Dr3140-002

DR3140-002.pdf

Financial Information Security Request Form

DR3140-002

OMB: 0596-0204

Document [pdf]
Download: pdf | pdf
U.S. Department of Agriculture
Washington, D.C. 20250

DEPARTMENTAL REGULATION
SUBJECT: USDA Internet Security Policy

Number:

3140-002

DATE:

March 7, 1995
OOPI: Office of Information Resources

Management, Agency Technical
Services Division

1

PURPOSE

This regulation establishes minimum security requirements for the use of the Internet
network by U. S. Department of Agriculture (USDA). This regulation is not written to
restrict the use of Internet, but to ensure that adequate protection is in place to protect
USDA data from intruders, file tampering, break in, and service disruption.
2

BACKGROUND

In the late 1960s the Department of Defense (DoD) designed and implemented the
ARPAnet network for the exchange of defense industry research information world-wide.
TCP/IP was the protocol developed and UNIX was the platform.
The National Science Foundation (NSF) needed a network also to interconnect their
supercomputers and exchange academic research information so they built their own, but
followed the DoD standards. They called their network NSFNET.
The Internet consists of many, worldwide, independent networks that allow
interconnection and transmission of data across the networks because they follow the
same basic standards and protocols and agreed upon Internet etiquette, " No central
authority." Each user organization pays for its own piece of the network.
Motivated by developments in highspeed networking technology and the National
Research and Education Network (NREN) Program, many organizations and individuals
are looking at the Internet as a means for expanding their research interests and
communications. Consequently, the Internet is now growing faster than any
telecommunications system thus far, including the telephone system.
New users of the Internet may fail to realize, however, that their sites could be at risk to
intruders who use the Internet as a means for attacking systems and causing various
forms of threat. Consequently, new Internet sites are often prime targets for malicious

DR 3140-002

March 7, 1995
activity including break in, file tampering, and service disruptions. Such activity may be
difficult to discover and correct, may be highly embarrassing to the organization, and can
be very costly in terms of lost productivity and compromised data integrity.
All Internet users need to be aware of the high potential for threat from the Internet and
the steps they should take to secure their sites. Many tools and techniques now exist to
provide sites with a higher level of assurance and protection.
USDA agencies should acquire a copy of the "Guide to the USDA Internet." This
document is published by the Office of Information Resources Management. This guide
defines the USDA Internet Access Network. You may acquire this guide by contacting
the Director, Office of Information Resources Management, room 414-W.

3

DEFINITIONS

Definitions relating to this policy may be found in appendix "A".
4

REFERENCES
NIST CSL Bulletin, July 1993, NIST Connecting to the Internet:
Security Considerations
NIST CSL Bulletin, May 1994, NIST Reducing the Risks of
Internet Consideration and use
NIST Publication, Keeping Your Site Comfortably Secure: An
Introduction to Internet Firewalls (Draft) September 1994,
USDA OIRM, DR 3140-1,
Policy Dated March, 1995

USDA IRM Security

USDA OIRM, DR 3300-1,
Telecommunications
(Appendix I, Internet), dated April 8, 1994
USDA OIRM,
Internet
5

Guide to the USDA

ABBREVIATIONS
ARPAnet
Advanced Research Projects
Agency Network
DMZ

Demilitarized Zone

DoD

Department of Defense

FTP

File Transfer Protocol

IRM
Management

Information Resources

2

DR 3140-002

March 7, 1995
ISPM

Information Security Program Manager

LAN

Local Area Network

NIST
Technology

National Institute of Standards and

NSF

National Science Foundation

NFS

Network File System

NREN
Network

National Research and Education

OIRM
Management

Office of Information Resources

OMB

Office of Management and Budget

OSI

Open System Interconnect

TCP/IP Transmission Control Protocol/Internet
Protocol

6

TCP

Transmission Control Protocol

USDA

U.S. Department of Agriculture

POLICY

The responsibility for protecting USDA resources on the Internet is the responsibility of
the USDA Agencies or Staff Offices. This policy apply to contractors and universities
that connect to USDA computer. USDA agencies which access the Internet must develop
and implement an Internet security policy which meets the minimum requirements of this
regulation as following:
a
Data which is exempted from disclosure under the Freedom of
Information Act (Public Law 93-502) or whose disclosure is forbidden
by the Privacy Act (Public Law 93-579) will not be transmitted over
the Internet network unless encrypted. "Note: Logon IDs and
passwords are frequently classified as sensitive information."
b
All USDA agencies and staff offices using the Internet must
follow the guidance in DR 3300-1 "Telecommunications," and report to
OIRM the information requested in Appendix I, Section 4.
c
USDA agencies and staff offices that plan a gateway to the
Internet are responsible for funding, implementing and maintaining the
prescribed protection, including devising, and implementing a
comprehensive risk management program.

3

DR 3140-002

March 7, 1995
d
Agencies and staff offices will access the Internet only
through the USDA Internet Access Network. Any agencies currently
accessing the Internet through other means may continue to do so
provided:
(1)
No other mandatory Federal contract (e.g.,
FTS2000) or Departmental Regulation is violated;
and
(2)
The agency has submitted and obtained
approval of a technical waiver request registering the
use to the Director, Office of Information Resources
Management.
e
Host-based security will be the primary method of protecting
USDA systems. However, many host-based security software packages
cannot be trusted to protect us from the Internet, because of their
vulnerability to denial-of-service attacks.
f
Due to inherent weaknesses in certain Internet
telecommunication services, and cumbersome aspects of some security
packages, many sites will find that the most practical method of
securing access to systems from the Internet is to use a secure Gateway
or a firewall system. Agencies will perform risk assessments to
determine where secure gateways, firewalls, smart cards, or
authentication tokens will be most suitable. USDA agencies will:
(1)
Use firewalls and/or packet filters on the
local routers, when the system uses TCP/IP.
(2)
Configure firewalls on with outgoing access
to the Internet, but strictly limit incoming access to
USDA data and systems by Internet users.
(3)
Apply the DMZ concept as part of the
firewall design.
g
Firewall compromise would be potentially disastrous to subnet
security. For this reason, agencies will, as far as is practical, adhere to
the below listed stipulations when configuring and using firewalls.
(1)
Limit firewall accounts to only those
absolutely necessary, such as the administrator. If
practical, disable network logins.
(2)
Use smartcard or authentication tokens to
provide a much higher degree of security than that
provided by simple passwords. Challenge-response
and one-time password cards are easily integrated
with most popular systems.
(3)
Remove compilers, editors, and other
program development tools from the firewall

4

DR 3140-002

March 7, 1995
system(s) that could enable a cracker to install Trojan
horse software or backdoors.
(4)
Do not run any vulnerable protocols on the
firewall such as TFTP, NIS, NFS, UUCP.
(5)
Consider disabling finger command. The
finger command can be used to leak valuable user
information.
(6)
Consider not using the e-mail gateway
commands (EXPN and VFRY) which can be used by
crackers to probe for user addresses.
(7)
Do not permit loopholes in firewall systems
to allow friendly systems or users special entrance
access. The firewall should not view any attempt to
gain access to the computers behind the firewall as
friendly.
(8)
Disable any feature of the firewall that is not
needed, including other network access, user shells,
applications, and so forth.
(9)
Turn on full-logging at the firewall and read
the logs weekly at a minimum.
h
No USDA computer or subnet that has connections to the
Internet can house privacy or sensitive information without the use of
firewalls or some other means to protect the information.
i
USDA agencies and staff offices must develop and document
an Internet security strategy based on the type of Internet service
selected for use. This strategy must be included in the Internet Security
Plan.
j
USDA agencies and staff offices that use the Internet must
adhere to guidance stated in DR 3140-1 "USDA IRM Security Policy."
k
All software available on the Internet must be scanned for
Trojan horses or computer viruses once it has been downloaded to a
USDA computer. All downloaded software should be loaded preferably
onto a floppy disk and not to the system hard disk. Once you are
reasonably assured that the downloaded software does not contain
Trojan horses or computer viruses it can be placed on the hard drive. If
the software will not fit on a floppy disk then the only option is the
hard disk. The software must be scanned before use (executed).
l
Mandatory vulnerability and risk assessment of existing
gateways is required at annual intervals. Initial assessment should be
completed within nine (9) months of the issuance of this policy.

5

DR 3140-002

March 7, 1995
m
Agencies should conduct weekly or monthly reviews of audit
trails of gateway software for breaches of security.
n
USDA personnel, and contractor personnel working for
USDA while using the Internet:
(1)
Must not be harassing, libelous, or
disruptive to others while connected to the Internet.
(2)
Must not transmit personal data or
unauthorized government-owned data across the
internet.
(3)

Must obey all copyright laws.

(4)
Must not download to government
computers from the Internet any obscene written
material or pornography.
(5)
Must not send threatening, racially
harassing, or sexually harassing messages.
(6)
Must not attempt to break into any computer
whether USDA, federal or private.
(7)
Must not be used for private or personal
business.
(8)
Must not introduce computer viruses,
worms, or Trojan horses.
o
USDA sponsored Internet connections are to be used for
official USDA business.
p
Host computers should be regularly scanned to ensure
compliance with USDA security guidelines.
7

RESPONSIBILITIES
a

The Director, OIRM, will:
(1)
Develop, coordinate, implement, interpret,
and maintain Internet Security policies, procedures,
and guidelines for the protection of USDA
information system resources.
(2)

Review agency Internet security policy.

(3)
Assist in agency Internet security policy
development.

6

DR 3140-002

March 7, 1995
(4)
Determine adequacy of security measures
for systems used as gateways to the Internet.
(5)
Ensure that agencies conduct periodic
information systems security risk assessments,
security evaluations, and internal control reviews of
operational USDA Internet gateways and facilities.
b
Agencies and Staff Offices That Have or Are Planning a
Gateway to the Internet will:
(1)
Devise and implement a comprehensive risk
management program which assures that security
risks are identified, considered, and mitigated
through the development of cost effective security
controls. The risk management system will include a
service access policy that will define those services
that will be allowed or explicitly denied from the
restricted network, how these services will be used,
and the conditions for exception to this policy.
Another part of this risk management system will be
a firewall design policy. This policy relates precisely
to firewalls and defines the rules used to implement
the service access policy.
Each agency and staff office must develop an Internet
Security Plan which address all security controls in
place or planned. These controls shall be
commensurate with the risks identified in the risk
analysis. Internet Security plans shall be submitted
annually with the IRM Security Plans for review and
approval. The guidelines governing the submission of
IRM Security Plans as defined in DR- 3140-1 apply
to the submission the Internet Security Plan.
(2)
Perform risk analysis to identify the risks
associated with using Internet both for individual
users and Agency or Staff Office. Cost effective
safeguards, identified in the risk analysis process,
will be implemented and continually monitored to
ensure continued effectiveness.
(3)
Develop, test, and maintain Internet
contingency plans. The risk involved with using the
Internet makes it essential that plans and procedures
be prepared and maintained to:
(a)
Minimize the damage and
disruption caused by undesirable
events; and

7

DR 3140-002

March 7, 1995
(b)
Provide for the continued
performance of essential systems
functions and services.
(4)
Develop, install, maintain, and regularly
review audit trails for unusual system activity.
(5)
Fund, implement, and maintain the
prescribed protective features identified as a solution
by a risk assessment.
(6)
Risk assessment developed by agencies and
staff offices are to be made available to OIRM upon
request.
(7)
Ensure that the agency Information Security
Program Manager is a vital part of any security
activity on the Internet.
c
for:

Agency Information Security Program Manager is responsible

(1)
Implementing the policy stated in this
directive.
(2)
Developing audit trails for any USDA
network connected to the Internet.
(3)
Reviewing and monitoring activity audit
trails on the Internet connections.
(4)
Working closely with the agency network
administrator in monitoring activity on the use of
their host and subnets.
8

NON-COMPLIANCE

All users of data and systems are responsible for complying with this Internet systems
security policy, as well as procedures and practices developed in support of this policy.
Anyone suspecting misuse or attempted misuse of Departmental information systems
resources is responsible for reporting such activity to their Agency or Staff Office
management, or to the Information System Security Program Manager or the
Departmental Information System Security Program Manager.
Violations of standards, procedures, or practices in support of this policy will be brought
to the attention of management for action, which will result in disciplinary action up to
and including termination of employment.
9

SOURCE OF INFORMATION
a

OIRM, Guide To The USDA Internet

8

DR 3140-002

March 7, 1995
b
The following source documents may be obtained through the
NIST Bulletin Board Service (BBS). To access the BBS, you need a
computer with communications capability and a modem. For modems
at 2400 bits per second (BPS) or less, dial (301) 948-5717. For 9600
BPS, dial (301) 948-5140. Modem settings for all speeds are 8 data
bits, no parity, 1 stop bit.
(1)

CSL Bulletin, July 1993,
NIST Connecting to the
Internet: Security Considerations
(2)

CSL Bulletin, May 1994,
NIST Reducing the Risks
of Internet Consideration and use
(3)
NIST Publication,
September, 1994
Keeping
Your Site Comfortably Secure: An
Introduction to Internet Firewalls
(Draft)
c
Internet users with telnet or ftp capability may telnet to the
BBS at cs-bbs.nist.gov (129.6.54.30). To download files, users need to
use ftp as follows: ftp to csrc.nist.gov (129.6.54. 1 1), log into account
anonymous, use your Internet address as the password, and locate files
in directory pub; an index of all files is available for download. For
users with Internet-accessible e-mail capability, send e-mail to
[email protected] with the following message: send filename,
where filename is the name of the file you wish to retrieve. Send index
will return an index of available files.
d
Hard copy of NIST publications can be obtained by contacting
National Institute of Standards and Technology at the following
address:
NIST, Building 225
Room A-216
Gaithersburg, Maryland 20899-0001
Telephone No. (301) 975-3359
Fax No. (301) 948-0279
Sign by:
DAVID R. SKEEN

9

DR 3140-002

March 7, 1995

APPENDIX A
DEFINITIONS
Application Protocol. Protocol used by applications that are invoked by
the user (example: E-mail).
Backdoor. A term used to describe an entry to a network or computer.
Usually a hidden logon identification (ID) and password are used to
gain access through the backdoor. The hidden logon ID and passwords
may be placed on the system by a hardware or software manufacture as
a way for their technician to gain access for repair. Computer
hackers/crackers may use these hidden logon IDs and passwords or use
trojan horses to establish illegal and unauthorized logon IDs and
passwords on systems. These IDs and passwords become the backdoor
entry point to the computer system or network. The main illegal use of
backdoors is to get around computer system or network security.
Computer Crackers. A name given by computer hackers to persons who
break into systems and abuse the systems they break into. No matter
what name is used, the unauthorized access of computers by the
computer hacker or the cracker is a criminal act by law.
Computer Hacker. A person or group of persons using computers to
illegally break into other computers. These persons normally have
interest only in the ability to break into another system. This term also
describes computer "whiz kids" who push their knowledge of
computers and programming to its limits. The unauthorized access of
computers by the computer hacker is a criminal act by law.
Computer Virus. A program designed to infect computer systems in
much the same way as a biological virus infects humans. The typical
virus reproduces by making copies of itself when inserted into other
programs. Computer viruses normally infect either systems software or
application programs.
Demilitarized Zone (DMZ). A screened "sub-net" configured such that
both the Internet and the private network have access to hosts on the
screened subnet, but traffic across the screened "subnet" is blocked.
The subnet network is setup between the private "protected" network
and the Internet [so that] to all hosts on the "subnet" are reachable from
the outside."
Finger Command. A command which displays information about a
user. This command will also display the contents of a file named in the
users home directory.
Firewalls. An approach to security; it is a policy that defines the
services and access to be permitted, and an implementation of that
policy in terms of a network configuration, one or more host systems
and routers, and other security measures such as advanced
authentication in place of static passwords. The main purpose of a
firewall system is to restrict access to or from a protected network (i.e.,

10

DR 3140-002

March 7, 1995
a site). It implements a network access policy by forcing connections to
pass through the firewall, where they can be examined and evaluated.
Logic Bomb. A computer code that is preset to cause a malfunction
when a specified set of logical conditions occur. For example, when a
specific social security number in a payroll system is processed, the
logic bomb is activated. The logic bomb will then cause an improper
amount of money to be printed on the check.
Network File System (NFS). A system that allows you to work with
files on a remote host as if you were working on your own host.
Network Information Services. Allows multiple systems to share
databases, e.g., the password file, to permit centralized management.
Internet. A collection of world-wide "network of networks" that use the
TCP/IP protocol suite for communications.
Internet Subnet. A USDA owned network which has been connected to
the Internet.
Packet Filters. A router designed to screen packets as they pass
between the router's interfaces. Filtering can be used to block
connections from or to a specific host or network, and to block
connections to specific ports.
Protocol. A set of rules that defines how computers transmit
information to each other, allowing different types of computers and
software to communicate with each other.
Router. A system used to transmit data between two
computer systems or networks using the same protocol.
Risk Assessment. A process which analyzes and identifies current
system value assets, existing security safeguards, vulnerabilities and
determines impacts associated with an automated system or network.
The risk assessment also identifies potential security safeguards.
Scan. A method used to examine computer coding/programs
sequentially, part by part. Scans are made for virus signatures or
potentially unsafe practices. (For example: scan for changes made to an
executable file, or search for direct writes to specific disk sectors, etc.)
Sensitive Information. Information for which loss, unauthorized
modification, or unauthorized disclosure would be detrimental to
agency operations. Examples: information that is personal, proprietary,
financial, National Security-related, or critical to agency plans and
operations.
Shareware. Software that has been developed and placed in public
domain or in general circulation for general public use. The developer
of this software may requests a small fee ($1.00 - $20.00) for use and
future updates.

11

DR 3140-002

March 7, 1995
Spoofing. A method of tricking system security into permitting
normally disallowed network connections.
Subnet Security. Security provided at the USDA agency level network
which has been connected to the Internet.
TCP/IP Protocol. A suite of rules (protocols) that define how data is
transported among computers on the Internet.
Time Bomb. A computer code that is preset to cause a malfunction
after a specific date, time, or number of operations. The "Friday the
13th" computer virus is an example. The system is infected for several
days, or even months, and the virus lies dormant until the date reaches
"Friday the 13th."
Trap Door. A set of instruction codes embedded in a computer
operating system that permits access while bypassing security controls.
Trojan Horse. A set of unwanted embedded computer instructions
inside a program. The instructions cause unexpected results when the
program is executed. It may create logon ID's and passwords for later
intrusion by hackers. Further, Trojan horses allow persons to create or
gain access to the source code of common or frequently used programs.
These programs may be modified to perform a harmful function in
addition to its normal function. A Trojan horse can alter, destroy,
disclose data, or delete files.
Virus Detection Software. Software written to scan machine readable
media on computer systems. There are a growing number of reputable
software packages available that are designed to detect and/or remove
viruses. In addition, virus checkers programs can search text files for
virus signatures or potentially unsafe practices.
Virus Signature. A unique set of characters which identify a particular
virus. This may also be referred to as a virus marker.
Worm. A complete program that propagates itself from system to
system, usually through a network or other communication facility. A
worm is similar to a virus and can infect other systems and programs. A
worm differs from a virus in that a virus replicates itself, and a worm
does not. A worm copies itself to a person's workstation over a network
or through a host computer and then spreads to other workstations. It
can easily take over a network as the "Internet" worm did. Unlike a
Trojan horse, a worm enters a system uninvited.
TFTP. A protocol used for booting diskless workstations, terminal
servers and routers.
Unix. A computer operating system developed by Bell Laboratories.
This system was developed originally for Bell Laboratories' internal
use. The computer world learned of its portability and the system
expanded into universal use. Unix runs on a variety of computer
hardware.

12

DR 3140-002

March 7, 1995
USDA Internet. Is comprised of an interconnection of networks
"owned" and operated by the USDA. It is not the same as "The
Internet"; however it relies upon "The Internet" to interconnect with
many other important networks. The USDA Internet uses FTS2000
circuits and The Internet does not use FTS2000 facilities. This is an
important distinction since FTS2000 mandates the USDA use network
'A' circuits whenever intra-USDA business is conducted across Local
Access and Transport Areas.... [The USDA Internet] is not a public
network. [Nor is it a] network which comprises the core of the Internet
[like some networks such as NSFNet]."
UUCP. Unix-to-Unix copy protocol. A system by which files can be
transferred between Unix computers.
UUCP network. A network of Unix computers sites, that communicates
via modems and phone lines using the UUCP protocol.

END

13


File Typeapplication/pdf
File TitleUSDA Internet Security Policy
AuthorUSDA
File Modified2001-09-19
File Created2001-09-19

© 2024 OMB.report | Privacy Policy