+------------------------------------------------------+
           |                                                      |
           |                                                      |
           |                                                      |
           |            MICROCOMPUTER SECURITY SURVEY             |
           |                                                      |
           |                                                      |
           |                         AND                          |
           |                                                      |
           |                                                      |
           |       MICROCOMPUTER BASELINE SECURITY CONTROLS       |
           |              RISK ANALYSIS ALTERNATIVE               |
           |                                                      |
           |                                                      |
           |                                                      |
           |                                                      |
           +------------------------------------------------------+












                                  July 1991




                                 Prepared by:
                Naval Computer and Telecommunications Station
                        Security and Standards Branch
                       Naval Air Station, Jacksonville
                         Jacksonville, Florida 32212


























                           INTENTIONALLY LEFT BLANK



                                  REFERENCES



     a. DoD Directive 5200.28, Security Requirements for Automated
        Information Systems (AISs)

     b. SECNAVINST 5211.5, Personnel Privacy and Rights of Individuals
        Regarding Records Pertaining to Themselves

     c. SECNAVINST 5239.2, Department of the Navy Automated Information
        (AIS) Security Program

     d. SECNAVINST 5870.5, Permission to Copy Materials Subject To
        Copyright

     e. SECNAVINST 7510.9, Command Management Economy, Efficiency and
        Review

     f. OPNAVINST 5000.52, Command Evaluation Program

     g. OPNAVINST 5510.1H, Department of the Navy Information and
        Personnel Security Program Regulation

     h. OPNAVINST C5510.93E, Navy Implementation of National Policy on
        Control of Compromising Emanations (U)

     i. OPNAVINST 5530.14B, Department of the Navy Physical Security and
        Loss Prevention

     j. NRL Report 8897, An Approach to Determining Computer Security
        Requirements for Navy Systems

     k. Public Law 100-235, Computer Security Act of 1987















                                      i


























                           INTENTIONALLY LEFT BLANK



                                   PREFACE



There is an increasing trend towards developing "baseline" approaches to manage
the risks of automated information system environments.  This concept proposes
upfront implementation of security controls for the most common and already
recognized vulnerabilities of an operating environment.  The process may
eliminate the need to conduct extensive formalized quantitative risk analyses to
cost justify protective measures that may be required.

This document, consisting of two parts, was designed and developed as a tool to
collect general system information and address the operating risk of a
noncomplex microcomputer operating environment.  It extracts the pertinent
security related information from the instructions and directives in references
(a) through (k) to present a composite approach toward analyzing level of risk.

Part I.   Part I is a survey form and uses a fill in the blank approach to
gather information about the assets, their processing capabilities,
configuration, class of data, mode of operation, system required trust level,
and other operating parameters.

Part II.  Part II introduces a "baseline" approach to identifying and managing
risk.  This approach is recommended for use as a risk analysis alternative in
low risk environments (e.g., systems processing unclassified, sensitive
unclassified, or minimal classified information).  The baseline security control
concept assumes a basic set of controls, which have been assessed by management,
are justifiable for achieving a reasonably secure microcomputer environment.
The security control areas identified in Part II are considered fundamental to
establishing a baseline of security for a microcomputer operating environment.
These controls are designed to counter the threats of human errors, accidents,
dishonest and disgruntled employees, and the threats associated with physical
and environmental controls.

The "baseline" approach for managing risk, as presented in this document, has
been approved for those activities operating microcomputers in a noncomplex
environment within the Naval Computer and Telecommunications Command's
(NAVCOMTELCOM) Area of Primary Responsibility (APR).

Regardless of the protective measures in place, the key element to security in
any microcomputer environment is the user and how well the user follows
established computer security policies and guidelines.  It can not be
overemphasized that users are the ones who help to ensure that the environment
is as secure as necessary.





                                      ii


























                           INTENTIONALLY LEFT BLANK
















                                    PART I


                        MICROCOMPUTER SECURITY SURVEY




                                    PART I
                                  PROCEDURES

  The procedures identified below are used to complete the microcomputer
security survey information in Part I of the document.  It is recommended the
Automatic Data Processing Systems Security Officer (ADPSSO) assigned to the
system gather and record the information.


SECTION I:  General AIS Information

  This section documents general information about the microcomputer.  To
complete the form, fill in the blank spaces or check the applicable choice(s)
provided as follows:

Item 1.  Check the appropriate configuration of the system.  If the system is
interfaced with another system/network and also used in a stand-alone mode,
check both the interfaced configuration and the stand-alone unit areas as
provided.

Item 2.  Enter the building name/number and room number, if applicable.
Indicate if the system is located in government or contractor space.

Item 3.  Check the appropriate ownership and type of personnel who operate the
system.

Item 4.  Enter a check in single user system if the system is assigned to one
individual, or check shared system if the system is assigned to and used by more
than one individual.

Item 5.  Define the classes of information processed on the system and modes of
operation.  List the percent of processing time for each class of information
listed.  The total must equate to 100%.

Item 6.  List the names of all individuals assigned system responsibilities,
their code, and telephone number.

Item 7.  List all components, peripherals, communications processors, encryption
devices, remote devices and remote interfaces for the system.  Include the model
number, serial number, and today's replacement cost.

Item 8.  List the operating system and version level installed on the system
(e.g., MS-DOS, Version 3.30) and today's replacement cost.  Check the
appropriate software ownership.

Item 9.  List the commercial software and version level used on the system
(e.g., Word Perfect, Version 5.1; dBase III, Version 1.1; Freelance Plus,
Version 3.01; Novell NetWare 386, Version 3.0), appropriate ownership, software
serial number, and today's replacement cost.


Item 10. List all customized application software used on the system (i.e.,
routines and programs developed in-house or by an outside source which contain
specific tasks/applications), appropriate ownership, serial number, and today's
replacement cost.

Item 11. Enter all letters of certification required for the hardware or
software, date, and certification serial number.  (Developing agencies must
certify safeguards exist for all proposed or existing AISs, operating systems,
and application software used for multisite distribution to permit accreditation
with minimal effort by the end user commands.)  Include in this area TEMPEST
letters of certification, if applicable.

Item 12. Enter the total summary value of the equipment, software, and data at
today's replacement cost.  The value of the data must include disclosure value.
The following guidelines are provided for determining the minimum impact of
disclosure of sensitive data.  These values are based on a per incident of data
file disclosure, but do not waive the need for the data owner to determine an
accurate estimation of data disclosure.


                     GUIDELINES FOR IMPACT OF DISCLOSURE
                              OF SENSITIVE DATA

       For Official Use Only                            $1,000
       Privacy Act or Confidential                     $10,000
       Secret                                         $100,000
       Top Secret                                   $1,000,000


Item 13. Identify and describe the mission of the microcomputer.  Under (a)
enter the primary functions or applications processed on the system, and under
(b) identify the primary functions or applications processed via an interface
with another system or network.

Item 14. Refer to NRL Report 8897 to determine and enter the system's Required
Operational Level of Trust (ROTEL).  For a given system, five factors must be
evaluated to assess the system's overall risk.  Based on the risk, the ROTEL can
then be determined.  The Navy Research Laboratory (NRL) Report 8897 process is
used to evaluate each risk factor.  The first three factors (local processing
capability, communication path, and user capability) focus upon the system's
configuration and hardware to determine the System Risk.  Risk factors four and
five (user clearance and data classification) assess the risk due to the mix of
users and information to determine the Data Exposure.  System Risk and Data
Exposure results yield level of trust, referred to as the ROTEL value.

The NRL Report 8897, titled "An Approach to Determining Computer Security
Requirements for Navy Systems," may be ordered from the National Technical
Information Service (NTIS) for a charge of $11.00, plus a $3.00 handling charge.

Written requests should reference #ADA155750 and be addressed to:

       National Technical Information Service
       5285 Port Royal Road
       Springfield, VA 22161

       Telephone: (703) 487-4650

Example of determining the ROTEL:   System - Zenith 248 Microcomputer

  Using the NRL Report 8897 process, the five risk factors are:

  Risk Factor 1 - Local Processing Capability Factor is Level 3.
  Risk Factor 2 - Communication Path Factor is Level 3.
  Risk Factor 3 - User Capability Factor is Level 3.

    Each of these factors is applied as follows:

    Local Processing Capability    =  3      Where the two intersect (on
    Communication Path             =  3      NRL Report 8897 Table 1)  =   6

    User Capability                =  3

  Where the 6 and 3 intersect (on NRL Report 8897 Table 2) = 9 for SYSTEM RISK

  Risk Factor 4 (Rmin) - User Clearance Factor is Level 1.
  Risk Factor 5 (Rmax) - Data Classification Factor is Level 1.

    These two factors are applied as follows:

    Risk Factor 5 (Rmax) - Risk Factor 4 (Rmin) =  Data Exposure*

* If Risk Factor 4 is greater than or equal to Risk Factor 5 data exposure
 equals 1 (if categories of data are on the system).  Otherwise, the data
 exposure equals 0.

    For this example:
                  (Risk Factor 5)   (Risk Factor 4)
                      Rmax                 Rmin
                        1         -          1     =   0  for  DATA EXPOSURE

  Refer to NRL Report 8897 Table 3.  Use the intersection of the System Risk
  results (9) and the Data Exposure results (0) to determine the ROTEL value.

    For this example:

    Security features providing C2 security trust level are required for the
    Zenith 248.


SECTION II.  ACCREDITATION DOCUMENTATION

  This section defines the system's current operating status and is to be
completed as follows:

Item 1.  If the system is operating under an existing accreditation statement,
complete paragraph (a).  If the system is operating under an interim authority,
complete paragraph (b).  Provide the following information as applicable:

   Paragraph a.  Identify the class(es) of data the system processes and mode
   of operation.  Enter the date of accreditation and the name of the
   individual who granted system accreditation. (Attach a copy of the Statement
   of Accreditation.)

   Paragraph b.  Identify the class(es) of data the system is authorized to
   process and the mode of operation.  Enter the date the IATO was issued,
   expiration date, and the name of the individual who granted the IATO.
   (Attach a copy of the IATO.)

























                           INTENTIONALLY LEFT BLANK


                        MICROCOMPUTER SECURITY SURVEY

SECTION I.   GENERAL INFORMATION

1.  System Identification:  (Check all that apply.)

   (  )  Microcomputer Used As Stand-alone Unit
   (  )  Microcomputer Networked Unit (Internal LAN     External Network    )
   (  )  Microcomputer Used To Access System(s) External To The Department
   (  )  Other

2.  Microcomputer Location:  Building:                     Room:

   (  ) Government Space                   (  ) Contractor Space

3.  System/Hardware is:

   (  ) Government Owned/Operated          (  ) Contractor Owned/Operated
   (  ) Government Owned/Contractor        (  ) Contractor Owned/Government
                         Operated                                Operated
   (  ) Privately Owned/Operated           (  ) Other

4.  The microcomputer is a:   (  ) Single User System     (  ) Shared System

5.  List the classes of information processed and modes of operation.

                                 Percent of
                                 Processing              Modes of
Classes of Information            Time                    Operation *

Classified
 National Cryptologic
 SCI
 SIOP-ESI
 Top Secret
 Secret
 Confidential

Unclassified (Sensitive)
 Privacy Act                                          Limited Access
 For Official Use Only                                Limited Access
 Financial                                            Limited Access
 Sensitive Management                                 Limited Access
 Proprietary                                          Limited Access
 Privileged                                           Limited Access

Unclassified (Not Sensitive)                           Limited Access

             TOTAL                   100%

*   Applicable Modes of Operation For Classified Processing:  Partitioned,
   System High, Dedicated, and Multilevel.

                        MICROCOMPUTER SECURITY SURVEY

6.  System Responsibilities:

                                    Name              Code         Phone

   a.  DAA
   b.  ADPSO
   c.  ADPSSO
   d.  NSO
   e.  Other
   f.  Assigned User(s)




7.  Equipment Description:  (List all components, peripherals, communications
   processors, encryption devices, remote devices, and remote interfaces for
   the system.)

   Nomenclature/Manufacturer       Model #      Serial #          Cost













8.  List operating system, version level, and cost:





   (  ) Government Owned (GO)                  (  ) Privately Owned (PO)
   (  ) Contractor Owned (CO)

9.  List commercially used software:

   Software/Package Name         (GO/CO/PO)    Serial Number      Cost









                        MICROCOMPUTER SECURITY SURVEY

10.  List Application Software:  (Customized for an application.)

        Application Name         (GO/CO/PO)    Serial Number        Cost








11.  List ALL letters of certification required for hardware and software.
    (Developing agencies must certify safeguards exist for all proposed or
    existing AISs, operating systems, and applications software used for
    multisite distribution to permit accreditation with minimal effort by the
    end user commands.)

      SOFTWARE & HARDWARE                     DATE & SERIAL NUMBER OF
              TYPE                            LETTER OF CERTIFICATION






12.  Total Value of System:  (Specify purchase price or equivalent)

    Total System Value: $                 (Sum of equipment, software, and
    data)

    (Equipment:  $          Software:  $          Data:  $          )

13.  Mission Relatedness:

    A.  Identify Primary function(s) of the Microcomputer.  (Describe the
        primary applications processed on the system):







    B.  Identify Primary function(s) processed via any Network and/or
        Communication Links, or Distributed Systems.








                        MICROCOMPUTER SECURITY SURVEY


14.  System Security Trust Level Information:

    The Required Operational Trust Evaluation Level (ROTEL) for the operating
    environment of this microcomputer is:  (Circle one)

    Most      A1     B3      B2      B1      C2*      C1      D      Least
    Secure  <----------------------------------------------------->  Secure

    *    SECNAVINST 5239.2, dated 15 Nov 89, requires Class C2 functionality
         (Controlled Access Protection) computer based security features as
         defined in DoD 5200.28-STD be implemented by 31 Dec 92.



                        MICROCOMPUTER SECURITY SURVEY


SECTION II.   ACCREDITATION DOCUMENTATION


   1.  A current accreditation statement is in existence for this system.

       (Check One)

            Yes                  No


       If Yes, complete paragraph (a).  If No, complete paragraph (b).


       a.  Operating under an accreditation statement for processing/handling

                                                                         data

           in

           security mode of operation.



           Accreditation granted by                                       ,

           dated                   .  (Attach a copy of Statement of

           Accreditation letter.)




       b.  This system is operating under interim authority for processing

                                                             data in

                                                   security mode of operation.



           Interim authority granted by

           dated                      .  Expires                       .

           (Attach a copy of Interim Authority To Operate)

























                           INTENTIONALLY LEFT BLANK

















                                   PART II


                MICROCOMPUTER BASELINE SECURITY CONTROL AREAS
                          RISK ANALYSIS ALTERNATIVE

                                   PART II
                                  PROCEDURES


  The procedures identified below are to be used as a risk analysis alternative
to analyze the risk level of a microcomputer operating environment.  Part II
consists of three sections.  It is recommended the form be completed by the
ADPSSO and reviewed by the Automatic Data Processing Security Officer (ADPSO).


SECTION I.  SECURITY CONTROL AREAS

  This section contains a basic set of security control areas which are
considered fundamental to establishing a secure microcomputer operating
environment.  Depending on the inherent risk that a given system displays, these
baseline controls may not be all inclusive.  If in completing this section, it
is determined additional security control areas are required to reduce the
operational risk, these additional security control areas must be identified and
documented.  Complete this section as follows:

STEP 1.  Request the Designated Approving Authority (DAA) assess the security
control areas and approve the use of this baseline approach to quantify the
system's level of risk.

STEP 2.  Respond to each security control area with a "yes" or "no" answer.

   a.  If the response is "yes," check the applicable safeguards listed that
provide protection to support the security control area requirement.  If
additional safeguards are implemented, list them in the comments section.

   b.  If the response is "no," explain, in the comments section, what security
deficiencies are evident in the operating environment.

STEP 3.  Review the Safeguard Scoring Rationale and assign a score of 1, 2, or
15 for each security control area.  A score must be assigned to each security
control area.  If the security control area does not apply to the operating
environment (e.g., TEMPEST Control), assign a score of 1 to indicate a low risk.
The score is determined by weighing the implemented safeguards that support the
baseline security control area against the requirements of the operating
environment.


SECTION II.  ANALYSIS OF RISK

  This section is used to total the risk rating score for each security control
area, assign a risk category, and provide an overall assessment of the operating
environment.  Complete this section as follows:

STEP 1.  Review the responses provided for each security control area and enter
the appropriate score in paragraph A., Risk Rating Score, in the score column.
Sum the scores of each security control area and enter the total points on the
total line provided in paragraph A.


STEP 2.  Review the Risk Category Legend and assign the appropriate Risk
Category, (Low, Moderate, or High) based on the total scoring points of
paragraph A and the applicable scoring range identified in paragraph B.

STEP 3.  Based upon your knowledge of the operating environment and any
historical data available to you, provide your overall assessment in paragraph C
of the AIS operation by responding with a low, moderate, or high risk level.  If
your overall assessment differs from the risk category assigned in paragraph B,
explain the differences in the space provided.


SECTION III.  MICROCOMPUTER SURVEY AND SECURITY CONTROL AREA COMPLETION DATA

  This section records the name of the individual who completed Parts 1 and 2
and provides recommendations (to be checked as appropriate) based on the risk
level identified.  Complete this section as follows:

STEP 1.  List the name of the individual completing the form, completion date,
title/position, location, code, and telephone number.  If more than one
individual completed the form, list all names.

STEP 2.  Based on the data collected and recorded on the document regarding the
system's operating environment, any historical data available, and the expertise
of the individual(s) completing the form, evaluate the operating environment and
check the applicable recommendation.

STEP 3.  Sign the form in the space provided.  If more than one individual
completed the form, their signature(s) is/are also required.

STEP 4.  Enter the name, title/position, and telephone number of the individual
who reviewed the form.  Sign and date the form in the space provided.

























                           INTENTIONALLY LEFT BLANK


                   MICROCOMPUTER BASELINE SECURITY CONTROLS
                          RISK ANALYSIS ALTERNATIVE


SECTION I:  SECURITY CONTROL AREAS

1. SECURITY CONTROL AREA:   System Access Control  (Protective measures to ensure the
identity of each user authorized access to the system is positively established prior
to granting access.)

  Access to the system is controlled to ensure each person having access can be
  identified and held accountable for their actions.

  Yes ______      No ______  (No answers must be explained.)

  Safeguards implemented include:  (Check applicable safeguards.)
  __ An Access Control Policy is in place and enforced.
  __ Warning against unauthorized access is displayed.
  __ Access control software package is used to provide system access control.
  __ Access control hardware/software package is used to provide system access
     control.
  __ Access control token/authentication devices used to provide system access
     control.
  __ Authorized user list posted.
  __ Individual user IDs/passwords assigned.
  __ Passwords are removed when employee terminates.
  __ System is not left on and unattended.
  __ Audit Trail is in use and regularly monitored.
  __ System is equipped with limited log on attempts
  __ Unauthorized system access attempts reported.
  __ Additional safeguards implemented (list below in comments section).

Comments:






Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.


2. SECURITY CONTROL AREA:   Data Access Control  (Data access controls ensures only
authorized users having a need to know have access to, knowledge of, or possession of
information processed and stored on a system.)

  Data files are identified and protected in accordance with appropriate security
  classification and procedural guidelines.

  Yes ______      No ______  (No answers must be explained.)

  Safeguards implemented include:  (Check applicable safeguards.)
  __ Least privilege principle followed limiting data access to authorized users.
  __ Critical and sensitive data files are identified and protected.
  __ Storage of sensitive data on the hard disk is prohibited.
  __ Procedures to ensure data integrity have been established to prevent accidental
     or malicious modification, unauthorized disclosure or destruction of data.
  __ Color coded labels are used to comply with Information Security Oversight
     Office standard color code label requirements.
  __ Application programs written with feature that permits only authorized
     users access to data.
  __ Removable media only used and properly secured.
  __ Output products properly marked.
  __ Backup copies of critical data files created regularly.
  __ An off-site area is used for backup storage of critical data.
  __ Password control procedures are implemented.
  __ Passwords are protected and changed frequently (at least monthly).
  __ Employees log off before leaving system unattended.
  __ Personnel periodically informed of their information security
     responsibilities.
  __ Physical access controls to the microcomputer area are enforced.
  __ Sensitive data files are encrypted when not actually used.
  __ Additional safeguards implemented (list below in comments section).

Comments:





Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.

3. SECURITY CONTROL AREA:   Software Control   (Software control ensures software
integrity is maintained and only authorized software is used on the system.)

  Controls are in place to ensure integrity and protection of all software used on
  the system.

  Yes ______      No ______  (No answers must be explained.)

  Safeguards implemented include:  (Check applicable safeguards.)
  __ Proprietary software procedures implemented and enforced to ensure
     compliance with copyright/license laws.
  __ All personnel are made aware of the command's policy on reproducing
     copyright software.
  __ Use of unapproved software from any source is prohibited.
  __ All new software is checked for possible infection before installation.
  __ Original software is stored in a secure location outside the micro
     area.
  __ Backup copies are appropriately maintained.
  __ An inventory is maintained of all software assigned to the system.
  __ Documentation available for application software developed in-house.
  __ Configuration control procedures have been established to control
     software modifications.
  __ Virus detection software is available to detect malicious code.
  __ Virus detection software is used on a regular basis to detect malicious
     code.
  __ Additional safeguards implemented (list below in comments section).

Comments:






Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.




4. SECURITY CONTROL AREA:   Physical Security Control   (Physical security controls
safeguard personnel, prevent unauthorized access to sensitive or critical areas, and
provide protection against espionage, sabotage, damage and theft.)

  The microcomputer is located in an area with good physical access controls.

  Yes ______      No ______  (No answers must be explained.)

  Safeguards implemented include:  (Check applicable safeguards.)
  __ Locks on door(s) to microcomputer area.
  __ Building secured after normal working hours.
  __ Equipment cover lock or equipment lockdown devices utilized.
  __ Power switch lock installed on system.
  __ Individual badge system in use.
  __ Escort and visitor control procedures implemented.
  __ Security guards on duty.
  __ Electronic alarms and monitoring devices used.
  __ Personal belongings searched on entering and leaving the building.
  __ Strangers entering the micro area are challenged.
  __ Warning signs posted indicating boundaries of restricted areas.
  __ Closed circuit television system (CCTV) installed.
  __ Additional safeguards implemented (list in comments section).

Comments:






Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.



5. SECURITY CONTROL AREA:   Environmental Controls   (Protection measures to
prevent, detect and minimize the effects of hazards such as fire, water damage,
air contaminants, excess heat and electricity brownouts.)

  Environmental hazards to which the microcomputer is exposed are minimized.

  Yes ______      No ______  (No answers must be explained.)

  Safeguards implemented include:  (Check applicable safeguards.)
  __ Functioning fire detection system or smoke alarm installed in
     microcomputer area.
  __ Hand held Halon fire extinguishers are readily available.
  __ Fire extinguishers are regularly inspected.
  __ Sprinkler system installed.
  __ Emergency exits are clearly marked.
  __ Periodic fire drills conducted.
  __ Personnel trained in local fire fighting policy.
  __ Micro connected to isolated power source.
  __ Micro and peripherals plugged into surge protector with three prong
     outlets, connected to a power director device, or (if micro is subject to
     frequent power outages) a battery backup/UPS is installed.
  __ Adequate primary lighting provided.
  __ Emergency lighting provided.
  __ Drastic changes in humidity/temperature avoided.
  __ Micro located in an area with good air circulation (vents not blocked/air
     flow unrestricted).
  __ Routine cleaning schedule adhered to.
  __ Micro kept clear of paper stacks and other flammable materials.
  __ Smoking, eating and drinking is prohibited in and around the micro area.
  __ Plastic sheeting available to protect micro from dust and water damage.
  __ Static electricity is controlled.
  __ Users held responsible for maintaining a clean working environment.
  __ Additional safeguards implemented (list in comments section).

Comments:





Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.

6. SECURITY CONTROL AREA:   Media Handling Controls   (Measures to protect and
secure storage media, i.e., source documents, diskettes, hard disks, printouts,
tapes, cartridges.)

  Media handling procedures have been established and are enforced ensuring all
  media is handled, stored and backed up properly.

  Yes ______      No ______  (No answers must be explained.)

  Safeguards implemented include:  (Check applicable safeguards.)
  __ Diskettes are protected from dust and dirt, cigarette smoke and ashes,
     liquid spills, and food crumbs.
  __ Care is taken to never touch the recording surface of the diskette.
  __ Diskettes are protected from all sources of magnetism.
  __ When not in use, diskettes are kept in their protective jackets.
  __ A felt tip pen is used to complete label prior to affixing to diskette.
  __ Floppy diskettes are protected from bending and similar damage.
  __ Diskettes are not subjected to intense heat or intense cold.
  __ Employees are instructed to never insert/remove a diskette when the drive
     light is on to avoid read/write head damage.
  __ Diskettes are placed in their protective jackets and stored vertically
     inside an appropriate container.
  __ All magnetic media is externally marked with appropriate markings.
  __ When several files are stored on one diskette, a printout of the
     diskette's directory is taped to the jacket for easy referencing.
  __ Storage boxes are kept away from all sources of electromagnetic
     interference.
  __ Procedures for backing up floppy diskettes and hard disks have been
     developed and routinely followed.
  __ Master diskettes are protected by write/protect tabs.
  __ The SHIP or PARK command is executed when storing/transporting hard disks.
  __ Appropriate procedures are followed for disposing of storage media.
  __ NSA approved degaussing equipment utilized.
  __ Additional safeguards implemented (list in comments section).

Comments:





Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.

7. SECURITY CONTROL AREA:   Personnel Security Control   (Personnel security
controls ensure an employee's level of trustworthiness is commensurate with
their duties, all personnel are informed of information security requirements
including their individual responsibilities, and are made aware of ethical
computer behavior practices.)

  Appropriate security clearance procedures are followed and all personnel have
  a current working knowledge of good computer security practices, information
  security procedures and understand their individual computer security
  responsibilities.

  Yes ______      No ______  (No answers must be explained.)

  Safeguards implemented include:  (Check applicable safeguards.)
  __  Personnel security policies require screening of all individuals
      (including contractors) participating in the design, operation, and
      maintenance of the system or having access to the data in the system,
      commensurate with the sensitivity of information being handled.
  __  New employees are indoctrinated to their ethical responsibilities.
  __  Personnel dealing with sensitive information are provided periodic
      security briefings.
  __  Personnel sign a statement that they understand their information
      security responsibilities.
  __  Employees are aware of the command's policy on use of personal resources
      to perform government work.
  __  Personnel security policies include checkout procedures that deny access
      to the computer system to departing employees.
  __  Standard debriefing procedures are followed.
  __  Additional safeguards implemented (list below in comments section).

Comments:






Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.


8. SECURITY CONTROL AREA:   Contingency Planning   (Contingency planning
consists of those activities undertaken in the anticipation of potential events
which could cause serious adverse effects interrupting normal operations.)

  A contingency plan has been developed with documented planned action steps to
  be taken before, during and after an emergency condition.

  Yes ______      No ______  (No answers must be explained.)

  Safeguards implemented include:  (Check applicable safeguards.)
  __ Contingency plan prioritizes work based on criticality of functional
     applications.
  __ Backup copies of critical files created regularly.
  __ Backup copies of critical files, software packages and original
     application programs are stored off-site and can be retrieved within a
     reasonable time frame.
  __ When the system is not available, loaner equipment is used.
  __ Spare equipment is available for backup operations.
  __ Backup operations include an agreement with another facility.
  __ During contingency situations, critical processing is performed manually.
  __ All personnel involved have been informed of their contingency planning
     responsibilities.
  __ A copy of the contingency plan is stored off-site.
  __ The contingency plan is tested and evaluated on an annual basis.
  __ The contingency plan is tested under realistic operational conditions.
  __ Additional safeguards implemented (list below in comments section).

Comments:






Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.


9. SECURITY CONTROL AREA:   Computer Security Training   (Training for all
employees designed to heighten and maintain a level of security awareness
throughout the command to ensure employees understand the criticality of
protecting systems and data.)

  Mandatory periodic training in computer security awareness and accepted
  computer security practices, as required by the Computer Security Act of
  1987, is provided all employees involved with the management, use, or
  operation of the system.

  Yes ______      No ______  (No answers must be explained.)

  Safeguards implemented include:  (Check applicable safeguards.)
  __ An activity Security Training Program has been implemented which provides
     formal and informal training for all employees.
  __ New personnel are briefed on computer security awareness.
  __ Computer security films are available and shown to all employees on a
     scheduled basis.
  __ Posters to enhance computer security awareness are posted in heavily
     trafficked areas.
  __ Employees are debriefed on AIS security policies upon departing.
  __ Additional safeguards implemented (list below in comments section).

Comments:






Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.


10. SECURITY CONTROL AREA:   Administrative Controls  (Administrative controls
consist of local policies and guidelines for protecting systems and ensuring
compliance with AIS Security Program requirements.)

  Detailed Standard Operating Procedures (SOPs) and documentation are provided
  to establish local policy/guidance and to ensure compliance with program
  objectives.

  Yes ______      No ______  (No answers must be explained.)

  Safeguards implemented include:  (Check applicable safeguards.)
  __ Standard Operating Procedures establishing local computer security
     policies are readily available and maintained in a current status.
  __ Acquisition and procurement documentation is reviewed by the ADPSO for
     compliance with Life Cycle Management program requirements.
  __ Security violation procedures have been established and distributed to
     all personnel.
  __ Procedures are established and enforced to safeguard software and files
     used to provide internal security controls, passwords or audit trails.
  __ The activity has established a policy for use of privately owned resources
     to perform government work.
  __ Procedural guidance for reducing the risk of malicious code has been
     established and made available to applicable personnel.
  __ Periodic reviews are performed on the system.
  __ Additional safeguards implemented (list below in comments section).

Comments:






Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.

11. SECURITY CONTROL AREA:   Class C2 Security   (Class C2 security provides for
controlled access protection for systems processing classified and sensitive
unclassified information.  Class C2 security and accountability features are
discretionary access control, object reuse, identification and authentication,
and audit trail capability.)

  The microcomputer is protected by hardware, software, and security operating
  procedures to provide reasonable security until such time as effective C2
  Class protection become available for microcomputers.

  Yes ______      No ______  (No answers must be explained.)

  Safeguards implemented include:  (Check applicable safeguards.)
  __ Access to information controlled on an individual basis to ensure only
     having a need-to-know are granted access.
  __ Individuals identified and authenticated through User ID and password.
  __ A security software package is used to provide C2 functionality (i.e.,
     discretionary access control, object reuse, identification and
     authentication, and audit trail capability).
  __ Overwrite routines are used to clear internal memory and registers.
  __ The micro is turned off to clear memory before reuse by another user.
  __ Application programs perform a "zero out" function prior to program
     termination.
  __ A manual audit trail is maintained to record each event (date and time of
     the event, user, type of event).
  __ The operating system controls access to all system resources.
  __ C2 assurance and documentation requirements (i.e., system architecture,
     system integrity, security testing, security features user guide, trusted
     facility manual, test and design documentation) are met through in-house
     Standard Operating Procedures (SOPs).
  __ Additional safeguards implemented (list below in comments section).

Comments:






Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.

Note:  This page must be completed if the system is operating in other than a
      stand-alone mode.

12. SECURITY CONTROL AREA:   Communications Security Control   (Measures to
protect information transmitted over communication lines to ensure the data is
not disclosed or compromised.)

  Communications lines and links for systems operating in other than a
  stand-alone mode are secure commensurate with the class of data transmitted.

  Yes ______      No ______  (No answers must be explained.)

  Safeguards implemented include:  (Check applicable safeguards.)
  __ Communication wiring contained within approved conduits.
  __ Telephone junction boxes/connection points are within controlled spaces.
  __ Dedicated transmission lines are utilized.
  __ Security modems are installed.
  __ Encryption devices are used to protect confidentiality of information.
  __ Host-User Agreements in place prior to connectivity.
  __ All access attempts are logged.
  __ Invalid access attempts are reported.
  __ Password management program established to assign, delete, and ensure
     users change passwords according to policy.
  __ Dial-up access connections are protected (i.e., dial-up access restricted
     to authorized users, dial-up telephone numbers restricted, dial-up lines
     are monitored, dial back employed once connection has been made).
  __ Remote Security Operating Procedures in place and enforced.
  __ Hardware/software configuration changes are controlled.
  __ Communications Control Manager monitors users' security practices.
  __ Audit trail of system activity is regularly reviewed.
  __ Procedures implemented for disconnecting from outside connectivity when
     operating in a stand-alone mode.
  __ Additional safeguards implemented (list below in comments section).

Comments:





Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.

Note:  This page must be completed if the system is processing classified
      information.

13. SECURITY CONTROL AREA:   TEMPEST Control   (Measures to protect against
spurious signals, referred to as electromagnetic emanations, emitted by
computers that can be intercepted and automated information read.)

  The system is in compliance with the TEMPEST requirements of OPNAVINST
  C5510.93.

  Yes ______      No ______  (No answers must be explained.)

  Safeguards implemented include:  (Check applicable safeguards.)
  __ TEMPEST Vulnerability Assessment Request (TVAR) submitted to Commander,
     Naval Investigative Services Command.
  __ Microcomputer TEMPEST approved.
  __ TEMPEST waiver received.
  __ Filters installed on computer power and phone lines.
  __ Protected Distribution System (PDS) installed for processing classified
     data.
  __ PDS approval request submitted.
  __ PDS approval received.
  __ No radar/microwave or power transformers in general area of computer.
  __ Additional safeguards implemented (list below in comments section).

Comments:






Safeguard Scoring Rationale:                                          Score

Low Risk.  System accepted as is.  All safeguard requirements            1
are implemented and are consistently enforced to operate the
system at an acceptable level.

Moderate Risk.  System can be operated under its present condition.      2
All safeguard requirements are implemented and usually enforced to
operate the system at an acceptable level.

High Risk.  System is rejected.  Existing safeguards are inadequate     15
for reducing the probability of loss, or the impact of loss, to an
acceptable level.

SECTION II:  ANALYSIS OF RISK


A.   RISK RATING SCORE  (A score must be assigned to each security control
    area.)

    Security Control Area         Score      Security Control Area     Score

    System Access Control         _____      Contingency Planning       _____
    Data Access Control           _____      Computer Security Training _____
    Software Control              _____      Administrative Controls    _____
    Physical Access Control       _____      Class C2 Security          _____
    Environmental Control         _____      Communications Security    _____
    Media Handling Control        _____      TEMPEST Control            _____
    Personnel Security Control    _____
                                                            Total    ________
_____________________________________________________________________________

B.   RISK CATEGORY

           Scoring Range                     Risk Category*  (Circle One)

             ---13---                              LOW
             14  -  26                           MODERATE
             27  &  Above                          HIGH

    *  Risk Category Legend:

       Low risk.  The system is operating at an acceptable level of risk
       (adequate safeguards are implemented and enforced for all baseline
       security control areas).
       Moderate risk.  The system can be operated under its present condition
       (adequate safeguards are implemented and usually enforced for all
       baseline security areas).
       High risk.  Deficiencies were found in baseline security control areas.
       Interim Authority to Operate (IATO) issued pending implementation of
       required safeguards).
______________________________________________________________________________

C.  OVERALL ASSESSMENT

  1.  Based on your knowledge of the operating environment, and any historical
      data available, provide your assessment of the AIS operation.
      (Circle One)

          Low Risk          Moderate Risk            High Risk

  2.  If your assessment differs from the risk category assigned above,
      explain in the space provided below.





SECTION III.  MICROCOMPUTER SURVEY AND SECURITY CONTROL AREA COMPLETION DATA

    1.  Completed by:

        Name:                                                 Date:

        Title/Position:

           Building:                                          Room:

           Code:                                   Phone:


    2.  Recommendations:  (Check applicable recommendation.)


                Recommend Accreditation.


                Non-Accreditation recommended until such time as the following
                safeguards are implemented:







                Recommend an in-depth quantitative risk analysis be performed
                on the system due to high risk areas in the operating
                environment.


                Other (explain):






                                     Signature:


    3.  Reviewed by:

        Name:                                            Date:

        Title/Position:                               Phone:


                                     Signature:

























                           INTENTIONALLY LEFT BLANK



Downloaded From P-80 International Information Systems 304-744-2253