home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky alt.security:5368 comp.security.misc:2602
- Newsgroups: alt.security,comp.security.misc
- Path: sparky!uunet!usc!zaphod.mps.ohio-state.edu!sol.ctr.columbia.edu!The-Star.honeywell.com!umn.edu!sctc.com!smith
- From: smith@sctc.com (Rick Smith)
- Subject: Re: Help with handling SECRET data
- Message-ID: <1993Jan25.192803.10036@sctc.com>
- Organization: SCTC
- References: <1jpbtgINNrgd@news.cerf.net>
- Distribution: us
- Date: Mon, 25 Jan 1993 19:28:03 GMT
- Lines: 38
-
- readingj@nic.cerf.net (John D. Reading) writes:
-
- >I am working in an environment where we are soon going to have to deal
- >with both DOD SECRET data and unclassified data. ...
- >... Specifically, I am concerned about the possibility of using
- >PC's for classified work and connection to unclassified machines ...
-
- There's a general answer to this question that's fairly useful, so
- I'll post it:
-
- Ask Your Security Officer.
-
- If you are working in an organization where you handle classified
- data, you _must_ have a designated security officer who knows how to
- find answers to such questions. Generally, you can find guidance in
- the raw Industrial Security Manual, assuming you're a contractor.
- Your security officer will have a copy.
-
- If your organization has never used computers to process classified
- info before, then yes, there's a learning curve. But you aren't going
- to be able to use computers to process classified information until
- you've established the appropriate security procedures and had them
- approved by the appropriate offices.
-
- There _are_ procedures that permit the reuse of machines for both
- classified and unclassified processing, and for wiping certain kinds
- of disks. But they tend to be specific to the organization, the
- computing hardware being used, the type of computing activity, the
- type of data handled, and the sensitivity of the information. You
- might get warm fuzzies from advice you get from the Net, but you'll
- get in Big Trouble unless you pay primary attention to officially
- required and approved procedures.
-
- There's no "turnkey" approach to attaching classified and unclassified
- systems together simultaneously. Ask again in a couple years :->
-
- Rick.
- smith@sctc.com arden hills, minnesota
-