💾 Archived View for spam.works › mirrors › textfiles › hacking › micrrisk.hac captured on 2023-11-14 at 09:55:32.

View Raw

More Information

⬅️ Previous capture (2023-06-14)

-=-=-=-=-=-=-


                                        









            +------------------------------------------------------+
            |                                                      |
            |                                                      |
            |                                                      |
            |            MICROCOMPUTER SECURITY SURVEY             |
            |                                                      |
            |                                                      |
            |                         AND                          |
            |                                                      |
            |                                                      |
            |       MICROCOMPUTER BASELINE SECURITY CONTROLS       |
            |              RISK ANALYSIS ALTERNATIVE               |
            |                                                      |
            |                                                      |
            |                                                      |
            |                                                      |
            +------------------------------------------------------+


                                        









                                   July 1991




                                  Prepared by:
                 Naval Computer and Telecommunications Station
                         Security and Standards Branch
                        Naval Air Station, Jacksonville
                          Jacksonville, Florida 32212
                                        

























                            INTENTIONALLY LEFT BLANK
                                        


                                   REFERENCES



      a. DoD Directive 5200.28, Security Requirements for Automated
         Information Systems (AISs)

      b. SECNAVINST 5211.5, Personnel Privacy and Rights of Individuals
         Regarding Records Pertaining to Themselves

      c. SECNAVINST 5239.2, Department of the Navy Automated Information
         (AIS) Security Program

      d. SECNAVINST 5870.5, Permission to Copy Materials Subject To
         Copyright

      e. SECNAVINST 7510.9, Command Management Economy, Efficiency and
         Review

      f. OPNAVINST 5000.52, Command Evaluation Program

      g. OPNAVINST 5510.1H, Department of the Navy Information and
         Personnel Security Program Regulation

      h. OPNAVINST C5510.93E, Navy Implementation of National Policy on
         Control of Compromising Emanations (U)

      i. OPNAVINST 5530.14B, Department of the Navy Physical Security and
         Loss Prevention

      j. NRL Report 8897, An Approach to Determining Computer Security
         Requirements for Navy Systems

      k. Public Law 100-235, Computer Security Act of 1987















                                       i


























                            INTENTIONALLY LEFT BLANK



                                    PREFACE



There is an increasing trend towards developing "baseline" approaches to manage 
the risks of automated information system environments.  This concept proposes 
upfront implementation of security controls for the most common and already 
recognized vulnerabilities of an operating environment.  The process may 
eliminate the need to conduct extensive formalized quantitative risk analyses to 
cost justify protective measures that may be required. 

This document, consisting of two parts, was designed and developed as a tool to 
collect general system information and address the operating risk of a 
noncomplex microcomputer operating environment.  It extracts the pertinent 
security related information from the instructions and directives in references 
(a) through (k) to present a composite approach toward analyzing level of risk.   

Part I.   Part I is a survey form and uses a fill in the blank approach to 
gather information about the assets, their processing capabilities, 
configuration, class of data, mode of operation, system required trust level, 
and other operating parameters.

Part II.  Part II introduces a "baseline" approach to identifying and managing 
risk.  This approach is recommended for use as a risk analysis alternative in 
low risk environments (e.g., systems processing unclassified, sensitive 
unclassified, or minimal classified information).  The baseline security control 
concept assumes a basic set of controls, which have been assessed by management, 
are justifiable for achieving a reasonably secure microcomputer environment.  
The security control areas identified in Part II are considered fundamental to 
establishing a baseline of security for a microcomputer operating environment.  
These controls are designed to counter the threats of human errors, accidents, 
dishonest and disgruntled employees, and the threats associated with physical 
and environmental controls.  

The "baseline" approach for managing risk, as presented in this document, has 
been approved for those activities operating microcomputers in a noncomplex 
environment within the Naval Computer and Telecommunications Command's 
(NAVCOMTELCOM) Area of Primary Responsibility (APR).	

Regardless of the protective measures in place, the key element to security in 
any microcomputer environment is the user and how well the user follows 
established computer security policies and guidelines.  It can not be 
overemphasized that users are the ones who help to ensure that the environment 
is as secure as necessary.





                                       ii


























                            INTENTIONALLY LEFT BLANK


                













                                     PART I


                         MICROCOMPUTER SECURITY SURVEY




                                     PART I
                                   PROCEDURES

   The procedures identified below are used to complete the microcomputer 
security survey information in Part I of the document.  It is recommended the 
Automatic Data Processing Systems Security Officer (ADPSSO) assigned to the 
system gather and record the information.


SECTION I:  General AIS Information

   This section documents general information about the microcomputer.  To 
complete the form, fill in the blank spaces or check the applicable choice(s) 
provided as follows:

Item 1.  Check the appropriate configuration of the system.  If the system is 
interfaced with another system/network and also used in a stand-alone mode, 
check both the interfaced configuration and the stand-alone unit areas as 
provided.

Item 2.  Enter the building name/number and room number, if applicable.  
Indicate if the system is located in government or contractor space. 

Item 3.  Check the appropriate ownership and type of personnel who operate the 
system.

Item 4.  Enter a check in single user system if the system is assigned to one 
individual, or check shared system if the system is assigned to and used by more 
than one individual.

Item 5.  Define the classes of information processed on the system and modes of 
operation.  List the percent of processing time for each class of information 
listed.  The total must equate to 100%.  

Item 6.  List the names of all individuals assigned system responsibilities, 
their code, and telephone number.

Item 7.  List all components, peripherals, communications processors, encryption 
devices, remote devices and remote interfaces for the system.  Include the model 
number, serial number, and today's replacement cost.

Item 8.  List the operating system and version level installed on the system 
(e.g., MS-DOS, Version 3.30) and today's replacement cost.  Check the 
appropriate software ownership.

Item 9.  List the commercial software and version level used on the system 
(e.g., Word Perfect, Version 5.1; dBase III, Version 1.1; Freelance Plus, 
Version 3.01; Novell NetWare 386, Version 3.0), appropriate ownership, software 
serial number, and today's replacement cost.


Item 10. List all customized application software used on the system (i.e., 
routines and programs developed in-house or by an outside source which contain 
specific tasks/applications), appropriate ownership, serial number, and today's 
replacement cost.  

Item 11. Enter all letters of certification required for the hardware or 
software, date, and certification serial number.  (Developing agencies must 
certify safeguards exist for all proposed or existing AISs, operating systems, 
and application software used for multisite distribution to permit accreditation 
with minimal effort by the end user commands.)  Include in this area TEMPEST 
letters of certification, if applicable.

Item 12. Enter the total summary value of the equipment, software, and data at 
today's replacement cost.  The value of the data must include disclosure value.  
The following guidelines are provided for determining the minimum impact of 
disclosure of sensitive data.  These values are based on a per incident of data 
file disclosure, but do not waive the need for the data owner to determine an 
accurate estimation of data disclosure.


                      GUIDELINES FOR IMPACT OF DISCLOSURE
                               OF SENSITIVE DATA

 	For Official Use Only                            $1,000
	Privacy Act or Confidential                     $10,000
	Secret                                         $100,000
	Top Secret                                   $1,000,000


Item 13. Identify and describe the mission of the microcomputer.  Under (a) 
enter the primary functions or applications processed on the system, and under 
(b) identify the primary functions or applications processed via an interface 
with another system or network.

Item 14. Refer to NRL Report 8897 to determine and enter the system's Required 
Operational Level of Trust (ROTEL).  For a given system, five factors must be 
evaluated to assess the system's overall risk.  Based on the risk, the ROTEL can 
then be determined.  The Navy Research Laboratory (NRL) Report 8897 process is 
used to evaluate each risk factor.  The first three factors (local processing 
capability, communication path, and user capability) focus upon the system's 
configuration and hardware to determine the System Risk.  Risk factors four and 
five (user clearance and data classification) assess the risk due to the mix of 
users and information to determine the Data Exposure.  System Risk and Data 
Exposure results yield level of trust, referred to as the ROTEL value.

The NRL Report 8897, titled "An Approach to Determining Computer Security 
Requirements for Navy Systems," may be ordered from the National Technical 
Information Service (NTIS) for a charge of $11.00, plus a $3.00 handling charge.

Written requests should reference #ADA155750 and be addressed to:

	National Technical Information Service
	5285 Port Royal Road
	Springfield, VA 22161

	Telephone: (703) 487-4650

Example of determining the ROTEL:   System - Zenith 248 Microcomputer

   Using the NRL Report 8897 process, the five risk factors are: 

   Risk Factor 1 - Local Processing Capability Factor is Level 3.
   Risk Factor 2 - Communication Path Factor is Level 3.
   Risk Factor 3 - User Capability Factor is Level 3. 

     Each of these factors is applied as follows:

     Local Processing Capability    =  3      Where the two intersect (on 
     Communication Path             =  3      NRL Report 8897 Table 1)  =   6
     
     User Capability                =  3
     
   Where the 6 and 3 intersect (on NRL Report 8897 Table 2) = 9 for SYSTEM RISK

   Risk Factor 4 (Rmin) - User Clearance Factor is Level 1.
   Risk Factor 5 (Rmax) - Data Classification Factor is Level 1.

     These two factors are applied as follows:

     Risk Factor 5 (Rmax) - Risk Factor 4 (Rmin) =  Data Exposure*


  equals 1 (if categories of data are on the system).  Otherwise, the data
  exposure equals 0.

     For this example:
                   (Risk Factor 5)   (Risk Factor 4) 
                       Rmax                 Rmin 
	                 1         -          1     =   0  for  DATA EXPOSURE

   Refer to NRL Report 8897 Table 3.  Use the intersection of the System Risk
   results (9) and the Data Exposure results (0) to determine the ROTEL value.

     For this example:

     Security features providing C2 security trust level are required for the
     Zenith 248.


SECTION II.  ACCREDITATION DOCUMENTATION

   This section defines the system's current operating status and is to be 
completed as follows:

Item 1.  If the system is operating under an existing accreditation statement, 
complete paragraph (a).  If the system is operating under an interim authority, 
complete paragraph (b).  Provide the following information as applicable:
    	
    Paragraph a.  Identify the class(es) of data the system processes and mode 
    of operation.  Enter the date of accreditation and the name of the 
    individual who granted system accreditation. (Attach a copy of the Statement 
    of Accreditation.)

    Paragraph b.  Identify the class(es) of data the system is authorized to 
    process and the mode of operation.  Enter the date the IATO was issued, 
    expiration date, and the name of the individual who granted the IATO.  
    (Attach a copy of the IATO.)

























                            INTENTIONALLY LEFT BLANK


                         MICROCOMPUTER SECURITY SURVEY

SECTION I.   GENERAL INFORMATION

1.  System Identification:  (Check all that apply.)

    (  )  Microcomputer Used As Stand-alone Unit
    (  )  Microcomputer Networked Unit (Internal LAN     External Network    )
    (  )  Microcomputer Used To Access System(s) External To The Department
    (  )  Other                                                               

2.  Microcomputer Location:  Building:                     Room:       

    (  ) Government Space		    (  ) Contractor Space

3.  System/Hardware is:

    (  ) Government Owned/Operated	    (  ) Contractor Owned/Operated
    (  ) Government Owned/Contractor	    (  ) Contractor Owned/Government
                          Operated	    			  Operated
    (  ) Privately Owned/Operated	    (  ) Other

4.  The microcomputer is a:   (  ) Single User System     (  ) Shared System

5.  List the classes of information processed and modes of operation.

    				  Percent of
    				  Processing	      	  Modes of
Classes of Information		  Time       	      	  Operation *

Classified
  National Cryptologic		             	                      
  SCI				             	                      
  SIOP-ESI			             	                      
  Top Secret			             	                      
  Secret			             	                      
  Confidential			             	                      

Unclassified (Sensitive)
  Privacy Act			             	       Limited Access 
  For Official Use Only		             	       Limited Access 
  Financial			             	       Limited Access 
  Sensitive Management		             	       Limited Access 
  Proprietary			             	       Limited Access 
  Privileged			             	       Limited Access 

Unclassified (Not Sensitive)	             	       Limited Access 

              TOTAL		      100%


    System High, Dedicated, and Multilevel. 

                         MICROCOMPUTER SECURITY SURVEY

6.  System Responsibilities:

    				     Name	       Code	    Phone

    a.  DAA			                            	             
    b.  ADPSO			                            	             
    c.  ADPSSO			                            	             
    d.  NSO			                            	             
    e.  Other			                            	             
    f.  Assigned User(s)	                            	             
    				                            	             
    				                            	             
    				                            	             

7.  Equipment Description:  (List all components, peripherals, communications 
    processors, encryption devices, remote devices, and remote interfaces for 
    the system.)

    Nomenclature/Manufacturer	    Model #	 Serial #	   Cost

                             	           	           	           
                             	           	           	           
                             	           	           	           
                             	           	           	           
                             	           	           	           
                             	           	           	           
                             	           	           	           
                             	           	           	           
                             	           	           	           
                             	           	           	           
                             	           	           	           

8.  List operating system, version level, and cost:

                                                                           
                                                                           
                                                                           

    (  ) Government Owned (GO)	    		(  ) Privately Owned (PO)
    (  ) Contractor Owned (CO)

9.  List commercially used software:

    Software/Package Name	  (GO/CO/PO)	Serial Number	   Cost

                             	            	             	         
                             	            	             	         
                             	            	             	         
                             	            	             	         
                             	            	             	         
                             	            	             	         
                             	            	             	         

                         MICROCOMPUTER SECURITY SURVEY

10.  List Application Software:  (Customized for an application.)

     	 Application Name	  (GO/CO/PO)	Serial Number	     Cost

                              	           	             	            
                              	           	             	            
                              	           	             	            
                              	           	             	            
                              	           	             	            
                              	           	             	            

11.  List ALL letters of certification required for hardware and software.  
     (Developing agencies must certify safeguards exist for all proposed or 
     existing AISs, operating systems, and applications software used for 
     multisite distribution to permit accreditation with minimal effort by the 
     end user commands.)

       SOFTWARE & HARDWARE	       	       DATE & SERIAL NUMBER OF
       	       TYPE		       	       LETTER OF CERTIFICATION

                                                                            
                                                                            
                                                                            
                                                                            

12.  Total Value of System:  (Specify purchase price or equivalent)

     Total System Value: $                 (Sum of equipment, software, and 
     data)

     (Equipment:  $          Software:  $          Data:  $          )

13.  Mission Relatedness:

     A.  Identify Primary function(s) of the Microcomputer.  (Describe the 
         primary applications processed on the system):

                                                                            
                                                                            
                                                                            
                                                                            
                                                                            

     B.  Identify Primary function(s) processed via any Network and/or 
         Communication Links, or Distributed Systems.

                                                                            
                                                                            
                                                                            
                                                                            
                                                                            


                         MICROCOMPUTER SECURITY SURVEY


14.  System Security Trust Level Information:

     The Required Operational Trust Evaluation Level (ROTEL) for the operating 
     environment of this microcomputer is:  (Circle one)

     Most      A1     B3      B2      B1      C2*      C1      D      Least
     Secure  <----------------------------------------------------->  Secure

     *    SECNAVINST 5239.2, dated 15 Nov 89, requires Class C2 functionality 
          (Controlled Access Protection) computer based security features as 
          defined in DoD 5200.28-STD be implemented by 31 Dec 92.
     
          

                         MICROCOMPUTER SECURITY SURVEY


SECTION II.   ACCREDITATION DOCUMENTATION


    1.  A current accreditation statement is in existence for this system. 

    	(Check One)

             Yes                  No          


    	If Yes, complete paragraph (a).  If No, complete paragraph (b).


    	a.  Operating under an accreditation statement for processing/handling                                                
            
    	                                                                  data

    	    in                                                              

    	    security mode of operation.



    	    Accreditation granted by                                       , 

    	    dated                   .  (Attach a copy of Statement of

    	    Accreditation letter.)




    	b.  This system is operating under interim authority for processing 

    	                                                      data in 

    	                                            security mode of operation.



    	    Interim authority granted by                                 

            dated                      .  Expires                       .

            (Attach a copy of Interim Authority To Operate)

























                            INTENTIONALLY LEFT BLANK

















                                    PART II


                 MICROCOMPUTER BASELINE SECURITY CONTROL AREAS
                           RISK ANALYSIS ALTERNATIVE

                                    PART II
                                   PROCEDURES


   The procedures identified below are to be used as a risk analysis alternative 
to analyze the risk level of a microcomputer operating environment.  Part II 
consists of three sections.  It is recommended the form be completed by the 
ADPSSO and reviewed by the Automatic Data Processing Security Officer (ADPSO). 


SECTION I.  SECURITY CONTROL AREAS

   This section contains a basic set of security control areas which are 
considered fundamental to establishing a secure microcomputer operating 
environment.  Depending on the inherent risk that a given system displays, these 
baseline controls may not be all inclusive.  If in completing this section, it 
is determined additional security control areas are required to reduce the 
operational risk, these additional security control areas must be identified and 
documented.  Complete this section as follows:

STEP 1.  Request the Designated Approving Authority (DAA) assess the security 
control areas and approve the use of this baseline approach to quantify the 
system's level of risk.

STEP 2.  Respond to each security control area with a "yes" or "no" answer. 

    a.  If the response is "yes," check the applicable safeguards listed that 
provide protection to support the security control area requirement.  If 
additional safeguards are implemented, list them in the comments section. 

    b.  If the response is "no," explain, in the comments section, what security 
deficiencies are evident in the operating environment. 

STEP 3.  Review the Safeguard Scoring Rationale and assign a score of 1, 2, or 
15 for each security control area.  A score must be assigned to each security 
control area.  If the security control area does not apply to the operating 
environment (e.g., TEMPEST Control), assign a score of 1 to indicate a low risk. 
The score is determined by weighing the implemented safeguards that support the 
baseline security control area against the requirements of the operating 
environment. 


SECTION II.  ANALYSIS OF RISK

   This section is used to total the risk rating score for each security control 
area, assign a risk category, and provide an overall assessment of the operating 
environment.  Complete this section as follows:

STEP 1.  Review the responses provided for each security control area and enter 
the appropriate score in paragraph A., Risk Rating Score, in the score column.  
Sum the scores of each security control area and enter the total points on the 
total line provided in paragraph A. 


STEP 2.  Review the Risk Category Legend and assign the appropriate Risk 
Category, (Low, Moderate, or High) based on the total scoring points of 
paragraph A and the applicable scoring range identified in paragraph B. 

STEP 3.  Based upon your knowledge of the operating environment and any 
historical data available to you, provide your overall assessment in paragraph C 
of the AIS operation by responding with a low, moderate, or high risk level.  If 
your overall assessment differs from the risk category assigned in paragraph B, 
explain the differences in the space provided.


SECTION III.  MICROCOMPUTER SURVEY AND SECURITY CONTROL AREA COMPLETION DATA

   This section records the name of the individual who completed Parts 1 and 2 
and provides recommendations (to be checked as appropriate) based on the risk 
level identified.  Complete this section as follows:

STEP 1.  List the name of the individual completing the form, completion date, 
title/position, location, code, and telephone number.  If more than one 
individual completed the form, list all names.

STEP 2.  Based on the data collected and recorded on the document regarding the 
system's operating environment, any historical data available, and the expertise 
of the individual(s) completing the form, evaluate the operating environment and 
check the applicable recommendation.

STEP 3.  Sign the form in the space provided.  If more than one individual 
completed the form, their signature(s) is/are also required. 

STEP 4.  Enter the name, title/position, and telephone number of the individual 
who reviewed the form.  Sign and date the form in the space provided.

























                            INTENTIONALLY LEFT BLANK


                    MICROCOMPUTER BASELINE SECURITY CONTROLS
                           RISK ANALYSIS ALTERNATIVE

                                        
SECTION I:  SECURITY CONTROL AREAS

1. SECURITY CONTROL AREA:   System Access Control  (Protective measures to ensure the 
identity of each user authorized access to the system is positively established prior 
to granting access.)

   Access to the system is controlled to ensure each person having access can be 
   identified and held accountable for their actions.

   Yes ______      No ______  (No answers must be explained.)
            
   Safeguards implemented include:  (Check applicable safeguards.)
   __ An Access Control Policy is in place and enforced.
   __ Warning against unauthorized access is displayed.
   __ Access control software package is used to provide system access control.
   __ Access control hardware/software package is used to provide system access
      control.
   __ Access control token/authentication devices used to provide system access
      control.
   __ Authorized user list posted.
   __ Individual user IDs/passwords assigned.
   __ Passwords are removed when employee terminates.
   __ System is not left on and unattended. 
   __ Audit Trail is in use and regularly monitored.
   __ System is equipped with limited log on attempts
   __ Unauthorized system access attempts reported.
   __ Additional safeguards implemented (list below in comments section). 

Comments:

                                                                                  

                                                                                  


Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.


2. SECURITY CONTROL AREA:   Data Access Control  (Data access controls ensures only 
authorized users having a need to know have access to, knowledge of, or possession of 
information processed and stored on a system.) 

   Data files are identified and protected in accordance with appropriate security 
   classification and procedural guidelines.

   Yes ______      No ______  (No answers must be explained.)

   Safeguards implemented include:  (Check applicable safeguards.)
   __ Least privilege principle followed limiting data access to authorized users.
   __ Critical and sensitive data files are identified and protected.
   __ Storage of sensitive data on the hard disk is prohibited.
   __ Procedures to ensure data integrity have been established to prevent accidental 
      or malicious modification, unauthorized disclosure or destruction of data.
   __ Color coded labels are used to comply with Information Security Oversight
      Office standard color code label requirements.
   __ Application programs written with feature that permits only authorized
      users access to data.
   __ Removable media only used and properly secured.
   __ Output products properly marked.
   __ Backup copies of critical data files created regularly.
   __ An off-site area is used for backup storage of critical data.
   __ Password control procedures are implemented.
   __ Passwords are protected and changed frequently (at least monthly).
   __ Employees log off before leaving system unattended.
   __ Personnel periodically informed of their information security 
      responsibilities.
   __ Physical access controls to the microcomputer area are enforced.
   __ Sensitive data files are encrypted when not actually used.
   __ Additional safeguards implemented (list below in comments section).

Comments:

                                                                                  

                                                                                  

Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.    

3. SECURITY CONTROL AREA:   Software Control   (Software control ensures software 
integrity is maintained and only authorized software is used on the system.)  

   Controls are in place to ensure integrity and protection of all software used on 
   the system.

   Yes ______      No ______  (No answers must be explained.)
   
   Safeguards implemented include:  (Check applicable safeguards.)
   __ Proprietary software procedures implemented and enforced to ensure
      compliance with copyright/license laws.
   __ All personnel are made aware of the command's policy on reproducing
      copyright software.
   __ Use of unapproved software from any source is prohibited.
   __ All new software is checked for possible infection before installation.
   __ Original software is stored in a secure location outside the micro 
      area. 	   
   __ Backup copies are appropriately maintained.
   __ An inventory is maintained of all software assigned to the system.
   __ Documentation available for application software developed in-house.	     
   __ Configuration control procedures have been established to control
      software modifications.
   __ Virus detection software is available to detect malicious code.
   __ Virus detection software is used on a regular basis to detect malicious
      code.
   __ Additional safeguards implemented (list below in comments section).	     

Comments:

                                                                                  

                                                                                  


Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.    




4. SECURITY CONTROL AREA:   Physical Security Control   (Physical security controls 
safeguard personnel, prevent unauthorized access to sensitive or critical areas, and 
provide protection against espionage, sabotage, damage and theft.)

   The microcomputer is located in an area with good physical access controls.

   Yes ______      No ______  (No answers must be explained.)

   Safeguards implemented include:  (Check applicable safeguards.)
   __ Locks on door(s) to microcomputer area.
   __ Building secured after normal working hours.
   __ Equipment cover lock or equipment lockdown devices utilized.
   __ Power switch lock installed on system.
   __ Individual badge system in use.
   __ Escort and visitor control procedures implemented. 
   __ Security guards on duty.
   __ Electronic alarms and monitoring devices used.
   __ Personal belongings searched on entering and leaving the building.
   __ Strangers entering the micro area are challenged. 
   __ Warning signs posted indicating boundaries of restricted areas.
   __ Closed circuit television system (CCTV) installed.
   __ Additional safeguards implemented (list in comments section).

Comments:

                                                                                  

                                                                                  


Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.    



5. SECURITY CONTROL AREA:   Environmental Controls   (Protection measures to 
prevent, detect and minimize the effects of hazards such as fire, water damage, 
air contaminants, excess heat and electricity brownouts.)

   Environmental hazards to which the microcomputer is exposed are minimized.

   Yes ______      No ______  (No answers must be explained.)

   Safeguards implemented include:  (Check applicable safeguards.)
   __ Functioning fire detection system or smoke alarm installed in
      microcomputer area.
   __ Hand held Halon fire extinguishers are readily available.
   __ Fire extinguishers are regularly inspected.
   __ Sprinkler system installed.
   __ Emergency exits are clearly marked.
   __ Periodic fire drills conducted.
   __ Personnel trained in local fire fighting policy.
   __ Micro connected to isolated power source.
   __ Micro and peripherals plugged into surge protector with three prong
      outlets, connected to a power director device, or (if micro is subject to
      frequent power outages) a battery backup/UPS is installed.
   __ Adequate primary lighting provided.
   __ Emergency lighting provided.
   __ Drastic changes in humidity/temperature avoided.
   __ Micro located in an area with good air circulation (vents not blocked/air
      flow unrestricted).
   __ Routine cleaning schedule adhered to.
   __ Micro kept clear of paper stacks and other flammable materials.
   __ Smoking, eating and drinking is prohibited in and around the micro area.
   __ Plastic sheeting available to protect micro from dust and water damage.
   __ Static electricity is controlled.
   __ Users held responsible for maintaining a clean working environment.
   __ Additional safeguards implemented (list in comments section).

Comments:

                                                                                  

                                                                                  

Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.    

6. SECURITY CONTROL AREA:   Media Handling Controls   (Measures to protect and 
secure storage media, i.e., source documents, diskettes, hard disks, printouts, 
tapes, cartridges.) 

   Media handling procedures have been established and are enforced ensuring all 
   media is handled, stored and backed up properly.

   Yes ______      No ______  (No answers must be explained.)

   Safeguards implemented include:  (Check applicable safeguards.)
   __ Diskettes are protected from dust and dirt, cigarette smoke and ashes,
      liquid spills, and food crumbs.
   __ Care is taken to never touch the recording surface of the diskette.
   __ Diskettes are protected from all sources of magnetism.
   __ When not in use, diskettes are kept in their protective jackets.
   __ A felt tip pen is used to complete label prior to affixing to diskette.
   __ Floppy diskettes are protected from bending and similar damage.
   __ Diskettes are not subjected to intense heat or intense cold.
   __ Employees are instructed to never insert/remove a diskette when the drive
      light is on to avoid read/write head damage.
   __ Diskettes are placed in their protective jackets and stored vertically
      inside an appropriate container.
   __ All magnetic media is externally marked with appropriate markings.
   __ When several files are stored on one diskette, a printout of the
      diskette's directory is taped to the jacket for easy referencing.
   __ Storage boxes are kept away from all sources of electromagnetic
      interference.
   __ Procedures for backing up floppy diskettes and hard disks have been
      developed and routinely followed.
   __ Master diskettes are protected by write/protect tabs.
   __ The SHIP or PARK command is executed when storing/transporting hard disks.
   __ Appropriate procedures are followed for disposing of storage media.
   __ NSA approved degaussing equipment utilized.
   __ Additional safeguards implemented (list in comments section).

Comments:

                                                                                  
   
                                                                                  
   
Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.    

7. SECURITY CONTROL AREA:   Personnel Security Control   (Personnel security 
controls ensure an employee's level of trustworthiness is commensurate with 
their duties, all personnel are informed of information security requirements 
including their individual responsibilities, and are made aware of ethical 
computer behavior practices.)

   Appropriate security clearance procedures are followed and all personnel have 
   a current working knowledge of good computer security practices, information 
   security procedures and understand their individual computer security 
   responsibilities.

   Yes ______      No ______  (No answers must be explained.)

   Safeguards implemented include:  (Check applicable safeguards.)
   __  Personnel security policies require screening of all individuals
       (including contractors) participating in the design, operation, and 
       maintenance of the system or having access to the data in the system,
       commensurate with the sensitivity of information being handled.
   __  New employees are indoctrinated to their ethical responsibilities.
   __  Personnel dealing with sensitive information are provided periodic 
       security briefings.
   __  Personnel sign a statement that they understand their information        
       security responsibilities.
   __  Employees are aware of the command's policy on use of personal resources
       to perform government work.
   __  Personnel security policies include checkout procedures that deny access 
       to the computer system to departing employees.
   __  Standard debriefing procedures are followed.
   __  Additional safeguards implemented (list below in comments section).

Comments:

                                                                                  
   
                                                                                  
   

Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.    

 
8. SECURITY CONTROL AREA:   Contingency Planning   (Contingency planning 
consists of those activities undertaken in the anticipation of potential events 
which could cause serious adverse effects interrupting normal operations.)

   A contingency plan has been developed with documented planned action steps to 
   be taken before, during and after an emergency condition.

   Yes ______      No ______  (No answers must be explained.)

   Safeguards implemented include:  (Check applicable safeguards.)
   __ Contingency plan prioritizes work based on criticality of functional
      applications.
   __ Backup copies of critical files created regularly.
   __ Backup copies of critical files, software packages and original
      application programs are stored off-site and can be retrieved within a
      reasonable time frame.
   __ When the system is not available, loaner equipment is used.
   __ Spare equipment is available for backup operations.
   __ Backup operations include an agreement with another facility.
   __ During contingency situations, critical processing is performed manually.
   __ All personnel involved have been informed of their contingency planning
      responsibilities.
   __ A copy of the contingency plan is stored off-site.
   __ The contingency plan is tested and evaluated on an annual basis.
   __ The contingency plan is tested under realistic operational conditions.
   __ Additional safeguards implemented (list below in comments section).

Comments:

                                                                                  
   
                                                                                  
   

Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.    


9. SECURITY CONTROL AREA:   Computer Security Training   (Training for all 
employees designed to heighten and maintain a level of security awareness 
throughout the command to ensure employees understand the criticality of 
protecting systems and data.)

   Mandatory periodic training in computer security awareness and accepted 
   computer security practices, as required by the Computer Security Act of 
   1987, is provided all employees involved with the management, use, or 
   operation of the system. 

   Yes ______      No ______  (No answers must be explained.)

   Safeguards implemented include:  (Check applicable safeguards.)
   __ An activity Security Training Program has been implemented which provides 
      formal and informal training for all employees.
   __ New personnel are briefed on computer security awareness.
   __ Computer security films are available and shown to all employees on a
      scheduled basis.
   __ Posters to enhance computer security awareness are posted in heavily
      trafficked areas.
   __ Employees are debriefed on AIS security policies upon departing.
   __ Additional safeguards implemented (list below in comments section).
   
Comments:

                                                                                  
   
                                                                                  
   

Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.    


10. SECURITY CONTROL AREA:   Administrative Controls  (Administrative controls 
consist of local policies and guidelines for protecting systems and ensuring 
compliance with AIS Security Program requirements.)  

   Detailed Standard Operating Procedures (SOPs) and documentation are provided 
   to establish local policy/guidance and to ensure compliance with program 
   objectives.  

   Yes ______      No ______  (No answers must be explained.)

   Safeguards implemented include:  (Check applicable safeguards.)
   __ Standard Operating Procedures establishing local computer security
      policies are readily available and maintained in a current status. 
   __ Acquisition and procurement documentation is reviewed by the ADPSO for 
      compliance with Life Cycle Management program requirements.
   __ Security violation procedures have been established and distributed to
      all personnel.
   __ Procedures are established and enforced to safeguard software and files
      used to provide internal security controls, passwords or audit trails.
   __ The activity has established a policy for use of privately owned resources
      to perform government work.
   __ Procedural guidance for reducing the risk of malicious code has been
      established and made available to applicable personnel.
   __ Periodic reviews are performed on the system.
   __ Additional safeguards implemented (list below in comments section).

Comments:

                                                                                  
   
                                                                                  
   

Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.    

11. SECURITY CONTROL AREA:   Class C2 Security   (Class C2 security provides for 
controlled access protection for systems processing classified and sensitive 
unclassified information.  Class C2 security and accountability features are 
discretionary access control, object reuse, identification and authentication, 
and audit trail capability.) 

   The microcomputer is protected by hardware, software, and security operating 
   procedures to provide reasonable security until such time as effective C2 
   Class protection become available for microcomputers.

   Yes ______      No ______  (No answers must be explained.)

   Safeguards implemented include:  (Check applicable safeguards.)
   __ Access to information controlled on an individual basis to ensure only
      having a need-to-know are granted access.
   __ Individuals identified and authenticated through User ID and password. 
   __ A security software package is used to provide C2 functionality (i.e.,
      discretionary access control, object reuse, identification and
      authentication, and audit trail capability).  
   __ Overwrite routines are used to clear internal memory and registers.
   __ The micro is turned off to clear memory before reuse by another user.
   __ Application programs perform a "zero out" function prior to program
      termination.
   __ A manual audit trail is maintained to record each event (date and time of
      the event, user, type of event).
   __ The operating system controls access to all system resources.
   __ C2 assurance and documentation requirements (i.e., system architecture,
      system integrity, security testing, security features user guide, trusted
      facility manual, test and design documentation) are met through in-house
      Standard Operating Procedures (SOPs). 
   __ Additional safeguards implemented (list below in comments section).

Comments:

                                                                                  
   
                                                                                  
   

Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.    

Note:  This page must be completed if the system is operating in other than a
       stand-alone mode.
 
12. SECURITY CONTROL AREA:   Communications Security Control   (Measures to 
protect information transmitted over communication lines to ensure the data is 
not disclosed or compromised.)

   Communications lines and links for systems operating in other than a 
   stand-alone mode are secure commensurate with the class of data transmitted.

   Yes ______      No ______  (No answers must be explained.)

   Safeguards implemented include:  (Check applicable safeguards.)
   __ Communication wiring contained within approved conduits.
   __ Telephone junction boxes/connection points are within controlled spaces.
   __ Dedicated transmission lines are utilized.
   __ Security modems are installed.
   __ Encryption devices are used to protect confidentiality of information.
   __ Host-User Agreements in place prior to connectivity.
   __ All access attempts are logged.
   __ Invalid access attempts are reported.
   __ Password management program established to assign, delete, and ensure 
      users change passwords according to policy.
   __ Dial-up access connections are protected (i.e., dial-up access restricted
      to authorized users, dial-up telephone numbers restricted, dial-up lines
      are monitored, dial back employed once connection has been made).
   __ Remote Security Operating Procedures in place and enforced.
   __ Hardware/software configuration changes are controlled.
   __ Communications Control Manager monitors users' security practices.
   __ Audit trail of system activity is regularly reviewed.
   __ Procedures implemented for disconnecting from outside connectivity when
      operating in a stand-alone mode. 
   __ Additional safeguards implemented (list below in comments section).

Comments:

                                                                                  
   
                                                                                  
   
Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.    

Note:  This page must be completed if the system is processing classified
       information.
  
13. SECURITY CONTROL AREA:   TEMPEST Control   (Measures to protect against 
spurious signals, referred to as electromagnetic emanations, emitted by 
computers that can be intercepted and automated information read.)

   The system is in compliance with the TEMPEST requirements of OPNAVINST 
   C5510.93.

   Yes ______      No ______  (No answers must be explained.)

   Safeguards implemented include:  (Check applicable safeguards.)
   __ TEMPEST Vulnerability Assessment Request (TVAR) submitted to Commander,
      Naval Investigative Services Command.
   __ Microcomputer TEMPEST approved.
   __ TEMPEST waiver received.
   __ Filters installed on computer power and phone lines.
   __ Protected Distribution System (PDS) installed for processing classified
      data.
   __ PDS approval request submitted.
   __ PDS approval received.
   __ No radar/microwave or power transformers in general area of computer.
   __ Additional safeguards implemented (list below in comments section).

Comments:

                                                                                  
   
                                                                                  
   

Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.    

SECTION II:  ANALYSIS OF RISK  


A.   RISK RATING SCORE  (A score must be assigned to each security control
     area.)

     Security Control Area         Score      Security Control Area     Score

     System Access Control         _____      Contingency Planning       _____
     Data Access Control           _____      Computer Security Training _____
     Software Control              _____      Administrative Controls    _____
     Physical Access Control       _____      Class C2 Security          _____
     Environmental Control         _____      Communications Security    _____
     Media Handling Control        _____      TEMPEST Control            _____
     Personnel Security Control    _____
                                                             Total    ________  
 _____________________________________________________________________________

B.   RISK CATEGORY                   

            Scoring Range                     Risk Category*  (Circle One)

              ---13---                              LOW 
              14  -  26                           MODERATE
              27  &  Above                          HIGH

     *  Risk Category Legend:

   	Low risk.  The system is operating at an acceptable level of risk 
        (adequate safeguards are implemented and enforced for all baseline 
        security control areas).
   	Moderate risk.  The system can be operated under its present condition 
        (adequate safeguards are implemented and usually enforced for all 
        baseline security areas).
   	High risk.  Deficiencies were found in baseline security control areas.  
        Interim Authority to Operate (IATO) issued pending implementation of 
        required safeguards). 
 ______________________________________________________________________________
 
C.  OVERALL ASSESSMENT

   1.  Based on your knowledge of the operating environment, and any historical
       data available, provide your assessment of the AIS operation. 
       (Circle One)

           Low Risk          Moderate Risk            High Risk	

   2.  If your assessment differs from the risk category assigned above, 
       explain in the space provided below. 

                                                                             

                                                                             

SECTION III.  MICROCOMPUTER SURVEY AND SECURITY CONTROL AREA COMPLETION DATA

     1.  Completed by:

         Name:                                                 Date:          

         Title/Position:                                                      

            Building:                                          Room:                           
        
            Code:                                   Phone:                    


     2.  Recommendations:  (Check applicable recommendation.)


                 Recommend Accreditation. 


                 Non-Accreditation recommended until such time as the following
   		 safeguards are implemented:

                                                                                          
        
                                                                               

                                                                               

                 Recommend an in-depth quantitative risk analysis be performed
   		 on the system due to high risk areas in the operating 
   		 environment.


   	         Other (explain):                                              

   		                                                               

   		                                                               


                                      Signature:                               


     3.  Reviewed by:

    	 Name:                                            Date:                

    	 Title/Position:                               Phone:                  


   			              Signature:                                

        























                            INTENTIONALLY LEFT BLANK



Downloaded From P-80 International Information Systems 304-744-2253