Download:
pdf |
pdfOffice of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
FNS Handbook 702
Version 3.0
INFORMATION SYSTEMS SECURITY
GUIDELINES & PROCEDURES
PREPARED BY: INFORMATION SECURITY OFFICE
RELEASE DATE: SEPTEMBER 2014
Last Modified: 8/21/2014
For Official Use Only
Page 2 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Document Control
This is a controlled document produced by the United States Department of Agriculture
(USDA), Food, Nutrition and Consumer Services, Chief Information Officer (CIO). The control
and release of this document is the responsibility of the Information Security Office (ISO) and
document owner.
Issue Control
Document
Reference
FNCS 702 v3.0
Document Title
FNCS Information System Security Guidelines and Procedures
702 Handbook, v3.0
Document Owner Details
Name
Leo Wong
Contact Number
703-605-1181
E-mail Address
[email protected]
Revision History
Revision
Date
Author
1.0
January 2008
Carol Ware,
ISO
1.1 Draft
October 2008
Information
Security Office
(ISO)
1.2 Draft
October 2009
Bill Ramo
Revised Draft
1.3 Draft
November 2010
Leo Wong
Updated Document
1.4 Draft
August 2011
Vishad Pathak
Updated frequency of review
for monitoring least privilege, IT
restricted space.
1.5 Draft
October 2011
Vishad Pathak
Updated PII, mobile code
usage, and foreign use
policies.
1.6 Draft
December 2011
Leo Nguyen
2.0
March 2012
Information
Security Office
Updated Release
2.1
June 2013
Information
Security Office
Annual Update
3.0
August 2013
Information
Security Office
Annual Update
Added reference to
Child System and
Last Modified: 8/21/2014
For Official Use Only
Comments
Created original version of the
702 Handbook.
Updated entire document.
Added 4 new guidelines
Updated Citrix Policy
Page 3 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Application Assessment
Policy, V1.0
Added reference to IR
policy
Added Vulnerability
Policy
Distribution List
Name
Food, Nutrition and
Consumer Services
Last Modified: 8/21/2014
Title
Agency/Office
All Personnel
FNCS/All
For Official Use Only
Contact Information
Page 4 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
TABLE OF CONTENTS
INFORMATION SYSTEM SECURITY OVERVIEW ------------------------------------------------------------------------------------ 14
ENFORCEMENT STATEMENT ------------------------------------------------------------------------------------------------------------- 14
UPDATE AND REVIEW ----------------------------------------------------------------------------------------------------------------------- 14
INFORMATION SYSTEM SECURITY PLANNING AT FNCS ----------------------------------------------------------------------- 15
050
060
070
071
072
073
080
081
082
083
OVERVIEW --------------------------------------------------------------------------------------------------------------- 15
REFERENCES ------------------------------------------------------------------------------------------------------------- 15
GUIDELINES -------------------------------------------------------------------------------------------------------------- 15
MANAGEMENT CONTROLS --------------------------------------------------------------------------------------------- 15
OPERATIONAL CONTROLS ---------------------------------------------------------------------------------------------- 15
TECHNICAL CONTROLS ------------------------------------------------------------------------------------------------- 16
FNCS INFORMATION SYSTEM SECURITY COMPLIANCE ------------------------------------------------------------ 16
COMPLIANCE PROGRAM: THE FISMA SCORECARD----------------------------------------------------------------- 18
STANDARD OPERATING PROCEDURES (SOPS) ----------------------------------------------------------------------- 18
SECURITY ASSESSMENTS ----------------------------------------------------------------------------------------------- 18
GUIDANCE ON ACCEPTABLE USE OF FNCS INFORMATION RESOURCES ---------------------------------------------- 19
100
110
120
130
131
132
140
141
142
150
151
152
160
161
162
164
OVERVIEW --------------------------------------------------------------------------------------------------------------- 19
REFERENCES ------------------------------------------------------------------------------------------------------------- 19
GUIDELINES -------------------------------------------------------------------------------------------------------------- 19
PERSONAL USE ---------------------------------------------------------------------------------------------------------- 20
ACCEPTABLE PERSONAL USE ------------------------------------------------------------------------------------------ 20
UNACCEPTABLE PERSONAL USE -------------------------------------------------------------------------------------- 20
E-MAIL USE -------------------------------------------------------------------------------------------------------------- 21
ACCEPTABLE E-MAIL USE ---------------------------------------------------------------------------------------------- 22
UNACCEPTABLE E-MAIL USE ------------------------------------------------------------------------------------------ 22
INTERNET USE ----------------------------------------------------------------------------------------------------------- 22
ACCEPTABLE INTERNET USE ------------------------------------------------------------------------------------------- 23
UNACCEPTABLE INTERNET USE --------------------------------------------------------------------------------------- 23
TELEPHONE EQUIPMENT AND SERVICES ------------------------------------------------------------------------------ 23
ACCEPTABLE TELEPHONE USE ---------------------------------------------------------------------------------------- 24
UNACCEPTABLE TELEPHONE USE ------------------------------------------------------------------------------------- 24
VIOLATING FNCS INFORMATION RESOURCE ACCEPTABLE USE STANDARDS ----------------------------------- 24
GUIDANCE ON ACCESSING THE FNCS NETWORK ------------------------------------------------------------------------------- 28
200
210
220
221
222
223
224
225
226
227
228
229
230
OVERVIEW --------------------------------------------------------------------------------------------------------------- 28
REFERENCES ------------------------------------------------------------------------------------------------------------- 28
FNCS NETWORK ACCESS FOR GOVERNMENT-FURNISHED EQUIPMENT (GFE)---------------------------------- 28
FNCS NETWORK ACCESS FOR PERSONALLY OWNED EQUIPMENT (POE) ---------------------------------------- 29
FNCS NETWORK SECURITY CONTROLS ------------------------------------------------------------------------------ 30
FNCS NETWORK RESTRICTIONS -------------------------------------------------------------------------------------- 30
HOW TO REQUEST ACCESS TO THE FNCS NETWORK --------------------------------------------------------------- 31
HOW TO LOG ON AND OFF THE FNCS NETWORK (INTERNAL AND REMOTE) ------------------------------------- 31
HOW TO LOCK A WORKSTATION --------------------------------------------------------------------------------------- 32
SEPARATION FROM FNCS ---------------------------------------------------------------------------------------------- 32
PROCESS FOR ACCESSING ANOTHER USER’S DATA ----------------------------------------------------------------- 32
COLLABORATIVE COMPUTING DEVICES ------------------------------------------------------------------------------ 33
PUBLIC KEY INFRASTRUCTURE CERTIFICATE ------------------------------------------------------------------------ 33
GUIDANCE ON THE PROTECTION AND USE OF WIRELESS TECHNOLOGIES ------------------------------------------ 34
Last Modified: 8/21/2014
For Official Use Only
Page 5 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
300
310
320
321
322
OVERVIEW --------------------------------------------------------------------------------------------------------------- 34
REFERENCES ------------------------------------------------------------------------------------------------------------- 34
WIRELESS TECHNOLOGY GUIDELINES -------------------------------------------------------------------------------- 34
CURRENT STATE OF WIRELESS TECHNOLOGIES AT FNCS --------------------------------------------------------- 34
HOME/COMMERCIAL USE ---------------------------------------------------------------------------------------------- 34
GUIDANCE ON INCIDENT RESPONSE AND REPORTING ----------------------------------------------------------------------- 35
400
410
420
421
OVERVIEW --------------------------------------------------------------------------------------------------------------- 35
REFERENCES ------------------------------------------------------------------------------------------------------------- 35
LOSS OF PERSONALLY IDENTIFIABLE INFORMATION (PII) --------------------------------------------------------- 35
ALL OTHER INCIDENTS ------------------------------------------------------------------------------------------------- 36
GUIDANCE ON AUDIT & ACCOUNTABILITY OF THE FNCS NETWORK ---------------------------------------------------- 37
500
510
520
OVERVIEW --------------------------------------------------------------------------------------------------------------- 37
REFERENCES ------------------------------------------------------------------------------------------------------------- 37
AUDIT AND ACCOUNTABILITY GUIDANCE --------------------------------------------------------------------------- 37
GUIDANCE ON ACCESS CONTROL FOR FNCS INFORMATION SYSTEMS------------------------------------------------ 39
600
610
620
621
640
641
642
643
644
645
OVERVIEW --------------------------------------------------------------------------------------------------------------- 39
REFERENCES ------------------------------------------------------------------------------------------------------------- 39
FNCS ACCESS CONTROL GUIDANCE --------------------------------------------------------------------------------- 39
FNCS RECERTIFICATION OF ACCESS CONTROLS -------------------------------------------------------------------- 40
FNCS PASSWORD GUIDANCE ------------------------------------------------------------------------------------------ 40
GENERAL USER - PASSWORD GUIDELINES --------------------------------------------------------------------------- 40
PRIVILEGED USER - PASSWORD GUIDELINES ------------------------------------------------------------------------ 41
PASSWORD GUIDELINES FOR GOVERNMENT-FURNISHED WIRELESS PDAS -------------------------------------- 42
ACCEPTANCE OF PIV CREDENTIALS ---------------------------------------------------------------------------------- 42
DEVICE IDENTIFICATION AND AUTHENTICATION -------------------------------------------------------------------- 42
GUIDANCE ON IT RESTRICTED SPACE AND PHYSICAL ACCESS CONTROL ------------------------------------------- 43
700
710
720
721
722
720
721
722
723
724
725
OVERVIEW --------------------------------------------------------------------------------------------------------------- 43
REFERENCES ------------------------------------------------------------------------------------------------------------- 43
PHYSICAL ENVIRONMENT ---------------------------------------------------------------------------------------------- 43
ROLES AND RESPONSIBILITIES ----------------------------------------------------------------------------------------- 43
THE FNCS CIO WILL: -------------------------------------------------------------------------------------------------- 43
THE FNCS SUPERVISORS AND POINT OF CONTACTS (POC) WILL: ------------------------------------------------- 44
THE SYSTEM OWNERS WILL: ------------------------------------------------------------------------------------------- 44
THE INFORMATION SYSTEMS SECURITY PROGRAM MANAGER (ISSPM) WILL: --------------------------------- 44
THE PHYSICAL SECURITY BRANCH WILL: ---------------------------------------------------------------------------- 44
FNCS USERS WILL: ----------------------------------------------------------------------------------------------------- 44
IT RESTRICTED SPACE AND USER ACCESS RECERTIFICATION PROCESS (PROPERTY MANAGEMENT BRANCH)
45
GUIDANCE ON FNCS COMPUTER SECURITY AWARENESS AND TRAINING -------------------------------------------- 45
800
810
820
830
831
832
833
OVERVIEW --------------------------------------------------------------------------------------------------------------- 45
REFERENCES ------------------------------------------------------------------------------------------------------------- 46
INFORMATION SYSTEM SECURITY AWARENESS --------------------------------------------------------------------- 46
INFORMATION SECURITY AWARENESS (ISA) TRAINING ------------------------------------------------------------ 46
ISA TRAINING REQUIREMENTS ---------------------------------------------------------------------------------------- 46
ISA SPECIALIZED TRAINING REQUIREMENTS ------------------------------------------------------------------------ 47
ISA TRAINING RECORDS ----------------------------------------------------------------------------------------------- 47
GUIDANCE ON SYSTEM CERTIFICATION AND ACCREDITATION (C&A) -------------------------------------------------- 48
900
910
OVERVIEW --------------------------------------------------------------------------------------------------------------- 48
REFERENCES ------------------------------------------------------------------------------------------------------------- 48
Last Modified: 8/21/2014
For Official Use Only
Page 6 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
920
921
922
923
924
925
926
927
ROLES AND RESPONSIBILITIES ----------------------------------------------------------------------------------------- 48
THE CIO WILL: ---------------------------------------------------------------------------------------------------------- 48
THE SYSTEM OWNER WILL: -------------------------------------------------------------------------------------------- 49
THE IT PROJECT MANAGER (ITPM) WILL: --------------------------------------------------------------------------- 49
THE DESIGNATED ACCREDITING AUTHORITY (DAA) WILL: ------------------------------------------------------- 49
THE CERTIFICATION TEAM WILL: ------------------------------------------------------------------------------------- 50
THE SECURITY TEST AND EVALUATION TEAM (ST&E) ------------------------------------------------------------ 50
THE ISSM ---------------------------------------------------------------------------------------------------------------- 50
GUIDANCE ON CERTIFICATION AND ACCREDITATION (C&A) OF INFORMATION SYSTEMS AT FNCS-------- 51
930
931
932
934
935
936
GENERAL INFORMATION ----------------------------------------------------------------------------------------------- 51
PHASE 1 PRE-CERTIFICATION (INITIATION, ACQUISITION/DEVELOPMENT PHASE OF THE SDLC) ------------- 52
LEVEL OF CONCERN FOR CONFIDENTIALITY, INTEGRITY AND AVAILABILITY (CIA) --------------------------- 53
PHASE 2 CERTIFICATION AND ACCREDITATION --------------------------------------------------------------------- 57
PHASE 2 C&A DOCUMENTS -------------------------------------------------------------------------------------------- 59
PHASE 3 POST-ACCREDITATION --------------------------------------------------------------------------------------- 59
GUIDANCE ON ASSESSMENT AND ACCREDITATION (A&A) OF INFORMATION SYSTEMS AT FNCS ---------- 60
950
960
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
OVERVIEW --------------------------------------------------------------------------------------------------------------- 60
REFERENCES ------------------------------------------------------------------------------------------------------------- 60
THE CIO WILL: ---------------------------------------------------------------------------------------------------------- 60
THE SYSTEM OWNER WILL: -------------------------------------------------------------------------------------------- 61
THE IT PROJECT MANAGER (ITPM) WILL: --------------------------------------------------------------------------- 61
THE DESIGNATED ACCREDITING AUTHORITY (DAA) WILL: ------------------------------------------------------- 61
THE AUTHORIZATION TEAM WILL: ------------------------------------------------------------------------------------ 61
THE SECURITY TEST AND EVALUATION TEAM (ST&E) WILL: ----------------------------------------------------- 62
THE ISSM WILL:--------------------------------------------------------------------------------------------------------- 62
ADDITIONAL CONTINUOUS A&A GUIDANCE ------------------------------------------------------------------------ 62
GENERAL INFORMATION ----------------------------------------------------------------------------------------------- 62
STEP 1: CATEGORIZE THE PROGRAM/SYSTEM ----------------------------------------------------------------------- 63
STEP 2: SELECT SECURITY CONTROLS -------------------------------------------------------------------------------- 64
STEP 3A: IMPLEMENT SECURITY CONTROLS ------------------------------------------------------------------------- 65
STEP 3B: CONCURRENCY REVIEW ------------------------------------------------------------------------------------- 66
STEP 4: ASSESS SECURITY CONTROLS -------------------------------------------------------------------------------- 67
STEP 4B SUBMIT THE PACKAGE FOR FINAL CONCURRENCY REVIEW --------------------------------------------- 68
STEP 5 AUTHORIZE INFORMATION SYSTEM -------------------------------------------------------------------------- 69
STEP 6 MONITOR SECURITY CONTROLS ------------------------------------------------------------------------------ 71
GUIDANCE ON THE INFORMATION SYSTEMS SECURITY PROGRAM (ISSP) FOR FNCS---------------------------- 73
1000
1010
1020
1030
1040
1050
1051
1052
1053
1054
OVERVIEW --------------------------------------------------------------------------------------------------------------- 73
REFERENCES ------------------------------------------------------------------------------------------------------------- 73
PURPOSE ------------------------------------------------------------------------------------------------------------------ 73
FNCS ISSP STRUCTURE ------------------------------------------------------------------------------------------------ 74
MANAGEMENT STRUCTURE OF THE ISSP ---------------------------------------------------------------------------- 75
ISO ROLES AND RESPONSIBILITIES: ----------------------------------------------------------------------------------- 76
THE CIO WILL: ---------------------------------------------------------------------------------------------------------- 76
THE CISO/DEPUTY CISO/ISSPM WILL: ----------------------------------------------------------------------------- 76
THE ISSM WILL:--------------------------------------------------------------------------------------------------------- 78
THE ISSO WILL: --------------------------------------------------------------------------------------------------------- 79
GUIDANCE ON RISK MANAGEMENT AT FNCS-------------------------------------------------------------------------------------- 82
1200
1210
1220
1221
1222
OVERVIEW --------------------------------------------------------------------------------------------------------------- 82
REFERENCES ------------------------------------------------------------------------------------------------------------- 82
FNCS RISK MANAGEMENT -------------------------------------------------------------------------------------------- 82
RISK ASSESSMENT GUIDELINES --------------------------------------------------------------------------------------- 82
RISK MITIGATION GUIDELINES ---------------------------------------------------------------------------------------- 84
Last Modified: 8/21/2014
For Official Use Only
Page 7 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
1223
1230
1240
1241
1242
1243
RISK EVALUATION AND ASSESSMENT GUIDELINES ----------------------------------------------------------------- 85
RISK ACCEPTANCE GUIDELINES --------------------------------------------------------------------------------------- 85
FNCS RISK MANAGEMENT PROGRAM TEAM ------------------------------------------------------------------------ 85
VULNERABILITY IDENTIFICATION AND REMEDIATION PROCEDURES --------------------------------------------- 85
IDENTIFICATION, VALIDATION, AND REPORTING -------------------------------------------------------------------- 86
REMEDIATION OF IDENTIFIED VULNERABILITIES -------------------------------------------------------------------- 86
GUIDANCE ON IT CONTINGENCY PLANNING AND DISASTER RECOVERY ---------------------------------------------- 88
1300
1310
1320
1321
1322
1323
1324
1330
1331
1332
OVERVIEW --------------------------------------------------------------------------------------------------------------- 88
REFERENCES ------------------------------------------------------------------------------------------------------------- 88
ROLES AND RESPONSIBILITIES ----------------------------------------------------------------------------------------- 88
THE CIO AND CISO WILL: --------------------------------------------------------------------------------------------- 88
THE CONTINGENCY PLAN AND DISASTER RECOVERY COORDINATOR AND STAKEHOLDERS WILL: ----------- 89
THE SYSTEM OWNER WILL: -------------------------------------------------------------------------------------------- 89
THE ITPM AND ISSM WILL: ------------------------------------------------------------------------------------------- 90
CONTINGENCY PLAN AND DISASTER RECOVERY GUIDELINES----------------------------------------------------- 90
CONTINGENCY TRAINING ---------------------------------------------------------------------------------------------- 91
CONTINGENCY PLAN TESTING ----------------------------------------------------------------------------------------- 91
GUIDANCE ON FNCS SYSTEM SECURITY PLANS (SSP) ------------------------------------------------------------------------ 92
1400
1410
1420
1421
1422
1423
1424
1430
1431
OVERVIEW --------------------------------------------------------------------------------------------------------------- 92
REFERENCES ------------------------------------------------------------------------------------------------------------- 92
ROLES AND RESPONSIBILITIES ----------------------------------------------------------------------------------------- 92
THE CISO WILL: --------------------------------------------------------------------------------------------------------- 92
THE ISSPM WILL: ------------------------------------------------------------------------------------------------------- 93
THE SYSTEM OWNER WILL: -------------------------------------------------------------------------------------------- 93
THE ITPM WILL: -------------------------------------------------------------------------------------------------------- 93
USDA DEFINITIONS OF SYSTEM AND MAJOR APPLICATIONS ------------------------------------------------------ 94
SSP GUIDELINES -------------------------------------------------------------------------------------------------------- 94
GUIDANCE ON THE FNCS SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC) ---------------------------------------------- 96
1500
1510
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
OVERVIEW --------------------------------------------------------------------------------------------------------------- 96
REFERENCES ------------------------------------------------------------------------------------------------------------- 96
ROLES AND RESPONSIBILITIES ----------------------------------------------------------------------------------------- 96
THE CISO WILL: --------------------------------------------------------------------------------------------------------- 96
THE INFORMATION SYSTEM SECURITY PROGRAM MANAGER (ISSPM) WILL: ----------------------------------- 96
THE ISSM WILL:--------------------------------------------------------------------------------------------------------- 97
THE ITPM WILL: -------------------------------------------------------------------------------------------------------- 97
THE SYSTEM OWNER WILL: -------------------------------------------------------------------------------------------- 97
THE PRIVACY OFFICER WILL: ------------------------------------------------------------------------------------------ 97
THE LEGAL ADVISOR WILL: -------------------------------------------------------------------------------------------- 97
THE RECORDS MANAGEMENT OFFICER WILL: ----------------------------------------------------------------------- 97
CONTRACTOR/DEVELOPMENT TEAM WILL --------------------------------------------------------------------------- 97
SDLC REQUIRED SECURITY DOCUMENTATION AND RESPONSIBLE TEAMS -------------------------------------- 98
SDLC PHASES ----------------------------------------------------------------------------------------------------------- 99
SDLC PHASES AND SECURITY REQUIREMENTS -------------------------------------------------------------------- 100
SDLC PHASES AND DETAILED SECURITY REQUIREMENTS FOR EACH PHASE ----------------------------------- 101
PHASE 1: INITIATION --------------------------------------------------------------------------------------------------- 101
PHASE 2: REQUIREMENTS GATHERING AND ANALYSIS ------------------------------------------------------------ 102
PHASE 3: DESIGN ------------------------------------------------------------------------------------------------------- 103
PHASE 4: DEVELOPMENT ---------------------------------------------------------------------------------------------- 104
PHASE 5: INTEGRATION & TESTING ---------------------------------------------------------------------------------- 104
PHASE 6: IMPLEMENTATION------------------------------------------------------------------------------------------- 105
PHASE 7: OPERATIONS / MAINTENANCE (O&M) ------------------------------------------------------------------- 106
PHASE 8: DISPOSITION ------------------------------------------------------------------------------------------------- 107
Last Modified: 8/21/2014
For Official Use Only
Page 8 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
GUIDANCE ON FNCS CAPITAL PLANNING AND INVESTMENT CONTROL (CPIC) ----------------------------------- 108
1600
1610
1620
1621
1620
1621
1622
1623
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
OVERVIEW -------------------------------------------------------------------------------------------------------------- 108
REFERENCES ------------------------------------------------------------------------------------------------------------ 108
RESPONSIBILITIES ------------------------------------------------------------------------------------------------------ 108
THE CISO WILL: -------------------------------------------------------------------------------------------------------- 108
THE ISSPM WILL: ------------------------------------------------------------------------------------------------------ 109
THE TECHNICAL REVIEW BOARD (TRB) WILL: --------------------------------------------------------------------- 109
THE ITPM WILL: ------------------------------------------------------------------------------------------------------- 109
THE SYSTEM OWNER/ITPM WILL: ----------------------------------------------------------------------------------- 110
THE PORTFOLIO MANAGER WILL: ------------------------------------------------------------------------------------ 110
CPIC PHASES ----------------------------------------------------------------------------------------------------------- 110
PRE-SELECT PHASE ---------------------------------------------------------------------------------------------------- 111
SELECT PHASE ---------------------------------------------------------------------------------------------------------- 111
CONTROL PHASE ------------------------------------------------------------------------------------------------------- 111
EVALUATE PHASE ------------------------------------------------------------------------------------------------------ 112
STEADY STATE PHASE ------------------------------------------------------------------------------------------------- 112
CPIC PHASES ----------------------------------------------------------------------------------------------------------- 112
CPIC PHASES AND SECURITY REQUIREMENTS --------------------------------------------------------------------- 113
CPIC REQUIRED DOCUMENTATION BY PHASE---------------------------------------------------------------------- 113
FNCS CPIC PROCESS FLOW DIAGRAM (PER PHASE) -------------------------------------------------------------- 116
GUIDANCE ON MAINTENANCE OF FNCS INFORMATION SYSTEMS ------------------------------------------------------ 121
1641
1710
1720
1721
OVERVIEW -------------------------------------------------------------------------------------------------------------- 121
REFERENCES ------------------------------------------------------------------------------------------------------------ 121
RESPONSIBILITIES AND GUIDANCE ----------------------------------------------------------------------------------- 121
THE NETWORK OPERATIONS AND ENGINEERING (NOEB) BRANCH WILL: -------------------------------------- 121
GUIDANCE ON MEDIA PROTECTION FOR FNCS INFORMATION SYSTEM RESOURCES -------------------------- 123
1800
1810
1820
1821
1822
OVERVIEW -------------------------------------------------------------------------------------------------------------- 123
REFERENCES ------------------------------------------------------------------------------------------------------------ 123
ROLES AND RESPONSIBILITIES ---------------------------------------------------------------------------------------- 123
THE OIT TECHNOLOGY DIVISION WILL: ----------------------------------------------------------------------------- 123
MEDIA PROTECTION GUIDELINES ------------------------------------------------------------------------------------ 124
GUIDANCE ON FNCS PERSONNEL INFORMATION SECURITY ------------------------------------------------------------- 125
1900
1910
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
OVERVIEW -------------------------------------------------------------------------------------------------------------- 125
REFERENCES ------------------------------------------------------------------------------------------------------------ 125
ROLES AND RESPONSIBILITIES ---------------------------------------------------------------------------------------- 125
THE CIO WILL: --------------------------------------------------------------------------------------------------------- 125
THE ISO WILL: ---------------------------------------------------------------------------------------------------------- 125
THE CONTRACTING OFFICER’S REPRESENTATIVE (COR) AND ITPM WILL: ------------------------------------ 125
THE USERS WILL ------------------------------------------------------------------------------------------------------- 125
PERSONNEL SECURITY GUIDELINES ---------------------------------------------------------------------------------- 126
CATEGORIZATION OF FNCS JOB POSITIONS ------------------------------------------------------------------------- 126
PERSONNEL SCREENING ----------------------------------------------------------------------------------------------- 126
PERSONNEL TERMINATION -------------------------------------------------------------------------------------------- 126
PERSONNEL TRANSFER ------------------------------------------------------------------------------------------------ 127
ACCESS AGREEMENTS ------------------------------------------------------------------------------------------------- 127
THIRD-PARTY PERSONNEL SECURITY ------------------------------------------------------------------------------- 127
APPENDIX A – GLOSSARY --------------------------------------------------------------------------------------------------------------- 128
APPENDIX B – FORM FNS-674 COMPLETION INSTRUCTIONS -------------------------------------------------------------- 147
APPENDIX C – PASSWORD HINTS ---------------------------------------------------------------------------------------------------- 148
APPENDIX D – REQUIRED C&A SYSTEM SECURITY DOCUMENTS ------------------------------------------------------- 149
Last Modified: 8/21/2014
For Official Use Only
Page 9 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
APPENDIX E – FNCS RISK MANAGEMENT ACCEPTANCE REPORT ------------------------------------------------------ 153
APPENDIX F – ITIRB PORTFOLIO MANAGEMENT OFFICE CHECKLIST ------------------------------------------------- 157
APPENDIX G – CPO-ITIRB RECOMMENDATION ---------------------------------------------------------------------------------- 159
APPENDIX H – FNCS INITIAL INCIDENT REPORT TEMPLATE --------------------------------------------------------------- 160
APPENDIX I – INFORMATION SYSTEM SECURITY GUIDANCE AND SECURITY CONTROL MAPPING -------- 164
Last Modified: 8/21/2014
For Official Use Only
Page 10 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
LIST OF TABLES
Table 1 – FNCS Information System Security Plan Families and Identifiers .................................. 17
Table 2 – Level of Concerns for CIA – FIPS 199 ............................................................................ 54
Table 3 – Security Controls and References ..................................................................................... 55
Table 4 – RMF Step 1 Requirements (Categorization) .................................................................... 63
Table 5 – RMF Step 2 Requirements (Select Security Controls) ..................................................... 65
Table 6 – RMF Step 3 Requirements (Implement Security Controls).............................................. 66
Table 7 – RMF Step 4 Tasks (Assess Security Controls) ................................................................. 68
Table 8 – RMF Step 5 Tasks (Authorize Security Controls) ............................................................ 69
Table 9 – RMF Step 6 Tasks (Monitor Security Controls) ............................................................... 71
Table 10 – Vulnerability Assessment Risk Score Matrix ................................................................. 87
Table 11 – SDLC Phases and Processes ......................................................................................... 100
Table 12 – SDLC Phases and System Security Considerations...................................................... 101
Table 13 – USDA IT Capital Planning Phases ............................................................................... 113
LIST OF FIGURES
Figure 1 – RMF Step 1 Process (Categorization) ............................................................................. 64
Figure 2 – RMF Step 2 Process (Select Security Controls) .............................................................. 65
Figure 3 – RMF Step 3 Process (Implement Security Controls) ...................................................... 66
Figure 4 – RMF Step 4 Process (Assess Security Controls) ............................................................. 68
Figure 5 – RMF Step 5 Process (Authorize Security Controls)........................................................ 70
Figure 6 – RMF Step 6 Process (Monitor Security Controls) .......................................................... 72
Figure 7 – OIT Information Security Office Management 4-Tier Structure .................................... 75
Last Modified: 8/21/2014
For Official Use Only
Page 11 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Figure 8 – General USDA Risk Assessment Methodology .............................................................. 83
Figure 9 – SDLC Phase 1 Initiation Overview ............................................................................... 102
Figure 10 – SDLC Phase 2 Requirements Gathering and Analysis Overview ............................... 103
Figure 11 – SDLC Phase 3 Design Overview ................................................................................ 104
Figure 12 – SDLC Phase 4 Development Overview ...................................................................... 104
Figure 13 – SDLC Phase 5 Integration & Testing Overview ......................................................... 105
Figure 14 – SDLC Phase 6 Implementation Overview .................................................................. 106
Figure 15 – SDLC Phase 7 Operations & Maintenance Overview................................................. 107
Figure 16 – SDLC Phase 8 Disposition Overview ......................................................................... 107
Figure 17 – USDA IT Capital Planning Phases .............................................................................. 111
Figure 18 – FNCS CPIC Pre-Select Phase ..................................................................................... 116
Figure 19 – FNCS CPIC Select Phase ............................................................................................ 117
Figure 20 – FNCS CPIC Control Phase .......................................................................................... 118
Figure 21 – FNCS CPIC Evaluate Phase ........................................................................................ 119
Figure 22 – FNCS CPIC Steady State Phase .................................................................................. 120
Last Modified: 8/21/2014
For Official Use Only
Page 12 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
[This page intentionally left blank.]
Last Modified: 8/21/2014
For Official Use Only
Page 13 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Information System Security Overview
The purpose of the FNCS Information Systems Security Guidelines and Procedures is to protect
agency information and information processing assets from theft, fraud, misuse or unauthorized
modification. This Handbook addresses requirements and guidance set forth by the Federal
Information Security Management Act (FISMA). It also encompasses minimum security controls
as required by the Federal Information Processing Standard (FIPS) 200, Minimum Security
Requirements for Federal Information and Information Systems; and defined by the current
National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53, Security
and Privacy Controls for Federal Information Systems and Organizations, commensurate with
security categorization defined by FIPS 199, Standards for Security Categorization of Federal
Information and Information Systems.
Information used by any business enterprise must be safeguarded against tampering, loss,
unauthorized disclosure, denial of service, destruction and must be available when and
where needed.
IT Information Security guidance applies to the areas of: administrative, physical and/or
environmental, personnel, professional behavior, communications, and computer security
(e.g., hardware and software).
All guidelines within the 702 Handbook are written in accordance with USDA policies within
the Department Manual Cyber Security 3500-3599 series and the Department Regulations,
and NIST Special Publications.
FNCS IT systems should not process or contain any Classified, Secret, or Top Secret data.
Control measures are in place to protect FNCS data and the supporting IT systems
commensurate with the sensitivity of the data. If any classified data should pass through
the FNCS network, users are to contact the Information Security Office (ISO) at
[email protected]
Mechanisms shall be integrated into the FNCS architecture to detect and minimize
inadvertent and/or malicious modification or destruction of FNCS data.
All FNCS employees, contractors, state partners and official visitors shall adhere to the
guidelines within the 702 Handbook and ensure that information is used only for its
intended purpose, retains its content integrity, and is marked properly as required.
Requests to deviate from FNCS security policies must be approved by the FNCS Chief
Information Officer (CIO) prior to implementation.
For assistance or questions on FNCS Information Systems Security Guidelines and
Procedures, please contact the ISO at [email protected] .
Enforcement Statement
Compliance with this Handbook is mandatory. Violations of the Information Systems Security
Guidelines and Procedures as stated in the 702 Handbook may lead to immediate removal from
the FNCS Network and/or may be the basis for disciplinary action. Supervisors and/or
management officials considering disciplinary action must consult with the Labor & Employee
Relations Branch in the Human Resources Division prior to taking any action.
Update and Review
Policies will be reviewed, at minimum, on an annual basis. Policies may be reviewed more
frequently as necessary.
Last Modified: 8/21/2014
For Official Use Only
Page 14 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Information System Security Planning at FNCS
050
Overview
In a world of evolving threats to our information systems, it has become clear that we must
continuously ensure we are satisfying a level of information security within FNCS that meets with
the information we are expected to protect. System Security Plans (SSP) have become the
foundation document in the overall security process since they define the system security features
and controls.
SSPs support Capital Planning and Investment Control (CPIC), Federal Information Security
Management Act (FISMA) reporting, System Life Cycle efforts, Risk Management activities as well
as the Certification and Accreditation of Information Technology (IT) systems. Therefore, it is
critical that they be prepared and updated on an ongoing basis with the most current information
concerning each agency’s information security practices.
060
References
This Guidance is written in accordance with:
070
NIST Special Publication 800-53 Rev. 3
DM 3565-001 USDA Annual Security Plans for Information Technology Systems
Guidelines
The FNCS System Security Plan consists of three (3) security control classes: Management,
Operational and Technical.
The three classes and control families are described as follows:
071
Management Controls
Management Controls focus on the management of the information system and the management
of risk for a system. Management Controls are techniques and concerns that are normally
addressed by FNCS Management. Control families for the Management Controls are:
1.
2.
3.
4.
5.
072
Security Assessment and Authorization (CA)
Planning (PL)
Risk Assessment (RA)
System and Services Acquisition (SA)
Program Management (PM)
Operational Controls
Operational Controls address security methods focusing on mechanisms primarily implemented
and executed by people (as opposed to systems). These controls are put in place to improve the
security of a particular system (or group of systems). They often require technical or specialized
expertise and often rely upon management activities as well as technical controls.
Last Modified: 8/21/2014
For Official Use Only
Page 15 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Control families included in the Operational Controls are:
1.
2.
3.
4.
5.
6.
7.
8.
9.
073
Awareness and Training (AT)
Configuration Management (CM)
Contingency Planning (CP)
Incident Response (IR)
Maintenance (MA)
Media Protection (MP)
Physical and Environmental Protection (PE)
Personnel Security (PS)
System and Information Integrity (SI)
Technical Controls
Technical Controls focus on security controls executed by computer systems. The controls can
provide automated protection for unauthorized access or misuse, facilitate detection of security
violations, and support security requirements for applications and data. Control families included
in the Technical Controls are:
1.
2.
3.
4.
074
Access Control (AC)
Audit and Accountability (AU)
Identification and Authentication (IA)
System and Communications Protection (SC)
Security Tools
Security tools are used at FNCS to provide effective security protection for FNCS Information
resources and are used as part of the comprehensive security process to monitor compliance for
some of the aforementioned control families. Some of the security tools utilized at FNCS are:
1.
2.
3.
4.
5.
Vulnerability Scanning
Firewalls
Anti-virus Program
Encryption
Log Management Tool
The NIST Special Publication 800-53 Revision 3 (page F-1) outlines the recommended security
controls that are management, operational and technical security domains for low, moderate, and
high baseline systems. The FNCS security program is compliant to FISMA security requirements
as well as FIPS 199 regulations for security categorization of Federal information systems and
FIPS 200 regulations for the minimum security requirements for Federal information systems.
080
FNCS Information System Security Compliance
The Guidance established within this document authorizes the ISO to promote and execute
information security control compliance for all phases of the System Development Life Cycle
(SDLC), Capital Planning and Investment Control (CPIC), operations & maintenance, and other IT
functions that may impact the effectiveness of maintaining the confidentiality, integrity, or
availability of FNCS data.
Last Modified: 8/21/2014
For Official Use Only
Page 16 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
The table below highlights the relevant sections created to comply with the Management (indicated
as “M” on the table), Technical (indicated as “T” on the table) and Operational (indicated as “O” on
the table) controls for FNCS System Security Plans.
ID
SA
SC
IR
AU
AC
IA
PE
AT
CA
PM
RA
CP
PL
MA
MP
PS
Security Requirements
System and Services Acquisition (M)
System and Communications Protection (T)
Incident Response (O)
Audit and Accountability (T)
Access Control (T)
Identification and Authentication (T)
Physical and Environmental Protection (O)
Awareness and Training (O)
Security Assessment and Authorization (M)
Program Management (M)
Risk Assessment (M)
Contingency Planning (O)
Planning (M)
Maintenance (O)
Media Protection (O)
Personnel Security (O)
Section Series
Section 100
Section 200
Section 400
Section 500
Section 600
Section 600
Section 700
Section 800
Section 900
Section 1000
Section 1200
Section 1300
Section 1600
Section 1700
Section 1800
Section 1900
Table 1 – FNCS Information System Security Plan Families and Identifiers
Last Modified: 8/21/2014
For Official Use Only
Page 17 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
081
Compliance Program: The FISMA Scorecard
The FNCS ISO responds to Department requirements to report specific FISMA scorecard
variables used to measure and ensure compliance to security controls for each system at FNCS.
The scorecard reports on the total score and grade for:
1. Systems Inventory
2. CSAM Controls
3. Systems scheduled for a Certification & Accreditation (C&A)
4. Plan of Actions and Milestones (POA&Ms) and due dates
5. Contingency planning
6. Monthly scanning
7. Monthly patching
8. USDA Information Security Awareness (ISA) Training
9. Specialized IT Training
10. Annual Assessments and Authorization (A&A)
11. Annual Security Plans
12. Privacy Impact Assessment (PIA)
13. Privacy Threshold Analysis (PTA)
14. Systems of Records
15. United States Government Configuration Baseline (USGCB)
16. Whole Disk Encryption
17. Security Incidents
18. Wireless Devices
The FNS Information Security Office (ISO) conducts monthly compliance reviews and reports on
security data such as the status for overdue POA&Ms, monthly patches, and scan information.
The results of the reviews and reports are communicated via a FISMA scorecard that is reported
to USDA. The CIO reviews and approves the FISMA scorecard and reports to USDA. In the
event that non-compliance is discovered, the system owners are given an opportunity to create
POA&Ms that documents the planned, implemented and evaluated remedial actions to correct the
deficiency or non-compliance. POA&Ms are currently entered into the Cyber Security Assessment
and Management tool (CSAM).
082
Standard Operating Procedures (SOPs)
FNCS has developed various SOPs detailing the procedure for maintaining security tools used at
FNCS, including: vulnerability scanning, patch management, firewalls, anti-virus program, data
encryption and log management. These SOPs are necessary to maintain compliance.
083
Security Assessments
FNCS, through the ISO, performs annual security assessments of security controls for FNCS
systems. The assessments are required for OMB A-123 Management Controls of financial
systems and NIST SP 800-53 of FISMA reportable systems, including financial and non-financial
and General Support Systems (GSS).
FNCS may be selected to participate in OIG audits of FISMA controls on an annual basis.
Last Modified: 8/21/2014
For Official Use Only
Page 18 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on Acceptable Use of FNCS Information Resources
100
Overview
Acceptable use provides guidelines on the proper usage of networks. It also details behaviors that
are acceptable and unacceptable on the FNCS Network.
This guidance applies to all FNCS Users (i.e., employees, contractors, official visitors (including
external clients and third party vendors with access to the network) for both internal and remote
access connections to the FNCS Network).
The purpose of this 702 Handbook is to document security policies and procedures, in accordance
with Federal government mandated requirements for connecting to the FNCS network from any
device. Acceptable Use is to set forth the principles that govern appropriate use of FNCS
information resources and is intended to promote the efficient, ethical, and lawful use of the
resources. Access to Government Furnished Equipment (GFE) and the FNCS network is a
privilege which imposes certain responsibilities and obligations to each FNCS users.
110
References
This Guidance is written in accordance with:
120
NIST Special Publication 800-53 Rev. 3
DN 3300-011 USDA Commercial Wireless Technologies
DM 3525-000 USDA Internet and E-mail Security
DR 3300-001, DR 3300-1-A through DR 3300-1-M
Guidelines
When using FNCS information resources, FNCS users shall:
Ensure the ethical use of FNCS information resources in accordance with FNCS guidelines
and procedures.
Acknowledge that FNCS has the right to restrict or rescind network privileges at anytime.
Utilize all security measures that are in place to protect the confidentiality, integrity and
availability of information and systems.
Refrain from using FNCS information resources for inappropriate activities.
Adhere to all licenses, copyright laws, contracts, and other restricted or proprietary
information.
Always safeguard user IDs, passwords, and smartcards.
Access only those information systems, networks, data, control information, and software
that you are authorized to use.
Last Modified: 8/21/2014
For Official Use Only
Page 19 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Use any special accounts to which they have been given access (privilege, system, etc.)
only for the purposes for which the account was intended. Users should not modify
accounts or elevate other accounts with privileged accounts without written approval from
the Information Security Office.
Know who the Information System Security Officers (ISSO) are and how to contact them
.
Determine the sensitivity of the information and programs on their computing resources
(e.g., non-sensitive, sensitive but unclassified). Please refer to the Guidance and
Protection of SBU Information for more detail. Sensitivity of information is also classified by
security categorizations. Refer to NIST SP 800-53 Revision 3, Page 18 for more
information or refer to the FIPS 199 guidelines on security categorizations.
Avoid the introduction of harmful files/data that may contain spy-ware, viruses, etc. into any
computing resource.
130
Personal Use
Federal employees are permitted limited use of GFE for personal needs if the use does not
interfere with official business and involves minimal additional expense to the Government. This
policy also applies to contractor personnel, interns, and other non-government employees through
incorporation by reference in contracts or memorandums of agreement as conditions for using
GFE and space. This limited personal use of GFE should take place during the employee's
personal time, not during official duty time. This privilege to use GFE for non-government purposes
may be revoked or limited at any time by appropriate Federal agency or department officials.
Below are guidelines on the acceptable and unacceptable personal use at FNCS.
131
Acceptable Personal Use
FNCS Users shall have limited personal use of FNCS information systems if it is determined that
such communication:
Does not adversely affect the performance of their official duties or degrade the
performance of the network (e.g., any personal use that could cause congestion, delay or
disruption of service to FNCS Information Systems or equipment).
Does not put Federal Government telecommunication systems to uses that would reflect
adversely on FNCS, to include activities that are illegal, inappropriate, or offensive to fellow
employees, partners, contractors or the public.
132
Unacceptable Personal Use
Employees are not to connect any personal equipment to GFE; this restriction includes but is not
limited to:
Personal removable media (flash drives, external hard drives, etc.);
Personal Mobile Devices; and
Any other type of Personal Electronic Property
Last Modified: 8/21/2014
For Official Use Only
Page 20 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Employees are reminded that they should not try to read media such as CD-ROMs using their
GFE unless they can confirm the source of the media. Using unfamiliar media on GFE increases
the probability of system comprises. Users should always validate the source before using.
Personal use that could cause congestion, delay, or disruption of service to any government
system or equipment. For example, greeting cards, video, sound or other large file attachments
can degrade the performance of the entire network. “Instant Messaging” and web casting on the
Internet and other continuous data streams would also degrade the performance of the entire
network.
Create, copy, transmit, or retransmit chain letters or other unauthorized mass mailings regardless
of the subject matter.
Use of GFE for activities that are illegal, inappropriate, or offensive to fellow employees or the
public. Such activities include, but are not limited to: hate speech, or material that ridicules others
on the basis of race, creed, religion, color, sex, disability, national origin, or sexual orientation.
Create, download, view, store, copy, or transmit sexually explicit or sexually oriented materials.
Create, download, view, store, copy, or transmit materials related to illegal gambling, illegal
weapons, terrorist activities, and non-FNCS – owned music, videos and any other illegal activities.
Commercial use or in support of “for-profit” and “non-profit” activities or in support of other outside
employment or business activity (e.g., consulting for pay, sales or administration of business
transactions, and sale of goods or services).
Engage in any outside fund-raising activity, endorsing any product or service, participating in any
lobbying activity, or engaging in any prohibited partisan political activity.
Posting agency information (all Intellectual Property) to external newsgroups, bulletin boards or
other public forums without authority. This includes any use that could create the perception that
the communication was made in one’s official capacity as a Federal Government employee,
unless appropriate Agency approval has been obtained.
Any use that could generate any additional expense to the U.S. government.
The unauthorized acquisition, use, reproduction, transmission, or distribution of any controlled
information including computer software and data, that includes privacy information, copyrighted,
trademarked or material with other intellectual property rights (beyond fair use), proprietary data.
140
E-mail Use
USDA DR 3300-1-F states that electronic mail (e-mail) shall be used for the conduct of official
business or limited personal use. Below is guidance on acceptable and unacceptable e-mail use
at FNCS.
Last Modified: 8/21/2014
For Official Use Only
Page 21 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
141
Acceptable E-mail Use
Appropriate e-mail use includes, but is not limited to:
Limited personal use of the FNCS e-mail system as long it does not interfere with official
business nor reflect adversely on FNCS Information Systems.
Any message containing information exchanged by employees for the purpose of
accomplishing government business.
Access to the FNCS e-mail system by users when they are not at their duty station site, or
at another installed site, are permitted only through FNCS approved secured methods,
such as VPN or Citrix.
Securing SBU information prior to transmission. Please see Guidance for the Protection of
SBU for further guidance on E-mailing SBU information.
If you receive Spam email, immediately forward this email to the spam mailbox at:
[email protected] .
142
Unacceptable E-mail Use
Inappropriate e-mail use includes, but is not limited to:
Sharing a User ID and password to obtain access to another user’s e-mail for any purpose.
Opening attached file extensions on FNCS e-mail servers to include, but not limited to:
.ade, .adp, .bas, .bat, .chm, .cmd, .com, .cpl, .crt, .exe, .hta, .ins, .isp, .lnk, .mda, .mde,
.mdz, mp3, .msc, .msi, .msp, .mst, ocx, .pcd, .pif, .reg, .sct, .shs and vbs. In the event you
receive an email attachment that is not listed here and you are unsure if it is safe to open,
please send an e-mail to [email protected].
Sending an email that is inappropriate, or not authorized for distribution on the FNCS
network. An inappropriate email can include but not limited to profanity, sexual content or
abusive language
Users may not send e-mail for work purposes through personal e-mail account without
prior approval from a supervisor, unless there is an extenuating circumstance, according to
the FNCS COOP plan.
150
Internet Use
USDA DR 3300-1-I states that mission areas and staff offices may utilize the Internet to support
departmental and mission area responsibilities.
Last Modified: 8/21/2014
For Official Use Only
Page 22 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Below are guidelines for the acceptable and unacceptable Internet use at FNCS.
151
Acceptable Internet Use
Appropriate Internet use includes, but is not limited to:
152
Limited personal use of the Internet as long it does not interfere with official business nor
reflect adversely on FNCS Information Systems.
Communication and exchange of data between state and local governments, private sector
organizations, and educational and research institutions, both in the United States and
abroad.
View inter-Agency non-sensitive data in support of departmental mission, FNCS missions,
or other official purposes.
Download and store information related to official FNCS business on Government
Financed Equipment (GFE) only.
Unacceptable Internet Use
Inappropriate Internet use includes, but is not limited to:
Accessing pornographic, gambling, on-line auction and other inappropriate sites.
Downloading, streaming, copying, sharing, or sending software, music videos, movies,
radio or pictures (whether purchased or not purchased) that are not job related as use of
these constitute copyright violations and are a non-business use of limited network
bandwidth.
Using peer-to-peer software and file sharing products not expressly identified for
authorized use may not be used on or through FNCS servers and workstations, i.e. nonFNCS Instant Messaging (IM) Software.
Subscribing to ‘list servers’, ‘user groups’, or ‘bulletin boards’ that
authorized business needs.
160
do not align to
Telephone Equipment and Services
USDA DR 3300-1-F states that use of Government telephone systems (including cellular
telephones and calls over commercial systems which will be paid for by the Government) are in
place for the conduct of official business or limited personal use.
Below are guidelines on acceptable and unacceptable telephone use at FNCS.
Last Modified: 8/21/2014
For Official Use Only
Page 23 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
161
Acceptable Telephone Use
Use of government telephone and mobile phone equipment and services for limited personal use
may be authorized if used according to the following acceptable use:
Use does not adversely affect the performance of official duties by the employee or the
employee’s organization.
Use could not have been reasonably accomplished at another time using another means.
It is provided for in a collective bargaining agreement.
FNCS Users are authorized to use Government telephone equipment and services to:
162
o
Call to notify family, doctor, etc., when an employee is injured on the job.
o
Contact family while on official business travel.
o
Make calls to arrange for emergency repairs for their residence or automobile while on
official business travel.
Unacceptable Telephone Use
Inappropriate telephone use includes, but is not limited to:
Accepting collect calls from non-government numbers.
Participating in a monitored or recorded telephone conversation without making the other
party aware of the monitoring and/or recording.
Telephone conversations over a speaker-phone or other audio equipment without listing
the names or numbers of persons included on the call.
International Calls by users are prohibited without prior supervisor approval.
164
Violating FNCS Information Resource Acceptable Use Standards
Violations of the Information Systems Security Guidelines and Procedures as stated in the 702
Handbook may lead to immediate removal from the FNCS Network and/or may be the basis for
disciplinary action. Supervisors and/or management officials considering disciplinary action must
consult with the Labor & Employee Relations Branch in the Human Resources Division prior to
taking any action.
170
International Travel
International travel consists of all travel outside the United States and its Territories.
Last Modified: 8/21/2014
For Official Use Only
Page 24 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
International travel poses additional risk to GFE technology being utilized while on travel.
Generally, access to FNCS network resources and systems from foreign countries is prohibited
unless approved by the FNCS senior management in advance.
Users should understand that they are subject to the laws of that country, there is no expectation
of privacy in most countries, and wireless devices are particularly vulnerable to interception and
malware infection.
Users are expected to remain in compliance with all domestic policies when traveling
internationally, especially the policies highlighted below:
No GFE devices and removable media used domestically shall be used on foreign travel to
perform government related work. Only FNCS approved and furnished devices are allowed
To the extent possible approved GFE must provide protection against malware and have up-todate antivirus, spyware, security patches, and firewall software installed.
Unneeded and unnecessary features shall be disabled in accordance with the agency secure
configuration baseline.
All sensitive information stored, transmitted or viewed on GFE and removable media shall be
protected in accordance with DR 3440-002, “Control and Protection of Sensitive Security
Information,” DM 3550-002, Chapter 10, Part 2, “Sensitive But Unclassified (SBU) Information
Protection.
Approved foreign travel devices including removable media should be configured to
encrypt stored data using USDA Regulation DR 3170-001 Appendix B Section 16.0 Policy
for the requirements governing data encryption.
GFE used for international travel shall be prepared as follows:
o
GFE devices and removable media will only be used in the performance of officially
sanctioned travel; if the devices are not essential to the mission, the equipment shall
not be taken.
o
FNCS shall document approval and acceptance of risk for any GFE, which includes,
but not limited to, laptops, Citrix token, mobile devices and removable media, allowed
to be used during travel.
o
Approved GFE for use while on travel shall be decommissioned or wiped immediately
upon return.
o
The servicing Information Technology (IT) unit shall make a copy of all GFE profiles,
including but not limited to, OS, configuration, signatures for system and applications
Last Modified: 8/21/2014
For Official Use Only
Page 25 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
used on the device. This “snapshot” shall be used to evaluate any possible changes
made to the device upon return to the office.
o
Agencies and Offices shall consult with Office of Homeland Security Emergency
Coordination (OHSEC) for current precautions to be observed for destination countries
prior to departure.
Upon return to FNCS after international travel, the GFE:
o
All equipment must be turned off or not used domestically until it can be examined by
the appropriate IT staff to ensure the GFE has not been modified or infected by
malicious code.
o
Shall not connect to any FNCS servers or networks for any reason prior to this
examination.
o
Shall have device passwords changed upon return to the United States (US).
Users shall exercise a higher level of due diligence in the protection of GFE while on
international travel than would be expected in the domestic environment.
o
GFE and removable media shall not be transported in checked baggage.
o
Whenever possible, GFE shall be powered off and the batteries removed and stored
separately from the device when not in use to minimize the opportunity for misuse.
o
Foreign thumb drives, compact disks (CDs), or other media shall not be used in FNCS
GFE. If such use cannot be avoided, the GFE shall be assumed to be compromised
and shall be cleaned and/or reformatted as soon as feasibly possible.
o
FNCS GFE and removable media shall not be used with or in foreign equipment due to
the possibility of compromise.
o
Travelers must ensure physical security of the device while in transit and while on
international travel or foreign duty.
o
Public internet kiosks, cafes, and hotel Wi-Fi sites are particularly susceptible to
monitoring, data interception, and control by foreign entities. Transmission, storage or
printing of sensitive government and personal information is prohibited unless by an
area pre-approved for printing. Potential solutions for international printing: (1) USDA
in-country office location, (2) U.S. Embassy location, (3) U.S. Consulate location, (3)
other U.S.G. in-country office or approved printing location, and (5) portable printer.
Last Modified: 8/21/2014
For Official Use Only
Page 26 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
o
If a GFE is lost or stolen while on international travel, the loss must be reported to
FNCS incident response team and the local US embassy or consulate immediately
upon detection/discovery.
Last Modified: 8/21/2014
For Official Use Only
Page 27 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on Accessing the FNCS Network
200
Overview
This guidance applies to all devices/technologies (to include but not limited to computers, laptops,
printers, personal digital assistants (PDAs), routers, firewalls, servers, switches, access points,
Universal Serial Bus (USB) network devices, etc. owned by FNCS or not) that are connected to
the FNCS Network. The procedures also apply to internal and remote access connections to the
FNCS Network. Personally-owned equipment (POE) is only permitted to access the FNCS and
USDA networks via Citrix.
The purpose of this 702 Handbook is document security policies and procedures, in accordance
with Federal government mandated requirements for connecting to the FNCS network from any
device. These standards are designed to minimize the risk of exposure to damage which may
result from authorized or unauthorized use of FNCS resources. Damages include the loss of
FNCS SBU information, Personally Identifiable Information (PII), intellectual property, damage to
public image and critical FNCS internal systems, etc. The following guidelines shall be observed
by all users connecting to the FNCS Network.
210
References
This guidance is written in accordance with:
220
NIST Special Publication 800-53 Rev.3
DM 3535-001 USDA C2 Level of Trust Policy
DM 3530-000, 001,004 USDA Security Protection
DM 3525-003 USDA Tele-work and Remote Access
FNCS Network Access for Government-Furnished Equipment (GFE)
FNCS Internal Access
All requests for user level network access shall be made only after the successful
completion of the FNS-674 form. Please see Section 234 for details on requesting access
to the FNCS Network. Access granted is applicable to only those applications that are
necessary for the FNCS user’s job. New hires, temporary personnel, contract staff and
official visitors to FNCS must complete the USDA Information Security Awareness (ISA)
training prior to requesting access to the FNCS Network. New Employees will be given
these
materials
by
HR;
other
employees
please
e-mail
[email protected] to receive instructions for taking this CD or paperbased training. For new hires, communication should be initiated with the regional HR
Points of Contact to ensure compliance. For all other hires requiring access, employees
and supervisors should contact the Information Security Office (ISO).
Any equipment connecting to the FNCS Network within FNCS facilities shall conform to
FNCS OIT standards. Such devices shall adhere to FNCS software standards and security
controls (e.g., operating systems, antivirus software, service packs, hot-fixes, and FNCS
approved applications). System configurations shall not be changed, added or modified.
Any non-GFE brought into FNCS by employees, contractors or official visitors shall not be
connected directly to the FNCS Network.
Last Modified: 8/21/2014
For Official Use Only
Page 28 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
An official warning banner shall be displayed before a user successfully gains access to
the FNCS Network. By clicking “ok”, the user has agreed to the terms as outlined in the
official banner. Refusal to agree will mean that the user will not be granted access.
Remote Access (VPN)
FNCS VPN access to Information Technology (IT) systems from remote location is provided to
FNCS users in a secure and effective manner.
FNCS VPN access is built into all employee furnished GFE laptops and is only permitted through
GFE laptops.
FNCS employees, contractors or official visitors requiring remote access to FNCS Network
resources shall conform to all security standards.
Devices connecting to the FNCS Network shall adhere to FNCS software standards and
security controls (e.g., operating systems, antivirus software, service packs, hot-fixes, and
FNCS approved applications). System configurations shall not be changed, added or
modified. FNCS users are required connect via VPN to the FNCS network to ensure all
software patches anti-virus software, etc. are up-to-date.
An official warning banner shall be displayed before a user successfully gains access to
the FNCS Network. By clicking “OK”, the user has agreed to the terms as outlined in the
official banner. Refusal to agree will mean that the user will not be granted access.
Connections to the FNCS network through the VPN will automatically disconnect a user
from the network when inactivity is detected for 30 minutes by the VPN server; however, if
the user is running Microsoft Outlook, the VPN will continue to stay connected. As a result,
users of FNCS VPN are reminded to always lock the desktop of all unattended devices
logged into VPN and to shut down Outlook when the application is not needed.
221
FNCS Network Access for Personally Owned Equipment (POE)
Remote Access (Citrix)
FNCS Citrix access is available through most Internet web browsers and may be accessed
through GFE, or POE.
FNCS employees, contractors or official visitors requiring remote access to FNCS Network
resources shall conform to all security standards.
Devices connecting to the FNCS Network via Citrix must have up-to-date antivirus
software, OS service packs, and hot-fixes applied. An official warning message shall be
displayed before a user enters in their login info to the FNCS Network. By clicking “OK”,
the user has agreed to the terms as outlined in the official banner. Refusal to agree will
mean that the user will not be granted access.
POE access to the FNCS network is permitted only via FNCS Citrix.
Last Modified: 8/21/2014
For Official Use Only
Page 29 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
222
FNCS Network Security Controls
Firewalls, VPN, router-based Access Control Lists (ACL) and audit logs shall be used to
control, restrict, and monitor all network access to any FNCS Network.
The Firewall, VPN and router-based ACLs should be monitored at least on a quarterly
basis by a system administrator. Any discrepancies should be noted and corrected during
the review.
All network traffic between FNCS locations shall be transported on dedicated FNCS/USDA
owned circuits and VPN connections meeting data encryption levels set by FNCS
encryption standards.
At any time, FNCS/USDA may monitor and/or audit user activity and/or network traffic.
Network routers, switches, wireless access points and hubs are points of vulnerability and
need to be managed centrally to ensure manageability, security and reliability.
Unauthorized FNCS Users are not permitted to extend or re-transmit network services.
Connections to the FNCS Network shall automatically lock a user from the network when
15 minutes of inactivity is detected by enabling a password protected screen saver.
223
FNCS Network Restrictions
FNCS offices shall not have Internet connectivity other than the connectivity provided by
FNCS/USDA. Users inside the FNCS firewall may not be connected to the FNCS Network
at the same time they are connected to any other network.
FNCS devices or any devices approved by FNCS shall not be used as a vehicle to gain
unauthorized access to other devices or networks for any illegal, unauthorized or
inappropriate activity.
FNCS employees and contractors are prohibited from remotely accessing the FNCS
network, systems, and any related component of the IT infrastructure from foreign
countries unless prior approval is provided by the CIO. Any unauthorized use from a
foreign country increases the risk of foreign access to information system access and will
result in immediate termination of access to the FNCS network. Additional consequences
may be taken into action depending on the severity of the incident. Please reference
section 170 for International Travel requirements.
FNCS employees and contractors are prohibited from installing and using unapproved
software and mobile code-based products (e.g., Flash, Java, and ActiveX). Unauthorized
software or mobile code installation increases the risk in introducing vulnerabilities onto the
FNCS network. Users may request software installation from an approved software list
established by OIT and distributed via DSB. If a user needs software or mobile code that is
not on the approved software list, the user may submit a service ticket to DSB for OIT
review.
FNCS Users shall only use network Internet Protocol (IP) addresses issued by FNCS.
Selecting or manually entering an IP address to configure a computer network device is
prohibited.
Last Modified: 8/21/2014
For Official Use Only
Page 30 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
The use of private IP addressing behind FNCS firewalls and proxy servers, as well as the
use of Network Address Translation (NAT) is prohibited unless authorized.
An unauthorized deliberate attempt to obtain proprietary (non-public information) FNCS
Network information is prohibited. This applies to all FNCS Network locations, and the
wide area network (WAN).
Unauthorized FNCS users are prohibited from downloading, installing or running security
programs or utilities that reveal weaknesses in the security of a system. FNCS users must
not run password cracking programs, packet sniffers, network mapping tools, or port
scanners while connected in any manner (remotely or internally) to the FNCS Network.
224
How to Request Access to the FNCS Network
After completing the required Information Security Awareness (ISA) training, complete the FNS
User Access Request form, FNS-674. This form can be accessed through the Intranet (E-forms)
or by contacting the Service Desk (IT Customer Support).
If you currently have access to the FNCS Network and need to request access to the
STARS, eDRS, SNAP QCS or FPRS Systems, request a level 2 e-Authentication User ID.
To learn more about e-Authentication, click here.
Attach the ISA training certificate to form FNS-674 and submit to your supervisor for
signature. Submit both documents to the Service Desk. Regional Security representatives
will be notified through the Information Security Office.
Upon approval:
225
o
Users will be notified when access has been granted.
o
Users must report to their corresponding OIT Security Office to obtain an FNCS
network user ID and temporary password.
o
Users must contact the Service Desk and request to have user profiles and Outlook
set-up.
o
Users are provided with and required to read the Rules of Behavior. Pending the type
of access provided, the FNS-674 form is required to be signed.
o
Users may refer to Appendix B of this document for instructions on how to fill out FNS
674 access forms.
How to log on and off the FNCS Network (Internal and Remote)
After receiving an FNCS network user ID and password, the user is required to change the
temporary password immediately. Please see the Access Control Procedure on creating
acceptable passwords.
Prior to logging onto the FNCS network, the user is prompted to read and acknowledge the
Official warning banner. By selecting “ok”, the user has agreed to the terms as outlined in
the official banner. Refusal to agree will mean that the user will not be granted access.
Last Modified: 8/21/2014
For Official Use Only
Page 31 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Users must connect Government-Furnished Equipment (GFE) to the FNCS Network every
30 days for a minimum of 120 minutes to ensure the device receives updates to virus
definitions, operating systems and hot fixes. Computers which are identified as not updated
on a 30 day window will not be allowed to join the network.
To log off the FNCS network, the user must be fully logged onto the FNCS network. Select
the Ctrl-Alt-Del keys simultaneously, when the task manager dialog box is open, choose
“log off”. Also, a user can click the “Start” menu of the Windows Task bar and select the
“Log off” button.
226
How to lock a workstation
While a user is successfully logged onto the FNCS network, their network sessions must be locked
if they leave the work area. Select the Ctrl-Alt-Del keys simultaneously, when the task manager
dialog box is open, choose “lock computer” or on the task bar, select the “lock computer icon”. All
FNCS users are encouraged to shut down their computers at the end of each day. For
workstations using a PIV card, the user must pull out their PIV card to lock station. Each
workstation needs to be locked when a user leaves their workstation.
227
Separation from FNCS
All users are required to send an E-mail to the Security Officers Email Address,
[email protected], when access to a particular computing resource is no
longer required for reasons that may include project completion, work assignment transfers,
retirement, termination, or resignation.
All FNCS supervisors will have their employee’s complete form FNS 677, Final Salary Payment
Report. FNCS employees can request to have their Outlook contacts saved to a CD by the IT
Staff.
All FNCS separating contractors’ CORs will complete form FNS 744, Government Contractor’s
Employee Separation Checklist (GCESC). The COR will ensure that the checklist is completed
with all applicable signatures on the last day of employment.
228
Process for Accessing another User’s Data
Users who require access to another user’s FNCS data may submit a request for access with a
valid business justification.
Request should be submitted with business justification to the Director of Human Resources for
federal employees or to the Contracts Director for contractors.
If you are not the employee/contractor’s COR, the COR should also be CC’ed or be the one to
initiate the communication.
The CISO and CIO should also be CC’ed on the communication; the CISO will make sure the
request is submitted to the Service Desk once all approvals are in place.
Last Modified: 8/21/2014
For Official Use Only
Page 32 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
229
Collaborative Computing Devices
FNCS must ensure that information system prohibits remote activation of computing devices with
expectations identified in the department policy under DM 3530-003 and DM3530-005.
230
Public Key Infrastructure Certificate
FNCS must ensure that public key certificate are issued under identity access and management
policy DM 3530-003 and DM3530-005 and approved by the department.
Last Modified: 8/21/2014
For Official Use Only
Page 33 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on the Protection and Use of Wireless technologies
300
Overview
Wireless is a technology that permits the active transfer of information between separated points
without physical connection. Currently, FNCS permits the use of wireless technologies to connect
to the FNCS Network. Users who connect to FNCS wirelessly must comply with the organizations
rules and regulations regarding wireless technologies.
310
320
References
This guidance is written in accordance with: DM 3300-005 Policies for Planning and
Managing Wireless Technologies in USDA
DN 3300-01 Wireless Communications
Wireless Technology Guidelines
Wireless technology guidelines are intended to help everyone use the FNCS’s Wireless network
responsibly, safely, and efficiently thereby maximizing the availability of these facilities to all
employees.
321
Current State of Wireless Technologies at FNCS
Currently, FNCS does not support a wireless networking infrastructure. GFE with Wi-Fi
capabilities may be used to access Citrix and VPN.
FNCS has approved the use of the following wireless devices/technologies:
o
Smart phone/Personal Digital Assistant (PDA) – Only approved users
o
Government Issued Air Card or MiFi – Only approved users
All wireless services and devices are to be procured through OIT via the Designated Agency
Representative (DAR) and the Telecommunications Mission Area Control Officer (TMACO) only.
322
Home/Commercial Use
Anyone using a home/commercial wireless network to connect to the FNCS Network will comply
with all USDA Wireless policies for securing information. When using a home/commercial wireless
network to connect to the FNCS Network, users must access the FNCS network via VPN or Citrix.
If a user is connected via a wireless network or FNCS approved wireless device, the user is not to
be simultaneously connected to the local FNCS network.
Last Modified: 8/21/2014
For Official Use Only
Page 34 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on Incident Response and Reporting
400
Overview
FNCS must be able to respond to computer security incidents in a manner that protects its
information and helps to protect the information of other Agencies that may be impacted by the
incident.
A security incident is defined to be any adverse event that threatens the security of information
resources. Adverse events include compromises of confidentiality, integrity, and availability of
FNCS IT and telecommunications resources. This guidance will assist FNCS users (employees,
contractors or official visitors) to properly identify, declare and report security incidents.
Refer to the Incident Response Procedures, V1.0 for the detailed incident response procedure.
The document represents the formal documented FNS information security policies and addresses
purpose, scope, roles responsibilities, and compliance as they pertain to information security.
410
References
This guidance is written in accordance with:
420
NIST Special Publication 800-53 Rev.3
NIST Special Publication 800-61 Rev. 2
NIST Special Publication 800-86
DM 3505-000 USDA Computer Incident Response Procedures Manual
Loss of Personally Identifiable Information (PII)
Personally Identifiable Information (PII) refers to information that can be used to distinguish or
trace an individual’s identity. PII can include information or combinations of information such as
social security numbers (in complete or truncated form), place of birth, date of birth, mother’s
maiden name, biometric record, fingerprint, iris scan, DNA, medical history, medical conditions,
financial information, credit card numbers, bank account numbers, etc. USDA is committed to
protecting PII for both employees, contractors and customers.
The following are procedures on how to notify the appropriate authority of any suspected incident
in a timely manner:
During business hours, if there is an actual loss or potential loss of PII, please contact the
security officers’ mailbox at [email protected] or call the OIT Service
Desk: 888-OIT-4FNS.
After normal business hours, please contact the USDA toll-free PII Incident Hotline at 1877-PII-2YOU. The hotline is available 24 hours a day, 7 days a week.
Last Modified: 8/21/2014
For Official Use Only
Page 35 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
421
All Other Incidents
All other incidents should follow the Incident Response procedures as communicated from the
Information Security Office and follow the 702 Handbook for Incident Response Standard
Operation Procedure.
Last Modified: 8/21/2014
For Official Use Only
Page 36 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on Audit & Accountability of the FNCS Network
500
Overview
An audit of FNCS Information Systems consists of a systematic examination to determine whether
or not activities and their associated results comply with Information Systems Security standards
and guidelines.
The purpose of this guidance is to provide details for conducting and implementing the security
audits on FNCS Information Systems. Auditing is the process of identifying problems, and
deficiencies in an information system for the purpose of correcting such issues. Auditing is
necessary to protect information resources from harm or misuse.
Below are common security threats including but not limited to:
Access to confidential data
Unauthorized access to computers
Password disclosure
Detection of Viruses
Denial of Service (DoS)
Open ports, which may be accessible to the public
Use of other IP addresses, not assigned by FNCS
Audits may be conducted to:
Ensure integrity, confidentiality and availability of information and resources.
Assess, analyze, or investigate security incidents.
For systems requiring audit logging and monitoring (typically determined by the business), FNS
requires that at a minimum, failed login events are logged and monitored.
510
References
This policy is written in accordance with:
520
NIST Special Publication 800-53 Rev.3
DM 3535-001 USDA C2 Level of Trust Policy
Audit and Accountability Guidance
It is the responsibility of members from the Information Security Office, System Administrators, and
System Security Officers to:
Create and maintain an auditable events list for each Information System within FNCS.
o
Manage the selection of auditable events to be included in audit logs.
o
Review audit logs at least once a week or when unusual or suspicious activity occurs.
Last Modified: 8/21/2014
For Official Use Only
Page 37 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Protect audit records and audit mechanisms from unauthorized access, modification or
deletion.
The following list is representative of events for auditing and logging on existing hosts,
network devices, and web server that would provide acceptable auditable events:
o
o
o
o
o
o
Date and time of the event, e.g. Time stamps are synchronized, every hour, with a
defined system clock;
Event origin (software/hardware)
Where the event occurred;
Type of event;
User’s identity, if applicable;
Outcome (success or failure) of the event.
Allocate audit storage space to handle the FNCS audit mechanism.
Provide information system alerts for designated personnel when audit record storage has
reached 75% of its capacity.
Authorize and properly trained to post public content onto the Information system to ensure
that information does not contain non-public content. These individuals are responsible for
ensuring that all information to be posted on the Information system has been thoroughly
reviewed and approved prior to posting. If any non-public information is incorrectly posted,
it must be removed from the Information System immediately upon discovery. This control
only applies to an information system that has publicly accessible content.
Provide capabilities to perform monitoring, analysis and reporting of incidents.
Respond to alerts for potential or confirmed security incidents.
Review audit reports to assist in security incident investigations.
Perform audit reviews on a daily basis.
Archive audit logs and maintain for a minimum of three (3) years.
Last Modified: 8/21/2014
For Official Use Only
Page 38 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on Access Control for FNCS Information Systems
600
Overview
In computer security, access controls include authorization, authentication and audit. Access
control protects information by managing access to all entry and exit points, both logical and
physical. Perimeter and logical security measures protect against unauthorized access to
sensitive information stored on the FNCS network or applications.
The purpose of this guidance is to maintain information security by preventing unauthorized
access to FNCS Information systems and data. This guidance is reviewed and updated at least
annually. The Access Control Guidance is written to:
610
Communicate the need for access controls within FNCS.
Establish specific requirements for protecting against unauthorized access.
Define FNCS user privileges, password restrictions and login limitations.
Provide guidelines for Identification and Authentication.
References
This policy is written in accordance with:
620
NIST Special Publication 800-53 Rev.3
DM 3535-001 USDA C2 Level of Trust Policy
FNCS Access Control Guidance
FNCS mainly uses Microsoft Active Directory to manage all information systems that
establish, activate, modify, review, disable, and remove user accounts. eAuthentication
accounts are also used to manage user accounts for externally, and some internally,
accessible web applications.
Accounts that are created, modified, disabled and terminated are to be reviewed as
determined by the system owner. All FNCS information systems must manage information
system accounts by reviewing accounts for compliance with account management
requirements at least annually.
Automated mechanisms should be employed to ensure that account creation, modification,
disabling, and termination actions are audited and, as required, appropriate individuals
must be notified.
Accounts inactive for more than a month are automatically disabled.
System Owners may restrict access to system objects such as: files, directories, devices,
databases and programs based on the identity of the users and/or groups to which they
belong, these controls are Discretionary Access Controls.
FNCS shall establish separation of duties that allow appropriate information system
authorization based on individual or role.
Last Modified: 8/21/2014
For Official Use Only
Page 39 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
An FNCS user may request access to information based on a need-to-know basis. This
will be determined by the executive or manager deemed to be the system owner of the
asset.
FNCS shall implement least privilege (most restrictive settings) that grants users only those
accesses required to perform their duties. User listings which show least privilege settings
for administrators will be updated on an annual basis or as needed after a major update.
FNCS shall establish a limit of three (3) concurrent sessions on high impact systems as
defined by FIPS 199 security baseline categorizations. Currently, no high impact systems
exist at FNS.
FNCS shall establish object reuse capabilities to ensure storage objects/devices that store
SBU information are rendered inaccessible before the object/device is used for other
purposes. All FNCS laptops and workstations will be re-imaged when the device is no
longer used by the FNCS employee or contractor.
621
FNCS Recertification of Access Controls
All system user access lists must be reviewed and recertified at a minimum of once a year
by the System Owner, and/or as needed by the System Owner based on risk. This review
includes all user privilege levels to any or all portions of a system.
Recertification forms can be found on the Intranet (E-Library). Once a recertification is
completed, the signed form must be submitted to the Information Security Office (ISO) and
signed by the ISSM.
640
FNCS Password Guidance
641
General User - Password Guidelines
General users do not have administrative rights on a system or application.
Passwords to any system used for FNCS business are confidential and must not be
shared.
General user accounts shall have passwords with a maximum sixty (60) day age limit and
a minimum one (1) day age limit.
User passwords must be twelve (12) or more characters in length containing upper and
lower case, alphanumeric, and special character combinations (at least one of each).
Dictionary words used for passwords are prohibited.
User accounts are locked after five (5) failed attempts. If this occurs, call the Service Desk
or submit a work order via the IT Customer Support Web portal to report that your account
is locked. Follow instructions given by the Service Desk.
As a routine courtesy, the system will notify the user in advance when passwords will
expire.
Last Modified: 8/21/2014
For Official Use Only
Page 40 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
When prompted, change your password within the allocated time given. A history of 24
previously used passwords are maintained, please do not repeat passwords.
Do not automate passwords through use of function keys, scripts or other methods that
store passwords on systems.
Do not store passwords within near proximity of the workstation, such as underneath the
keyboard, behind the monitor, under the desk, etc.
Please refer to Appendix C for Password Hints.
642
Privileged User - Password Guidelines
Privileged users are users who have administrative type access for all or part of an operating
system or application, e.g. System or LAN Administrator.
Passwords to any system used for FNCS business are confidential and must not be
shared with others.
Privileged account holders will have at least two (2) accounts, one for privileged use and
one for common network use such as e-mail and Internet access.
Privileged accounts will not be e-mail or Internet enabled.
Privileged user accounts shall have passwords with a maximum sixty (60) day age limit
and a minimum one (1) day age limit.
User passwords must be twelve (12) or more characters in length, containing alphanumeric
and special characters.
Dictionary words used for passwords are prohibited.
User accounts are locked after three (3) failed attempts. If this occurs, call the Service
Desk or submit a work order via the IT Help Desk Tracking System, Alloy, to report that
your account is locked. Follow instructions given by the Service Desk.
As a courtesy, the system will notify the Network user prior to the expiration of passwords.
When prompted, change password within the allocated time given.
Do not repeat passwords since the system maintains a history of the last 24 passwords.
Passwords cannot be shared between privileged users.
Do not automate passwords through use of function keys, scripts or other methods that
store passwords on systems.
Once privileged users leave or their accounts are terminated, their access accounts are
disabled.
Last Modified: 8/21/2014
For Official Use Only
Page 41 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
643
Please refer to Appendix C for Password Hints.
Password guidelines for Government-Furnished Wireless PDAs
User passwords must be eight (8) or more characters in length, containing alpha, numeric
and special characters.
The number of incorrect password attempts are currently set to seven (7), if this limit is
exceeded, the device is wiped. If this occurs, contact the Service Desk.
Government Furnished Wireless PDAs must have the USDA mandated security
configuration settings and software installed. These settings are FIPS 140-2 compliant and
users are not allowed to modify or delete these settings.
Lock the device after five (5) minutes of inactivity.
644
Acceptance of PIV Credentials
Multifactor authentication for remote access to FNCS Information Systems, is used for privileged
and non-privileged accounts, such that one of the factors is provided by a device separate from
the system gaining access and the device meets USDA policy for multifactor security
requirements.
645
Device Identification and Authentication
FNCS must ensure that information systems uniquely identify and authenticate components in
inventory that support the ability to connect to outside systems before establishing a remote
and/or network connection.
Last Modified: 8/21/2014
For Official Use Only
Page 42 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on IT Restricted Space and Physical Access Control
700
Overview
The United States Department of Agriculture, Food, Nutrition and Consumer Services houses
and/or processes information relating to the privacy of US citizens, payroll and financial
transactions, proprietary information and life/mission critical data. It is essential that this
information be protected from the risk and magnitude of loss or harm that could result from
inadvertent or deliberate disclosure, alteration or destruction.
FNCS must protect information resources through layered physical security, high logical data
security and effective security procedures and administration. Successful IT security protection
dictates the physical control of restricted space that contains major FNCS computer and
telecommunications resources.
This procedure will define the physical security standards for all IT restricted space(s) located at
FNCS facilities. This procedure includes the physical access control requirements for Computer
Facilities, Telecommunications/Local Area Network (LAN) Rooms, IT equipment storage rooms,
Web Farms, Sensitive Compartmented Information Facility (SCIF) and isolation zones.
710
References
This policy is written in accordance with:
720
NIST Special Publication 800-53 Rev.3
DM 3510-001 USDA Physical Security Standards for IT Restricted Space
GSA Facilities Standards P100
Physical Environment
FNS leases restricted space from General Services Administration (GSA). FNS policy and
procedures for Physical and Environmental Protection adheres to policies and standards provided
through the GSA Facilities Standards, P100, and the USDA Physical Security Standards for
Information Technology Restricted Space, DM 3510-001. Property Management Branch receives
delegated authority for protection of the FNS secured space through GSA.
721
Roles and Responsibilities
The key roles and responsibilities for carrying out the provisions of this Handbook are outlined
below.
722
The FNCS CIO will:
Inform the Property Management Branch of their duties on maintaining and managing user
access to IT restricted space(s).
Approve and implement this procedure.
Review and approve all modifications to this procedure.
Last Modified: 8/21/2014
For Official Use Only
Page 43 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
720
The FNCS Supervisors and point of contacts (POC) will:
Provide contractors and non-FNCS employees with form FNS 767 to complete when
access to IT restricted space is requested.
Ensure form FNS 767 is complete, approved and forwarded to the appropriate System
Owner for approval.
721
The System Owners will:
Authorize user requests for data center access by approving form FNS 767.
Forward form FNS 767 to the Information Security Office (ISO) at
[email protected]
FNCS System Owners are:
o OIT Director of Technology or their representative
722
The Information Systems Security Program Manager (ISSPM) will:
Approve form FNS 767 after the System Owner and Supervisor approval.
Forward form FNS 767 to the Property Management Branch for final processing.
Conduct reviews of all FNCS IT restricted space and ensure they are compliant to physical
security requirements as outlined in DM 3510-001 USDA Physical Security Standards for
Information Technology Restricted Space.
723
The Physical Security Branch will:
Maintain all user access requests to IT restricted space by generating monthly reports of
user access sending them to Operational Security. Operational Security performs audits for
unauthorized access.
Remove access to users who have been inactive for 90 days.
Remove all access for users who have been terminated: FNCS employees, contractors
and others who are no longer at FNCS.
Ensure that all user access requests to IT restricted spaces meet the appropriate security
standards required to receive access.
Block access to IT restricted space for those individuals who lack the required security
authorization.
Perform user recertification, quarterly. See section 725 for details on recertification.
724
FNCS Users will:
Request access to IT restricted space by completing Form FNS 767.
Notify the ISO when access to IT Restricted Space is no longer needed.
Last Modified: 8/21/2014
For Official Use Only
Page 44 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Escort guests who request access to IT Restricted Space and ensure they have signed-in
via the IT restricted space sign-in sheet. Guests include but are not limited to:
o Fire detection personnel
o Alarm system personnel
o Air Conditioning maintenance personnel
o UPS maintenance personnel
o Hardware maintenance personnel
o Software maintenance personnel
o Other Vendors
In the event that the automated system is not functional (power outages, etc.), the
restricted space needs to maintain a log of user access via a manual process such as a
sign-in sheet.
725 IT Restricted Space and User Access Recertification Process (Property Management
Branch)
Step 1: The Facility Management Branch will produce a site-specific list of all users who have
access to FNCS IT restricted space.
Step 2: The Technology Division will review and determine which users need access to IT
restricted space at least on an annual basis or as needed
Step 3: The annual recertification of user access will be performed only for those users
deemed necessary to continue accessing IT restricted space.
Step 4: The Facility Management Branch and the appropriate point of contact from the
Technology Division will take appropriate actions to modify or terminate user access as
indicated by the results of the recertification process.
Step 5: FNCS Management will review and verify results of the recertification and ensure the
Facility Management Branch has the appropriate corrective action plans in place.
Step 6: The Information Security Office will retain all recertification documents for five (5)
years.
Guidance on FNCS Computer Security Awareness and Training
800
Overview
The Federal Information Security Management Act (FISMA) mandates general training of
employees to ensure that they are aware of their security responsibilities; specialized training of
agency employees with significant security responsibilities; and reporting of agency statistics on
security awareness and training efforts.
This procedure will detail plans to develop, conduct and implement computer security awareness
and training as required by USDA and FISMA. This procedure will also provide guidance on
Last Modified: 8/21/2014
For Official Use Only
Page 45 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
reporting and monitoring training and creating an information security training program for
specialized information security professionals at FNCS.
This procedure is applicable to all FNCS employees, contractors and official visitors who engage
in FNCS business.
The procedure is reviewed and updated at least annually.
810
References
This policy is written in accordance with:
NIST Special Publication 800-53 Rev.3
NIST Special Publication 800-16
NIST Special Publication 800-50
DM 3545-001 Computer Security Training and Awareness Policy
820
Information System Security Awareness
The FNCS Information Security Office (ISO) will conduct computer security awareness campaigns
by distributing interactive electronic-based training.
Other informal security awareness promotion will be conducted on a frequent basis in the form of
emails, posters, videos and hard copy reading materials, all designed to encourage information
system security awareness at FNCS.
830
Information Security Awareness (ISA) Training
ISA training is currently implemented annually by USDA.
ISA training consists of an interactive, electronic-based training module that provides computer
security information and assessments of that information.
Basic security awareness training must be provided and completed annually.
All FNCS employees, contractors and official visitors, regardless of their job duties are required to
complete this training with a passing score. If the employee does not pass with a score of at least
70%, the employee may take the training two more times with different versions of the test.
Currently, the ISA training is available on AgLearn. All users must request an eAuthentication ID
then register with AgLearn to access the security training modules. For more information on
eAuthentication follow this link, http://www.eauth.egov.usda.gov/index.html. For additional
information on AgLearn, click here, http://www.aglearn.usda.gov/ .
831
ISA Training Requirements
Information Security Awareness Training requirements are to be included in all new procurement
requests, specifications, statement of work (SOW), grants and cooperative agreements. The
security requirements will detail the appropriate level of training needed based on the job duties,
access and need-to-know.
Last Modified: 8/21/2014
For Official Use Only
Page 46 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
ISA training requirements are to be included in new employee orientation at FNCS. All FNCS
new-hires are required to complete this training prior to receiving access to the FNCS Network.
The ISA training certificate must accompany the Form FNS-674, User Access Request Form.
The FNCS ISO will participate in the annual review and redesign of the security awareness
program and vendors to ensure the training is accurate.
Information systems security professionals are encouraged to request additional training as
needed for their job functions at FNCS.
832
ISA Specialized Training Requirements
In accordance with NIST Special Publication 800-16, Information Technology Security Training
Requirements, the Department mandates that all IT Professionals with specific information security
responsibilities are required to complete IT Security Specialized Training.
As an IT Professional with specific information security responsibilities, once you have been
identified, you will need to complete the annual IT Security Specialized Training. Failure to
complete this training by the deadline may result in the temporary removal of your individual rights,
roles, and responsibilities where those individual attributes impact the security of the system or
application.
833
ISA Training Records
Individual training records, including security awareness training certificates and specific
information systems security records are retained for a minimum of one year.
Last Modified: 8/21/2014
For Official Use Only
Page 47 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on System Certification and Accreditation (C&A)
900
Overview
OMB Circular A-130, Appendix III and the Federal Information Security Management Act (FISMA)
requires that all federal agencies institute an agency-wide information security program to provide
information security for information and information systems that support the operations and
assets of the agency. This includes those systems provided or managed by another agency,
contractor, or other source. All USDA agencies shall institute a comprehensive assessment of the
management, operational, and technical security controls in an information system to determine
the extent to which the controls are implemented correctly, operating as intended and producing
the desired outcome with respect to meeting a specified set of security requirements for the
system. These actions are referred to as system certifications. Certification supports the official
management decision given by a senior agency official to authorize operation of an information
system and to explicitly accept the risk to agency operations, agency assets or individuals based
on the implementation of an agreed-upon set of security controls. This decision is referred to as
system accreditation.
All USDA IT systems require certification and accreditation prior to the system becoming
operational. The Designated Accrediting Authority (DAA) makes formal accreditation
determinations. This action supports the regulatory requirement that every USDA system must
have official approval to operate. Please see the USDA definition of a “System”.
910
References
This Guidance is written in accordance with:
NIST Special Publication 800-53 Rev.3
NIST Special Publication 800-37
USDA Certification and Accreditation Guide, Appendix A
USDA DM 3540-001 Risk Assessment Methodology
FIPS Publication 199
920
Roles and Responsibilities
This sections details the responsibilities of all teams and individuals who are impacted by or
involved in system C&As. System owners will be responsible for developing Phase I C&A
documents.
921
The CIO will:
In coordination with the System Owner, determine when a C&A is needed for a system
after a major change has occurred.
Act as the Certifying Official for FNCS. As appropriate, the CIO may delegate this
responsibility to a Security Officer, but must continue to recognize their accountability in
that delegation.
Last Modified: 8/21/2014
For Official Use Only
Page 48 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
922
The System Owner will:
Represent the user community and IT system throughout the systems’ life cycle.
Ensure the system is delivered and operating in accordance with the security controls
documented in the security plan.
Uphold training requirements by ensuring system users and security support personnel
receive security training.
Work with the IT Project Manager (ITPM) throughout the C&A process.
Create POA&Ms for deficiencies along with milestone dates and submit to the ISSM/ITPM.
923
The IT Project Manager (ITPM) will:
In coordination with the ISO, maintain the C&A schedule for all existing systems.
Notify the Systems Owners of upcoming C&As.
Oversee the system maintenance, operation and disposal.
Submit the completed C&A documents to the ISO templates to System Owners for each
phase of the C&A.
Perform a preliminary review of the C&A documents.
Provide updates to the ISO on the system’s C&A progress.
Report suggested changes to C&A documents from the ISO to the System Owners.
Work with ISO to ensure security controls based on NIST 800-53, are included in system
documentation.
924
The Designated Accrediting Authority (DAA) will:
Accredit systems for operation.
Act in the role of Business Owner to a system being certified.
Assume the responsibility for the residual risks of operation of the systems.
Approve security requirements documents, memoranda of agreement (MOA), memoranda
of understanding (MOU) and any deviations from security policies.
Commitment memos will be issued by the system owner to the Department on C&A
completion dates.
Last Modified: 8/21/2014
For Official Use Only
Page 49 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
925
The Certification Team will:
(The ITPM and ISSM determine if this team is needed for the C&A).
Identify, assess and document the risks associated with the operating system.
Coordinate C&A activities and consolidate the final C&A package.
Assess the vulnerabilities in the system.
Determine if the security controls are correctly implemented and effective.
Identify the level of residual risk to the system.
926
The Security Test and Evaluation Team (ST&E) will:
Receive approval by the Certifying Official (CO) prior to commencement of the C&A.
Consist of individuals independent of the IT infrastructure and business function.
Members of the ST&E team have not been involved in development of the system.
Members of the ST&E team have not been involved in other certification activities such as
writing the System Security Plans (SSP) and conducting the risk assessments.
Perform the security control assessment on the system to validate the results of the risk
assessment.
Create POA&Ms for deficiencies found, if any, during the evaluation.
Validate that the controls listed in the SSP are present and in operation.
Update the SSP, if needed.
Update the Risk Assessment, if needed.
927
The ISSM will:
Monitor the physical, personnel, incident handling, security awareness and training needs
of a system on a daily basis.
Identify the pending system or environment changes that may necessitate re-certification
and re-accreditation of the system.
Serve as the principal technical advisor to the ITPM for all security-related issues.
Last Modified: 8/21/2014
For Official Use Only
Page 50 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on Certification and Accreditation (C&A) of Information Systems at FNCS
930
General Information
1. C&A’s are initiated upon the creation of a new system application.
2. All systems going through a C&A must undergo FIPS 199, Privacy Impact Assessment,
Privacy Threshold Analysis, Configuration Management Plan, Contingency Plan and must
address each control in the System Security Plan.
3. If a system undergoes a major change, it may need to undergo a full C&A by direction of
the CIO.
4. C&As are performed for both General Support Systems (GSS) and Major Applications.
5. Refer to the Child System and Application Assessment Policy, V1.0 for determining if a
system is a parent or a child. The document represents the formal documented FNS
information security policies and addresses purpose, scope, roles responsibilities, and
instructions of assessment and the categorization of an application.
6. Systems may use a modified C&A process if their system categorization rating is “low” in
all three of the assessment categories; confidentiality, availability and integrity.
7. The C&A process consists of three phases:
Phase 1: Pre-certification
Phase 2: Certification and Accreditation
Phase 3: Post Accreditation
8. Cyber Security Assessment and Management
The Cyber Security Assessment and Management Tool (CSAM) is a web-based tool
which is used to achieve FISMA compliance for in-scope systems. The CSAM tool
performs the following functions within the C&A process:
CSAM provides risk-based policy and implementation guidance. The tool references
controls mentioned in NIST Special Publications 800-53 and 800-53A in which users
can document test cases and results for financial and other high-impact systems.
The user documents the applicable, inherited, and hybrid controls for the applicable
system. After this process is complete, the concurrency reviewer adds any revisions
and comments to the classification of controls. Once the comments are addressed,
Phase 1 is complete.
When Phase 2 is initiated, documents such as the System Security Plan, Risk
Assessment, and the Security Assessment Report (refer to section 933 for more
information) are updated within the CSAM tool. Any certification findings are reported.
Before initiating Phase 3, the final accreditation decision is uploaded within CSAM as
well.
Last Modified: 8/21/2014
For Official Use Only
Page 51 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
931
The CSAM tool allows for the monitoring of current and upcoming in-scope applications
which require an update of C&A documentation.
Phase 1 Pre-certification (Initiation, Acquisition/Development Phase of the SDLC)
The following steps details what is needed in the pre-certification phase of a C&A:
Step 1: Define the Scope
A. The Certification Team gathers all available system information needed to define the scope
of the C&A and provide a detailed description of the system. Key C&A participants agree
on the scope and schedule the C&A Activities.
B. Determine the security categorization for the system and document this by using Table 1-1
as a guide to determining the risk levels (low, moderate, high) for each level of concern for
Confidentiality, Availability and Integrity. If the security categorization rates this system as
a low impact system, only complete phase 1 of the certification.
C. Select the team that will perform the security control assessment and inform the CO. The
CO approves the security control assessment team and ensures they are independent of
FNCS OIT.
Last Modified: 8/21/2014
For Official Use Only
Page 52 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
932
Level of Concern for Confidentiality, Integrity and Availability (CIA)
Level of Risk
LOW
MODERATE
HIGH
The unauthorized
disclosure of information
could be expected to
Preserving
have a limited adverse
authorized
effect on agency
restrictions on
information access operations (including
mission, functions,
and disclosure,
including means for image, or reputation),
protecting personal agency assets, or
individuals. A loss of
privacy and
confidentiality could be
proprietary
expected to cause a
information.
negative outcome or
result in limited damage
[44 U.S.C §3542]
to operations or assets,
requiring minor
corrective repairs.
The unauthorized
disclosure of information
could be expected to
have a serious adverse
effect on agency
operations (including
mission, functions,
image, or reputation),
agency assets, or
individuals. A loss of
confidentiality could be
expected to cause
significant degradation
in mission capability,
place the agency at a
significant disadvantage,
or result in major
damage to assets,
requiring extensive
corrective actions or
repairs.
The unauthorized
disclosure of information
could be expected to
have a severe or
catastrophic adverse
effect on agency
operations (including
mission, functions,
image, or reputation),
agency assets, or
individuals. A loss of
confidentiality could be
expected to cause a
loss of mission
capability for a period
that poses a threat to
human life, or results in
a loss of major assets.
The unauthorized
modification or
destruction of
information could be
expected to have a
limited adverse effect
on agency operations
(including mission,
functions, image, or
reputation), agency
assets, or individuals. A
loss of integrity could be
expected to cause a
negative outcome or
result in limited damage
to operations or assets,
requiring minor
corrective actions or
repairs.
The unauthorized
modification or
destruction of
information could be
expected to have a
serious adverse effect
on agency operations
(including mission,
functions, image, or
reputation), agency
assets, or individuals. A
loss of integrity could be
expected to cause
significant degradation
in mission capability,
place the agency at a
significant disadvantage,
or result in major
damage to assets,
requiring extensive
corrective actions or
repairs.
The unauthorized
modification or
destruction of
information could be
expected to have a
severe or catastrophic
adverse effect on
agency operations
(including mission,
functions, image, or
reputation), agency
assets, or individuals. A
loss of integrity could be
expected to cause a
loss of mission
capability for a period
that poses a threat to
human life, or results in
a loss of major assets.
Confidentiality
Integrity
Guarding against
improper
information
modification,
destruction, and
includes ensuring
information nonrepudiation and
authenticity.
[44 U.S.C. §3542]
Last Modified: 8/21/2014
For Official Use Only
Page 53 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Level of Risk
LOW
The disruption of access
to information could be
Ensuring timely and expected to have a
limited adverse effect
reliable access to
on agency operations
and use of
(including mission,
information.
functions, image, or
reputation), agency
[44 U.S.C. §3542]
assets, or individuals. A
loss of availability could
be expected to cause a
negative outcome or
result in limited damage
to operations or assets,
requiring minor
corrective repairs.
Availability
MODERATE
HIGH
The disruption of access
to information could be
expected to have a
serious adverse effect
on agency operations
(including mission,
functions, image, or
reputation), agency
assets, or individuals. A
loss of availability could
be expected to cause
significant degradation
in mission capability,
place the agency at a
significant disadvantage,
or result in major
damage to assets,
requiring extensive
corrective actions or
repairs.
The disruption of access
to information could be
expected to have a
severe or catastrophic
adverse effect on
agency operations
(including mission,
functions, image, or
reputation), agency
assets, or individuals. A
loss of availability could
be expected to cause a
loss of mission
capability for a period
that poses a threat to
human life, or results in
a loss of major assets.
Table 2 – Level of Concerns for CIA – FIPS 199
Step 2: Identify Security Controls and Construct a Compliance Matrix (High, Moderate, and
Low Systems)
A. Identify all security controls for the system. Include those already specified in the SSP.
B. Review system privacy implications in preparation for the Privacy Impact Assessment (PIA)
and Systems of Records Notice (SORN), if applicable.
C. Ensure all security controls are compliant with USDA Cyber Security Polices, 3500 series,
OMB A-130 and NIST SP 800-53(FISMA).
D. Include management, operational, technical, environmental and physical controls.
E. List each security control and reference where the security control was derived and
whether the control was implemented.
Last Modified: 8/21/2014
For Official Use Only
Page 54 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Compliance
No.
Security Control
Comments
Yes
No
Other
Management Controls
1.
(Example) The organization
develops, disseminates, and
periodically reviews/updates: (i)
formal, documented, security
assessment and certification and
accreditation policies that address
purpose, scope, roles,
responsibilities, and compliance; and
(ii) formal, documented procedures
to facilitate the implementation of the
security assessment and certification
and accreditation policies and
associated assessment, certification,
and accreditation controls.
Y
NIST SP 800-53, Rev. 2, Appendix
F CA-1
Table 3 – Security Controls and References
Step 3: Conduct a PIA and, if required, complete a Systems of Records Notice (SORN)
(High, Moderate and Low) Systems
A. Determine the impact that this system may potentially have on an individual’s privacy.
B. Complete the PIA and SORN if needed.
Step 4: Review the SSP for (High, Moderate and Low) Systems
A. Ensure the existing SSP accurately follows the methodology as documented in NIST 80018, Guide for Developing Security Plans for IT Systems.
B. Review all documents and ensure they have the most current system configurations.
C. Review the Interconnection Service Agreement (ISA), if applicable.
Step 5: Review the Initial Risk Assessment (High, Moderate and Low) Systems
A. The risk assessment will list all apparent threats and vulnerabilities.
Last Modified: 8/21/2014
For Official Use Only
Page 55 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
B. Ensure the risk assessment is compliant with the USDA Risk Assessment Methodology,
DM 3540-001 and NIST SP 800-30.
C. Compare the initial risk assessment to the security requirements during development of the
system.
D. Update the risk assessment each time there is a change to the security controls that may
cause further risk to the system.
Step 6: Review the Interconnection Security Agreement (ISA)
A. The ISA is initially drafted during the Initiation Phase of the SDLC.
B. An ISA must be completed for each system that connects to the new systems.
Step 7: Negotiations with the C&A Participants
A. All participants involved in the C&A process should meet to review all of the documentation
created thus far. Those involved will be the DAA, CO, Program Manager, System Owner
and Certification Teams.
B. The Security Categorization should be verified for accuracy.
C. At this time the SCCM should be reviewed to ensure all Security Controls accurately reflect
the security requirements for this system.
933
Phase 1 C&A Documents
The following documents are created during or prior to Phase 1 of the C&A process. Some
documents may not apply based on the result of the Security Categorization:
Scope
Security Categorization Document
System Security Plan
Contingency Plan
Contingency Exercise Handbook
Disaster Recovery Test Plan
Rules of Behavior
Plans of Actions & Milestones
Security Controls Compliance Matrix
Privacy Impact Assessment
System of Record Notice
Initial Risk Assessment
Configuration Management Plan
Privacy Threshold Analysis
eAuthentication Risk Assessment
Interconnection Security Agreement
Concept of Operations
Last Modified: 8/21/2014
SCD
SSP
CP/DRP
DRTP
RoB
POA&Ms
SCCM
PIA
SORN
RA
CMP
PTA
ISA
CONOPS
For Official Use Only
Page 56 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Appendix S – Hardware Listing
Appendix T – Software Listing
For more information on the C&A documents, see Appendix D
934
Phase 2 Certification and Accreditation
The following steps detail what is needed to perform a certification and accreditation:
Step 1: Conduct a Security Control Assessment (Acquisition/Development
Phase of the SDLC)
A. The Security Control Assessment Team evaluates the effectiveness of security controls
through hands-on testing. FNCS uses a third-party Contractor to perform Security Control
Assessments.
B. The Security Control Assessment consists of three steps:
1. Create Security Assessment Plan
Derive test objectives from the Security Controls
Create test procedures for each objective
2. Execute the test procedures
Perform technical testing
Interview Staff on the security controls
Review System documentation
Observe System Operations
Test and execute a Contingency Plan
3. Document the test results
Document the test results
Recommend countermeasures for identified findings
Step 2: Update the Risk Assessment (High & Moderate) Systems
A. The results of the Security Control Assessments are used to review and update the risk
assessment and determine any risk that may remain.
B. Updates to the Risk Assessment will be in the form of an addendum to the original Risk
Assessment.
C. Refer to the USDA Risk Assessment Methodology
http://www.ocio.usda.gov/directives/doc/DM3540-001.pdf and NIST SP 800-30 to ensure
all areas of the risk assessment are completed.
D. Updates to the Risk Assessment should include the following steps:
Review the list of threats to include: hackers, malicious insiders, attacks against the
system facility and natural disasters.
Last Modified: 8/21/2014
For Official Use Only
Page 57 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Assess vulnerabilities for each system and evaluate the likelihood that the identified
threat may exploit vulnerability.
Assess the possible impact to the system and agency if the vulnerability was exploited.
Determine if there is a likelihood that the threat will exploit the vulnerability and the
impact that would result.
Evaluate the risks of all identified vulnerabilities to determine an overall level of risk for
the system or application.
Step 3: Update the System Security Plan (SSP), ISA and PIA
A. The SSP should be updated to reflect the results of the Security Control Assessment and
final risk assessment.
B. During this phase, there should be updates to the PIA and ISA.
C. Update the Document Certification Findings
Step 4: Document Certification Findings In this step, the following certification activities are to
be completed.
A. The Certification Team documents all findings in the Security Evaluation Report (SER).
The SER includes all findings from the Security Control Assessment and Risk Assessment.
B. The Certification Team creates and submits the certification package. The certification
package is forwarded to the CO for review. The package includes:
SCCM
Security Control Assessment
ISA
PIA
SORN
Risk Assessment
System Security Plan (SSP)
Security Evaluation Report
C. The CO evaluates the risks and issues in the SER and reviews the other documents in the
certification package.
D. When the CO has completed the review, a certification statement is created and states the
extent to which the system meets its security requirements.
E. At this time, the CO provides a recommendation for an accreditation decision.
F. The certification statement and SER are forwarded to the Associate Chief Information
Officer for Cyber Security (ACIO-CS) via the ISSPM for a mandatory concurrence.
G. If the ACIO-CS concurs, the CO forwards the certification package to the DAA with the
accreditation decision.
Last Modified: 8/21/2014
For Official Use Only
Page 58 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Step 5: Accreditation Decision In this step, the accreditation decision occurs:
A. Based on the evaluation of the residual risk, the COs recommendation and the ACIO-CS
concurrence.
B. The DAA will grant system accreditation or deny it.
C. The accreditation decision is documented in the final accreditation package which consists
of the accreditation letter and supporting documentation.
935
Phase 2 C&A Documents
The following documents are created and/or updated during Phase 2 of the C&A process.
Certification Package:
o SCCM
o Security Assessment Report
o Plan of Action and Milestones
o ISA
o PIA, if applicable
o SORN, if applicable
o Risk Assessment
o System Security Plan
o Security Evaluation Report
Certification Statement
Final Accreditation Package:
o Accreditation Letter
o Supporting documents
o Rationale for the accreditation decision
IT Contingency Plan and Disaster Recovery Plan (DRP)
Trusted Facilities Manual (TFM)
For a detailed description of each document, see Appendix D.
936
Phase 3 Post-Accreditation
Once an ATO is obtained following successful completion of the C&A process; the new C&A
system will enter the continuous A&A process going further. A C&A will only be needed if the
system is undergoing major changes warranting a full security assessment. Once the A&A process
has been fully implemented, the decision to complete a full C&A will be made by the DAA, with the
support of the CIO.
Last Modified: 8/21/2014
For Official Use Only
Page 59 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on Assessment and Accreditation (A&A) of Information Systems at FNCS
Security Assessment and Authorization
950
Overview
The Office of the Chief Information Officer (OCIO), Agriculture Security Operations Center
(ASOC), Oversight Compliance Division (OCD) provides oversight for the United States
Department of Agriculture’s (USDA) Assessment and Authorization (A&A) program, formerly
known as the Certification and Accreditation (C&A) program. The program is based on guidance
provided in the National Institute of Standards and Technology (NIST) Special Publication (SP)
800-37 Revision (Rev.) 1, Guide for Applying the Risk Management Framework to Federal
Information Systems: A Security Life Cycle Approach; mandates identified in the Federal
Information Processing Standards (FIPS) Publication (Pub)199, Standards for Security
Categorization of Federal Information and Information Systems; FIPS Pub 200, Minimum Security
Requirements for Federal Information and Information Systems; and USDA enhancements
created to accommodate the Department’s environment.
The intent of the Continuous A&A process is to evaluate Information Technology (IT) systems
against documented specific information security requirements, verify information security control
test results, summarize the residual risk, and involve the Department’s senior management (the
System Owner and the Authorizing Official (AO)) in the security lifecycle of the system. Each
system will go through the Continuous A&A process every year, but only 1/3 of their controls will
be tested each year.
This guide is designed to lead System Owners and certification and risk assessment teams
through the USDA's Continuous A&A process. It provides a basic understanding of the process
steps and examples of what information to input (system information and documents) into the
Cyber Security Assessment Management System (CSAM).
(USDA Six Step Risk Management Framework (RMF) Process Guide, 2012)
960
References
This Guidance is written in accordance with:
NIST SP 800-37 Rev 1
FIPS Publication 199
FIPS Publication 200
This sections details the responsibilities of all teams and individuals who are impacted by or
involved in system C&As. System owners will be responsible for developing Phase I C&A
documents.
970
The CIO will:
In coordination with the System Owner, determine when a Continuous A&A is needed for a
system after a major change has occurred.
Act as the Certifying Official for FNCS. As appropriate, the CIO may delegate this
responsibility to a Security Officer, but must continue to recognize their accountability in
that delegation
Last Modified: 8/21/2014
For Official Use Only
Page 60 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
971
The System Owner will:
Represent the user community and IT system throughout the systems’ life cycle.
Ensure the system is delivered and operating in accordance with the security controls
documented in the security plan.
Uphold training requirements by ensuring system users and security support personnel
receive security training.
Work with the IT Project Manager (ITPM) throughout the Continuous A&A process.
Create POA&Ms for deficiencies along with milestone dates and submit to the ISSM/ITPM.
972
The IT Project Manager (ITPM) will:
In coordination with the ISO, maintain the Continuous A&A schedule for all existing
systems.
Notify the Systems Owners of upcoming Continuous A&As.
Oversee the system maintenance, operation and disposal.
Submit the completed A&A documents to the ISO templates to System Owners for each
phase of the Continuous A&A.
Perform a preliminary review of the Continuous A&A documents.
Provide updates to the ISO on the system’s Continuous A&A progress.
Report suggested changes to Continuous A&A documents from the ISO to the System
Owners.
Work with ISO to ensure security controls based on NIST 800-37 rev 1, are included in
system documentation.
973
The Designated Accrediting Authority (DAA) will:
Accredit systems for operation.
Act in the role of Business Owner to a system being certified.
Assume the responsibility for the residual risks of operation of the systems.
Approve security requirements documents, memoranda of agreement (MOA), memoranda
of understanding (MOU) and any deviations from security policies.
974
The Authorization Team will:
Identify, assess, and document the risks associated with the operating system.
Coordinate Continuous A&A activities and consolidate the final Continuous A&A package.
Last Modified: 8/21/2014
For Official Use Only
Page 61 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Assess the vulnerabilities in the system.
Determine if the security controls are correctly implemented and effective.
Identify the level of residual risk to the system.
975
The Security Test and Evaluation Team (ST&E) will:
Receive approval by the Certifying Official (CO) prior to commencement of the Continuous
A&A.
Consist of individuals independent of the IT infrastructure and business function:
o
Members of the ST&E team have not been involved in development of the system.
o
Members of the ST&E team have not been involved in other certification activities such
as writing the System Security Plans (SSP) and conducting the risk assessments.
Perform the security control assessment on the system to validate the results of the risk
assessment.
Create POA&Ms for deficiencies found, if any, during the evaluation. POA&Ms will be
created after discussing potential weaknesses with System Owner and their representative.
Validate that the controls listed in the SSP are present and in operation.
Update the SSP, if needed.
Update the Risk Assessment, if needed.
976
The ISSM will:
Monitor the physical, personnel, incident handling, security awareness and training needs
of a system on a daily basis.
Identify the pending system or environment changes that may necessitate re-certification
and re-accreditation of the system.
Serve as the principal technical advisor to the ITPM for all security-related issues.
977
Additional Continuous A&A Guidance
FNCS follows the six step approach to achieve an Authority to Operate (ATO) and to effectively
manage risk for their systems. FNCS uses the Cyber Security Assessment and Management
(CSAM) as its automated FISMA management tool and the system of record to capture system
information throughout the A&A process. At USDA, all system information, documentation, and
assessment results require recording in CSAM
978
General Information
1. Continuous A&As are performed every year
Last Modified: 8/21/2014
For Official Use Only
Page 62 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
2. Only 1/3 of the controls and the USDA selected “Key” controls will be tested
3. Continuous A&As will be performed every year
4. Systems may use modified Continuous A&A process if their system categorization rating is
“low” in all three of the assessment categories; confidentiality, availability and integrity
5. The Continuous A&A process consist of six (6) steps:
5.1.
Step 1- Categorize the Program/System
5.2.
Step 2 - Select Security Controls
5.3.
Step 3 – Implement Security Controls
5.3.1.
Step 3a – Implement Security Controls
5.3.2.
Step 3b – Concurrency Review
5.4.
Step 4 – Assess Security Controls
5.4.1.
Step 4a – Assess Security Controls
5.4.2.
Step 4b – Submit the Package for Final Concurrency Review
5.5.
Step 5 – Authorize Information System
5.6.
Step 6 – Monitor Security Controls
979
Step 1: Categorize the Program/System
Step 1 of the RMF focuses on the collection of general system information, completing the Privacy
Threshold Assessment (PTA), Privacy Impact Assessment (PIA) and completion of the FIPS 199
system categorization. This collected information includes the mission, environment, boundary
definition, architecture, and information the system transmits or processes. The system owner is
responsible for completing the categorization and may require the participation of the information
system security officer or others as needed.
Requirements for All
Systems/Programs
Collect general system information
Create CSAM entry and enter information
Create PTA and upload to CSAM
Perform security categorization
Enter remaining information in CSAM
System Identification (Purpose, attributes,
funding, etc.) and Narratives (System
description and Technical description)
Potential Additional
Requirements
Perform PIA and upload to CSAM
Perform E-Authentication Risk
Assessment and upload to CSAM
(under Appendix G5: E-Auth Risk
Assessment OMB M04-04)
Table 4 – RMF Step 1 Requirements (Categorization)
Last Modified: 8/21/2014
For Official Use Only
Page 63 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Below is the overall process for RMF Step 1.
Begin Step 1
Process 1.1
Collect system information
• Is the data contained in system correct?
• PTA/PIA reviewed by Privacy Office?
• Does categorization reflect data risk?
Process 1.2
Perform PTA and the PIA, if required
Categorization
System Owner
accepts
categorization
(H,M,L)
Process 1.3
Perform the system categorization
‐
Step 1
Contact System Owner
and resolve issues
Yes
No
Begin Step 2 – Select
security controls
Figure 1 – RMF Step 1 Process (Categorization)
980
Step 2: Select Security Controls
Just as FIPS 199 and NIST 800-60, Rev. 1 are mandatory for the categorization of information
systems, FIPS 200 and NIST 800-53, Rev. 3 are mandatory for the selection of the corresponding
security control baselines. Once the FIPS 199 security categorization of the information system is
documented in CSAM, the corresponding set of controls (high, moderate or low) will automatically
be selected for the information system within CSAM. This security control baseline must then be
tailored within CSAM to include the selection of inherited controls and the documentation of the
implementation of each control
Requirements for All
Systems/Programs
Potential Additional
Requirements
Identification of all common/inherited
controls
Compliance descriptions identified for every
control including tailoring
Create any needed compensating controls
Develop Contingency Plan (CP), CP test
training and testing documents
Last Modified: 8/21/2014
508 Compliance
System of Record Notice (SORN)
Configuration Management Plan(CMP)
Incident Response Plan (IRP)
Disaster Recovery Plan (DRP)
Interconnection Security Agreement
(ISA) (Optionally this could be in the
form of a Memorandum of
Understanding (MOU) or Service Level
Agreement (SLA) )
For Official Use Only
Page 64 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Table 5 – RMF Step 2 Requirements (Select Security Controls)
Below is the overall process for RMF Step 2.
Begin Step 2
Process 2.1
Identify common controls
• Common controls available?
• All controls documented?
• SSP accepted by System
Owner?
Process 2.2
Tailor controls and document in
CSAM
Process 2.3
Develop a strategy to monitor
the controls
System
Owner
Accepts SSP
Contact System Owner
and resolve issues
No
Yes
Begin Step 3
Implement security
controls
Figure 2 – RMF Step 2 Process (Select Security Controls)
Step 2 focuses on completion of the compliance descriptions in CSAM for all security controls. The
documentation includes the identification of all common controls, selection and documentation of
the remaining controls, and any tailoring or compensating controls.
At USDA, identification of the controls the system can inherit is the responsibility of both the
common controls provider and the system owner and/or ISSO/ISSPM. In the case of Department
Program Management controls, this may involve the Department’s CIO and/or CISO. The
common controls provider must publish what controls are inheritable in CSAM and may also have
them listed in other documents that are required by the data centers and/or other service
providers. The controls are then formally documented as an appendix to the ISA which is then
confirmed by signature by the common controls and/or data center provider.
981
Step 3a: Implement Security Controls
Step 3 focuses on the implementation of security controls during system development and/or after
the system has been completed. Implementation of the security controls is the responsibility of the
System Owner and/or the common controls provider where controls are inherited. Once the
controls are implemented, the SSP compliance descriptions, CP, CMP and IRP should be finalized
to capture the true “as-built” implementation. A CMP, IRP, and CP may need to be developed for
the system unless these are covered under another plan elsewhere in the hosted environment.
Last Modified: 8/21/2014
For Official Use Only
Page 65 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Potential Additional
Requirements
Requirements for All Systems
Finalize SSP compliance descriptions
Finalize CP
508 Compliance
Finalize CMP, IRP and DRP (If required)
Table 6 – RMF Step 3 Requirements (Implement Security Controls)
Below is the overall process for RMF Step 3a.
Figure 3 – RMF Step 3 Process (Implement Security Controls)
982
Step 3b: Concurrency Review
When the SSP is complete, it needs to be submitted for Step 3 concurrency review. The user
submits an email to the concurrency review team at [email protected] stating the
package is ready for review in CSAM.
This concurrency review is primarily for the security plan and the categorization; however, the
supporting documents (CP, CMP, ISA, PTA, and/or PIA) that are present at the time of the review
will also be reviewed. If the concurrency review team finds any issues with the documentation,
they will notate the issues in the concurrency review checklists and return the checklists to the
agency. The key items for the Step 3 review are the system categorization and the security plan.
Since Issues with the remaining documents do not have a significant effect on testing they can be
addressed concurrently with performing Step 4 testing. The checklists utilized for concurrency
review are located in Appendix C.
Last Modified: 8/21/2014
For Official Use Only
Page 66 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
The result of the concurrency review is either passage of the system to Step 4 (Assess Security
Controls), or the documentation is returned for further refinement with a checklist of items to
remediate. Agencies cannot proceed to Step 4 until notified via concur memo that the system has
successfully completed the Step 3b concurrency review. If the documentation is returned with a
remediation checklist noting issues identified with the security plan, system categorization or other
documents to be addressed, the system must be re-submitted to the concurrency review manager
for verification that the issues have been adequately addressed.
Upon satisfactory completion of concurrency review, the concurrency review manager will ensure
that the RMF Step 3 concur memo is issued. Once the RMF Step 3 concur memo is issued, the
SSP shall not be modified without first discussing the changes with the COE liaison and the
concurrency review team. The SSP should not be unilaterally modified by the System Owner until
after the Program/system is authorized to operate
983
Step 4: Assess Security Controls
The purpose of this step is to determine the extent to which the security controls in the information
system are implemented correctly, operating as intended, and producing the desired outcome with
respect to meeting the security requirements for the system. This step also addresses specific
actions to be taken or planned to correct deficiencies in the security controls, and to reduce or
eliminate known vulnerabilities in the information system.
Please note that the RMF Step 4 (Assessment) for moderate/high systems must be performed by
a different (independent) entity than the one utilized for RMF Steps 1-3 (Documentation and
Implementation).
The term independent assessor is defined as follows:
An independent assessor is one who is impartial and not influenced by the system owner
or their direct staff during the conduct of the assessment of security controls or the
reporting of the results.
Independent assessors and/or assessment teams may be in-house permanent teams or
outsourced as needed. However the services are performed, strict measures must be put
in place to obtain an impartial assessment result.
To obtain impartiality, the system owner should not be directly involved in the management
of, or contracting for, the assessment services. If this cannot be done, the system owner
must put in place strict measures and/or contracting language to ensure that they cannot
influence said assessment services.
The assessor (contractor’s company) cannot be directly or indirectly involved in the
development, management, or operation of the security controls to be assessed.
If a system is working through RMF steps 4 through 6 for the first time, assessment of this
system must be performed by a different contractor than the one that performed RMF steps
1 through 3.
An independent assessor or ISO team must ensure that Plans of Actions and Milestone
(POA&M) are developed for information that document the planned remedial actions to
correct weakness or deficiencies noted during assessment and to reduce and eliminate
known vulnerabilities in the system.
Last Modified: 8/21/2014
For Official Use Only
Page 67 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Tasks Performed by Certifier
System Owner Requirements
Provide certification coordination
Develop Security Assessment Plan
with Certifier
Assess security controls
Ensure support system
Analyze findings / quantify results
Develop/update Plans of Action and Milestones
(POA&Ms)
administration personnel are
available during testing
Ensure system is ready for testing
Table 7 – RMF Step 4 Tasks (Assess Security Controls)
Below is the overall process for RMF Step 4.
Figure 4 – RMF Step 4 Process (Assess Security Controls)
984
Step 4b Submit the Package for Final Concurrency Review
The system owner/ISSPM/CISO sends an email to the concurrency review team at
[email protected] stating the package is ready for review in CSAM. The
concurrency review team will review the system’s Step 4 documentation against the concurrency
review checklists for compliance with NIST and Departmental standards. This concurrency review
covers all Continuous A&A package documents. At the conclusion of the concurrency review
process, the System Owner/Authorizing Official will receive either a concur memorandum from
Last Modified: 8/21/2014
For Official Use Only
Page 68 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
OCD with a recommendation to proceed to authorization or one or more checklists listing items
that must be remediated and re-reviewed prior to the issuance of a concur memorandum
985
Step 5 Authorize Information System
During Step 5, the required evidence is produced to provide the AO with the information needed to
make an informed risk based decision. The residual risk report documents the risk determined for
the vulnerabilities found during assessment of the security controls. The subsequent POA&Ms
include costs and remediation plans.
Tasks Performed by
System Owner (SO)
Authorizing Official (AO)
Remediate AO identified issues if
Review/validate risk, POA&M and ATO
necessary to achieve ATO
constraints with System Owner
E-mail ATO letter to
Generate authorization
[email protected] and
recommendation or denial with System
owner involvement
request to update the restricted ATO field
in CSAM
Table 8 – RMF Step 5 Tasks (Authorize Security Controls)
During authorization, the certification official or ISSPM gathers the key Continuous A&A package
documents (Step 4 concur memorandum, POA&M, Security Assessment Report, and SSP) for the
AO/DAA to make a decision concerning the authority to operate (ATO). The AO/DAA weighs any
remaining vulnerabilities and risks of system operation and then determines what residual risk to
accept, what remedial actions are required (i.e., POA&Ms), and whether or not to issue an ATO.
Last Modified: 8/21/2014
For Official Use Only
Page 69 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Below is the overall process for RMF Step 5.
Figure 5 – RMF Step 5 Process (Authorize Security Controls)
Last Modified: 8/21/2014
For Official Use Only
Page 70 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
986
Step 6 Monitor Security Controls
Once the system is authorized for operation, it is ready to enter the continuous monitoring phase.
Continuous monitoring consists of three tasks: (1) configuration management and control; (2)
security control monitoring; and (3) status reporting and documentation.
The purpose of this step is to provide oversight and monitoring of the security controls in the
information system on an ongoing basis and to inform the AO when changes occur that may
impact the security of the system. Continuous monitoring activities ensure that secure system
management, operation, and maintenance preserve an acceptable level of residual risk.
The activities in this step are performed continuously throughout the life cycle of the
information system.
Tasks Performed by System Owner
(SO)
Review system changes and start reaccreditation if major change occurs
Remediate POA&Ms
Document updates to SSP, CP, CMP, IRP
Continual scanning of information systems for
Authorizing Official (AO)
Review/validate risk, POA&M, system
changes, and documentation with
System Owner annually
vulnerabilities
Review the system and complete the “System
Annual Review Memo” found in Appendix B
of this document annually.
Table 9 – RMF Step 6 Tasks (Monitor Security Controls)
Below is the checklist for Step 6, Monitor Security Controls.
Validate that the vulnerability scanning is being accomplished and configuration
management issues remediated in a timely fashion.
Validate that progress is being made on POA&Ms items and milestones are updated in
CSAM. Existing Plans of Action and Milestones (POA&M) are updated at least quarterly
based on the finding from security controls assess and continuous monitoring activities
Validate that key controls and the set of controls defined for assessment in that fiscal year
are tested annually (reference Appendix E for the sets of controls to assess).
Annually complete the “System Annual Review Memo” found in Appendix B - Templates to
this document.
Last Modified: 8/21/2014
For Official Use Only
Page 71 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Below is the overall process for RMF Step 6.
Figure 6 – RMF Step 6 Process (Monitor Security Controls)
Last Modified: 8/21/2014
For Official Use Only
Page 72 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on the Information Systems Security Program (ISSP) for FNCS
1000
Overview
On January 23, 2002, Congress enacted Public Law, 107-347, E-Government Act of 2002. The
Federal Information Security Management Act (FISMA) of 2002, Title III, of this law requires that
each agency have effective information security controls over Information Technology (IT) to
support Federal operations and assets and provide a mechanism for improved oversight of
Federal agency information security programs. This Act was designed to strengthen OMB Circular
A-130, Appendix III that initially established specific requirements for all agency security programs.
As technology has grown more complex and open, the need for effective Federal information
security programs in each agency and staff office is essential. In USDA, this program is referred
to as the Information Systems Security Program (ISSP).
USDA has undertaken an aggressive role in support of E-Gov to include ensuring that IT systems
have been certified and accredited or otherwise authorized as being properly secured. All of these
actions require that each agency ISSP be responsive and responsible in supporting security
requirements. The material in this guidance is designed to outline the responsibilities of FNCS’
ISSP and to specifically define the security roles of the Agency Administrator or Head, Chief
Information Officer (CIO) and Information Systems Security Program Manager (ISSPM). These
positions are vital components in securing FNCS information technology assets by providing
effective agency management and oversight of its ISSP.
1010
References
This Guidance is written in accordance with:
DM 3545-002 USDA Information Systems Security Program (ISSP) Policy
1020
Purpose
The purpose of this guidance is to establish, organize, implement and maintain an ISSP that
ensures IT security compliance within FNCS.
Establishment of the ISSP ensures that security is adequately addressed in all phases of the
System Development Life Cycle (SDLC), CPIC process, operations, maintenance activities and
other IT functions. The FNCS agency ISSP will include the following responsibilities:
Create a Security Plan for the FNCS Security Program.
Categorize sensitivity of information and information systems in accordance with FIPS 199.
Conduct regular risk assessments for IT systems and computing devices.
Implement effective risk mitigation strategies.
Manage the formal Certification and Accreditation (C&A) of all agency IT systems.
Monitor security controls throughout the System Life Cycle.
Use the Capital Planning and Investment Controls (CPIC) process to formulate and plan
security costs for all systems.
Monitor the system Configuration Management (CM) process of all systems.
Maintain agency annual Program and System Security Plans.
Manage an effective Security Awareness and Training Program.
Last Modified: 8/21/2014
For Official Use Only
Page 73 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
1030
Manage the agency Security Incident Response Program.
Conduct annual self-assessments of the agency IT systems using NIST 800-53.
Monitor IT systems using audit trails, control logs and other mechanisms.
Establish an electronic inventory of all IT systems and computing devices.
Maintain an IT system inventory in the FNCS approved systems.
Disseminate Department policy and procedures to all agency personnel.
Respond to regular and ad hoc reporting requirements and audits by internal or external
agencies.
Monitor agency compliance to USDA, OMB, NIST and other governing bodies’ policy for
security.
FNCS ISSP Structure
FNCS has elected an alternative structure for the ISSP. An alternative structure is useful in
agencies that have more than 1,000 IT users. Currently, FNCS has approximately 1,500 users
that are made up of employees and contractors. The FNCS Information Security Office (ISO) is
responsible for implementing FNCS’ ISSP. Within the hierarchy of OIT, the ISO will be located
under the Office of the Chief Information Officer.
The Alternative structure of an ISSP consists of a three-tier management approach, ISSPM, ISSM
and ISSO:
The duties of the ISSPM, ISSM and ISSO shall be designated as the agency sees fit, as
long as all responsibilities are designated in writing and effectively executed.
The Associate CIO for Cyber Security (ACIO CS) must be notified in writing, that an
Alternative ISSP is being implemented at FNCS.
The FNCS CIO has formally designated one (1) Information Systems Security Program
Manager (ISSPM) via the “Designation of ISSPM and Deputy ISSPM” form.
Last Modified: 8/21/2014
For Official Use Only
Page 74 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
CIO
CISO
Deputy CISO/ISSPM
Information Security Office
(ISO)
ISSM
ISSM
ISSM
ISSO(s)
Figure 7 – OIT Information Security Office Management 4-Tier Structure
1040
Management Structure of the ISSP
The Chief Information Security Officer (CISO) and Deputy CISO/ISSPM:
The duties and responsibilities of a CISO and Deputy CISO are diverse, comprehensive and
complex. This position is responsible for understanding and mitigating the Agency’s information
system risks. This position is also responsible for leading investigatory and compliance work. The
CISO, Deputy CISO/ISSPM, and some ISSM positions, as defined by OIT leadership, should be
considered High Risk Public Trust positions as defined by 5 CFR 731. As a result, FNCS must
ensure that the individuals in these positions have the appropriate level of background
investigation completed. Additionally, FNCS is responsible for determining the National Defense
sensitivity level of these positions as defined in 5 CFR 732 and obtaining the appropriate level of
security clearance. Individuals in these positions will have a direct reporting relationship with the
Last Modified: 8/21/2014
For Official Use Only
Page 75 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
USDA Agriculture Security Operations Center (ASOC) and will require a level of clearance
meeting with the USDA ASOC’s minimum security clearance requirements. Information Systems
Security Manager (ISSM):
The ISSM is responsible for managing the tactical efforts of a business, functional, or operational
entity within an agency. Their responsibilities include the daily operational security issues of the
business area and overall management of the “front line” security requirements for the business
area. This individual may often be called upon to assist in the resolution of certain system
security issues.
Information Systems Security Officer (ISSO)
The System Owners shall appoint as many Information Systems Security Officers (ISSOs) as
necessary to comply with this guidance. This person is responsible for the day-to-day security
administration for one or more information systems. Theirs is an operational security effort
regarding the system(s) for which they are responsible. The ISSOs will be responsible for
coordinating audit and certification/accreditation activities. The ISSOs will work closely with and
report directly to the ISSM assigned to their system.
1050
ISO Roles and Responsibilities:
1051
The CIO will:
1. Act as or designate the FNCS Chief Information Security Officer (CISO).
2. Support the strategic requirements of the ISSP.
3. Ensure adequate funding, training and resources are provided to the ISSP to support the
agency mission.
4. Facilitate the resolution of high-level security matters within the agency by acting as a
proponent for ISSPM.
5. Serve as the Certifying Official for FNCS security requirements (i.e., Annual Security Plans,
FISMA, C&A and other formal reporting requirements, waiver requests and certification of
agency IT Systems).
6. Determine the need for C&As with the System Owner.
7. Communicate to the ACIO CS in writing, the designated ISSPM.
8. Designate a Contingency Planning Coordinator (CPC).
9. Other responsibilities for the CIO are written in the procedures for C&A, IT Contingency
Planning, SSP, SDLC, CPIC and IT Restricted Space and Physical Access Control.
1052
The CISO/Deputy CISO/ISSPM will:
1. Manage the agency ISSP including the activities and training from USDA Enterprise
training vehicles of the ISSM/ISSOs.
Last Modified: 8/21/2014
For Official Use Only
Page 76 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
2. Support the strategic security program requirements to include: planning, budget analysis,
Department policy review and internal policy formulation, agency FISMA, POA&M and
audit reporting requirements, agency Security Architecture and agency IT CPIC.
3. Consolidate individual security reports from all functional and operation business areas into
one agency combined report (i.e., monthly scans, patches, incidents) for higher level
management, including ACIO CS.
4. Monitor progress of the ISSM/ISSOs to ensure that they meet the necessary program
security requirements of NIST 800-53 and departmental policy directives.
5. Serve as the principle consultant to the agency CIO and senior management, including the
ACIO CS, on the Agency’s security posture, policy, procedures and strategic planning
6. Submit all system SSPs to the Office of Cyber Security by the last working day of April
each year. Include POA&Ms for security weaknesses not corrected from the prior year
submissions.
7. Coordinate agency Incident Response with the ISSM/ISSOs to include all associated
actions necessary to mitigate the risk to business area systems.
8. Oversee the implementation of agency security policies, procedures and guidelines and
ensure compliance.
9. Participate in monthly Information Technology Management Group (ITMG) and Information
Security Sub-Council (ISSC) meetings.
10. Monitor server room access list with ASD; verify and approve list quarterly.
11. Host monthly ITMG & ISSC sub-meetings with ISSMs, ISSOs, and Privacy Officer to
disseminate information.
12. Communicate with the OIT/Security liaisons in other agencies and USDA.
13. Lead the development of the agency security architecture for all IT systems, including data
encryption standards.
14. Oversee the C&A process. Oversee Contingency and Disaster Recovery Plans for each
site, in coordination with COOP.
15. Approve updates to SSPs.
16. Enter all POA&Ms into the USDA approved tool.
17. Create and disseminate updated security document templates to the ITPM, System
Owners and Contractor/Development Teams.
18. Lead special projects, e.g. CSAMS development, 702 handbook updates, etc.
19. Ensure that ISSM/ISSOs are designated to provide adequate security to business,
functional or operational entities.
20. Ensure that the designated ISSPM is a permanent member of all system development,
telecommunications planning and the System Development Life Cycle (SDLC) planning
teams.
Last Modified: 8/21/2014
For Official Use Only
Page 77 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
21. Ensure that the ISSPM receives role-based and specialized security-based training.
1053
The ISSM will:
1. Serve as point of contact (POC) for all information security matters and provide subject
matter expert guidance to agency personnel.
2. Manage C&A process every three years or when major system changes occur.
3. Ensure all systems follow and complete the C&A process prior to actual operation.
4. Review Privacy Impact Analysis (PIA) annually in coordination with the Privacy Officer.
5. Review Systems of Record Notice (SORN) annually in coordination with the Privacy
Officer.
6. Create and disseminate updated security document templates to the ITPM, System
Owners and Contractor/Development Teams.
7. Disseminate/Issue departmental security policy and procedures.
8. Create and monitor compliance with the agency Communication Plan.
9. Ensure FISMA compliance in the System Development Life Cycle (SDLC), operations,
maintenance and other IT functions of all FNCS systems.
10. Ensure FISMA compliance in telecommunications planning.
11. Attend system status meetings as the subject matter expert for security.
12. Perform internal self-assessments and audits of IT systems to ensure compliance with
federal and departmental policy and procedures, includes Annual OMB A-123 selfassessments, FISMA and annual on-site security reviews.
13. Participate in general and role-based security training to enhance knowledge and skill
level.
14. Enforce system security controls that protect agency information using authentication
techniques, cryptography, firewalls, logical and physical access controls and
comprehensive departmental incident response procedures with all system administrators
(SA) and system owners.
15. Assist in the categorization of information systems and determine sensitivity levels in
coordination with system owners.
16. Lead the development of disaster recovery, contingency plans and other emergency plans
for IT systems. Ensure all plans are NIST compliant.
17. Lead the effort to test disaster recovery and contingency plans as directed by the ISSPM.
18. Monitor physical spaces to ensure that the security requirements of IT restricted spaces
are upheld.
19. Assist in the planning of IT restricted space which includes advising the
Last Modified: 8/21/2014
For Official Use Only
Page 78 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
ISSPM when IT restricted space does not comply with security requirements.
20. Assist in managing a Security Awareness program that is compliant with departmental
policy.
21. Participate in the development of FNCS architecture for IT systems.
22. Monitor and coordinate patch management and scanning techniques for all systems.
23. Participate in identification and mitigation of all system vulnerabilities.
24. Evaluate system environments for security requirements and control including: IT Security
architecture, hardware, software, telecommunications, security trends and associated
threats and vulnerabilities.
25. Implement system security controls that ensure the protection of Sensitive but Unclassified
(SBU) information.
26. Coordinate the provision of security controls for Portable Electronic Devices (PEDS) and
other wireless technology.
27. Participate in the Overall Agency Security Plan and coordinate with Information ISSOs to
ensure that current system specific plans are in place for all IT systems.
28. Coordinate or participate in risk assessments of all systems and mitigate vulnerabilities.
29. Monitor Configuration Management (CM) practices to ensure that security controls are
maintained over the life of the IT systems, and formulate and prepare an electronic agency
inventory for business area computing devices.
30. Plan and document security costs for IT investments and systems.
31. Prepare and update reports to ensure that systems comply with mandated internal and
external security reporting requirements, including monthly OMB A-123 Reporting and
CPIC.
32. Monitor quarterly LAN/Application user recertification for all systems.
33. Proactively participate in new CS initiatives including, but not limited to, computer
investigations and forensics.
34. Prepare and coordinate system owner Incident Responses with the agency ISSPM to
include all associated actions necessary to mitigate the risk to systems.
35. In coordination with the ISSO, conduct annual NIST 800-53 self-assessments and create
POA&Ms.
36. Participate in special projects as directed by the ISSPM.
1054
The ISSO will:
1. Be knowledgeable of Federal, Departmental, and agency security regulations when
developing functional and technical requirements; serve as a POC for system users with
security issues.
Last Modified: 8/21/2014
For Official Use Only
Page 79 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
2. Manage security controls to ensure confidentiality, integrity and availability of information;
build security into the system development process and define security specifications to
support the acquisition of new systems; develop testing processes that ensure adequate
testing of security controls, either by recreating production environment or by developing
tests that provide the same effect.
3. Review and sign off on system procurement requests to ensure that security has been
considered and included.
4. Assist with security controls and associated costs in the CPIC Process.
5. Perform monthly patching.
6. In coordination with the ISSM, conduct annual NIST 800-53 self-assessments and create
POA&Ms.
7. Participate in the Risk Management meetings.
8. Prepare and update reports to ensure that the system(s) complies with mandated internal
and external security reporting requirements, including monthly Patching & Scanning
Certification and monthly FISMA scorecard.
9. Provide artifacts and data to the ISSM for monthly A-123 reports, annual A-123 Audits and
annual on-site security reviews.
10. Create POA&Ms as needed after scans and patch reports.
11. Ensure adherence to system security controls that protect Sensitive But Unclassified (SBU)
information using authentication techniques, encryption, firewalls, and access controls.
12. Report all incidents to the ISSPM in following Incident Response Procedures.
13. Participate in the C&A process, including updates to the overall Agency and System
Security Plans (SSP) for the program; serve as a key advisor in risk assessments of all
systems and mitigate vulnerabilities; adhere to CM practices to ensure that security
controls are maintained over the life of IT systems; update the electronic agency inventory
for all agency computing devices.
14. Develop Disaster Recovery/Contingency Plans (DR/CP) and other emergency plans for
systems, and update annually. Develop, test, and maintain system contingency plans,
backup and storage procedures; document all procedures according to departmental and
agency standards; conduct annual executable or table-top DR tests and create POA&Ms;
Update system SORN annually in coordination with ISSM and Privacy Officer. Update
SSP, Risk Management Plan (RMP) and CMP annually Audit and monitor application,
system and security logs for security threats, vulnerabilities and suspicious activities; report
suspicious activities to the agency ISSPM; Participate in identification and mitigation of all
system vulnerabilities.
15. Grant access and password requests after receiving authorization from system owners or
from authorization officers designated by system owners.
16. Update the CCB Charter annually and as needed, and CCB minutes as needed.
Last Modified: 8/21/2014
For Official Use Only
Page 80 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
17. Support and facilitate the security awareness, training and education program; follow up
with users for annual CSAT and Privacy training;
18. Participate in monthly Security Office/Privacy meetings.
19. Assist the ISSM in any other security related duties, as required; participate in special
projects as directed by the ISSPM.
Last Modified: 8/21/2014
For Official Use Only
Page 81 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on Risk Management at FNCS
1200
Overview
Protection of information assets and maintaining the confidentiality, integrity and availability of
FNCS information assets and telecommunications resources are vital in meeting FNCS program
delivery requirements. Implementation of security measures such as a risk management program,
effective security controls, certification and accreditation of IT systems and updated security plans
are vital components in our response to this situation.
Risk “is the net negative impact of the exercise of a vulnerability, considering both the probability
and the impact of occurrence”.
This guidance provides the strategies used to implement an FNCS Risk Management (RM)
Program. RM includes a structured approach to assessing risk, identifying vulnerabilities,
reporting, accepting risk, implementing appropriate mitigation strategies and continuous evaluation
and assessment of information resources. Procedure is updated and reviewed annually.
1210
References
This Guidance is written in accordance with:
NIST Special Publication 800-53 Rev. 3
NIST Special Publication 800-30
USDA DM 3540-000 Risk Management Program
USDA DM 3540-001 Risk Assessment Methodology
1220
FNCS Risk Management
1221
Risk Assessment Guidelines
Risk assessments evaluate the sensitivity and criticality of the system or application data to the
vulnerabilities, threats, impacts, and potential countermeasures that may exist in its environment.
A risk assessment includes the following activities:
Conduct System Characterization
Conduct Vulnerability and Control Analysis
Conduct Threat Analysis
Conduct Impact Analysis
Develop Risk Mitigation Strategies
Determine Risk Levels
Develop Business Cases
Report Residual Risks
Risk assessments are performed for new system development and major system modifications.
Risk assessments are performed on systems and major applications every three (3) years.
USDA has established a risk assessment methodology. For the complete methodology on
assessing risk, please refer to the USDA DM 3540-001 Risk Assessment Methodology
Last Modified: 8/21/2014
For Official Use Only
Page 82 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
SYSTEM
CHARACTERIZATION
CONDUCT
VULNERABILITY &
CONTROL ANALYSIS
CONDUCT THREAT
ANALYSIS
RISK
ASSESSMENT
INITIATION
CONDUCT IMPACT
ANALYSIS
MAJOR
SYSTEM
CHANGE
REPORT THE
RESIDUAL RISK
DEVELOP A RISK
MITIGATION
STRATEGY
DETEMINE THE RISK
LEVEL
Figure 8 – General USDA Risk Assessment Methodology
Step 1:
1. Identify system mission, review system architecture and determine system boundaries,
interfaces and data flow.
2. Determine data categories and sensitivity.
3. Understand system users.
4. Review system security policies.
Step 2:
1. Conduct manual assessments.
2. Conduct automated scans, penetration tests and security control assessments.
3. Review previous security plans and risk assessments.
Step 3:
1. Determine threat types.
2. Develop a listing of threat sources.
3. Determine probability of threat occurrence.
Step 4:
Last Modified: 8/21/2014
For Official Use Only
Page 83 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
1. Consider data categories.
2. Determine mission impact severity in terms of confidentiality, integrity and availability.
Step 5:
1. Determine threat probability of occurrence.
2. Determine impact criticality.
Step 6:
1. Review threat list.
2. Determine impacts.
3. Implementation countermeasures.
4. Develop a threat mitigation list based on available resources.
Step 7:
1. Document remaining risk(s) and a plan for future action.
2. Include residual risk in Certification and Accreditation package.
1222
Risk Mitigation Guidelines
The process for risk mitigation is as follows:
Review each potential threat and the action(s) that are necessary to reduce or eliminate
the threat such as adding access controls to critical assets.
Determine the cost of mitigating the threat to the organization.
Decide whether the financial output is possible for each threat. For instance, what
hardware or software measures will add protection and is the cost justifiable.
Implement the solution that reduces or mitigates the threat.
Risk mitigation is a systematic methodology used by senior management to reduce mission
risk.
Risk mitigation can be achieved through any of the following risk mitigation options:
1. Risk Assumption. To accept the potential risk and continue operating the IT system or
to implement controls to lower the risk to an acceptable level.
2. Risk Avoidance. To avoid the risk by eliminating the risk cause and/or consequence
(e.g., forgo certain functions of the system or shut down the system when risks are
identified).
3. Risk Limitation. To limit the risk by implementing controls that minimize the adverse
impact of a threat’s exercising vulnerability (e.g., use of supporting, preventive,
detective controls).
4. Risk Planning. To manage risk by developing a risk mitigation plan that prioritizes,
implements, and maintains controls.
Last Modified: 8/21/2014
For Official Use Only
Page 84 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
5. Research and Acknowledgment. To lower the risk of loss by acknowledging the
vulnerability or flaw and researching controls to correct the vulnerability.
6. Risk Transference. To transfer the risk by using other options to compensate for the
loss, such as purchasing insurance.
1223
Risk Evaluation and Assessment Guidelines
Within the SDLC Operations/Maintenance phase, each system is a part of the continuous
monitoring process. FNCS continuous monitoring includes the monitoring of risks identified in risk
assessments and evaluating risks that were discovered and accepted. This is an ongoing
process.
1230
Risk Acceptance Guidelines
A Risk Management Acceptance report is to be completed and submitted to the ISSPM when
vulnerabilities are found within a system and the System Owner accepts the risk (vulnerability).
This includes discovery of vulnerabilities through:
Recognition by a user or system administrator.
An equipment or network scan.
An annual self-assessment.
The Certification and Accreditation (C&A) and security control assessment process.
Please see the Appendix E for the Risk Management Acceptance Form and instructions.
1240
FNCS Risk Management Program Team
The Risk Management Team will provide communication, support and mitigation techniques
for all FNCS Systems.
The risk management program requires each team member to manage:
o
o
o
o
Vulnerability mitigation
Patch management
Virus maintenance
POA&M and/or possible waiver information
Weekly meetings facilitated by an ISO ISSM and the Deputy CISO allow each member to
report on vulnerability scans, patch and virus reports and discuss how the results have
impacted the business continuation and risk minimization for each portion of the FNCS GSS
Net network.
Collectively, the Risk Management Team will create a weekly all-inclusive report on risk
management results to be submitted to the ISO for approval.
1241
Vulnerability Identification and Remediation Procedures
As part of FNS’s Continuous Monitoring Process, vulnerability identification and remediation is
crucial to keeping FNS data safe and secure. This procedure is meant to outline how the agency
identifies, validates, and reports the vulnerabilities as well as setting the requirements for
Last Modified: 8/21/2014
For Official Use Only
Page 85 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
remediating those vulnerabilities as required by NIST SP 800-53 Control RA-5: Vulnerability
Scanning.
1242
Identification, Validation, and Reporting
FNS’s Information Security Office is responsible for identifying, validating, and reporting
vulnerabilities with the organization. FNS utilizes an Enterprise Vulnerability Scanning and Risk
Management Appliance, in conjuncture with other security tools, to scan FNS’s network. Scans
are scheduled to run continuously.
The Enterprise Vulnerability Scanner produces a vulnerability score for every asset scanned. This
score is converted to a Risk Score for that asset on a “0-100” scale. A Risk Score of “0”
represents a low risk to the organization while a score of “100” represents a severe threat. This is
to create a more standardized and simplistic representation of the severity of any given asset to
management and system administrators.
As we move towards continuous monitoring, the FNS Information Security Office (ISO) reports on
the security posture of the organization through the Executive Situational Awareness Briefing
(ESAB) on a predefined schedule. This briefing is intended to illustrate the current state of the
security of the organization’s IT infrastructure. This includes identifying the top vulnerable
workstations, internal servers, and our DMZ environment, patch deployment compliance, and
software version trends. The ESAB reports on the network segments it has visibility on and has
limited capability on reporting on cloud infrastructure such as but not limited to National
Information Technology Center (NITC), National Technology Information Service (NTIS), and the
USDA’s Enterprise Virtual Private Network (EVPN). The ESAB will serve as the means for ISO to
report IT Security weakness to FNS Office of Information Technology (OIT) management. Based
upon the severity of an asset’s weakness, ISO will then create tickets through the OIT ticketing
system and assign them to the responsible parties for remediation. It is the responsibility of ISO to
validate vulnerabilities identified and expel any false positives from the ESAB report.
1243
Remediation of Identified Vulnerabilities
The remediation of an asset’s vulnerabilities is determined by the type of asset and the severity of
the Risk Score. An asset is defined by one of the following types: Demilitarized Zone (DMZ)
Server, High Value Target (HVT), an Internal Server, or User Workstation. A DMZ server is
defined as asset hosted within the DMZ network segmentation and public facing. An Internal
server is any asset that manages access to a centralized resource or service in a network. A HVT
is defined as a resource with access to a mission critical data within the organization. Finally a
General User is an asset operated by non-high-value target.
An asset’s Risk Score is categorized the following severity categories: High, Moderate, Low, and
Very Low. A system identified on the ESAB Top 10 list with a High Risk Score must have steps to
be remediated in place within 30 days; a Moderate Risk Score must have steps to be remediated
in place within 60 days; a Low Risk Score must have steps to be remediated in place within 90
days; finally, a Very Low Risk Score must have steps to be remediated in place with 180 days.
Vulnerabilities identified exceeding the threshold listed will be the System Owner and their
representatives’ responsibility for remediating. They will work with ISO to create and update
POA&Ms in the USDA’s Cyber Security Assessment Management (CSAM) for tracking purposes.
If the vulnerability cannot be remediated, a risk acceptance must be drafted and signed by the
Last Modified: 8/21/2014
For Official Use Only
Page 86 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
responsible parties. Vulnerability scores less than the Very Low threshold will be considered
informational and not need immediate remediation.
The following scale is used to determine the severity of an asset based on the asset’s Risk Score:
DMZ
Servers
High (30
days)
Moderate (60
Days)
Low (90 Days)
Very Low (180
days)
High
Value Target
Internal
Servers
User
Workstation
65+
70+
70+
-
50-64
55-69
55-69
-
30-49
44-54
44-54
50+
18-29
25-44
25-44
30-49
Table 10 – Vulnerability Assessment Risk Score Matrix
Last Modified: 8/21/2014
For Official Use Only
Page 87 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on IT Contingency Planning and Disaster Recovery
1300
Overview
IT Contingency Planning is necessary to ensure that IT systems continue to be operational in the
event of major or minor interruptions or a large-scale disaster. Use of formal Contingency and
Disaster Recovery Plans (DRP) also ensures that FNCS offices have effective and efficient
recovery solutions for their systems.
IT Contingency Planning includes activities designed to recover and sustain critical IT services
following an emergency. The IT Contingency Plan and Disaster Recovery Plan are tested,
minimally, annually. These arrangements fit into a much broader emergency preparedness
environment that includes organizational and business process continuity and recovery planning.
This guidance will cover developing, testing, training, reporting and updating IT systems
contingency and disaster recovery plans.
USDA has formed a Contingency Plan Working Group (CPWG) that meets to discuss current
issues with agency-wide IT Contingency and Disaster Recovery Plans and to provide
recommendations for change to USDA Cyber Security. So far, the CPWG has recommended and
has been approved to standardize the IT Contingency Plan. Other recommendations to Cyber
Security include:
Standardized Disaster Recovery Plans
Standardized Business Impact Analysis (BIA)
Standardized Disaster Recovery Test Plan
Standardized After Action Report
This procedure is reviewed and updated at least annually.
1310
References
This Guidance is written in accordance with:
NIST Special Publication 800-53 Rev. 3
NIST Special Publication 800-34
NIST Special Publication 800-84
USDA DM 3570-000 IT Contingency Planning
USDA DM 3570-001 Disaster Recovery and Business Resumption Plans
1320
Roles and Responsibilities
1321
The CIO and CISO will:
Establish and manage the IT Contingency Planning Program within FNCS.
Ensure sufficient resources exist to develop, maintain and implement IT Contingency Plans
and DRPs for each system.
Designate a Contingency Planning Coordinator and provide training for a Contingency
Planning Coordinator and an opportunity for certification.
Last Modified: 8/21/2014
For Official Use Only
Page 88 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Advise Senior Management on Cyber Security reviews and comments on existing
Contingency and DRPs.
Ensure all plans are developed using a USDA approved tool.
Ensure alternate sites are in place as a back-up operations facility where trained personnel
are in place to run systems or applications as needed.
Ensure all contingency and disaster recovery plans are closely related to the COOP and
other Contingency Plans.
Ensure DRPs are tested at least bi-annually or when a major change occurs to a system.
Ensure all system recovery procedures are developed, published and tested.
Provide specialized training for the disaster recovery teams and coordinate general
disaster awareness training for all employees.
Ensure all Contingency and Disaster Recovery plans are reviewed, approved and stored in
the USDA recommended database.
1322
The Contingency Plan and Disaster Recovery Coordinator and Stakeholders will:
Document such appointments in writing and include specific responsibilities in each
appointee’s job description.
Serve as the IT contingency planning expert resource for the agency
Prepare an agency Contingency Program proposal annually for management consideration
and approval which describes and schedules contingency activities to ensure compliance
with department and agency requirements documented in BIAs with continual improvement
as needed from year to year.
Ensure the following specific activities are included in the Contingency Program proposal
and facilitate completion of the activities during the program year:
o
Test-Exercise such that all plans are tested annually,
o
Annual plan review and update of every plan,
o
Review an update recovery strategies annually,
o
BIA review and update at least every two years,
o
Annual contingency training for agency staff and
o
Bi-Annual Refresher training.
Provide contingency program reports to agency management as needed.
Ensure new applications and GSS components are brought into the Contingency Program
1323
The System Owner will:
Review and update the Contingency and Disaster Recovery Plans, annually.
Last Modified: 8/21/2014
For Official Use Only
Page 89 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
In conjunction with the ITPM, ensure new personnel receive training for their roles on
Disaster Recovery.
Perform scheduled table top tests, functional exercises and failover tests.
Perform scheduled system integration tests.
Ensure the Alternate Site Coordinator has updated contingency and disaster recovery
plans along with recovery and reconstitution procedures.
1324
The ITPM and ISSM will:
Include development, review and updates of contingency and disaster recovery plan in the
project management plan.
Document results of the tests and provide mitigation strategies for deficiencies (POA&Ms).
Include costs of contingency plan creation, update, testing and training in the project
management plan.
Work in coordination with the Contingency Planning Coordinator to review/approve all
contingency and disaster recovery plans.
1330
Contingency Plan and Disaster Recovery Guidelines
Each system will have a Business Impact Analysis (BIA) performed to identify and prioritize
critical IT resources. The BIA also determines the level of system support needed to
restore mission critical core business functions.
Identify preventive controls. Determine which measures are necessary to reduce the
effects on a system in the event of a disruption.
Develop disaster recovery plans that include all of the guidance and supporting procedures
needed to restore the system. Recovery and reconstitution procedures are developed at
this time. These procedures will address the recovery and reconstitution of the system to a
known secure state after a disruption or failure occurs.
All disaster recovery personnel will maintain an up-to-date (hard copy and/or electronic)
DRP in a place easily accessible in the event of a disaster.
The ISO will provide a schedule for all FNCS system contingency and disaster recovery
plans to be tested. All results to be captured in After Action Reports along with mitigation
strategies documented in POA&Ms. All contingency plan test results will be reviewed by
Cyber Security.
Each system will have an alternate storage site where the system’s data back-ups are
stored.
Each system will have a designated alternate site where recovery procedures and trained
personnel are located to operate the system in the event of a disaster. The alternate site
will have an Alternate Site Coordinator for each system.
Last Modified: 8/21/2014
For Official Use Only
Page 90 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
1331
FNS’s telecommunication and e-mail services are provided by Networx. Currently, FNS
has a Service Level Agreement (SLA) with AT&T. The details of the timeframe of
resumption of system operations can be found in the SLA.
Contingency Training
Contingency training must be provided to information system users consistent with assigned
roles and responsibilities when new employees start at FNCS or after a major change to a
system occurs and annually thereafter.
1332
Contingency Plan Testing
The ISO will provide a schedule for all FNCS system contingency and disaster recovery plans to
be reviewed and updated annually or after major systems changes have occurred.
Last Modified: 8/21/2014
For Official Use Only
Page 91 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on FNCS System Security Plans (SSP)
1400
Overview
Information security has escalated as a result of high-level attention from both the press and
media. Recent terrorist attacks have only highlighted the need to ensure that we have the highest
level of information security practices. IT System security plans have become the foundation
document in the overall security process because they define the system security features and
controls.
The SSP provides a summary of the security requirements for the information system and
describes the security controls in place or planned for meeting those requirements. The SSP may
also reference other key security-related documents for the information system such as a risk
assessment, plan of action and milestones, accreditation decision letter, privacy impact
assessment, contingency plan, configuration management plan, security configuration checklists,
and system interconnection agreements as appropriate.
It is critical that FNCS SSPs are prepared and updated on an ongoing basis with the most current
information concerning each agency’s information security practices.
1410
References
This Guidance is written in accordance with:
NIST Special Publication 800-53 Rev.3
NIST Special Publication 800-18
USDA DM 3565-001 Annual Security Plans for Information Technology (IT) Systems
Federal Information Processing Standards (FIPS) 199
Federal Information Processing Standards (FIPS) 200
1420
Roles and Responsibilities
1421
The CISO will:
In coordination with the ISSPM, ensure the CIO signs the transmittal cover letter attesting
the completeness and correctness of the plans.
Ensure all personnel are familiar with annual SSP requirements.
In coordination with the System Owner, determine which major changes warrant updates to
the SSP.
Develop and maintain an inventory of all IT systems.
Determine data sensitivity and identify all GSS and applications.
In coordination with the ISSPM, prepare detailed plans for the overall security program,
GSS and applications. Submit to USDA’s Cyber Security for review and evaluation.
Last Modified: 8/21/2014
For Official Use Only
Page 92 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
In coordination with the ISSPM, submit all SSPs to the Office of Cyber Security by the last
working day in April each year; Plans will include a POA&M for security weaknesses not
corrected from the prior year submissions. Submit the package electronically and in hard
copy to the Office of Cyber Security.
Ensure that copies of the SSPs are maintained in the ISO.
Ensure that all IT systems have adequate security controls based on the sensitivity of data,
mission critical and value of the data in the system.
In coordination with the System Owner, determine the need to update the SSPs based on
major changes to the system.
1422
The ISSPM will:
In coordination with the CISO, submit all SSPs to the Office of Cyber Security by the last
working day in April each year; Plans will include a POA&M for security weaknesses not
corrected from the prior year submissions. Submit the package electronically and in hard
copy to the Office of Cyber Security.
Act as the Subject Matter Expert (SME) on all SSP requirements.
Approve updates and newly developed SSPs.
Prepare a security plan for the overall FNCS System Security Program.
Participate in the development of exception requests.
Ensure all SSPs are submitted to the CIO with a cover letter for signature attesting the
accuracy and completeness of the plans.
1423
The System Owner will:
Have a thorough knowledge of USDA policy and FNCS procedures for creating and
updating SSPs.
Develop SSPs in coordination with the system administrator, ISSM, ITPM and functional
end users.
Maintain the SSP and verify that the system is deployed and operated according to the
agreed-upon security requirements.
Update the SSP whenever a significant change occurs.
Assist in identifying, implementing and assessing common security controls.
Ensure that system users and support personnel receive the required security training.
1424
The ITPM will:
Have a thorough knowledge of USDA policy and FNCS procedures for creating and
updating SSPs.
Last Modified: 8/21/2014
For Official Use Only
Page 93 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Assist the system owner in the creation of the SSP.
Perform a preliminary review of the SSP and SSP checklist prior to being released to the
ISSPM.
In coordination with the ISSM, ensure SSPs are reviewed and updated annually or as
determined when a major change has occurred.
1430
USDA Definitions of System and Major Applications
Please see the following link for the USDA Definitions of a system
USDA Definitions Document
1431
SSP Guidelines
An Information System Inventory is required for the General Support System (GSS) all
FNCS systems. The systems inventory consists of all systems categorized in accordance
with FIPS 199. Please refer to the FIPS 199 for details on system categorization. The
System Categorization is documented and submitted to the ISSPM.
All systems, whether Major Application or GSS are required to have a security plan. Initial
SSPs are drafted in the Initiation phase of the SDLC.
During and prior to completion of the C&A, the security plan is reviewed, updated and
formally accepted by the ISSPM.
All new software or hardware to be considered for inclusion in the NetGSS environment
must receive CCB approval.
All SSPs are reviewed and updated based on upcoming certification and accreditation
dates as noted in the CSAM tool. CSAM has the capability of holding SSP documents
within the “Appendices” section. For updated templates, contact the Information Security
Office. These documents will reference C&A items such as:
a. Risk Assessment
b. Plan of Action and Milestones (POA&M)
c. Accreditation decision letter
d. Privacy impact assessment
e. Contingency plan
f.
Configuration management plan
g. Security configuration checklist
h. Results of penetration testing
Last Modified: 8/21/2014
For Official Use Only
Page 94 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
i.
All system interconnection agreements (MOUs)
j.
Management, Operational and Technical controls based on SP 800-53.
Last Modified: 8/21/2014
For Official Use Only
Page 95 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on the FNCS Systems Development Life Cycle (SDLC)
1500
Overview
The Systems Development Life Cycle (SDLC) is a conceptual model used in project management
that describes the stages involved in an information system development project, from an initial
feasibility study through maintenance and final disposition.
The inclusion of security requirements early in the SDLC will result in less expensive and more
effective security than adding it after a system is operational. This guidance presents a framework
for incorporating security into all phases of the SDLC process, from initiation through disposal.
This document will provide information to select and acquire cost-effective security controls by
explaining how to include information system security requirements in appropriate phases of the
SDLC.
It is important to involve other members to be a part of the development team, dependent on the
complexity of the system. Other roles may include, but are not limited to: Designated Accrediting
Authority (DAA), Certifying Official (CO), member of OIT, Configuration Management Team,
Design and Engineering staff and the facilities group.
1510
References
This Guidance is written in accordance with:
NIST Special Publication 800-53 Rev.3
DM3575-001 Security Controls on the Systems Development Life Cycle
NIST Special Publication 800-64
Please see the USDA definition of a system:
http://www.ocionet.usda.gov/ocio/security/sys_definition.html .
1520
Roles and Responsibilities
1521
The CISO will:
Be responsible for the organization’s information system planning, budgeting, investment,
performance and acquisition.
Provide advice and assistance to senior organization personnel in acquiring the most
efficient and effective information system to fit the organization’s enterprise architecture.
1522
The Information System Security Program Manager (ISSPM) will:
Be responsible for developing enterprise standards for information security.
Play a leading role in introducing an appropriate, structured methodology to help identify,
evaluate, and minimize information security risks to the organization.
Coordinate and perform system risk analyses, analyzes risk mitigation alternatives, and
build the business case for the acquisition of appropriate security solutions that help ensure
mission accomplishment in the face of real-world threats.
Last Modified: 8/21/2014
For Official Use Only
Page 96 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
1523
1524
Support senior management in ensuring that security management activities are conducted
as required to meet the organization’s needs.
The ISSM will:
Ensure all security requirements are met throughout the life of a system.
The ITPM will:
Ensure security requirements are budgeted for and met throughout the life of a system.
Work in collaboration with the ISSPM to ensure security needs are incorporated in the
system lifecycle.
1525
1526
1527
1528
1529
The System Owner will:
Play an essential role in security and be intimately aware of functional system
requirements.
The Privacy Officer will:
Ensure that the system meets existing privacy policies regarding protection, dissemination
(information sharing and exchange) and information disclosure.
The Legal Advisor will:
Advise the team on legal issues related to security during the lifecycle.
The Records Management Officer will:
Work with the ISSPM and the ITPM to ensure that the system security documents are
compliant with all applicable laws and regulations.
Contractor/Development Team will
Ensure all development is compliant with all security requirements within each phase of the
SDLC.
Last Modified: 8/21/2014
For Official Use Only
Page 97 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
1530
SDLC Required Security Documentation and Responsible Teams
Security Requirement Documentation
Responsible Team/Individual
System Categorization
Contractor/Development Team
Preliminary Risk Assessment
Contractor/Development Team
Privacy Impact Assessment (PIA)
Contractor/Development Team
System Security Plan (SSP)
Contract Development Staff, System Owner
and ITPM
Interconnection Service Agreement (ISA)
System Owner
Configuration Management Plan
Contractor/Development Team
Risk Assessment
Contractor/Development Team
Security Functional Requirements Analysis
ISSM
Security Assurance Requirements Analysis
ISSM
Cost Considerations and Reporting
System Owner/ITPM
Security Planning
ISSM
Security Control Development
ISSM
Development Security Control Assessment
Security Control Assessment Team
Other planning components
ITPM
Inspection and Acceptance
QA/CM
System Integration
Contractor/Development Team
Security Certification
CIO
Security Accreditation
DAA
IT Contingency Plan
Contractor/Development Team, System
Owner, ITPM
Disaster Recovery Plan (DRP)
Contractor/Development Team, System
Owner, ITPM
Last Modified: 8/21/2014
For Official Use Only
Page 98 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Configuration Management Control
Contractor/Development Team
Continuous Monitoring
ISSM, ITPM, System Owner
Re-Certification
CIO
Re-Accreditation
DAA
Information Preservation
Records Management Officer
Media Sanitization
IB
Hardware and Software Disposal
IB
1540
SDLC Phases
There are eight (8) basic phases of the SDLC as defined by FNCS Office of Information
Technology, Systems Development Lifecycle Guide (SDLC Guide), they are:
1.
2.
3.
4.
5.
6.
7.
8.
Initiation
Requirements Gathering/Analysis
Design
Development
Integration &Testing
Implementation
Operations/Maintenance (O&A)
Disposition
Within each phase of the SDLC security requirements are put in place and tested, please see
Tables 11 and 12 for the SDLC Phases and Security Requirements.
Last Modified: 8/21/2014
For Official Use Only
Page 99 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
1541
SDLC Phases and Security Requirements
Initiation
Research
Gathering and
Acquisition/
Development
Functional
Installation
Statement of Need Inspection
Acceptance
Perception of a Market Research testing
Need
Feasibility Study Initial user
Linkage of
training
Requirements
Need to Mission Analysis
documentation
and
Alternatives
Performance
Analysis
Objectives
Cost-Benefit
Assessment of
Analysis
Alternative to
Software
Capital Assets
Conversion
Preparing for
Study
investment
Cost Analysis
review and
Risk
budgeting
Management
Acquisition
Planning
Acquisition
Approval
Request (AAR)
Needs
Determination:
Operations/
Maintenance
Implementation
Performance
measurement
Contract
modifications
Operations
Maintenance
Disposition
Appropriateness
of disposal
Exchange and
sale
Internal
organization
screening
Transfer and
donation
Contract
closeout
Table 11 – SDLC Phases and Processes
Last Modified: 8/21/2014
For Official Use Only
Page 100 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Initiation
System
Categorization
Preliminary
Risk
Assessment
Privacy Impact
Assessment
(PIA)
System
Security Plan
(SSP)
Interconnection
Service
Agreement
(ISA)
Configuration
Management
Plan (CMP)
Research
Gathering and
Acquisition/
Development
Risk
Assessment
Security
Functional
Requirements
Analysis
Security
Assurance
Requirements
Analysis
Cost
Considerations
and Reporting
Security
Planning
Security Control
Development
Security Control
Assessment
Other planning
components
Operations/
Maintenance
Implementation
Inspection and
Acceptance
System
Integration
Security
Certification
Security
Accreditation
IT Contingency
Plan
Disaster
Recovery
Plan(DRP)
Configuration
Management
Control
Configuration
Management
and Control
Continuous
Monitoring
Re-Certification
Re-Accreditation
Configuration
Management
Control
Disposition
Information
Preservation
Media
Sanitization
Hardware and
Software
Disposal
Configuration
Management
Control
Table 12 – SDLC Phases and System Security Considerations
1542
SDLC Phases and Detailed Security Requirements for each Phase
1543
Phase 1: Initiation
The purpose of the Initiation Phase is to conduct initial assessment of a potential OIT
system/application development effort. This Phase helps establish a framework for project
success, and includes establishing processes for defining, planning, controlling and
communicating about the project.
Deliverables in this Phase include:
• Business Case (FNS758; FNS755)
• Project Management Plan (optional)
• Acquisition Plan / Strategy
• Acquisition Approval Request
• Alternative Analysis
• Cost Benefit Analysis
• Integrated Project Team Charter (optional)
• Security and Privacy Document
Last Modified: 8/21/2014
For Official Use Only
Page 101 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
• Project Process Agreement (optional)
• Privacy Impact Analysis (optional)
• Privacy Threshold Analysis (optional)
A critical governance body is established in this Phase: the Integrated Project Team (IPT). The IPT
should consist of the following core members: Project Lead; Developers; Business Leads;
Technical Representative; Security Representative; and COTR. Associate members should
include Governance, Network, Telecommunications, Records, O&M, and the Contracting Officer.
The IPT is documented in this Phase and functions from Initiation through the Implementation
Phase.
The Initiation Phase includes activities, reviews and approvals as identified in the below flowchart.
Figure 9 – SDLC Phase 1 Initiation Overview
Upon successful completion of the “Approve to Next Phase” step, the project progresses to the
Requirements Gathering and Analysis Phase.
1544
Phase 2: Requirements Gathering and Analysis
This Phase transforms the needs and high-level requirements specified in earlier Phases into
unambiguous (measurable and testable), traceable, complete, consistent, and stakeholderapproved requirements. Defining requirements helps ensure development of the required
capability on-time and within budget.
Deliverables in this Phase include:
• Privacy Threshold Analysis (PTA)
• Privacy Impact Analysis (PIA)
• System of Records Notices (SORN)
• Electronic Information System Questionnaire for Records Management Scheduling
• System Requirements Specification (SRS)
• Concept of Operations
• Requirements Traceability Matrix
• Project Process Agreement (PPA)
• Project Management Plan
• Integrated Project Team Charter
Last Modified: 8/21/2014
For Official Use Only
Page 102 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
The Requirements Gathering and Analysis Phase undergoes activities, reviews and approvals as
identified in the below flowchart.
Figure 10 – SDLC Phase 2 Requirements Gathering and Analysis Overview
Upon successful completion of the “Approve to Next Phase” step, the project progresses to the
Design Phase.
1545
Phase 3: Design
The purpose of the Design Phase is to transform requirements into complete and detailed
system design specifications. The physical characteristics of the system are designed during
this Phase, the operating environment is established, major subsystems and their inputs and
outputs are defined, and processes are allocated to resources. The concept is further
developed to describe how the business will operate once the approved project is
implemented (i.e. becomes a “system”), and to assess impact on employee and customer
privacy. Additionally, security authorization (formally known as certification and accreditation)
activities begin with the identification of security requirements and the completion of a high
level vulnerability assessment. Deliverables in this Phase include: • Procurement Documents
(e.g. Statement of Work (SOW) / Performance Work Statement (PWS) / Statement of
Objectives (SOO))
• System Design Document
• Configuration Management Plan
• Security Business Impact Assessment
• Security Contingency Plan
• Disaster Recovery Plan
• Domain Name Request
The Design Phase undergoes activities, reviews and approvals as identified in the below flowchart.
Last Modified: 8/21/2014
For Official Use Only
Page 103 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Figure 11 – SDLC Phase 3 Design Overview
Upon successful completion of the “Approve to Next Phase” step, the project progresses to the
Development Phase.
1546
Phase 4: Development
The purpose of the Development Phase is to convert the system design prototyped in the
Design Phase into a working system that addresses all documented system requirements.
Further, everything requiring user input or approval must be documented in this Phase.
Deliverables in this Phase include: • Test Plan
The Development Phase undergoes activities, reviews and approvals as identified in the below
flowchart.
Figure 12 – SDLC Phase 4 Development Overview
Upon successful completion of the “Approve to Next Phase” step, the project progresses to the
Integration & Testing Phase.
1547
Phase 5: Integration & Testing
The purpose of the Integration & Testing Phase is to lay the foundation for a smooth and
successful implementation. Key activities in this Phase include: • Attaining user input or
approval as defined in the prior Phase (Development)
• Preparing detailed logic specifications for each system module
• Testing and integrating units into larger components
• Preparing the technical environment for the system
Last Modified: 8/21/2014
For Official Use Only
Page 104 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
This Phase focuses on achieving proof that the system meets all requirements, functions
according to design parameters, and satisfies all business, technical, and management
stakeholders. Additionally, prior to installing and operating the system in a production
environment, the system must undergo security authorization activities, as necessary.
Deliverables in this Phase include: • Transition Plan
• Operations/Maintenance Manual
• UAT sign-off
• App Scan Results
• Training Manual
• User Manual
• Test Results
• Section 508 VPAT and/or Certification
• Security Risk Assessment Report
• System Security Plan
• Security Assessment Plan (Security Test & Evaluation Plan)
The Integration & Testing Phase undergoes activities, reviews and approvals as identified in the
below flowchart.
Figure 13 – SDLC Phase 5 Integration & Testing Overview
Upon successful completion of the “Approve to Next Phase” step, the project progresses to the
Implementation Phase.
1548
Phase 6: Implementation
The purpose of the Implementation Phase is to deploy and enable operations of the new
information system in the production environment. Successful completion of the Implementation
Phase should comprise both system deployment and training on the system.
Deliverables in this Phase include:
• Installation Document
• Compliance Certification
• Operations Readiness
• Life Cycle Cost
• Project Closeout
• Performance Measures
• Authority to Operate/Concurrency Review
• Application Guide
Last Modified: 8/21/2014
For Official Use Only
Page 105 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
• Source Code
The Implementation Phase undergoes activities, reviews and approvals as identified in the below
flowchart.
Figure 14 – SDLC Phase 6 Implementation Overview
Upon successful completion of the “Approve to Next Phase” step, the project progresses to the
Operations / Maintenance (O&M) Phase.
1549
Phase 7: Operations / Maintenance (O&M)
The purpose of the Operations / Maintenance (O&M) Phase is to ensure the information system is
fully functional and performs optimally until the system reaches its end of life. The system is
monitored for continued performance in accordance with user requirements, and needed system
modifications are incorporated. The operational system is periodically assessed through InProcess Reviews to determine how the system can be made more efficient and effective.
Operations continue as long as the system can be effectively adapted to respond to an
organization’s needs. When modifications or changes are identified as necessary, the system may
reenter the planning Phase.
Deliverables in this Phase include:
• System Post Implementation Review Report
• Operational Analysis
• Annual Updates Required:
• Systems Security Plan
• Contingency Plan
• Disaster Recovery Plan
• System Risk Management Plan
• Life Cycle Cost
• Authority to Operate (Every 3 Years)
The O&M Phase undergoes activities, reviews and approvals as identified in the below flowchart.
Last Modified: 8/21/2014
For Official Use Only
Page 106 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Figure 15 – SDLC Phase 7 Operations & Maintenance Overview
Upon advancement to the “Continue in Phase or Retire” step, the project is determined to continue
operating or advance to the Disposition Phase.
1550
Phase 8: Disposition
The purpose of the Disposition Phase is to shut down the operational system in a controlled
manner. The disposition activities allow for the orderly termination of the system and preserve the
vital information about the system so that some or all of the information may be retrieved in the
future, if necessary. Particular emphasis is given to proper preservation of the data processed by
the system, so that the data is effectively migrated to another system or archived in accordance
with applicable records management regulations and policies for potential future access.
Deliverables in this Phase include:
• System Disposition Plan
• System Disposition Checklist
• Post-Termination Review Report
The Disposition Phase undergoes activities, reviews and approvals as identified in the below
flowchart.
Figure 16 – SDLC Phase 8 Disposition Overview
Last Modified: 8/21/2014
For Official Use Only
Page 107 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on FNCS Capital Planning and Investment Control (CPIC)
1600
Overview
The Clinger-Cohen Act of 1996 requires that Federal agencies institute a disciplined approach to
managing and controlling Information Technology (IT) investments. The Office of Management
and Budget Circular A-130, “Management of Federal Information Resources” also mandates the
disciplines of Capital Planning and Investment Control (CPIC) and information system security.
These requirements, combined with the newly enacted Federal Information Security Management
Act (FISMA), have now established a clear and convincing need for a systematic capital planning
and investment process in FNCS.
CPIC is USDA’s primary process for (1) making decisions about which initiatives and systems
USDA should invest in and (2) creating and analyzing the associated rationale for these
investments.
Through sound management of these investments, the USDA Executive Information Technology
Investment Review Board (EITIRB) determines the IT direction for USDA, and ensures that FNCS
manages IT investments with the objective of maximizing return and achieving business goals.
Currently, the IT Governance Branch coordinates all CPIC IT investments for the FNCS. The CPO
reviews Agency IT investments based on their size, scope, or strategic impact on the Agency. The
IT Governance Branch forwards the IT investments to OMB through the USDA Office of the Chief
Information Officer for review and approval.
For further information and assistance on the FNCS CPIC process, please review section 1640 for
the FNCS process flow of the CPIC process, by phase.
For the complete overview of the USDA CPIC Guidelines, please click on the following
link: http://www.ocio.usda.gov/sites/default/files/docs/2012/DM3560-000.htm
1610
References
This Guidance is written in accordance with:
NIST Special Publication 800-53 Rev.3
NIST Special Publication 800-65
USDA DM 3560-001, Security Requirements for CPIC
FNCS Information Technology Investment Review Board Instructions
IT Governance Branch Charter
Appendix H – ITIRB/CPO Checklist
Appendix I – ITIRB/CPO Recommendations
1620
Responsibilities
1621
The CISO will:
Assist senior FNCS officials with IT issues.
In coordination with the ISSPM, develop an overall Information Security Program for FNCS.
Last Modified: 8/21/2014
For Official Use Only
Page 108 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Develop and maintain information system security procedures and control techniques.
Designate an FNCS Information Systems Security Program Manager (ISSPM) who will
perform the CIO directives as required by FISMA, including POA&M responsibilities.
Design, implement and maintain processes for maximizing the value and managing the
risks of IT acquisitions.
Present proposed IT portfolios to the IT Investment Review Board (ITIRB).
Provide final portfolio endorsements.
Present and recommend control and evaluate decisions and recommendations.
1620
The ISSPM will:
In conjunction with the System Owner create a preliminary security budget estimate,
security analysis to determine estimated baseline costs e.g. resources.
Provide training to all Information Security personnel.
Assist senior agency officials with IT security-related responsibilities.
1621
The Technical Review Board (TRB) will:
Conduct detailed IT investment reviews, security analyses and review business cases for
the presence of security requirements.
Balance IT investment portfolios based on the CIO/ITIRB security priorities and
prioritization criteria.
Recommend business case actions to the CIO; return to the originator for more information
and forward to the ITIRB and/or refer to the OIT.
Act as a focal point for agency coordination of the OCIO strategic planning, architectural
standards and outreach to organizations and bureaus.
1622
The ITPM will:
Develop a project management plan that integrates security throughout the SDLC.
Develop a cost and schedule baseline; complete the project within schedule, under budget
and to meet the needs of the customer.
Coordinate the development, implementation, operation and maintenance of a system
along with the System Owner, and others within FNCS.
Report status of project to the System Owner, CPO and security personnel within FNCS.
Provide baseline assessment performance measures to evaluate the security of the
delivered IT initiative.
Adhere to the established FNCS CPIC and project methodology.
Last Modified: 8/21/2014
For Official Use Only
Page 109 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Provide feedback and lessons learned to the FNCS project management repository.
Present, when applicable, the progress of critical systems to the CIO, ITIRB, CPO and
security personnel within FNCS.
1623
The System Owner/ITPM will:
In conjunction with the ISSPM create a preliminary budget estimate, security analysis to
determine estimated baseline costs.
In conjunction with the ISSPM and ITPM, create the SSP.
Establish and maintain security costs.
Review the security analyses for accuracy and update cost information based on actual
acquisitions or additional items include since the select phase.
Maintain a record of any security changes.
Perform a Post Implementation Review (PIR) of the investment’s security performance
measures compared to the original performance goals.
Identify initiative security risks and how they were managed or mitigated.
Assess the continuing ability of the investment to meet the system’s security performance
goals.
1630
The Portfolio Manager will:
Ensure that FNCS personnel adhere to CPIC procedures.
Notify the OCIO CPIC staff of findings/documents.
Update eCPIC and the Enterprise Architecture Repository (EAR) with CPIC related
artifacts.
Update the OMB Exhibit 300 and A-11 report with the appropriate security related
information.
Perform quarterly reviews.
1631
CPIC Phases
There are five (5) phases of the CPIC as defined by NIST SP 800-65, Integrating IT Security into
the CPIC process and the USDA IT CPIC Guide.
Last Modified: 8/21/2014
For Official Use Only
Page 110 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Figure 17 – USDA IT Capital Planning Phases
1632
Pre-Select Phase
The Pre-Select phase provides a process to assess a proposed investment’s support of agency
strategic and mission needs and to provide initial information to further support investments. It is
during this phase that the business/mission need is identified and relationships to the Department
and/or agency strategic planning efforts are established. There are significant information
requirements and a potential expenditure of funds in the preliminary planning phase to prepare for
review and selection of IT investments.
1633
Select Phase
In this phase, assess and prioritize proposed IT projects and then create a portfolio of IT projects.
In doing so, this phase helps to ensure that the organization:
(1) Selects those IT projects that will best support mission needs and
(2) Identifies and analyzes a project’s risks and returns before spending a significant amount of
project funds.
A critical element of this phase is that a group of senior executives makes project selection and
prioritization decisions based on a consistent set of decision criteria that compares costs, benefits,
risks, and potential returns of the various IT projects.
1634
Control Phase
In this phase, we manage investments while monitoring the development process. Once the IT
projects have been selected, senior executives periodically assess the progress of the projects
against their projected cost, scheduled milestones, and expected mission benefits.
Last Modified: 8/21/2014
For Official Use Only
Page 111 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
1635
Evaluate Phase
In this phase, there is a means for constantly improving the organization’s IT investment process.
The goal of this phase is to measure, analyze, and record results based on the data collected
throughout each phase. Senior executives assess the degree to which each project has met its
planned cost and schedule goals and has fulfilled its projected contribution to the organization’s
mission. The primary tool in this phase is the post-implementation review (PIR), which should be
conducted once a project has been completed. PIRs help senior managers assess whether a
project’s proposed benefits were achieved and also help to refine the IT selection criteria to be
used in the future.
1636
Steady State Phase
In this phase, there is a means to assess mature investments (fully implemented), ascertain their
continued effectiveness in supporting mission requirement, evaluate the cost of continued
maintenance support, assess technology opportunities and consider potential retirement or
replacement of the investment. The primary review focus during this phase is on the mission
support, cost and technological assessment. Process activities during the Steady-State phase
provide the foundation to ensure mission alignment and support for system and technology
succession management.
CPIC PHASES AND PROCESSES
1637
CPIC Phases
Pre-Select
Select
Control
Evaluation
Steady State
Identify project
sponsor
Conduct
mission
analysis
Develop
concept
Prepare
preliminary
business case
Prepare
investment
review
submission
package
Review /
approve
investment
submission
Review
initiative and
recommend
appropriate
action
Make final
Review the
mission needs
statement and
update if
needed
Approve
integrated
project team
membership
Identify
funding
source(s) and
obtain
approvals.
Develop major
investment
supporting
materials.
Prepare IT
investment
supporting
materials
Review/Appro
ve investment
submission
Establish and
maintain initiative
costs schedule
and technical
baselines
Maintain current
initiative and
security costs,
schedule technical
and general status
information.
Assess initiative
progress against
performance
measures using
Earned Value
Management
Methodologies.
Prepare annual
investment review
submission
package.
Review/approve
investment
submission.
Conduct PIR
and present
results
Prepare
annual
investment
review
submission
package
Review/appro
ve investment
submission
Review
initiative’s PIR
results and
recommend
appropriate
action
Make final
investment
decisions
Evaluate IT
capital
investment
management
Analyze mission
Assess
user/customer
satisfaction
Assess
technology
Conduct O&M,
e-Gov strategy
and operational
analysis (as
necessary)
Prepare
investment
review
submission
package
Review/approve
investment
submission
Review initiative
and recommend
appropriate
action
Make final
investment
Last Modified: 8/21/2014
For Official Use Only
Page 112 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
investment
decision
Review
initiative and
recommend
appropriate
action.
Make final
investment
decisions.
Review initiative
and recommend
appropriate action.
Make final
investment
decisions
Work with project
sponsor to
develop solutions.
process
decisions.
Table 13 – USDA IT Capital Planning Phases
1638
CPIC Phases and Security Requirements
1639
CPIC Required Documentation by Phase
This section outlines the needed documents required in each phase of the CPIC process.
Pre-Select Phase required documents list:
Preliminary Business Case
Mission Analysis
Other FNCS documentation requirements
Mission Analysis Concept Document
OMB Exhibit 300
Select Phase required documents list:
Major Initiatives:
Business Case
Performance Measures
Functional Requirements
Feasibility Study
CPIC Risk Assessment/Mitigation Plan
Update LC Cost Projections
Alternatives Analysis
Funding Source Identification
Last Modified: 8/21/2014
For Official Use Only
Page 113 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Technical Requirements
*System Security Plan
Telecommunications Plan
Enterprise Architecture Plan
e-Government Plan
System Dependencies
Project Plan
Telecommunication/Risk Mitigation Plan
Integrated Logistics Plan (if required)
Acquisition Plan and Strategy
IV&V Documentation (if required)
Section 508 Compliance Plan
Minor Initiatives:
*System Security Plan
Compliance with:
Telecommunications Standards
Enterprise Architecture
E-Government Requirements
Section 508 Requirements
*Please see Guidance on FNCS System Security Plans (SSP)
Control Phase required documents list:
o Costs
Overall Security Schedule
o Baselines
Performance Measures
Risk Factors
o Investment Summary
o Assessments (Earned Value)
Cost vs. Baseline
Last Modified: 8/21/2014
For Official Use Only
Page 114 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
o
o
o
o
o
Schedule vs. Baseline
Validation/Updates:
Cost-Benefits
Risk
Security
Telecommunications Architecture
Section 508
OMB Exhibit 300
System Documentation
System Test and Evaluation
Security Certification and Accreditation
Confirmed PIR Schedule
Evaluate Phase required documents list:
o Stakeholder Impact
o Progress against Performance measures
o Baseline goals evaluation
Cost
Return
Funding/Funding Sources
Schedule
Architecture
Accessibility
Telecommunications
Risk Management
Security Risk Mitigation
o Lessons Learned
Steady State Phase required documents list:
o Annual Review/Update
o Security Plan
o Operational Analysis Report
Stakeholder Assessment
Cost/Schedule Performance
Risk Status Review
Alternatives Review
OMB Exhibit 300
Last Modified: 8/21/2014
For Official Use Only
Page 115 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
1640
FNCS CPIC Process Flow Diagram (per Phase)
Ini t ial Concept Development & Approval
(Pre-Select Phase)
LC > $50M, or
LC > $500K (Financial), or
Multi-agency impact, or
Common Infrastructure, or
USDA Strategic/Mandatory, or
Legislated or Exec. Order, or
USDA Secretary Defines as Critical, or
Differs fr. or Impacts USDA Standards,
Infrastructure or Architecture, or
Tied to Fed. Enterprise Architecture
No
Prelim . Business Case
Mission Anal ysis
Follow FNS Normal
Documentati on
Requirements
Estimated
FY Spending
over $ 2 5 K
?
Yes
OC I O A AR
Required
Yes
A AR
Approved
?
No
Major
Investment
?
Yes
No
Pre-Select
Documentation
Required
Mission Analysis
Concept Document
Prelim. Business Case
OMB Exhibit 300
Continue
Terminate
Modify
Continue
Terminate
Modify
Spending
Au thori t y
Denied
FNS ITIRB
Review
USDA OC I O Rev iew,
Recommendations
USDA
EITIRB
Approved
?
No
Yes
Proceed to
Select Phase
Figure 18 – FNCS CPIC Pre-Select Phase
Last Modified: 8/21/2014
For Official Use Only
Page 116 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Complete Business Case Development & Approval
(Select Phase)
USDA EIT IRB
Approval to
Enter Phase
( Major )
AAR Approval >25K)
(Annual Requirement)
Prepare
Select Phase
Documentation
Update Mission Stmt
Select Integrated Team
Identify Fund Sources
Select Phase Analyses
OMB Exhibit 300
Major Initiatives:
Business Case
Performance Measures
Functional Requirements
Feasibility Study
Risk Assess/Mitigation Plan
Update LC Cost Projections
Alternatives Analysis
Funding Source Ident.
Technical Requirements
Security Plan
Telecommunications Plan
Enterprise Architecture Plan
eGovernment Plan
System Dependencies
Project Plan
Telecomm. Risk/Mitigation Plan
Integrated Logistics Plan (if Rq’d)
Acquisition Plan & Strategy
IV&V Documentation (if Rq’d)
Section 508 Compliance Plan
Continue
Terminate
Modify
FNS ITIRB
Review
USDA OCI O Review,
Recommendations
Continue
Terminate
Modify
Update /
Re-Submi t
Terminate
USDA
EITIRB
Approval
?
No
Yes
Proceed to
Control Phase
Non-Major Initiatives:
Security Plan
Compliance with:
Telecommunications Standards
Enterprise Architecture
eGovernment Requirements
Section 508 Requirements
Figure 19 – FNCS CPIC Select Phase
Last Modified: 8/21/2014
For Official Use Only
Page 117 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Detailed System Design & Implementation
(Control Phase)
Costs:
Overall
Security
Schedule
Technical
Baselines
Performance Measures
Risk Factors
USDA EITIRB
Approval to
Enter Phase
( Major )
AAR Approval >25K)
(Annual Requirement)
Establish / Main tain
Baselines
Cont inual
Progress Assessment
Annual Investment
Review Package
Investment Summary
Assessments (Earned Value):
Cost vs Baseline
Schedule vs Baseline
Performance vs Baseline
Validation/Updates:
Cost-Benefits
Risk
Security
Telecommunications
Architecture
Section 508
OMB Exhibit 300
FNS ITIRB
Review
Continue
Terminate
Modify
Continue
Terminate
Modify
USDA OCI O Review,
Recommendations
EITIRB
Annual Review
I m plementatio n
System Documentation
System Test/Evaluation
Security Certification
& Accredition
Confirmed PIR Schedule
Rollou t
EITIRB
Final Review
Proceed to
Evaluate Phase
Figure 20 – FNCS CPIC Control Phase
Last Modified: 8/21/2014
For Official Use Only
Page 118 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Post- Implementation Evaluat ion
(Evaluate Phase)
USDA EIT IRB
Approval to
Enter Phase
( Ma jor )
Stakeholder Impact
Progress against
Performance Measures
Baseline goals evaluation
Cost
Return
Funding/Funding Sources
Schedule
Architecture
Accessibility
Telecommunications
Risk Management
Security Risk Mitigation
Lessons Learned
AAR Approval >25K
(Annual
Requirement)
Conduct
Post- I mplemen tati on
Review
(after 6 months)
OMB Exhibit 300
Annual Repor t i ng
FNS ITIRB
Review
Continue
Terminate
Modify
Continue
Terminate
Modify
USDA OCI O Review,
Recommendations
EITIRB
Review
Proceed to
Steady State Phase
Figure 21 – FNCS CPIC Evaluate Phase
Last Modified: 8/21/2014
For Official Use Only
Page 119 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Continuing Operations and Main tenance
(Steady State Phase)
USDA EIT IRB
Approval to
Enter Phase
( Ma jor )
AAR Approval >25K
(Annual Requirement)
O perations &
Main tenance
Activi ties
Review &
Re-Assessment
Annual Review/Update:
Security Plan
Operational Analysis Report
Stakeholder Assessment
Cost/Schedule Performance
Risk Status/Review
Alternatives Review
OMB Exhibit 300
Every 3 Years
(& after Major Changes) :
Security Certification
& Accreditation
Post-Implementation Review
Continue
Terminate
Modify
FNS ITIRB
Review
USDA OCI O Review,
Recommendations
Continue
Terminate
Modify
EITIRB
Annual Review
Continue
In Phase
Figure 22 – FNCS CPIC Steady State Phase
Last Modified: 8/21/2014
For Official Use Only
Page 120 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on Maintenance of FNCS Information Systems
1641
Overview
NIST Special Publication 800-53 recommends that all Information Systems are maintained through
a structured process.
This process includes all steps necessary to perform scheduled
maintenance, emergency repairs and routine maintenance onsite or remote to FNCS Information
Systems.
This guidance includes processes that are involved in the maintenance of an information system,
software and hardware. This guidance covers controlled maintenance, maintenance tools, remote
maintenance, maintenance personnel and timely maintenance of information systems. The
procedures are reviewed and updated at least annually.
1710
References
This Guidance is written in accordance with:
NIST SP 800-53 Rev.3
1720
Responsibilities and Guidance
1721
The Network Operations and Engineering (NOEB) Branch will:
Develop Standard Operating Procedures (SOPs) for performing maintenance on all
Information Systems.
Obtain and utilize appropriate automated tools to schedule and perform
maintenance on Information Systems.
Create logs of maintenance performed on all Information Systems and include:
o
o
o
o
o
Date and time of maintenance
Person (name) performing maintenance
FNCS personnel (name) escorting the repair person
Description of maintenance performed
List of equipment removed or replaced, if applicable.
numbers.
Including identification
Assign authorized personnel (for local or remote maintenance) to perform the maintenance
on Information Systems.
o
Assign authorized FNCS personnel to supervise maintenance personnel who do
not have the appropriate authorizations.
o
Assign FNCS personnel to ensure all maintenance logs are kept current, complete
and readily available for audits/assessments.
Last Modified: 8/21/2014
For Official Use Only
Page 121 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
o
Ensure all use of maintenance tools are restricted to authorized personnel only.
Approve all maintenance tools brought into the FNCS facility.
maintenance of the tools.
Check all media containing diagnostic and test programs for malicious code prior to using
on the Information System.
Ensure all maintenance equipment that can retain information does not contain FNCS
information on it. If information is retained on the equipment, properly sanitize it prior to
leaving the FNCS facility.
Monitor and control all remotely executed maintenance and diagnostic activities.
Implement ongoing
o
Ensure mechanisms are in place to audit remote maintenance sessions and
provide all records to FNCS personnel for review.
o
Document the installation and use of remote maintenance and diagnostics links in
the System Security Plan (SSP).
Last Modified: 8/21/2014
For Official Use Only
Page 122 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on Media Protection for FNCS Information System Resources
1800
Overview
NIST recommends that controls are in place to protect all FNCS media. Media includes both digital
and non-digital, e.g. diskettes, magnetic tapes, external/removable hard drives, flash/thumb drives,
compact disks (CD), digital video disks, paper and microfilm. Other examples of media include
laptop computers, PDAs and cell phones. Media is also referred to as portable electronic devices
(PED).
This document is written as a guide to ensure that media is protected through its life to include;
access, labeling, storage, transport, sanitization, protection from theft and disposal.
This guidance applies to all FNCS Users, i.e. employees, contractors and official visitors who use
government-furnished media for official FNCS business. This procedure is update and reviewed
at least annually.
1810
References
This Guidance is written in accordance with:
NIST SP 800-53 Rev.3
Sensitive But Unclassified Guidance:
1820
Roles and Responsibilities
1821
The OIT Technology Division will:
Provide and maintain Active Directory polices to restrict access to media storage areas.
Provide a means to audit successful and unsuccessful logon attempts to FNCS media.
Supply physical access controls as a means to protect information stored on media and
ensure it is secured within a controlled area.
Offer protection of media throughout its life until the media is destroyed or sanitized.
Provide media that supports and enables encryption.
Track any GFE that contains data and/or has the ability to store or transit data. This can
included but not limited to laptops, printers, mobile devices, USB, tablets, and external
drives.
Sanitize media, through destruction, prior to disposal:
o
Track all sanitized media and include verification of sanitization and disposal methods
used.
o
Test sanitization equipment to validate performance on an annual basis.
Provide ability to audit selected removable FNCS information system media.
Last Modified: 8/21/2014
For Official Use Only
Page 123 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
1822
Media Protection Guidelines
FNCS users who extract (print) output from SBU information systems are required to provide
appropriate labels to clearly identify the output, its level of protection and to determine how it is
used, handled and disseminated. When printing SBU information to a shared resource, retrieve all
hard-copy printouts in a timely manner. If the originator of a printout cannot be determined, the
printout must be shredded to protect against unwanted disclosure of SBU information.
FNCS users must exercise adequate precautions to ensure that FNCS Portable Electronic
Devices (PEDs) are secure at all times. Precautions include, but are not limited to:
a. Encrypt the PED and any external media using a FNCS approved method.
b. Do not leave PEDs unattended in public places.
c. Always shut down, lock in a secured storage container and keep PEDs out of view.
d. Best practices are to never leave PEDs in vehicles. If you must, always conceal from view.
e. Report within one-hour if your PED is lost or stolen.
f.
Connect PED (laptops) to the FNCS network every 30 days for a minimum of 60 minutes to
ensure the device receives updates to virus definitions, operating systems and hot fixes.
Last Modified: 8/21/2014
For Official Use Only
Page 124 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Guidance on FNCS Personnel Information Security
1900
Overview
The greatest harm/disruption to a system may stem from the actions of individuals, both intentional
and unintentional. Users, designers, implementers and managers are involved in many important
issues in securing the information contained in FNCS Information Systems. Users of FNCS
Information systems must adhere to the personnel requirements contained in this guidance.
1910
References
This guidance is written in accordance with:
NIST SP 800-53 Rev. 3
Background Investigation Request from FNCS
1920
Roles and Responsibilities
1921
The CIO will:
Ensure all security access requirements are defined for each position.
Ensure all personnel have undergone the appropriate background investigation.
1922
The ISO will:
Develop, disseminate and periodically review/update personnel and information system
security procedures and guidelines.
Monitor the adherence to the personnel security guidance.
Ensure all personnel are trained annually in computer security, privacy and specific
security responsibilities that are applicable to their jobs.
Promptly delete and/or request deletion of system access for application and/or systems
when user terminates employment, suspects password has been compromised or no
longer needs access.
1923
The Contracting Officer’s Representative (COR) and ITPM will:
Ensure all new contract personnel are aware of personnel security requirements prior to
start of work at FNCS.
Distribute the Background Investigation Request forms to all contract personnel.
Approve the Background Investigation Request form and recommend the type of
investigation that is needed.
1924
The Users will
Understand their personnel security responsibilities and duties.
Last Modified: 8/21/2014
For Official Use Only
Page 125 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Understand consequences as written in the Enforcement Statement if they do not comply
with the Information Systems Security Procedures and Guidelines.
Notify the ISO and Supervisor if misuse of data, security breach, violations of procedures
or compromise of password occurs. Please refer to the Incident Reporting and Response
guidance for additional instruction on reporting an incident.
1925
Personnel Security Guidelines
1926
Categorization of FNCS job positions
FNCS assigns risk designations to all job positions.
Risk designations are compliant with 5 CFR 731.106(a) and Office of Personnel
Management (OPM) policy and guidance.
FNCS establishes screening criteria for individuals filling all positions.
FNCS reviews/updates job position risk designations any time
description/duties/responsibilities of the position are significantly changed.
1927
Personnel Screening
FNCS screens personnel who require access to FNCS information and information systems by
requiring a specified level of background investigation and the completion/approval of the User
Access Request Form, FNS-674.
1928
Personnel Termination
Upon voluntary termination of employment for FNCS personnel, the user must complete
and have approved the Final Salary Report, form FNS-677.
Contract personnel who voluntarily terminate employment will contact their COR and
request the Government Contractor’s Employee Separation Checklist (GCESC).
o
The GCESC is also available for download from the E-forms, it can be found at:
http://fncs/ondemand/elibrary/EForms/FNS-774.pdf
o
The GCESC must be completed with all applicable signatures on the last day of
employment for the contract personnel.
FNCS immediately terminates or submits requests to terminate system access following
receipt of the FNS-677 or GCESC forms.
FNS ensures that when employees and contractors are terminated the user access to the
FNS information the information system is disabled not then 24 to 48 hours
Supervisors are required to notify OIT of terminations. OIT can then begin the process of
removing systems’ accesses.
Notification can consist of calling the Help Desk or E-mailing the Security Offices Mailbox.
Last Modified: 8/21/2014
For Official Use Only
Page 126 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
1929
Personnel Transfer
FNCS personnel who are transferred or reassigned to a new location within FNCS will
complete the FNS-674 to request access to new systems and/or file shares.
Supervisors must notify OIT of personnel transfers as soon as possible.
FNCS personnel who are transferred or reassigned to a new position within FNCS will
have all system accesses re-assessed based on the location and job type/categorization.
The completion of the FNS-674 is needed to approve this request.
1930
Access Agreements
FNCS requires the completion and approval of the FNCS User Access Request form, FNS674 prior to providing access to FNCS Information Systems.
FNCS ensures access agreements are reviewed and if necessary updated annually.
FNCS requires through signature, an acknowledgement that the FNCS User understands
and complies with network rules of behavior.
The Rules of Behavior, distributed to each user prior to obtaining access to the FNCS
Network, contains sanctions for personnel who fail to comply with information system
security policies and procedures.
1931
Third-Party Personnel Security
All vendors and contractors that perform official FNCS business outside of FNCS facilities are
given FNCS Information Systems Security policies/procedures within acquisition related
documents and are required to adhere to them.
Last Modified: 8/21/2014
For Official Use Only
Page 127 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Appendix A – Glossary
Terms
Definitions
ACCESS
Interaction between a subject (person, process, or input
device), and an object, (Information Technology resources
e.g., a record file, program, or output device) that results in
the flow of information from one to another. Also, the
ability to obtain knowledge of information stored on the
system.
ACCESS CONTROL
Measures imposed to limit to the exposure of Information
Technology resources to only authorized users, programs,
processes or other systems.
ACCESS POINT
An access point is the entry point from a wireless station to
a Wireless Local Area Network (WLAN) or Wireless Wide
Area Network (WWAN), from a WLAN or WWAN to a
wired Local Area Network (LAN), between WLANs,
WLANs and WWANs, or between WWANS. Access points
generally consist of a radio, a wired network interface, and
management and bridging software. Access point
functionality can be implemented using a hardware device
or an application installed in another network device (a
router for example) and is configured based on
architecture requirements. Some vendors have removed
the management and bridging software from the access
point and placed these features into a wireless switch. In a
WLAN system with wireless switches, the access points
are usually called access ports and are essentially
transceivers (transmitter/receiver of data) with a network
interface. Software applications are available that can be
used to turn a laptop computer acting as a wireless station
(wireless client) into an access point.
ACCREDITATION
The official management decision given by a senior
agency official to authorize operation of an information
system and to explicitly accept the risk to agency
operations (including mission, functions, image, or
reputation), agency assets, or individuals, based on the
implementation of an agreed-upon set of security controls.
ACL
In computer security, an access control list (ACL) is a list
of permissions attached to an object. The list specifies who
or what is allowed to access the object and what
operations are allowed to be performed on the object. In a
typical ACL, each entry in the list specifies a subject and
an operation: for example, the entry (Alice, delete) on the
ACL for file XYZ gives Alice permission to delete file XYZ.
ACCESS CONTROL LIST
AES - ADVANCED ENCRYPTION
STANDARD
Last Modified: 8/21/2014
In cryptography, the Advanced Encryption Standard (AES),
also known as Rijndael, is a block cipher adopted as an
encryption standard by the U.S. government. It has been
For Official Use Only
Page 128 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
analyzed extensively and is now used widely worldwide [2]
as was the case with its predecessor, the Data Encryption
Standard (DES). AES was announced by National Institute
of Standards and Technology (NIST) as U.S. FIPS PUB
197 (FIPS 197) in November 26, 2001 after a 5-year
standardization process (see Advanced Encryption
Standard process for more details). It became effective as
a standard May 26, 2002. As of 2006, AES is one of the
most popular algorithms used in symmetric key
cryptography.
AIR CARD (aka) PC Card or Personal PCMC Personal Computer Memory Card International
Computer Memory Card International Association card, also called a PC Card or Air Card®. A
PCMCIA card may fit into an open slot in a mobile
Association (PMCIA)
computing device, or may need to be installed. It can be
equipped with a variety of features including modem and
network interface capabilities, and may act as a radio
transceiver. PCMCIA cards are often configured to work
with specific wireless carriers, but may support more than
one.
APPLICATION SYSTEM
An automated process or collection of processes, with the
supporting hardware, operating systems and
communication links that supports a business need.
AUDIT TRAIL
A chronological record of system activities sufficient to
enable the reconstruction, review, and examination of the
sequence of events and activities surrounding or leading to
a given operation, procedure, or event in a transaction
AUTHENTICATION
The means of establishing the validity of a claim to
authorized status. Three means of authenticating a user’s
identity can be used alone or in combination.
Something the individual knows (secret password,
Personal Identification Number (PIN), or cryptographic
key);
Something the individual possesses (token, an ATM card
or a smart card);
Something that belongs uniquely to or is part of the
individual (a biometrics such as a voice pattern,
handwriting dynamic, or fingerprint).
AVAILABILITY
The fractional amount of time that a system provides the
services and meets the mission requirements for which it is
designed and operated.
BACKGROUND INVESTIGATION
Review into a person’s past in the determination of
granting a security clearance.
Last Modified: 8/21/2014
For Official Use Only
Page 129 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
BIOMETRICS
Biometrics (ancient Greek: bios =”life”, metron
=”measure”) is the study of methods for uniquely
recognizing humans based upon one or more intrinsic
physical or behavioral traits. In information technology,
biometric authentication refers to technologies that
measure and analyzes human physical and behavioral
characteristics for authentication purposes. Examples of
physical (or physiological or biometric) characteristics
include fingerprints, eye retinas and irises, facial patterns
and hand measurements, while examples of mostly
behavioral characteristics include signature, gait and
typing patterns. All behavioral biometric characteristics
have a physiological component, and, to a lesser degree,
physical biometric characteristics have a behavioral
element.
BLUETOOTH
Bluetooth® enabled electronic devices connect and
communicate wirelessly via short-range (100m or less) in
ad hoc networks called piconets. IEEE 802.15 Wireless
Personal Area Networks (WPANs) formalized the
specification. The Bluetooth® standard is a computing and
telecommunications industry specification that describes
how mobile phones, computers, and PDAs should
interconnect with each other, with home and business
phones, and with computers using short-range
connections. Bluetooth® does not address audit and nonrepudiation security services. Since Bluetooth® devices do
not register when they join a network; they are invisible to
network administrators. Consequently, it is difficult for
administrators to apply traditional physical security
measures.
CAPITAL PLANNING AND
INVESTMENT CONTROL (CPIC)
A process resulting from the Clinger-Cohen Act
(Information Technology Management Reform Act of
(CPIC) 1996), which directs the head of each agency to
design and implement a process to maximize the value
and manage risks, associated with information technology
(IT) investments. The primary objective of CPIC is for
senior managers to systematically maximize the benefits of
IT investments using a five phased management process
established by the Office of Management and Budget and
the General Accounting Office.
Last Modified: 8/21/2014
Pre-Select Phase: Initial concept and definition of
business needs and the system’s scope and
functionality
Select Phase: Concise quantification of the system’s
design, project schedule, benefits, budget, and
For Official Use Only
Page 130 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
performance standards
Control Phase: The design, development, and
implementation of the system
Evaluate Phase: A review and analysis process that
takes place after an IT investment is operational to
determine whether the investment meets expectations.
Steady State Phase: The ongoing operation,
maintenance, and monitoring of the investment against
its planned schedules, budgets, and performance
measures.
CERTIFICATION
The technical evaluation that establishes the compliance of
a computer system, application, or network design and
implementation with prescribed security requirements.
CERTIFICATION AUTHORITY
The official responsible for reporting the comprehensive
evaluation of the technical and non-technical security
features of the FNCS system and other safeguards made
in support of the accreditation process to establish the
extent to which the system design and implementation
satisfies the FNCS Security Guidance and other cognizant
security requirements.
CLASSIFICATION
Designation of the sensitivity level of an entity (i.e.
sensitive, unclassified).
CLEARANCE VERIFICATION
The act of ensuring that a user has the proper security
clearance authorizations prior to granting access to a
facility or Information Technology system.
COLD SITE
A facility designated for emergency backup operations of
another system but not in operation until staffed and
uploaded for that task.
CONFIDENTIALITY
The physical and electronic condition that protects
information and data from unauthorized disclosure.
CONFIGURATION MANAGEMENT
(CM)
Oversight activities for changes and enhancements to the
FNCS system’s hardware, firmware, software, and
documentation to ensure that unintentional modifications
do not occur.
CONTINGENCY PLAN
A plan detailing emergency response, backup operations,
and post-disaster recovery steps for an information
technology system or program that will ensure the
availability of critical resources and facilitate the continuity
of operations in an emergency situation. FNCS OIT refers
to its CP as the ITCP IT Contingency Plan.
CONTINUITY OF OPERATIONS
PLAN (COOP)
A plan developed to support the organization in case of a
protracted infrastructure problem when relocation is
Last Modified: 8/21/2014
For Official Use Only
Page 131 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
necessary. A COOP specifies the actions necessary to
accomplish a smooth transition to an alternate site and
resumption of business operation. A COOP consists of
two components:
Disaster Recovery Plan – A plan that estimates how
long a system can be down before adversely affecting
the core business operation, the value of assets that
will be affected, emergency support personnel
required, and the availability of software, hardware and
telecommunication facilities needed to support the
system.
Business Resumption Plan – A plan developed for the
re-establishment of business processes when the
primary location for the business has been destroyed
or rendered unavailable for an extended period of time.
It typically covers relocating to a facility, business
equipment requirements, local area network support,
and all elements necessary to resume business
functions for mission critical business processes.
CONTROLLED AREAS
The areas within the FNCS facility where access is
monitored and restricted to authorized personnel.
COMMERCIAL OFF-THE-SHELF
(COTS) SYSTEMS
Software acquired by government contract through a
commercial vendor. The software is a standard product,
not developed for a particular government project.
COMMERCIAL WIRELESS
Devices, Services and Technologies commercially
procured and intended for use in commercial and
unlicensed frequency bands, e.g., Starbucks, airports.
COMPROMISE
The disclosure of information to persons who are not
authorized access thereto.
COMPUTER VIRUS
A program designed to infect system software or
application programs in much the same way as a biological
virus infects humans. The typical virus reproduces by
making copies of itself when inserted into other programs.
DATA
A representation of facts, concepts, information, or
instructions suitable for communication, interpretation, or
processing by humans or by Information Technology
resources.
DATA INTEGRITY
The attribute of data relating to the preservation of (1) its
meaning and completeness, (2) the consistency of its
representation(s) and (3) its correspondence to what it
represents.
Last Modified: 8/21/2014
For Official Use Only
Page 132 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
DMZ – DEMILITARIZED ZONE
A part of the network that is neither part of the internal
network nor directly part of the Internet. Basically a
network sitting between two networks.
DECRYPT
To convert, by use of the appropriate key, encrypted
(encoded or enciphered) text into its equivalent plain text.
DENIAL OF SERVICE (DoS)
Action or actions that deteriorate all or part of the ability of
an Information Technology infrastructure to perform its
designated mission.
DEPUTY REGIONAL INFORMATION An individual appointed for each region within the
organization. The DRISSO acts on behalf of the
SYSTEMS SECURITY OFFICER
Information Systems Security Office to ensure compliance
(DRISSO)
with the information systems security procedures
developed for the local environment.
DIAL-BACK
A procedure used by some remote access software or
hardware that receives a connection and authenticates the
user, then hangs up the connection and dials a
predetermined number in order to establish a
communications session with the user.
DIGITAL SIGNATURES
A digital signature (not to be confused with a digital
certificate) is an electronic signature that can be used to
authenticate the identity of the sender of a message or the
signer of a document, and possibly to ensure that the
original content of the message or document that has been
sent is unchanged. Digital signatures are easily
transportable, cannot be imitated by someone else, and
can be automatically time-stamped. The ability to ensure
that the original signed message arrived means that the
sender cannot easily repudiate it later.
DISASTER
An event with the potential to disrupt computer operations,
thereby disrupting critical mission and business functions.
Such an event could be a power outage, hardware failure,
fire, or storm.
EMERGENCY/INCIDENT
RESPONSE
The prompt and effective reaction to disruptions in normal
processing activities through preplanned, measured steps.
EMPLOYEE PERSONAL TIME
Non-Work Hours. Employees may use government
furnished equipment during their own off-duty hours such
as before or after a workday (subject to local office hours),
lunch periods, authorized breaks, or weekends or holidays
(if their duty station is normally available at such times).
ENCRYPTION
The process of transforming data into a format that the
original data either cannot be obtained (one-way
encryption) or cannot be obtained without using the
inverse decryption process.
Last Modified: 8/21/2014
For Official Use Only
Page 133 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
ENCRYPTION ALGORITHM
A set of mathematically expressed rules through which
transmitted information is rendered unintelligible.
Cryptography affects a series of transformations through
the application of variable elements, controlled by use of a
cryptographic key, to the normal representation of the
information.
EXTERNAL NETWORK
Any network outside of the control of the FNCS IT
infrastructure staff. Examples are the Internet, the Public
Telephone System (PTS), Value Added Networks (VANs),
vendor networks, other Agency/Department networks, etc.
FIRMWARE
Logic circuits in read-only memory that can be altered by
software under certain circumstances.
FIREWALL
A firewall is a device that guards the entrance to a private
network and keeps out unauthorized or unwanted traffic.
GATEWAY
The interface between electronic mail environments to
facilitate the exchange of messages and attachments
despite the size and type of message content.
GENERAL SUPPORT SYSTEM
(GSS)
An interconnected set of information resources under the
same direct management control which shares common
functionality. A system normally includes hardware,
software, information, data, applications, communications,
and people. A system can be, for example, a local area
network (LAN) including smart terminals that supports a
branch office, an agency-wide backbone, a
communications network, a departmental data processing
center including its operating system and utilities, a tactical
radio network, or a shared information processing service
organization (IPSO).
GOVERNMENT OFF-THE-SHELF
Software developed by the government. This software is a
standard product, not developed for a particular
government project.
GFE – GOVERNMENT-FURNISHED
EQUIPMENT
Any government issued equipment, issued by FNCS or
USDA.
HOT FIX
A hot fix is code (sometimes called a patch) that fixes a
bug in a product. Users of the products may be notified by
e-mail or obtain information about current hot fixes at a
software vendor’s Web site and download the hot fixes
they wish to apply. Hot fixes are sometimes packaged as a
set of fixes called a combined hot fix or a service pack.
HOT SITE
A processing facility already equipped with processing
capability and fully operational.
HUB
A common connection point for devices in a network. Hubs
are commonly used to connect segments of a LAN. A hub
Last Modified: 8/21/2014
For Official Use Only
Page 134 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
contains multiple ports. When a packet arrives at one port,
it is copied to the other ports so that all segments of the
LAN can see all packets.
IDENTIFICATION
The means by which a user provides a claimed identity to
the system.
INCIDENT
Event that has an actual or potential effect on an
Information System.
INFORMATION SECURITY OFFICE
(ISO)
The focal point for all organizational information systems
security concerns and who ensures that the program
requirements described in the FNCS security Guidance
statements are implemented.
INFORMATION TECHNOLOGY
INFRASTRUCTURE
The equipment used in the acquisition, processing,
storage, and dissemination of information in all its forms
(auditory, pictorial, textual, and numerical) through a
combination of computers, telecommunications networks,
networks (LAN’s/WAN’s consisting of switches, router,
hubs, etc.), and electronic devices.
INTEGRITY
The quality of data that ensures the continuity of its format,
content, and veracity.
INTERNET
The collection of worldwide “network of networks” that use
the TCP/IP protocol suite for communications.
INTERCONNECTION SERVICE
AGREEMENT (ISA)
An agreement established between the organizations that
own and operate connected IT systems to document the
technical requirements of the interconnection. The ISA
also supports a Memorandum of Understanding or
Agreement (MOU/A) between the organizations.
INTRANET
A network internal to the organization that is based on
TCP/IP protocols.
MEMORANDUM OF
UNDERSTANDING/AGREEMENT
(MOU/MOA)
A document established between two or more parties to
define their respective responsibilities in accomplishing a
particular goal or mission. MOU/A defines the
responsibilities of two or more organizations in
establishing, operating, and securing a system
interconnection.
MISSION CRITICAL SYSTEM
Systems that are essential to the execution of FNCS
business functions. There would be major financial losses,
as well as losses to the creditability of FNCS if these
systems fail or become inoperable for any period of time.
NEED-TO-KNOW
A determination made by the owner or controller of certain
information that a prospective recipient of the information
has a valid requirement for access to, knowledge of, or
possession of the information.
Last Modified: 8/21/2014
For Official Use Only
Page 135 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
NETWORK
A communication medium including all components
connected to that medium (computers, routers, controllers,
packet switches, etc.) used for the transference of
information.
NETWORK ACCESS CONTROL
MECHANISM
Hardware or software responsible for restricting access to
network hosts. Examples are firewalls, secure application
gateways, secure dial-up devices, Virtual Private
Networking, etc.
NAT – NETWORK ADDRESS
TRANSLATION
NAT (Network Address Translation or Network Address
Translator) is the translation of an Internet Protocol
address (IP address) used within one network to a different
IP address known within another network. One network is
designated the inside network and the other is the outside.
Typically, a company maps its local inside network
addresses to one or more global outside IP addresses and
un maps the global IP addresses on incoming packets
back into local IP addresses. This helps ensure security
since each outgoing or incoming request must go through
a translation process that also offers the opportunity to
qualify or authenticate the request or match it to a previous
request. NAT also conserves on the number of global IP
addresses that a company needs and it lets the company
use a single IP address in its communication with the
world.
NAT is included as part of a router and is often part of a
corporate firewall. Network administrators create a NAT
table that does the global-to-local and local-to-global IP
address mapping. NAT can also be used in conjunction
with Guidance routing.
NETWORK MAPPING TOOL
An example of a Network Mapping Tool is Network
Analyzer. It is a hardware or software device that monitors
and analyses data traveling over a network. Network
Analyzer offers various network troubleshooting features,
including protocol-specific packet decodes, specific
preprogrammed troubleshooting tests, packet filtering, and
packet transmission.
NIC - NETWORK INTERFACE
CONTROLLER(CARD)
A network card, network adapter or NIC (network interface
controller) is a piece of computer hardware designed to
allow computers to communicate over a computer network.
It is both an OSI layer 1 (physical layer) and layer 2 (data
link layer) device, as it provides physical access to a
networking medium and provides a low-level addressing
system through the use of MAC addresses. It allows users
to connect to each other either by using cables or
wirelessly.
Last Modified: 8/21/2014
For Official Use Only
Page 136 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
PACKET SNIFFERS
A packet sniffer (also known as a network analyzer or
protocol analyzer or, for particular types of networks, an
Ethernet sniffer or wireless sniffer) is computer software or
computer hardware that can intercept and log traffic
passing over a digital network or part of a network. As data
streams travel back and forth over the network, the sniffer
captures each packet and eventually decodes and
analyzes its content according to the appropriate RFC or
other specifications.
PASSWORD CRACKING
Password cracking is the process of recovering secret
passwords from data that has been stored in or transmitted
by a computer system. A common approach is to
repeatedly try guesses for the password. The purpose of
password cracking might be to help a user recover a
forgotten password (though installing an entirely new
password is less of a security risk, but involves system
administration privileges), to gain unauthorized access to a
system, or as a preventive measure by system
administrators to check for easily crack-able passwords.
PATCH
A patch (sometimes called a “fix”) is a quick-repair job for a
piece of programming. During a software product’s beta
test distribution or try-out period and later after the product
is formally released, problems (called bug) will almost
invariably be found. A patch is the immediate solution that
is provided to users; it can sometimes be downloaded from
the software maker’s Web site. The patch is not
necessarily the best solution for the problem and the
product developers often find a better solution to provide
when they package the product for its next release.
A patch is usually developed and distributed as a
replacement for or an insertion in compiled code (that is, in
a binary file or object module). In larger operating systems,
a special program is provided to manage and keep track of
the installation of patches.
PED – PORTABLE ELECTRONIC
DEVICES
Last Modified: 8/21/2014
A PED is any electronic device that is capable of receiving,
storing or transmitting information using any format (i.e.,
radio, infrared, network or similar connections) without a
permanent link to Federal networks. Handheld devices
such as PDAs and cell phones allow remote user to
synchronize personal databases and provide access to
network services such as wireless e-mail, Web browsing
and Internet Access. Generally, PEDs include but are not
limited to: cell phones, pagers, text messaging devices
(Blackberries), hand scanners, PDAs, voice recorders and
flash memory.
For Official Use Only
Page 137 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
PEER-TO-PEER
WLANs may be configured into a peer-to-peer (also known
as ad hoc or independent) network that permits devices to
communicate directly. Peer-to-peer WLAN
communications can bypass required encryption and
authentication mechanisms, making transmissions
vulnerable to interception and unauthorized access from
outsiders. Peer-to-peer voice communications are an
exception to this Guidance.
PERFORMANCE MEASUREMENT
The use of measures for monitoring and assessing
progress toward an effective Information Systems Security
Program.
PDA – PERSONAL DIGITAL
ASSISTANT/SMART PHONE
Personal digital assistants (PDAs) are handheld computers
that were originally designed as personal organizers, but
became much more versatile over the years. PDAs are
also known as pocket computers or palmtop computers.
PDAs have many uses: calculation, use as a clock and
calendar, playing computer games, accessing the Internet,
sending and receiving E-mails, video recording, typewriting
and word processing, use as an address book, making and
writing on spreadsheets, use as a radio or stereo, and
Global Positioning System (GPS). Newer PDAs also have
both color screens and audio capabilities, enabling them to
be used as mobile phones (smart phones), web browsers,
or portable media players. Many PDAs can access the
Internet, intranets or extranets via Wi-Fi, or Wireless WideArea Networks (WWANs). One of the most significant PDA
characteristic is the presence of a touch screen.
Personal Electronic Equipment
An electronic device that emits an audible or visual signal,
displays a message, or otherwise summons the
possessor, including, but not limited to, cellular telephones,
tablets, paging devices, electronic e-mailing devices,
radios, tape players, CD players, DVD players, video
cameras, iPods or other MP3 players, portable video game
players, laptop computers, personal digital assistants
(PDA’s), cameras, and any device that provides a wireless
connection to the Internet.
PHYSICAL SECURITY
The physical application of barriers and control procedures
as preventive measures or countermeasures against
threats to IT resources, and sensitive information.
PERSONALLY IDENTIFIABLE
INFORMATION (PII)
Any piece of information which can potentially be used to
uniquely identify, contact, or locate a single person.
PICONET
A piconet is established when two or more portable
devices make a wireless connection. When a piconet is
Last Modified: 8/21/2014
For Official Use Only
Page 138 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
formed, one device controls one or more other devices for
the duration of the communication session. A piconet is
sometimes called a Personal Area Network (PAN).
POA&M – PLAN OF ACTION AND
MILESTONES
A plan of action and milestones (POA&M) is a tool that
identifies tasks that need to be accomplished. It details
resources required to accomplish the elements of the
plan, any milestones in meeting the task, and scheduled
completion dates for the milestones.
The purpose of this POA&M is to assist agencies in
identifying, assessing, prioritizing, and monitoring the
progress of corrective efforts for security weaknesses
found in programs and systems.
POE – PERSONALLY-OWNED
EQUIPMENT
This is equipment that is not owned by FNCS or the
Federal Government. Please see Network Access
Guidance for restrictions on POEs.
PORT SCANNER
A port scanner is a piece of software designed to search a
network host for open ports. This is often used by
administrators to check the security of their networks and
by crackers to compromise it.
PRIVACY
The concept that a user’s data, such as stored files and email, is not to be examined by anyone else without that
user’s permission.
PROXY SERVER
In computer networks, a proxy server is a server (a
computer system or an application program) which
services the requests of its clients by making requests to
other servers. A client connects to the proxy server,
requesting a file, connection, web page, or other resource
available from a different server. A proxy server provides
the resource by connecting to the specified server, with
some exceptions: A proxy server may alter the client’s
request or the server’s response. A proxy server may
service the request without contacting the specified server.
QUALITATIVE RISK ASSESSMENT
A methodology used to assess risk based on descriptions
and rankings.
QUANTITATIVE RISK
ASSESSMENT
A methodology used to assess risk based on
computational means.
REMOTE ACCESS
The interface by a user operating on a device at a location
outside the internal environment of a specified internal IT
network structure into that structure.
Last Modified: 8/21/2014
For Official Use Only
Page 139 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
Removable Media
Device or media that is readable and/or writeable by the
end user and is able to be moved from computer to
computer. This includes but is not limited to flash memory
devices such as thumb drives, cameras, MP3 players and
PDAs; removable hard drives (including hard drive-based
MP3 players); optical disks such as CD and DVD disks;
floppy disks and any commercial music and software
disks.
REMOVABLE STORAGE MEDIA
USB/Flash drive, External hard drive, CD and DVD,
Floppy Disks and Back-up Tapes
RISK
A combination of the likelihood that a threat shall occur,
the likelihood that a threat occurrence shall result in an
adverse impact, and the severity of the resulting adverse
impact.
RISK ASSESSMENT
The process of identifying, validating and analyzing the
existing threats and vulnerabilities of an information
system, and the potential impact that the realization of any
of those risks would have on the delivery of agency
service. The resulting analysis is then used as a basis for
identifying appropriate and cost-effective measures to
mitigate the risk. Risk analysis is the part of risk
management that evaluates specific security measures
and their commensurability with the value of the resources
to be protected, the vulnerabilities of those resources, and
the identified the identified threats against them.
RISK MANAGEMENT
Process concerned with the identification, measurement,
safeguard, and control of security risks in the FNCS
system.
RISK MITIGATION
The selection and implementation of security controls to
reduce risk to a level acceptable to management.
ROUTER
A device or setup that finds the best route between any
two networks, even if there are several networks to
traverse. Like bridges, remote sites can be connected
using routers over dedicated or switched lines to create
WANs.
SECURITY
Measures, safeguards and controls that ensure
confidentiality, integrity, availability, and accountability of
information transmitted, processed, and stored on FNCS
IT systems.
SECURITY CLEARANCE
A level of assurance that an individual is trustworthy and
reliable, so that he or she can have access to agency IT
systems.
SECURITY CERTIFICATION
A formal testing of the security safeguards implemented in
Last Modified: 8/21/2014
For Official Use Only
Page 140 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
and about the computer system to determine whether it
meets applicable requirements and specifications.
SECURITY DOCUMENTATION
The technical records used and maintained throughout the
information system’s life cycle and the written guidance for
users of the system’s software applications and hardware.
Technical documentation includes system and design
specifications; management plans, architectural prototype,
and detail design documents; test specifications and
reports, and engineering change requests and results.
User documentation includes customer reference and
usage information.
SECURITY MANAGEMENT
Supporting services that oversee to the protection of
Information and resources in accordance with applicable
security Guidance.
SECURITY SAFEGUARDS
Measures and controls that are prescribed to meet
specified system security requirements. Safeguards may
include, but are not limited to, hardware and software
security features; operation procedures; accountability
procedures; access and distribution controls; management
constraints; personnel security; and physical structures,
areas, and devices.
SECURITY TEST AND EVALUATION Examination and analysis of the measures, safeguards
and controls required to protect the FNCS system, as they
have been applied in an operational environment, to
determine the security posture of the system.
SENSITIVE INFORMATION
“Any information the loss, misuse or unauthorized access
to or modification of which could adversely affect the
national interest or the conduct of Federal programs, or the
privacy to which individuals are entitled under section 552
a of title 5 USC (The Privacy Act), but which has not been
specifically authorized under criteria established by an
Executive Order or an Act of Congress to be kept secret in
the interest of national defense or foreign Guidance.”
SENSITIVITY ASSESSMENT
Looks at the sensitivity of both the information to be
processed and the system itself. The assessment
considers legal implications, organization Guidance, and
the functional needs of the system.
Last Modified: 8/21/2014
For Official Use Only
Page 141 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
SERVER
Definitions
Server (computing) a computer that provides services to
other computers, or the software that runs on it also like
the internet sites like Google and Yahoo.
Application server, a server dedicated to running certain
software applications
Communications server, carrier-grade computing platform
for communications networks
Database server provides database services
Proxy server Provides database IT server in services
Fax server provides fax services for clients
File server provides file services
Game server a server that video game clients connect to in
order to play online together
Standalone server an emulator for client-server (webbased) programs
Web server a server that HTTP, WWW, COM, ORG, NET,
CC, Info, and TV clients connect to in order to send
commands and receive responses along with data
contents.
Client-server a software architecture that separates
“server” functions from “client” functions
The X Server part of the X Window System
Peer-to-peer a network of computers running as both
clients and servers.
SERVICE PACK
A service pack is an orderable or downloadable update to
a customer’s software that fixes existing problems and, in
some cases, delivers product enhancements. IBM and
Microsoft are examples of companies that use this term to
describe their periodic product updates.
SERVICE SET IDENTIFIER (SSID)
Short for service set identifier, a 32-character unique
identifier attached to the header of packets sent over a
WLAN that acts as a password when a mobile device tries
to connect to the Basic Service Set (BSS). The SSID
differentiates one WLAN from another, so all access points
Last Modified: 8/21/2014
For Official Use Only
Page 142 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
and all devices attempting to connect to a specific WLAN
must use the same SSID. A device will not be permitted to
join the BSS unless it can provide the unique SSID.
Because an SSID can be sniffed in plain text from a packet
it does not supply any security to the network. An SSID is
also referred to as a network name because essentially it
is a name that identifies a wireless network.
SPAM OR Spam
Electronic, unsolicited or undesired bulk electronic
messages. There are many types of electronic spam,
including
E-mail spam, unsolicited e-mail.
SPECIALIZED (CUSTOM) SYSTEMS Software that is developed for a specific function/project by
a vendor or internal source.
STRONG AUTHENTICATION
The use of at least two forms of authentication to identify
and authenticate a subject. Forms of authentication
include something the subject knows (e.g. passwords.),
something the subject has (e.g. keys, authentication
tokens, smart cards, etc.), or something the subject is (e.g.
biometrics).
SWITCHES
A switch is a device for changing the course (or flow) of a
circuit. The prototypical model is a mechanical device (for
example a railroad switch) which can be disconnected
from one course and connected to another. The term
"switch" typically refers to electrical power or electronic
telecommunication circuits. In applications where multiple
switching options are required (e.g., a telephone service),
mechanical switches have long been replaced by
electronic variants which can be intelligently controlled and
automated.
SYSTEM INTERCONNECTION
The state of systems being mutually connected to each
other.
SYSTEM
A discrete set of information technology, data, and related
resources, such as personnel, hardware, software, and
associated technology services organized for the
collection, processing, maintenance, use, sharing,
dissemination or disposition of information. A system must
have logical boundaries around a set of processes,
communications, storage and must: (1) be under the same
direct management control; (2) have the same function or
mission objective; (3) have essentially the same operating
characteristics and security needs; and (4) reside in the
same general operating environment.
SYSTEM SECURITY PLAN (SSP)
A formal document that fully describes the in place security
features and procedures and the planned security tasks
Last Modified: 8/21/2014
For Official Use Only
Page 143 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
required to meet security requirements and eventualities.
THREAT
Any circumstance or event with the potential to cause
harm to FNCS IT systems in the form of destruction,
disclosure, modification of data, or denial of service.
TCP/IP - TRANSMISSION CONTROL A suite of rules (protocols) that define how data is
transported among computers on the Internet.
PROTOCOL (TCP) INTERNET
PROTOCOL (IP)
TRUSTED FACILITY MANUAL
A document prepared to satisfy the requirement of any
Trusted Computer Security (TCSEC) class. The Trusted
Facility Manual provides detailed information on how to: 1)
configure and install a secure system; 2) operate the
system securely; 3) correctly and effectively use system
privileges and protection mechanisms to control access to
administrative functions; and 4) avoid improper use of
those functions which could compromise the trusted
computer base (TCB) and user security. A Trusted Facility
Manual is a necessary tool for all system administrators to
ensure that they are running in a “trusted manner”.
UNAUTHORIZED ACCESS
The use of IT resources by any person not authorized to
have access to the facilities housing the FNCS system, the
system itself or the information residing therein.
USB – UNIVERSAL SERIAL BUS
USB (Universal Serial Bus) is a plug-and-play interface
between a computer and add-on devices (such as audio
players, joysticks, keyboards, telephones, scanners, and
printers). With USB, a new device can be added to your
computer without having to add an adapter card or even
having to turn the computer off. The USB peripheral bus
standard was developed by Compaq, IBM, DEC, Intel,
Microsoft, NEC, and Northern Telecom and the technology
is available without charge for all computer and device
vendors.
USERS
Personnel or processes accessing an Information
Technology resource either by direct connections (i.e., via
terminals) or indirect connections (i.e., prepare input data
or receive output).
VALIDATION
Determination of the correct implementation in the
completed FNCS system with the security requirements
and approach agreed upon by FNCS, and the user
community.
VPN - VIRTUAL PRIVATE
NETWORK
A private data network that makes user of the
telecommunication infrastructure, maintaining privacy
through the use of a tunneling protocol and security
procedures.
Last Modified: 8/21/2014
For Official Use Only
Page 144 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
VULNERABILITY
A weakness in the physical layout, organization,
procedures, personnel, management, administration,
hardware, or software that may be exploited to cause harm
to FNCS systems.
WAN
A wide area network (WAN) is a geographically dispersed
telecommunications network. The term distinguishes a
broader telecommunication structure from a local area
network (LAN). A wide area network may be privately
owned or rented, but the term usually connotes the
inclusion of public (shared user) networks. An intermediate
form of network in terms of geography is a metropolitan
area network (MAN).
Wi-Fi – Wireless Fidelity
Wi-Fi is a brand originally licensed by the Wi-Fi Alliance to
describe the embedded technology of wireless local area
networks (WLAN) based on the IEEE 802.11
specifications. Wi-Fi was developed to be used for mobile
computing devices, such as laptops in LANs, but is now
increasingly used for more services, including Internet and
VOIP phone access, gaming, and basic connectivity of
consumer electronics such as televisions, DVD players,
and digital cameras. More standards are in development
that will allow Wi-Fi to be used by cars on highways in
support of an Intelligent Transportation System to increase
safety, gather statistics, and enable mobile commerce (see
IEEE 802.11p). Wi-Fi and the Wi-Fi CERTIFIED logo are
registered trademarks of the Wi-Fi Alliance - the trade
organization that tests and certifies equipment compliance
with the 802.11x standards.
WIRELESS DEVICE
Hardware that provides wireless capabilities. This
definition includes, but is not limited to wireless handheld
devices like PDAs, cellular/PCS phones, two-way pagers,
wireless audio/video recording devices, telemetry devices
with wireless integrated technologies, electronic tablets
and laptop computers.
WIRELESS HANDHELD DEVICE
Small computers often capable of synchronizing with a PC
on specific software applications. Many handheld devices
are capable of “beaming” data with the use of Infrared (IR)
or Bluetooth technologies. Handheld wireless devices
include a range of PDAs and Smart phones that may
combine the capabilities of a traditional PDA, digital
cellular telephone with voice services as well as E-mail,
text messaging, Web access, voice recognition and any
number of applications that serve a productivity tools.
WLAN – Wireless LAN
A wireless LAN (or WLAN, for wireless local area network,
Last Modified: 8/21/2014
For Official Use Only
Page 145 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Terms
Definitions
sometimes referred to as LAWN, for local area wireless
network) is one in which a mobile user can connect to a
local area network (LAN) through a wireless (radio)
connection. The IEEE 802.11 group of standards specify
the technologies for wireless LANs. 802.11 standards use
the Ethernet protocol and CSMA/CA (carrier sense
multiple access with collision avoidance) for path sharing
and include an encryption method, the Wired Equivalent
Privacy algorithm.
WORM
A complete program that propagates itself from system to
system, usually through a network or other communication
facility. A worm is similar to a virus and can infect other
systems and programs. A worm differs from a virus in that
a virus replicates itself, and a worm does not. A worm
copies itself to a person’s workstation over a network or
through a host computer and then spreads to other
workstations, possibly taking over a network. Unlike a
Trojan horse, a worm enters a system uninvited.
WPAN - WIRELESS PERSONAL
AREA NETWORK
WPANs operate in the Personal Operating Space (POS) of
a user, which extends 10 meters in any directions. Also
known as Bluetooth®, WPAN communications are
governed by the IEEE 802.15 family of standards.
Additional Terms are located in the DM3595-00, 1 USDA Cyber Security Manual Series 3500
Glossary. http://www.ocio.usda.gov/directives/doc/DM3595-001.pdf.
Last Modified: 8/21/2014
For Official Use Only
Page 146 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Appendix B – Form FNS-674 Completion Instructions
The FNS-674 form is to be used to obtain access to the network, escalation of privileges, access
to privileged information systems, etc.
Please refer to the system Access FNS -674 User guide located online here for further details on
how to complete the FNS-674 form.
Last Modified: 8/21/2014
For Official Use Only
Page 147 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Appendix C – Password Hints
Password Protection Standards
Treat passwords as sensitive, confidential information.
Memorize your password.
Passwords should never be written down or stored online.
Never share your password with anyone.
Immediately contact your ISSO if you feel your password has been compromised.
Creation of Password Standards
Passwords must contain a minimum of twelve (12) characters
Include at least three of the following character sets: upper case; lower case; numeric
characters; special non-alphanumeric characters such as # & % ! @ ( ).
Do not include any simple pattern of letters or numbers such as “aaabbbccc” or
“12345678910.”
Do not make passwords easy to guess e.g., “my family name” or a birth date or a street
address.
Do not use words in any language, slang, jargon or words found in a dictionary. For
example, you cannot use xylophone, but you can use “Xy!oph0ne12!”
Try using a favorite quotation as an acronym by using the first letter of each word in the
quotation including upper case, lower case and punctuation to make your password more
secure and easier to remember. Don’t forget to make your password 12 characters or
more. Some examples follow:
a. “Once upon a midnight dreary, while I pondered, ...”Ouamd,wip...”
b. “T’was the night before Christmas and all, ...”Ttnbcaa…”
c. “I’d walk a mile for a camel…!,” “Iwamfacl,…!”
Remember, more secure passwords are those which are based on pass phrases and/or nondictionary words (including “nonsense” words), combined with obscure character substitutions.
These types of passwords can be extremely difficult to either guess or crack.
Last Modified: 8/21/2014
For Official Use Only
Page 148 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Appendix D – Required C&A System Security Documents
Document
Description
References
Security
Categorization
Document (SCD)
The SCD is used to determine the appropriate
security categorization for the system or
application, and the levels of involvement
identified for confidentiality, integrity, and
availability. Federal Information Processing
Standards Publication (FIPS PUB) 199
provides guidance for assigning security
categorization factors for information
processed on federal systems. Each factor is
assigned a level of low, moderate, or high.
Business reference models (lines of business
and data types) should be referenced from
NIST SP800-60. The completed System
Categorization aka “Syscat” from the
ASSERT/CSAM tool is acceptable for meeting
this requirement. Unique Project Identifier
(UPI) codes must be included in the SCD of
ASSERT/CSAM document for systems
covered by the document. This document may
be included as an appendix in the system
security plan (SSP).
FIPS PUB 199
NIST SP 80060
Risk Assessment
(RA)
The baseline for the risk assessment is the
agency self-evaluation from NIST SP 800-30.
The agency RA should be completed in
accordance with NIST guidance to ensure that
system security controls are maintained to
protect system assets and information. This
document may be included as an appendix in
the SSP.
NIST SP 80030
Privacy Impact
Assessment (PIA)
The PIA provides an analysis of how personal
information is handled in an information
system. Agencies must complete a PIA for all
systems. This document may be included as
an appendix in the SSP.
Privacy Act of
1974
System Security
Plan (SSP)
The SSP should contain a description of the
security controls required for the system and
how these controls are implemented as part of
the system’s security posture.
NIST SP 80018
DM 3565-001
Security Control
Assessment Plan
The Security Control Assessment plan should
contain detailed procedures and/or checklists
for validating the implementation of each
required security control.
NIST SP 80053
Security Control
Assessment
Report
The Security Control Assessment report
contains results of functional and security
testing conducted on the system as required
NIST SP 80053
Last Modified: 8/21/2014
For Official Use Only
Page 149 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
by the security categorization.
Security
Assessment
Report (SAR)
Contingency and
Disaster Recovery
Plans (CDRP)
The format and content of the security
assessment are described, including major
findings, recommended corrective actions,
and a proposed accreditation statement. In
particular, the major findings should include
both proposed residual vulnerabilities and
proposed vulnerabilities requiring correction.
CDRPs should include all procedures that will
be taken in the event of an incident that shuts
down the system, or a large emergency that
destroys the system entirely. These procedures
should provide for system and data restoration
within a prescribed time based on system
criticality. Often, for USDA systems, this
information can be found in LDRPS.
USDA
Certification
and
Accreditation
Guide
NIST SP 80034
DM 3570-001
FPC-65
Plans must be tested annually. The following
systems must have a fully functional test
performed annually:
Systems categorized as “High” by NIST FIPS
199;
Systems that retrieve records by personally
identifiable information (PII) and/or requires
a system of record (SOR) notice to be
posted; and
Systems storing, processing, or transmitting
agency financial information.
Tabletop tests may be conducted for all other
systems twice a year.
Trusted Facilities
Manual (TFM) or
Equivalent
(Note for re-accreditation: If a system has
undergone no major changes and has satisfied
its annual contingency plan test requirement,
this will satisfy the C&A requirement of a tested
contingency plan.)
The purpose of a TFM is to document the
necessary information to operate the system in
a secure and effective manner. The
requirement includes the following:
Documentation shall include
guide(s) or manual(s) for the
system’s privileged users. The
manual(s) shall at a minimum
provide information on (1)
configuring, installing, and operating
Last Modified: 8/21/2014
For Official Use Only
Page 150 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
the system; (2) making optimum use
of the system’s security features;
and (3) identifying known security
vulnerabilities regarding the
configuration and use of
administrative functions. The
documentation shall be updated as
new vulnerabilities are identified.
Security Features
Users Guide
(SFUG) or
Equivalent
The TFM is not meant for general users of the
system, but for use by those personnel
designated as having specific security-related
responsibilities. It provides information about
the environment, roles, and responsibilities that
guide security administrators and others with
security responsibilities in the use of the
security features provided by the IS. The TFM
documents the configuration guidance used,
the operational requirements, the security
environment, the hardware and software
configurations and interfaces, and all security
procedures, measures, and contingency plans
for an IS. It also identifies known security
vulnerabilities and any risk mitigation
approaches employed. This document may be
included as an appendix in the SSP.
The SFUG should be written for system and
application users, and should clearly explain
the security procedures and precautions that
users are expected to follow (i.e., procedures
for maintaining password secrecy, etc.). This
document may be included as an appendix in
the SSP.
Configuration
Management Plan
(CMP)
The configuration management plan is used
to manage the changes that occur during a
system’s life cycle to ensure the integrity of
the system. The National Consensus
Standard for Configuration Management
Government Electronics and Information
Technology Association describes
Configuration Management functions and
principles, and defines a neutral Configuration
Management terminology for use with any
product line. This document may be included
as an appendix in the SSP.
ANSI/GEIA
EIA-649-A
Security Control
Compliance Matrix
(SCCM)
The matrix should list each security control,
the reference from which the security control
was derived, and whether or not the control
was implemented. The SCCM should start
with the appropriate NIST SP800-53 control
NIST SP 80025
NIST SP 80053 Rev 1
Last Modified: 8/21/2014
For Official Use Only
Page 151 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
baseline. It should then be tailored with
supplemental and compensating controls as
determined by the risk assessment. Baseline
tailoring should be described in the SSP. This
document may be included as an appendix in
the SSP.
FIPS PUB 199
FIPS PUB 200
System of Records
(SOR) Notice
The Privacy Act of 1974 requires agencies to
publish in the Federal Register a “notice of the
existence and character of the system of
records.” A “system of records” is defined as a
group of any records under the control of any
agency from which information is retrieved by
the name of the individual or by some
identifying number, symbol, or other
identifying particular assigned to the
individual. This document may be included as
an appendix in the SSP.
Privacy Act of
1974
Plans of Action
and Milestones
(POA&Ms)
POA&Ms are descriptions of measures
implemented or planned to correct
deficiencies and reduce/eliminate
vulnerabilities identified by the certification
team. This document may be included as an
appendix in the SSP.
OMB
Memorandum
02-01
Interconnection
Security
Agreement
(ISA/MOU/MOA)
NIST Special Publication 800-47 “Security
Guide for Interconnecting Information
Technology Systems” (August, 2002) provides
a management approach for interconnecting
IT systems, with an emphasis on security. The
document recommends development of an
Interconnection Security Agreement (ISA) and
a Memorandum of Understanding (MOU). The
ISA specifies the technical and security
requirements of the interconnection, and the
MOU defines the responsibilities of the
participating organizations. The security guide
recommends regular communications
between the organizations throughout the life
cycle of the interconnection. One or both
organizations shall review the security
controls for the interconnection at least
annually or whenever a significant change
occurs to ensure the controls are operating
properly and are providing appropriate levels
of protection.” This document may be
included as an appendix in the SSP as
appropriate by system.
NIST SP800-47
Last Modified: 8/21/2014
For Official Use Only
Page 152 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Appendix E – FNCS Risk Management Acceptance Report
Risk Number:
Report Date:
POA&M Number:
Date Risk was Identified:
Expiration Date for the Risk
Acceptance:
Originator: (Who identified the risk?)
C&A Name of the System:
Risk Statement: (Enter a simple statement of what the risk is.)
Risk Rating (Circle One if
High
Medium
Low
known)
List all Devices impacted by this vulnerability: (System(s), Server(s), Router(s), Printer(s),
Workstation(s), etc.).
If there is a deviation from applicable laws, regulations, standards and/or policies –
explain:
If so, has a waiver been approved:
Justification for Acceptance: (State the brief reasoning for the risk acceptance.)
Risk Control: (State the current controls and/or corrective actions to mitigate the threat.)
Are there any budgeting constraints? (Check if ‘Yes’)
If ‘Yes’, explain:
Last Modified: 8/21/2014
For Official Use Only
Page 153 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 3.0
Risk Number:
Report Date:
Future Mitigation: (Describe any plans/system changes that would mitigate this risk in the
future.)
Approximate Completion Date: None
Designated Approving Authority Name:
Designated Approving Authority:
Actual Closing Date:
_______________________________________________________
________
Date Approved:
___________________
___
System Owner Name:
System Owner Signature:
Date Approved:
_______________________________________________________
________
___________________
___
Certifying Agent Name:
Certifying Agent Signature:
Date Approved:
_______________________________________________
___________________
___
FNCS Risk Management Acceptance Report Instructions
Use the following instructions to complete the FNCS Risk Management Acceptance Report.
Report Date: Fill in the date of the report.
Risk/POA&M Number: Leave this field blank. The number will be assigned by FNCS.
Date Risk Was Identified: Enter the exact date the risk was recognized. This date should
be the date of a scan report or the date of an official or formal audit report (e.g., Security
Evaluation Report (SER); internal audit; etc.).
Originator: Enter the name of the person or business source that identified the risk. If an
official audit, include the audit number and date and the source (e.g., OIG-11101-1-1,
04/15/05). If done via contract support in support of Certification and Accreditation, show
the name of the company (e.g., Acme Solutions) and the C&A project name (e.g., Telecom
GSS, 2004).
Last Modified: 8/21/2014
For Official Use Only
Page 154 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
Risk Statement: Enter a simple statement describing the risk. This information should
reflect verbiage used in the audit or actual scan report. If originating from an audit, use the
statement in full or summarize if the statement is in excess of one paragraph. Reference a
number in the audit report, a category label, and/or security category if provided (e.g., #11,
AU-3, Audit and Accountability).
Risk Rating: Indicate the risk rating provided by the source. If the rating came from a
scanner, provide the name of the scanner (e.g., nCircle) along with the scan vendor’s
classification (i.e., H, M, L). If the source is an audit, the risk rating will be available in the
details associated with the vulnerability that is cited; ensure that references (i.e., a security
control abbreviation or number, and the number assigned by the audit source) to the audit
are included in the Risk Statement area.
Is there a deviation from applicable laws, regulations, standards and/or policies?
Answer ‘Yes’ or ‘No’ and then explain your response. If ‘Yes’, explain. If FNCS or USDA
policy states that a specific standard is required, such as the initiation of the screen saver
after 10 minutes of inactivity, and the risk to be accepted cannot meet that policy or
requirement, such as the screen saver locking up an application, state the pertinent
information here. If there is a deviation from policy, answer ‘Yes’. Answering ‘Yes’ will
require the eventual submission of a waiver, or providing waiver-oriented answers, if the
condition is in opposition to an existing policy; refer to the FNCS policy regarding ‘Waivers’.
If there is no current policy regarding the vulnerability, answer ‘No’ and go to the next
question.
If so, has a waiver been approved? Answer ‘Yes’ or ‘No’.
Justification for Acceptance: Enter a brief reason for the risk acceptance. State why the
‘acceptance’ is necessary (e.g., the vulnerability mitigation will require funds that are not
available; the vulnerability mitigation is not cost effective based on the available resources;
etc.). If there has been a temporary workaround to lessen the risk associated with the
vulnerability, state what that interim workaround is as well as any future plans for mitigating
long term.
Risk Control: Enter the current controls and/or corrective actions to mitigate the threat.
Respond with what you will be doing in the immediate future to attempt to combat this
vulnerability, which could be a workaround, temporary solution, or a decision to do nothing
(as long as you have some justification to accept the full extent of risk). The project
manager and the system owner are the individuals who will really assume any risks and
responsibilities.
Are there any budgetary constraints? Place a check in the checkbox if the answer is
‘Yes.’
If ‘Yes’, explain: Enter an explanation for any budgetary constraints in this space. Include
cost of hardware and software, but also identify human resources and contract support that
may justify the decision to ‘accept’ the risk (e.g., performing activities manually, to replace
what monies may be needed to purchase an automated function may far exceed the cost of
hardware and/or software).
Future Mitigation: Enter any information that outlines any plans/system changes that would
mitigate this risk in the future. State if a future mitigation has been evaluated or is planned.
A future mitigation may not be considered. If a software upgrade may mitigate a current
vulnerability, state when that upgrade is scheduled for deployment.
Last Modified: 8/21/2014
For Official Use Only
Page 155 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
Approximate Completion Date: Enter the estimated complete date. Using FY notation is
acceptable (e.g., end FY-2006; mid FY2007.
Actual Closing Date: Fill in the actual date the risk was closed. Leave blank as long as the
risk is open. When the risk closes, such as when an upgrade is deployed, list the date of
closure.
Primary Contact Name: Enter the telephone number or email address for the Primary Point
of Contact that the vulnerability is associated with, such as a project team leader or a
Branch Chief, which is usually the person who is responsible for operation of a function.
Primary Contact Signature: The primary POC should sign the form in this space; the POC
will be at the Branch Chief or Project Leader level.
Date Approved: The date the form is signed by the primary POC.
System Owner’s Name: Enter the system’s owner’s name. The system owner will be at
the level of Division Director.
System Owner’s Signature: The system owner should sign the form in this space.
Date Approved: The date the system owner signed the form.
ISSPM Concur by Name: Enter the name of an ISSPM who will approve the form.
Approval (Concur) Signature: The designated ISSPM should sign the form in this space.
Date Approved: The date the form was approved by an ISSPM should be entered.
Last Modified: 8/21/2014
For Official Use Only
Page 156 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
Appendix F – ITIRB Portfolio Management Office Checklist
This checklist is to be used when process consultants submit requests for assist in processing
IT requests. It is intended to assist you in ensuring that the Program Management Branch steps
are completed and that all of the documentation required to justify the IT services and IT polices
being requested by different branches are present and is as complete as necessary to present
to FNCS managers and, when appropriate, the FNCS ITIRB.
ITIRB PMB Steps
Discuss the request with the processing consultant and /or the originator and understand the
request and how they intend to justify the request. Provide assistance on the viability of the
request.
Verify with the process consultant and/or the originator that the following forms filled out
correctly:
o
o
o
FNS-754 ITIRB User Request Form Template – Policy
FNS-755 ITIRB User Request Form Template – System
FNS-758 ITIRB User Business Case Summary Template
Verify with the process consultant the required content for Sections 1-8 of FNS-755 or the
required content for Sections 1-4 of FNS-754.
After the request has been submitted and once the Branch Chief provides approval, assist
the originator with any additional information on sections 1-8 of form 755 or sections 1-4 of
754 (If necessary). Then assist the originator if necessary, with additional justification by
completing sections 9 -10 of form 755.
If asked, assist the originator with the proper completion of the business case summary
(FNS Form 758). After form 758 is complete, ensure that all forms and all sections are
complete.
Make sure the user submits the request to the Division Director for approval and signature.
Last Modified: 8/21/2014
For Official Use Only
Page 157 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
The Process consultant facilitates the communication to Senior Management of all requests
coming from their area.
Receive the completed forms from the user/process consultant.
Review all forms for content and ensure all signatures are in place.
Review the content of all sections to ensure that sufficient justification exists.
Review database and other sources for duplications or potential solutions.
Certify alignment with enterprise architecture, if not discuss with CIO.
Enter the request into the database.
Prepare recommendation to CIO.
Last Modified: 8/21/2014
For Official Use Only
Page 158 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
Appendix G – CPO-ITIRB RECOMMENDATION
PMO ITIRB RECOMMENDATION
Requirement Title:
Originating Office
Process Consultant
Description
Technical Feasibility – Can the requirement be technically capable?
Technical Alternatives – Have feasible alternatives been considered?
Technical Compatibility – Does the requirement technically fit within the structure of the
agency? Does the requirement align with the current enterprise architecture?
Resources – Does the requirement require funding and personnel resources beyond the
capability of the agency
Other – Does the requirement already exist, etc.?
Recommendation
Forward to ITIRB
□
Refer to OIT □
Return to Originator
□
Comments Supporting Recommendation
Reviewed by:
ITIRB PMO
Chief, SAB
Approved by:
CIO
Last Modified: 8/21/2014
For Official Use Only
Page 159 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
APPENDIX H – FNCS Initial Incident Report Template
Status of Incident:
(circle one)
Incident Severity:
Severe Impact
New
Progress
Closed
Serious Impact
Limited Impact
In
(circle one)
FNCS Initial Contact Information
FNCS Incident Number:
Date & Time Reported to
FNCS:
US-CERT Number:(if applicable)
Date & Time
applicable)
Date & Time SNCC Hotline was
notified: (if applicable)
Date & Time the incident occurred:
Reported
Name of person
taking the report:
to
US-CERT:
(if
Incident Contact Information
Reported By:
Name:
Type of employee: (Fed,
Contractor.…)
Office & Cell:
Other contact information:
Email:
Name:
Office & Cell:
Name:
Office & Cell:
Agency/
Location:
(Region/HQ…)
Impact and Scope (Complete only those items applicable to this incident)
Last Modified: 8/21/2014
For Official Use Only
Page 160 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
Type Incident:
Personally Identifiable Information (PII) involved? (Yes or No)
Type of PII: (SSN, Patient Data, Research Data etc.), if yes, has USDA been contacted?
Information Security Categorization (FIPS 199 / Risk Level): (L,H,M)
Potential affected population size (1-99, 100-999, 1000-9999, 10000 or more):
Location of Incident:
Potential affected geographic area:
Was the data encrypted? (Yes or No)
Incident Description
Give a detailed description of the incident:
List the next steps to be taken in the investigation process
Incident Response Team Actions
Last Modified: 8/21/2014
For Official Use Only
Page 161 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
List actions taken by all incident handlers (Incident Response Team) on this incident
Incident Evidence Gathered
List evidence gathered during this incident investigation by the Incident Response
Team
Comments from Incident Response Team
List comments related to this incident
Last Modified: 8/21/2014
For Official Use Only
Page 162 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
1. List evidence gathered during this incident investigation by the Incident
Response Team
Next Steps
List the next steps to be taken in the investigation process
Last Modified: 8/21/2014
For Official Use Only
Page 163 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
APPENDIX I – Information System Security Guidance and Security Control Mapping
FNCS
SECTION
NUMBER
FNCS
SECTION NAME
NIST SP
800-53 SECURITY
CONTROLS
050
PL-1, PLINFORMAT
2, PL-3, PL-4,
ION SYSTEM
PL-5, PL-6
SECURITY
PLANNING
100
ACCEPTAB
AC-1,
LE USE
AC-11, AC-14,
AC-20, MP-5,
SA-7, RA-5, PE1, IR-1, SC-9,
PL-4
200
OTHER
NIST
PUBLICATIONS
800-18,
800-37
NETWORK
AC-8,
ACCESS
AC-9, AC-17,AC20,AC-11, SI-4,
SI-8
RELATED
USDA POLICY
USDA DN
3300-011; DM
3525-000; DR
3300-001;DR
3300-1A-1M
USDA DM
3535-001; DM
3530000;001;004,
DM 3525003
WIRELESS
300
400
INCIDENT
REPORTING &
RESPONSE
AC-18
IR-1, IR2, IR-3, IR-4, IR5, IR-6, IR-7
USDA DM
3550-003; DN
3300-12 3300-19
800-86,
800-61, Rev. 1
USDA
Security
Computer
Incident
Response Team
Standard
Operating
Procedures; DM
3505-000 USDA
Computer
Incident
Response
Procedures
Manual;
USDA
Memorandum on
Reporting Lost or
Stolen
Last Modified: 8/21/2014
For Official Use Only
Page 164 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
Information
Technology
Equipment
500
AUDIT &
AU-1,
ACCOUNTABILITY AU-2, AU-3, AU4, AU-5, AU-6,
AU-7, AU-8, AU9, AU-11
USDA DM
3535-001
600
ACCESS
CONTROL
USDA DM
3535-001,
Password policy
memorandum
Dated: 6/2007;
AC-1,AC2, AC-3, AC-4,
AC-5, AC-6, AC7, AC-8, AC9,IA-2, IA-4, IA4,
IA9,
USAD DR
3180-001
Information
Network
Standards,
Appendix O
700
IT
RESTRICTED
SPACE
PE-2, PE3, PE-3, PE-4,
PE-5, PE-6, PE7, PE-8
USDA DM
3510-001
800
COMPUTE
R SECURITY
AWARENESS
AT-1, AT800-16,
2, AT-3, AT-4
800-50
USDA DM
3545-001
900
CERTIFICA
800-37
CA-1,CA2, CA-3, CA-4,
TION&
CA-5, CA-6, CAACCREDIT 7
ATION
USDA
Condensed
Guide
Certification and
Accreditation
Methodology;
USDA
Certification and
Accreditation
Guide, Appendix
A;
USDA DM
3540-001 Risk
Assessment
Methodology;
Last Modified: 8/21/2014
For Official Use Only
Page 165 of 166
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
FIPS
Publication 199
1000
INFORMAT
ION SYSTEMS
SECURITY
PROGRAM
1100
PERSONA
LLY
IDENTIFIABLE
INFORMATION
PL-1
USDA DM
3545-002
PL-5, RA-
USDA DM
3515-002,
Memorandum on
transporting PII
info. Dated
2/22/07.
RA-2,
RA-3, RA-4, RA5
USDA DM
800-30; DM
3540-000; DM
3540-001
3
1200
RISK
MANAGEMENT
1300
CP-2,
CONTINGE
CP-3, CP-4, CPNCY PLANNING
5, CP-6, CP-7,
AND DISASTER
CP-8, CP-9, CPRECOVERY
10
1400
800-34,
USDA DM
3570-000, DM
3570-001
SYSTEM
PL-2, PL800-18,
SECURITY PLANS 3, PL-4
FIPS 199, FIPS
200
USDA DM
3565-001, USDA
SSP (GSS) and
(MA) Checklists
800-84
1500
SDLC
RA-2,
RA-3, RA-4, CM3, MP-6, PL-5
800-64
USDA DM
3575-001
1600
CPIC
SA-2, SA3, SA-4
800-65
USDA DM
3560-001
MAINTENA
MA-1,
MA-2, MA-3, MA4, MA-5, MA-6
1700
NCE
1800
MEDIA
PROTECTION
MP-1,
MP-2, MP-3, MP4, MP-5, MP-6
1900
PERSONN
EL SECURITY
PS-2, P23, PS-4, PS-5,
PS-6, PS-7, PS8
Last Modified: 8/21/2014
For Official Use Only
Page 166 of 166
File Type | application/pdf |
File Title | Microsoft Word - 702 Handbook Final-14-08-21.docx |
Author | phillip.parmer1 |
File Modified | 2014-11-12 |
File Created | 2014-08-21 |