Model Preview

1.0 GENERAL
1.1 FUNDAMENTAL INFOSEC REQUIREMENTS
1.2 GENERAL REQUIREMENTS
1.3 MODES OF OPERATION AND SECURITY REQUIREMENTS DEFINITION
2.0 TECHNICAL
2.1 GENERAL
2.2 ACCESS CONTROL AND LEAST PRIVILEGE
2.3 OBJECT REUSE
2.4 ACCOUNTABILITY
2.5 IDENTIFICATION AND AUTHENTICATION
2.6 AUDIT
2.7 ASSURANCE
3.0 MANAGEMENT AND PROCEDURAL
3.1 GENERAL
3.2 LIFE-CYCLE MANAGEMENT
3.3 CERTIFICATION AND ACCREDITATION
3.4 RULES OF THE SYSTEM
3.5 DOCUMENTATION
3.6 ACCESS CONTROL PROCEDURES
3.7 PASSWORD CONTROL
3.8 AUDIT MANAGEMENT
3.9 PROTECTION AND DISPOSITION OF IS MEDIA & SOFTWARE
3.10 CONTINGENCY PLANS
4.0 PHYSICAL SECURITY
4.1 GENERAL
4.2 FACILITIES
4.3 INFORMATION SYSTEMS AND EQUIPMENT
4.4 MARKINGS
5.0 PERSONNEL SECURITY
5.1 CLEARANCES
5.2 SECURITY TRAINING
6.0 COMMUNICATIONS SECURITY
Cryptography is a critical tool used to protect confidentiality of data, to assure the authenticity of information, and to detect the alteration of information. National policy requires the National Security Agency (NSA) to review and approve all cryptography used to protect classified information from access by unauthorized persons (i.e., not cleared for the information).
Controls will be established to deny unauthorized persons from receiving information derived over telecommunication lines or from equipment. Established measures and controls must also ensure the authenticity of communication transmissions. Further guidance can be found in DISAI 240-115-3, Communications Security, 23 July 1992.
Protect transmissions of classified, sensitive, or a combination of classified and sensitive information according to AFSSI 4100VI, (FOUO) The Air Force Communications Security (COMSEC) Program.
All communications circuits employed to interconnect remotely located components of Marine Corps automated systems or networks which process classified or Sensitive Unclassified information will be provided COMSEC. Appropriate COMSEC will be achieved by use of standard military encryption systems produced and or endorsed by the National Security Agency (NSA), installed in accordance with the provisions of NACSIM 2203; Protected Distribution System (PDS) or intrusion-resistant cables.
Communications security techniques will be applied to the extent necessary to deny information to unauthorized personnel and to effectively defend against interception, traffic analysis, and imitative deception.
6.1 POLICY
6.2 CLASSIFIED COMSEC REQUIREMENTS
6.3 SENSITIVE COMSEC REQUIREMENTS
6.4 PROTECTED DISTRIBUTION SYSTEM (PDS)
6.5 RADIO SYSTEMS
6.6 TEMPEST AND TSCM
6.7 SYSTEM INTERCONNECTION AND NETWORKS
6.8 DIAL-UP AND REMOTE ACCESS
6.9 COMMUNICATIONS WITH CONTRACTORS
7.0 SPECIAL PROVISIONS
7.1 PERSONALLY OWNED COMPUTERS AND OFF-SITE PROCESSING
7.2 TACTICAL OR BATTLEFIELD AUTOMATION SYSTEMS
7.3 LAPTOP, NOTEBOOK, OR PORTABLE AIS
7.4 CONTRACTORS
7.5 TENANT UNITS OR ACTIVITIES
7.6 USE OF OTHER SERVICE OR AGENCY IS
7.7 USE OF FOREIGN OWNED IS
8.0 SPECIAL CATEGORIES OF SCI ISs
a This subsection describes several categories (e.g., dedicated servers, embedded systems, tactical systems) of ISs that can often be adequately secured without implementation of all the technical features specified in Chapters 4, 5, and 6. These systems are not exceptions or special cases of the requirements specified in Chapters 4, 5, and 6.b Unthinkingly applying the technical security requirements specified in Chapters 4, 5, and 6 to these ISs could result in unnecessary costs and operational impacts. In general, the technical question is where, when, and how to apply a given set of safeguards, rather than whether to apply the safeguards. For many of these special ISs (such as dedicated servers, and tactical, data acquisition, and embedded systems), the physical security protections for the IS provide the required access control, while the application running on the platform provides the required user separation.c These special systems still must undergo the C&A process (including risk management) described earlier in this chapter. A key part of that C&A process for these systems is determining whether all of the technical features specified in Chapters 4, 5, and 6 are applicable.
Dedicated Serversa Certain specialized ISs, when acting as part of a network as dedicated servers, may need fewer technical security countermeasures. These ISs have the characteristics listed below: (1) No user code is present on the IS. (2) Only IS administrators and maintainers can access the system. (3) The IS provides non-interactive services to clients (e.g., packet routing or messaging services). (4) The hardware and/or application providing network services otherwise meets the security requirements of the network. (5) The risk of attack against the Security Support Structure using network communications paths is low. (6) The risk of attack against the Security Support Structure using physical access to the system itself is sufficiently low.
Embedded and Special-Purpose ISs. Some ISs have no general users, are incapable of alteration by users, and are designed and implemented to provide a very limited set of predetermined functions. For such ISs, if the DAA determines that the applications running on the IS provide an adequate level of security, then the security requirements specified in Chapters 4, 5, and 6 do not apply.

[Edit footer.html to set your custom footer here]

Current URL: http://compliancemanager.com/ModelStore/ModelPreview?ModelStoreId=fec3075e-1484-41a1-9c0e-10109ebe9b80
Base URL: http://compliancemanager.com/
Current URL Domain Name: compliancemanager.com