Top Banner
1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY
36

1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

Dec 19, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

1

For System Administrators

For System Administrators

INFORMATIONINFORMATION SYSTEM

SECURITY

INFORMATIONINFORMATION SYSTEM

SECURITY

Page 2: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

Objectives

Discuss the principles of Computer Security

Identify required IS security documentation

Identify the purpose of a System Security Plan (SSP)

Discuss the principles of Computer Security

Identify required IS security documentation

Identify the purpose of a System Security Plan (SSP)

Page 3: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

Foundations of Computer Security

Confidentiality Integrity Availability

Confidentiality Integrity Availability

C

I

A

Page 4: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

4

CONFIDENTIALITY

PROTECTION OF DATA IN OR PROCESSED BY THE COMPUTER SYSTEM FROM DISCLOSURE

Page 5: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

5

INTEGRITY

PROTECTION OF ALL COMPONENTS OF HARDWARE AND SOFTWARE USED DURING CLASSIFIED PROCESSING

FROM: MANIPULATION DELETION

PROTECTION OF ALL COMPONENTS OF HARDWARE AND SOFTWARE USED DURING CLASSIFIED PROCESSING

FROM: MANIPULATION DELETION

Page 6: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

6

AVAILABILITY

Protecting the computer from malicious logic

or natural disasters

Protecting the computer from malicious logic

or natural disasters

Page 7: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

Protection LevelsNISPOM 8-402

PL-1 Dedicated

PL-2System High

PL-4Multilevel

PL-3Compartmented

Page 8: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

Protection Level (PL) 1Dedicated Security Mode

Clearance, N-T-K and, if applicable, all formal access approvals for all information

Clearance, N-T-K and, if applicable, all formal access approvals for all information

TS

TS

Page 9: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

Protection Level (PL) 2 System High Security Mode

Clearance and access approvals for all information but with different N-T-K

Clearance and access approvals for all information but with different N-T-K

TS TSa b

Page 10: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

Protection Level (PL) 3Compartmented Security Mode

Clearance for most restrictive information, but different formal access approvals

Clearance for most restrictive information, but different formal access approvals

TOP SECRET TS- NATOSAP

CRYPTONATO

CNWDI

Page 11: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

Protection Level (PL) 4Multilevel Security Mode

All users are cleared, but may not have a clearance for all levels of classified information on the IS

All users are cleared, but may not have a clearance for all levels of classified information on the IS

TS

S

S

S

TS

TS

Page 12: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

Security DocumentationNISPOM 8-610

ISSM

SSPSSP

Security Security

PolicyPolicy

CM PlanCM Plan

Page 13: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

13

Confidentiality MatrixConfidentiality Matrix

Page 14: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

14

Required Security Documentation

Required Security Documentation

Information System Security Policy

Configuration Management Plan

System Security Plan (SSP)

Certification and Accreditation Documentation

Information System Security Policy

Configuration Management Plan

System Security Plan (SSP)

Certification and Accreditation Documentation

8-610

Page 15: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

Basis for Accreditation

Documentation(SSP)

Analysis and evaluationof security risks

Safeguardsassociatedwith operationof the AIS

Page 16: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

What is the purpose of an SSP?

Implements security policy

User’s How-To guide

“Inspection” guide

8-610a(1)

SSPSSP

Page 17: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

17

SSP INCLUDESSSP INCLUDES System Identification

Security personnel System description

Mission or purpose System architecture

block diagramsecurity support structure

System Identification Security personnel System description

Mission or purpose System architecture

block diagramsecurity support structure

8-610a.(1)(a)

Page 18: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

18

SSP Includes, contSSP Includes, cont

System Requirements Classification Level (C-S-TS) Personnel Clearance Level of Users Need to Know of Users Formal Access Approvals involved Protection Level (PL1, 2, 3, or 4)

System Requirements Classification Level (C-S-TS) Personnel Clearance Level of Users Need to Know of Users Formal Access Approvals involved Protection Level (PL1, 2, 3, or 4)

Page 19: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

19

SSP-Protection MeasuresSSP-Protection Measures

Audit Capabilities Access Controls Resource Controls System Recovery Security Testing

Audit Capabilities Access Controls Resource Controls System Recovery Security Testing

Data Transmission I & A Session Controls System Assurance Physical Security

Data Transmission I & A Session Controls System Assurance Physical Security

Page 20: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

20

SSP-Protection Measures

Trusted Downloading Software controls Media controls Maintenance Clearing and sanitization Self Inspections

Trusted Downloading Software controls Media controls Maintenance Clearing and sanitization Self Inspections

SS

P

B 4 UCan,

Put It InThe

Plan!

Page 21: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

21

SSP-Variances and Vulnerabilities

SSP-Variances and Vulnerabilities

Description of approved variances from protection measures Attach documentation

Documentation of any unique threat or vulnerabilities to system Document if none exists

Description of approved variances from protection measures Attach documentation

Documentation of any unique threat or vulnerabilities to system Document if none exists

Page 22: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

22

SSP-Might Also Include

MOU for connections to separately accredited networks & systems

Special purpose type systems embedded systems

Other contractual issues

MOU for connections to separately accredited networks & systems

Special purpose type systems embedded systems

Other contractual issues

Page 23: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

23

Audit RecordsAudit Records Who fills out what?

ISSOs & Users What logs are required? - Manual

Maintenance Hardware & Software

Upgrade/Downgrade Sanitization Weekly Audit Log

Custodian Seal Log (If Applicable) Receipt/Dispatch (If Applicable)

Who fills out what? ISSOs & Users

What logs are required? - Manual Maintenance

Hardware & Software Upgrade/Downgrade Sanitization Weekly Audit Log

Custodian Seal Log (If Applicable) Receipt/Dispatch (If Applicable)

Page 24: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

24

What logs are required - Automated if technically capable

Successful and unsuccessful logons and logoffs Unsuccessful accesses to security-relevant objects

and directories, including: creation open modification and deletion

Changes in user authenticators, i.e., passwords Denial of system access resulting from an excessive

number of unsuccessful logon attempts. If not technically capable, the Authorized Users list

will be retained as an audit record

What logs are required - Automated if technically capable

Successful and unsuccessful logons and logoffs Unsuccessful accesses to security-relevant objects

and directories, including: creation open modification and deletion

Changes in user authenticators, i.e., passwords Denial of system access resulting from an excessive

number of unsuccessful logon attempts. If not technically capable, the Authorized Users list

will be retained as an audit record

Audit Records - cont’dAudit Records - cont’d

Page 25: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

25

Re-Accreditation &Protection MeasuresRe-Accreditation &

Protection Measures Re-Accreditation

Every Three Years Major Changes

Protection Measures unique Identifier individual User Ids and Authentication

passwords

Re-Accreditation Every Three Years Major Changes

Protection Measures unique Identifier individual User Ids and Authentication

passwords

Page 26: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

26

PasswordsPasswords

Minimum 8 Characters

Classified to the highest level of the system

Changed at least every 180 days

Changed when compromised

Automated generation when possible

Minimum 8 Characters

Classified to the highest level of the system

Changed at least every 180 days

Changed when compromised

Automated generation when possible

Page 27: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

27

DoD Warning BannerDoD Warning Banner Required Positive User Action Prominently displayed

Required Positive User Action Prominently displayed

DoD Warning BannerUse of this or any other DoD interest computer system constitutes consent to monitoring at all times.

This is a DoD interest computer system. All DoD interest computer systems and related equipmentare intended for the communication, transmission, processing, and storage of official U.S.Government or other authorized information only. All DoD interest computer systems are subject tomonitoring at all times to ensure proper functioning of equipment and systems including securitydevices and systems, to prevent unauthorized use and violations of statutes and security regulations,to deter criminal activity, and for other similar purposes. Any user of a DoD interest computer systemshould be aware that any information placed in the system is subject to monitoring and is not subjectto any expectation of privacy.

If monitoring of this or any other DoD interest computer system reveals possible evidence of violationof criminal statutes, this evidence and any other related information, including identificationinformation about the user, may be provided to law enforcement officials. If monitoring of this or anyother DoD interest computer systems reveals violations of security regulations or unauthorized use,employees who violate security regulations or make unauthorized use of DoD interest computersystems are subject to appropriate disciplinary action.

Use of this or any other DoD interest computer system constitutes consent to monitoring at all times.

Page 28: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

28

Login AttemptsLogin Attempts

Maximum of 5 attempts

Lockout after X minutes SSP specific - DSS recommends 30

minutes

System Administrator resets account or account disabled for X minutes SSP specific - DSS recommends 30

minutes

Maximum of 5 attempts

Lockout after X minutes SSP specific - DSS recommends 30

minutes

System Administrator resets account or account disabled for X minutes SSP specific - DSS recommends 30

minutes

Page 29: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

29

Clearing and SanitizationClearing and Sanitization

Hard drives May be overwritten or

destroyed CPUs

Remove power for one minute

Printers Print one page (font

test) then power down

Hard drives May be overwritten or

destroyed CPUs

Remove power for one minute

Printers Print one page (font

test) then power down

Page 30: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

Clearing

Removal of data from an IS, its storage devices and other peripheral devices with storage capacity, in such a way that the data may not be reconstructed using normal system capabilities (i.e., keyboard strokes).

DCID 6/3

Removal of data from an IS, its storage devices and other peripheral devices with storage capacity, in such a way that the data may not be reconstructed using normal system capabilities (i.e., keyboard strokes).

DCID 6/3

Page 31: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

Sanitization

The process of removing information from media or equipment such thatdata recovery using any known technique or analysis is prevented, as well as the removal of all classified labels and markings.

DCID 6/3

The process of removing information from media or equipment such thatdata recovery using any known technique or analysis is prevented, as well as the removal of all classified labels and markings.

DCID 6/3

Page 32: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

32

Configuration Management Plan

Configuration Management Plan

Formal change control procedures for security-relevant hardware and software

Management of all documentation

Implement, test and

verify CM plan

Formal change control procedures for security-relevant hardware and software

Management of all documentation

Implement, test and

verify CM plan

Page 33: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

33

CM Plan Documents:CM Plan Documents: Procedures to identify and

document type, model and brand of IS hardware

Procedures to identify and document product names and version or release numbers and location of security relevant software

System connectivity

Procedures to identify and document type, model and brand of IS hardware

Procedures to identify and document product names and version or release numbers and location of security relevant software

System connectivity8-3118-311ISL Q-45ISL Q-45

Page 34: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

34

Periods ProcessingPeriods Processing

Separate Sessions

Different Classification

Levels

Different Need-To-Know

Removable Media for each processing session

Separate Sessions

Different Classification

Levels

Different Need-To-Know

Removable Media for each processing session

Page 35: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

Summary

Principals of Computing Security

System Security Plan Purpose Contents

NISPOM = What SSP = How

Principals of Computing Security

System Security Plan Purpose Contents

NISPOM = What SSP = How SSP

SSP

Page 36: 1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.

36