Identifier | Admin_Security_Data |
Descriptive Name | Changes to security data by authorized personnel |
Description | Provide mechanisms to assure that changes to security related data are executed only by authorized personnel. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Audit_Gen_User |
Descriptive Name | Individual accountability |
Description | The system shall provide individual accountability for auditable actions. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Audit_Generation |
Descriptive Name | Audit data generation with identity |
Description | The system shall provide the capability to ensure that all audit records include enough information to determine the date and time of action, the system locale of the action, the system entity that initiated or completed the action, the resources involved, and the action involved. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Audit_Protect |
Descriptive Name | Protected audit data storage |
Description | The system shall protect the contents of the audit trails against unauthorized access, modification, or deletion. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Authority_Notify |
Descriptive Name | Notification of threats and vulnerabilities |
Description | Notification of threats and vulnerabilities shall be addressed. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Change_Control_Users |
Descriptive Name | Notification of data content changes |
Description | Notify user of the time and date of the last modification of data. |
Selection Guidance | This is a generic policy that needs to be instantiated to say which data needs notification. |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Config_Mgt_Plan |
Descriptive Name | Implement operational configuration management |
Description | A configuration management plan shall be implemented by the system. The system shall implement configuration management to assure storage integrity, identification of system connectivity (software, hardware, and firmware), and identification of system components (software, hardware, and firmware). The system shall implement strong integrity mechanisms (integrity locks, encryption). |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Documented_Recovery |
Descriptive Name | Documented recovery |
Description | The system shall provide procedures and features to assure that system recovery is done in a trusted and secure manner. Any circumstances that could result in an untrusted recovery shall be documented. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | External_Labels |
Descriptive Name | Labeling data |
Description | The system shall provide security parameters associated with information exchanged between systems. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | I&A_User |
Descriptive Name | User identification and authentication |
Description | The system shall provide Identification and authentication (I&A) procedures which uniquely identify and authenticate users. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Integrity_Data/SW |
Descriptive Name | Strong integrity mechanisms |
Description | The system shall implement strong integrity mechanisms (integrity locks, encryption). |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Integrity_Practice |
Descriptive Name | Operational integrity system function testing |
Description | Provide system functional tests to periodically test the integrity of the hardware and code running system functions. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Lifecycle_Security |
Descriptive Name | Security throughout lifecycle |
Description | Security shall be addressed throughout the system's lifecycle. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Malicious_Code |
Descriptive Name | Malicious code prevention |
Description | Procedures and mechanisms to prevent the introduction of malicious code into the system shall be provided. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Need_To_Know |
Descriptive Name | Privileged user access |
Description | The system shall function so that each user has access to all of the information and functions that the user requires to perform duties, but no more. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Non-Repudiation |
Descriptive Name | Non-repudiation capabilities |
Description | The system shall provide non-repudiation capabilities. |
Selection Guidance | An example of a non-repudiation mechanism is an implementation of digital signatures. |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Privileged_Doc |
Descriptive Name | Privileged user documentation |
Description | Documentation shall include guides or manuals for the system's privileged users. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Screen_Lock |
Descriptive Name | User screen locking |
Description | The system shall provide a screen lock mechanism. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Storage_Integrity |
Descriptive Name | Assurance of effective storage integrity |
Description | The system shall provide assurance that storage integrity is effective. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Sys_Access_Banners |
Descriptive Name | System access banners |
Description | The system shall notify users prior to gaining access that the user's actions may be monitored and recorded, that using the system consents to such monitoring, and that unauthorized use may result in criminal or civil penalties. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Sys_Assur_HW/SW/FW |
Descriptive Name | Validation of security function integrity |
Description | Features and procedures to validate the integrity and the expected operation of the security-relevant software, hardware, and firmware shall be provided by the system. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Sys_Backup_Procs |
Descriptive Name | System backup procedures |
Description | Provide the capability to restore the system to a secure state after discontinuities of system operations. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Sys_Backup_Restore |
Descriptive Name | Restoration with minimal loss |
Description | The system shall provide backup procedures to allow restoration of the system with minimal loss of service or data. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Sys_Backup_Storage |
Descriptive Name | Effective backup restoration |
Description | The system shall provide procedures to ensure both the existence of sufficient backup storage capability and effective restoration (incremental and complete) of the backup data. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Sys_Backup_Verify |
Descriptive Name | Backup protection and restoration |
Description | The system shall provide appropriate physical and technical protection of the backup and restoration hardware, firmware, and software. |
Selection Guidance | |
Safeguard Application | The objective O.Sys_Backup_Verify does not provide complete coverage of this policy. Additional objectives need to be defined. Currently detection of failure is accounted for but not prevention of failure. |
Editorial | |
Supporting Policy Objectives | |
Identifier | System_Protection |
Descriptive Name | Protection from security function modification |
Description | Provide features or procedures for protection of the system from improper changes. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | System_Recovery |
Descriptive Name | Trusted system recovery |
Description | Provide procedures and features to assure that system recovery is done in a trusted and secure manner. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | Tamper_ID |
Descriptive Name | Physical tampering detection and notification |
Description | The system shall detect physical tampering and notify the appropriate authority. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | User_Auth_Enhanced |
Descriptive Name | Enhanced user identification and authentication |
Description | The system shall require the use of enhanced authentication for privileged users who either reside outside of the system's perimeter or whose communications traverse data lines outside of the system's perimeter. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | User_Data_Dial-in |
Descriptive Name | Encryption of transmitted user data |
Description | The system shall provide data transmission using an encryption mechanism appropriate for the sensitivity of the data. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | User_Data_Storage |
Descriptive Name | Protection of stored user data |
Description | The system shall provide appropriate storage, continuous personnel access control storage, or encrypted storage of data based on the sensitivity of the data. |
Selection Guidance | |
Safeguard Application | O.User_Data_Integrity covers part of this policy, but an additional objective dealing with confidentiality may be needed. |
Editorial | |
Supporting Policy Objectives | |
Identifier | User_Data_Transfer |
Descriptive Name | Protection of transmitted user data |
Description | The system shall provide a protected distribution system for data transmitted. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives | |
Identifier | User_Defined_AC |
Descriptive Name | Discretionary access control |
Description | The system shall provide a Discretionary Access Control (DAC) function (i.e., a user can grant access authorization to other users for data they control). |
Selection Guidance | |
Safeguard Application | |
Editorial | "Data" is a compromise between "information" and "object". The issue is that DAC does not necessarily control access to information. |
Supporting Policy Objectives | |
Identifier | User_Documentation |
Descriptive Name | General user documentation |
Description | Documentation shall include a user's guide for the general user. |
Selection Guidance | |
Safeguard Application | |
Editorial | |
Supporting Policy Objectives |