throbber
Archived NIST Technical Series Publication
`
`The attached publication has been archived (withdrawn), and is provided solely for historical purposes.
`It may have been superseded by another publication (indicated below).
`
`Archived Publication
`Series/Number:
`Title:
`
`Publication Date(s):
`Withdrawal Date:
`Withdrawal Note:
`
`NIST Special Publication 800-12
`An Introduction to Computer Security: the NIST Handbook
`
`October 1995
`June 21, 2017
`SP 800-12 is superseded in its entirety by the publication of SP
`800-12 Revision 1.
`
`Superseding Publication(s)
`The attached publication has been superseded by the following publication(s):
`
`Series/Number:
`Title:
`
`NIST Special Publication 800-12 Revision 1
`An Introduction to Information Security
`
`Author(s):
`
`Michael Nieles; Kelley Dempsey; Victoria Yan Pillitteri
`
`Publication Date(s):
`URL/DOI:
`
`June 2017
`https://doi.org/10.6028/NIST.SP.800-12r1
`
`Additional Information (if applicable)
`Contact:
`Computer Security Division (Information Technology Laboratory)
`Latest revision of the
`SP 800-12 Rev. 1 (as of June 21, 2017)
`attached publication:
`Related information:
`
`Withdrawal
`announcement (link):
`
`N/A
`
`Date updated: (cid:58)(cid:437)(cid:374)(cid:286)(cid:3)(cid:1006)(cid:1005)(cid:853)(cid:3)(cid:1006)(cid:1004)(cid:1005)(cid:1011)
`
`Roku EX1040 (Part 1 of 2)
`Roku v. Ancora
`IPR2021-01406
`
`

`

`PUBLICATIONS
`_Auiioa §2053
`NISTSpecial Publication 800-12
`
`U.S. DEPARTMENT OF
`COMMERCE
`
`Tec2eeogy AdministrationNational Institute of‘Standards
`
`and‘TeFinology
`
`An Introduction to Computer
`Security: The NIST Handbook
`
`Barbara Guttman and Edward A. Roback
`
`COMPUTER
`
`SECURITY
`
`
`
`acie
`
`.U57
`NO.800-12
`
`1995
`
`NIST
`
`

`

`j he National Institute of Standards and Technology was established in 1988 by Congress to ‘‘assist industry
`
`. needed to improve product quality, to modernize manufacturing processes,
`.
`in the developmentof technology .
`to ensure productreliability .
`.
`. and to facilitate rapid commercialization .
`.
`. of products based on new scientific
`discoveries.”
`NIST, originally founded as the National Bureau of Standards in 1901, works to strengthen U.S. industry’s
`competitiveness; advance science and engineering; and improve public health, safety, and the environment. Oneofthe
`agency’s basic functions is to develop, maintain, and retain custody of the national standards of measurement, and
`provide the means and methods for comparing standards used in science, engineering, manufacturing, commerce,
`industry, and education with the standards adopted or recognized by the Federal Government.
`As an agency of the U.S. Commerce Department’s Technology Administration, NIST conducts basic and applied
`research in the physical sciences and engineering, and develops measurement techniques, test methods, standards, and
`related services. The Institute does generic and precompetitive work on new and advanced technologies. NIST’s
`rescarch facilities are located at Gaithersburg, MD 20899, and at Boulder, CO 80303. Major technical operating units
`and their principal activities are listed below. For more information contact the Public Inquiries Desk, 301-975-3058.
`
`
`Office of the Director
`» Advanced Technology Program
`* Quality Programs
`* International and Academic Affairs
`
`Technology Services
`¢ Manufacturing Extension Partnership
`¢ Standards Services
`¢ Technology Commercialization
`¢ MeasurementServices
`¢ Technology Evaluation and Assessment
`¢ Information Services
`
`Materials Science and Engineering
`Laboratory
`¢ Intelligent Processing of Materials
`* Ceramics
`* Matcrials Reliability’
`« Polymers
`¢ Metallurgy
`¢ Reactor Radiation
`
`Chemical Science and Technology
`Laboratory
`¢ Biotechnology
`¢ Chemical Kinetics and Thermodynamics
`* Analytical Chemical Research
`* Process Measurements
`
`¢ Surface and Microanalysis Science
`* Thermophysics?
`
`Manufacturing Engineering Laboratory
`¢ Precision Engineering
`¢ Automated Production Technology
`¢ Intelligent Systems
`¢ Manufacturing Systems Integration
`¢ Fabrication Technology
`
`Electronics and Electrical Engineering
`Laboratory
`¢ Microelectronics
`* Law Enforcement Standards
`° Electricity
`¢ Semiconductor Electronics
`* Electromagnetic Fields’
`¢ Electromagnetic Technology!
`¢ Optoelectronics’
`
`Building and Fire Research Laboratory
`¢ Structures
`¢ Building Materials
`¢ Building Environment
`¢ Fire Safety
`¢ Fire Science
`
`Computer Systems Laboratory
`¢ Office of Enterprise Integration
`¢ Information Systems Engineering
`¢ Systems and Software Technology
`¢ Computer Security
`¢ Systems and Network Architecture
`¢« Advanced Systems
`
`Physics Laboratory
`Computing and Applied Mathematics
`* Electron and Optical Physics
`Laboratory
`e Atomic Physics
`¢ Applied and Computational Mathematics?
`¢ Molecular Physics
`* Statistical Enginecring?
`* Radiometric Physics
`* Scientific Computing Environments’
`* Quantum Metrology
`¢ Ionizing Radiation
`« Computer Services
`* Computer Systems and Communications’
`¢ Time and Frequency’
`¢ Quantum Physics!
`* Information Systems
`
`
`"At Boulder, CO 80303.
`7Some clements at Boulder, CO 80303.
`
`

`

`NIST Special Publication 800-12.|An Introduction to Computer
`Security: The NIST Handbook
`
`Barbara Guttman and Edward Roback
`
`COMPUTER SECURIT Y
`
`Computer Systems Laboratory
`National Institute of Standards
`and Technology
`Gaithersburg, MD 20899-0001
`
`October 1995
`
`
`
`U.S. Department of Commerce
`Ronald H. Brown, Secretary
`
`Technology Administration
`Mary L. Good, Under Secretary for Technology
`
`National Institute of Standards and Technology
`Arati Prabhakar, Director
`
`

`

`Reports on Computer Systems Technology
`
`The National Institute of Standards and Technology (NIST) has a unique responsibility for computer
`systems technology within the Federal government. NIST’s Computer Systems Laboratory (CSL) devel-
`ops standards and guidelines, provides technical assistance, and conducts research for computers and
`related telecommunications systems to achieve more effective utilization of Federal information technol-
`ogy resources. CSL’s responsibilities include development of technical, management, physical, and ad-
`ministrative standards and guidelines for the cost-effective security and privacy of sensitive unclassified
`information processed in Federal computers. CSL assists agencies in developing security plans and in
`improving computer security awareness training. This Special Publication 800 series reports CSL re-
`search and guidelines to Federal agencies as well as to organizations in industry, government, and
`academia.
`
`National Institute of Standards and Technology Special Publication 800-12
`Natl. Inst. Stand. Technol. Spec. Publ. 800-12, 272 pages (Oct. 1995)
`CODEN: NSPUE2
`
`U.S. GOVERNMENT PRINTING OFFICE
`WASHINGTON: 1995
`
`For sale by the Superintendent of Documents, U.S. GovernmentPrinting Office, Washington, DC 20402
`
`

`

`Table of Contents
`
`I, INTRODUCTION AND OVERVIEW
`
`Chapter 1
`
`INTRODUCTION
`
`3 3 4 5
`
`7
`
`DO8
`Intended Audience .................. 0.0 c cece ccc eee
`Organization ... 6... 0 66. nes
`Important Terminology .................. 0.00. cece eee eee
`Legal Foundation for Federal Computer Security
`PYOMrVamMs .... 0.0... eee teens
`
`Chapter 2
`
`ELEMENTS OF COMPUTER SECURITY
`
`the
`Computer Security Supports the Mission of
`Organization. ... 0.000.000 6 6.ccncenteneee
`Computer Security is an Integral Element of Sound
`Management, ............... 0. cc cece nee eens
`Computer Security Should Be Cost-Effective. ...............
`Computer Security Responsibilities and Accountability
`Should Be Made Explicit...............0..0.. 0.0.00... cee eee
`Systems Owners HaveSecurity Responsibilities Outside
`Their Own Organizations. ...............000 0.0000 cece ees
`Computer Security Requires a Comprehensive and
`Integrated Approach. ................. 0.000 ccc ccc cee eens
`Computer Security Should Be Periodically Reassessed.
`
`9
`
`10
`
`11
`
`12
`
`12
`
`13
`
`AL
`
`1.2
`
`1.3
`1.4
`
`1.5
`
`Dol
`
`2.2
`
`2.3
`2.4
`
`2.5
`
`2.6
`
`2.7
`
`2.8
`
`

`

`Chapter3
`
`ROLES AND RESPONSIBILITIES
`
`3.1
`3.2
`3.3
`
`Senior Management ................ 00... cece cece 16
`Computer Security Management ...........................
`16
`Program and Functional Managers/Application Owners
`cee eee eee eee ee eee ae MM cymes oo. Gig G) ee aeOe 16
`Technology Providers .................... 0c cee eeee eee eens
`16
`3.4
`Supporting Functions .................... 0.0. e cece eee ees
`18
`3.5
`|OoeI ON 19
`3.6
`
`Chapter 4
`
`COMMON THREATS: A BRIEF OVERVIEW
`
`4.1
`
`4.2
`
`4.3
`
`4.4
`
`4.5
`
`4.6
`
`4.7
`
`4.8
`
`4.9
`
`Errors and Omissions .....................00 0 ccc cece 22
`Fraud and Theft ............00. 0.0.0 cc ccc ccc cece eens 23
`Employee Sabotage ................ 0... c cece eee eee eee 24
`Loss of Physical and Infrastructure Support ................ 24
`Malicious Hackers .................. 0.00.0. cece eee eens 24
`Industrial Espionage ...................0. 0... cece cece eee eens
`26
`Malicious Code ............... 0.0... c ccc eect eee eens 27
`Foreign Government Espionage .........................05- 27
`Threats to Personal Privacy ..................... 0.0 eee eee 28
`
`Il. MANAGEMENT CONTROLS
`
`Chapter 5
`
`COMPUTER SECURITY POLICY
`
`5.1
`
`5.2
`
`5.3
`
`35
`Program Policy ............... 0c ccc cece cee eee eee ees
`Issue-Specific Policy ................ 0.00 cece eee eee ees 37
`System-Specific Policy ................. 0... c cece eee e eee eee 40
`
`

`

`5.4
`
`aes)
`
`Interdependencies.................. 00.0. cece eee eee eee 42
`Cost Considerations ................ 00... cee cece cence eeeee 43
`
`Chapter 6
`
`COMPUTER SECURITY PROGRAM MANAGEMENT
`
`Structure of a Computer Security Program ................ 45
`Central Computer Security Programs ...................... 47
`Elements of an Effective Central Computer Security
`PiOCLalive ae eee eee.. ).. 51
`System-Level Computer Security Programs ................. 53
`Elements of Effective System-Level Programs .............. 53
`Central and System-Level Program Interactions ............ 56
`Interdependencies................... 0... c cece eee ees 56
`Cost Considerations ..........................0205eee... 56
`
`Chapter 7
`
`COMPUTER SECURITY RISK MANAGEMENT
`
`Risk Assessment .............. 0.00. cece cece eee eens 59
`Risk Mitigation ..........0.0..0.0.. 00 0c ccc cece eens 63
`Uncertainty Analysis ................. 0... c eee 67
`Interdependencies.................. 0... c cece ee eee eee 68
`Cost Considerations ............... 0.0.0... 0c cece cee eee eee 68
`
`6.1
`
`6.2
`
`6.3
`
`6.4
`
`6.5
`
`6.6
`
`6.7
`
`6.8
`
`vel
`
`ae
`
`as
`
`7.4
`
`i.5
`
`Chapter8
`
`SECURITY AND PLANNING
`IN THE COMPUTERSYSTEM LIFE CYCLE
`
`8.1
`8.2
`
`8.3
`
`Computer Security Act Issues for Federal Systems .......... 71
`Benefits of Integrating Security in the Computer
`System Life Cycle ...........00.0.0.0.0 000 ccc ees 72
`Overview of the Computer System Life Cycle ............... 73
`
`

`

`3.4
`
`8.5
`8.6
`
`9.1
`9.2.
`9.3.
`9.4
`9.5
`9.6
`
`Security Activities in the Computer System Life Cycle
`Se eee eee ee ie te eet ad > he). as 74
`Interdependencies...................... 00... ec e ce ee 86
`Cost Considerations ..................6.0.. 0000s 86
`
`Chapter 9
`
`ASSURANCE
`
`Accreditation and Assurance ......................000000005 90
`Planning and Assurance...........................00000 eee 92
`Design and Implementation Assurance ...................... 92
`Operational Assurance ..................0....0 0 ccc cece eee 96
`Interdependencies.............0..00.0 0.000 c cece ees 101
`Cost Considerations ...............0... 00. c cece eee eee ees 101
`
`Il. OPERATIONAL CONTROLS
`
`Chapter 10
`
`PERSONNEL/USER ISSUES
`
`10.1 Staffing...........n924........4......5 eee 107
`10.2 User Administration .....................00 00. c eee ee eee 110
`
`10.3 Contractor Access Considerations .......................... 116
`
`Public Access Considerations ............................... 116
`10.4
`Interdependencies.................. 0. ccc cece eee 7
`10.5
`10.6 Cost Considerations ............0..0 0.00. ccc 117
`
`Chapter 11
`
`PREPARING FOR CONTINGENCIES AND DISASTERS
`
`11.1
`
`Step 1: Identifying the Mission- or Business-Critical
`Functions ........00. 00. ccc ccc eees 120
`
`vi
`
`

`

`11.2
`
`11.3
`
`11.4
`
`11.5
`
`11.6
`11.7
`
`11.8
`
`Step 2: Identifying the Resources That SupportCritical
`Functions ........0.0.0.00.0.0.0.0 000 teen nets 120
`Step 3: Anticipating Potential Contingencies or
`Disasters . 00.0.0... cette tenet nnn nes 122
`Step 4: Selecting Contingency Planning Strategies .......... 123
`Step 5: Implementing the Contingency Strategies ........... 126
`Step 6: Testing and Revising ...........................00--. 128
`Interdependencies.................. cece cece eee eens 129
`Cost Considerations ................. 0000 c cece eee eens 130
`
`Chapter 12
`
`COMPUTER SECURITY INCIDENT HANDLING
`
`12.1
`
`12.2
`
`12.3
`
`12.4
`
`12.5
`
`Benefits of an Incident Handling Capability ................. 134
`Characteristics of a Successful Incident Handling
`Capability ......0000 0.00000es 137
`Technical Support for Incident Handling ................... 139
`Interdependencies ................. 0. 0c ccc eee ees 140
`Cost Considerations ................. 0.00000 e cece eens 141
`
`Chapter 13
`
`AWARENESS, TRAINING, AND EDUCATION
`
`13.1
`
`13.2
`13.3
`
`13.4
`
`13.5
`
`13.6
`
`13.7
`13.8
`
`Behavior .... 10.0.0...000s 143
`Accountability ...0... 0.00 cee nee 144
`ARWareness .......0..5. Seen... 144
`CANINe ee ee ay)ce. 146
`Education ..........0 00.000 eee eees 147
`Implementation ........0.0..... 0.00 eee 148
`Interdependencies.................. 0... c ccc 152
`Cost Considerations ..........0...0000 00.0 ccc ccc ccc eens 152
`
`Vil
`
`

`

`Chapter 14
`
`SECURITY CONSIDERATIONS
`IN
`COMPUTER SUPPORT AND OPERATIONS
`
`14.1
`14.2
`14.3
`14.4
`14.5
`14.6
`
`14.7
`14.8
`14.9
`
`User Support 2.0.0.0... 0. ccc ent e nee ens 156
`Software Support .......... 0.0... ccc cece cece cent eens 157
`Configuration Management .............. 0.0.0. c cece ees 157
`Backups ............: 000 cece ce cece eee eeeoe 158
`Media Controls ..........0. 0... cee eee eee 158
`Documentation....... Pele eee Pew leneesceene ese itp 161
`Maintenance ......... 0... ccc ccc cece ene e neces 161
`Interdependencies ................ 0.0 c ccc ccc eens 162
`Cost Considerations ......0....0 0.0.00. cc ccc cece eee eens 163
`
`Chapter 15
`
`PHYSICAL AND ENVIRONMENTAL SECURITY
`
`15.1
`15.2
`
`15.3
`15.4
`
`15.5
`15.6
`
`15.7
`15.8
`
`15.9
`
`15.10
`
`Physical Access Controls .............. 0.0.0 ccc eee eee 167
`Fire Safety Factors .......00.... 00.0 ccc cece eects 168
`Failure of Supporting Utilities ...........................05. 170
`Structural Collapse .............. 0.0... c ccc cee eee nes 170
`Plumbing Leaks ................. 00000 c ccc ccc cee enn eee 171
`Interception of Data... ......0.....0 0.00 ccs i
`Mobile and Portable Systems ...........................0405. 172
`Approach to Implementation .........................00000. 172
`Interdependencies...................eee Se ee 174
`Cost Considerations .............0..... 000 cece cee eee ees 174
`
`Vill
`
`

`

`IV. TECHNICAL CONTROLS
`
`Chapter 16
`
`IDENTIFICATION AND AUTHENTICATION
`
`16.1
`
`16.2
`16.3
`16.4
`
`16.5
`
`16.6
`
`I&A Based on Something the User Knows .................. 180
`I&A Based on Something the User Possesses ................ 182
`I&A Based on Something the User Is ....................... 186
`Implementing I&A Systems ..................... 0000002005. 187
`Interdependencies...................0 000 e cece 189
`Cost Considerations ............... 0.0000 c cece eens 189
`
`Chapter 17
`
`LOGICAL ACCESS CONTROL
`
`17.1
`
`17.2
`
`17.3
`17.4
`17.5
`
`17.6
`
`17.7
`
`Access Criteria ..........0 00. ect e cee eenen es 194
`
`Policy: The Impetus for Access Controls ee eee ae 197
`Technical Implementation Mechanisms ..................... 198
`Administration of Access Controls .......................... 204
`Coordinating Access Controls ......................0.-2005. 206
`Interdependencies................... 0. ccc ec ees 206
`Cost Considerations ...................00 000000 e eee ees 207
`
`Chapter 18
`
`AUDIT TRAILS
`
`18.1
`
`18.2
`18.3
`18.4
`
`18.5
`
`Benefits and Objectives .................0.0..00 00. c cee cece 211
`Audit Trails and Logs .................00. 0000 c cece eee eee 214
`Implementation Issues .................0.0..000 000 c cee tees 217
`Interdependencies .................... 00. cece eens 220
`Cost Considerations ..............0...00 00000. e cece eee ee 221
`
`

`

`Chapter 19
`
`CRYPTOGRAPHY
`
`Basic Cryptographic Technologies .......................... 223
`19.1
`19.2 Uses of Cryptography ....................0...0 0c cece eee 226
`19.3.
`Implementation Issues..................... 0.000. cece eens 230
`19.4
`Imterdependencies.................... 000... c cee cece nes 233
`19.5 Cost Considerations ................. 0.0000. 234
`
`V. EXAMPLE
`
`Chapter 20
`
`ASSESSING AND MITIGATING THE RISKS
`TO A HYPOTHETICAL COMPUTER SYSTEM
`
`Initiating the Risk Assessment ...............5...........05. 241
`20.1
`20.2 HGA's Computer System.........................000. 020 ee. 242
`20.3 Threats to HGA's Assets ............0.0..0.0 0.00. 245
`20.4 Current Security Measures ...........................0005- 248
`20.5 Vulnerabilities Reported by the Risk Assessment Team
`we ete be ecw ec eee eee tee ee ee te eee ee: «ae 257
`20.6 Recommendations
`for Mitigating the
`Identified
`Vulnerabilities .........0...0.0.00 0... eens 262
`Summary ...............2.....-0:---0-+-- ee ee 266
`
`20.7
`
`Cross Reference and General Index ......................00 0000 e eee eee 269
`
`

`

`Acknowledgments
`
`NIST would like to thank the many people whoassisted with the developmentof this handbook. Fortheir
`initial recommendation that NIST produce a handbook, we thank the members of the Computer System
`Security and Privacy Advisory Board, in particular, Robert Courtney, Jr. NIST managementofficials who
`supported this effort include: James Burrows, F. Lynn McNulty, Stuart Katzke, Irene Gilbert, and Dennis
`Steinauer.
`
`In addition, special thanks is due those contractors whohelped craft the handbook, preparedrafts, teach
`classes, and review material:
`
`Daniel F. Sterne of Trusted Information Systems (TIS, Glenwood, Maryland) served as Project
`Managerfor Trusted Information Systems on this project. In addition, many TIS employees
`contributed to the handbook,including: David M. Balenson, Martha A. Branstad, Lisa M. Jaworski,
`Theodore M.P. Lee, Charles P. Pfleeger, Sharon P. Osuna, Diann K. Vechery, Kenneth M. Walker,
`and Thomas J. Winkler-Parenty.
`
`Additional drafters of handbook chapters include:
`
`Lawrence BasshamIII (NIST), Robert V. Jacobson, International Security Technology, Inc. (New
`York, NY) and John Wack (NIST).
`
`Significant assistance was also received from:
`
`Lisa Carnahan (NIST), James Dray (NIST), Donna Dodson (NIST), the Department of Energy,Irene
`Gilbert (NIST), Elizabeth Greer (NIST), Lawrence Keys (NIST), Elizabeth Lennon (NIST), Joan
`O'Callaghan (Bethesda, Maryland), Dennis Steinauer (NIST), Kibbie Streetman (Oak Ridge National
`Laboratory), and the Tennessee Valley Authority.
`
`Moreover, thanks is extended to the reviewers of draft chapters. While many people assisted, the following
`two individuals were especially tireless:
`
`Robert Courtney, Jr. (RCD and Steve Lipner (MITRE and TIS).
`
`Other important contributions and comments werereceived from:
`
`Members of the Computer System Security and Privacy Advisory Board, and the
`Steering Committee of the Federal Computer Security Program Managers’ Forum.
`
`Finally, although space does not allow specific acknowledgementofall the individuals who contributed to
`this effort, their assistance wascritical to the preparation of this document.
`
`Note that references to specific products or brandsis for explanatory purposes only; no
`Disclaimer:
`endorsement, explicit or implicit, is intended or implied.
`
`x1
`
`

`

`
`
`

`

`I. INTRODUCTION AND OVERVIEW
`
`

`

`
`
`

`

`Chapter 1
`
`INTRODUCTION
`
`1.1
`
`Purpose
`
`This handbook provides assistance in securing computer-based resources (including hardware,
`software, and information) by explaining important concepts, cost considerations, and
`interrelationships of security controls. It illustrates the benefits of security controls, the major
`techniques or approachesfor each control, and importantrelated considerations.’
`
`The handbookprovides a broad overview of computer security to help readers understand their
`computersecurity needs and develop a sound approachto the selection of appropriate security
`controls.
`It does not describe detailed steps necessary to implement a computersecurity program,
`provide detailed implementation procedures for security controls, or give guidance for auditing
`the security of specific systems. General references are provided at the end ofthis chapter, and
`references of “how-to" booksand articles are provided at the end of each chapterin Parts II, II
`and IV.
`
`The purpose ofthis handbookis not to specify requirements but, rather, to discuss the benefits of
`various computer security controls and situations in which their application may be appropriate.
`Some requirements for federal systems” are noted in the text. This document provides advice and
`guidance; no penalties are stipulated.
`
`1.2
`
`Intended Audience
`
`The handbook was written primarily for those who have computersecurity responsibilities and
`need assistance understanding basic concepts and techniques. Within the federal government,’
`this includes those who have computersecurity responsibilities for sensitive systems.
`
`‘
`
`‘It is recognized that the computer security field continues to evolve. To address changes and new issues, NIST's
`Computer Systems Laboratory publishes the CSL Bulletin series. Those bulletins which deal with security issues can be
`thought of as supplements to this publication.
`
`? Note that these requirements do not arise from this handbook, but from other sources, such as the Computer
`Security Act of 1987.
`
`* In the Computer Security Act of 1987, Congress assigned responsibility to NIST for the preparation of standards
`and guidelinesfor the security of sensitivefederal systems, excluding classified and "Warner Amendment" systems
`(unclassified intelligence-related), as specified in 10 USC 2315 and 44 USC 3502(2).
`
`3
`
`

`

`I. Introduction and Overview |
`
`For the most part, the concepts presented in
`the handbookare also applicable to the private
`sector.* While there are differences between
`federal and private-sector computing,
`especially in terms ofpriorities and legal
`constraints, the underlying principles of
`computersecurity and the available safeguards
`— managerial, operational, and technical — are
`the same. The handbookis therefore useful to
`anyone who needsto learn the basics of
`computer security or wants a broad overview
`of the subject. However,it is probably too
`detailed to be employed as a user awareness
`guide, and is not intended to be used as an
`audit guide.
`
`1.3 Organization
`
`Definition of Sensitive Information
`
`Manypeople think that sensitive information only
`tequires protection from unauthorized disclosure.
`However, the Computer Security Act provides a
`much broaderdefinition of the term "sensitive"
`information:
`
`any information, the loss, misuse, or unauthorized
`access to or modification of which could adversely
`affect the nationalinterest or the conductof.
`federal programs, or the privacy to which
`individuals are entitled under section 552a oftitle
`5, United States Code (the Privacy Act), but
`which has not been specifically authorized under
`criteria established by an Executive Order or an
`Act of Congress to be kept secret in the interest of.
`national defense or foreign policy.
`
`The first section of the handbook contains
`background and overview material, briefly
`discusses of threats, and explains the roles and
`responsibilities of individuals and
`organizations involved in computersecurity.
`It explains the executive principles of
`computer security that are used throughout
`the handbook. For example, one important
`principle that is repeatedly stressed is that only
`security measuresthat are cost-effective
`should be implemented. A familiarity with the principles is fundamental to understanding the
`handbook's philosophical approachto the issue of security.
`
`The above definition can be contrasted with the long--
`standing confidentiality-based information
`classification system for national security information
`(i.€., CONFIDENTIAL,SECRET, and TOP SECRET). This
`systemis based only upon the need to protect
`classified information fram unauthorized disclosure;
`the U.S. Government does not have a similarsystem.
`for unclassified information. No governmentwide
`schemes (for either classified or unclassified
`information) exist which are based on the.need to
`protect the integrity or availability ofinformation.
`
`The next three majorsections deal with security controls: Management Controls’ (II), Operational
`Controls (IID), and Technical Controls (IV). Most controls cross the boundaries between
`management, operational, and technical. Each chapter in the three sections provides a basic
`explanation of the control; approaches to implementing the control, some cost considerations in
`selecting, implementing, and using the control; and selected interdependencies that may exist with
`
`* As necessary, issues that are specific to the federal environment are noted as such.
`
`° The term management controls is used in a broad sense and encompassesareas that do notfit neatly into
`operational or technical controls.
`
`

`

`1. Introduction
`
`other controls. Each chapterin this portion of the handbookalso provides references that may be
`useful in actual implementation.
`
`@
`
`@
`
`@
`
`The Management Controls section addresses security topics that can be characterized as
`managerial. They are techniques and concernsthat are normally addressed by managementin
`the organization's computer security program. In general, they focus on the managementof
`the computer security program and the managementofrisk within the organization.
`
`The Operational Controls section addresses security controls that focus on controls that are,
`broadly speaking, implemented and executed by people (as opposed to systems). These
`controls are put in place to improvethe security of a particular system (or group of systems).
`They often require technical or specialized expertise — and often rely upon management
`activities as well as technical controls.
`
`The Technical Controls section focuses on security controls that the computer system
`executes. These controls are dependent upon the proper functioning of the system for their
`effectiveness. The implementation of technical controls, however, always requires significant
`operational considerations — and should be consistent with the managementof security within
`the organization.
`
`Finally, an example is presented to aid the readerin correlating some of the major topics discussed
`in the handbook.
`It describes a hypothetical system and discusses some of the controls that have
`been implementedto protect it. This section helps the reader better understand the decisions that
`must be madein securing a system, andillustrates the interrelationships among controls.
`
`1.4 Important Terminology
`
`To understand the rest of the handbook,the reader must be familiar with the following key terms
`and definitions as used in this handbook.
`In the handbook, the terms computers and computer
`systems are used to refer to the entire spectrum of information technology,including application
`and support systems. Other key terms include:
`
`Computer Security: The protection afforded to an automated information system in order to attain
`the applicable objectives of preserving the integrity, availability and confidentiality of information
`system resources (includes hardware, software, firmware, information/data, and
`telecommunications).
`
`Integrity: In lay usage, information has integrity whenit is timely, accurate, complete, and
`consistent. However, computers are unable to provide or protect all of these qualities.
`Therefore, in the computersecurity field, integrity is often discussed more narrowly as having two
`
`

`

`I. Introduction and Overview
`
`Location of Selected Security Topics
`
`Because this handbookis structured to focus on computer security controls, there may be several security
`topics that the reader may have trouble locating. For example, no separate section is.devotedto mainframeor
`personal computer security, since the controls discussed in the handbook can be applied(albeitiindifferent
`ways) to various processingplatforms and‘systems. The following mayhelp the reader locate-areasofiinterest
`not readily found in the table of contents:
`
`Topic
`
`Chapter
`
`Accreditation
`
`Firewalls
`Sectitity Plans
`‘Trusted Systems
`
`Life Cycle
`8.
`9. - Assurance y
`17.
`Logical ree Controls
`8
`Life Cycle
`9.
`Assurance
`
`Security features,including those incorporatedinto trusted systems, are discussed
`throughout.
`
`Viruses &
`Other Malicious
`Cade
`
`9.
`12.
`
`Assurance (Operational Assurance section)
`Incident Handling -
`
`Network Security Networksecurityuses thesame basic set ofcontrols as mainframe security or PC security.
`In many of the handbookchapters, considerations for using the controlis a networked
`environmentare addressed, as appropriate. For example, secure gateways are discussed as a
`part of Access Control; transmitting authentication data over insecure networksis discussed
`in the Identification and Authentication chapter; and the Contingency Planning chaptertalks
`about data communications contracts.
`
`For the samereason,there is not a separate chapter for PC, LAN, minicomputer, or
`mainframe security.
`
`facets: data integrity and system integrity. "Data integrity is a requirement that information and
`programs are changedonly in a specified and authorized manner."® System integrity is a
`requirement that a system "performs its intended function in an unimpaired manner, free from
`deliberate or inadvertent unauthorized manipulation ofthe system.’ The definition of integrity
`
`
`
`* National Research Council, Computers at Risk, (Washington, DC: National AcademyPress, 1991), p. 54.
`
`7 National ComputerSecurity Center, Pub. NCSC-TG-004-88.
`
`6
`
`

`

`I. Introduction
`
`has been, and continues to be, the subject of much debate among computersecurity experts.
`
`Availability: A "requirement intended to assure that systems work promptly and service is not
`denied to authorized users."®
`
`Confidentiality: A requirement that private or confidential information not be disclosed to
`unauthorized individuals.
`
`1.5 Legai Foundation for Federal Computer Security Programs
`
`The executive principles discussed in the next chapter explain the need for computersecurity. In
`addition, within the federal government, a numberof laws and regulations mandate that agencies
`protect their computers, the information they process, and related technologyresources(e.g.,
`telecommunications).” The most importantarelisted below.
`
`e@
`
`@
`

`
`The Computer Security Act of 1987 requires agenciesto identify sensitive systems, conduct
`computersecurity training, and develop computersecurity plans.
`
`The Federal Information Resources Management Regulation (FIRMR)is the primary
`regulation for the use, management, and acquisition of computerresourcesin the federal
`government.
`
`OMBCircular A-130 (specifically Appendix III) requires that federal agencies establish
`security programs containing specified elements.
`
`Note that many more specific requirements, many of which are agencyspecific, also exist.
`
`Federa! managers are responsible for familiarity and compliance with applicable legal
`requirements. However, laws and regulations do not normally provide detailed instructions for
`protecting computer-related assets. Instead, they specify requirements — suchasrestricting the
`availability of personal data to authorized users. This handbookaids the reader in developing an
`effective, overall security approach andin selecting cost-effective controls to meet such
`requirements.
`
`* Computers at Risk, p. 54.
`
`* Although notlisted, readers should be awarethat laws also exist that may affect nongovernmentorganizations.
`
`Wl
`
`

`

`ee
`
`I. Introduction and Overview
`
`References
`
`Auerbach Publishers (a division of Warren Gorham & Lamont). Data Security Management.
`Boston, MA. 1995.
`
`British StandardsInstitute. A Code of Practice for Information Security Management, 1993.
`
`Caelli, William, Dennis Longley, and Michael Shain. Information Security Handbook. New York,
`NY: Stockton Press, 1991.
`
`Fites, P., and M. Kratz. Information Systems Security: A Practitioner's Reference. New York,
`NY: Van Nostrand Reinhold, 1993.
`
`Garfinkel, S., and G. Spafford. Practical UNIX Security. Sebastopol, CA: O'Riley & Associates,
`Inc., 1991.
`
`Institute of Internal Auditors Research Foundation. System Auditability and Control Report.
`Altamonte Springs, FL: The Institute of Internal Auditors, 1991.
`
`National Research Council. Computers at Risk: Safe Computing in the Information Age.
`Washington, DC: National Academy Press, 1991.
`
`Pfleeger, Charlies P. Security in Computing. EnglewoodCliffs, NJ: Prentice Hall, 1989.
`
`Russell, Deborah, and G.T. Gangemi, Sr. Computer Security Basics. Sebastopol, CA: O'Reilly &
`Associates, Inc., 1991.
`
`Ruthberg, Z., and T

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket