Open this portion of the document in Word (60 KB)Open this portion of the document in Word (60 KB)

Information Type: Company-Wide Sample Format

INTEK-MC - Strawman Security, Test, and Evaluation

1.  Hardware Utilization
2.  Thin Clients and Remote Terminals
3.  Access Control - Network
4.  ADP Products
5.  Magnetic Media
6.  Cleaning and Disposal
7.  Application Programs
8.  Communications Security
9.  Physical-Personnel Information Access Control
10.  People - Organization
11.  Configuration Management
12.  Network Security

Method

A - ANALYSIS

I – INSPECTION

T - TEST

D - DEMO

 

 

 

Hardware Utilization

1.

Are operations monitored for compliance with schedule for:

 

a.

Classified periods processing?

Y

N

NA

I

 

b.

Preventive and remedial maintenance?

Y

N

NA

I

 

c.

Block time requests?

Y

N

NA

I

 

d.

Normal processing, if scheduling is used?

Y

N

NA

I

 

e.

Taking saves/dumps of the system for backup/recovery purposes?

8-2.b.(3)

Y

N

NA

I

2.

Are all periods of downtime verified?

8-2.b.
(derived)

Y

N

NA

I

3.

Is a Standard Operating Procedure (SOP) manual used for configuring the system/network hardware for secure operations?

A11-10

Y

N

NA

I

 

a.

Are switch settings specified for each hardware department connected on the system/network?

 

Y

N

NA

A

 

b.

Are remote terminal connections ever disturbed while they are processing on-line?

 

Y

N

NA

A

 

c.

Does system verify terminal ID when line break occurs or on demand?

 

Y

N

NA

A

BACK

 

 

 

 

 

 

 

 

 

 

 

 

Remote Terminals, Thin Clients

4.

Is unique individual password protection employed for gaining remote access to the computer system?

8-2.a, 8-2.d

Y

N

NA

I, D, T

 

a.

If so, are they changed at least annually or quarterly (depending on the criticality factor), or when compromise is suspected?

8-2.d.(7)(d-e)

Y

N

NA

I

5.

Are terminal users restricted to high level languages? (i.e. not allowed to machine or assembly languages)

8-3.e

Y

N

NA

A, T

6.

Are remote terminals protected and available only to authorized individuals?

6-4.b

Y

N

NA

I, D

7.

Is the location of terminals within the facility such that each user's need-to-know is assured?

A11-5.b.
A14-4.b.

Y

N

NA

I

8.

If terminals produce a hard copy of the login sequence, are users is the user required to dispose of that portion of their terminal output in a secure receptacle?

6-4.g.
6-4.H.

Y

N

NA

I

9.

Are remote terminals lockable?

A11.5.b

Y

N

NA

I

 

a.

Are the keys tightly controlled?

13-5.g

Y

N

NA

I

 

b.

Are the locks changed when the keys are lost or stolen?

 

Y

N

NA

I

10.

During duty hours, are remote terminals and their areas protected at the highest sensitivity and criticality level of data that the central system is processing or storing on-line during any period in which the remote terminal is connected?

9-3.a
A11-5.b.
A14-5.b.

Y

N

NA

I

11.

Are all remote terminals and areas secured during non-use hours, at the remote data processing facility (RDPF) when sensitive information is processed at the central CDPF?

6-4.g
A11-5.b.

Y

N

NA

I

12.

Are all prescribed COMPUTER SECURITY measures for remote terminals and areas implemented prior to connecting to the computer system?

13-3.a
13-12

Y

N

NA

I, D, T

13.

Is the physical security for remote terminal processing areas commensurate with the highest level of sensitive or critical information to be processed by the system?

9-3.a.
A14-4.b.

Y

N

NA

I

14.

Do all remote terminals have a Terminal Area Security Officer (TASO) or alternate on duty or on call when the remote site is on-line to the RDPS?

A14.5.b.

Y

N

NA

I

15.

Have all dial-up communications lines been approved?

2-6.c(2)
7-3.n(9)

Y

N

NA

I

16.

Can operating system development activities be performed through remote terminals?

 

Y

N

NA

I, T

BACK

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Access Control - Network

17.

Is access to programs and software systems restricted to a need-to-know basis by file passwords and file permissions?

8-2.c(1)

Y

N

NA

I, D, T

 

a.

Does this restriction apply to copies kept in off-site storage?

8-2.d.(23)

Y

N

NA

 

18.

Are data bases, files or data sets subjected to data integrity and/or segregation requirements, so that individual access is controllable?

6-4.d.
8-2.c.(5)

Y

N

NA

I

19.

Is access to keyword, lockword, or password files severely restricted and encrypted, where applicable?

8-2.d.(10)

Y

N

NA

I, T

20.

Are security override procedures protected at the same category of sensitivity or classification level as the data that can be accessed by their users?

 

Y

N

NA

I, D

 

a.

Is the use of security overrides strictly controlled and closely monitored?

 

Y

N

NA

I, D

21.

Are users required to logoff/disconnect their terminal from the system when leaving the immediate vicinity of the terminal?

9-3.e.
(derived)

Y

N

NA

I

22.

Are terminal passwords or similar access controls unique for each individual?

8-2.d.(5)(a)

Y

N

NA

I

 

a.

Are passwords or similar controls configured so that their contents are difficult to determine (i.e., not valid words from the dictionary)?

8-2.d.(3)

Y

N

NA

I

23.

Are passwords or similar access controls changed or deleted for an individual user when:

         
 

a.

Their access is withdrawn for any reason?

8-2.d.(7)(b)/
(c)

Y

N

NA

I

 

b.

There has been a compromise or a suspected compromise of the password or access control?

8-2.d.(7)(a)

Y

N

NA

I

 

c.

90 days have elapsed since the last LOG-IN?

8-2.d.(7)(c)

Y

N

NA

I

24.

Whenever more than one site is involved in a network, are other sites notified when one of the conditions in 23a., b., c. occur?

9-2.a.(1)
(derived)

Y

N

NA

I

25.

Have persons using access controls been instructed on the regulations pertaining to their responsibilities of the security of ADP information?

16-2

Y

N

NA

I

26.

Have users signed for their initial user-id/password?

8-2.d.(4)

Y

N

NA

I

27.

Are file OPRs required to use specific permission to access their files or catologs?

8-2.c.(1)(2)
A14-2.b.

Y

N

NA

I, T

28.

Are any general (universal) permissions prohibited on files or catologs containing classified, sensitive, or critical data?

8-2.c.(1)
(derived)
A14-2.b.

Y

N

NA

I, T

29.

Is a local system access revalidation performed at least annually, to include the central site and all remote terminal facilities?

8-2d(7)(b)
INTEK-MC Sup 1

Y

N

NA

I

30.

Where applicable, is a network access revalidation performed at least annually?

 

Y

N

NA

I

31.

For sensitive or classified systems, are passwords or similar access controls protected at the same sensitivity/criticality category or classification level as the data accessed by the password or control?

8-2.a.(1)
8-2.d.(8)
A14-2.c.

Y

N

NA

I, D, T

32.

Do local procedures require that a system access and activity be monitored (audit trail)?

6-4.a.
8-2.d.(13)

Y

N

NA

I, D, T

 

a.

Do three failed access attempts lock out the user-id and/or the terminal? These attempts include successive attempts even though they are interrupted by the user logging of the system or powering off the terminal?

8-2.d.(9)

Y

N

NA

I, D, T

 

b.

Are terminals unlocked and/or user-id reset by CSSO after proper explanation and authentication?

 

Y

N

NA

I, T

33.

Are there procedures for daily audit log review?

8-2.d.(15)

Y

N

NA

I

34.

Can passwords be seen during log-in?

8-2.d.(11)

Y

N

NA

I, T

35.

Are internal security controls used to control access within the ADPS?

8-2

Y

N

NA

I, T

 

a.

Is every file, data set, or data base protected by an explicitly defined set of access controls?

6-4.d

Y

N

NA

I

 

b.

Are access controls used to limit what users can do to files?

8-2.c.(1)

Y

N

NA

I

36.

Is the operating system software protected and controlled against unauthorized modification?

8-2.d.(28)

Y

N

NA

I

37.

Does the system contain an automated audit log capability to trace the activities of each user?

8-2.d.(13)

Y

N

NA

I, T

 

a.

For each event traced (including system access, jobs processed, use of privileged instructions, and job aborts), does the audit trail contain user ID, terminal ID, object of violation attempt, and date and time of event?

8-2.d.(14)

Y

N

NA

I, T

 

b.

Does CSO review log daily?

8-2.d.(15)

Y

N

NA

I

 

c.

For each authorized, unsuccessful, or unauthorized attempt to access a file, does the audit trail also include the file's name and the type of permission asked for?

8-2.b

Y

N

NA

I, T

BACK

 

 

 

 

 

 

 

 

 

 

 

ADP Products

38.

Are users permitted to submit jobs for anyone other than themselves?

A14-2
(derived)

Y

N

NA

I

39.

Are USERID access cards, or similar media containing access control data, clearly marked for easy identification, removal and protection?

A14-3.b.(3)
(derived)

Y

N

NA

I

40.

Is each job submitted and controlled as a separate department?

A14-2
(derived)

Y

N

NA

I

41.

Is all job output returned to the properly identified owner?

A14-3
(derived)

Y

N

NA

I

42.

Is all output properly marked with the appropriate sensitivity/criticality or classification caveats (i.e., privacy act, etc.)?

A11-4
A14-3

Y

N

NA

I, T

43.

Is access authorization verified prior to permitting processing to begin?

8-2.c.(1)

Y

N

NA

I

44.

Do policies make the user responsible for reporting all security discrepancies or incidents to the CFM, CSO, CIO, CFO, CEO or their designated representative?

2-8-11
A11-8
A14-7

Y

N

NA

I, A

45.

Do procedures require that input received from unusual or unexpected sources or extraordinarily large (or small) inputs be questioned?

A11-8

Y

N

NA

I

46.

Is an input/output control activity used?

A14-5.a
(derived)

Y

N

NA

I

47.

When privileged instructions (supervisory, master mode, or control state instructions) are used:

 

Y

N

NA

I

 

a.

Does the system control their use?

 

Y

N

NA

I, T

 

b.

Is an operator "go ahead" required before the instructions can be used?

 

Y

N

NA

I

48.

Are the front and back of all printer listings marked with the highest classification level of information being processed on the ADPS?

A14-3.a.

Y

N

NA

I

49.

Are video display terminals (VDTS) marked with the classification of the system they are attached to?

A14-3.b.(6)

Y

N

NA

I

BACK

 

 

 

 

 

 

 

 

 

 

Magnetic Media

50.

Is there a procedure for accounting for all:

         
 

a.

Fixed mass storage media (disk, core, system files)?

7-3.1, 10-6

Y

N

NA

I, A

 

b.

Removable mass storage media (disk, tape)?

7-3.m,10-6

Y

N

NA

I, A

51.

Are all media used for restoration of the operating system (i.e., Bootstrapping, warm booting, cold booting, etc) and the audit trail protected against unauthorized alterations?

8-2.b
8-7.b.(2)
A14-3c.(2)

Y

N

NA

I

52.

Are all storage media (tapes/disks, etc.) stored properly?

A12-2.f.(1)/
(2)

Y

N

NA

I

53.

Are Privacy Act and other sensitive-unclassified tapes and disks degaussed or cleared when no longer required by the user?

A10-1.b.

Y

N

NA

I, T

54.

Are all types of tapes and disks labeled internally by the system software?

A11-4.c
A14-3.c.(2)

Y

N

NA

I, A, D

55.

Are all types of tapes and disks and containers labeled externally?

A11-4.b.

Y

N

NA

I

56.

Are all removable magnetic media controlled at the highest classification level or sensitivity/criticality category of the information they contained?

A10-1.c

Y

N

NA

I

BACK

 

 

 

 

 

 

 

 

 

 

Clearing and Declassification

57.

Is each memory location, working storage or temporary file space used for storage of classified data overwritten when it is no longer required before reuse by the system, or before the contents of a location may be accessed by subsequent processes?

6-3
A10-2.e

Y

N

NA

I, A, D

58.

Are the necessary programs, equipment, and procedures available and adequate for the clearing of Automatic Data Processing Equipment (ADPE)?

A10-2.

Y

N

NA

I, A, D

59.

Does user's magnetic tape erase equipment (degaussed) meet the National Security Agency (NSA) specifications detailed in DoD manual 5200.28-M, Section VIII, Paragraph 8-301, and is it one of the NSA approved models listed ?

A10-3.b.
(1-2)

Y

N

NA

I

60.

When no longer needed or useful, do users ensure that all removable magnetic media used to store sensitive unclassified information is cleared, declassified, or destroyed?

A10-1.b.

Y

N

NA

I

61.

Are output products reviewed and downgraded before they are distributed to personnel who do not have the clearance and need-to-know for the highest level of data in the computer?

A14-3.b.(1)

Y

N

NA

I

BACK

 

 

 

 

 

 

 

 

 

 

Application Programs

62.

Are programming changes and maintenance well controlled and documented?

8-3.d.

Y

N

NA

I

63.

Are procedures established to evaluate, test, and validate an application prior to placing it, or any changes to, into operational or production status?

8-3.d

Y

N

NA

I

64.

Is CSO approval of site unique patches that might impact on the security of the system required?

8-3.h.(1)

Y

N

NA

I

BACK

 

 

 

 

 

 

 

 

 

 

Communications Security (COMSEC)

65.

Do all communications links meet the requirements for the transmission of the highest sensitivity/criticality category or classification level of data?

 

Y

N

NA

I

66.

Is there a positive approved disconnect procedure for all communication ports?

A11-5.b.

Y

N

NA

I, T

67.

Are scramblers or other encryption techniques utilized on communication lines for the protection of classified information?

10-2.c.

Y

N

NA

I

 

a.

For sensitive/unclassified information?

10-2.c.(3)

Y

N

NA

I

BACK

 

 

 

 

 

 

 

 

 

 

Physical-Personnel Information Access Control

68.

Is access to the computer facility restricted to selected personnel who have a justifiable need to be there?

A11-6.a

Y

N

NA

I

69.

Are all computer management, operations, input/output control, and system programming personnel cleared for the highest level and most restrictive category of information in the system?

A14-5.

Y

N

NA

I

70.

Are all unescorted maintenance personnel cleared for the highest category of sensitive/critical information?

7-3.n.(6)
7-3.n.(7)

Y

N

NA

I

71.

Are escorts provided for maintenance personnel who are not appropriately cleared?

7-3.n.(6)

Y

N

NA

I

72.

Do all personnel who develop programs have clearance and need-to-know for all data stored or processed on the system, including military, civilian and contractor?

6-2

Y

N

NA

I

73.

Do user personnel have clearance and need-to-know for all the data that they can access under the security controls of the computer?

6-2

Y

N

NA

T

 

a.

Does each user have access to all the information he or she is authorized to access, but no more?

6-2.b.
(derived)

Y

N

NA

I, D, T

74.

Do user personnel have a clearance for the highest level of data stored or processed in the system while their jobs are active?

6-2.b.

Y

N

NA

I

BACK

 

 

 

 

 

 

 

 

 

 

People - Organization

75.

Have individuals been designated to be responsible for computer security?

2-9.b., 2-13.
2-10, 2-19f

Y

N

NA

I

76.

Are local policies and procedures for the ADP security:

         
 

a.

Available to the operating company?

 

Y

N

NA

I

 

b.

Being followed?

A11-10.

Y

N

NA

I

77.

Are individuals in positions to commit errors or perpetrate irregularities not in a position which would enable them to conceal the errors or irregularities?

A15-12.c.

Y

N

NA

I

78.

Is there an active Education, Training and Awareness Program?

16-2.

Y

N

NA

I

79.

Are the department head's and file OPRs apprised of any risks to the classified or sensitive data stored or processed in the system?

4-2a(4)

Y

N

NA

I

80.

Can systems programmers be trusted NOT to circumvent normal access procedures by use of special coding, thus violating the integrity of the system? Is CSO written permission obtained to use utilities/compilers, etc. that bypass security checks and controls?

A15-12.c
(4)(a)

Y

N

NA

I

 

a.

Are controls in place to determine if security controls are being circumvented?

8-3h(1)

Y

N

NA

I, T, D

BACK

 

 

 

 

 

 

 

 

 

 

Configuration Management

81.

Is the security hardware and software configuration recorded for:

         
 

a.

Routine or normal operations?

 

Y

N

NA

I

 

b.

"Other" operations?

 

Y

N

NA

I

82.

Is approval required for hardware and software configuration changes?

8-3.d.

Y

N

NA

I

BACK

 

 

 

 

 

 

 

 

 

 

Network Security

83.

Has the network manager (NM) been designated?

2-14

Y

N

NA

I

84.

Has the NM:

 

Y

N

NA

I

 

a.

Established network security policy and procedures?

2-14.a.

Y

N

NA

I

 

b.

Obtained CEO/CSO approval to process?

2-14.a.

Y

N

NA

I

85.

Has the NM appointed a Network Security Manager, in writing?

2-14.b.

Y

N

NA

I

86.

Has the NM approved security procedures?

2-14.c.

Y

N

NA

I

87.

Has the NM approved security procedures for remote terminals and workstations?

 

Y

N

NA

I

88.

Did the NM approve the initial connection and continued operation of remote terminals and workstations?

2-14.c.

Y

N

NA

I

89.

Did the NM conduct a network risk analysis?

2-14.d.

Y

N

NA

I

90

Did the NM identify and document all assumptions and constraints?

2-14.d.

Y

N

NA

I

91.

Did the NM provide written certification to the CEO/CSO that the network can satisfy specs. for the highest sensitivity and criticality that the network processes?

2-14.e.

Y

N

NA

I

92.

Does the NM recertify the adequacy of network security at least every three years or upon significant modification?

2-14.f.

Y

N

NA

I

93.

Are all network users given security training before they are given access to the network?

2-14.g.

Y

N

NA

I

94.

Is all network security training documented?

2-14.g.

Y

N

NA

I

95.

Does the NM maintain a current Network Security Plan (NSP)?

2-14.h.

Y

N

NA

I

96.

Is the NSM on duty or on call whenever the network processes classified data?

2-15.

Y

N

NA

I

97.

Is the Network Security Officer (NSO) appointed in writing for all remote areas NOT under the NSMs management control?

2-15.a.

Y

N

NA

I

98.

Does the NSM monitor activities on the network and ensure compliance with security procedures?

2-15.b.

Y

N

NA

I, T

99.

Does the NSM monitor activities on the network and if necessary deny access to the network?

2-15.c.

Y

N

NA

I

 

File Owner: Jim Tracy
Organization: INTEK
Phone: (314) 596-8750
E-mail: jimt@intek.net
Date Last Reviewed: NOV 2002

BACK

Open this portion of the document in Word (60 KB)Open this portion of the document in Word (60 KB)