1641 lines
62 KiB
Plaintext
1641 lines
62 KiB
Plaintext
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
+------------------------------------------------------+
|
|||
|
| |
|
|||
|
| |
|
|||
|
| |
|
|||
|
| MICROCOMPUTER SECURITY SURVEY |
|
|||
|
| |
|
|||
|
| |
|
|||
|
| AND |
|
|||
|
| |
|
|||
|
| |
|
|||
|
| MICROCOMPUTER BASELINE SECURITY CONTROLS |
|
|||
|
| RISK ANALYSIS ALTERNATIVE |
|
|||
|
| |
|
|||
|
| |
|
|||
|
| |
|
|||
|
| |
|
|||
|
+------------------------------------------------------+
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
July 1991
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Prepared by:
|
|||
|
Naval Computer and Telecommunications Station
|
|||
|
Security and Standards Branch
|
|||
|
Naval Air Station, Jacksonville
|
|||
|
Jacksonville, Florida 32212
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
INTENTIONALLY LEFT BLANK
|
|||
|
|
|||
|
|
|||
|
|
|||
|
REFERENCES
|
|||
|
|
|||
|
|
|||
|
|
|||
|
a. DoD Directive 5200.28, Security Requirements for Automated
|
|||
|
Information Systems (AISs)
|
|||
|
|
|||
|
b. SECNAVINST 5211.5, Personnel Privacy and Rights of Individuals
|
|||
|
Regarding Records Pertaining to Themselves
|
|||
|
|
|||
|
c. SECNAVINST 5239.2, Department of the Navy Automated Information
|
|||
|
(AIS) Security Program
|
|||
|
|
|||
|
d. SECNAVINST 5870.5, Permission to Copy Materials Subject To
|
|||
|
Copyright
|
|||
|
|
|||
|
e. SECNAVINST 7510.9, Command Management Economy, Efficiency and
|
|||
|
Review
|
|||
|
|
|||
|
f. OPNAVINST 5000.52, Command Evaluation Program
|
|||
|
|
|||
|
g. OPNAVINST 5510.1H, Department of the Navy Information and
|
|||
|
Personnel Security Program Regulation
|
|||
|
|
|||
|
h. OPNAVINST C5510.93E, Navy Implementation of National Policy on
|
|||
|
Control of Compromising Emanations (U)
|
|||
|
|
|||
|
i. OPNAVINST 5530.14B, Department of the Navy Physical Security and
|
|||
|
Loss Prevention
|
|||
|
|
|||
|
j. NRL Report 8897, An Approach to Determining Computer Security
|
|||
|
Requirements for Navy Systems
|
|||
|
|
|||
|
k. Public Law 100-235, Computer Security Act of 1987
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
i
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
INTENTIONALLY LEFT BLANK
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PREFACE
|
|||
|
|
|||
|
|
|||
|
|
|||
|
There is an increasing trend towards developing "baseline" approaches to manage
|
|||
|
the risks of automated information system environments. This concept proposes
|
|||
|
upfront implementation of security controls for the most common and already
|
|||
|
recognized vulnerabilities of an operating environment. The process may
|
|||
|
eliminate the need to conduct extensive formalized quantitative risk analyses to
|
|||
|
cost justify protective measures that may be required.
|
|||
|
|
|||
|
This document, consisting of two parts, was designed and developed as a tool to
|
|||
|
collect general system information and address the operating risk of a
|
|||
|
noncomplex microcomputer operating environment. It extracts the pertinent
|
|||
|
security related information from the instructions and directives in references
|
|||
|
(a) through (k) to present a composite approach toward analyzing level of risk.
|
|||
|
|
|||
|
Part I. Part I is a survey form and uses a fill in the blank approach to
|
|||
|
gather information about the assets, their processing capabilities,
|
|||
|
configuration, class of data, mode of operation, system required trust level,
|
|||
|
and other operating parameters.
|
|||
|
|
|||
|
Part II. Part II introduces a "baseline" approach to identifying and managing
|
|||
|
risk. This approach is recommended for use as a risk analysis alternative in
|
|||
|
low risk environments (e.g., systems processing unclassified, sensitive
|
|||
|
unclassified, or minimal classified information). The baseline security control
|
|||
|
concept assumes a basic set of controls, which have been assessed by management,
|
|||
|
are justifiable for achieving a reasonably secure microcomputer environment.
|
|||
|
The security control areas identified in Part II are considered fundamental to
|
|||
|
establishing a baseline of security for a microcomputer operating environment.
|
|||
|
These controls are designed to counter the threats of human errors, accidents,
|
|||
|
dishonest and disgruntled employees, and the threats associated with physical
|
|||
|
and environmental controls.
|
|||
|
|
|||
|
The "baseline" approach for managing risk, as presented in this document, has
|
|||
|
been approved for those activities operating microcomputers in a noncomplex
|
|||
|
environment within the Naval Computer and Telecommunications Command's
|
|||
|
(NAVCOMTELCOM) Area of Primary Responsibility (APR).
|
|||
|
|
|||
|
Regardless of the protective measures in place, the key element to security in
|
|||
|
any microcomputer environment is the user and how well the user follows
|
|||
|
established computer security policies and guidelines. It can not be
|
|||
|
overemphasized that users are the ones who help to ensure that the environment
|
|||
|
is as secure as necessary.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
ii
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
INTENTIONALLY LEFT BLANK
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PART I
|
|||
|
|
|||
|
|
|||
|
MICROCOMPUTER SECURITY SURVEY
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PART I
|
|||
|
PROCEDURES
|
|||
|
|
|||
|
The procedures identified below are used to complete the microcomputer
|
|||
|
security survey information in Part I of the document. It is recommended the
|
|||
|
Automatic Data Processing Systems Security Officer (ADPSSO) assigned to the
|
|||
|
system gather and record the information.
|
|||
|
|
|||
|
|
|||
|
SECTION I: General AIS Information
|
|||
|
|
|||
|
This section documents general information about the microcomputer. To
|
|||
|
complete the form, fill in the blank spaces or check the applicable choice(s)
|
|||
|
provided as follows:
|
|||
|
|
|||
|
Item 1. Check the appropriate configuration of the system. If the system is
|
|||
|
interfaced with another system/network and also used in a stand-alone mode,
|
|||
|
check both the interfaced configuration and the stand-alone unit areas as
|
|||
|
provided.
|
|||
|
|
|||
|
Item 2. Enter the building name/number and room number, if applicable.
|
|||
|
Indicate if the system is located in government or contractor space.
|
|||
|
|
|||
|
Item 3. Check the appropriate ownership and type of personnel who operate the
|
|||
|
system.
|
|||
|
|
|||
|
Item 4. Enter a check in single user system if the system is assigned to one
|
|||
|
individual, or check shared system if the system is assigned to and used by more
|
|||
|
than one individual.
|
|||
|
|
|||
|
Item 5. Define the classes of information processed on the system and modes of
|
|||
|
operation. List the percent of processing time for each class of information
|
|||
|
listed. The total must equate to 100%.
|
|||
|
|
|||
|
Item 6. List the names of all individuals assigned system responsibilities,
|
|||
|
their code, and telephone number.
|
|||
|
|
|||
|
Item 7. List all components, peripherals, communications processors, encryption
|
|||
|
devices, remote devices and remote interfaces for the system. Include the model
|
|||
|
number, serial number, and today's replacement cost.
|
|||
|
|
|||
|
Item 8. List the operating system and version level installed on the system
|
|||
|
(e.g., MS-DOS, Version 3.30) and today's replacement cost. Check the
|
|||
|
appropriate software ownership.
|
|||
|
|
|||
|
Item 9. List the commercial software and version level used on the system
|
|||
|
(e.g., Word Perfect, Version 5.1; dBase III, Version 1.1; Freelance Plus,
|
|||
|
Version 3.01; Novell NetWare 386, Version 3.0), appropriate ownership, software
|
|||
|
serial number, and today's replacement cost.
|
|||
|
|
|||
|
|
|||
|
Item 10. List all customized application software used on the system (i.e.,
|
|||
|
routines and programs developed in-house or by an outside source which contain
|
|||
|
specific tasks/applications), appropriate ownership, serial number, and today's
|
|||
|
replacement cost.
|
|||
|
|
|||
|
Item 11. Enter all letters of certification required for the hardware or
|
|||
|
software, date, and certification serial number. (Developing agencies must
|
|||
|
certify safeguards exist for all proposed or existing AISs, operating systems,
|
|||
|
and application software used for multisite distribution to permit accreditation
|
|||
|
with minimal effort by the end user commands.) Include in this area TEMPEST
|
|||
|
letters of certification, if applicable.
|
|||
|
|
|||
|
Item 12. Enter the total summary value of the equipment, software, and data at
|
|||
|
today's replacement cost. The value of the data must include disclosure value.
|
|||
|
The following guidelines are provided for determining the minimum impact of
|
|||
|
disclosure of sensitive data. These values are based on a per incident of data
|
|||
|
file disclosure, but do not waive the need for the data owner to determine an
|
|||
|
accurate estimation of data disclosure.
|
|||
|
|
|||
|
|
|||
|
GUIDELINES FOR IMPACT OF DISCLOSURE
|
|||
|
OF SENSITIVE DATA
|
|||
|
|
|||
|
For Official Use Only $1,000
|
|||
|
Privacy Act or Confidential $10,000
|
|||
|
Secret $100,000
|
|||
|
Top Secret $1,000,000
|
|||
|
|
|||
|
|
|||
|
Item 13. Identify and describe the mission of the microcomputer. Under (a)
|
|||
|
enter the primary functions or applications processed on the system, and under
|
|||
|
(b) identify the primary functions or applications processed via an interface
|
|||
|
with another system or network.
|
|||
|
|
|||
|
Item 14. Refer to NRL Report 8897 to determine and enter the system's Required
|
|||
|
Operational Level of Trust (ROTEL). For a given system, five factors must be
|
|||
|
evaluated to assess the system's overall risk. Based on the risk, the ROTEL can
|
|||
|
then be determined. The Navy Research Laboratory (NRL) Report 8897 process is
|
|||
|
used to evaluate each risk factor. The first three factors (local processing
|
|||
|
capability, communication path, and user capability) focus upon the system's
|
|||
|
configuration and hardware to determine the System Risk. Risk factors four and
|
|||
|
five (user clearance and data classification) assess the risk due to the mix of
|
|||
|
users and information to determine the Data Exposure. System Risk and Data
|
|||
|
Exposure results yield level of trust, referred to as the ROTEL value.
|
|||
|
|
|||
|
The NRL Report 8897, titled "An Approach to Determining Computer Security
|
|||
|
Requirements for Navy Systems," may be ordered from the National Technical
|
|||
|
Information Service (NTIS) for a charge of $11.00, plus a $3.00 handling charge.
|
|||
|
|
|||
|
Written requests should reference #ADA155750 and be addressed to:
|
|||
|
|
|||
|
National Technical Information Service
|
|||
|
5285 Port Royal Road
|
|||
|
Springfield, VA 22161
|
|||
|
|
|||
|
Telephone: (703) 487-4650
|
|||
|
|
|||
|
Example of determining the ROTEL: System - Zenith 248 Microcomputer
|
|||
|
|
|||
|
Using the NRL Report 8897 process, the five risk factors are:
|
|||
|
|
|||
|
Risk Factor 1 - Local Processing Capability Factor is Level 3.
|
|||
|
Risk Factor 2 - Communication Path Factor is Level 3.
|
|||
|
Risk Factor 3 - User Capability Factor is Level 3.
|
|||
|
|
|||
|
Each of these factors is applied as follows:
|
|||
|
|
|||
|
Local Processing Capability = 3 Where the two intersect (on
|
|||
|
Communication Path = 3 NRL Report 8897 Table 1) = 6
|
|||
|
|
|||
|
User Capability = 3
|
|||
|
|
|||
|
Where the 6 and 3 intersect (on NRL Report 8897 Table 2) = 9 for SYSTEM RISK
|
|||
|
|
|||
|
Risk Factor 4 (Rmin) - User Clearance Factor is Level 1.
|
|||
|
Risk Factor 5 (Rmax) - Data Classification Factor is Level 1.
|
|||
|
|
|||
|
These two factors are applied as follows:
|
|||
|
|
|||
|
Risk Factor 5 (Rmax) - Risk Factor 4 (Rmin) = Data Exposure*
|
|||
|
|
|||
|
* If Risk Factor 4 is greater than or equal to Risk Factor 5 data exposure
|
|||
|
equals 1 (if categories of data are on the system). Otherwise, the data
|
|||
|
exposure equals 0.
|
|||
|
|
|||
|
For this example:
|
|||
|
(Risk Factor 5) (Risk Factor 4)
|
|||
|
Rmax Rmin
|
|||
|
1 - 1 = 0 for DATA EXPOSURE
|
|||
|
|
|||
|
Refer to NRL Report 8897 Table 3. Use the intersection of the System Risk
|
|||
|
results (9) and the Data Exposure results (0) to determine the ROTEL value.
|
|||
|
|
|||
|
For this example:
|
|||
|
|
|||
|
Security features providing C2 security trust level are required for the
|
|||
|
Zenith 248.
|
|||
|
|
|||
|
|
|||
|
SECTION II. ACCREDITATION DOCUMENTATION
|
|||
|
|
|||
|
This section defines the system's current operating status and is to be
|
|||
|
completed as follows:
|
|||
|
|
|||
|
Item 1. If the system is operating under an existing accreditation statement,
|
|||
|
complete paragraph (a). If the system is operating under an interim authority,
|
|||
|
complete paragraph (b). Provide the following information as applicable:
|
|||
|
|
|||
|
Paragraph a. Identify the class(es) of data the system processes and mode
|
|||
|
of operation. Enter the date of accreditation and the name of the
|
|||
|
individual who granted system accreditation. (Attach a copy of the Statement
|
|||
|
of Accreditation.)
|
|||
|
|
|||
|
Paragraph b. Identify the class(es) of data the system is authorized to
|
|||
|
process and the mode of operation. Enter the date the IATO was issued,
|
|||
|
expiration date, and the name of the individual who granted the IATO.
|
|||
|
(Attach a copy of the IATO.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
INTENTIONALLY LEFT BLANK
|
|||
|
|
|||
|
|
|||
|
MICROCOMPUTER SECURITY SURVEY
|
|||
|
|
|||
|
SECTION I. GENERAL INFORMATION
|
|||
|
|
|||
|
1. System Identification: (Check all that apply.)
|
|||
|
|
|||
|
( ) Microcomputer Used As Stand-alone Unit
|
|||
|
( ) Microcomputer Networked Unit (Internal LAN External Network )
|
|||
|
( ) Microcomputer Used To Access System(s) External To The Department
|
|||
|
( ) Other
|
|||
|
|
|||
|
2. Microcomputer Location: Building: Room:
|
|||
|
|
|||
|
( ) Government Space ( ) Contractor Space
|
|||
|
|
|||
|
3. System/Hardware is:
|
|||
|
|
|||
|
( ) Government Owned/Operated ( ) Contractor Owned/Operated
|
|||
|
( ) Government Owned/Contractor ( ) Contractor Owned/Government
|
|||
|
Operated Operated
|
|||
|
( ) Privately Owned/Operated ( ) Other
|
|||
|
|
|||
|
4. The microcomputer is a: ( ) Single User System ( ) Shared System
|
|||
|
|
|||
|
5. List the classes of information processed and modes of operation.
|
|||
|
|
|||
|
Percent of
|
|||
|
Processing Modes of
|
|||
|
Classes of Information Time Operation *
|
|||
|
|
|||
|
Classified
|
|||
|
National Cryptologic
|
|||
|
SCI
|
|||
|
SIOP-ESI
|
|||
|
Top Secret
|
|||
|
Secret
|
|||
|
Confidential
|
|||
|
|
|||
|
Unclassified (Sensitive)
|
|||
|
Privacy Act Limited Access
|
|||
|
For Official Use Only Limited Access
|
|||
|
Financial Limited Access
|
|||
|
Sensitive Management Limited Access
|
|||
|
Proprietary Limited Access
|
|||
|
Privileged Limited Access
|
|||
|
|
|||
|
Unclassified (Not Sensitive) Limited Access
|
|||
|
|
|||
|
TOTAL 100%
|
|||
|
|
|||
|
* Applicable Modes of Operation For Classified Processing: Partitioned,
|
|||
|
System High, Dedicated, and Multilevel.
|
|||
|
|
|||
|
MICROCOMPUTER SECURITY SURVEY
|
|||
|
|
|||
|
6. System Responsibilities:
|
|||
|
|
|||
|
Name Code Phone
|
|||
|
|
|||
|
a. DAA
|
|||
|
b. ADPSO
|
|||
|
c. ADPSSO
|
|||
|
d. NSO
|
|||
|
e. Other
|
|||
|
f. Assigned User(s)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
7. Equipment Description: (List all components, peripherals, communications
|
|||
|
processors, encryption devices, remote devices, and remote interfaces for
|
|||
|
the system.)
|
|||
|
|
|||
|
Nomenclature/Manufacturer Model # Serial # Cost
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
8. List operating system, version level, and cost:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
( ) Government Owned (GO) ( ) Privately Owned (PO)
|
|||
|
( ) Contractor Owned (CO)
|
|||
|
|
|||
|
9. List commercially used software:
|
|||
|
|
|||
|
Software/Package Name (GO/CO/PO) Serial Number Cost
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MICROCOMPUTER SECURITY SURVEY
|
|||
|
|
|||
|
10. List Application Software: (Customized for an application.)
|
|||
|
|
|||
|
Application Name (GO/CO/PO) Serial Number Cost
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
11. List ALL letters of certification required for hardware and software.
|
|||
|
(Developing agencies must certify safeguards exist for all proposed or
|
|||
|
existing AISs, operating systems, and applications software used for
|
|||
|
multisite distribution to permit accreditation with minimal effort by the
|
|||
|
end user commands.)
|
|||
|
|
|||
|
SOFTWARE & HARDWARE DATE & SERIAL NUMBER OF
|
|||
|
TYPE LETTER OF CERTIFICATION
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
12. Total Value of System: (Specify purchase price or equivalent)
|
|||
|
|
|||
|
Total System Value: $ (Sum of equipment, software, and
|
|||
|
data)
|
|||
|
|
|||
|
(Equipment: $ Software: $ Data: $ )
|
|||
|
|
|||
|
13. Mission Relatedness:
|
|||
|
|
|||
|
A. Identify Primary function(s) of the Microcomputer. (Describe the
|
|||
|
primary applications processed on the system):
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
B. Identify Primary function(s) processed via any Network and/or
|
|||
|
Communication Links, or Distributed Systems.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MICROCOMPUTER SECURITY SURVEY
|
|||
|
|
|||
|
|
|||
|
14. System Security Trust Level Information:
|
|||
|
|
|||
|
The Required Operational Trust Evaluation Level (ROTEL) for the operating
|
|||
|
environment of this microcomputer is: (Circle one)
|
|||
|
|
|||
|
Most A1 B3 B2 B1 C2* C1 D Least
|
|||
|
Secure <-----------------------------------------------------> Secure
|
|||
|
|
|||
|
* SECNAVINST 5239.2, dated 15 Nov 89, requires Class C2 functionality
|
|||
|
(Controlled Access Protection) computer based security features as
|
|||
|
defined in DoD 5200.28-STD be implemented by 31 Dec 92.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
MICROCOMPUTER SECURITY SURVEY
|
|||
|
|
|||
|
|
|||
|
SECTION II. ACCREDITATION DOCUMENTATION
|
|||
|
|
|||
|
|
|||
|
1. A current accreditation statement is in existence for this system.
|
|||
|
|
|||
|
(Check One)
|
|||
|
|
|||
|
Yes No
|
|||
|
|
|||
|
|
|||
|
If Yes, complete paragraph (a). If No, complete paragraph (b).
|
|||
|
|
|||
|
|
|||
|
a. Operating under an accreditation statement for processing/handling
|
|||
|
|
|||
|
data
|
|||
|
|
|||
|
in
|
|||
|
|
|||
|
security mode of operation.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Accreditation granted by ,
|
|||
|
|
|||
|
dated . (Attach a copy of Statement of
|
|||
|
|
|||
|
Accreditation letter.)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
b. This system is operating under interim authority for processing
|
|||
|
|
|||
|
data in
|
|||
|
|
|||
|
security mode of operation.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Interim authority granted by
|
|||
|
|
|||
|
dated . Expires .
|
|||
|
|
|||
|
(Attach a copy of Interim Authority To Operate)
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
INTENTIONALLY LEFT BLANK
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
PART II
|
|||
|
|
|||
|
|
|||
|
MICROCOMPUTER BASELINE SECURITY CONTROL AREAS
|
|||
|
RISK ANALYSIS ALTERNATIVE
|
|||
|
|
|||
|
PART II
|
|||
|
PROCEDURES
|
|||
|
|
|||
|
|
|||
|
The procedures identified below are to be used as a risk analysis alternative
|
|||
|
to analyze the risk level of a microcomputer operating environment. Part II
|
|||
|
consists of three sections. It is recommended the form be completed by the
|
|||
|
ADPSSO and reviewed by the Automatic Data Processing Security Officer (ADPSO).
|
|||
|
|
|||
|
|
|||
|
SECTION I. SECURITY CONTROL AREAS
|
|||
|
|
|||
|
This section contains a basic set of security control areas which are
|
|||
|
considered fundamental to establishing a secure microcomputer operating
|
|||
|
environment. Depending on the inherent risk that a given system displays, these
|
|||
|
baseline controls may not be all inclusive. If in completing this section, it
|
|||
|
is determined additional security control areas are required to reduce the
|
|||
|
operational risk, these additional security control areas must be identified and
|
|||
|
documented. Complete this section as follows:
|
|||
|
|
|||
|
STEP 1. Request the Designated Approving Authority (DAA) assess the security
|
|||
|
control areas and approve the use of this baseline approach to quantify the
|
|||
|
system's level of risk.
|
|||
|
|
|||
|
STEP 2. Respond to each security control area with a "yes" or "no" answer.
|
|||
|
|
|||
|
a. If the response is "yes," check the applicable safeguards listed that
|
|||
|
provide protection to support the security control area requirement. If
|
|||
|
additional safeguards are implemented, list them in the comments section.
|
|||
|
|
|||
|
b. If the response is "no," explain, in the comments section, what security
|
|||
|
deficiencies are evident in the operating environment.
|
|||
|
|
|||
|
STEP 3. Review the Safeguard Scoring Rationale and assign a score of 1, 2, or
|
|||
|
15 for each security control area. A score must be assigned to each security
|
|||
|
control area. If the security control area does not apply to the operating
|
|||
|
environment (e.g., TEMPEST Control), assign a score of 1 to indicate a low risk.
|
|||
|
The score is determined by weighing the implemented safeguards that support the
|
|||
|
baseline security control area against the requirements of the operating
|
|||
|
environment.
|
|||
|
|
|||
|
|
|||
|
SECTION II. ANALYSIS OF RISK
|
|||
|
|
|||
|
This section is used to total the risk rating score for each security control
|
|||
|
area, assign a risk category, and provide an overall assessment of the operating
|
|||
|
environment. Complete this section as follows:
|
|||
|
|
|||
|
STEP 1. Review the responses provided for each security control area and enter
|
|||
|
the appropriate score in paragraph A., Risk Rating Score, in the score column.
|
|||
|
Sum the scores of each security control area and enter the total points on the
|
|||
|
total line provided in paragraph A.
|
|||
|
|
|||
|
|
|||
|
STEP 2. Review the Risk Category Legend and assign the appropriate Risk
|
|||
|
Category, (Low, Moderate, or High) based on the total scoring points of
|
|||
|
paragraph A and the applicable scoring range identified in paragraph B.
|
|||
|
|
|||
|
STEP 3. Based upon your knowledge of the operating environment and any
|
|||
|
historical data available to you, provide your overall assessment in paragraph C
|
|||
|
of the AIS operation by responding with a low, moderate, or high risk level. If
|
|||
|
your overall assessment differs from the risk category assigned in paragraph B,
|
|||
|
explain the differences in the space provided.
|
|||
|
|
|||
|
|
|||
|
SECTION III. MICROCOMPUTER SURVEY AND SECURITY CONTROL AREA COMPLETION DATA
|
|||
|
|
|||
|
This section records the name of the individual who completed Parts 1 and 2
|
|||
|
and provides recommendations (to be checked as appropriate) based on the risk
|
|||
|
level identified. Complete this section as follows:
|
|||
|
|
|||
|
STEP 1. List the name of the individual completing the form, completion date,
|
|||
|
title/position, location, code, and telephone number. If more than one
|
|||
|
individual completed the form, list all names.
|
|||
|
|
|||
|
STEP 2. Based on the data collected and recorded on the document regarding the
|
|||
|
system's operating environment, any historical data available, and the expertise
|
|||
|
of the individual(s) completing the form, evaluate the operating environment and
|
|||
|
check the applicable recommendation.
|
|||
|
|
|||
|
STEP 3. Sign the form in the space provided. If more than one individual
|
|||
|
completed the form, their signature(s) is/are also required.
|
|||
|
|
|||
|
STEP 4. Enter the name, title/position, and telephone number of the individual
|
|||
|
who reviewed the form. Sign and date the form in the space provided.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
INTENTIONALLY LEFT BLANK
|
|||
|
|
|||
|
|
|||
|
MICROCOMPUTER BASELINE SECURITY CONTROLS
|
|||
|
RISK ANALYSIS ALTERNATIVE
|
|||
|
|
|||
|
|
|||
|
SECTION I: SECURITY CONTROL AREAS
|
|||
|
|
|||
|
1. SECURITY CONTROL AREA: System Access Control (Protective measures to ensure the
|
|||
|
identity of each user authorized access to the system is positively established prior
|
|||
|
to granting access.)
|
|||
|
|
|||
|
Access to the system is controlled to ensure each person having access can be
|
|||
|
identified and held accountable for their actions.
|
|||
|
|
|||
|
Yes ______ No ______ (No answers must be explained.)
|
|||
|
|
|||
|
Safeguards implemented include: (Check applicable safeguards.)
|
|||
|
__ An Access Control Policy is in place and enforced.
|
|||
|
__ Warning against unauthorized access is displayed.
|
|||
|
__ Access control software package is used to provide system access control.
|
|||
|
__ Access control hardware/software package is used to provide system access
|
|||
|
control.
|
|||
|
__ Access control token/authentication devices used to provide system access
|
|||
|
control.
|
|||
|
__ Authorized user list posted.
|
|||
|
__ Individual user IDs/passwords assigned.
|
|||
|
__ Passwords are removed when employee terminates.
|
|||
|
__ System is not left on and unattended.
|
|||
|
__ Audit Trail is in use and regularly monitored.
|
|||
|
__ System is equipped with limited log on attempts
|
|||
|
__ Unauthorized system access attempts reported.
|
|||
|
__ Additional safeguards implemented (list below in comments section).
|
|||
|
|
|||
|
Comments:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Safeguard Scoring Rationale: Score
|
|||
|
|
|||
|
Low Risk. System accepted as is. All safeguard requirements 1
|
|||
|
are implemented and are consistently enforced to operate the
|
|||
|
system at an acceptable level.
|
|||
|
|
|||
|
Moderate Risk. System can be operated under its present condition. 2
|
|||
|
All safeguard requirements are implemented and usually enforced to
|
|||
|
operate the system at an acceptable level.
|
|||
|
|
|||
|
High Risk. System is rejected. Existing safeguards are inadequate 15
|
|||
|
for reducing the probability of loss, or the impact of loss, to an
|
|||
|
acceptable level.
|
|||
|
|
|||
|
|
|||
|
2. SECURITY CONTROL AREA: Data Access Control (Data access controls ensures only
|
|||
|
authorized users having a need to know have access to, knowledge of, or possession of
|
|||
|
information processed and stored on a system.)
|
|||
|
|
|||
|
Data files are identified and protected in accordance with appropriate security
|
|||
|
classification and procedural guidelines.
|
|||
|
|
|||
|
Yes ______ No ______ (No answers must be explained.)
|
|||
|
|
|||
|
Safeguards implemented include: (Check applicable safeguards.)
|
|||
|
__ Least privilege principle followed limiting data access to authorized users.
|
|||
|
__ Critical and sensitive data files are identified and protected.
|
|||
|
__ Storage of sensitive data on the hard disk is prohibited.
|
|||
|
__ Procedures to ensure data integrity have been established to prevent accidental
|
|||
|
or malicious modification, unauthorized disclosure or destruction of data.
|
|||
|
__ Color coded labels are used to comply with Information Security Oversight
|
|||
|
Office standard color code label requirements.
|
|||
|
__ Application programs written with feature that permits only authorized
|
|||
|
users access to data.
|
|||
|
__ Removable media only used and properly secured.
|
|||
|
__ Output products properly marked.
|
|||
|
__ Backup copies of critical data files created regularly.
|
|||
|
__ An off-site area is used for backup storage of critical data.
|
|||
|
__ Password control procedures are implemented.
|
|||
|
__ Passwords are protected and changed frequently (at least monthly).
|
|||
|
__ Employees log off before leaving system unattended.
|
|||
|
__ Personnel periodically informed of their information security
|
|||
|
responsibilities.
|
|||
|
__ Physical access controls to the microcomputer area are enforced.
|
|||
|
__ Sensitive data files are encrypted when not actually used.
|
|||
|
__ Additional safeguards implemented (list below in comments section).
|
|||
|
|
|||
|
Comments:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Safeguard Scoring Rationale: Score
|
|||
|
|
|||
|
Low Risk. System accepted as is. All safeguard requirements 1
|
|||
|
are implemented and are consistently enforced to operate the
|
|||
|
system at an acceptable level.
|
|||
|
|
|||
|
Moderate Risk. System can be operated under its present condition. 2
|
|||
|
All safeguard requirements are implemented and usually enforced to
|
|||
|
operate the system at an acceptable level.
|
|||
|
|
|||
|
High Risk. System is rejected. Existing safeguards are inadequate 15
|
|||
|
for reducing the probability of loss, or the impact of loss, to an
|
|||
|
acceptable level.
|
|||
|
|
|||
|
3. SECURITY CONTROL AREA: Software Control (Software control ensures software
|
|||
|
integrity is maintained and only authorized software is used on the system.)
|
|||
|
|
|||
|
Controls are in place to ensure integrity and protection of all software used on
|
|||
|
the system.
|
|||
|
|
|||
|
Yes ______ No ______ (No answers must be explained.)
|
|||
|
|
|||
|
Safeguards implemented include: (Check applicable safeguards.)
|
|||
|
__ Proprietary software procedures implemented and enforced to ensure
|
|||
|
compliance with copyright/license laws.
|
|||
|
__ All personnel are made aware of the command's policy on reproducing
|
|||
|
copyright software.
|
|||
|
__ Use of unapproved software from any source is prohibited.
|
|||
|
__ All new software is checked for possible infection before installation.
|
|||
|
__ Original software is stored in a secure location outside the micro
|
|||
|
area.
|
|||
|
__ Backup copies are appropriately maintained.
|
|||
|
__ An inventory is maintained of all software assigned to the system.
|
|||
|
__ Documentation available for application software developed in-house.
|
|||
|
__ Configuration control procedures have been established to control
|
|||
|
software modifications.
|
|||
|
__ Virus detection software is available to detect malicious code.
|
|||
|
__ Virus detection software is used on a regular basis to detect malicious
|
|||
|
code.
|
|||
|
__ Additional safeguards implemented (list below in comments section).
|
|||
|
|
|||
|
Comments:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Safeguard Scoring Rationale: Score
|
|||
|
|
|||
|
Low Risk. System accepted as is. All safeguard requirements 1
|
|||
|
are implemented and are consistently enforced to operate the
|
|||
|
system at an acceptable level.
|
|||
|
|
|||
|
Moderate Risk. System can be operated under its present condition. 2
|
|||
|
All safeguard requirements are implemented and usually enforced to
|
|||
|
operate the system at an acceptable level.
|
|||
|
|
|||
|
High Risk. System is rejected. Existing safeguards are inadequate 15
|
|||
|
for reducing the probability of loss, or the impact of loss, to an
|
|||
|
acceptable level.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
4. SECURITY CONTROL AREA: Physical Security Control (Physical security controls
|
|||
|
safeguard personnel, prevent unauthorized access to sensitive or critical areas, and
|
|||
|
provide protection against espionage, sabotage, damage and theft.)
|
|||
|
|
|||
|
The microcomputer is located in an area with good physical access controls.
|
|||
|
|
|||
|
Yes ______ No ______ (No answers must be explained.)
|
|||
|
|
|||
|
Safeguards implemented include: (Check applicable safeguards.)
|
|||
|
__ Locks on door(s) to microcomputer area.
|
|||
|
__ Building secured after normal working hours.
|
|||
|
__ Equipment cover lock or equipment lockdown devices utilized.
|
|||
|
__ Power switch lock installed on system.
|
|||
|
__ Individual badge system in use.
|
|||
|
__ Escort and visitor control procedures implemented.
|
|||
|
__ Security guards on duty.
|
|||
|
__ Electronic alarms and monitoring devices used.
|
|||
|
__ Personal belongings searched on entering and leaving the building.
|
|||
|
__ Strangers entering the micro area are challenged.
|
|||
|
__ Warning signs posted indicating boundaries of restricted areas.
|
|||
|
__ Closed circuit television system (CCTV) installed.
|
|||
|
__ Additional safeguards implemented (list in comments section).
|
|||
|
|
|||
|
Comments:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Safeguard Scoring Rationale: Score
|
|||
|
|
|||
|
Low Risk. System accepted as is. All safeguard requirements 1
|
|||
|
are implemented and are consistently enforced to operate the
|
|||
|
system at an acceptable level.
|
|||
|
|
|||
|
Moderate Risk. System can be operated under its present condition. 2
|
|||
|
All safeguard requirements are implemented and usually enforced to
|
|||
|
operate the system at an acceptable level.
|
|||
|
|
|||
|
High Risk. System is rejected. Existing safeguards are inadequate 15
|
|||
|
for reducing the probability of loss, or the impact of loss, to an
|
|||
|
acceptable level.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
5. SECURITY CONTROL AREA: Environmental Controls (Protection measures to
|
|||
|
prevent, detect and minimize the effects of hazards such as fire, water damage,
|
|||
|
air contaminants, excess heat and electricity brownouts.)
|
|||
|
|
|||
|
Environmental hazards to which the microcomputer is exposed are minimized.
|
|||
|
|
|||
|
Yes ______ No ______ (No answers must be explained.)
|
|||
|
|
|||
|
Safeguards implemented include: (Check applicable safeguards.)
|
|||
|
__ Functioning fire detection system or smoke alarm installed in
|
|||
|
microcomputer area.
|
|||
|
__ Hand held Halon fire extinguishers are readily available.
|
|||
|
__ Fire extinguishers are regularly inspected.
|
|||
|
__ Sprinkler system installed.
|
|||
|
__ Emergency exits are clearly marked.
|
|||
|
__ Periodic fire drills conducted.
|
|||
|
__ Personnel trained in local fire fighting policy.
|
|||
|
__ Micro connected to isolated power source.
|
|||
|
__ Micro and peripherals plugged into surge protector with three prong
|
|||
|
outlets, connected to a power director device, or (if micro is subject to
|
|||
|
frequent power outages) a battery backup/UPS is installed.
|
|||
|
__ Adequate primary lighting provided.
|
|||
|
__ Emergency lighting provided.
|
|||
|
__ Drastic changes in humidity/temperature avoided.
|
|||
|
__ Micro located in an area with good air circulation (vents not blocked/air
|
|||
|
flow unrestricted).
|
|||
|
__ Routine cleaning schedule adhered to.
|
|||
|
__ Micro kept clear of paper stacks and other flammable materials.
|
|||
|
__ Smoking, eating and drinking is prohibited in and around the micro area.
|
|||
|
__ Plastic sheeting available to protect micro from dust and water damage.
|
|||
|
__ Static electricity is controlled.
|
|||
|
__ Users held responsible for maintaining a clean working environment.
|
|||
|
__ Additional safeguards implemented (list in comments section).
|
|||
|
|
|||
|
Comments:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Safeguard Scoring Rationale: Score
|
|||
|
|
|||
|
Low Risk. System accepted as is. All safeguard requirements 1
|
|||
|
are implemented and are consistently enforced to operate the
|
|||
|
system at an acceptable level.
|
|||
|
|
|||
|
Moderate Risk. System can be operated under its present condition. 2
|
|||
|
All safeguard requirements are implemented and usually enforced to
|
|||
|
operate the system at an acceptable level.
|
|||
|
|
|||
|
High Risk. System is rejected. Existing safeguards are inadequate 15
|
|||
|
for reducing the probability of loss, or the impact of loss, to an
|
|||
|
acceptable level.
|
|||
|
|
|||
|
6. SECURITY CONTROL AREA: Media Handling Controls (Measures to protect and
|
|||
|
secure storage media, i.e., source documents, diskettes, hard disks, printouts,
|
|||
|
tapes, cartridges.)
|
|||
|
|
|||
|
Media handling procedures have been established and are enforced ensuring all
|
|||
|
media is handled, stored and backed up properly.
|
|||
|
|
|||
|
Yes ______ No ______ (No answers must be explained.)
|
|||
|
|
|||
|
Safeguards implemented include: (Check applicable safeguards.)
|
|||
|
__ Diskettes are protected from dust and dirt, cigarette smoke and ashes,
|
|||
|
liquid spills, and food crumbs.
|
|||
|
__ Care is taken to never touch the recording surface of the diskette.
|
|||
|
__ Diskettes are protected from all sources of magnetism.
|
|||
|
__ When not in use, diskettes are kept in their protective jackets.
|
|||
|
__ A felt tip pen is used to complete label prior to affixing to diskette.
|
|||
|
__ Floppy diskettes are protected from bending and similar damage.
|
|||
|
__ Diskettes are not subjected to intense heat or intense cold.
|
|||
|
__ Employees are instructed to never insert/remove a diskette when the drive
|
|||
|
light is on to avoid read/write head damage.
|
|||
|
__ Diskettes are placed in their protective jackets and stored vertically
|
|||
|
inside an appropriate container.
|
|||
|
__ All magnetic media is externally marked with appropriate markings.
|
|||
|
__ When several files are stored on one diskette, a printout of the
|
|||
|
diskette's directory is taped to the jacket for easy referencing.
|
|||
|
__ Storage boxes are kept away from all sources of electromagnetic
|
|||
|
interference.
|
|||
|
__ Procedures for backing up floppy diskettes and hard disks have been
|
|||
|
developed and routinely followed.
|
|||
|
__ Master diskettes are protected by write/protect tabs.
|
|||
|
__ The SHIP or PARK command is executed when storing/transporting hard disks.
|
|||
|
__ Appropriate procedures are followed for disposing of storage media.
|
|||
|
__ NSA approved degaussing equipment utilized.
|
|||
|
__ Additional safeguards implemented (list in comments section).
|
|||
|
|
|||
|
Comments:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Safeguard Scoring Rationale: Score
|
|||
|
|
|||
|
Low Risk. System accepted as is. All safeguard requirements 1
|
|||
|
are implemented and are consistently enforced to operate the
|
|||
|
system at an acceptable level.
|
|||
|
|
|||
|
Moderate Risk. System can be operated under its present condition. 2
|
|||
|
All safeguard requirements are implemented and usually enforced to
|
|||
|
operate the system at an acceptable level.
|
|||
|
|
|||
|
High Risk. System is rejected. Existing safeguards are inadequate 15
|
|||
|
for reducing the probability of loss, or the impact of loss, to an
|
|||
|
acceptable level.
|
|||
|
|
|||
|
7. SECURITY CONTROL AREA: Personnel Security Control (Personnel security
|
|||
|
controls ensure an employee's level of trustworthiness is commensurate with
|
|||
|
their duties, all personnel are informed of information security requirements
|
|||
|
including their individual responsibilities, and are made aware of ethical
|
|||
|
computer behavior practices.)
|
|||
|
|
|||
|
Appropriate security clearance procedures are followed and all personnel have
|
|||
|
a current working knowledge of good computer security practices, information
|
|||
|
security procedures and understand their individual computer security
|
|||
|
responsibilities.
|
|||
|
|
|||
|
Yes ______ No ______ (No answers must be explained.)
|
|||
|
|
|||
|
Safeguards implemented include: (Check applicable safeguards.)
|
|||
|
__ Personnel security policies require screening of all individuals
|
|||
|
(including contractors) participating in the design, operation, and
|
|||
|
maintenance of the system or having access to the data in the system,
|
|||
|
commensurate with the sensitivity of information being handled.
|
|||
|
__ New employees are indoctrinated to their ethical responsibilities.
|
|||
|
__ Personnel dealing with sensitive information are provided periodic
|
|||
|
security briefings.
|
|||
|
__ Personnel sign a statement that they understand their information
|
|||
|
security responsibilities.
|
|||
|
__ Employees are aware of the command's policy on use of personal resources
|
|||
|
to perform government work.
|
|||
|
__ Personnel security policies include checkout procedures that deny access
|
|||
|
to the computer system to departing employees.
|
|||
|
__ Standard debriefing procedures are followed.
|
|||
|
__ Additional safeguards implemented (list below in comments section).
|
|||
|
|
|||
|
Comments:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Safeguard Scoring Rationale: Score
|
|||
|
|
|||
|
Low Risk. System accepted as is. All safeguard requirements 1
|
|||
|
are implemented and are consistently enforced to operate the
|
|||
|
system at an acceptable level.
|
|||
|
|
|||
|
Moderate Risk. System can be operated under its present condition. 2
|
|||
|
All safeguard requirements are implemented and usually enforced to
|
|||
|
operate the system at an acceptable level.
|
|||
|
|
|||
|
High Risk. System is rejected. Existing safeguards are inadequate 15
|
|||
|
for reducing the probability of loss, or the impact of loss, to an
|
|||
|
acceptable level.
|
|||
|
|
|||
|
|
|||
|
8. SECURITY CONTROL AREA: Contingency Planning (Contingency planning
|
|||
|
consists of those activities undertaken in the anticipation of potential events
|
|||
|
which could cause serious adverse effects interrupting normal operations.)
|
|||
|
|
|||
|
A contingency plan has been developed with documented planned action steps to
|
|||
|
be taken before, during and after an emergency condition.
|
|||
|
|
|||
|
Yes ______ No ______ (No answers must be explained.)
|
|||
|
|
|||
|
Safeguards implemented include: (Check applicable safeguards.)
|
|||
|
__ Contingency plan prioritizes work based on criticality of functional
|
|||
|
applications.
|
|||
|
__ Backup copies of critical files created regularly.
|
|||
|
__ Backup copies of critical files, software packages and original
|
|||
|
application programs are stored off-site and can be retrieved within a
|
|||
|
reasonable time frame.
|
|||
|
__ When the system is not available, loaner equipment is used.
|
|||
|
__ Spare equipment is available for backup operations.
|
|||
|
__ Backup operations include an agreement with another facility.
|
|||
|
__ During contingency situations, critical processing is performed manually.
|
|||
|
__ All personnel involved have been informed of their contingency planning
|
|||
|
responsibilities.
|
|||
|
__ A copy of the contingency plan is stored off-site.
|
|||
|
__ The contingency plan is tested and evaluated on an annual basis.
|
|||
|
__ The contingency plan is tested under realistic operational conditions.
|
|||
|
__ Additional safeguards implemented (list below in comments section).
|
|||
|
|
|||
|
Comments:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Safeguard Scoring Rationale: Score
|
|||
|
|
|||
|
Low Risk. System accepted as is. All safeguard requirements 1
|
|||
|
are implemented and are consistently enforced to operate the
|
|||
|
system at an acceptable level.
|
|||
|
|
|||
|
Moderate Risk. System can be operated under its present condition. 2
|
|||
|
All safeguard requirements are implemented and usually enforced to
|
|||
|
operate the system at an acceptable level.
|
|||
|
|
|||
|
High Risk. System is rejected. Existing safeguards are inadequate 15
|
|||
|
for reducing the probability of loss, or the impact of loss, to an
|
|||
|
acceptable level.
|
|||
|
|
|||
|
|
|||
|
9. SECURITY CONTROL AREA: Computer Security Training (Training for all
|
|||
|
employees designed to heighten and maintain a level of security awareness
|
|||
|
throughout the command to ensure employees understand the criticality of
|
|||
|
protecting systems and data.)
|
|||
|
|
|||
|
Mandatory periodic training in computer security awareness and accepted
|
|||
|
computer security practices, as required by the Computer Security Act of
|
|||
|
1987, is provided all employees involved with the management, use, or
|
|||
|
operation of the system.
|
|||
|
|
|||
|
Yes ______ No ______ (No answers must be explained.)
|
|||
|
|
|||
|
Safeguards implemented include: (Check applicable safeguards.)
|
|||
|
__ An activity Security Training Program has been implemented which provides
|
|||
|
formal and informal training for all employees.
|
|||
|
__ New personnel are briefed on computer security awareness.
|
|||
|
__ Computer security films are available and shown to all employees on a
|
|||
|
scheduled basis.
|
|||
|
__ Posters to enhance computer security awareness are posted in heavily
|
|||
|
trafficked areas.
|
|||
|
__ Employees are debriefed on AIS security policies upon departing.
|
|||
|
__ Additional safeguards implemented (list below in comments section).
|
|||
|
|
|||
|
Comments:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Safeguard Scoring Rationale: Score
|
|||
|
|
|||
|
Low Risk. System accepted as is. All safeguard requirements 1
|
|||
|
are implemented and are consistently enforced to operate the
|
|||
|
system at an acceptable level.
|
|||
|
|
|||
|
Moderate Risk. System can be operated under its present condition. 2
|
|||
|
All safeguard requirements are implemented and usually enforced to
|
|||
|
operate the system at an acceptable level.
|
|||
|
|
|||
|
High Risk. System is rejected. Existing safeguards are inadequate 15
|
|||
|
for reducing the probability of loss, or the impact of loss, to an
|
|||
|
acceptable level.
|
|||
|
|
|||
|
|
|||
|
10. SECURITY CONTROL AREA: Administrative Controls (Administrative controls
|
|||
|
consist of local policies and guidelines for protecting systems and ensuring
|
|||
|
compliance with AIS Security Program requirements.)
|
|||
|
|
|||
|
Detailed Standard Operating Procedures (SOPs) and documentation are provided
|
|||
|
to establish local policy/guidance and to ensure compliance with program
|
|||
|
objectives.
|
|||
|
|
|||
|
Yes ______ No ______ (No answers must be explained.)
|
|||
|
|
|||
|
Safeguards implemented include: (Check applicable safeguards.)
|
|||
|
__ Standard Operating Procedures establishing local computer security
|
|||
|
policies are readily available and maintained in a current status.
|
|||
|
__ Acquisition and procurement documentation is reviewed by the ADPSO for
|
|||
|
compliance with Life Cycle Management program requirements.
|
|||
|
__ Security violation procedures have been established and distributed to
|
|||
|
all personnel.
|
|||
|
__ Procedures are established and enforced to safeguard software and files
|
|||
|
used to provide internal security controls, passwords or audit trails.
|
|||
|
__ The activity has established a policy for use of privately owned resources
|
|||
|
to perform government work.
|
|||
|
__ Procedural guidance for reducing the risk of malicious code has been
|
|||
|
established and made available to applicable personnel.
|
|||
|
__ Periodic reviews are performed on the system.
|
|||
|
__ Additional safeguards implemented (list below in comments section).
|
|||
|
|
|||
|
Comments:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Safeguard Scoring Rationale: Score
|
|||
|
|
|||
|
Low Risk. System accepted as is. All safeguard requirements 1
|
|||
|
are implemented and are consistently enforced to operate the
|
|||
|
system at an acceptable level.
|
|||
|
|
|||
|
Moderate Risk. System can be operated under its present condition. 2
|
|||
|
All safeguard requirements are implemented and usually enforced to
|
|||
|
operate the system at an acceptable level.
|
|||
|
|
|||
|
High Risk. System is rejected. Existing safeguards are inadequate 15
|
|||
|
for reducing the probability of loss, or the impact of loss, to an
|
|||
|
acceptable level.
|
|||
|
|
|||
|
11. SECURITY CONTROL AREA: Class C2 Security (Class C2 security provides for
|
|||
|
controlled access protection for systems processing classified and sensitive
|
|||
|
unclassified information. Class C2 security and accountability features are
|
|||
|
discretionary access control, object reuse, identification and authentication,
|
|||
|
and audit trail capability.)
|
|||
|
|
|||
|
The microcomputer is protected by hardware, software, and security operating
|
|||
|
procedures to provide reasonable security until such time as effective C2
|
|||
|
Class protection become available for microcomputers.
|
|||
|
|
|||
|
Yes ______ No ______ (No answers must be explained.)
|
|||
|
|
|||
|
Safeguards implemented include: (Check applicable safeguards.)
|
|||
|
__ Access to information controlled on an individual basis to ensure only
|
|||
|
having a need-to-know are granted access.
|
|||
|
__ Individuals identified and authenticated through User ID and password.
|
|||
|
__ A security software package is used to provide C2 functionality (i.e.,
|
|||
|
discretionary access control, object reuse, identification and
|
|||
|
authentication, and audit trail capability).
|
|||
|
__ Overwrite routines are used to clear internal memory and registers.
|
|||
|
__ The micro is turned off to clear memory before reuse by another user.
|
|||
|
__ Application programs perform a "zero out" function prior to program
|
|||
|
termination.
|
|||
|
__ A manual audit trail is maintained to record each event (date and time of
|
|||
|
the event, user, type of event).
|
|||
|
__ The operating system controls access to all system resources.
|
|||
|
__ C2 assurance and documentation requirements (i.e., system architecture,
|
|||
|
system integrity, security testing, security features user guide, trusted
|
|||
|
facility manual, test and design documentation) are met through in-house
|
|||
|
Standard Operating Procedures (SOPs).
|
|||
|
__ Additional safeguards implemented (list below in comments section).
|
|||
|
|
|||
|
Comments:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Safeguard Scoring Rationale: Score
|
|||
|
|
|||
|
Low Risk. System accepted as is. All safeguard requirements 1
|
|||
|
are implemented and are consistently enforced to operate the
|
|||
|
system at an acceptable level.
|
|||
|
|
|||
|
Moderate Risk. System can be operated under its present condition. 2
|
|||
|
All safeguard requirements are implemented and usually enforced to
|
|||
|
operate the system at an acceptable level.
|
|||
|
|
|||
|
High Risk. System is rejected. Existing safeguards are inadequate 15
|
|||
|
for reducing the probability of loss, or the impact of loss, to an
|
|||
|
acceptable level.
|
|||
|
|
|||
|
Note: This page must be completed if the system is operating in other than a
|
|||
|
stand-alone mode.
|
|||
|
|
|||
|
12. SECURITY CONTROL AREA: Communications Security Control (Measures to
|
|||
|
protect information transmitted over communication lines to ensure the data is
|
|||
|
not disclosed or compromised.)
|
|||
|
|
|||
|
Communications lines and links for systems operating in other than a
|
|||
|
stand-alone mode are secure commensurate with the class of data transmitted.
|
|||
|
|
|||
|
Yes ______ No ______ (No answers must be explained.)
|
|||
|
|
|||
|
Safeguards implemented include: (Check applicable safeguards.)
|
|||
|
__ Communication wiring contained within approved conduits.
|
|||
|
__ Telephone junction boxes/connection points are within controlled spaces.
|
|||
|
__ Dedicated transmission lines are utilized.
|
|||
|
__ Security modems are installed.
|
|||
|
__ Encryption devices are used to protect confidentiality of information.
|
|||
|
__ Host-User Agreements in place prior to connectivity.
|
|||
|
__ All access attempts are logged.
|
|||
|
__ Invalid access attempts are reported.
|
|||
|
__ Password management program established to assign, delete, and ensure
|
|||
|
users change passwords according to policy.
|
|||
|
__ Dial-up access connections are protected (i.e., dial-up access restricted
|
|||
|
to authorized users, dial-up telephone numbers restricted, dial-up lines
|
|||
|
are monitored, dial back employed once connection has been made).
|
|||
|
__ Remote Security Operating Procedures in place and enforced.
|
|||
|
__ Hardware/software configuration changes are controlled.
|
|||
|
__ Communications Control Manager monitors users' security practices.
|
|||
|
__ Audit trail of system activity is regularly reviewed.
|
|||
|
__ Procedures implemented for disconnecting from outside connectivity when
|
|||
|
operating in a stand-alone mode.
|
|||
|
__ Additional safeguards implemented (list below in comments section).
|
|||
|
|
|||
|
Comments:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Safeguard Scoring Rationale: Score
|
|||
|
|
|||
|
Low Risk. System accepted as is. All safeguard requirements 1
|
|||
|
are implemented and are consistently enforced to operate the
|
|||
|
system at an acceptable level.
|
|||
|
|
|||
|
Moderate Risk. System can be operated under its present condition. 2
|
|||
|
All safeguard requirements are implemented and usually enforced to
|
|||
|
operate the system at an acceptable level.
|
|||
|
|
|||
|
High Risk. System is rejected. Existing safeguards are inadequate 15
|
|||
|
for reducing the probability of loss, or the impact of loss, to an
|
|||
|
acceptable level.
|
|||
|
|
|||
|
Note: This page must be completed if the system is processing classified
|
|||
|
information.
|
|||
|
|
|||
|
13. SECURITY CONTROL AREA: TEMPEST Control (Measures to protect against
|
|||
|
spurious signals, referred to as electromagnetic emanations, emitted by
|
|||
|
computers that can be intercepted and automated information read.)
|
|||
|
|
|||
|
The system is in compliance with the TEMPEST requirements of OPNAVINST
|
|||
|
C5510.93.
|
|||
|
|
|||
|
Yes ______ No ______ (No answers must be explained.)
|
|||
|
|
|||
|
Safeguards implemented include: (Check applicable safeguards.)
|
|||
|
__ TEMPEST Vulnerability Assessment Request (TVAR) submitted to Commander,
|
|||
|
Naval Investigative Services Command.
|
|||
|
__ Microcomputer TEMPEST approved.
|
|||
|
__ TEMPEST waiver received.
|
|||
|
__ Filters installed on computer power and phone lines.
|
|||
|
__ Protected Distribution System (PDS) installed for processing classified
|
|||
|
data.
|
|||
|
__ PDS approval request submitted.
|
|||
|
__ PDS approval received.
|
|||
|
__ No radar/microwave or power transformers in general area of computer.
|
|||
|
__ Additional safeguards implemented (list below in comments section).
|
|||
|
|
|||
|
Comments:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Safeguard Scoring Rationale: Score
|
|||
|
|
|||
|
Low Risk. System accepted as is. All safeguard requirements 1
|
|||
|
are implemented and are consistently enforced to operate the
|
|||
|
system at an acceptable level.
|
|||
|
|
|||
|
Moderate Risk. System can be operated under its present condition. 2
|
|||
|
All safeguard requirements are implemented and usually enforced to
|
|||
|
operate the system at an acceptable level.
|
|||
|
|
|||
|
High Risk. System is rejected. Existing safeguards are inadequate 15
|
|||
|
for reducing the probability of loss, or the impact of loss, to an
|
|||
|
acceptable level.
|
|||
|
|
|||
|
SECTION II: ANALYSIS OF RISK
|
|||
|
|
|||
|
|
|||
|
A. RISK RATING SCORE (A score must be assigned to each security control
|
|||
|
area.)
|
|||
|
|
|||
|
Security Control Area Score Security Control Area Score
|
|||
|
|
|||
|
System Access Control _____ Contingency Planning _____
|
|||
|
Data Access Control _____ Computer Security Training _____
|
|||
|
Software Control _____ Administrative Controls _____
|
|||
|
Physical Access Control _____ Class C2 Security _____
|
|||
|
Environmental Control _____ Communications Security _____
|
|||
|
Media Handling Control _____ TEMPEST Control _____
|
|||
|
Personnel Security Control _____
|
|||
|
Total ________
|
|||
|
_____________________________________________________________________________
|
|||
|
|
|||
|
B. RISK CATEGORY
|
|||
|
|
|||
|
Scoring Range Risk Category* (Circle One)
|
|||
|
|
|||
|
---13--- LOW
|
|||
|
14 - 26 MODERATE
|
|||
|
27 & Above HIGH
|
|||
|
|
|||
|
* Risk Category Legend:
|
|||
|
|
|||
|
Low risk. The system is operating at an acceptable level of risk
|
|||
|
(adequate safeguards are implemented and enforced for all baseline
|
|||
|
security control areas).
|
|||
|
Moderate risk. The system can be operated under its present condition
|
|||
|
(adequate safeguards are implemented and usually enforced for all
|
|||
|
baseline security areas).
|
|||
|
High risk. Deficiencies were found in baseline security control areas.
|
|||
|
Interim Authority to Operate (IATO) issued pending implementation of
|
|||
|
required safeguards).
|
|||
|
______________________________________________________________________________
|
|||
|
|
|||
|
C. OVERALL ASSESSMENT
|
|||
|
|
|||
|
1. Based on your knowledge of the operating environment, and any historical
|
|||
|
data available, provide your assessment of the AIS operation.
|
|||
|
(Circle One)
|
|||
|
|
|||
|
Low Risk Moderate Risk High Risk
|
|||
|
|
|||
|
2. If your assessment differs from the risk category assigned above,
|
|||
|
explain in the space provided below.
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
SECTION III. MICROCOMPUTER SURVEY AND SECURITY CONTROL AREA COMPLETION DATA
|
|||
|
|
|||
|
1. Completed by:
|
|||
|
|
|||
|
Name: Date:
|
|||
|
|
|||
|
Title/Position:
|
|||
|
|
|||
|
Building: Room:
|
|||
|
|
|||
|
Code: Phone:
|
|||
|
|
|||
|
|
|||
|
2. Recommendations: (Check applicable recommendation.)
|
|||
|
|
|||
|
|
|||
|
Recommend Accreditation.
|
|||
|
|
|||
|
|
|||
|
Non-Accreditation recommended until such time as the following
|
|||
|
safeguards are implemented:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Recommend an in-depth quantitative risk analysis be performed
|
|||
|
on the system due to high risk areas in the operating
|
|||
|
environment.
|
|||
|
|
|||
|
|
|||
|
Other (explain):
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Signature:
|
|||
|
|
|||
|
|
|||
|
3. Reviewed by:
|
|||
|
|
|||
|
Name: Date:
|
|||
|
|
|||
|
Title/Position: Phone:
|
|||
|
|
|||
|
|
|||
|
Signature:
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
|
|||
|
INTENTIONALLY LEFT BLANK
|
|||
|
|
|||
|
|
|||
|
|
|||
|
Downloaded From P-80 International Information Systems 304-744-2253
|