Chapter 8

Table of Contents


CHAPTER 8


Automated Information System Security




Section 1. Responsibilities




8-100. General.




a.   Computer and networking systems (collectively referred to as


Automated Information Systems (AISs)) used to capture, create,


store, process or distribute classified information must be


operated so that the information is protected against unauthorized


disclosure or modification.




b.   Protection requires a balanced approach that includes AIS


features as well as administrative, operational, physical, and


personnel controls. Protection is commensurate with the


classification level and category of the information, the threat,


and the operational requirements associated with the environment of


the AIS.






8-101. Scope.




This Chapter describes the minimum security requirements for an AIS


processing classified information.






8-102. Responsibilities.




a.   The CSA shall establish a line of authority for oversight,


review, inspection, certification, and accreditation of AISs used


by its contractors.




b.   The contractor shall publish and promulgate an AIS Security


Policy that addresses the classified processing environment. The


contractor shall appoint an Information Systems Security


Representative (ISSR) whose responsibilities are to:


     (1)  Maintain liaison with the CSA.


     (2)  Implement and administer the contractor's AIS Security


     Policy.


     (3)  Ensure the preparation of an AIS Security Plan (AISSP).


     (4)  Ensure the establishment and maintenance of security


     safeguards and access controls.


     (5)  Ensure that users have the security clearance, special


     access authorizations, and need-to-know for the information


     that they can access.


     (6)  Ensure that all AIS security related documentation is


     current.


     (7)  Advise the CSA of any abnormal event that effects the


     security of the AIS.


     (8)  Ensure that secure maintenance procedures are followed.


     (9)  Ensure that security audit records are maintained,


     accessible, and reviewed and analyzed at least weekly.


     (10) Designate Security Custodians in facilities with multiple


     AIS or multiple shifts.


     (11) Ensure the development and implementation of an ongoing


     AIS security education program.


     (12) Perform threat based, aperiodic inspections pursuant to


     the AISSP. The frequency of inspections may be adjusted for


     sufficient cause.


     (13) Ensure that Memoranda of Agreement are in place for AIS


     supporting multiple CSAs.


     (14) Approve and document the movement of AIS equipment.


     (15) Approve the release of sanitized equipment and components


     in accordance with the sanitization matrix.


     (16) Approve and document additional AIS operated in dedicated


     security mode that is substantially the same as described in


     the AISSP. The classification level of the additional AIS must


     be the same as that of the approved AIS.


     (17) Approve and document additional or replacement components


     of a dedicated or system high AIS that are identical in


     functionality and do not affect the security of the AIS.


     (18) Document in the security plan and administer any


     procedures necessary to prevent classified information from


     migrating to unclassified AISs and leaving the security area.






Section 2. Accreditation and Security Modes






8-200. AIS Accreditation




a.   The contractor shall obtain written accreditation from the CSA


prior to processing classified information on AISs. To obtain


accreditation, the contractor shall submit a formal request to the


CSA and an AISSP. Where similar AIS are located within the same


facility, a single security plan is permitted.




b.   Accreditation is the CSAs approval for an AIS to process


classified information in an operational environment. The


accreditation is based on documentation, analysis, and evaluation


of AIS operations with respect to security risks and also on the


safeguards associated with operation of the AIS.




c.   Interim accreditation may be granted in order for a contractor


to start processing classified information. This interim action


shall be for a specific period and shall specify the contractor


actions to be completed and the minimum security requirements to be


met during this period.




d.   AIS accreditation may be withdrawn by the CSA should


procedures and controls established in the AISSP be assessed


ineffective by the CSA. Accreditation may also be withdrawn by the


CSA when there has been an unacceptable change in system or


security configuration.




e.   The contractor can self-approve AISs that are similar to


previously accredited AIS security profile and components provided


the self-approval plan and procedures are included in the AISSP. In


the event of discrepancies, or determination by the CSA that the


self-approval plan is not administered effectively, the CSA may


withdraw the contractor's self-approval authority.




f.   An AIS may be reaccredited or self-approval authority can be


reinstated by the CSA after review, analysis, and approval of an


updated AISSP. An accredited AIS may be reaccredited when


significant changes to the original accreditation or baseline


occur.






8-201. Equipment not Requiring Accreditation.




Some equipment/components, to include test equipment, fits the


definition of an AIS, whereas others may not. The ISSR will


determine and document the capability of such equipment in the


context of the equipment/components ability to collect and process


information. As a general rule, equipment composed of volatile


memory with no other storage media would not require accreditation.


AIS components that need not be included in the system


accreditation include but are not limited to:




a.   Electronic typewriters, basic function calculators, and test


equipment.




b.   Security requirements for AISs that are embedded as an


integral element of a larger system that is used to perform or


control a function, such as test stands, simulators, control


systems or weapons systems should be established concurrently with


the design and development of the system. If not provided, the


contractor shall request them from the appropriate GCA. In the


absence of such requirements, the security requirements and


procedures of this Manual will be applied to the extent appropriate


as determined by the CSA.






8-202. The AIS Security Plan.




a.   User Operational Procedures. These procedures describe how


access to an AIS and classified information is authorized and


revoked; the protection mechanisms provided by the AIS, guidelines


on their use, and how they interact with one another, procedures


for screening and preventing the introduction of malicious code,


and the like.




b.   System Configuration Management Procedures. These procedures


describe the documenting, controlling, changing, and maintaining of


the accountability of AIS hardware, firmware, software,


communications interfaces, operating procedures, and installation


structures.




c.   Audit Features and Controls. These describe:


     (1)  A chronological record of AIS usage and system support


     activities.


     (2)  Maintenance and repair of AIS hardware, including


     installation or removal of equipment, devices or components.


     (3)  Transaction receipt                s, equipment


     sanitization, declassification and release records.




d.   Concept of Operations (CONOP). The CONOP describes what the


AIS will be used for and how it will operate.




e.   Continuity of Operations Procedures (COOP). The COOP describes


procedures to ensure continuous operations of AISs in the event of


a disaster resulting from fire, flood, malicious act, human error,


or any other occurrence. When the GCA determines a COOP to be


necessary, the requirements will be contractually imposed. Costs


directly related to the COOP requirements when in addition to


safeguards required by this Manual, will be charged to the specific


contract for which the requirements are imposed. At a minimum, the


COOP must include:


     (1)  Identification of mission-essential resources, including


     AIS components, key response and recovery personnel, and


     alternate site processing requirements.


     (2)  Identification of mission-essential applications.


     (3)  The type of response necessary to continue the mission,


     based on the projected recovery time.


     (4)  Frequency of performing backups to ensure, at a minimum,


     that current back-up copies of mission essential software and


     data exist.


     (5)  An estimate of the cost of exercising the plan, software,


     or alternate site.




f.   System Administration and Maintenance Procedures. These


describe maintenance and repair procedures, including adding,


changing, and removing components, and the use of maintenance


devices and utilities.




g.   Training Procedures. Security awareness training must be


provided prior to assigning the individual access to the AIS and


updated as needed. An individual receiving the training may be


required to sign an agreement to abide by the security requirements


specified in the AISSP.




h.   Startup and Shut-down Procedures. These include system


upgrading and downgrading, handling of user data and output, access


controls to the AIS and remote AIS areas during, between, and after


classified processing; and the declassification, release and


destruction of storage media and AIS.




i.   Certification Test Plan. This plan outlines the inspection and


test procedures to demonstrate compliance with the security


requirements associated with the mode of operation. It must include


a detailed description of how the implementation of the operating


system software, data management software, firmware, and related


security software packages will enable the AIS to meet the


compartmented or multilevel mode requirements. Products,


subsystems, and systems that have been endorsed through formal


evaluation programs (e.g., the Evaluated Products List supporting


the TCSEC) must be evaluated as part of the AIS in the


certification and accreditation process. In lieu of a certification


test plan for the dedicated and system high mode, the ISSR will:


     (1)  Verify that system access controls and/or procedures are


     functional for the dedicated mode.


     (2)  Provide test results that verify that need to know


     controls are implemented for the system high mode.






8-203. Security Modes-General.




a.   AISs that process classified information must operate in the


dedicated, system-high, compartmented, or multilevel mode. Security


modes are authorized variations in security environments,


requirements, and methods of operating. In all modes, the


integration of automated and conventional security measures shall,


with reasonable dependability, prevent unauthorized access to


classified information during, or resulting from the processing of


such information, and prevent unauthorized manipulation of the AIS


that could result in the compromise of classified information.




b.   In determining the mode of operation, three elements must be


addressed:


     (1)  The boundary of an AIS includes all users that are


directly or indirectly connected, and who can receive data from the


system without a reliable human review by a cleared authority. The


perimeter is the extent of the system that is to be accredited as


a single system.


     (2)  The nature of data is defined in terms of its


classification levels, compartments, subcompartments, and


sensitivities.


     (3)  The level and diversity of access privileges of its users


are defined as their clearance levels, need-to-know, and formal


access approvals.






8-204. Dedicated Security Mode.




a.   An AIS is operating in the dedicated mode when each user with


direct or indirect access to the AIS, its peripherals, remote


terminals, or remote hosts has all of the following:


     (1)  A PCL and need-to-know for all information stored or


     processed.


     (2)  If applicable, has all formal access approvals and has


     executed all appropriate nondisclosure agreements for all the


     information stored and/or processed (including all


     compartments and sub-compartments).




b.   The following security requirements are established for AISs


operating in the dedicated mode:


     (1)  Enforce system access procedures.


     (2)  All hardcopy output and media removed will be handled at


     the level for which the system is accredited until reviewed by


     a knowledgeable individual.






8-205. Security Features for Dedicated Security Mode.




Since the system is not required to provide technical security


features, it is up to the user to protect the information on the


system.






8-206. Security Assurances for Dedicated Security Mode.




Configuration management procedures must be employed to maintain


the ability of the AIS to protect the customer's classified


information. Configuration management procedures must be conducted


in coordination with the ISSR. The systems configuration management


procedures shall include an approach for specifying, documenting,


controlling, and maintaining the visibility and accountability of


all appropriate AIS hardware, firmware, software, communications


interfaces, operating procedures, installation structures and


changes thereto.






8-207. System High Security Mode.




An AIS is operating in the system-high mode when each user with


direct or indirect access to the AIS, its peripherals, remote


terminals, or remote hosts has all of the following:




a.   A PCL for all information on the AIS.




b.   Access approval and has signed nondisclosure agreements for


all the information stored and/or processed.




c.   A need-to-know for some of the information contained within


the system.






8-208. Security Features for System High Mode.




AISs operating in the system high mode, in addition to meeting all


of the security standards established for the dedicated mode, will:




a.   Define and control access between system users and named


objects (e.g., files and programs). The enforcement mechanism must


allow system users to specify and control the sharing of those


objects by named individuals and/or explicitly defined groups of


individuals. The access control mechanism must either, by explicit


user action or by default, provide that all objects are protected


from unauthorized access (discretionary access control). Access


permission to an object by users not already possessing access


permission must only be assigned by authorized users of the object.




b.   When feasible, as determined by the CSA, provide a time


lockout in an interactive session after an interval of user


inactivity. The time interval and restart requirements shall be


specified in the AISSP.




c.   Provide an audit trail capability that records time, date user


ID, terminal ID (if applicable), and file name for the following


events:


     (1)  System log on and log off.


     (2)  Unsuccessful access attempts.




d.   Protect the audit, identification, and authentication


mechanisms from unauthorized access modification, access or


deletion.




e.   Require that storage contain no residual data from the


previously contained object before being assigned, allocated, or


reallocated to another subject.




f.   Ensure that each person having access to a multi-user AIS have


the proper security clearances and authorizations and be uniquely


identified and authenticated before access to the AIS is permitted.


The identification and authentication methods used shall be


specified and approved in the AISSP. User access controls in


multi-user AISs shall include authorization, user identification,


and authentication; administrative controls for assigning these


shall be covered in the AISSP.


     (1)  User Authorizations. The manager or supervisor of each


     user of an AIS shall determine the required authorizations,


     such as need-to-know for that user.


     (2)  User Identification. Each system user shall have a unique


     user identifier and authenticator.


          (a)  User ID Reuse. Prior to reuse of a user ID, all


     previous access authorizations (including file accesses for


     that user ID) shall be removed from the AIS.


          (b)  User ID Removal. The ISSR shall ensure the


     development and implementation of procedures for the prompt


     removal of access from the AIS when the need for access no


     longer exists.


          (c)  User ID Revalidation. The ISSR shall ensure that all


     user ID's are revalidated at least annually, and information


     such as sponsor and means of off-line contact (e.g., phone


     number, mailing address) are updated as necessary.




g.   Authentication. Each user of a multi-user AIS shall be


authenticated before access is permitted. This authentication can


be based on any one of three types of information: something the


person knows (e.g., a password); something the person possesses


(e.g., a card or key); something about the person (e.g.,


fingerprints or voiceprints); or some combination of these three.


Authenticators that are passwords shall be changed at least every


6 months. Multi-user AISs shall ensure that each user of the AIS is


authenticated before access is permitted.


     (1)  Logon. Users shall be required to authenticate their


identities at "logon" time by supplying their authenticator (e.g.,


password, smart card, or fingerprints) in conjunction with their


user ID.


     (2)  Protection of Authenticator. An authenticator that is in


the form of knowledge or possession (password, smart card, keys,)


shall not be shared with anyone. Authenticators shall be protected


at a level commensurate with the accreditation level of the AIS.


     (3)  Additional Authentication Countermeasures. Where the


operating system provides the capability, the following features


shall be implemented:


          (a)  Logon Attempt Rate. Successive logon attempts shall


     be controlled by denying access after multiple (maximum of


     five) unsuccessful attempts on the same user ID, by limiting


     the number of access attempts in a specified time period, by


     the use of a time delay control system, or other such methods,


     subject to approval by the CSA.


          (b)  Notification to the User. The user shall be notified


     upon successful logon of the date and time of the user's last


     logon; the ID of the terminal used at last logon, and the


     number of unsuccessful logon attempts using this user ID since


     the last successful logon. This notice shall require positive


     action by the user to remove the notice from the screen.






8-209. Security Assurances for System High Mode.




a.   Examination of Hardware and Software. AIS hardware and


software shall be examined when received from the vendor and before


being placed into use.


     (1)  AIS Hardware. An examination shall result in assurance


that the equipment appears to be in good working order and have no


elements that might be detrimental to the secure operation of the


resource. Subsequent changes and developments which affect security


may require additional examination.


     (2)  AIS Software. Commercially procured software shall be


examined to assure that the software contains no features that


might be detrimental to the security of the AIS. Security-related


software shall be examined to assure that the security features


function as specified.


     (3)  Custom Software or Hardware Systems. New or significantly


changed security relevant software and hardware developed


specifically for the system shall be subject to testing and review


at appropriate stages of development.




b.   Security Testing. The system security features for


need-to-know controls will be tested and verified. Identified flaws


will be corrected.








8-210. Compartmented Security Mode.




An AIS is operating in the compartmented mode when users with


direct or indirect access to the AIS, its peripherals, or remote


terminals have all of the following:




a.   A PCL for the most restricted information processed.




b.   Formal access approval and has signed nondisclosure agreements


for that information to which he or she is to have access (some


users do not have formal access approval for all compartments or


subcompartments processed by the AIS).




c.   A valid need-to-know for that information for which he/she is


to have access.






8-211. Security Features for Compartmented Mode.




In addition to all security features and security assurances


required for the system high mode of operation, AIS operating in


the compartmented mode of operation shall also include:




a.   Security Labels. The AIS shall place security labels on all


entities (e.g., files) reflecting the sensitivity (classification


level, classification category, and handling caveats) of the


information for resources and the authorizations (security


clearances, need-to-know, formal access approvals) for users. These


labels shall be an integral part of the electronic data or media.


These security labels shall be compared and validated before a user


is granted access to a resource.




b.   Export of Security Labels. Security labels exported from the


AIS shall be accurate representations of the corresponding security


labels on the information in the originating AIS.




c.   Mandatory Access Controls. Mandatory access controls shall


provide a means of restricting access to files based on the


sensitivity (as represented by the label) of the information


contained in the files and the formal authorization (i.e. security


clearance ) of users to access information of such sensitivity.




d.   No information shall be accessed whose compartment is


inconsistent with the session log on.




e.   Support a trusted communications path between itself and each


user for initial logon and verification for AIS processing TOP


SECRET information.




f.   Enforce, under system control, a system-generated, printed,


and human-readable security classification level banner at the top


and bottom of each physical page of system hard-copy output.




g.   Audit these additional events: the routing of all system jobs


and output, and changes to security labels.






8-212. Security Assurances for Compartmented Mode.




a.   Confidence in Software Source. In acquiring resources to be


used as part of an AIS, consideration shall be given to the level


of confidence placed in the vendor to provide a quality product, to


support the security features of the product, and to assist in the


correction of any flaws.




b.   Flaw Discovery. The vendor shall have implemented a method for


ensuring the discovery of flaws in the system (hardware, firmware,


or software) that may have an effect on the security.




c.   Description of Security Enforcement Mechanisms (often referred


to as the Trusted Computing Base). The protections and provisions


of the security enforcement mechanisms shall be documented in such


a manner to show the underlying planning for the security. The


security enforcement mechanisms shall be isolated and protected


from any user or unauthorized process interference or modification.


Hardware and software features shall be provided that can be used


to periodically validate the correct operation of the elements of


the security enforcement mechanisms.




d.   Independent Validation and Verification. An independent


validation and verification team shall assist in the certification


testing of an AIS and shall perform validation and verification


testing of the system as required by the CSA.




e.   Security Label Integrity. The methodology shall ensure, (1)


Integrity of the security labels; (2) The association of a security


label with the transmitted data; and (3) Enforcement of the control


features of the security labels.




f.   Detailed Design of Security Enforcement Mechanisms. An


informal description of the security policy model enforced by the


system shall be available.






8-213. Multilevel Security Mode.




An AIS is operating in the multilevel mode when all of the


following statements are satisfied concerning the users with direct


or indirect access to the AIS, its peripherals, remote terminals,


or remote hosts:




a.   All users of the multilevel system must have a PCL but some


users may not have a PCL for all levels of the classified


information residing on the system.




b.   All users are cleared, have a need-to-know, and the


appropriate access approval (i.e., signed nondisclosure agreements)


for information to be accessed.






8-214. Security Features for Multilevel Mode.




In addition to all security features and security assurances


required for the compartmented mode of operation, AIS operating in


the multilevel mode shall also include:




a.   A mechanism that is able to monitor the occurrence or


accumulation of security auditable events that may indicate an


imminent violation of security policy. This mechanism shall be able


to immediately notify the security administrator when thresholds


are exceeded and, if the occurrence or accumulation of these


security relevant events continues, the system shall take the least


disruptive action to terminate the event.




b.   Access controls that are capable of specifying, for each named


object, a list of named individuals and a list of groups of named


individuals with their respective modes of access to that object.


It will be possible to specify for each named object a list of


named individuals and a list of groups of named individuals for


which no access to the object is to be given.




c.   Support a trusted communication path between the AIS and users


for use when a positive AIS-to-user connection is required (i.e.,


logon, change subject security level). Communications via this


trusted path shall be activated exclusively by a user or the AIS


and shall be logically isolated and unmistakably distinguishable


from other paths.




d.   Support separate operator and administrator functions. The


functions performed in the role of a security administrator shall


be identified. The AIS system administrative personnel shall only


be able to perform security administrator functions after taking a


distinct auditable action to assume the security administrative


role of the AIS system. Non-security functions that can be


performed in the security administrative role shall be limited


strictly to those essential to performing the security role


effectively.




e.   Provide procedures and/or mechanisms to assure that, after an


AIS system failure or other discontinuity, recovery without a


protection compromise is obtained.




f.   Immediately notify a terminal user of each change in the


security level associated with that user during an interactive


session. A user shall be able to query the system as desired for a


display of the user's complete sensitivity label.




g.   Enforce an upgrade or downgrade principle where all users


processing have a system-maintained classification; no data is read


that is classified higher than the processing session authorized;


and no data is written unless its security classification level is


equal to the user's authorized processing security classification.






8-215. Security Assurances for Multilevel Mode.




a.   Flaw Tracking and Remediation. The vendor shall provide


evidence that all discovered flaws have been tracked and remedied.




b.   Life-Cycle Assurance. The development of the AIS hardware,


firmware, and software shall be under life-cycle control and


management (i.e., control of the AIS from the earliest design stage


through decommissioning).




c.   Separation of Functions. The functions of the ISSR and the AIS


manager shall not be performed by the same person.




d.   Device Labels. The methodology shall ensure that the


originating and destination device labels are a part of each


message header and enforce the control features of the data flow


between originator and destination.




e.   Trusted Path. The system shall support a trusted communication


path between the user and system security mechanisms.




f.   Security Isolation. The security enforcement mechanism shall


maintain a domain for its own execution that protects it from


external interference and tampering (e.g., by reading or


modification of its code and data structures). The protection of


the security enforcement mechanism shall provide isolation and non


circumvention of isolation functions.




g.   Security Penetration Testing. In addition to testing the


performance of the AIS for certification, there shall be testing to


attempt to penetrate the security countermeasures of the system.


The test procedures shall be documented in the test plan for


certification and also in the test plan for ongoing testing.






Section 3. Controls and Maintenance






8-300. Physical Security.




a.   Physical security safeguards shall be established that prevent


or detect unauthorized access to accredited system entry points and


unauthorized modification of the AIS hardware and software.


Hardware integrity of the AIS, including remote equipment, shall be


maintained at all times, even when the AIS is not processing or


storing classified information.




b.   Attended classified processing shall take place in an area,


normally a Restricted Area, where authorized persons can exercise


constant surveillance and control of the AIS. All unescorted


personnel to the area must have a government granted PCL and


controls must be in place to restrict visual and aural access to


classified information.




c.   When the AIS is processing classified information unattended,


or when classified information remains on an unattended AIS, a


Closed Area is required.




d.   When the AIS is not in use, all classified information has


been removed and properly secured, and the AIS has been downgraded,


continuous physical protection, to prevent or detect unauthorized


modification of the AIS hardware and software, shall be implemented


through one or more of the following methods:


     (1)  Continuous supervision by authorized personnel.


     (2)  Use of approved cabinets, enclosures, seals, locks or


     Closed Areas.


     (3)  Use of area controls that prevent or detect tampering or


     theft of the hardware and software. These controls will vary


     depending on the overall physical security controls in effect


     in the immediate secure area.






8-301. Software Controls.




a.   Contractor personnel that design, develop, test, install, or


make modifications to systems, or use security software, shall be


cleared to the level of the AIS. Non-system or applications


software that will be used during classified processing periods can


be developed or modified by personnel without a clearance. However,


before software developed by uncleared persons is used in a


classified processing period, it must be reviewed or tested by


authorized and knowledgeable contractor personnel to provide


reasonable assurance that security vulnerabilities do not exist.




b.   The AISSP must provide procedures for approval of installation


of any software on the AIS.




c.   Software provided on media that may be written to (e.g.,


magnetic media) must be safeguarded commensurate with the


accreditation level unless a physical write-protect mechanism is


used. (Mechanisms shall be tested and verified by attempting to


write to the media.) The write protection mechanism must be


verified once during each session when it is used to process


classified information.




d.   Unclassified software provided on media that cannot be changed


(e.g., CD read-only media) may be loaded onto the classified system


without being labeled or classified provided it is immediately


removed from the security area upon completion of the loading


procedure. If the media is to be retained in the security area, it


may be controlled and stored as unclassified media.




e.   The contractor shall validate the functionality of


security-related software (e.g., access control, auditing, purge,


etc.) before the AIS is accredited. The software shall be


revalidated when changed.






f.   Use of software of unknown or suspect origin is strongly


discouraged.




g.   The contractor must verify that all software is free of


malicious code prior to installation.




h.   Unclassified vendor-supplied software used for maintenance or


diagnostics must be controlled as though classified.




i.   Incidents involving malicious software will be investigated by


the ISSR. If the incident affects the integrity of classified


information, the CSA will be notified immediately and a written


report detailing the findings of this investigation will be


submitted to the CSA in accordance with the AISSP.






8-302. Media Controls.




a.   In general, media that contains classified information will be


handled in a manner consistent with the handling of classified


documents.




b.   All storage media used for classified data on dedicated and


system high AIS must be labeled and controlled to the highest level


of the information on the AIS. However, information not at the


highest level may be written to appropriately


classified/unclassified media using authorized procedures and/or


methods.




c.   All data storage media for compartmented and multilevel AIS


must be labeled and controlled to the highest level of the


information contained on the media.




d.   When two or more AISs are collocated in the same security area


and processing at different levels or compartments, procedures


described in the system security plan will be used to distinguish


among them.




e.   Authorized sanitization procedures for the most commonly used


memory and storage media are defined in the sanitization matrix.




f.   Media must be sanitized and all markings and labels removed


before media can be declassified. Sanitization actions must be


verified and a record must be annotated to show the date, the


particular sanitization action taken, and the person taking the


action.




g.   Media must be sanitized and declassified prior to release from


continuous protection.




h.   All printed output from an AIS processing in the dedicated or


system high mode must be treated as though classified until


verified to be unclassified.






8-303. Security Audits




a.   In addition to the audits required under security modes, the


following logs are required regardless of mode of operation. The


logs must include the date, the event, and the person responsible.


     (1)  Maintenance, repair, installation, or removal of hardware


components. Log must include the component involved, and action


taken.


     (2)  Installation, testing, and modification of operating


system and security-related software. Log must include the software


involved and action taken.


     (3)  Upgrading and downgrading actions.


     (4)  Sanitization and declassifying media and devices.


     (5)  Application and reapplication of seals.




b.   At intervals specified in the AISSP, the ISSR (or designee)


shall review, analyze, and annotate audit records created during


classified processing periods to ensure that all pertinent activity


is properly recorded and appropriate action has been taken to


correct anomalies.




c.   Audit trail records shall be retained until reviewed and


released by the contractor or CSA but not more than 12 months.






8-304. AIS Operations




a.   Security Level Upgrading. To increase the level of processing


on an AIS the following procedures must be implemented:


     (1)  Adjust the area controls to the level of information to


be processed.


     (2)  Configure the AIS as described in the AISSP. The use of


logical disconnects is prohibited for AIS processing TOP SECRET


information.


     (3)  Remove and store removable data storage media not to be


used during the processing period.


     (4)  Clear all memory including buffer storage.


     (5)  Initialize the system for processing at the approved


level of operation with a dedicated copy of the operating system.


This copy of the operating system must be protected commensurate


with the security classification and access levels of the


information to be processed during the period.




b.   Security Level Downgrading. To lower the level of processing,


the following procedures must be implemented:


     (1)  Remove and store removable data storage media not to be


used during the lower processing period.


     (2)  Clear the memory and buffer storage of the equipment to


be downgraded, for collateral SECRET and below; sanitize for TOP


SECRET.


     (3)  Sanitize printers.


     (4)  For classified processing, configure the AIS as described


in the AISSP.


     (5)  Adjust the area controls to the level of information to


be processed.


     (6)  Initialize the system for processing at the lower level


with a dedicated copy of the operating system. This copy of the


operating system must be protected commensurate with the security


classification and access levels of the information to be processed


during the period.






8-305. Identification and Authentication Techniques.




When the AIS is processing classified information, access to any


unattended hardware must conform to those required in this document


for the highest level of classified material processed on the AIS.


Specific user identification and authentication techniques and


procedures will be included in the AISSP. Examples of


identification and authentication techniques include, but are not


limited to: user IDs and passwords, tokens, biometrics and


smartcards.




a.   User IDs identify users in the system and are used in


conjunction with authentication techniques to gain access to the


system. User IDs will be disabled whenever a user no longer has a


need-to-know or proper clearance. The user ID will be deleted from


the system only after review of programs and data associated with


the ID. Disabled accounts will be removed from the system as soon


as practical. Access attempts will be limited to five tries. Users


who fail to access the system within the established limits will be


denied access until the user's ID is reactivated.




b.   When used, system logon passwords will be randomly selected


and will be at least six characters in length.


     (1)  Appropriate guidance must be provided by the ISSR or


contractor to users prior to their choosing their own logon


passwords. When an automated system logon-password generation


routine is used, it must be described in the AISSP.


     (2)  Passwords must be validated by the system each time the


user accesses the system.


     (3)  System logon passwords must not be displayed at any


terminal or printed on any printer.


     (4)  Passwords will not be shared by any user.


     (5)  Passwords will be classified and controlled at the


highest level of the information accessed.


     (6)  Passwords must be changed at least every 6 months.


     (7)  Immediately following a suspected or known compromise of


a password, the ISSR will be notified and a new password issued.




c.   Master data files containing the user population system logon


passwords will be encrypted when practical. Access to the files


will be limited to the ISSR and a designee identified in the AISSP.




d.   When classified and unclassified AIS are collocated the


following requirements apply:


     (1)  The ISSR must document procedures to ensure the


protection of classified information.


     (2)  The unclassified AIS cannot be connected to the


classified AIS.


     (3)  Users shall be provided a special awareness briefing.




e.   When two or more AISs are collocated in the same security area


and processing at different levels or compartments, procedures


described in the AISSPwill be used to distinguish among them.






8-306. Maintenance




a.   Cleared personnel who perform maintenance or diagnostics do


not normally require an escort. Need-to-know for access to


classified information must be enforced. Uncleared maintenance


personnel must always be escorted by a cleared and technically


knowledgeable individual. The ISSR must ensure that escorts of


uncleared maintenance personnel are trained and sufficiently


knowledgeable concerning the AISSP, established security policies


and practices, and escorting procedures.




b.   If maintenance is being conducted by appropriately cleared


personnel, system sanitizing or component isolation are a local


option. If maintenance is being performed by uncleared personnel,


steps must be taken to effectively deny access to classified


information by the uncleared person and any maintenance equipment


or software used; these procedures should be documented in the


AISSP. A technically knowledgeable escort is preferred. If access


to classified data cannot be precluded by the escort, either the


component under maintenance must be physically disconnected from


the classified AIS (and sanitized before and after maintenance) or


the entire AIS must be sanitized before and after maintenance.




c.   The dedicated copy of the system software with a direct


security function shall not be used for maintenance purposes by


uncleared personnel.




d.   When a system failure prevents sanitization of the system


prior to maintenance by uncleared vendor personnel, AISSP


procedures must be enforced to deny the uncleared person visual and


electronic access to any classified data that may be contained on


the system.




e.   When practical, all maintenance and diagnostics will be


performed in the contractor's facility. Any AIS components or


equipment released from secure control is no longer part of an


accredited system.




f.   Vendor-supplied software/firmware used for maintenance or


diagnostics must be protected at the level of the accredited AIS.


The CSA may allow, on a case-by-case basis, the release of certain


types of costly magnetic media for maintenance, such as disk


head-alignment.




g.   All maintenance tools, diagnostic equipment, and other devices


used to service an accredited AIS must be approved by the


contractor.




h.   Any component board placed into an accredited AIS must remain


in the security area until proper release procedures are completed.




i.   Remote diagnostic or maintenance services are strongly


discouraged. If remote diagnostic or maintenance services become


necessary, the AIS shall be sanitized and disconnected from any


communication links to network, prior to the connection of any


nonsecured communication line.




Clearing and Sanitization Matrix


Media                              Clear          Sanitize




Magnetic Tape


     Type I                        a or b         a, b, or m


     Type II                       a or b         b or m


     Type III                      a or b         m


Magnetic Disk


Bernoullis                         a, b, or c     m


Floppies                           a, b, or c     m


Non-Removable Rigid Disk           c              a, b, d, or m


Removable Rigid Disk               a, b, or c     a, b, d, or m


Optical Disk


Read Many, Write Many              c              m


Read Only                          m, n


Write Once, Read Many (Worm)       m, n


Memory


Dynamic Random Access Memory (DRAM)     c or g    c,g, or m


Electronically Alterable PROM (EAPROM)  i         j or m


Electronically Erasable PROM (EEPROM)   i         h or m


Erasable Programmable (ROM (EPROM)      k         l then c, or m


Flash EPROM (FEPROM)               i              c then i, or m


Programmable ROM (PROM)            c              m


Magnetic Bubble Memory             c              a, b, c, or m


Magnetic Core Memory               c              a, b, e, or m


Magnetic Plated Wire               c              c and f, or m


Magnetic Resistive Memory          c              m


Nonvolatile RAM (NOVRAM)           c or g         c, g, or m


Read Only Memory ROM               m


Static Random Access Memory (SRAM) c or g         c and f, g, or m


Equipment


Cathode Ray Tube (CRT)             g              q


Printers


Impact                             g              p then g


Laser                              g              o then g




Clearing and Sanitization Matrix




a.   Degauss with a Type I degausser




b.   Degauss with a Type II degausser.




c.   Overwrite all addressable locations with a single character.




d.   Overwrite all addressable locations with a character, its


complement, then a random character and verify. THIS METHOD IS NOT


APPROVED FOR SANITIZING MEDIA THAT CONTAINS TOP SECRET INFORMATION.




e.   Overwrite all addressable locations with a character, its


complement, then a random character.




f.   Each overwrite must reside in memory for a period longer than


the classified data resided.




g.   Remove all power to include battery power.




h.   Overwrite all locations with a random pattern, all locations


with binary zeros, all locations with binary ones.




i.   Perform a full chip erase as per manufacturer's data sheets.




j.   Perform i above, then c above, a total of three times.




k.   Perform an ultraviolet erase according to manufacturer's


recommendation.




l.   Perform k above, but increase time by a factor of three.




m.   Destroy - Disintegrate, incinerate, pulverize, shred, or melt.




n.   Destruction required only if classified information is


contained.




o.   Run five pages of unclassified text (font test acceptable).




p.   Ribbons must be destroyed. Platens must be cleaned.




q.   Inspect and/or test screen surface for evidence of burned-in


information. If present, the cathode ray tube must be destroyed.






Section 4. Networks




8-400. Networks.




This Section identifies basic security requirements for protecting


classified information processed on accredited networks. Network


operations shall maintain the integrity of the security features


and assurances of its mode of operation. A "Reference Guide for


Security in Networks" can be obtained from the CSA.






8-401. Types of Networks.




a.   A Unified Network is a collection of AIS's or network systems


that are accredited as a single entity by a single CSA. A unified


network may be as simple as a small standalone LAN operating in


dedicated mode, following a single security policy, accredited as


a single entity, and administered by a single ISSR. The perimeter


of such a network encompasses all its hardware, software, and


attached devices. Its boundary extends to all its users. A unified


network has a single mode of operation based on the clearance


levels, access, and need-to-know. This mode of operation will be


mapped to the level of trust required and will address the risk of


the least trusted user obtaining the most sensitive information


processed or stored on the network.




b.   An interconnected network is comprised of separately


accredited AISs and/or unified networks. Each self-contained AIS


maintains its own intra-AIS services and controls, protects its own


resources, and retains its individual accreditation. Each


participating AIS or unified network has its own ISSR. The


interconnected network must have a security support structure


capable of adjudicating the different security policy


(implementations) of the participating AISs or unified networks. An


interconnected network requires accreditation, which may be as


simple as an addendum to a Memorandum of Agreement (MOA) between


the accrediting authorities.






8-402. Methods of Interconnection.




a.   Security support structure (SSS) is the hardware, software,


and firmware required to adjudicate security policy and


implementation differences between and among connecting unified


networks and/or AISs. The SSS must be accredited. The following


requirements must be satisfied as part of the SSS accreditation:


     (1)  Document the security policy enforced by the SSS.


     (2)  Identify a single mode of operation.


     (3)  Document the network security architecture and design.


     (4)  Document minimum contents of MOA's required for


connection to the SSS.




b.   Separately accredited network (SAN) is a medium of


interconnection of convenience. Networks and/or AISs that are


interconnected through a SAN must meet the connection rules of the


SAN.




c.   The interconnection of previously accredited systems into an


accredited network may require a re-examination of the security


features and assurances of the contributing systems to ensure their


accreditations remain valid.


     (1)  Once an interconnected network is defined and accredited,


additional networks or separate AISs (separately accredited) may


only be connected through the accredited SSS.


     (2)  The addition of components to contributing unified


networks that are members of an accredited interconnected network


are allowed provided these additions do not change the


accreditation of the contributing system.






8-403. Network Requirements.




a.   Network Security Management. The contractor shall designate an


ISSR for each accredited network to oversee security. The ISSR is


responsible for ensuring compliance with the network security


requirements as described in the AISSP.




b.   Network Security Coordination.


     (1)  Every network must have a security plan.


     (2)  When different CSAs are involved, a single network


security manager (NSM) may be named that will be responsible for


network security (including the network AISSP). The NSM will ensure


a comprehensive approach to enforce the overall security policy


required by the network security plan.




c.   Specific network requirements must be determined on a


case-by-case basis by the CSAs involved; however, as a minimum, the


AISSP for the network must address the following additional


requirements:


     (1)  Description of security services and mechanisms


protecting against network specific threats. Consistent with its


mode of operation, the network must provide the following security


services:


          (a)  Access control.


          (b)  Data flow control.


          (c)  Data separation.


          (d)  Auditing.


          (e)  Communications integrity.


     (2)  Consistent implementation of security features across the


network components.


     (3)  Configuration control of network interconnections.


     (4)  Protection and control of data transfers.


     (5)  Security features incorporated in communications


protocols.


     (6)  Adequacy of any filtering bridge, secure gateway, or


other similar security device in controlling access and data flow.


     (7)  Compatibility of the entire combination of operating


modes when connecting a new system.


     (8)  Adequacy of the external system's features to support the


local security policy.






8-404. Transmission Security.




Protected Distribution Systems or National Security Agency approved


encryption methodologies and devices shall be used to protect


classified information when it is being transmitted between network


components.







Table of Contents




Copyright ⌐ 2006, KinoCode, Inc.