training, or Seminars will be used and documented to ensure all users comply with this requirement.

7.3.3.2. (U) Performance Level. Provides the employee with the skill or ability to design, execute, or evaluate agency IA security procedures and practices. This level of understanding will ensure that employees are able to apply security concepts while performing their tasks.

7.4. (U) PROCEDURES. Sensitive Compartmented Information (SCI) IA doctrine requires many security relevant actions to properly implement a secure environment to protect national interest information. The following procedures outline several items that apply to all SCI ISs and must be given full consideration by system administration personnel.

7.4.1. (U) Identification and Authentication Requirements. User Identification (USERIDs) are used for identification of a specific user on the IS to facilitate auditing. Group accounts are generally prohibited; exceptions to this policy shall be approved by the Designated Approving Authority (DAA)/Service Certifying Organization (SCO). Passwords (as authenticators) are used to provide an access path for authorized users while denying access to the unauthorized user. Use the following procedures to generate, issue and control USERIDs and passwords:

7.4.1.1. (U) Documenting USERIDs and Passwords. USERIDs and passwords are issued to personnel requiring access to information via a particular IS, but only if the proposed user has the same clearance level of that information and the required need-to-know.  To document the issuing of USERIDs and passwords use a National Security Agency/Central Security Service (NSA/CSS) Form G6521, Access Request and Verification, (National Stock Number [NSN] 7540-FM-001-3448), or similar form. See Figure 7.1.

NOTE:  Do Not include any assigned passwords on the roster. The SA may actually perform these duties for the ISSM, however, the ISSM still maintains responsibility.


7.4.1.2. (U) USERID and Password Issuing Authority and Accountability.  The Information Systems Security Manager (ISSM), or designee, is the official authorized to issue the initial USERID and password to each user of the system.  The ISSM/designee will maintain a current user account roster for each system for which they are responsible, to include the names of authorized maintenance personnel. The roster will contain, at a minimum, each user's:

·         Full name, grade or rank, and Social Security Account Number (SSAN).

·         Organization, office symbol, and telephone number.

·         USERID.

7.4.1.3. (U) Supervisor Authorization. Obtaining supervisor approval for each individual requiring IS access.  The privileged user must ensure that all individual access authorizations are valid, need-to-know is established and access is work-related.

7.4.1.4. (U) Access Requirements Validation. The privileged user will provide each functional area within the organization with a current general user roster (for that functional area only) and require that the supervisor validate all access requirements annually at a minimum.  The annual validation process will be documented.

7.4.2. (U) Control Guidelines. Use the sample form in this chapter, or similar Access Request and Verification form, to request access, validate clearances and need-to-know, issue USERID and passwords, and control the removal of personnel from ISs when access is no longer authorized.

7.4.2.1. (U) The form may be classified based on the information contained therein. It is the responsibility of the individual's supervisor to ensure that all copies of the form are appropriately classified.

7.4.2.2. (U) Never enter the assigned password of an individual on the form used to establish a user's account.  The issuing ISSM/SA will distribute the initial password in a secure manner. The requesting individual must authenticate on the form that a password has been received, and the signed form must be returned to the ISSM/SA before activation of the account. The form will be retained by the ISSM/SA for a minimum of one year after access is removed.

7.4.3. (U) System Access Removal Procedures. Access removals from an IS must be accomplished using a form similar to the Figure 7.1 Access Request and Verification form. If the Commander/Commanding Officer, or designee, determines an individual's access to a system or database should be terminated, the Commander/Commanding Officer, or designee, will sign the removal document.

7.4.4. (U) Audit Trail Requirements. An audit trail capability must exist to obtain formal accreditation of an IS.  The audit trail should be automated, and provide permanent on-line or off-line storage of audit data separate from data files.

7.4.4.1. (U) Automated Audit Trail Information Requirements.  ISs approved for classified processing should contain, at a minimum, the following audit trail records:

·         Login/logout (unsuccessful and successful).

·         Auditing of successful login and logout events is key to individual accountability.  Unsuccessful login attempts may be evidence of attempted penetration attacks. Logins and logouts shall be audited by the underlying operating system.  In addition, the syslog mechanism may be used to notify an ISSM/SA of an unsuccessful login attempt.

·         Audit data should include date, time, USERID, system ID, workstation ID, and indication of success or failure.

·         Use of privileged commands (unsuccessful and successful).

·         Privileged commands are commands not required for general use, such as those that manage security-relevant data and those that manage an application. In UNIX workstations, these commands include, for example, the SU command, which is used to become the root user. The UNIX root user has access to all information stored on the system.  Such commands must be accessible only to persons whose responsibilities require their use.

·         The ISSM/SA shall select the privileged commands (i.e., commands normally executed by the root user) to be audited.  This event can be audited via the underlying operating system or application audit.

·         Audit data should include date, time, USERID, command, security-relevant command parameters, and indication of success or failure.

·         Application and session initiation (unsuccessful and successful).

·         The use of application programs and the initiation of communications sessions with local or remote hosts are audited to provide the ISSM/SA a general history of a user's actions.  An unsuccessful attempt to use an application or initiate a host session may indicate a user attempting to exceed his or her access authorizations.  This event should be audited via application audit.

·         Audit data should include date, time, USERID, workstation ID, application ID, and indication of success or failure.

·         Use of print command (unsuccessful and successful).

·         The printing of classified and sensitive unclassified information is audited to maintain accountability for these materials.  Print commands and the identity of the printed material should be audited via application audit.

·         Audit data should include date, time, USERID, and destination.

·         Discretionary Access Control (DAC) permission modification (unsuccessful and successful).

·         The changing of DAC permissions on files or directories should be audited since it could result in violations of need-to-know.  This event can be audited via the underlying operating system and/or application audit.

·         Audit data should include date, time, user (requester) ID, user/group ID (to whom change applies), object ID, permissions requested, and indication of success or failure.

·         Export to media (successful).

·         The copying of files to removable media should be audited to maintain accountability of classified materials.  Removable storage media have large capacity and could potentially disclose large amounts of information.  This event can be audited via the underlying operating system and/or application audit.

·         Audit data should include date, time, USERID, source and destination file IDs, system ID, and device ID.

·         Unauthorized access attempts to files (unsuccessful).

·         An attempt to access files in violation of DAC permissions could indicate user browsing and must be audited.  This event can be audited via the underlying operating system and/or application audit.

·         Audit data should include date, time, USERID, system ID, and file ID.

·         System startup/shutdown.

·         System startup and shutdown shall be monitored and be auditable. This event should be audited by the operating system.

·         Audit data should include date, time, USERID, system ID, and device ID.

7.4.4.2. (U) Manual Audit Trail Implementation. If Automated Audit Trails are not supported, the ISSM/SA must obtain approval from the ISSPM/SCO to conduct manual audits. At a minimum, manual audits will include:

·         The date.

·         Identification of the user.

·         Time the user logs on and off the system.

·         Function(s) performed.

7.4.4.3. (U) Products of Audit Trail Information. Audit trail products should be handled as follows:

7.4.4.3.1. (U) Classify and protect audit trail information according to the security classification level of information contained in the audit.

7.4.4.3.2. (U) If hardcopy audit trail products are generated on an IS, print them on continuous paper whenever possible.  If continuous paper is not used, all pages will be numbered with a sequence number on each printed line.  This is required to protect the integrity of the audit trail data.

7.4.4.3.3. (U) Where possible, to reduce workload, generate summary reports which reflect system abnormalities, who performed what function, and to what database, rather than listing the entire audit trail.

7.4.4.4. (U) Audit Trail Checks and Reviews. The ISSO/SA will review the audit trail logs (manual and automated), or summary reports, to verify that all pertinent activity is properly recorded and appropriate action has been taken to correct and report any identified problems.  Paragraphs 7.4.4.1 and 7.4.4.2 list audit trail requirements. Audit trail logs or summary reports shall be reviewed weekly, at a minimum, or as directed by the ISSM.

7.4.4.5. (U) Audit Trail Records Retention. Retain Audit Trail records for five years and review at least weekly.

7.4.5. (U) Automatic Log Out Requirements. The privileged user should implement an automatic logout from the IS when the user leaves his/her terminal for an extended period of time. This should not be considered a substitute for logging out (unless a mechanism actually logs out the user when the user idle time is exceeded).  

7.4.6. (U) Limited Access Attempts. An IS will be configured to limit the number of consecutive failed access attempts to no more than five; three is recommended.

7.4.7. (U) Use of Windows Screen Locks. Screen locks are mandatory, and require a password for reentry into the system.  If an IS is idle for 15 minutes, the screen lock shall be activated. Screen locks are not authorized in lieu of log-off procedures.  Operations may require exceptions which must be approved by the ISSPM/SCO.

7.4.8. (U) Testing, Straining, and Hacking. SCI IA policy states that testing, straining, hacking, or otherwise attempting to defeat or circumvent the security measures of an operational IS or network is prohibited without authorization. The privileged user must ensure that submitting a request through the ISSM to the DAA Rep/SCO approves such activities.  All such approvals must be in writing and limited to an explicit assessment.

7.4.9. (U) Warning Banners. A logon warning banner is required on all networked and standalone Department of Defense (DoD) computer systems (Government and contractor).  The warning banner must be displayed and acknowledged before a successful logon. Refer to Chapter 9 for complete instructions on the implementation of warning banners.

7.4.10. (U) Network Monitoring:

7.4.10.1. (U) Maintenance Monitoring.  Privileged users/network technicians may use Local Area Network (LAN) analyzers or “sniffers” to monitor network traffic provided:

·         Reasonable notice has been provided to all users by display of the warning banners (Paragraph 7.5.10).

·         The base or post has been certified for monitoring by the Service General Counsel (if required by the appropriate Service).

·         The sniffer or monitor does not intercept any traffic from outside the military base or post.

·         The privileged user has received approval from the DAA Rep/SCO (or NSA/CSS SISSPM) to monitor in the normal course of his or her employment while engaged in activity necessary incident to the rendition of his or her service or to the protection of the rights or property of the communications network (the provider of the network service) except that this monitoring is only permitted for service or mechanical quality control checks.

7.4.10.1.1. (U) Network traffic monitoring may not last longer than is necessary to observe transmission quality.

7.4.10.1.2. (U) No permanent recording of the network monitoring activity may be made.

7.4.10.1.3. (U) Monitoring traffic on civilian networks is strictly prohibited and may result in criminal and civil liability under the Computer Fraud and Abuse Act, 18 U.S. Code section 1030 and the Electronic Communications Privacy Act, 18 U.S. Code Section 2510 and following.

7.4.10.2. (U) Targeted Monitoring.  Unauthorized targeted monitoring of a particular individual, machine or group is prohibited.  When service quality or transmission quality monitoring reveals suspicious activity, including hacking or misuse, monitoring must cease and appropriate officials informed.  At a minimum, notify the Commander/Commanding Officer, or his/her designated representative, and the ISSM.  Privileged users may, of course, always terminate any connection at any time when the safety or property of the network is endangered. privileged users shall cooperate with law enforcement and security officials in accordance with applicable Service guidelines. Notify the DAA Rep/SCO of any planned targeted monitoring (see 9.3.3.).


 

CHAPTER 8

INFORMATION SYSTEMS (IS) INCIDENT REPORTING

8.1. (U) PURPOSE.  Incidents may result from accidental or deliberate actions on the part of a user or occur outside of the organization as well. An accidental incident should be handled administratively.  Evidence of criminal activity from a deliberate action should be treated with care, and maintained under the purview of cognizant law enforcement personnel (see Chapter 9 “Information System Monitoring Activities” for specific guidance). All management personnel must ensure that IS users are aware of the policy governing unauthorized use of computer resources. When it is suspected that an IS has been penetrated, or at any time system security is not maintained, it must be reported both within the organization and to the appropriate external authorities for action. Any use for other than authorized purposes violates security policy, and may result in disciplinary action under the Uniform Code of Military Justice (UCMJ) and/or other administrative directives.  This chapter provides procedures for formal incident reporting.

8.2. (U) SCOPE.  These procedures are effective in the following life-cycle phases:

CONCEPTS DEVELOPMENT PHASE

NO

DESIGN PHASE

NO

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

YES

 

8.3. (U) PROCEDURES.    Discovery of a viral infection, introduction of malicious code, hacker activity, system vulnerabilities, or any unusual happenings will be reported immediately to the ISSM and an investigation initiated.  Accidental incidents (for example, a one time brief Web site visit containing inappropriate content or inappropriate or vulgar usage of mission systems chat features) or other minor infractions can be handled administratively within the unit.  Make every effort to contact the data owner to obtain specific guidance to afford minimum acceptable protection in cases of spillage and compromise.  

8.3.1. (U) Reporting Process.  Using the ISSM/ISSO or SA as appropriate, the Commander/Commanding Officer must report all abnormal security events to the proper authority.  Incident reporting should be accomplished by each service through their appropriate ISSM or security channel, such as the Service Certifying Organization (SCO). IA computer security reporting should be done in conjunction with (but not exclusive of) the physical security reporting chain.  The ISSM should work closely with the physical security manager to resolve these incidents.

8.3.2. (U) Types of IS Incidents and Reports.  The following are examples of incidents that must be reported:

·         Compromise or Probable Compromise. Examples of these are: Missing accountable media; human error in reviewing media for content and classification, resulting in compromise; and incorrect setting of a security filter, resulting in compromise.

·         Spillage.  Information of a higher classification or restrictive in nature intentionally or inadvertently placed on machines or networks of lower or less restrictive policy.

·         External Hacker Activity. Activity where a hacker is operating from an outside location by using some network and he/she is not physically resident at the location where the activity is being observed.

·         Internal Hacker Activity. Activity where a hacker is operating from within the site where the activity is being observed.  Caution: if the hacker is suspected of monitoring the Automatic Digital Network (AUTODIN)/Defense Message Messaging System (DMS) message traffic, do not use AUTODIN/DMS to send the report.  Instead, send the report by facsimile to the required addressees, followed up by a phone call to confirm receipt of the report.

·         Malicious Code.  Any potentially hazardous or destructive computer code other than a virus, such as a logic bomb, worm or TROJAN horse. NOTE: malicious code will probably also represent a vulnerability, as described below.

·         Unauthorized Monitoring. Any individual or group of individuals found to be monitoring an IS without written authority from security officials.

·         Virus Actual infection. A known active attack or presence on an IS where the virus has executed on that system.

·         Vulnerability.  Any detected lack of protection which may render the system vulnerable to security breaches.  Examples are: failure, or potential failure, of a system or network security feature; the discovery of any computer code, such as a trapdoor, which was originally coded into the operating system by the software vendor; or code added by software maintenance personnel, that provides an undocumented entry/exit capability into the system by unauthorized personnel.

8.3.3. (U) Reporting Incidents. Incidents in progress are classified a minimum of CONFIDENTIAL in accordance with NSA/CSS Classification Guide 75-98 or DoD 5105.21-M-1.   The cognizant intelligence agency (DIA or NSA) should be notified by electrical message (AUTODIN) or E-Mail as soon as the unit has knowledge of an incident or specifics.  The notification should contain the information in paragraph 8.3.4. (see Figure 8.1 for an example of an AUTODIN message).  Initial/interim reporting should begin as soon as possible after knowledge of the incident, but should continue until the incident is resolved. You may also communicate to the agencies by secure telephone, or use the Web-based forms on the DIA or NSA web sites. Remember to include information copies of the report to the DAA Rep/SCO and chain of command (for example, AIA, INSCOM, SSO NAVY, CNSG).  Complete the report according to the format in paragraph 8.3.4 below and send to the appropriate Service addressees. SCEs will report to the Security Health Officer (SHO) desk in the NSA/CSS IS Incident Response Team (NISIRT), phone: DSN 644-6988/Commercial (301) 688-6988. DoDIIS sites will report to the DIA ADP Command Center, phone: DSN 428-8000/Commercial (202) 231-8000. For guest systems, reporting should be to both the cognizant SCIF authority and the guest system DAA Rep/SCO. Do not report as incidents, users playing games on the systems, or fraud waste and abuse issues, unless they constitute a threat to the security of a system. This type of incident should be reported and dealt with by the unit's chain of command.

8.3.4. (U) Report Format and Content.  When reporting incidents, include the following information in the body of the message (as shown in sample message, Figure 8.1):

·         Type of Incident. Enter the type of incident report directly from paragraph 8.3.2 above.  If there is any doubt when choosing the “type” of incident, identify the incident as both (or multiple) types in the same message.  Selecting the most appropriate incident type is not nearly as important as reporting the incident.

·         Date and Time the Incident Occurred. Enter the date and time that the occurrence was first detected.

·         Name and Classification of the Subject IS.  Enter the name of the system identified in the accreditation documentation, a current description of the hardware and software on the system, and the highest classification of information processed.

·         Description of the Incident. Clearly describe the incident in detail.

·         Impact of the Incident on Organization Operations.  This is usually stated in terms of "denial of service", such as having to isolate the IS from a network, thereby closing down operations, etc. Include the number of hours of system downtime and how many man-hours needed to correct the problem.

·         Impact of the Incident on National Security. Per DoD 5105.21-M-1, when classified information has been released to unauthorized persons, you must treat the incident as a security violation.  List the name of the SCI security official to whom you have reported the incident.

·         Man-hours involved in recovery, cleanup, etc.  This provides an accurate metric to track incident recovery man-hours and resources involved. Tracking can include cost estimates related to the hours/wage grade spent.

·         Point Of Contact (POC). Enter the name, rank, organization, office, and telephone number of the person to be contacted on all subsequent actions concerning this incident.


 

R 211234Z FEB 01

FM YOUR UNIT//OFFICE//

TO SSO DIA//SYS-4/DAC-3D//

NSACSS//SHO/L1//

INFO CHAIN OF COMMAND

SCO//OFFICE//

ZEM

C O N F I D E N T I A L

QQQQ

SUBJECT: INCIDENT REPORT ICW JDCSISSS, CHAPTER 8

1.  TYPE OF INCIDENT: (VIRUS, MALICIOUS CODE, DATA COMPROMISE, SUSPECTED PROBLEM)

2.  DATE/TIME INCIDENT OCCURRED

3.  NAME AND CLASSIFICATION OF VICTIMIZED SYSTEM

4.  DESCRIPTION OF INCIDENT: (AS MUCH DETAIL AS NECESSARY TO ADEQUATELY DESCRIBE THE PROBLEM)

5.  IMPACT OF INCIDENT ON ORGANIZATION OPERATIONS (USUALLY STATED IN TERMS OF DENIAL OF SERVICE, DOWN TIME OR MISSION IMPACT)

6.  IMPACT OF THE INCIDENT ON NATIONAL SECURITY (USUALLY STATED IN TERMS OF DATA OWNER'S ASSESSMENT OF LEVEL OF CLASSIFIED INFORMATION AND COMPROMISE PROBABILITY)

7. MAN-HOURS REQUIRED TO COMPLETE RECOVERY

8. ACTIONS TAKEN TO RECOVER

9. REPORTING UNIT POC (NAME, RANK, ORG/OFFICE, PHONE NUMBERS, E-MAIL ADDRESS)

NNNN

Figure 8.1 (U) Sample Incident Report Message

8.3.5. (U) Follow-On Action.  Units will continue to report until the incident is closed. Virus infections that are corrected should be reported as “closed”, unless further actions are being taken, or reinfection has occurred.  Follow-on actions will be determined by the HQ-level action addressees and Data Owners. Appropriate PAA/designee will determine course of action for incident cleanup in a near real-time manner. Once an incident has been resolved (i.e., closed), the incident may be treated as FOUO.  The Designated Approving Authority (DAA) Representative (Rep)/SCO will coordinate with the Defense Intelligence Agency (DIA) or National Security Agency/Central Security Service (NSA/CSS) Information Systems Incident Response Team (NISIRT) to ensure that the concerns of the latter are addressed.  If an activity from another command or agency is involved, the HQ-level action addressees will provide proper notification to the same.

 


 

CHAPTER 9

INFORMATION SYSTEM (IS) MONITORING ACTIVITIES

9.1. (U) PURPOSE.  This chapter provides guidance on the DOs and DON'Ts of IS monitoring and applies to all computer systems and networks. All U.S. Government systems must be protected from everything from exploitation by adversaries to intrusion by inquisitive hackers. Therefore, it is mandatory this guidance be implemented whether or not "keystroke monitoring" is being conducted.  Incidents of unauthorized intrusion are an annoyance, if not catastrophic, depending upon the circumstances.  Intrusions may result in denial of service, misuse, destruction and modification of data or programs, and disclosure of information.  Typically, the personnel and physical security disciplines add credence to the protection afforded Government systems, especially those that are classified.  Occasionally, when the incident requires further action, some monitoring must be established as an additional tool to protect the critical system and to identify the perpetrator attempting to violate the security of the system.

9.2. (U) SCOPE.  These procedures are effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

YES

DESIGN PHASE

YES

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

NO

9.3. (U) PROCEDURES. In the DoD environment, the policy is to protect classified and unclassified sensitive information from unauthorized disclosure, destruction and modification. The security policies have been constructed to meet this objective.  Implementation of these security policies begins with a warning to the user that the system is subject to monitoring.  Once this has been done, the user acknowledges that some line monitoring or keystroke monitoring may be initiated when appropriately authorized and determined necessary to provide documentary evidence for a potential prosecution or administrative action.  Extreme care must be taken in a targeted monitoring situation, in accordance with (IAW) this Chapter, to ensure:

·         Evidence is not destroyed.

·         Innocent personnel are not implicated.

·         The subject does not become aware of a planned monitoring activity.

9.3.1. (U) IS Warning Banner. The Department of Defense (DoD) General Counsel has advised that managers of Federal Systems who conduct "keystroke monitoring" to protect their systems and networks from unauthorized access, should provide explicit notice to all users that use of these systems constitutes consent to monitoring.  User knowledge of monitoring activation can serve as a deterrent to any malicious act.

9.3.1.1. (U) A logon warning banner is required on all networked and standalone DoD interest computer systems (Government and contractor). The warning banner must be displayed before a successful logon and should include an option that allows the user to halt the logon process.  The intent of the banner is to confirm to the user that all data contained on DoD interest computer systems is subject to review by law enforcement authorities, DoD security personnel, and/or System Administrator, IAW this chapter.  The banner is designed to inform all users, prior to accessing a DoD system, that by logging on they expressly consent to authorized monitoring.

9.3.1.2. (U) ISs supporting DoD operations have very specific warning banner requirements, and must include, at a minimum, the information shown in Figure 9.1.

9.3.1.3. (U) A warning banner must be placed on an IS so that the IS user must enter a keystroke to continue processing.  Although an appropriate warning banner is displayed, systems administration personnel will minimize the possibility of accessing user data that is not relevant to the monitoring being acquired, analyzed, or recorded. Whenever system administration personnel suspect that a system is being inappropriately used, either by authorized or unauthorized personnel, or some improper activity is being conducted, the matter will be reported immediately to the Information Systems Security Manager (ISSM). Any monitoring directed at specific individuals suspected of unauthorized activity must be authorized by local authority/General Counsel and coordinated with the Designated Approving Authority (DAA)/DAA Rep/Service Certifying Organization (SCO) (see paragraph 9.3.3).

NOTICE AND CONSENT BANNER

THIS IS A DEPARTMENT OF DEFENSE (DOD) COMPUTER SYSTEM.  THIS COMPUTER SYSTEM, INCLUDING ALL RELATED EQUIPMENT, NETWORKS AND NETWORK DEVICES (SPECIFICALLY INCLUDING INTERNET ACCESS), ARE PROVIDED ONLY FOR AUTHORIZED U.S. GOVERNMENT USE.  DOD COMPUTER SYSTEMS MAY BE MONITORED FOR ALL LAWFUL PURPOSES, INCLUDING TO ENSURE THAT THEIR USE IS AUTHORIZED, FOR MANAGEMENT OF THE SYSTEM, TO FACILITATE PROTECTION AGAINST UNAUTHORIZED ACCESS, AND TO VERIFY SECURITY PROCEDURES, SURVIVABILITY AND OPERATIONAL SECURITY.  MONITORING INCLUDES ACTIVE ATTACKS BY AUTHORIZED DOD ENTITIES TO TEST OR VERIFY THE SECURITY OF THIS SYSTEM.  DURING MONITORING, INFORMATION MAY BE EXAMINED, RECORDED, COPIED AND USED FOR AUTHORIZED PURPOSES.  ALL INFORMATION, INCLUDING PERSONAL INFORMATION, PLACED ON OR SENT OVER THIS SYSTEM MAY BE MONITORED.

USE OF THIS DOD COMPUTER SYSTEM, AUTHORIZED OR UNAUTHORIZED, CONSTITUTES CONSENT TO MONITORING OF THIS SYSTEM.  UNAUTHORIZED USE MAY SUBJECT YOU TO CRIMINAL PROSECUTION.  EVIDENCE OF UNAUTHORIZED USE COLLECTED DURING MONITORING MAY BE USED FOR ADMINISTRATIVE, CRIMINAL OR OTHER ADVERSE ACTION.  USE OF THIS SYSTEM CONSTITUTES CONSENT TO MONITORING FOR THESE PURPOSES.

FIGURE 9.1. (U) INFORMATION SYSTEM WARNING BANNER.

9.3.2. (U) Warning Labels.  In addition to the IS warning banner, a standard U.S. Government warning label must be placed on the top border edge of each terminal of each IS. Local production of labels is authorized only when using the text contained in Figure 9.2.

THIS AUTOMATED INFORMATION SYSTEM (AIS) IS SUBJECT TO MONITORING AT ALL TIMES. USE OF THIS AIS CONSTITUTES CONSENT TO MONITORING.

FIGURE 9.2. (U) WARNING LABEL.

9.3.3. (U) Action To Be Taken In A Monitoring Incident. When monitoring is justified and approved, the ISSM and Information System Security Officer (ISSO)/System Administrator (SA), in conjunction with the DAA/DAA Rep/SCO, should take every effort to ensure that the actions identified in Table 9.1 are performed in an orderly fashion. For additional information on monitoring see 7.4.10.

***CAUTION***

Do not proceed to monitor an individual without first gaining permission and guidance from General Counsel and Commander/CO/SIO.  Unauthorized targeted monitoring is a violation of the subject's rights and may jeopardize the investigation.  Authorization for targeted monitoring must come through the Commander/Commanding Officer in consultation with legal representation -- Judge Advocate General (JAG), General Counsel, or authorized investigative organization (Defense Criminal Investigative Service (DCIS), US Army Criminal Intelligence Department (USACID), US Army Military Intelligence (USAMI), Naval Criminal Investigative Service (NCIS), Air Force Office of Special Investigations (AFOSI)). The ISSM and ISSO/SA will make every effort to answer all applicable questions identified in Table 9.2.

9.3.4. (U) Review System Specific Security Features. The investigators will want full documentation on many aspects of the system being violated. Table 9.2 identifies sample information needed by the Commander/CO/SIO which may be needed in justifying the investigation. The ISSM and ISSO/SA will make every effort to document the information in Table 9.2.

TABLE 9.1. (U) RECOMMENDED INCIDENT RESPONSE ACTIONS

ITEM
NUMBER

ACTION RECOMMENDED

 

 

1

Notify the ISSM.

 

 

2

The ISSM will notify the Special Security Officer (SSO), Commander/CO/SIO

 

 

3

The Commander/CO/SIO will coordinate with the General Counsel and authorized investigative office for formal guidance.

 

 

4

Follow Chapter 8 for incident reporting

 

 

5

Keep a record of actions by the ISSM concerning the incident.

 

 

 

TABLE 9.2. (U) SAMPLE MONITORING INVESTIGATION QUESTIONS

ITEM

NUMBER

SAMPLE INFORMATION THAT MAY BE NEEDED BY THE COMMANDER

 

1

What event(s) triggered suspicion of improper system use?

 

 

 

 

2

Does the system have a warning banner? Is the banner displayed prior to the first keystroke?

 

 

 

 

3

Where is the hardware physically located?

 

 

 

 

4

What level of classified data is processed on the system?

 

 

 

 

5

What organization/activity is supported by the system?

 

 

 

 

6

What connectivities are authorized to the system?

 

 

 

 

7

What is the function of the system?

 

 

8

What security software, if any, is used on the system?

 

 

9

Are audit trails running normally and have they been reviewed regularly?

 

 

10

Is a copy of the SSAA/SSP available?

 


 

CHAPTER 10

MALICIOUS CODE PREVENTION

 

10.1. (U) PURPOSE. Minimize the risk of malicious code (malicious logic) from being imported to or exported from Information Systems (ISs). Preventing malicious code is everyone's responsibility.  This chapter identifies various types of malicious code and provides preventive measures to avoid problems.

10.2. (U) SCOPE. The provisions of this policy applies to all organizations processing Sensitive Compartmented Information (SCI), their components, and affiliates worldwide, as well as all contractor-owned or operated systems employed in support of SCI designated contracts. This supplement will be specified on all DD Forms 254 as a contractual requirement. These procedures are effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

YES

DESIGN PHASE

YES

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

NO

10.3. (U) DEFINITIONS.

10.3.1. (U) Malicious code. Malicious code is that which is intentionally included in hardware, software, firmware or data for unauthorized purposes. Computer Viruses, Worms, Trojan Horses, Trapdoors, and Logic/Time Bombs all fall under the definition of malicious code. Computer viruses pose the primary threat to ISs because of their reproductive capability. Malicious code can arrive through either media that are introduced to ISs or as mobile code that arrives through connections to other systems and networks.

10.3.2. (U) Mobile Code.  Mobile code is technology which allows for the creation of executable information which can be delivered to an information system and then directly executed on any hardware/software architecture which has an appropriate host execution environment.  The code can perform positive or negative actions (malicious). The focus on risk is based on the receipt of executable information from sources outside a Designated Approval Authority's area of responsibility or control. Mobile code is the software obtained from remote systems outside the enclave boundary, transferred across a network, and then downloaded and executed on a local system without explicit installation or execution by the recipient.

10.3.3. (U) Malicious Mobile Code. Mobile code is the software designed, employed, distributed, or activated with the intention of compromising the performance or security of information systems and computers, increasing access to those systems, providing the unauthorized disclosure of information, corrupting information, denying service, or stealing resources. Types of mobile code are direct and indirect.

·         Direct mobile code can be recognized within the primary transport mechanism, such as a virus within a file.

·         Indirect mobile code may be embedded, such as inside of an attachment to an E-Mail.

10.3.4. (U) Mobile Code Technologies. Software technologies that provide the mechanisms for the production and use of mobile code are grouped into three Risk Categories based on the functions performed by the code, the ability to control distribution of the code and control of the code during execution.

10.3.4.1. (U) Category 1 is mobile code that can exhibit broad functionality using unmediated access to services and resources of workstations, hosts and remote systems. Category 1 mobile code technologies can pose severe threats to IC services.  Some of these technologies allow differentiation between unsigned and signed code (i.e., a mechanism used by a trusted source), with capabilities to configure systems so that only signed code will execute. Examples of Category 1 technologies include:

·         Active X;

·         Visual Basic for Applications (VBA);

·         Windows Scripting Host, when used as mobile code;

·         Unix Shell scripts, when used as mobile code; and

·         MS-DOS Batch Scripts, when used as mobile code.

10.3.4.2. (U) Category 2 is mobile code that has full functionality using mediated or controlled access to services and resources of workstations, hosts and remote systems. Category 2 mobile code technologies may employ known and documented fine-grain, periodic, or continuous countermeasures or safeguards against malicious use. Some of these technologies allow differentiation between unsigned and signed code (i.e., a mechanism used by a trusted source), with capabilities to configure systems so that only signed code will execute. Examples of Category 2 technologies include:

·         Java Applets and other Java Mobile Code;

·         LotusScript;

·         PerfectScript; and

·         Postscript.

10.3.4.3. (U) Category 3 is mobile code that has limited functionality, with no capability for unmediated or uncontrolled access to services and resources of workstations, hosts and remote systems. Category 3 mobile code technologies may employ known and documented fine-grain, periodic, or continuous countermeasures or safeguards against malicious use.  Protection against these types of mobile only requires normal vigilance compared with that required to keep any software configured to resist known exploits. Examples of Category 3 technologies include:

·         JavaScript (includes Jscript and ECMAScript variants);

·         VBScript;

·         PortableDocumentFormat (PDF); and

·         Shockwave/Flash.

10.3.4.4. (U) Exempt technologies are those which are not considered true mobile code.  These include:

·         XML;

·         SMIL;

·         QuickTime;

·         VRML (exclusive of any associated Java Applets or JavaScript Scripts);

·         Web server scripts, links and applets that execute on a server (Java servlets, Java Server Pages, CGI, Active Server Pages, CFML, PHP, SSI, server-side JavaScript, server-side Lotus Script);

·         Local programs and command scripts that exist on a user workstation (binary executables, shell scripts, batch scripts, Windows Scripting Host (WSH), PERL scripts);

·         Distributed object-oriented programming systems that do not go back to the server to execute objects (CORBA, DCOM); and

·         Software patches, updates and self-extracting updates that must be explicitly invoked by a user (Netscape SmartUpdate, Microsoft Windows Update, Netscape web browser plug-ins, and Linux Update Manager)

10.3.5. (U) Trusted Source. A trusted source is a source that is adjudged to provide reliable software code or information and whose identity can be verified by authentication. The following mechanisms are sufficient to validate the identity of a trusted source:

·         a connection via JWICS;

·         a connection via the SIPRNET;

·         a digital signature over the mobile code itself using either DoD or IC-approved PKI certificate;

·         a commercial certificate approved by either the DoD CIO or the IC CIO; or

·         authentication of the source of the transfer by public key certificate (e.g., S/MIME, SSL server certificate from an SSL web server).

10.3.6. (U) Screening. Screening is a preventive measure to monitor processes and data to intercept malicious code before it is introduced to an IS.  Screening also includes monitoring IS for the presence of malicious code which is already present. Malicious code occurs in different forms, which may have different methods for screening.

10.4. (U) PROCEDURES.  The ISSM/ISSO is responsible for ensuring that the following procedures are followed:

10.4.1. (U) Preventive Procedures. Scan all information storage media (e.g., diskettes, compact disks, computer hard drives, etc.) and E-mail attachments introduced prior to its use on any SCI system. If the media cannot be scanned then it is considered high risk and cannot be used on any SCI system without approval from the Service Certifying Organization (SCO). Procedures to be followed:

·         Use automated scanning applications, e.g., virus scanning, which will monitor media upon introduction to a system and data being transferred into the IS.

·         Check and review the IS operating environment for the presence of malicious code on a frequent basis.

·         Avoid hostile mobile code through use of only authorized/verified and registered mobile code.

·         Keep automated scanning processes up to date with the most current recognition signatures.

·         Ensure that users will not knowingly or willfully introduce malicious code into systems.

·         Ensure that users will not import or use unauthorized data, media, software, firmware, or hardware on systems.

·         Ensure that users will conduct screening of all incoming data (e.g., E-Mail and attachments) if this process is not automated.

·         Ensure that users will not use personal-owned media (e.g., music, video, or multimedia compact disks) in Government-owned IS.

·         Ensure that all users immediately report all security incidents and potential threats and vulnerabilities involving malicious code on ISs to the ISSM.

·         Controlled Interfaces with malicious code scanning capability does not relieve the management of the receiving IS from the responsibility of also checking for malicious code.

10.4.2. (U) Malicious Code Detection. If a malicious code is detected or a presence of malicious code is suspected on any IS, do the following:

·         Immediately report it to the ISSM for further instruction in accordance with Chapter 8. Do nothing that might cause the further spread of the malicious code.

·         Take the following corrective actions:

·         If found in a file, use approved Anti-virus software to remove a virus from a file.

·         If found on a System, use approved Antivirus software to remove the virus from your system.

·         If files are corrupted, then restore affected files from system backups.

10.5. (U) MALICIOUS CODE SECURITY REQUIREMENTS. An integral part of this program is the mandatory training required by public law.  Users shall receive initial training on prescribed IS security restrictions and safeguards prior to accessing corporate IS assets in accordance with Chapter 6. User awareness is still the first line of defense, especially since there is NO ANTI-VIRUS SOFTWARE THAT CAN GUARANTEE 100% PROTECTION FROM VIRUSES.

10.5.1. (U) Preventative Steps to be Taken:

·         Employ user awareness education.

·         Use virus scanning programs to detect viruses that have been placed on diskettes.

·         Never start a PC while a diskette is in the drive.

·         Ensure the CMOS boot-up sequence for PCs is configured to boot-up from the hard drive first (usually the C: drive) NOT the A: drive.

·         Block receiving/sending of executable code.  Blocking files with executable extensions such as EXE, VBS, SHS etc., contributes to overall anti-virus measures.

·         Adopt procedures to configure email applications to view received files/attachments in a “viewer.” Viewers normally do not have macro capabilities.

·         Avoid using a diskette from an outside source without first scanning it for potential viruses.

·         Avoid downloading data from internet bulletin boards, etc., unless the file can be scanned for viruses beforehand.

·         Ensure files are being backed up daily.

·         Implement a process to routinely check security bulletins for updates, (i.e., CERT, AFCERT, NAVCERT, etc.)

·         Whenever possible, disable the automatic execution of all categories of mobile code in email bodies and attachments.

·         Whenever possible, desktop software shall be configured to prompt the user prior to opening email attachments that may contain mobile code.

 


 

CHAPTER 11

SOFTWARE

11.1. (U) PURPOSE. This chapter defines the various types of software applications that may be used on any DoD IS. It lists software types that are authorized as well as specific types of software that are not authorized.

11.2. (U) DEFINITION. For the purpose of this policy, software should be interpreted to be any information recorded on any information storage media to include data files, source code and executable code.

11.3. (U) SCOPE. These procedures are effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

YES

DESIGN PHASE

YES

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

NO

11.4. (U) PROCEDURES FOR SOFTWARE AUTHORIZATION. Additions or modifications to software on systems which affects system accreditation must be evaluated by the ISSM through the local Configuration Management Board/Configuration Control Board (CMB/CCB) process and coordinated with the DAA Rep/SCO to gain concurrence. The provisions of this policy apply to all organizations processing Sensitive Compartmented Information (SCI), their components, and affiliates worldwide.

11.5. (U) LOW RISK SOFTWARE.  Low risk software may be introduced on SCI ISs, to include stand‑alone personal computers. Low risk - authorized software must be approved by the ISSPM/ISSM and includes the following:

11.5.1. (U) Provided officially by another U.S. Government Agency that has equivalent standards.

11.5.2. (U) Provided under contract to organizations involved with the processing of SCI and related intelligence information.

11.5.3. (U) Developed within a Government-approved facility.

11.5.4. (U) Commercial Off-The-Shelf (COTS) software provided through appropriate procurement channels.

11.5.5. (U) Distributed through official channels.

11.5.6. (U) Acquired from a reputable vendor for official use or evaluation (i.e., maintenance diagnostic software).

NOTE:  In all cases, system and site specific security policy should be considered.

11.6. (U) HIGH RISK SOFTWARE. Certain software is deemed "high risk" and is not authorized for use without approval. Such software must be approved in writing by the respective DAA Rep/SCO before it may be legally used. High risk software includes public domain, demonstration software, and embedded software not obtained through official channels.  Other software may be deemed high risk by the DAA Rep/SCO.

11.6.1. (U) Public Domain Software.  Only the DAA (Rep)/SCO may approve the use of public-domain software. Do not confuse public-domain software with off-the-shelf, or user developed software.  A request to use public-domain software and the subsequent approval requires an extensive evaluation, by approved evaluation centers, of the particular software source code in search of Trojan Horses, Trapdoors, Viruses, etc. There is limited capability to perform these required evaluations.

11.6.2. (U) Demonstration Software and Media. Floppy diskettes and removable hard disks used for demonstrations, with the intent of being returned to a vendor, must be processed on a computer that has never processed or stored classified data.  Otherwise, the demonstration media cannot be released back to the vendor and should be destroyed. If it is to be returned to the vendor, a fully cleared and indoctrinated individual must verify that the media was used only in an unclassified computer.

11.6.3. (U) Embedded Software. Game software included as part of a vendor bundled software or software/hardware package shall be removed from the IS immediately following the installation and testing of the software. Vendor supplied games occupy valuable disk space and could open the door for Fraud, Waste, and Abuse (FW&A) charges.  Game software provided for use as tutorials may be granted as an exception to this restriction by the DAA Rep/SCO. All other games software currently on SCI ISs are considered a violation of this policy and must be removed.

11.6.4. (U) Unauthorized Software.  Types of software that are not authorized include:

·         Games (See paragraph 11.6).

·         Public domain software or "shareware" which have been obtained from unofficial channels.

·         All software applications which have been developed outside Government approved facilities, such as those developed on personally owned computers at home or software acquired via non- U.S. Government "bulletin boards".

·         Personally owned software (either purchased or gratuitously acquired).

·         Software purchased using employee funds (from an activity such as a coffee fund).

·         Software from unknown sources.

·         Illegally copied software in violation of copyright rules.

·         Music and video or multimedia compact disks, not procured through official Government channels.

11.6.5. (U) IA Software and Security Tools. Some high risk software may be required to meet system requirements. For example, to comply with paragraph 4.B.2.a.5.b of DCID 6/3, intrusion/attack detection and monitoring tools are required to support required periodic testing by the ISSO/ISSM within their domain.

 


 

CHAPTER 12

INFORMATION STORAGE MEDIA CONTROL AND ACCOUNTING PROCEDURES

12.1. (U) PURPOSE. This chapter outlines the minimum requirements for the control and accounting of information storage media. The Commander/Commanding Officer is responsible to prescribe the policy for the level of control and accounting appropriate for information storage media under his/her control.

 

12.2. (U) SCOPE. These procedures are effective in the following life cycle phases:

 

CONCEPTS DEVELOPMENT PHASE

NO

DESIGN PHASE

NO

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

YES

 

12.3. (U) PROCEDURES. This chapter provides guidelines for control and accounting of information storage media. For any system that operates with PL-3 or lower functionality, media which is not write-protected and is placed into that system must be classified at the highest level of information on the system until reviewed and validated.  Media accountability will be based on the determined classification level of the media.

12.3.1. (U) Information Storage Media Control. In addition to the labeling of information storage media IAW Chapter 13, there is a requirement to control and account for certain information storage media within functional categories. This chapter tasks the organization Commander/Commanding Officer with developing a unit-unique Standard Operating Procedure (SOP) for control and accountability.

12.3.1.1. (U) Inspections. The organization must be able to demonstrate positive control and accounting of information storage media according to its SOP when being inspected by authorities.

12.3.1.2. (U) Control Procedures. Control of information storage media should begin upon introduction into the organization according to the SOP.

12.3.1.2.1. (U) Information storage media accountability is required for Top Secret BRAVO and permanent Collateral Top Secret files.

12.3.1.2.2. (U) Information storage accountability as a security protection measure is eliminated for collateral classified information (to include Top Secret non-permanent files), all classification levels of Special Intelligence (SI) (to include GAMMA and ENDSEAL), Talent-Keyhole (TK), and BRAVO material below Top Secret.

12.3.1.2.3. (U) Requirements for control of specific Special Access Program (SAP) information will be communicated by the respective Program Manager.

12.3.1.3 (U) Other Categories of Storage Media. The following major categories of information storage media should be considered for accountability in compliance with copyright and licensing as documented in the SOP:

·         Commercial Off-The-Shelf (COTS) and vendor software.

·         Government developed software.

·         Other organization unique software and data.

12.3.2. (U) Audits and Reports. Each organization will periodically audit the information storage media accountability records for accuracy. The frequency of audits should depend on the volume of media on hand, the frequency of changes in the accounting system, criticality of the media, and classification level of data stored onto the media. Perform other audits at the Commander's/Commanding Officer's discretion.  Document the result of these audits in an internal report to remain on file within the organization for at least one year. Report discrepancies to the ISSM for further reporting to the DAA Rep/SCO as required.  These requirements should be addressed in the organization SOP.

12.3.2.1. (U) Inventories/audits will be required for accountable information storage media described in paragraph 12.3.1.2. Information storage media holdings will be audited periodically to ensure proper control is being maintained and media is destroyed when no longer needed.

12.3.2.2. (U) Barcodes will only be assigned to accountable material described in paragraph 12.3.1.2.

12.3.3. (U) Destruction of Media.  When destruction of information storage media is appropriate and approved, it must be accomplished according to approved procedures and methods and an update to the organization media accounting system should be made.  See Chapter 20, Paragraph 20.4.5, Destroying Media, for additional guidance.

12.3.3.1. (U) Destruction certificates are required for accountable material and will be retained as a permanent record.

12.3.3.2. (U) Non-accountable material no longer requires destruction certificates.


 

CHAPTER 13

INFORMATION STORAGE MEDIA LABELING AND PRODUCT MARKING REQUIREMENTS

13.1. (U) PURPOSE.  This chapter outlines the minimum requirements for marking the magnetic media and paper products. Labeling of magnetic media is similar to labeling paper products.  Like paper documents, all information storage media must be properly marked with the appropriate classification and handling instructions.

13.2. (U) SCOPE.  These procedures are effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

NO

DESIGN PHASE

NO

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

NO

13.3. (U) PROCEDURES.  To ensure data integrity and protection, information storage media must be administratively labeled and appropriately protected to prevent the loss of information through poor security practices. Likewise, to prevent security compromises, all output products must be appropriately protected. Proper classification marking of output paper products, microfiche, terminal screen displays and central processing units (CPUs) must be accomplished and is the responsibility of the user. Each supervisor is ultimately responsible for the labeling, handling, and storage of both media and paper products within their assigned area of responsibility.

13.3.1. (U) Information Storage Media.  Removable IS storage media and devices shall have external labels clearly indicating the classification of the information and applicable associated markings (e.g., digraphs, trigraphs). Labeling exemption for operational security (OPSEC) requirements may be granted within local policy with DAA/DAA Rep/SCO concurrence.  Examples include magnetic tape reels, cartridges, cassettes; removable discs, disc cartridges, disc packs, diskettes, magnetic cards and electro-optical (e.g., CD) media. All removable information storage media and devices will be marked with the appropriate Standard Form (SF) 700-series classification and descriptor labels.  These are:

·         SF 706, Top Secret Label (Collateral only)

·         SF 707, Secret Label (Collateral only)

·         SF 708, Confidential Label (Collateral only)

·         SF 710, Unclassified Label

·         SF 711, Data Descriptor (On all magnetic media)

·         SF 712, Classified SCI Label (All classification levels)

13.3.1.1. (U) Label Placement. See the Federal Register 2003 and applicable military department regulations for exact placement procedures. Labels will be affixed to all media in a manner that does not adversely affect operation of the equipment in which the media is used. Labels may be trimmed to fit the media. Labels for Compact Disks (CDs) must NOT be placed on the CD itself.  Place the labels on the CD container or envelope. Record the accounting number in the "Control” block of the SF 711 and write the same number on the CD with a Paint-pen, CD labelmaker or permanent marker. The number should not interfere with the operation of the CD.  Notice: Do not use pens that contain toluene.

13.3.1.2. (U) Data Descriptor Label. The SF 711, Data Descriptor Label, identifies the content of a specific media to include unclassified, collateral‑classified, and Sensitive Compartmented Information (SCI). An SF 711 is not required if the disk bears the following information: Organization, office symbol, classification, and media sequence number (if locally required).  The user fills in the "Classification”, "Dissem”, "Control”, and "Compartments/Codewords" blocks as appropriate.

13.3.2. (U) Classification Markings.  All documents residing or processed on information storage media/ISs will be marked in accordance with Department of Defense (DoD) 5105.21-M-1, Sensitive Compartmented Information Administrative Security Manual, or appropriate Service regulations.


 

CHAPTER 14

INFORMATION SYSTEMS (IS) MAINTENANCE PROCEDURES

14.1. (U) PURPOSE.  The purpose of this chapter is to identify security procedures and responsibilities which must be followed during the maintenance of Information Systems (IS).  ISs are particularly vulnerable to security threats during maintenance activities. The level of risk is directly associated with the maintenance person's clearance status (cleared or uncleared). A maintenance person may be uncleared or may not be cleared to the level of classified information contained on the IS. Properly cleared personnel working in the area must maintain a high level of security awareness at all times during IS maintenance activities.  Additionally, the Information Systems Security Manager (ISSM) is responsible for IS maintenance security policy, including maintenance procedures for all ISs under his or her control.

14.2. (U) SCOPE.  These procedures are effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

YES

DESIGN PHASE

YES

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

YES

14.3. (U) PROCEDURES:

14.3.1. (U) Maintenance Personnel:

14.3.1.1. (U) Maintenance by Cleared Personnel.  Personnel who perform maintenance on classified systems should be cleared and indoctrinated to the highest classification level of information processed on the system. Appropriately cleared personnel who perform maintenance or diagnostics on ISs do not require an escort. However, an appropriately cleared and, when possible, technically-knowledgeable employee should be present when maintenance is being performed to assure that the proper security procedures are being followed.

14.3.1.2. (U) Maintenance by Uncleared (or Lower-Cleared) Personnel.  If appropriately cleared personnel are unavailable to perform maintenance, an uncleared or lower-cleared person may be used provided a fully cleared and technically qualified escort monitors and records their activities in a maintenance log.

14.3.1.2.1. (U) Uncleared maintenance personnel should be US citizens. Outside the US, where US citizens are not available to perform maintenance, foreign nationals may be utilized, but only with Designated Approving Authority (DAA) Representative (Rep)/Service Certifying Organization (SCO) approval.

14.3.1.2.2. (U) Prior to maintenance by uncleared personnel, the IS will be completely cleared and all nonvolatile data storage media removed or physically disconnected and secured.  When a system cannot be cleared, ISSM-approved procedures will be enforced to deny the uncleared individual visual and electronic access to any classified or sensitive data that is contained on the system.

14.3.1.2.3. (U) A separate, unclassified copy of the operating system (e.g., a specific copy other than the copy(s) used in processing information), including any floppy disks or cassettes that are integral to the operating system, will be used for all maintenance operations performed by uncleared personnel. The copy will be labeled “UNCLASSIFIED--FOR MAINTENANCE ONLY” and protected in accordance with procedures established in the SSAA/SSP.  Maintenance procedures for an IS using a non-removable storage device on which the operating system is resident will be considered and approved by the ISSM on a case-by-case basis.

14.3.2. (U) General Maintenance Requirements:

14.3.2.1. (U) Maintenance Log. A maintenance log must be maintained for the life of the IS.  The maintenance log should include the date and time of maintenance, name of the individual performing the maintenance, name of escort, and a description of the type of maintenance performed, to include identification of replacement parts. Maintain this log for the life of the IS.

 

 

 

14.3.2.2. (U) Location of Maintenance. Maintenance should be performed on-site whenever possible.  Equipment repaired off-site and intended for reintroduction into a Sensitive Compartmented Information Facility (SCIF) may require protection from association with that particular SCIF or program.

14.3.2.3. (U) Removal of Systems/Components. If systems or system components must be removed from the SCIF for repair, they must first be purged, and downgraded to the appropriate classification level, or sanitized of all classified data and declassified IAW ISSM-approved procedures.  The ISSM, or designee, must approve the release of all systems and parts removed from the system.

14.3.2.4. (U) Use of Network Analyzers. Introduction of network analyzers that provide maintenance personnel with a capability to do keystroke monitoring must be approved by the ISSM, or designee, prior to being introduced into an IS. See Chapter 9, Paragraph 9.3.3, for additional guidance.

14.3.2.5. (U) Use of Diagnostics. If maintenance personnel bring diagnostic test programs (e.g., software/firmware used for maintenance or diagnostics) into a SCIF, the media containing the programs must be checked for malicious codes before the media is connected to the system, must remain within the SCIF, and must be stored and controlled at the classification level of the IS. Prior to entering the SCIF, maintenance personnel must be advised that they will not be allowed to remove media from the SCIF.  If deviation from this procedure is required under special circumstances, then each time the diagnostic test media is introduced into a SCIF it must undergo stringent integrity checks (e.g., virus scanning, checksum, etc.) prior to being used on the IS and, before leaving the facility, the media must be checked to assure that no classified information has been written on it. Such a deviation must be approved by the ISSM.

14.3.2.6. (U) Introduction of Maintenance Equipment into a SCIF.  All diagnostic equipment or other items/devices carried into a SCIF by maintenance personnel will be handled as follows:

14.3.2.6.1. (U) Systems and system components being brought into the SCIF shall, as far as practical, be inspected for improper modification.

14.3.2.6.2. (U) Maintenance equipment that has the capability of retaining information must be appropriately sanitized by established procedures (see Chapter 13) before being released.  If the equipment cannot be sanitized, it must remain within the facility, be destroyed, or be released under procedures approved by the DAA Rep/SCO.

14.3.2.6.3. (U) Replacement equipment or components that are brought into the SCIF for the purpose of swapping-out facility components are allowed. However, any component introduced into an IS will remain in the facility until proper release procedures are completed.

14.3.2.6.4. (U) Communication devices with transmit capability (e.g., pagers, RF LAN connections, etc.) and any data storage device not essential to maintenance, shall remain outside the SCIF.

14.3.3. (U) Maintenance and System Security. After maintenance, and before return to operation, the ISSM, or designee, shall check the security features on the IS to assure that they still function properly. Additionally, any maintenance changes that impact the security of the system shall receive a configuration management review.

14.3.4. (U) Remote Maintenance:

14.3.4.1. (U) Requirements/Considerations:

14.3.4.1.1. (U) The Installation and use of remote diagnostic links must be preapproved and procedures addressed in the SSAA/SSP.

14.3.4.1.2. (U) An audit log shall be maintained for five years of all remote maintenance, diagnostic, and service transactions and periodically reviewed by the Information System Security Officer (ISSO)/System Administrator (SA).

14.3.4.1.3. (U) Other techniques to consider when remote maintenance is required include encryption and decryption of diagnostic communications, strong identification and authentication techniques such as tokens, and remote disconnect verification.

14.3.4.2. (U) Maintenance Performed with the same Level of Security. Remote Diagnostic Maintenance service may be provided by a service or organization that does possess the same level and category(ies) of security. The communications links connecting the components of the systems, plus associated data communications and networks, shall be protected in accordance with national security policies and procedures applicable to the sensitivity level of the data being transmitted.

14.3.4.3. (U) Maintenance Performed with a different Level of Security. If remote diagnostic or maintenance services are required from a service or organization that does not provide the same level of security required for the IS being maintained, the system must be cleared; placed in a standalone configuration prior to the connection of the remote access line; and maintenance personnel must possess the appropriate clearance to perform the maintenance. If the system cannot be cleared (e.g., due to a system crash), remote diagnostics and maintenance shall not be allowed.

14.3.4.4. (U) Initiating and Terminating Remote Access. The initiation and termination of the remote access must be performed by the ISSM or designee.

14.3.4.5. (U) Keystroke Monitoring Requirements. Keystroke monitoring shall be performed on all remote diagnostic or maintenance services. So far as practicable, a technically qualified person shall review the maintenance log to assure the detection of unauthorized changes. The ISSM, or designee, will assure that maintenance technicians responsible for performing remote diagnosis/maintenance are advised (contractually, verbally, banner, etc.) prior to remote diagnostics/maintenance that keystroke monitoring will be performed.

14.3.5. (U) Life Cycle Maintenance. The requirement for, and vulnerabilities of, IS maintenance, whether performed by military or contractor personnel, must be addressed during all phases of the system's life cycle. The security implications of IS maintenance must be specifically addressed when entering into contract negotiations for any maintenance activity.


 

CHAPTER 15

PORTABLE ELECTRONIC DEVICES

15.1. (U) PURPOSE. This chapter identifies procedures for the entry and exit of portable electronic devices into SCIFs. A portable electronic device is a generic term used to describe the myriad of small electronic items that are widely available. The rapid growth in technological capabilities of portable electronic devices/portable computing devices (PEDs/PCDs) has led to concerns about their portability into and out of Sensitive Compartmented Information Facilities (SCIFs). PEDs include cellular telephones, two way pagers, palm sized computing devices, two-way radios, audio/video/data recording, playback features, personal digital assistants, palm tops, laptops, notebooks, data diaries, and watches with communications software and synchronization hardware, that may be used to telecommunicate. These devices must be closely monitored to ensure effective control and protection of all information on our IS.

15.2. (U) SCOPE. These procedures are effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

YES

DESIGN PHASE

YES

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

YES

 

15.3. (U) RISK. Because PEDs are designed to freely and openly exchange information, most users may not be aware of the technologies that reside in the various PEDs.  PEDs may contain wireless or infrared capabilities. Thus, users do not always know when automated information transfer is active or that the PED is being reprogrammed or reconfigured remotely without their knowledge

15.3.1. (U) Classified Information. The introduction of unauthorized classified information to a PED, will result in a security violation (see Chapter 8). For example: aggregation of data, inadvertent wireless connection, and POCs maintained through classified or sensitive contracting mechanisms.  If this occurs to an unclassified PED, the PED needs to be controlled as classified material (e.g., this could include confiscation of the PED). If a PED is already classified, and unauthorized classified information is found (higher than authorized for the PED), the PED needs to be controlled at the higher, more restrictive level.

15.4. (U) PROCEDURES.  The use of PEDs in a SCI environment presents a high degree of risk for the compromise of classified or sensitive information. PEDs will only be used to fulfill mission requirements.  Additionally, very specific handling procedures must be developed and made available to the user of the PED. The Agency in charge of any given SCIF is the authority for the procedures to move PEDs in or out of their facilities. Specific requirements/procedures are:

15.4.1. (U) Approval Requirements. All of the following requirements must be satisfied prior to approving the use of portable electronic devices:

15.4.1.1. (U) Personal PEDs

·         Personal PEDs, hardware/software associated with them, and media are prohibited from entering/exiting a SCIF unless authorized by the Agency granting SCIF accreditation.

·         Personal PEDs are prohibited from operating within a SCIF unless authorized by the agency granting SCIF accreditation.  If approved, the owner of these devices and his/her supervisor must sign a statement acknowledging that they understand and will adhere to the restrictions identified below. 

·         Connection of a Personal PED to any IS within a SCIF is prohibited.

·         PEDs with wireless, Radio Frequency (RF), Infrared (IR) technology, microphones, or recording capability will not be used unless these capabilities are turned off or physically disabled. 

15.4.1.2. (U) Government Owned PEDs

·         Government PEDs, hardware/software associated with them, and media must be controlled when entering/exiting a SCIF.

·         Government PEDs are prohibited from operating within a SCIF unless authorized and accredited by the agency granting the SCIF accreditation. As part of the accreditation requirements, the user of these devices and his/her supervisor must sign a statement acknowledging that they understand and will adhere to the restrictions identified below.

·         Connection of a Government PED to any IS within a SCIF must be approved by the ISSM in writing.

·         PEDs with wireless, Radio Frequency (RF), Infrared (IR) technology, microphones, or recording capability will not be used unless these capabilities are turned off or physically disabled. 

·         Specified PEDs (i.e. Laptop Computers) may be used to process classified information. In addition, these PEDs may be granted approval to connect to ISs on a case-by-case basis in writing by the ISSM. Specified PEDs approved to process classified information must meet minimum technical security requirements.

·         If approved, the PED and associated media must be transported and stored in a manner that affords security sufficient to preclude compromise of information, sabotage, theft, or tampering.  Procedures for handling the PED in a SCIF must be available and provided to the user.

15.4.1.3. (U) Contractor Business Owned PEDs.

·         Contractor Business Owned PEDs will follow all requirements identified in paragraph 15.4.1.2.

·         All Contractor Business Owned PEDs must support a specific Government contract. Documented identification of the equipment in support of the contract must be provided prior to entry into a SCIF.

15.4.2. (U) Handling Procedures. When it has been determined that the use of PEDs is absolutely necessary to fulfill mission requirements, and the requirements set forth in paragraph 15.4.1 are satisfied, the following procedures must be implemented and followed.

15.4.2.1. (U) Standard Operating Procedure (SOP) Development.  The responsible organization must develop a case specific SOP and/or ensure procedures are addressed in the site Concept of Operations (CONOP). The following information must be considered and, where applicable, included in the SOP:

15.4.2.1.1. (U) The SOP must include the organization and name of the Information Systems Security Manager (ISSM) and Special Security Officer (SSO) responsible for the issue and control of PEDs.

15.4.2.1.2. (U) Prior to the introduction of PEDs into a SCIF, it must be approved by the appropriate security personnel having security cognizance for the facility.

15.4.2.1.3. (U) PEDs must operate within one common accredited security parameter (i.e., protection level/level of concern, classification, etc.) as approved by the DAA Rep/SCO.

15.4.2.1.4. (U) All programs, equipment or data diskettes used with the PED must be marked with a label identifying the appropriate classification. Labeling exemption for operational security (OPSEC) requirements may be granted within local policy with DAA/DAA Rep/SCO concurrence.

15.4.2.1.5. (U) If unauthorized classified information is identified on a PED, procedures for control of the information and the PED must be established. For example, classified information on an unclassified PED may result in confiscation of the device as an incident (see Chapter 8).

15.4.2.1.6. (U) Every effort should be made to ensure that security control features are implemented when possible (e.g., access control through userid/password ).

15.4.2.2. (U) SOP Approval. The organization requesting the use of PEDs must submit the SOP to the ISSM/SSO for coordination and approval.


 

CHAPTER 16

 

SECURITY PROCEDURES FOR INFORMATION SYSTEMS (IS) AND FACSIMILE (FAX) USE OF

THE PUBLIC TELEPHONE NETWORK

 

 

16.1. (U) PURPOSE. This chapter outlines the minimum security requirements for the control and accounting of information systems (IS) and facsimile (FAX) use of the public telephone network. The Information System Security Manager (ISSM) is responsible for enforcing policy for the level of control and accounting appropriate for facsimile machine(s) within his/her site. This policy should be coordinated with the Service Certifying Organization (SCO) and the appropriate Special Security Officer (SSO). The potential for covert or inadvertent release of sensitive-but-unclassified (SBU) and classified information to an unintended destination is considered to be highly probable and is reduced significantly through rigorously enforcing policies and continuously monitoring these policies.

 

16.2. (U) SCOPE. These procedures are effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

NO

DESIGN PHASE

YES

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

NO

 

16.3. (U) PROCEDURES. External connectivity through the use of telephones or networks requires that users take every security precaution possible to prevent the loss of National Security Information (NSI) and SBU information via the public communications systems. Classified information shall not be transmitted, processed or stored on any unclassified facsimile or an unclassified IS with either a modem or direct digital connection. Telephone communications, voice or digital, must meet certain installation and equipment standards to ensure security. Telephone communications to external locations using computer-telephone connections must be approved before installation and activation to minimize the threat to the information.

16.3.1. (U)  Facsimile (FAX) Connectivity: 

16.3.1.1. (U) FAX Approval. The SSO, in coordination with the ISSM, is the approval authority for any facsimile operated within a SCIF. Specific FAX approval authority is delegated to command/site ISSMs who may approve unclassified and secure FAX machines within a SCIF. This authority is for single mode use only. ISSMs must ensure that any/all dual mode features are disabled. Dual mode (unclassified/secure) configurations are not approved for use in any facility under DIA/NSA cognizance. Transmission of information at levels above SI/TK (i.e., accountable SCI) requires applicable program manager's concurrence. Multi-function FAX/print machines with workstation/network connectivity/permanent storage/scan and text recognition capabilities are not to be approved for use of any feature other than secure facsimile transmission. Site ISSMs exercising SCI IS approval authority for these machines must ensure the following minimum security requirements are satisfied for unclassified and classified FAX connections. For non-inspectable space sites, coordinate with the organization TEMPEST officer and telephone control officer before installing any facsimile equipment in a secure area and for requests for telephone service in accordance with Telephone Security Guidelines (TSG).

16.3.1.1.1. (U) Unclassified FAX.

·         Unclassified FAX machines must be clearly marked for unclassified use only and consent to monitoring notification.

·         Any change of equipment or location must be locally documented, to include building/room, manufacturer/model, serial number, verification of SSO authorization and point of contact information.

·         Multi-function FAX/print machines with workstation/network connectivity/permanent storage/scan and text recognition capabilities can not be approved, for unclassified use, by site ISSMs.  Requests for this type of equipment should still be submitted via the DAA Rep/SCO.

·         Sites should refer to local counsel on information that can be revealed in an unclassified FAX header.

16.3.1.1.2. (U) Classified FAX. Classified FAX is normally a connection of the output of a FAX to the input port of a STU-III/STE, whose encrypted output is connected to the unclassified telephone lines. The procedures defined in this chapter are in addition to the policy and procedures addressed in National Security Telecommunications and Information Systems Security Instruction (NSTISSI) 3013 or other appropriate SCI regulations.  ISSMs are delegated approval authority for secure FAX machines operating up to the TS/SCI SI/TK level. 

·         Secure FAX machines must be clearly marked for the highest level of classified information processed.

·         ISSMs will ensure  that all operators understand the requirement to verify the level at which their STU-III/STE is connected to the recipient's STU-III/STE and verify the level at which the recipient is cleared before transmission commences.

·         Information or additional compartments above the SI/TK level cannot be processed without prior approval from the appropriate data owner.

·         The STU-III/STE is designed to prevent disclosure of information while it is being transmitted. Authorized users must verify the identity and clearance level of the distant party. If there is a human interface at the remote end, a challenge and reply authentication scheme will be used.

·         The ISSM should approve only certified digital FAXes. The ISSM can obtain a list of certified secure digital facsimiles from the DAA/DAA Rep/SCO.

16.3.1.1.3. (U) Non-Standard Secure FAXes. A non-standard secure FAX consists of a group 3 (GS3) rated standard business FAX with an approved secure protocol adapter (SPA) and an approved STU-III/STE secure data terminal (SDT).   In an effort to support cost effective alternatives to the certified list of digital FAXes, non-standard secure FAXes may be purchased and used with approval from the appropriate DAA. Memory in standard business FAX machines is not designed to meet any of the stringent requirements outlined above, and therefore cannot be trusted beyond the level of TS SI/TK when connected to an approved SPA (see www.nmic.ic.gov/security/products/secfax.html on INTELINK).

16.3.1.1.4. (U) Procedures. Each facsimile requires written standard operating procedures (SOP), or identified procedures within the site concept of operations (CONOP) that outline the security requirements for that system. The SOP shall be approved by the ISSM and include, at minimum, the following:

·         Appropriate hardware marking requirements. For example, the unclassified facsimile must be clearly marked for the transmission of unclassified information only and must have consent to monitor stickers.

·         Segregation from classified systems and media.

·         Point of Contact authorized to monitor operations.

·         A FAX cover sheet or equivalent will accompany each FAX transmission. This cover sheet will contain:

·         The number of pages transmitted;

·         The signature of the official approving the FAX transmission;

·         The classification level of the overall information being transmitted;

·         The sender's name and telephone number; and

·         The intended recipient's name and telephone number.

·         Audit logs will be used to record the transmission of any data over a FAX connected to a STU-III/STE.  These logs will be maintained for one year and must include the following information:

·         User ID;

·         Date and time of FAX transmission;

·         The classification level of the information; and

·         The recipient's name, organization and telephone number.

·         The ISSM will require the following minimum information to make an appropriate evaluation:

·         Building/Room Number FAX is located;

·         FAX manufacture/model number;

·         FAX Serial number;

·         Verification that the SSO has authorized the introduction of the equipment; and

·         Point of Contact's name and phone number.

·         The following information should be documented and maintained with SCIF records:

·         location and/or location changes;

·         justification;

·         standard operating procedures;

·         identification of equipment (manufacturer, model, serial number, etc);

·         verification of SSO authorization;

·         approval level (matches the STU-III key); and

·         point of contact information.

16.3.1.1.5. (U) FAX Accreditation. All facsimile machines within a SCIF must be accredited by the site ISSM, or be previously accredited by the DAA Rep/SCO. All documentation and approval letters must be maintained with SCIF records.

16.3.2. (U) Computer-FAX/Modem Connectivity. A computer-FAX/modem provides a means for a computer to communicate data via telephone modem along a wired path to a distant end.

16.3.2.1. (U) Unclassified Computer-FAX/Modem Accreditation Approval. An SSAA/SSP, fully documenting the computer equipment to be used, shall be submitted to the ISSM. The SSAA/SSP will be processed via the SSO and ISSM for approval.

16.3.2.2. (U) Physical Disconnect of Unclassified Computer-FAX/Modems. The use of acoustic coupled modems is prohibited. Therefore, the physical disconnect of unclassified computer-FAX/modem equipment from the phone lines is not required.

16.3.3. (U) Computer-Modem Connectivity.

16.3.3.1. (U) Unclassified Computer-Modem Connectivity. Access to Commercial Internet Service Provider (ISP).  “Dial-out” computer or data terminal access can only be to those unclassified systems deemed mission essential and approved in writing by the DAA Rep/SCO.  Connectivity of unclassified systems to unclassified networks that are outside of SCIFs can pose a significant security risk.

16.3.3.1.1. (U) ISP Connectivity.  The following procedures and guidelines pertain to those systems connected to networks which make it possible to connect to, or communicate with, any non-DoD IS.

16.3.3.1.1.1. (U) The system should be configured to present an unfavorable environment to any attacker, whether internal or external.  The system should have only the functionality required for mission accomplishment. All other unnecessary services should be eliminated.

16.3.3.1.1.2. (U) The IS should use available auditing techniques to the fullest extent possible, to ensure the system is not compromised by attacks.  Attacks may occur from across the network or from a legitimate system user. The System Administrator (SA) shall monitor audit logs regularly (preferably daily) and investigate any abnormalities which may indicate a security compromise.  Any attacks detected against Government systems will be classified Confidential (at a minimum) and reported in accordance with Chapter 8.

16.3.3.1.1.3. (U) SA's should monitor all available resources that provide warnings of system vulnerabilities or on-going network attacks.  Examples include advisories from the military service Computer Emergency Response Teams (CERT) (i.e., Air Force (AF) AFCERT, Navy NAVCIRT [Computer Incident Response Team], Army ACERT), and Automated Systems Security Incident Support Team (ASSIST) bulletins from the Defense Information Systems Agency (DISA).

16.3.3.1.2. (U) IS to IS Connectivity. The following procedures and guidelines deal with those systems connected only to independent IS systems, either point-to-point or within a community of interest (COI).

16.3.3.1.2.1. (U) The system should be configured to present an unfavorable environment to any attacker, whether internal or external.  The system should have only the functionality required for mission accomplishment, eliminating unnecessary services.

16.3.3.1.2.2. (U) The IS should use available auditing techniques to the fullest extent possible, to ensure the system is not compromised by attacks.  Attacks may occur from a legitimate system user. The System Administrator (SA) shall monitor audit logs regularly (preferably daily) and investigate any abnormalities which may indicate a security compromise.  Any attacks detected against Government systems will be classified Confidential (at a minimum) and reported in accordance with Chapter 8.

16.3.3.1.2.3. (U) SA's should monitor all available resources that provide warnings of system vulnerabilities or ongoing attacks from connected IS.  Examples include advisories from the military service Computer Emergency Response Teams (CERT) (i.e., Air Force (AF) AFCERT, Navy NAVCIRT [Computer Incident Response Team], Army ACERT), and Automated Systems Security Incident Support Team (ASSIST) bulletins from the Defense Information Systems Agency (DISA).

16.3.3.2. (U) Classified Computer-Modem Connectivity. The only mechanism for using a modem with classified communications is by first using NSA certified encryption mechanisms.  Approval for such connections must be obtained from the DAA Rep/SCO.

16.3.3.3. (U) Classified Computer-STU-III/STE Data Port Connectivity. The following procedures and guidelines are established for using the data port of a STU-III/STE terminal and apply to all STU-III/STE users.

16.3.3.3.1. (U) STU-III Data Port Connectivity within a SCIF. Requests for STU-III/STE data port connections will be submitted to, and evaluated by the DAA Rep/SCO, on a case-by-case basis. An SSAA/SSP shall be submitted to the appropriate DAA Rep/SCO in accordance with Chapters 3 and 4 as applicable.

16.3.3.3.2 (U) Identification and Authentication. The STU-III/STE is designed to prevent disclosure of information while it is being transmitted. Authorized users must verify the identity and clearance level of the distant party. Access to a host IS must not be made using auto-answer capabilities unless the host IS enforces access controls for the connection separate from the communications link controls.

16.3.3.3.3. (U) Connectivity Requirements.

·         For all connections of an IS or network to a STU-III/STE, the STU-III Security Access Control system (SACS) must be employed. Exceptions may be granted by the DAA Rep/SCO.

·         The associated STU-IIIs/STEs must be keyed to the appropriate level to protect the data contained in the ISs.

·         Community of Interest. All connected ISs using the STU-III/STE data port in a COI must be identified and accredited with identical Accredited Security Parameters (ASP) (classification levels, compartments, caveats, and mode of operation).

16.3.3.3.4. (U) Connectivity Restrictions. For all connections of an IS to a STU-III/STE data port, the following restrictions apply:

·         Use of the STU-III/STE in the non-secure data mode is prohibited.

·         Use of the STU-III/STE data port feature will be limited to connectivity of a specific set of STU-III/STE terminal units and ISs called a COI.

·         The cable connecting an IS to a STU-III/STE data port must be installed in accordance with the National TEMPEST technical requirements.

 


 

CHAPTER 17

INTERCONNECTING INFORMATION SYSTEMS

 

17.1. (U) PURPOSE. This chapter describes policies, issues, and guidance for manual as well as automated processes that can be used to process and move sanitized and collateral information across these boundaries.  The primary emphasis in managing information to support the war-fighter is to push information out of the SCI-controlled security domains into collateral security domains.

17.2. (U) SCOPE. These procedures are effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

YES

DESIGN PHASE

YES

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

NO

 

17.3. (U) DISCUSSION. Policy requires that SCI information be safeguarded during all phases of operation, processing or storage on Information Systems (IS). This is required for individual ISs as well as ISs that are connected, particularly when operating at different levels. Different levels refers to two security domains which differ in some component of classification level, including respective compartments, sub-compartments, caveats, control markings or special handling marking.  Different levels can also refer to the users (their security clearances, accesses, or need-to-know) of each respective system and the related Levels of Concern (LOC), Protection Level (PL), and the respective technical features implemented within each IS and security domain.  When at least one system processes SCI, inter-domain connections will follow the TOP SECRET And Below Interoperability (TSABI) accreditation process.

17.3.1. (U) Interconnected Information Systems. Interconnected IS are composed of separately accredited ISs.  Whenever separately accredited IS are interconnected, each DAA shall review the security attributes of each system to determine additional security requirements to be imposed.  Such a determination will be based on: the technical operating level of each system (LOC/PL); the classification level of the information on each system; or the combination of users who have access to the respective IS. Respective DAAs shall document the interconnection requirements as part of the accreditation for the interconnected systems. Such interconnection determination also applies to support architecture connections, e.g., between networks.

17.3.2. (U) Inter-Domain Connections. When two different ISs are connected and the IS operate at different levels, the connection is an inter-domain connection. Any inter-domain connection, whether between IS or between networks, will comply with DCID 6/3, Section 7.B, Controlled Interface requirements, to provide appropriate confidentiality and integrity adjudication. The accreditation shall follow the TSABI process.

17.3.3. (U) Controlled Interface. The controlled interface requirements may be met by the IS devices themselves, or by a separate device or system added between two domains.  Any IS or specific device (or combination) which facilitates the connection between two security domains, IS or networks, is considered a controlled interface.  The specific requirements imposed on a controlled interface are highly dependent upon the expected flow of information between the two domains.  All controlled interfaces have common requirements to maintain the integrity of the critical processes that control the information flow across the connections.  These mandate physical protection of the controlled interface, preventing users from modifying the capabilities of the controlled interface, monitoring usage, and monitoring the interface for failure or compromise.  In general, any protocols or services, which are not explicitly authorized, should be denied.

17.3.3.1. (U) One-Way Connections.  When information flows in only one direction, the controlled interface requirements may be simplified, but are no less important.  A controlled interface used in connection with controlling information flow in only one direction will shut off services and data flow in the reverse direction.  The controlled interface may provide automated formatted or pre-determined acknowledge/non-acknowledge messages which do not contain any substantive information to the source IS, without altering the designation as a one-way controlled interface.

 

17.3.3.1.1. (U) Equal Classification Connections. Connections between ISs or networks of equal classification occur when security domain levels are the same, but are maintained separate for other reasons, e.g. system technical features implemented on the respective IS or the set of users (their security clearances, accesses, or need-to-know).

17.3.3.1.2. (U) Low-to-High Connections. The information being passed from the low side will not have a confidentiality requirement; but the controlled interface will have to maintain the confidentiality of information at the high side from any exposure to the systems or users on the low side. The primary concern of a low-to-high connection is allowing information to flow without significant impairment but with appropriate integrity controls to protect the high side IS and their data. As more unstructured data types are identified for transfer, it becomes more difficult to prevent malicious code from being passed along with the desired information.

17.3.3.1.3. (U) High-to-Low Connections.  The primary requirement for high-to-low connections is to protect the confidentiality of information that is not authorized for transfer to the low side. All information being transferred out of a domain, which has classified information which should not be passed across the boundary, will require a process that makes the determination on releasability. The processes that make this determination are called reliable review processes. These processes may be manual (reliable human review), automated (for highly formatted, integrity-wrapped, or reliably labeled information), or a combination depending upon the type and format of the data.

17.3.3.1.4. (U) Other Unequal Classification Level Connections. Sometimes, there is no real high/low relation between two domains, but simply a difference in information where separate data owners on each side of a connection have their own unique requirements.  In this instance, each side is responsible for establishing the confidentiality controls and restrictions for review and release of information to the other side.

17.3.3.2. (U) Dual-Direction Connections. When information is expected to flow in both directions, the requirements of both low-to-high, high-to-low, and other equal or unequal level connections must be combined within the implementation of the controlled interface.

17.3.3.3. (U) Multi-Domain Connections. Some controlled interface devices are designed to provide support for connections between more than two domains simultaneously.  The implementation for these connections should comply with the requirements for all of the individual combinations of paired connections within the controlled interface device (e.g., three domains have three connection pairs, four domains have six connection pairs, etc.).

17.3.4. (U) Review Procedures. Review procedures for all data transfers are discussed in further detail in 18.3.1.

17.3.4.1. (U) Reliable Human Review. Human review of information has to meet two aspects to be sufficient. First, a review of the information content to validate that it meets criteria for transfer across the domain boundary. Second, a technical review of the information as assembled to ensure that information normally hidden within a presentation is also authorized for transfer across the domain boundary. Any human review process conducted with an IS implements a combination of system capabilities to allow the human to conduct a review of the information.  Presentation applications will help the human review data in its presentation form (e.g., a picture looks like a picture). Sometimes these applications will also meet the criteria for technical review by showing data in alternate forms including appended information. If these applications do not have this capability, then other applications may be required to complete technical data reviews. Because a human is interacting with automated processes to conduct reviews, the information being reviewed should have an integrity feature that validates that the review process does not alter the information being reviewed. This added capability is what makes the human review a reliable human review. Integrity and accountability requirements on the reliable human review process will require strong control of the information through the review process and control and accountability for the users associated with the reliable human review.

17.3.4.2. (U) Automated Review. When information is highly formatted, integrity-wrapped, or reliably labeled information, some automated processing may aid a human or may even make the decisions instead of a human. For automation to eliminate the reliable human review, the automated processes need to emulate all activities which would be performed by a human. When the information is not highly formatted, human review will still be required.


 

CHAPTER 18

 

INFORMATION TRANSFER AND ACCOUNTING PROCEDURES

 

18.1. (U) PURPOSE. This chapter outlines procedures for the transfer of information or software among Information Systems (ISs) of different classification levels using information storage media. The procedures are intended to protect the confidentiality of information on the media as well as other data on the end-point IS at different levels, prevent transfers of malicious code (Chapter 10 is germane), and prevent violation of legal copyright or license rights.

18.2. (U) SCOPE. These procedures are effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

NO

DESIGN PHASE

NO

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

YES

18.3. (U) PROCEDURES.  This chapter outlines procedures for the transfer of classified information at varying levels to Information Systems (ISs) of different classification levels. For any system that operates with PL-3 and below functionality, media which is placed into that system must be classified at the highest level of information on the system until reviewed and validated. The following address proper classification determination during the access and transfer process.

18.3.1. (U) Reliable Human Review of Data. Human review is a process of validating the classification of data (classification level, compartments, sub-compartments, caveats, control markings or special handling marking) when it is stored or moved from an IS.  Human review may be required for validating data classification for hardcopy prints (from systems with less than PL-4 labeling functionality), data being transferred to media, or manual transfers between security domains.

18.3.1.1. (U) Human review of information has to meet two criteria to be sufficient: a review of the information content to validate the actual classification level of the data, and a review of embedded or hidden information that is part of the data.

18.3.1.2. (U) Human review requires an individual who is knowledgeable of the subject matter to inspect the contents and provide validation of the data classification. This individual has to be able to see the information in its presentation form to make this determination.

18.3.1.3. (U) Information in its presentation form does not always show embedded or hidden data.  This data may require a different process or application (or tools) to reveal the hidden data for the human review.

18.3.1.3.1. (U) Many users do not realize that DOS computers often store data on media in fixed length blocks, segments, or tracks. Because data records do not always fill the available space, residual information from memory is appended to the data record. The content of this information is unpredictable and may contain classified or other information from unrelated processes.

18.3.1.3.2. (U) Residual data that exists within information stored in memory gets copied as part of the data whenever it is duplicated.

18.3.1.4. (U) There are tools that can aid the human as he conducts the review process. Automated tools (e.g., BUSTER) can aid in the review of large amounts of data. A review of data is more reliable if it includes both a human review and review using automated tools. Reviews should not rely solely on an automated review unless the automated review process is approved by the appropriate DAA.

18.3.1.5. (U) Because a human is interacting with automated processes to conduct reviews, the information being reviewed should have an integrity feature so that the review process does not alter the information being reviewed. For example, write protect media before the information review.

18.3.1.6. (U) Reliable Human Review is the combination of the data content review, review for hidden data, and integrity controls applied to the information.

18.3.1.7. (U) A reliable human review may be a required component of a GUARD or Controlled Interface.  Integrity and accountability requirements on the reliable human review process will require strong control of the information and its integrity through the review process, and added controls for accountability for the users associated with the reliable human review.

18.3.2. (U) Media Transfers In/Out of an Organization. All personnel will process outgoing media or report the receipt of media through the ISSM/ISSO or his/her designee before shipment out or use of such media. To ensure the correct classification (including unclassified) and appropriate labeling is being used, conduct reliable human review of 100% of information on the media.  During the reliable human reviews, media should be write-protected so that no changes can occur. Identification of incorrect write protection requires installation of correct write protection and then proper conduct (or repetition) of the reliable human review. Virus policy prohibits movement of floppy disks between systems unless appropriate scanning procedures are implemented. If any problems are found, the media is not to be transferred or used, and appropriate reports will be generated and provided to the ISSM/ISSO. If the media is to be subsequently accounted for, make appropriate entries in the organization media accounting system.

18.3.3. (U) Disposition of Excess or Obsolete COTS Software. Software may be reused or released for resale only if:

·         The software is still in its original unopened shipping wrapper.

·         The user has personal knowledge that the software is not classified and is documented accordingly.

If the user cannot substantiate that the software is not classified, then he/she must ensure classified reutilization within the agency or organization or destruction by approved methods, as appropriate. Do not return the software to the issuing authority if it cannot be reused.

18.3.4. (U) High-to-Low Data Transfer by Media. This section addresses use of media to transfer information from a higher classified system to a lower classified system or a system with a different Accredited Security Parameters (ASP), including Unclassified.  The procedures will differ based on the system capabilities present for different PL levels.

18.3.4.1. (U) PL-3 and Below Functionality. A local SOP must be written to outline the steps to protect the information when transferring data. The following general steps will be identified in the procedures and followed accordingly:

·         The DAA Rep/SCO and ISSPM/ISSM must approve the procedures and individuals involved.

·          Each transfer must be approved on a case-by-case basis by the ISSM/ISSO or designee.

·         The media to be used in the process must be new.

·         The information to be transferred is placed on the media. Then the media should be write-protected.

·         Perform a reliable human review of 100% of the information as stored on the media to verify its classification level.

·         Perform scanning of the media for viruses.

·         Remove, validate write-protection and mark the media at the appropriate classification level as determined by the human review.

·         The media may now be handled as marked.

18.3.4.2. (U) PL-4 and Above Functionality. A local SOP must be written to outline the steps to protect the information when transferring data. The following general steps will be identified in the procedures and followed accordingly:

·         The DAA Rep/SCO and ISSPM/ISSM must approve the procedures and individuals involved.

·         The media to be used in the process must be new.

·         Copy the information to the media.

·         Perform scanning of the media for viruses.

·         Remove, write protect, and mark the media at the appropriate classification level (trusted from the PL-4 and above system).

·         The media may now be handled as marked.

18.3.5. (U) Low-to-High Data Transfer by Media. This section addresses use of media to transfer information from a lower classified system, including unclassified, to a higher classified system or a system with a different ASP. A local SOP must be written to outline the steps to protect the media and systems involved when transferring data. One obvious reason for these procedures is to permit unclassified software such as Lotus and dBase to be installed into an IS containing classified information without requiring the media to become classified.

·         The DAA Rep/SCO and ISSPM/ISSM must approve the procedures and individuals involved.

·         The media to be used in the process must be new or an approved transfer disk that has been virus checked.

·         Transfer information onto the media.

·         Perform scanning of the media for viruses.

·         When possible, ensure the transfer media is adequately write-protected if it is to remain classified at the lower level.

·         If the write-protect mechanism on the media is securely maintained, the media may remain at its lower classification level (the factory-write protect mechanism on a diskette is adequate).

·         If the write protect mechanism is not correctly maintained, the media must be marked and handled at the highest classification level with the most restrictive handling caveats of the information processed by the IS.

·         Before transferring information to the higher classified system, perform scanning of the media for viruses.

·         Transfer the data from the media to the higher classified IS.

·         Following transfer, examine the write-protect device to validate that it is still securely intact.

Note: If the write protect is not maintained, then reclassify the media at the level of the target system.

18.3.6. (U) Demonstration Software. Floppy diskettes and removable hard disks used for demonstrations, with the intent of being returned to a vendor, must be processed on a computer that has never processed or stored classified data. Otherwise, the demonstration media cannot be released back to the vendor and should be destroyed. If returned to the vendor, a fully cleared and indoctrinated individual must verify that the media was used only in an unclassified computer.

 


 

CHAPTER 19

 

MULTI-POSITION SWITCHES

 

19.1 (U) PURPOSE.  The purpose of this chapter is to provide the policy and procedures outlining the minimum requirements for the management of multi-position switches. This policy applies to all elements that use multi-position switches to share a common keyboard, mouse and monitor between different CPU's. These CPU's may process, store, produce, or transmit information of different classifications, compartments, sub-compartments, code words or releasability.

 

19.2. (U) SCOPE. This chapter states the policy for Key Board/Video/Mouse (KVM) or Key Board/Monitor/Mouse (KMM) Switches used to connect systems operating at different classification levels, compartments, sub-compartments, caveats, control markings or special handling marking under the cognizant security authority of DIA/NSA including those of contractors. This policy does not restrict the use of these types of devices based on the sensitivity of the information or levels of classification of the data processed on the CPU's that are shared. This policy applies to all individuals who have authorized access to these devices on the systems they use.  Not all users are approved for this type of access, and this policy does not provide that approval or countermand in any way any restrictions already placed on the user for the use of these devices.

 

These procedures are effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

YES

DESIGN PHASE

YES

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

YES

 

19.3. (U) POLICY.  Only KVM switches on the DIA Standard Products List for SCIFs accredited by DIA and KVM switches on the NSA Network Enterprise Solutions (NES) approved products list for SCIFs accredited by NSA shall be used within corresponding SCIFs when sharing a Key Board, Video Monitor or Mouse between CPUs at different classification levels.  KVM switches currently in use that do not meet tempest or AIS requirements must be replaced with DIA/NSA approved switches by 31 December 2001.  Authorizations are required from the DAAs of the respective systems when using a KVM switch to share the Key Board, Video Monitor, or Mouse.  The DAAs are DIA for JWICS, NSA for NSANET, and the Defense Information Systems Agency (DISA) for NIPRnet and SIPRnet.  The use of switchboxes for print services between classification levels is prohibited.  Switchboxes may be used between the same classification levels for print services.

19.4. (U) RESPONSIBILITIES.

19.4.1. (U) DAA Rep.

·         Ensure all authorizations from DAAs of respective systems are obtained.

19.4.2. (U) ISSM.

·         Maintain the KVM Switch User Agreements files.

·         The ISSM will verify that the user has the necessary training and complies with the requirements for the introduction and use of multi-position switches.

19.4.3. (U) ISSO/System Administrator.

·         Ensure that the systems are approved by the configuration Management Board.

·         Ensure that the systems are installed correctly and meet all TEMPEST Standards.

·         Ensure the desktop banners, backgrounds, and screen locks have the proper classification banner.

19.4.4. (U) User.

·         Protect the Information System and KVM in your area.

·         Report any spillage of classified information in accordance with the JDCSISSS.

·         Safeguard and report any unexpected or unrecognized computer output, including both displayed or printed products in accordance with JDCSISSS.

·         Use different passwords on each system connected through a KVM.

·         Ensure that the classification level is displayed by each systems screen lock and that the password is required to regain entry to the system.

·         Ensure that the systems screen lock is invoked if the system is left unattended of if there is a 15-minute period of inactivity for each system.

·         Responsible for marking/maintaining magnetic media IAW Chapter 13 of JDCSISSS.

19.5. (U) AIS REQUIREMENTS.  The introduction and use of multi-position switches in a SCI environment presents a moderate degree of risk to classified or sensitive information and systems.  Therefore, all users will be responsible for the management of these devices. To minimize the risk of inadvertently entering information onto the wrong network, the following requirements must be met.

19.5.1. (U) Labels.  All information systems components must be labeled in accordance with DCID 6/3, Paragraph 8.B.2 (a and b).  All switch positions, cables, and connectors must be clearly marked with the appropriate classification labels.

19.5.2. (U) Desktop Backgrounds.  To avoid inadvertent compromises, systems joined by multi-position switches will utilize desktop backgrounds that display classification banners at the top or bottom.  The classification banner will state the overall classification of the system in large bold type, and the banner background will be in a solid color that matches the classification (SCI - yellow, Top Secret - orange, Secret - red, Confidential - blue, Unclassified - green).  When systems have a similar classification level, but require separation for releasability or other constraints, use of unique colors for the different systems is permissible.

19.5.3. (U) Screen Locks.  Screen Lock applications must display the maximum classification of the system on which the system is currently logged into and shall implement a lockout feature to re-authenticate the user.

19.5.4. (U) Smart Keys/Permanent Storage Medium. Systems using KVM switches must not employ “smart” or memory enhanced/data retaining keyboards, monitors or mice. These types of interfaces provide memory retention that creates a risk of data transfer between systems of different classifications.

19.5.5. (U)  Hot Key Capability. Switches that support "Hot-Key" capability to switch, toggle or otherwise affect the switching between CPUs are prohibited.

19.5.6. (U) Scanning Capability.  Switches with the ability to automatically scan and switch to different CPUs are prohibited.

19.5.7. (U)  Wireless or Infrared Technology.  Systems using KVM switches must not use keyboards or mice with wireless or infrared technology

19.5.8. (U) Unique Password Requirement. At a minimum, users must ensure that they use different/unique passwords for each system connected through a multi-position switch.  Whenever possible, system administrators should employ different logon USERIDs to help users further distinguish between the systems.

19.5.9. (U) Data Hierarchy.  Data of a higher classification must not be introduced to a system of a lower classification.

19.5.10. (U) Security CONOPS. A site with a requirement for multi-position switches must include the KVM procedures within the site's Security Concept of Operations (SECONOPS).  The approval authority will be the Site ISSM.

19.5.11. (U) Training.  ISSMs/ISSOs/Supervisors will ensure user training and compliance to the requirements associated with the introduction and use of multi-position switches.

19.5.12. (U) TEMPEST.  Blanket approval to install keyboard, video, mouse (KVM) switches is granted within DIA accredited Sensitive Compartmented Information Facilities (SCIFs) located within the US and meeting NSTISSAM TEMPEST/2-95A, 3 Feb 00, recommendation “I” (having 100 meters of inspectable space) as defined by the SCIF's TEMPEST accreditation document from DIA/DAC-2A.  Blanket approval to install keyboard, video, mouse (KVM) switches is granted within NSA accredited Sensitive Compartmented Information Facilities (SCIFs) located within the US and meeting NSTISSAM TEMPEST/2-95A, 3 Feb 00, Zones C and D having more than 100 meters of inspectable space.  Prior approval is required for overseas facilities and all other recommendations.

 

19.5.13. (U) Procedures for LOGON/Switching Between Systems.

Logging on to systems.

·         Identify the classification of the system currently selected.

·         Use the login and password appropriate to that system.

·         Verify the classification of the present system by checking the classification label.

·         Begin processing.

Switching between systems.

·         Select desired system with the multi-position switch.

·         Verify the classification of the present system by checking the classification label.

·         Begin processing at the new classification level.

EXCEPTIONS.  Any exception to this policy requires approval of the DAA Rep responsible for the Certification/accreditation of systems in your SCIF.

19.6. (U) KVM SWITCH USER AGREEMENT. The user agreement (Figure 19-1) documents training and certification for personnel using the KVM switch.

 


KVM USER AGREEMENT

FORM

1. (U) KVM SWITCH USER AGREEMENT. The user agreement documents training and certification for personnel using the KVM switch.

1.1. (U) Procedures for LOGIN and Switching Between Systems.  This process must be performed for each switch between systems. When the DoDIIS system is not selected, it is required to be screenlocked.    

1.1.1. (U) Logging Onto a System.

·         Identify the classification of the system currently selected

·         Use the login and password(s) appropriate to that system

·         Verify the classification of the present system by checking the classification label

·         Begin Processing

1.1.2. (U)  Switching Between Systems.

·         For DoDIIS systems, screenlock the system you are currently working on. For NSA systems, ensure that each system's screenlock is invoked if there is a 15 minute period of inactivity.

·         Select desired system with the KVM switch.

·         Enter your user id and password to deactivate the screen lock.

·         Verify the classification of the present system by checking the classification label.

1.1.3. (U) Logging Off of a System.

·         Close all applications processing on the active system

·         Logout of the system when processing in no longer required on the system

·         Logout of system at the end of duty day

1.2. (U) A weekly inspection of tamper seals (if any) will be performed by the user.

1.3. (U) Any suspected tampering and/or mishandling of KVM will be reported to your site ISSM.

 

 

Printed Name of User

 

__________________________________________________                          

 

Signature  ____________________________            Date     __________________

 

The above individual has received the necessary training and has complied with the requirements for application and use of KVM switches

 

Printed Name of ISSM

 

__________________________________________________                          

 

Signature  ____________________________            Date     __________________

 

 

FIGURE 19.1 (U) KVM SWITCH USER AGREEMENT FORM.


 

CHAPTER 20

 

CLEARING, SANITIZING, AND RELEASING COMPUTER COMPONENTS

 

20.1. (U) PURPOSE.  The purpose of this chapter is to provide guidance and procedures to clear and sanitize magnetic storage media that is no longer useable, requires transfer, or should be released from control.  These procedures apply to all Information Systems (IS) containing electronic, electromagnetic, electrostatic, or magnetic storage media.  For clarification, Magnetic storage media is considered to be any component of a system which, by design, is capable of retaining information without power.

20.2. (U) SCOPE.  These procedures are effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

NO

DESIGN PHASE

NO

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

YES

20.3. (U) RESPONSIBILITIES.  The Information Systems Security Manager (ISSM) is responsible for the security of all ISs and media assigned to the organization and under his/her purview.  To protect these assets, he/she must ensure the security measures and policies contained within this chapter are followed.  Additionally, the ISSM will publish supplemental organizational procedures (Standard Operating Procedures [SOPs], etc.), if needed, to implement the requirements herein.

20.4. (U) PROCEDURES.  The procedures contained below meet the minimum security requirements for the clearing, sanitizing, releasing, and disposal of magnetic media as well as guidance for other types of information storage media.  These procedures will be followed when it becomes necessary to release magnetic media, regardless of classification, from Sensitive Compartmented Information (SCI) channels.  Media that has ever contained SCI, other intelligence information, or Restricted Data can not be sanitized by overwriting; such media must be degaussed before release.

20.4.1. (U) Review of Terms. To better understand the procedures contained herein, it should be understood that overwriting, clearing, purging, degaussing, and sanitizing are not synonymous with declassification. The following are definitions:

20.4.1.1. (U) Clearing. Clearing is the process of removing information from a system or the media to facilitate continued use and to preclude the AIS system from recovering previously stored data. In general, laboratory techniques allow the retrieval of information that has been cleared, but normal operations do not allow such retrieval. Clearing can be accomplished by overwriting or degaussing.

20.4.1.2. (U) Sanitizing (Also Purging).  Sanitizing is the process of removing information from the media or equipment such that data recovery using any known technique or analysis is prevented.  Sanitizing shall include the removal of data from the media, as well as the removal of all classified labels, markings, and activity logs.   In general, laboratory techniques cannot retrieve data that has been sanitized/purged.  Sanitizing may be accomplished by degaussing.

20.4.1.3. (U) Destruction. Destruction is the process of physically damaging media so that it  is not usable and there is no known method of retrieving the data.

20.4.1.4. (U) Declassification. Declassification is an administrative process used to determine whether media no longer requires protection as classified information.  The procedures for declassifying media require Designated Approving Authority (DAA) Representative (Rep) or Service Certifying Organization (SCO) approval.

20.4.1.5. (U) Periods Processing. Provided the sanitization procedures between each protection level segment have been approved by the DAA Rep/SCO based on guidelines from the data owner(s) or responsible official(s), the system need meet only the security requirements of each processing period, while in that period. If the sanitization procedures for use between periods are approved by the DAA Rep/SCO, the security requirements for a given period are considered in isolation, without consideration of other processing periods.  Such sanitization procedures shall be detailed in the SSAA/SSP.

20.4.2. (U) Overwriting Media. Overwriting is a software process that replaces the data previously stored on magnetic storage media with a predetermined set of meaningless data.  Overwriting is an acceptable method for clearing. However, the effectiveness of the overwrite procedure may be reduced by several factors: ineffectiveness of the overwrite procedures, equipment failure (e.g., misalignment of read/write heads), or inability to overwrite bad sectors or tracks or information in inter-record gaps. Software overwrite routines may be corrupted by hostile computer viruses. Overwriting is not an acceptable method to declassify media.

20.4.2.1. (U) Overwriting Procedure. The preferred method to clear magnetic disks is to overwrite all locations with a pseudo-random pattern twice and then overwrite all locations with a known pattern.

20.4.2.2. (U) Overwrite Verification. The overwrite procedure must be verified by the ISSM or his/her designee.

20.4.3. (U) Degaussing Media. Degaussing (i.e., demagnetizing) is a procedure that reduces the magnetic flux on media virtually to zero by applying a reverse magnetizing field.  Properly applied, degaussing renders any previously stored data on magnetic media unreadable and may be used in the sanitization process. Degaussing is more effective than overwriting magnetic media.

20.4.3.1. (U) Magnetic Media Coercivity. Magnetic media is divided into four types (I, II, IIA, III) based on their coercivity. Coercivity of magnetic media defines the magnetic field necessary to reduce a magnetically saturated material's magnetization to zero.  The level of magnetic media coercivity must be ascertained prior to executing any degaussing procedure.

20.4.3.2. (U) Types of Degausser.  The individual performing the physical degaussing of a component must ensure that the capability of the degausser meets or exceeds the coercivity factor of the media, and that the proper type of degausser is used for the material being degaussed.  The four types of degaussers are:

·         Type I. Used to degauss Type I media (i.e., media whose coercivity is no greater than 350 Oersteds [Oe]).

·         Type II.  Used to degauss Type II media (i.e., media whose coercivity is no greater than 750 Oe). 

·         Type IIA.  Used to degauss Type IIA media (i.e., media whose coercivity ranges from 751 to 900 Oe).

·         Type III.  Used to degauss Type III media (i.e. media whose coercivity ranges from 901 to 1700 Oe).  Currently, there are no degaussers that can effectively degauss all Type III media. Some degaussers are rated above 901Oe, and their specific approved rating will be determined prior to use.

20.4.3.3. (U) Degausser Requirements.  Refer to the current issue of the National Security Agency (NSA) Information Systems Security Products and Services Catalogue (Degausser Products List Section), for the identification of degaussers acceptable for the procedures specified herein.  These products will be periodically tested to assure continued compliance with the appropriate specification.  National specifications provide a test procedure to verify continued compliance with the specification.

20.4.3.4. (U) Use of a Degausser. Once a degausser has been purchased and has become operational, the gaining organization must establish a SOP explaining how it will be used.  The degausser must be certified annually.

20.4.4. (U) Sanitizing Media. Tables 20-1 and 20-2 provide instructions for sanitizing data storage media and system components.

TABLE 20.1. (U) SANITIZING DATA STORAGE MEDIA

MEDIA TYPE

PROCEDURE(S)

 

 

Magnetic Tape

 

Type I

a or b

Type II,IIA

b

Type III

Destroy

 

 

Magnetic Disk Packs

 

Type I

a or b

Type II,IIA

b

Type III

Destroy

 

 

MEDIA TYPE

PROCEDURE(S)

 

 

Magnetic Disks

 

Floppies

a or b, then Destroy

Bernoullis

Destroy

Removable Hard Disks

a or b

Non-Removable Hard Disks

a or b

 

 

Optical Disks

 

Read Only (including CD-ROMs)

Destroy

Write Once, Read Many (WORM)

Destroy

Read Many, Write Many

Destroy

 

 

PROCEDURES

These procedures will be performed or supervised by the ISSO.

a.  Degauss with a Type I degausser.  See 20.4.3.2.

b.  Degauss with a Type II, IIA degausser.  See 20.4.3.2.

 

 

 

TABLE 20.2. (U) SANITIZING SYSTEM COMPONENTS

 

TYPE OF COMPONENT

PROCEDURE(S)

 

 

Magnetic Bubble Memory

a or b or c

Magnetic Core Memory

a or b or d

Magnetic Plated Wire

d or e

Magnetic-Resistive Memory

Destroy

 

SOLID STATE MEMORY COMPONENTS

 

Dynamic Random Access Memory (DRAM) (Volatile)

e and i

if RAM is functioning

d, then e and i

if RAM is defective

f, then e and i

Static Random Access Memory (SRAM)

j

Programmable ROM (PROM)

Destroy (see h)

Erasable Programmable ROM (EPROM/UVPROM)

g, then c and i

Electronically Erasable PROM (EEPROM)

d, then i

Flash EPROM (FEPROM)

d, then i

 

PROCEDURES

These procedures will be performed or supervised by the ISSO.

a.  Degauss with a Type I degausser.

b.  Degauss with a Type II,IIA degausser.

c.  Overwrite all locations with any random character.

d.  Overwrite all locations with a random character, a specified character, then its complement.

e.  Remove all power, including batteries and capacitor power supplies from RAM circuit board.

f.   Perform three power on/off cycles (60 seconds on, 60 seconds off each cycle, at a minimum).

g.  Perform an ultraviolet erase according to manufacturer's recommendation, but increase time requirements by a factor of 3.

h.  Destruction required only if ROM contained a classified algorithm or classified data.

i.   Check with the ISSPM/DAA Rep/SCO to see if additional procedures are required.

j.   Store a random unclassified test pattern for a time period comparable to the normal usage cycle.

 

20.4.5. (U) Destroying Media. Data storage media will be destroyed in accordance with DAA/DAA Rep/SCO approved methods.

20.4.5.1. (U) Expendable Item Destruction. Expendable items (e.g., floppy diskettes and hard drives) are not authorized for release and reuse outside of the SCI community after they have been degaussed (Table 20.1).  If these items are damaged or no longer deemed usable, they will be destroyed. When destroying, remove the media (magnetic mylar, film, ribbons, etc.) from any outside container (reels, casings, hard cases or soft cases, envelopes, etc.) and dispose of the outside container in a regular trash receptacle.  Cut the media into pieces (a crosscut chipper/shredder may be used to cut the media into pieces) and then burn all pieces in a secure burn facility or pulverize to 25mm (3/16-inch) specification.  If the Environmental Protection Agency (EPA) does not permit burning of a particular magnetic recording item, it will be degaussed, cut into pieces (a chipper/shredder preferred) and disposed of in a regular trash receptacle.

Note: Use of a burn bag does not necessarily mean that organizations actually burn. Many organizations have pulverization facilities that handle all burn bags.

20.4.5.1.1. (U) Below are the shipping instructions for destruction of other classified items to include floppy discs, typewriter ribbons, magnetic tapes that have been removed from the reels, film, viewgraphs, chips, circuit boards and paper.  Paperwork required is either an SF153 Destruction Form or a DD1149 (shipping document). POC is at NSA LL14, commercial (301) 688-5467/DSN 644-5467 (NSTS 972-2486);

 

COMSEC MATERIAL, send by regular mail to:

DIRNSA ATTN: LL14

Account #889999

Fort Meade, MD 20755-6000

 

NON-COMSEC MATERIAL CLASSIFIED UP TO AND INCLUDING SECRET, send by regular mail to:

National Security Agency

ATTN: CMC - LL14 - Suite 6890

9800 Savage Road

Fort George G. Meade, MD 20755-6000   

 

NON-COMSEC MATERIAL CLASSIFIED HIGHER THAN SECRET, send by DCS to:

449563 - BA20

Film Destruction Facility

20.4.5.2. (U) Destruction of Hard Disks and Disk Packs:

20.4.5.2.1. (U) Hard Disks. Hard disks are expendable items and are not authorized for release and reuse outside of the SCI community. Each item is considered classified to the highest level of data stored or processed on the IS in which it was used. If hard disks are damaged, or no longer deemed usable, they will be degaussed and then destroyed. If the platter(s) of the defective unit can be removed and the removal is cost effective, then destruction of a hard disk consists of dismantling the exterior case and removing the platter from the case then degaussing the platter. Techniques which remove the recording surface (grinding or chemical etching the oxide surface) prior to disposal do not enhance security and are unnecessary. They may be disposed of by using approved procedures for the destruction or disposal of unclassified metal waste.

20.4.5.2.2. (U) Shipping Instructions. Below are the shipping instructions for destruction of magnetic media, including cassette tapes, videotapes, hard discs, optical disks (including CDs) and magnetic tapes on reels. Paperwork required is either a DD1149 (shipping document) or 1295A (transmittal of classified material document).  POC is at NSA LL14, (301) 688-7631 DSN 644-7631 (NSTS 977-7249).

 

 CLASSIFIED UP TO AND INCLUDING SECRET, send by regular mail to:

National Security Agency

9800 Savage Road

Fort George Meade, MD 20755-6000

                                                  

SAB-3, Suite 6875

Attn:  LL14, Degaussing

 

 

CLASSIFIED HIGHER THAN SECRET, send via Defense Courier Service (DCS) to:

449276-BA21

DIRNSA, FT MEADE

Degaussing

 

CLASSIFIED EQUIPMENT UP TO AND INCLUDING SECRET, send by regular mail :

National Security Agency

9800 Savage Road

Fort George Meade, MD 20755-6000

 

SAB-4, Suite 6629

Attn: S713 Cleansweep

 

CLASSIFIED EQUIPMENT HIGHER THAN SECRET, send via Defense Courier Service (DCS) to:

449276-BA21

DIRNSA, FT MEADE

CLEANSWEEP

 

20.4.5.2.3. (U) Disk Packs.  Each item is considered classified to the highest level of data stored or processed on the IS in which it was used. If disk packs are damaged, or no longer deemed usable, they will be degaussed and then destroyed. Techniques which remove the recording surface (grinding or chemical etching the oxide surface) prior to disposal do not enhance security and are unnecessary.  They may be disposed of by using approved procedures for the degauss and destruction or disposal of unclassified metal waste.

20.4.5.2.4. (U) Optical Storage Media.  Optical mass storage, including compact disks (CD, CDE, CDR, CDROM), optical disks (DVD), and magneto-optical disks (MO) shall be declassified by means of destruction.  Optical media shall be destroyed by burning, pulverizing, or grinding the information bearing surfaces.  When material is pulverized or ground, all residue must be reduced to pieces sized 0.25mm (3/16-inch) or smaller.  Burning shall be performed in an approved facility certified for the destruction of classified materials; residue must be reduced to white ash.

20.4.6. (U) Malfunctioning Media. Magnetic storage media that malfunctions or contains features that inhibit overwriting or degaussing will be reported to the Information System Security Officer (ISSO)/System Administrator (SA). The ISSO/SA will coordinate the repair or destruction of the media with the ISSM and responsible DAA Rep/SCO. If the hard drive is under a warranty which requires return of the hard drive, dismantle the hard drive and return the case but do not send the platter to the manufacturer.

20.4.7. (U) Release of Memory Components and Boards. Prior to the release of any malfunctioning components proper coordination, documentation, and written approval must be obtained. This section applies only to components identified by the vendor or other technically-knowledgeable individual as having the capability of retaining user-addressable data; it does not apply to other items (e.g., cabinets, covers, electrical components not associated with data), which may be released without reservation. For the purposes of this chapter, a memory component is considered to be the Lowest Replaceable Unit (LRU) in a hardware device. Memory components reside on boards, modules, and sub-assemblies. A board can be a module, or may consist of several modules and sub-assemblies. Unlike magnetic media sanitization, clearing may be an acceptable method of sanitizing components for release (See Table 20-2). Memory components are specifically handled as either volatile or nonvolatile, as described below.

20.4.7.1. (U) Volatile Memory Components. Memory components that do not retain data after removal of all electrical power sources, and when re-inserted into a similarly configured system, are considered volatile memory components. Volatile components that have contained extremely sensitive or classified information may be released only in accordance with procedures developed by the ISSM, or designee, and documented in the SSAA/SSP. A record must be maintained of the equipment release indicating that, per a best engineering assessment, all component memory is volatile and that no data remains in or on the component when power is removed.

20.4.7.2. (U) Nonvolatile Memory Components. Components that do retain data when all power sources are discontinued are nonvolatile memory components. Some nonvolatile memory components (e.g., Read Only Memory (ROM), Programmable ROM (PROM), or Erasable PROM (EPROM)) and their variants that have been programmed at the vendor's commercial manufacturing facility, and are considered to be unalterable in the field, may be released. All other nonvolatile components (e.g., removable/non-removable hard disks) may be released after successful completion of the procedures outlined in Table 20-2.  Failure to accomplish these procedures will require the ISSM, or designee, to coordinate with the DAA Rep/SCO to determine releasability.

20.4.7.3. (U) Other Nonvolatile Media: Media that do retain data when all power sources are discontinued are nonvolatile media and include:

20.4.7.3.1. (U) Visual Displays. A visual display may be considered sanitized if no sensitive information is etched into the visual display phosphor.  The ISSO should inspect the face of the visual display without power applied.  If sensitive information is visible, destroy the visual display before releasing it from control. If nothing is visible, the ISSO/SA shall apply power to the visual display; then vary the intensity from low to high. If sensitive information is visible on any part of the visual display face, the visual display shall be destroyed before it is released from control.

20.4.7.3.2. (U) Printer Platens and Ribbons. Printer platens and ribbons shall be removed from all printers before the equipment is released.  One-time ribbons and inked ribbons shall be destroyed as sensitive material. The rubber surface of platens shall be sanitized by wiping the surface with alcohol.

20.4.7.3.3. (U) Laser Printer Drums, Belts, and Cartridges. Laser printer components containing light-sensitive elements (e.g., drums, belts, complete cartridges) shall be sanitized before release from control.

20.4.7.3.3.1. (U) Elements containing intelligence information shall be sanitized in accordance with the policy contained in the Director of Central Intelligence Directive (DCID) 1/21.

20.4.7.3.3.2. (U) Used toner cartridges from properly operating equipment that properly completed the last printing cycle may be treated, handled, stored and disposed of as UNCLASSIFIED.

20.4.7.3.3.3. (U) When a laser printer does not complete a printing cycle (e.g., a paper jam or power failure occurs) completing a subsequent print cycle before removal of the cartridge is sufficient to wipe residual toner from the cartridge drum.

20.4.7.3.3.4. (U) If the toner cartridge is removed without completing a print cycle, inspect the cartridge drum by lifting the protective flap and viewing the exposed portion of the drum.  If residual toner is present, manually rotating the drum is sufficient action to wipe off residual toner material present.

20.4.7.3.3.5. (U) After completing actions for incomplete print cycles, the toner cartridge may be treated, handled, stored and disposed of as UNCLASSIFIED.

20.4.8. (U) Clearing Systems for Periods Processing. Systems authorized for periods processing must be cleared of any information which is not authorized between the different defined periods of mode/level of operation. All system components must be cleared in accordance with guidance of this chapter.

20.4.8.1. (U) Most systems will have volatile memory components.  These components can be cleared by removing power (turning the system off).

20.4.8.2. (U) Some systems have removable media designed to save time and be more convenient for changing between modes/levels (e.g., this avoids having to overwrite the media and re-install all of the software including complex operating system software).  The IS should be shut down before the removable media is exchanged.

20.4.8.3. (U) Nonvolatile memory components which are significant components of a system could retain information between the periods. When relying on removable media, the system should have no significant nonvolatile memory components which could contain unauthorized information remaining within the system.

·         Any system approved for periods processing will be prohibited from containing nonvolatile memory or a fixed hard drive.

·         For example, a PL-2 system with a removable hard drive "for data" which is interchanged between periods is not sufficient if a permanent hard drive remains inside the IS with "just the operating system".  The PL-2 system does not provide sufficient controls to trust against unauthorized information inadvertently being stored to the operating system hard drive.

20.4.9. (U) Release of Systems and Components. The ISSM, or designee, shall develop equipment removal procedures for systems and components and these procedures shall be stated in the SSAA/SSP.  When such equipment is no longer needed, it can be released if:

·         It is inspected by the ISSM, or designee. This inspection will assure that all media, including internal disks, have been removed or sanitized.

·         A record is created of the equipment release indicating the procedure used for sanitization and to whom the equipment was released. The record of release shall be retained for a period prescribed by the DAA Rep/SCO.

·         Procedures specified by the DAA Rep/SCO are used.


20.4.9.1. (U) Documenting IS Release or Disposal. The National Security Agency/Central Security Service (NSA/CSS) Form G6522, shown in Figure 20.1, or similar form/documentation, will be used to document the local release or disposal of any IS or processing component.

 


FIGURE 20.1. (U) SAMPLE NSA/CSS FORM G6522

 

 


 

CHAPTER 21

OTHER SECURITY REQUIREMENTS

21.1. (U) PURPOSE.  The purpose of this chapter is to provide information on subject matter which does not require a specific chapter to cover the areas addressed.

21.2. (U) SCOPE.  These procedures could be effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

YES

DESIGN PHASE

YES

DEVELOPMENT PHASE

YES

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

YES

21.3. (U) REQUIREMENTS:

21.3.1. (U) Contingency Planning. A contingency plan is a plan for emergency response, backup operations, and post-disaster recovery maintained by an activity as a part of its security program.  It consists of a comprehensive statement of all the actions to be taken before, during, and after a disaster or emergency condition along with documented and tested procedures.  It ensures that critical resources are available and facilitates the continuity of operations in an emergency situation.

21.3.1.1. (U) Backup.  Preventing catastrophic loss of data and progress requires that users maintain adequate backups for their stored data. Besides preventing data loss, backups of data for archiving purposes allow for proper on-line storage management. All magnetic media must be properly labeled and protected according to Chapter 13.

21.3.1.2. (U) Responsibilities. Each Information Systems Security Manager (ISSM), or designee, will develop locally needed backup plans. The plans should consider data-production rates and data-loss risks when under development.  The areas of risk that should be identified and planned for are:

21.3.1.2.1. (U) Immediate Losses. Ensures that the risk of a power failure and the resulting loss of data is worked at the time of power loss. Develop policy and procedures which reflect these risks.  For example, if one were creating a word-processing document when power loss occurred, the document would be lost if the user had not made periodic "saves" while creating it.  Some word-processing systems allow the user to make periodic saves automatically (for example, Word for Windows).  Most applications do not have this capability, and the users must be made aware of this potential problem.

21.3.1.2.2. (U) Media Losses. Develop a local procedure which reflects this risk. If a hard disk were dropped or contaminated in some way, the disk backups, coupled with periodic incremental backups between full backups, would allow you to restore the data close to the condition it was in before the loss.  Keep "active backups" for disks which contain often-used applications.

21.3.1.2.3. (U) Archiving Inactive Data. Develop procedures to manage the disk space.  For example, old correspondence might be put onto a disk for archiving purposes. Thus, you could create a list of all files and file descriptions which could be returned to the active users.

21.3.2. (U) Foreign National Access to Systems Processing Classified Information:

21.3.2.1. (U) U.S. Government classified information is not releasable to foreign nationals except as authorized by the U.S. Government.

21.3.2.2. (U) Data owners can designate their information as releasable to individuals of specific nationalities.  The Principle Accrediting Authority (PAA)/Designated Approving Authorities (DAA) shall obtain the written permission of all applicable data owners before allowing access by foreign nationals to a system that contains information that is not releasable to individuals of those nationalities.

21.3.2.3. (U) The decision to allow foreign nationals access to systems that process classified information shall be explicit and shall be in writing. This includes controls over foreign national access or proximity to systems that process NOFORN classified information.

21.3.2.4. (U) If a proposed IS serves as a controlled interface connection to an IS with foreign national users, the IS must meet controlled interface requirements of DCID 6/3 Section 7.  The DAA Rep/SCO must ensure that written concurrence for the controlled interface is obtained from data owners and affected DAAs prior to permitting implementation of the connection.  Controlled interfaces which connect to an IS that processes SCI information must be accredited through the TOP SECRET And Below Interoperability (TSABI) process as noted in Chapter 17.

21.3.2.5. (U) Foreign national ISs may only be allowed in shared SCIF facilities with formal joint approval.  Connections between IS are only permitted among systems at the same classification level, upon the approval of the PAA.

21.3.3. (U) Tactical/Deployable Systems. There are more aspects to tactical or deployed systems than increased threat from their mobile status. These systems not only have "additional” security requirements, but also have to deal with the issue of tactical/operational requirements that may conflict with SCI security requirements. Tactical/operational requirements for near-continuous operation and high availability conflict with security requirements, specifically the automated information protection features that enforce access control and restriction features which can be expected within an office/base environment.

21.3.3.1. (U) Resolving Conflicting Requirements. When presented for DAA approval, the DAA may require alternate security requirements or safeguards for tactical systems while in transit or in the tactical environment. The DAA may approve the IS security requirements based on the system accreditation documentation of the specific operational requirements.  The DAA should specifically list all such approval decisions in the accreditation documentation for the IS.  Examples of tactical/deployable systems and their security implementations that require DAA attention are as follows.

21.3.3.1.1. (U) IS which process SCI information may be developed specifically for tactical environments, implemented with tactical/operational features that are contrary to SCI information security requirements.

21.3.3.1.2. (U) Tactical systems may be introduced into SCI environments for tactical processing at the SCI level, which could require modification to meet SCI information requirements.

21.3.3.1.3. (U) Generalized systems may be developed which are intended for use in both environments.  These systems need a capability to alternate between meeting the respective requirements of each environment.

21.3.3.2. (U) Specific Conflicting Requirements. The following is a collection of security requirements that have direct conflict with tactical/operational requirements.

21.3.3.2.1. (U) Audit Process Requirements.

·         Security requirement: If the Audit process fails, the system is unable to provide monitoring for unauthorized activities and should not continue operating, but should default to a safe/secure posture pending restoring the ability to maintain proper audit.

·         Operational requirement: Failure of the Audit process should not interfere with continued normal operation of a system.

·         Sample security implementation:  Allow the system to continue operation if the Audit process fails.

21.3.3.2.2. (U) Audit log requirements.

·         Security requirement: If the Audit logs fill up and the system is unable to record the monitoring information for unauthorized activities, it should not continue operating, but should default to a safe/secure posture pending proper retrieval/storage/archive of the audit data.

·         Operational requirement: Full audit logs should not interfere with normal operation of a system.  Audits may fill up due to other than normal activities required to support operations, or a system administrator being too busy responding to another operational requirement.

·         Sample security implementation: Placing operational requirements ahead of security requirements could result in the Audit process being set for "overwrite oldest if full" or FIFO overwrite.

21.3.3.2.3. (U) Protection for Information against unattended operation.

·         Security requirement: When a terminal is not attended, screen savers, screen locks, and deadman lockout features provide protection of classified information. These features can interrupt an operation when a terminal is left in a monitoring mode while other evolutions are taking place.

·         Operational requirement: Long term monitoring may be required without continuous user interaction with a system.  Rapid response may require eliminating delays resulting from required security passwords on screen locks.  The need for rapid response could also completely obviate Deadman timeout features.

·         Sample security implementation: disable these features for the IS for use in the tactical environments.

21.3.3.2.4. (U) Labeling media and hardware components.

·         Security requirement: Removable media and IS hardware components should be labeled in accordance with Chapter 13.

·         Operational requirement: Operational security (OPSEC) requirement to disguise the existence of classified information on an IS (including specification of compartments).

·         Sample security implementation: Reusable, deployed hardware sanitized for travel (media removed) is shipped via commercial carrier to its intended destination, no labels present.

21.3.3.2.5. (U) Use of group accounts.

·         Security requirement: Individual accountability for all users requires individual accounts which can be monitored through automated audit capabilities (see DCID 6/3).

·         Operational requirement: Use of group user accounts in a tactical/watchstanding environment allows rapid interchange between users whose primary focus is quick access to the system without interruption of functions or capabilities. This also avoids system transients (and potential for errors on startup) as the system is shut down and restarted for a different user to logon.

·         Sample security implementation: Lists do exist for watchstander rotations or battle station assignments, which could be retained and used to augment activity logs to correlate user identities to actions as recorded on audit logs. Advanced alternative: Developers provide a simple pop-up “change USERID” GUI which does not cause the system to shutdown or change operations, but which simply changes accountability via the new USERID/password for continuing processes for an individual member of a common functional group.

21.3.4. (U) Guest systems in a SCIF.  SCIFs are accredited under the authority of either DIA or NSA. Any system that enters the SCIF which has not already been certified or accredited by the respective cognizant SCIF authority is considered a Guest system. These guest systems may be brought into the SCIF only at the discretion of the cognizant authority and the local SSO/ISSM/ISSO as long as prudent AIS Security measures and documentation are in place. An SSO is responsible for all resident SCI information, including that which exists on AIS within a SCIF. The ISSM/ISSO supports the SSO in all security matters related to AIS, and the DAA who accredits SCI systems within that SCIF is directly associated with the authority that established the SCIF, i.e., the cognizant DAA. Systems that process SCI under the cognizance of DIA and NSA have clear guidance as provided within this document. The following are three examples of guest systems:

·         SCI or SAPI systems already certified by another PAA;

·         SCI systems that have no existing certification; and

·         Unclassified systems or systems with classification levels lower than SCI.

21.3.4.1. (U) SCI Systems With Certification. Within the DCID 6/3 community of PAAs, there is common acceptance of system accreditation and certification for systems that process SCI/SAPIs. These systems may be brought into a SCIF along with the certification documents provided by the PM/PMO so that the SCIF cognizant DAA may accredit the systems as they are connected to existing architectures.  The ISSM will ensure that appropriate system documentation from the PM/PMO is available to the DAA/DAA Rep/SCO to support the accreditation prior to the system installation.  If the guest systems will operate independently (not connecting to or through existing architectures), the SSO/ISSM may accept the systems with accreditation as delivered and document the presence of these systems on configuration management architectures.

21.3.4.2. (U) SCI Systems Without Certification. For SCI systems that do not have existing certification, the PM/PMO will provide appropriate documents for SCI Security certification and accreditation in accordance with Chapters 3 or 4.

21.3.4.3. (U) Unclassified or Collateral Systems. Non-SCI systems that are to be operated within a SCIF also require a certification/accreditation.  These systems may be certified/accredited by an appropriate authority other than the cognizant SCI DAA.  When the local Commander/SSO authorizes such systems to enter the SCIF and operate, then a coordinated policy/agreement should be established that addresses the security and operational interests of the different DAAs. The PM/PMO will deliver accreditation documentation for the systems to the SSO/ISSM with the request to install.

21.3.4.3.1. (U) When a decision is made to allow GENSER or unclassified systems into a SCIF, a policy/agreement must be developed and documented by the SSO/ISSM. The SSO and ISSM are responsible for implementing appropriate security operating procedures before the respective systems/networks are permitted to enter the SCIF.  These procedures will need to address IS security issues not already documented.

21.3.4.3.2. (U) Recommended issues to be included within the local procedures:

·         Define the extent that the SSO/ISSM will have purview over the other DAA's systems while they are operated within the SCIF.  This is an item that can be addressed in an MOA.

·         Define the authority responsible for the respective systems and the SSO who retains oversight responsibility for SCI information within the SCIF.

·         Document the coordination between SSO/ISSM in establishing the SCI controls for systems within a SCIF.

·         Document TEMPEST countermeasures (e.g., update Fixed Facility Checklist and RED/BLACK separation compliance with Inspectable Space Determination).

·         Develop an SOP for managing systems/media that are allowed to enter/depart the facility on a regular or recurring basis.

21.3.5. (U) Other Requirements. DCID 6/3 provides specific requirements for additional system functions that are not covered in other sections of this document.

·         Dedicated Servers.

·         Embedded and Special Purpose IS.

·         Web Security - Clients.

·         Servers

·         E-Mail

·         Collaborative Computing.

·         Distributed Processing.


 

CHAPTER 22

INFORMATION SYSTEMS (IS) AND NETWORK SECURITY SELF-INSPECTION AID

22.1. (U) PURPOSE.  The purpose of this chapter is to provide an aid for the inspection, certification, and accreditation of Sensitive Compartmented Information (SCI) ISs.  The checklist is based upon the criteria contained in this document and other applicable Department of Defense (DoD) security regulations/directives. This checklist can be used as follows:

·         To inspect IS operations periodically throughout their life cycle

·         To inspect organizational IS security program

·         Incorporated as part of an organization's self-inspection program

·         In preparation for formal inspections, IS certifications and accreditations

22.2. (U) SCOPE.  This aid is effective in the following life cycle phases:

CONCEPTS DEVELOPMENT PHASE

NO

DESIGN PHASE

NO

DEVELOPMENT PHASE

NO

DEPLOYMENT PHASE

YES

OPERATIONS PHASE

YES

RECERTIFICATION PHASE

YES

DISPOSAL PHASE

YES

22.3. (U) APPLICABILITY. This checklist is applicable to those systems and security programs that support DoD SCI operations.   The ISSM/ISSO should periodically complete the checklist (recommended annually).

22.4. (U) PROCEDURES.  The completion of this self-inspection checklist is basically self-explanatory and may be locally reproduced to meet the self-inspection and IS certification and accreditation requirements of an organization.


Table 22.1 (U) IS AND NETWORK SECURITY SELF-INSPECTION CHECKLIST

IS AND NETWORK SECURITY SELF-INSPECTION CHECKLIST

 

SECTION A - IS SECURITY PROGRAM MANAGEMENT

YES

NO

NA

 

1. Has an IS and Network Security Program been established?

 

 

 

2. Has the responsible authority appointed an ISSM in writing?

 

 

 

3. Have ISSOs been appointed in writing and does the ISSM maintain a copy of the appointment letter?

 

 

 

4. Has the ISSM appointment letter been forwarded to the Designated Approving Authority (DAA) /DAA Representative (REP)/Service Certifying Organization (SCO), and is a copy on file at the unit?

 

 

 

5. Are signs posted throughout the organization with the names and phone numbers of the Security Officers?

 

 

 

6. Is the IS Security Program being supported by supervisors and senior managers?

 

 

 

7. Has the ISSM and ISSOs completed an appropriate training course (ND 225, Operational Information System Security Course, or the Department of Defense Intelligence Information Systems (DoDIIS) Site ISSM Course or equivalent course)?

 

 

 

8. Has an IS Security Training Program been established to ensure DoD certification of SAs, ISS personnel and IS users?

 

 

 

9. Has a self-inspection of the organization IS and Network Security Program been conducted?

 

 

 

10. Have identified deficiencies been documented?

 

 

 

11. Does the responsible authority review self-inspection reports to ensure follow-up actions are taken on to correct all identified deficiencies?

 

 

 

12. Have all identified deficiencies been corrected?

 

 

 

13. Have all ISs been certified and accredited prior to operation or an IATO granted?

 

 

 

14. Are appropriate IS security regulations/policy documents being maintained, and are they accessible to the ISSM, ISSO, SA and system users?

 

 

 

15. Are the following on file and used effectively to manage the organization's IS & Network Security Program?

 

 

 

       a.  HQs-level advisory messages.

 

 

 

       b.  Policy letters and directives.

 

 

 

       c.  SSAA/SSPs and any associated approval to operate documentation.

 

 

 

       d.  SCIF Accreditation Documentation.

 

 

 

       e.  Advisory messages from the Defense Information Systems Agency's (DISA)

       Automated System Security Incident Support Team (ASSIST) and the Service's

       Computer Emergency/Incident Response Team (CERT/CIRT).

 

 

 

        f.  Risk analysis and vulnerability reports.

 

 

 

        g.  TEMPEST checklists, certificates, and waivers, if applicable, for all installed ISs?

 

 

 

        h.  Self-inspection reports and appropriate follow-up actions.

 

 

 

16. Are assistance visits conducted to assist subordinate units (if any) in the development of their IS & Network Security Programs?

 

 

 

17. Are all personnel aware of their responsibilities in reporting IS incidents and violation?

 

 

 

18. Are the results of security incidents/violations investigated, reported IAW applicable regulations, and reviewed to determine whether changes to IS policy/procedures are required?

 

 

 

19. Is a functional Configuration Management Program in place?

 

 

 

SECTION B - ACCREDITATION AND CERTIFICATION

20. Has an System Security Authorization Agreement [SSAA]/ Systems Security Plan [SSP]) been:

 

 

 

        a.  Developed for the Information Systems?

 

 

 

        b.  Properly coordinated within the organization (ISSM, ISSO/SA, Physical

        Security personnel, TEMPEST Officer, etc.)? {TEMPEST change icw Chapter 6?}

 

 

 

        c.  Reviewed by the ISSM for appropriate action?

 

 

 

        d.  A file copy maintained by ISSM/ISSO?

 

 

 

        e.  Has the ISSM/ISSO coordinated the accreditation documentation with their CCB?

 

 

 

        f.  Is appropriate accreditation/IATO documentation maintained by ISSM/ISSO for

        each IS?

 

 

 

        g.  Forwarded to the appropriate DAA/DAA Rep/SCO?

 

 

 

21. Is the SSAA/SSP updated as follows:

 

 

 

        a.  When hardware/software configuration changes occur?

 

 

 

        b.  When the system is relocated?

 

 

 

        c.  When the security mode/protection level changes?

 

 

 

        d.  When connected to additional networks?

 

 

 

        e.  Upon the three year anniversary date?

 

 

 

22. Have all external connections to installed ISs been validated and approved by the DAA Rep/SCO?

 

 

 

23. Are the ISSM/ISSOs aware of the SABI/TSABI process when connecting systems/networks of different classifications?

 

 

 

SECTION C - IS & NETWORK SECURITY

 

 

 

24. Are systems which process SCI information located in areas according to

DCID 1-21?

 

 

 

25. Is only authorized software being used?

 

 

 

26. Are the ISSM, ISSOs/SAs, and users knowledgeable of virus protection and reporting procedures?

 

 

 

30. Is virus software current?

 

 

 

31. Are all IAVA actions implemented, verified and documented?

 

 

 

32. Are documented software patches current and installation dates documented?

 

 

 

33. Are Audit Trails:

 

 

 

       a.  Being implemented?

 

 

 

       b.  Reviews being limited to the ISSM, or alternate, and ISSOs/SAs?

 

 

 

       c.  Being reviewed at the required interval, and appropriate action taken,

      where applicable?

 

 

 

       d.  Summary reports and SCI system audits being maintained for five years?

 

 

 

34. Is the Access Request and Verification Roster:

 

 

 

       a.  Acknowledged and signed?

 

 

 

       b.  Periodically validated?

 

 

 

       c.  Updated to indicate final access removal?

 

 

 

       d.  Appropriately classified?

 

 

 

       e.  Maintained by the SA?

 

 

 

35. Are passwords changed quarterly for SBU and other classified systems, at least semiannually for SCI systems, or when other conditions (e.g. a change in job status, TDY over 60 days, compromise) occur?

 

 

 

36. Are passwords protected at the same level as the information they protect?

 

 

 

37. Do all user passwords contain a minimum of eight alphanumeric characters?

 

 

 

38. Are the ISSOs/SAs implementing the appropriate countermeasures to protect against vulnerabilities?

 

 

 

39. Are procedures in effect to ensure the proper classification markings of all computer-generated products?

 

 

 

40. Are IS components (CPU, monitor, printer, scanner) marked with appropriate classification labels (e.g. 700-series or equivalent)?

 

 

 

41. Is formal documentation used (i.e. 6522 or equivalent form) to record all IS release actions; are they completed and verified by appropriate IS personnel and filed with the SSAA/SSP?

 

 

 

42. Are DD254s reviewed periodically to validate contractor access to data on SCI IS?

 

 

 

43. Has an IS Contingency Plan:

 

 

 

       a.  Been developed?

 

 

 

       b.  Been successfully tested in the past year?

 

 

 

       c.  Been periodically reviewed and updated?

 

 

 

44. Does the approved SSAA/SSP and unit Standard Operating Procedures (SOPs) cover the following security related topics:

 

 

 

        a.  Procedures for securely bringing the system up/down?

 

 

 

        b.  Security responsibilities encompassing all personnel?

 

 

 

        c.  Security marking of output products?

 

 

 

        d.  Procedures for downgrading and/or releasing output or media?

 

 

 

        e.  Procedures for media degaussing, destruction, and/or downgrading?

 

 

 

        f.   Procedures for generating and reviewing the audit data?

 

 

 

        g.  Procedures for adding/removing users from the IS/LAN?

 

 

 

        h.  Procedures establishing access control privileges for users?

 

 

 

        i.  Operational Security (OPSEC)?

 

 

 

        j.  Virus and Incident reporting procedure?

 

 

 

        k.  Contingency Plan procedures?

 

 

 

        l.  Information Storage Media control and accounting procedures?

 

 

 

        m.  Password Management procedures?

 

 

 

        n.  Procedures for obtaining appropriate authorization to conduct monitoring of                           

        suspicious or illegal activity?

 

 

 

45. Is the audit data protected by the Security Support Structure (operating system or security software)?

 

 

 

46. Are the following audit reports generated to aid in the periodic review of auditable anomalous activity:

 

 

 

       a. Invalid logon attempts showing an abnormal number of aborted access attempts 

       by the same user, or from the same terminal?

 

 

 

       b.  Access to the system during non-duty hours?

 

 

 

       c.  Attempts to use special privileges (e.g. SUPERUSER) for activities other

       than system restoration; for example, changing a users accesses or privileges?

 

 

 

       d.  Movement of data to information storage media?

 

 

 

       e.  Invalid file access attempts to include READ, WRITE, EXECUTE and DELETE?

 

 

 

       f.  Invalid access attempts to Audit Trail data files?

 

 

 

       g.  Override attempts of computer generated output classification markings?

 

 

 

       h.  Attempts to print a file for which a user ID is not authorized?

 

 

 

47. Have unique IS ID and Password controls been implemented on the IS/LAN?

 

 

 

48. Are passwords suppressed when entered?

 

 

 

49. Do three consecutive unsuccessful log-in attempts from a single access port or against a single user ID result in the terminal or user ID being disabled?

 

 

 

50. Are data access controls automatically set to limit access when any new file or data set is created?

 

 

 

51. Are system privileges limited to those necessary to perform assigned tasks (e.g. SUPERUSER, System Programmers, etc.)?

 

 

 

52. Are the following features installed and activated?

 

 

 

       a.  Screen Blanking

 

 

 

       b.  Screen Lock

 

 

 

       c.  Deadman Timeout

 

 

 

53. Are appropriate Government warning banners and labels being used on systems?

 

 

 

54. If an IS is connected to a STU-III/STE data port, has permission been received from the proper authority?

 

 

 

55. Are unclassified ISs connected directly to the public telephone network; if so, has approval been received from proper authority?

 

 

 

56. Are approved keyboard-monitor-mouse (KMM) switches installed between IS which are connected to a network or another IS at different classification levels?

 

 

 

57. Are appropriate procedures implemented and followed in using KMM switches?

 

 

 

58. Has the proper authority approved the use of the KMM?

 

 

 

59. Is the use of dial-in modems connected to ISs/LANs IAW applicable policy?

 

 

 

60. Has the proper authority approved the use of the dial-in modems?

 

 

 

61. Is the Auto Answering feature of all STU-IIIs/STEs configured IAW applicable policy?

 

 

 

62. Has the proper authority approved the use of the STU-III/STE Auto Answering feature?

 

 

 

63. Are communications links connecting the components of the IS processing classified or sensitive unclassified information protected IAW National COMSEC policies?

 

 

 

64. Are all critical systems backed up by an Un-interruptible Power Supply (UPS) system?

 

 

 

65. Is the Red/Black separation criteria being strictly enforced?

 

 

 

SECTION D  - IS MAINTENANCE

 

 

 

66. Has a maintenance policy and procedure been developed and implemented?

 

 

 

67. Are maintenance personnel cleared?

 

 

 

68. Are maintenance personnel U.S. citizens?

 

 

 

69.  Are uncleared maintenance personnel escorted by fully cleared and technically qualified personnel?

 

 

 

70. Are IS components purged of all classified or unclassified information prior to removal from IS spaces, and are these actions appropriately documented?

 

 

 

71. Are storage media removed from ISs prior to being released for service or repair?

 

 

 

72. Are areas sanitized prior to maintenance performed by unclear personnel?

 

 

 

73. Is a maintenance log, documenting repairs, used and maintained?

 

 

 

74. Are controls in place for maintenance of diagnostic hardware or software?

 

 

 

SECTION E  - DECLASSIFICATION

 

 

 

75. Are procedures in effect to ensure the calibration requirements for degaussers are being followed and they are operating effectively?

 

 

 

76. Is the degausser recalibrated yearly?

 

 

 

77. Are only approved degaussers utilized for the declassification of magnetic media?

 

 

 

78. Is documentation on all IS media declassification actions being maintained?

 

 

 

79. Are printer ribbons appropriately destroyed and handled at the same classification level as its associated IS?

 

 

 

80. Are toner cartridges properly cleared before turn-in for reuse?

 

 

 

81. Are controls in place for maintenance or diagnostic hardware or software?

 

 

 

SECTION F  - INFORMATION STORAGE MEDIA CONTROL

 

 

 

82. Has a SOP been written outlining the procedures to be followed for the introduction and removal of storage media into and out of secure facilities IAW national policy?

 

 

 

83. Has the Cdr/Commanding Officer publicized/developed policy identifying the level of control and accountability of information storage media in the organization?

 

 

 

84. Have procedures been developed for the control of information storage media IAW national-level policy?

 

 

 

85. Are media marked and labeled with the correct classification and handling instructions (Standard 700 series labels or equivalent, Privacy Act, Special Access Programs [SAP], etc.)?

 

 

 

86. Does the ISSM ensure excess or obsolete commercial software is free of classified information prior to release or reuse?

 

 

 

87. Are procedures established which outline steps to be taken when transferring data to and from systems of unequal accreditation (classification and/or sensitivity)?

 

 

 

88. Are reused removable media used at the same or higher classification level?

 

 

 

 


 

APPENDIX A

REFERENCES

(U) The following publications are the primary security regulations associated with, and affecting Information Systems (IS) Intelligence operations. This appendix is not an inclusive list of all security regulations.

PUBLIC LAWS

Computer Fraud and Abuse Act, 18 U.S. Code section 1030, 1984.

Electronic Communications Privacy Act, 18 U.S. Code Section 2510, 1986.

Public Law 100-235, The Computer Security Act of 1987, 8 January 1988.

EXECUTIVE ORDERS

Executive Order 12333, United States Intelligence Activities, 4 December 1981.

Executive Order 12829, National Industrial Security Program, 6 January 1993.

Executive Order 12958, Classified National Security Information, 20 April 1995.

NATIONAL PUBLICATIONS

Common Criteria for Information Technology Security Evaluation, CCIB-98-026, Version 2.0, May 1998.

 

DCID 6/3, Director of Central Intelligence (DCI) Directive (DCID) 6/3, Protecting Sensitive Compartmented Information within Information Systems, 6 June 1999.

DCID 1/19, Security Policy Manual for Sensitive Compartmented Information and Security Policy Manual, 1 March 1995.

DCID 1/21, Physical Security Standards for SCIFs, 29 July 1994.

DCID 2/12, Community Open Source Program, 1 March 1994.

The Intelligence Community Open Source Strategic Plan, 21 April 1993.

NSTISSAM TEMPEST/2-95, National Security Telecommunications and Information Systems Security Advisory Memorandum (NSTISSAM) TEMPEST/2-95 (formerly NACSIM 5203), Red/Black Installation Guidelines, 12 December 1995.

NSTISSI 3013, National Security Telecommunication and Information Systems Security Instruction (NSTISSI) 3013, Operational Security Doctrine for the Secure Telephone Unit III (STU-III) Type 1 Terminal, 8 February 1990.

NSTISSI 4009, National Security Telecommunication and Information Systems Security Instruction (NSTISSI) 4009, National Information Systems Security (INFOSEC) Glossary, January 1999.

NSTISSI 7000, National Security Telecommunications and Information Systems Security Instruction (NSTISSI) 7000, TEMPEST Countermeasures For Facilities, 29 November 1993.

NSTISSI 7003, National Security Telecommunications and Information Systems Security Instruction (NSTISSI) 7003 (C/NF), Protected Distribution Systems, 13 December 1996.

NSTISSP 300, National Security Telecommunications and Information Systems Security Policy (NSTISSP) 300, National Policy on Control of Compromising Emanations, 29 November 1993.

OMB Circular A-130, Management of Federal Information Resources, 15 July 1994, and principally, Appendix III, Security of Federal Automated Information, February 1996.

DEPARTMENT OF DEFENSE (DoD) PUBLICATIONS

DoD 5105.21-M-1, Sensitive Compartmented Information Administrative Security Manual (U), August 1998.

DoD Directive 5200.1-R, Information Security Program Regulation, January 1997.

DoD Directive 5200.2-R, Policy on Investigation and Clearance of DoD Personnel for Access to Classified Defense Information, 15 February 1986

DoD Directive C-5200.5, Communications Security (COMSEC), 21 April 1990.

DoD Directive C-5200.19, Control of Compromising Emanations, 16 May 1995.

DoD Directive 5200.28, Security Requirements for Automated Information Systems (AIS), 21 March 1988.

DoD Directive 5215.1, Computer Security Evaluation Center, 25 October 1982.

DoD Directive 5220.22, DoD Industrial Security Program, 8 December 1980.

DoD 5220.22-R, Industrial Security Regulation, December 1985.

DoD 5220.22-M, National Industrial Security Program Operating Manual (NISPOM), January 1995, and its Supplement, dated February 1995.

DoD Directive 5240.4, Reporting of Counterintelligence and Criminal Violations, 22 September 1992.

DoD Trusted Computer System Evaluation Criteria (Orange Book of the Rainbow Series), December 1985.

DEFENSE INTELLIGENCE AGENCY (DIA) PUBLICATIONS

DIA Manual 50-4, Department of Defense (DoD) Intelligence Information Systems (DoDIIS) Information Systems Security (INFOSEC) Program, 30 April 1997.

DIA Regulation 50-2, Information Security Program, 15 July 93

Defense Intelligence Management Document SC-2610-141-93, DoDIIS Site Information Systems Security Officer's (ISSO) Handbook, November 1993.

Defense Intelligence Management Document DS-2610-142-00, DoD Intelligence Information System (DoDIIS) Security Certification and Accreditation Guide April 2000.

Defense Intelligence Management Document SC-2610-143-93, DoDIIS Site Certifier's Guide, November 1993.

The Intelligence Community Open Source Strategic Plan, 21 April 1993.

NATIONAL SECURITY AGENCY (NSA)/CENTRAL SECURITY SERVICE (CSS) PUBLICATIONS

NSA/CSS Circular 25-5, Systems Acquisition Management, 3 April 1991.

NSA/CSS Circular 90-11, Protected Wireline Distribution System for COMINT Facilities, 7 June 1993.

NSA/CSS Classification Guide 75-98, 20 February 1998.

NSA/CSS Directive 21-1, DoD Computer Security Center Operations, 29 March 1984.

NSA/CSS Directive 130-1, Operational Information System & Network Security Policy, 17 October 1990.

NSA/CSS Manual 130-1, Operational Computer Security, October 1990.

NSA/CSS Manual 130-2, Media Declassification and Destruction Manual, November 2000.

NSA/CSS Regulation 110-2, The NSA/CSS ADP Program, 27 November 1981.

NSA/CSS Regulation 120-1, Reporting of Security Incidents and Criminal Violations, 16 March 1989.

NSA/CSS Regulation 120-24, STU-III Security Requirements, 20 February 1990.

NSA/CSS Regulation 130-2, Computer Virus Prevention Policy, 13 January 1993.

NSA/CSS Regulation 130-3, Security Testing of NSA/CSS Automated Information Systems (AIS) and Networks, 24 July 1992.

NSA/CSS Regulation 130-4, Computer Security for Connection of an Automated Information System (AIS) to the STU-III (type 1) Terminal Data Port, 27 July 1993.

NSA/CSS Regulation 130-5, Use of Unclassified Publicly Accessible Computer Networks and information Systems such as the INTERNET (U), 15 July 1996.

USSID 12, United States Signals Intelligence (SIGINT) Directive 12, Automatic Data Processing (ADP) Policy for SIGINT Operations, 20 October 1980.

NSA/CSS Information Systems Certification and Accreditation Process (NISCAP), 15 October 2000


APPENDIX B

GLOSSARY OF ACRONYMS, ABBREVIATIONS, AND TERMS

ACRONYMS AND ABBREVIATIONS

(U) The following acronyms/abbreviations are expanded for clarification.

ACERT

Army Computer Emergency Response Team

AF

Air Force

AFCERT

Air Force Computer Emergency Response Team

AIA

Air Intelligence Agency

AIS

Automated Information System

ASP

Accredited Security Parameters

ASSIST

Automated Systems Security Incident Support Team

AUTODIN

Automatic Digital Network

BDS

Broadband Distribution System

C&A

Certification and Accreditation

CCB

Configuration Control Board

CD

Compact Disk

CDE

Compact Disk Extra

CD-R

Compact Disk-Read

CDR

Critical Design Review

CD-ROM

Compact Disk-Read Only Memory

CERT

Computer Emergency Response Team

CIRT

Computer Incident Response Team

CM

Configuration Management

CMB

Configuration Management Board

CO

Commanding Officer

COI

Community Of Interest

COMINT

Communications Intelligence

COMNAVSECGRU

Commander Naval Security Group

COMSEC

Communications Security

CONOP

Concept of Operation

COTS

Commercial Off-The-Shelf

CPU

Central Processing Unit

CRYPTO

Cryptologic

CSE

Client-Server Environment

CSS

Central Security Service

CTTA

Certified TEMPEST Technical Authority

DAA

Designated Approving/Accrediting Authority

DAA Rep

Designated Approving/Accrediting Authority Representative

DAC

Discretionary Access Control

DCI

Director, Central Intelligence

DCID

Director of Central Intelligence Directive

DEXA

DoDIIS Executive Agent

DIA

Defense Intelligence Agency

DIAM

Defense Intelligence Agency Manual

DIRNSA

Director, National Security Agency

DISA

Defense Information Systems Agency

DMS

Defense Messaging System

DoD

Department of Defense

DoDIIS

Department of Defense Intelligence Information Systems

DOS

Disk Operating System

DRAM

Dynamic Random Access Memory

DSN

Defense Switching Network

DVD

Digital Video Disk

EEFI

Essential Elements of Friendly Information

EEPROM

Electronically Erasable Programmable Read Only   Memory

EO

Executive Order

EPA

Environmental Protection Agency

EPROM

Erasable Programmable Read Only Memory

ERB

Engineering Review Board

FAX

Facsimile

FEPROM

Flash Erasable Programmable Read Only Memory

FOUO

For Official Use Only

FTS

Federal Telecommunications Service

FW&A

Fraud Waste & Abuse

GENSER

General Service

GOTS

Government Off-The-Shelf

HOIS

Hostile Intelligence Services

HQ

Headquarters

HSO

Host Security Office

IA

Information Assurance

IATO

Interim Approval To Operate

IAVA

Information Assurance Vulnerability Assessment

IAW

In Accordance With

IA

Information Assurance

ID

Identification

IG

Inspector General

INSCOM

Intelligence and Security Command

IOC

Initial Operational Capability

IR

Infrared

IS

Information System

ISD

Inspectable Space Determination

ISS

Information System Security

ISSE

Information Systems Security Engineer

ISSM

Information Systems Security Manager

ISSO

Information Systems Security Officer

ISSPM

Information Systems Security Program Manager

JAG

Judge Advocate General

LAN

Local Area Network

LOC

Level-of-Concern

LRU

Lowest Replaceable Unit

MILNET

Military Network

MO

Magneto-Optical

MOU

Memorandum Of Understanding

NACSIM

National COMSEC Information Memorandum

NAVCIRT

Navy Computer Incident Response Team

NCS

National Cryptologic School

NIMA

National Imagery and Mapping Agency

NIPRNET

uNclassified Internet Protocol Router NETwork

NISP

National Industrial Security Program

NISPOM

National Industrial Security Program Operating Manual

NISSIB

NSA/CSS Information System Security Incident Board

NOFORN

No Foreign National

NSA

National Security Agency

NSA/CSS

National Security Agency/Central Security Service

NSI

National Security Information

NSN

National Stock Number

NSO

Network Security Officer

NSTISSAM

National Security Telecommunications Information   Systems Security Advisory Memorandum

NSTISSC

National Security Telecommunications Information System Security Committee

NSTISSI

National Security Telecommunications Information System Security Instruction

NSTISSP

National Security Telecommunications Information System Security Policy

Oe

Oersteds

OPSEC

Operational Security

PAA

Principal Accrediting Authority

PDA

Personal Digital Assistant

PDD

Personal Digital Diary

PDR

Preliminary Design Review

PDS

Protected Distribution System

PED

Portable Electronic Device

PL

Protection Level

PM

Program Manager

PMO

Program Management Office

POC

Point of Contact

PROM

Programmable Read Only Memory

RAM

Random Access Memory

RF

Radio Frequency

RFI

Radio Frequency Interference

ROM

Read Only Memory

SA

System Administrator

SACS

Security Access Control System

SAP

Special Access Program

SAPI

Special Access Program - Intelligence

SBU

Sensitive But Unclassified

SCE

Service Cryptologic Element

SCI

Sensitive Compartmented Information

SCIF

Sensitive Compartmented Information Facility

SCO

Service Certifying Organization

SDD

Secure Data Device

SDSO

System Design Security Officer

SF

Standard Form

SI

Special Intelligence

SIGAD

SIGINT Address

SIGINT

Signals Intelligence

SIM

System Integration Management

SIMO

System Integration Management Office

SIO

Senior Intelligence Officer

SISSPM

Senior Information Systems Security Program Manager

SOP

Standard Operating Procedure

SOW

Statement Of Work

SRAM

Static Random Access Memory

SSAA

System Security Authorization Agreement

SSAN

Social Security Account Number

SSO

Special Security Office/Special Security Officer

SSP

System Security Plan

STE

Secure Telephone Equipment

STU-III

Secure Telephone Unit III

ST&E

Security Test and Evaluation

T&E

Test and Evaluation

TDY

Temporary Duty

TK

Talent Keyhole

TS

Top Secret

UCMJ

Uniform Code of Military Justice

UPS

Un-interruptible Power Supply

US

United States

USERID

User Identification

USSID

United States Signals Intelligence Directive

USSS

United States SIGINT System

WAN

Wide Area Network

WORM

Write Once Read Many

 

TERMS

The following terms and definitions have been extracted from various documents and are provided for information and clarification.  They are restricted to issues addressing information systems and related security matters.

Access.  The ability and means to communicate with (input to or receive output from), or otherwise make use of any information, resource, or component in an information system (IS); or to have authorized entry to a specified area.

Accreditation.  The official management decision to permit operation of an IS in a specified environment at an acceptable level of risk, based on the implementation of an approved set of technical, managerial, and procedural safeguards. This authorization is granted by the appropriate Designated Approving Authority (DAA), on a case-by-case basis, permitting the processing of SCI information on an IS. Approval is based upon the DAA's review of the SSAA/SSP. Under certain conditions interim approval-to-operate (IATO) may be granted by designees of the DAA.

Accredited Security Parameters (ASP). The security classification levels; compartments and subcompartments at which an information system (IS) or network is accredited to operate (e.g. Top Secret [TS]/Special Intelligence [SI]/Talent Keyhole [TK]).

Authentication.  (1) To establish the validity of a claimed identity. (2) To provide protection against fraudulent transactions or logons by establishing the validity of a USERID, message, station, individual or originator.

Availability.  Timely, reliable access to data and information services for authorized users.

BLACK.  A designation applied to telecommunications and information systems (ISs), and to associated areas, circuits, components, and equipment, in which only unclassified signals are processed.

Broadband Distribution System (BDS). Any broadband system which can carry multiple channels of information.  A BDS is not a local area network (LAN), however, it is capable of being the backbone for multiple LANs.

Buster.  A computer program - part of the Computer Security Toolbox. BUSTER is a MS-DOS based program used to perform a binary search of a disk or diskette for any word or set of words found in a search definition file by performing a linear search on a disk or diskette, four sectors at a time.  BUSTER uses the "LIMITS.TXT" file as its document for search word patterns.

Certification.  The comprehensive evaluation of the technical and non-technical security features of an IS and other safeguards, made as part of and in support of the accreditation process, to establish the extent to which a particular design and implementation meet a set of specified security requirements.

Certified TEMPEST Technical Authority (CTTA).  A U.S. Government or U.S. Government contractor employee designated to review the TEMPEST countermeasures programs of a federal department or agency.

Classified Information. National security information (NSI) that has been classified pursuant to Executive Order 12958.

Clearing.  Removal of data from an IS, its storage devices, and other peripheral devices with storage capacity, in such a way that the data may not be reconstructed using common system capabilities (i.e., through the keyboard); however, the data may be reconstructed using laboratory methods.

Collateral.  (1) Classified Non‑Sensitive Compartmented Information (SCI) material to include General Service (GENSER) - an intelligence community term. (2) All national security information (NSI) classified under the provisions of an Executive Order (EO) for which special Intelligence community systems of compartmentation (i.e., SCI) are not formally established.

Command Authority. The individual responsible for the appointment of user representatives for a department, agency, or organization and their key ordering privileges.

Communications Security (COMSEC). Measures and controls taken to deny unauthorized persons information derived from telecommunications and ensure the authenticity of such telecommunications.  COMSEC includes cryptosecurity, transmission security, emission security, and physical security of COMSEC material.

Community-of-Interest (COI). A restricted network of users, each having an information system (IS) with an accredited security parameter identical to the others and having the need to communicate securely with other members of the network.

Compromising Emanations. Unintentional signals that, if intercepted and analyzed, would disclose the information transmitted, received, handled or otherwise processed by telecommunications or information systems (IS) equipment. (See TEMPEST).

Computer Security (COMPUSEC). See INFOSEC.

Computer Security Toolbox. A set of tools designed specifically to assist Information Systems Security Officers (ISSOs)/System Administrators (SAs) in performing their duties.  The functions within the TOOLBOX can erase appended data within files, eliminate appended data in free or unallocated space, search for specific words or sets of words for verifying classification and locating unapproved shareware programs. It also includes a program which allows you to clear laser toner cartridges and drums.

Confidentiality.  Assurance that information is not disclosed to unauthorized entities or processes.

Configuration Control.  The process of controlling modifications to a telecommunications or information system (IS) hardware, firmware, software, and documentation to ensure the system is protected against improper modifications prior to, during, and after system implementation.

Configuration Management. The management of security features and assurances through control of changes made to hardware, software, firmware, documentation, test, test fixtures, and test documentation of an information system (IS), throughout the development and operational life of the system.

Connectivity.  A word which indicates the connection of two systems regardless of the method used in physical connection.

Contingency Plan. A plan maintained for emergency response, backup operations, and post-disaster recovery for an information system (IS), as a part of its security program, that will ensure the availability of critical resources and facilitate the continuity of operations in an emergency situation. Synonymous with Disaster Plan and Emergency Plan.

Controlled interface. A mechanism that facilitates the adjudication of different interconnected system security policies (e.g., controlling the flow of information into or out of an interconnected system).

Critical Design Review (CDR).  A formal review conducted on each configuration item when design is complete.  Determines that the design satisfies requirements, establishes detailed compatibility, assesses risk, and reviews preliminary product specifications.

Crypto-Ignition Key (CIK). A device or electronic key used to unlock the secure mode of crypto equipment.

Cryptologic Information System (IS). A Cryptologic IS is defined as any IS which directly or indirectly supports the cryptologic effort, to include support functions, such as, administrative and logistics, regardless of manning, location, classification, or original funding citation. This includes strategic, tactical, and support ISs; terrestrial, airborne, afloat, in-garrison, and spaceborne ISs; ISs dedicated to information handling; and information-handling portions of ISs that perform other functions.

Declassification (of IS Storage Media). An administrative action following sanitization of the IS or the storage media that the owner of the IS or media takes when the classification is lowered to unclassified. Declassification allows release of the media from the controlled environment if approved by the appropriate authorities. The procedures for declassifying media require Designated Approving Authority (DAA) Representative (Rep)/Service Certifying Organization (SCO) approval.

Defense Intelligence Agency (DIA). The Director, DIA is the authority for the promulgation of intelligence information systems (ISs) computer security policy, and is also the Principal Approving Authority (PAA) for the Security Accreditation against that policy of all ISs and networks processing, using, storing, or producing intelligence information.

Degauss.  (1) To reduce the magnetization to zero by applying a reverse (coercive) magnetizing force commonly referred to as demagnetizing, or (2) to reduce the correlation between previous and present data to a point that there is no known technique for recovery of the previous data.  NOTE: A list of approved degaussers is updated and published quarterly in the "National Security Agency (NSA) Information Security Products and Services Catalog”.

Department/Agency/Organization (DAO) Code. A 6-digit identification number assigned by the Secure Telephone Unit (STU)-III/Secure Telephone Equipment (STE) Central Facility to organizational descriptions.  The DAO code must be used by units when placing an order for STU-III/STE keying material.

Designated Approving Authority or Designated Accrediting Authority (DAA).  The official with the authority to formally assume responsibility for operating a system (or network) at an acceptable level of risk.

DAA Representative (DAA Rep).   An official or service certification organization (SCO) responsible for ensuring conformance to prescribed security requirements for components of sites under their purview. SCOs are listed in the Department of Defense Intelligence Information Systems (DoDIIS) Information System Security Officer (ISSO) Handbook.

Destroying.  Destroying is the process of physically damaging the media to the level that the media is not usable, and that there is no known method of retrieving the data.

Discretionary Access Control (DAC). A means of restricting access to objects (e.g., files, data entities) based on the identity and need-to-know of subjects (e.g., users, processes) and/or groups to which the object belongs. The controls are discretionary in the sense that a subject with a certain access permission is capable of passing that permission (perhaps indirectly) on to any other subject (unless restrained by mandatory access control).

Diskette.  A metal or plastic disk, coated with iron oxide, on which data are stored for use by an information system (IS).  The disk is circular, rotates inside a square lubricated envelope that allows the read/write head access to the disk.

Department Of Defense (DoD) Intelligence Information Systems (DoDIIS).  The aggregation of DoD personnel, procedures, equipment, computer programs, and supporting communications that support the timely and comprehensive preparation and presentation of intelligence to military commanders and national level decision makers.  For the purpose of this document, DoDIIS encompasses the Military Services, Defense Agencies, Defense Activities, Offices of the Secretary and Assistant Secretaries of Defense, the Organization of the Joint Chiefs of Staff, and the Unified Commands.

DoDIIS Site. An administrative grouping of a combination of Department of Defense Intelligence Information Systems (DoDIIS) accredited and managed collectively on the basis of geographical or organizational boundaries. Each DoDIIS Site contains multiple DoD intelligence information systems (ISs) which support the site's intelligence mission.

Fixed Disk. A magnetic storage device used for high volume data storage and retrieval purposes which is not removable from the disk drive in which it operates.

Flush.  A computer program which is part of the Computer Security Toolbox. FLUSH is a MS-DOS based program used to eliminate appended data within a file or files and appended data located in unallocated or free space on a disk or diskette.

General User. A person accessing an information system (IS) by direct connections (e.g., via terminals) or indirect connections. NOTE:  “Indirect connection” relates to persons who prepare input data or receive output that is not reviewed for content or classification by a responsible individual.

Government‑Approved Facility. Any Government owned room or outside of a Sensitive Compartmented Information Facility (SCIF) with controlled or restricted access designed to limit public access which has operational procedures in place to actually limit access; any Government owned SCIF or area within a SCIF.

Guest system. Any system that enters the SCIF which has not already been certified or accredited by the respective cognizant SCIF authority is considered a Guest system.

Hard Disk. A magnetic storage device used for high volume data storage and retrieval purposes to include ones which are both removable and non‑removable from the disk drives in which they operate.

Information Assurance. Information Operations that protect and defend data and IS by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.  This includes providing restoration of IS by incorporating protection, detection, and reaction capabilities.

Information System (IS). Any telecommunications and/or computer related equipment or interconnected system or subsystems of equipment that is used in the automated acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission or reception of voice and/or data (digital or analog) and includes software, firmware, and hardware. Included are computers, word processing systems, networks, or other electronic information handling systems, and associated equipment.

Information Systems (IS) and Network Security.  IS and network security is the protection afforded to information systems in order to preserve the availability, integrity, and confidentiality of the systems and the information contained within the system.  Such protection is the integrated application of communications security (COMSEC), TEMPEST, and information systems security (INFOSEC) executed in liaison with personnel security, operations security, industrial security, resources protection, and physical security.

Information Systems Security (INFOSEC). The protection of information systems (ISs) against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or the provision of service to unauthorized users, including those measures necessary to detect, document, and counter such threats.

Information Systems Security Engineer (ISSE). The person responsible for ensuring the security and integrity of a system during its life cycle and interfacing with other program elements to ensure security functions and safeguards are effectively integrated into the total system engineering effort. See SDSO.

Information Systems Security Manager (ISSM).  The manager responsible for an organization's IS security program.  Appointed by the Commander/Commanding Officer, the ISSM is the single point of contact for his/her organization concerning security matters to the Designated Approving Authority (DAA) Representative (Rep)/Service Certifying Organization (SCO).

Information Systems Security Program Manager (ISSPM).  The Air Force (AF) Air Intelligence Agency (AIA)/Army Intelligence and Security Command (INSCOM)/Navy Commander, Naval Security Group (COMNAVSECGRU) individual appointed by the Service Cryptologic Element (SCE) Commander/Commanding Officer as being the manager responsible for the SCE-level information systems (IS) and network security program and the security of all the agency's/command's ISs.  Additionally, the ISSPM is the Designated Approving Authority (DAA) for the accreditation of systems on behalf of the NSA/CSS Senior Information Systems Security Program Manager (SISSPM).

Information Systems Security Officer (ISSO).  The person responsible to the ISSM for ensuring that operational security is maintained for a specific IS, sometimes referred to as a Network Security Officer. Each organizational level unit assigns one ISSO per system.  A ISSO may have the responsibility for more than one system.  See System Administrator (SA).

Inspectable Space. A determination of the three-dimensional space surrounding equipment that processes classified and/or sensitive information within which TEMPEST exploitation is not considered practical, or where legal authority to identify and/or remove a potential TEMPEST exploitation exists.

Integrity.  Protection against unauthorized modification or destruction of information.  Evident as an IS Security characteristic ensuring computer resources operate correctly and data in the system is accurate.  This characteristic is applicable to hardware, software, firmware, and the databases used by the computer system.

Intelligence Community. A term which, in the aggregate, refers to the following Executive Branch organizations and activities: the Central Intelligence Agency (CIA); the National Security Agency (NSA); the Defense Intelligence Agency (DIA); offices within the Department of Defense; and others organized for collection of specialized national foreign intelligence through reconnaissance programs.

Interconnected System.  A set of separately accredited systems that are connected together.

Interim Approval To Operate (IATO). Temporary authorization granted by a Designated Approving Authority (DAA) Representative (Rep)/Service Certifying Organization (SCO) for an information system (IS) to process classified information in its operational environment based on preliminary results of a security evaluation of the system.

Interoperability.  The capability of one system to communicate with another system through common protocols.

Initial Operating Capability (IOC). A time when the persons in authority (e.g. program/project managers [PMs] or operations personnel) declare that a system meets enough requirements to formally be declared operational while the system may not meet all of the original design specifications to be declared fully operational.

Key Material Identification Number (KMID). A unique number automatically assigned to each piece of Secure Telephone Unit (STU)-III/Secure Telephone Equipment (STE) keying material by the STU-III/STE.

Laptop.  See Portable Computer System.

Level of Concern. The Level of Concern is a rating assigned to an IS by the DAA. A separate Level of Concern is assigned to each IS for confidentiality, integrity and availability. The Level of Concern for confidentiality, integrity, and availability can be Basic, Medium, or High.  The Level of Concern assigned to an IS for confidentiality is based on the sensitivity of the information it maintains, processes and transmits. The Level of Concern assigned to an IS for integrity is based on the degree of resistance to unauthorized modifications. The Level of Concern assigned to an IS for availability is based on the needed availability of the information maintained, processed, and transmitted by the systems for mission accomplishment, and how much tolerance for delay is allowed.

Limited Release. A procedure to be used by United States SIGINT System (USSS) activities to control the release of storage media devices that have contained classified information to other activities outside the USSS community.

Local Area Network (LAN). Any local area capability to provide interoperability.  See network.

Logic Bomb. A logic bomb is a program or code fragment which triggers an unauthorized, malicious act when some predefined condition occurs. The most common type is the "time bomb", which is programmed to trigger an unauthorized or damaging act long after the bomb is "set".  For example, a logic bomb may check the system date each day until it encounters the specified trigger date and then executes code that carries out its hidden mission.  Because of the built‑in delay, a logic bomb virus is particularly dangerous because it can infect numerous generations of backup copies of data and software before its existence is discovered.

Malicious Code. Software or firmware that is designed with the intent of having some adverse impact on the confidentiality, integrity, or availability of an IS.  It may be included in hardware, software, firmware or data. Computer Viruses, Worms, Trojan Horses, Trapdoors, and Logic/Time Bombs all fall under the definition of malicious code. Computer viruses pose the primary threat to ISs because of their reproductive capability.

Malicious Code Screening. Screening is the process of monitoring for the presence of malicious code. Malicious code occurs in different forms, which may have different methods for screening.  Malicious code can arrive through either media that are introduced to IS or as mobile code that arrives through connections to other systems and networks.

Master Crypto-Ignition Key (CIK) Custodian.  An individual at each node in a Community of Interest (COI) who is responsible for controlling and maintaining the Master CIK and programming the security features of the Secure Telephone Unit (STU)-III/STE.

Mission-Essential.  In the context of information, that information which is an essential portion of a unit's mandatory wartime capability.

Mobile Code. The code obtained from remote systems, transmitted across a network, and then downloaded onto and executed on a local system.  Mobile code has come to refer to web-based code downloaded onto a user's client and run by the user's browser.  The larger set of mobile code normally involves an explicit decision to execute -- either by the user (manually) or by an application -- and an implicit decision autonomously made by an application.

Modem.  A device that electronically Modulates and Demodulates signals, hence the abbreviation MODEM.

National Security Agency/Central Security Service (NSA/CSS).  The Director, NSA/CSS is the authority for promulgation of computer security policy, and is also the Principal Approving Authority (PAA) for the security accreditation against that policy of all information systems (ISs) and networks processing, using, storing, or producing cryptologic information.

National Security Information (NSI).  Information that has been determined, pursuant to Executive Order (EO) 12958 or any predecessor order, to require protection against unauthorized disclosure, and that is so designated.

National Security-Related Information.  Unclassified information related to national defense or foreign relations of the United States.

Need-to-Know.  A determination made by an authorized holder of classified information that a prospective recipient of information requires access to specific classified information to perform or assist in a lawful and authorized Government function, such as that required to carry out official duties.

Network.  A combination of information transfer resources devoted to the interconnection of two or more distinct devices, systems, or gateways.

Network Manager. The individual who has supervisory or management responsibility for an organization, activity, or functional area that owns or operates a network.

Network Security Officer (NSO). An Individual formally appointed by a Designated Approving Authority (DAA)/Service Certifying Organization (SCO) to ensure that the provisions of all applicable directives are implemented throughout the life cycle of an information system (IS) network.

Network System. A system that is implemented with a collection of interconnected network components.  A network system is based on a coherent security architecture and design.

Non-Volatile Memory Components. Memory components which DO RETAIN data when all power sources are disconnected.

Notebook.  See Portable Computer System.

Object Reuse.  Reassignment of a storage medium (e.g., page frame, disk sector, or magnetic tape) that contained one or more objects, after ensuring that no residual data remained on the storage medium.

Optical Storage Media. Optical mass storage, including compact disks (CD, CDE, CDR, CDROM), optical disks (DVD), and magneto-optical disks (MO)

Orange Book. Synonymous with the Department of Defense (DoD) Trusted Computer System Evaluation Criteria, DoD 5200.28-STD.

Organizational-level Commander/Commanding Officer. The individual, regardless of rank, which has been appointed as the officer-in-command of a physical organization.

Overwrite Procedure (for purposes of downgrading in limited cases).  Process which removes or destroys data recorded on an information system (IS) storage medium by writing patterns of data over, or on top of, the data stored on the medium.

Overwrite Verification Procedure. A visual validation procedure that provides for reviewing, displaying, or sampling the level of success of an overwrite procedure.

Palmtop.  See Portable Computer System.

Pass Phrase. Sequence of characters, longer than the acceptable length of a password, that is transformed by a password system into a virtual password of acceptable length.

Password.  Protected/private character string used to authenticate an identity or to authorize access to data.

Password Shadowing. The ability within any operating system which physically stores the password and/or encrypted password results in a mass storage area of the system other than the actual password file itself. This feature prevents the theft of passwords by hackers.   Usually a UNIX feature.

Periods Processing. The processing of various levels of classified and unclassified information at distinctly different times. Under the concept of periods processing, the system must be cleared of all information from one processing period before transitioning to the next.  A system is said to operate in a “Periods Processing” environment if the system is appropriately sanitized between operations in differing protection level periods, or with differing user communities or data.

Peripheral.  Any devices which are part of an information system (IS), such as printers, hard and floppy disk drives, and video display terminals.

Personal Digital Assistants (PDA)/Diaries (PDD).  These items are mini processors with computing power that are generally smaller than laptop, notebook, or palmtop computers.  Some examples include, but are not limited to, the Newton, Boss, Wizard, etc.

Phonemes.  A phonetic word which sounds similar to an actual word. (Example, "fone" for "phone," "lafter" for "laughter").

Portable Computer System. Any computer system specifically designed for portability and to be hand carried by an individual (e.g., Grid, Laptop, Notebook, Palmtop, etc.).

Principal Accrediting Authority (PAA). The senior official having the authority and responsibility for all IS within an agency. Within the intelligence community, the PAAs are the DCI, EXDIR/CIA, AS/DOS (Intelligence and research), DIRNSA, DIRDIA, ADIC/FBI (National Security Div.), D/Office of Intelligence/DOE, SAS/Treasury (National Security), D/NIMA and the D/NRO.

Privacy (Not Security). The rights of an individual or organizations to determine for themselves when, how, and to what extent information about them is to transmitted to others.

Privileged User. The user of an information system (IS) who has root user authority.

Project/Program Manager (PM). The single individual responsible for a project or program who manages all day-to-day aspects of the project or program.

Protected Distribution System (PDS). A wireline or fiber-optic telecommunications system that includes terminals and adequate acoustic, electrical, electromagnetic, and physical safeguards to permit its use for the unencrypted transmission of classified information.

Protocols.  Set of rules and formats, semantic and syntactic, that permits entities to exchange information.

Purge.  The removal of data from an information system (IS), its storage devices, or other peripheral devices with storage capacity in such a way that the data may not be reconstructed.  Note:  An IS must be disconnected from any external network before a purge. See Clearing.

RED.  A designation applied to telecommunications and information systems (ISs), plus associated areas, circuits, components, and equipment which, when classified plain text signals are being processed therein, require protection during electrical transmission.

Red/Black Concept.  Separation of electrical and electronic circuits, components, equipment, and systems that handle classified plain text (RED) information, in electrical signal form, from those which handle unclassified (BLACK) information in the same form.

Remote Maintenance. An operational procedure that involves connection of a system to an external (i.e., outside of the facility securing the system), remote service for analysis or maintenance.

Removable Hard Disk. A hard disk contained in a removable cartridge type casing.

Risk Analysis. Synonymous with Risk Assessment.

Risk Assessment. Process of analyzing threats to and vulnerabilities of an information system (IS), and the potential impact that the loss of information or capabilities of a system would have on national security and using the analysis as a basis for identifying appropriate and cost-effective measures.

Risk Management.  The discipline of identifying and measuring security risks associated with an IS, and controlling and reducing those risks to an acceptable level.

Routine Changes.  Changes which have a minimal effect on the overall TEMPEST security of the Sensitive Compartmented Information (SCI) Facility (SCIF).  Adding a different type of electronic information processing equipment (unless the equipment added is known to have an unusually large TEMPEST profile), movement of the equipment within the facility, and minor installation changes are examples of routine changes.

Sanitizing (Also Purging).  The removal of information from media or equipment such that the data recovery using any known technique or analysis is prevented, as well as the removal of all classified labels and markings.  Sanitizing allows moving the media to an environment with lower protection requirements. In general, laboratory techniques cannot retrieve data that has been sanitized/purged.

Sealed Disk Drive. See "Hard Disk".

Secure Copy. A computer program which is part of the Computer Security Toolbox.  Secure Copy (SCOPY) is a MS-DOS based program used to eliminate appended data within a file or files while transferring the same from a source disk or diskette to a target disk or diskette.

Secure Data Device (SDD). The SDD provides a simple and cost-effective way to protect classified Government data transmissions. The SDD provides Secure Telephone Unit (STU)-III/Secure Telephone Equipment (STE) secure data transmission functions without voice features and is fully interoperable with all other STU-III/STE products. It allows the user to access a computer database, send a facsimile (FAX) message, or use electronic mail and be sure the information is protected.  The SDD was developed under the U.S. Government's STU-III/STE program and is approved for use by Federal departments, agencies, and Government contractors.

Secure Telephone Unit III (STU-III). The STU-III family includes several interoperable terminals capable of transmitting voice and data through the public telephone network.  The STU-III can be used as an ordinary telephone, and can also be used as a secure terminal, connected through the public telephone network to other STU-IIIs. A STU-III Secure Data Device (SDD) provides STU-III secure data transmission functions without voice features. STU-IIIs are endorsed by the National Security Agency (NSA) for protecting classified or sensitive, unclassified U.S. Government information, when appropriately keyed.

Security.  The protection of information to assure it is not accidentally or intentionally disclosed to unauthorized personnel.

Security Environment Changes.  Changes which have a detrimental effect on the facility.  Changes to the inspectable space (IS), addition of a radio transmitter or a modem for external communications, removal or reduction of an existing TEMPEST countermeasure (Radio Frequency Interference [RFI] Shielding, Filters, Control/Inspectable space, etc.) would be changes to the security environment.

Security Testing.  The process to determine that an information system (IS) protects data and maintains functionality as intended.

Security Training, Education and Motivation (STEM). A security education program designed to educate and motivate personnel concerning the protection of priority resources and the safeguarding of classified information.

Senior Information Systems Security Program Manager (SISSPM).  The national‑level individual appointed by the Director, National Security Agency (DIRNSA) as being the manager responsible for the national-level Service Cryptologic Element (SCE) Information Systems (IS) and Network Security Program, the security of all Cryptologic ISs, and is the Designated Approving Authority (DAA) for the accreditation of systems on behalf of the DIRNSA.

Senior Intelligence Officer (SIO). The highest ranking military or civilian individual charged with direct foreign intelligence missions, functions, or responsibilities within a department, agency, component, or element of an intelligence community organization or Department of Defense (DoD) Intelligence Activity assigned responsibilities or designated authorities by a Senior Official of the Intelligence Community (SOIC).

Senior Officials of the Intelligence Community (SOIC).  The heads of organizations or their designated representatives within the Intelligence Community, as defined by Executive Order (EO) 12333.

Sensitive But Unclassified (SBU) Information.  Information collected, maintained, and/or disseminated by an agency that is not classified but whose unauthorized release or use could compromise or damage privacy or proprietary rights, critical agency decision making, and/or the enforcement or implementation of public law or regulations under which the agency operates.

Sensitive Compartmented Information (SCI).  Classified information concerning or derived from intelligence sources, methods, or analytical processes, which is required to be handled within formal access control systems established by the Director of Central Intelligence (DCID 1/19).

Sensitive Compartmented Information (SCI) Facility (SCIF).  An accredited area, room, group of rooms, or installation where SCI may be stored, used, discussed and/or electronically processed.

Service Certifying Organization (SCO). The organization responsible for ensuring conformance to prescribed security requirements for components of sites under their purview. SCOs are listed in the Department of Defense Intelligence Information Systems (DoDIIS) Information System Security Officer (ISSO) Handbook.

Service Cryptologic Elements (SCE). A term used to designate, separately or together, those elements of the U.S. Army, Navy, and Air Force which perform cryptologic functions.  The Air Force Air Intelligence Agency (AIA), Army Intelligence and Security Command (INSCOM), and Navy Commander Naval Security Group (COMNAVSECGRU) are the SCEs responsible to the National Security Agency/Central Security Service (NSA/CSS) for accreditation of all cryptologic information systems (ISs) within their respective services.

Site Information Systems Security Manager (Site ISSM). The single information systems (IS) security focal point for a defined site.  The site ISSM supports two organizations: User organization and technical organization. The site ISSM is responsible for managing the baseline and ensuring that changes to the site baseline are properly controlled.

Site Integration Management Office (SIMO). The major functions of the SIMO are:  Establishing baselines, monitoring compliance, configuration management, and integration transition.  There are three levels of such offices:  DoDIIS, Service, and site. Only the larger sites will have a site SIMO.

Special Access Program (SAP).  Any program imposing "need‑to‑know" or access controls beyond those normally provided for access to Confidential, Secret, or Top Secret information. Such a program includes, but is not limited to, special clearance, adjudication, or investigative requirements; special designation of officials authorized to determine "need‑to‑know"; or special lists of persons determined to have a "need‑to‑know".

Special Security Officer (SSO). The individual assigned responsibility for the security management, operation, implementation, use and dissemination of all Sensitive Compartmented Information (SCI) material within his/her respective organization.

Stand-Alone System. An information system (IS) operating independent of any other IS within an environment physically secured commensurate with the highest classification of material processed or stored thereon.

Survivability.  The capability of a system to withstand a man‑made or natural hostile environment without suffering an abortive impairment of its ability to accomplish its dedicated mission.

SYSOP.  An operator responsible for performing system-oriented procedures. See System Administrator.

System.  A generic name for an Information System (IS).

System Administrator (SA). The individual responsible for maintaining the system in day-to-day operations.  The SA has responsibility to: manage system hardware and software, data storage devices and application software; manage system performance; provide system security and customer support; perform equipment custodian duties; maintain software licenses and documentation; monitor hardware and software maintenance contracts; establish USERIDs and passwords; ensure adequate network connectivity; review audit trails; and provide backup of system operations and other system unique requirements.  See Information System Security Officer (ISSO).

System Design Security Officer (SDSO).  An individual responsible for ensuring that adequate security requirements are stated in the design specifications of new systems and system upgrades during the design phase of their life cycle.  This individual works closely with all project/program acquisition  managers.  See ISSE.

System Security Engineering. The efforts that help achieve maximum security and survivability of a system during its life cycle and interfacing with other program elements to ensure security functions are effectively integrated into the total system engineering effort.

System Security Authorization Agreement (SSAA).  A formal document that fully describes the planned security tasks required to meet system or network security requirements.  The package must contain all information necessary to allow the DAA Rep/SCO to make an official management determination for authorization for a system, network, or site to operate in a particular security mode of operation; with a prescribed set of safeguards, against a defined threat with stated vulnerabilities and countermeasures; in a given operational environment; under a stated operational concept; with stated interconnections to external systems; and at an acceptable level of risk.

System Security Plan (SSP). See System Security Authorization Agreement.

Technical Vulnerability. A hardware, firmware, communication, or software weakness which leaves an information system (IS) open for potential exploitation or damage, either externally or internally resulting in risk for the owner, user, or manager of the IS.

TEMPEST.  A short name referring to investigation, study, and control of compromising emanations from telecommunications and information system (IS) equipment.  TEMPEST must be considered during all life cycle phases of equipment. (See Compromising Emanations).

TEMPEST Approved. This term applies to equipment or systems which have been built and certified to meet Level I of National Security Telecommunications Information Systems Security Advisory Memorandum (NSTISSAM) TEMPEST/1-92, Compromising Emanations Laboratory Test Requirements.

TEMPEST Zone.  A defined area within a facility where equipment with appropriate TEMPEST characteristics (TEMPEST zone assignment) may be operated without emanating electromagnetic radiation beyond the controlled space boundary of the facility.

TEMPEST Zoned Equipment. Equipment that has been evaluated and assigned an equipment zone corresponding to the level in National Security Telecommunications Information Systems Security Advisory Memorandum (NSTISSAM) TEMPEST/1-92.  This equipment must be installed according to the NSTISSAM and HQ-Level specialized installation instructions.

Terminal Area. A subset or part of the overall work space assigned to a specific area within an organization.  An area within the typical office environment restrictive in size such that it permits one person to observe and monitor access with the intent of preventing Information System (IS) abuse and unauthorized IS access.

Threat Assessment.  The process of formally evaluating the degree of threat to an information system and describing the nature of the threat.

Threat Monitoring.  The analysis, assessment, and review of Information Systems (ISs) audit trails and other data collected for the purpose of searching out system events that may constitute violations or attempted violations of data or system security.

Toolbox.  See Computer Security Toolbox.

Trapdoor.  Operating system and application safeguards that usually prevent unauthorized personnel from accessing or modifying programs. During software development, however, these built‑in security measures are usually bypassed.  Programmers often create entry points into a program for debugging and/or insertion of new code at a later date.  These entry points (trapdoors) are usually eliminated in the final stages of program development, but they are sometimes overlooked, accidentally or intentionally.  A perfect example of a trapdoor was dramatized in the movie War Games, where the teen‑age hacker enters the special password "Joshua" and gains unrestricted access to a mainframe computer in NORAD headquarters. Such a mechanism in a computer's operating system can grant an attacker unlimited and virtually undetectable access to any system resource after presenting a relatively trivial control sequence or password.

Trojan Horse. A computer program containing an apparent or actual useful function that contains additional (hidden) functions that allows unauthorized collection, falsification, or destruction of data. This is the most commonly used method for program‑based frauds and sabotage.

Trusted Computing Base (TCB).  The totality of protection mechanisms within a computer system, including hardware, firmware, and software, the combination of which is responsible for enforcing a security policy. NOTE:  The ability of a TCB to enforce correctly a unified security policy depends on the correctness of the mechanisms within the TCB, the protection of those mechanisms to ensure their correctness, and the correct input of parameters related to the security policy.

Trusted Path. A mechanism by which a person using a terminal can communicate directly with the trusted computing base (TCB). NOTE: The trusted path can only be activated by the person or the TCB and cannot be initiated by untrusted software.

uNclassified Internet Protocol Router NETwork.  The unclassified network which replaced the military unclassified network. Provides connection to the world wide web.

Unclassified Sensitive. For computer applications, this term refers to any information, the loss, misuse, or unauthorized access to or modification of which could adversely affect the national interest or the conduct of Federal programs, or the privacy to which individuals are entitled under the section 552a of title 5, United States Code (the Privacy Act), but which has not been specifically authorized under the criteria established by an Executive Order or an Act of Congress to be kept secret in the interest of national defense or foreign policy.  (Computer Security Act of 1987, Public Law 100‑235). Also see Sensitive but Unclassified (SBU) Information.

User Identification (USERID). A unique symbol or character string that is used by an information system (IS) to uniquely identify a specific user.

User Network Manager (UNM). Each sponsor of a Community-of-Interest (COI) must designate an individual who will be responsible for the management of the network, request permission to use the data port, and ensure compliance with the security procedures defined in appropriate security policy documents and those specifically defined in the approval process.

User Representative (UR). A person formally designated, on behalf of the Command Authority, who is responsible for preparing and submitting all key orders (including Sensitive Compartmented Information [SCI]) to the Central Facility.  The UR has the responsibility for monitoring the status of those orders, to include keeping the Communications Security (COMSEC) manager informed of the pending key request in situations where the UR is other than the COMSEC manager.

Virus.  A self replicating, malicious program segment that attaches itself to an application program or other executable system component and leaves no external signs of its presence.

Volatile Memory.  Random Access Memory (RAM) which is not retained upon system shutdown.

Vulnerability.  A weakness in an information system (IS), or cryptographic system, or components (e.g., system security procedures, hardware design, internal controls), that could be exploited.

Wide Area Network (WAN). A computer network that services a large area.  WANs typically span large areas (states, countries, and continents) and are owned by multiple organizations.  See Local Area Network and Network.

Worm.  A worm is a program, originally developed by systems programmers, which allows the user to tap unused network resources to run large computer programs. The worm would search the network for idle computing resources and use them to execute a program in small segments. Built-in mechanisms would be responsible for maintaining the worm, finding free machines, and replicating the program.  Worms can tie up all the computing resources on a network and essentially shut it down. A worm is normally activated every time the system is booted up.  This is differentiated from WORM (write-once, read many) descriptive of optical (compact disk) media with single write capability.

Write Protect. A term used to indicate that there is a machine hardware capability which may be manually used to protect some storage media from accidental or unintentional overwrite by inhibiting the write capability of the system.  (For example, write protection of magnetic tapes is accomplished by the physical removal of the "write-ring" from the back of the tape. Write protection of three and one half inch floppy diskettes refers to the correct placement of the sliding tab to the open position which inhibits the hardware capability to perform a physical write to the diskette. Write protection includes using optical disks within CD read-only devices.)


 

 

APPENDIX C

SUMMARY OF CHANGES