Appendix C PLAW-113publ283

Appendix C OMB Circular No A-130.pdf

The FNS User Access Request Form Data Collection

Appendix C PLAW-113publ283.pdf

OMB: 0584-0532

Document [pdf]
Download: pdf | pdf
Appendix III to OMB Circular No. A-130
Security of Federal Automated Information Resources
A. Requirements.
Purpose
This Appendix establishes a minimum set of controls to be included in Federal automated information
security programs; assigns Federal agency responsibilities for the security of automated information;
and links agency automated information security programs and agency management control systems
established in accordance with OMB Circular No. A-123. The Appendix revises procedures formerly
contained in Appendix III to OMB Circular No. A-130 (50 FR 52730; December 24, 1985), and
incorporates requirements of the Computer Security Act of 1987 (P.L. 100-235) and responsibilities
assigned in applicable national security directives.
Definitions
The term:
"adequate security" means security commensurate with the risk and magnitude of the harm resulting
from the loss, misuse, or unauthorized access to or modification of information. This includes assuring
that systems and applications used by the agency operate effectively and provide appropriate
confidentiality, integrity, and availability, through the use of cost-effective management, personnel,
operational, and technical controls.
"application" means the use of information resources (information and information technology) to
satisfy a specific set of user requirements.
"general support system" or "system" means an interconnected set of information resources under the
same direct management control which shares common functionality. A system normally includes
hardware, software, information, data, applications, communications, and people. A system can be, for
example, a local area network (LAN) including smart terminals that supports a branch office, an agencywide backbone, a communications network, a departmental data processing center including its
operating system and utilities, a tactical radio network, or a shared information processing service
organization (IPSO).
"major application" means an application that requires special attention to security due to the risk and
magnitude of the harm resulting from the loss, misuse, or unauthorized access to or modification of the
information in the application. Note: All Federal applications require some level of protection. Certain
applications, because of the information in them, however, require special management oversight and
should be treated as major. Adequate security for other applications should be provided by security of
the systems in which they operate.

Automated Information Security Programs. Agencies shall implement and maintain a program to assure
that adequate security is provided for all agency information collected, processed, transmitted, stored,
or disseminated in general support systems and major applications.
Each agency's program shall implement policies, standards and procedures which are consistent with
government-wide policies, standards, and procedures issued by the Office of Management and Budget,
the Department of Commerce, the General Services Administration and the Office of Personnel
Management (OPM). Different or more stringent requirements for securing national security
information should be incorporated into agency programs as required by appropriate national security
directives. At a minimum, agency programs shall include the following controls in their general support
systems and major applications:
Controls for general support systems.
1) Assign Responsibility for Security. Assign responsibility for security in each system to an individual
knowledgeable in the information technology used in the system and in providing security for such
technology.
2) System Security Plan. Plan for adequate security of each general support system as part of the
organization's information resources management (IRM) planning process. The security plan shall be
consistent with guidance issued by the National Institute of Standards and Technology (NIST).
Independent advice and comment on the security plan shall be solicited prior to the plan's
implementation. A summary of the security plans shall be incorporated into the strategic IRM plan
required by the Paperwork Reduction Act (44 U.S.C. Chapter 35) and Section 8(b) of this circular.
Security plans shall include:
a) Rules of the System. Establish a set of rules of behavior concerning use of, security in, and the
acceptable level of risk for, the system. The rules shall be based on the needs of the various users of the
system. The security required by the rules shall be only as stringent as necessary to provide adequate
security for information in the system. Such rules shall clearly delineate responsibilities and expected
behavior of all individuals with access to the system. They shall also include appropriate limits on
interconnections to other systems and shall define service provision and restoration priorities. Finally,
they shall be clear about the consequences of behavior not consistent with the rules.
b) Training. Ensure that all individuals are appropriately trained in how to fulfill their security
responsibilities before allowing them access to the system. Such training shall assure that employees are
versed in the rules of the system, be consistent with guidance issued by NIST and OPM, and apprise
them about available assistance and technical security products and techniques. Behavior consistent
with the rules of the system and periodic refresher training shall be required for continued access to the
system.
c) Personnel Controls. Screen individuals who are authorized to bypass significant technical and

operational security controls of the system commensurate with the risk and magnitude of harm they
could cause. Such screening shall occur prior to an individual being authorized to bypass controls and
periodically thereafter.
d) Incident Response Capability. Ensure that there is a capability to provide help to users when a security
incident occurs in the system and to share information concerning common vulnerabilities and threats.
This capability shall share information with other organizations, consistent with NIST coordination, and
should assist the agency in pursuing appropriate legal action, consistent with Department of Justice
guidance.
e) Continuity of Support. Establish and periodically test the capability to continue providing service
within a system based upon the needs and priorities of the participants of the system.
f) Technical Security. Ensure that cost-effective security products and techniques are appropriately used
within the system.
g) System Interconnection. Obtain written management authorization, based upon the acceptance of
risk to the system, prior to connecting with other systems. Where connection is authorized, controls
shall be established which are consistent with the rules of the system and in accordance with guidance
from NIST.
3) Review of Security Controls. Review the security controls in each system when significant
modifications are made to the system, but at least every three years. The scope and frequency of the
review should be commensurate with the acceptable level of risk for the system. Depending on the
potential risk and magnitude of harm that could occur, consider identifying a deficiency pursuant to
OMB Circular No. A-123, "Management Accountability and Control" and the Federal Managers' Financial
Integrity Act (FMFIA), if there is no assignment of security responsibility, no security plan, or no
authorization to process for a system.
4) Authorize Processing. Ensure that a management official authorizes in writing the use of each general
support system based on implementation of its security plan before beginning or significantly changing
processing in the system. Use of the system shall be re-authorized at least every three years.
Controls for Major Applications.
1) Assign Responsibility for Security. Assign responsibility for security of each major application to a
management official knowledgeable in the nature of the information and process supported by the
application and in the management, personnel, operational, and technical controls used to protect it.
This official shall assure that effective security products and techniques are appropriately used in the
application and shall be contacted when a security incident occurs concerning the application.
2) Application Security Plan. Plan for the adequate security of each major application, taking into

account the security of all systems in which the application will operate. The plan shall be consistent
with guidance issued by NIST. Advice and comment on the plan shall be solicited from the official
responsible for security in the primary system in which the application will operate prior to the plan's
implementation. A summary of the security plans shall be incorporated into the strategic IRM plan
required by the Paperwork Reduction Act. Application security plans shall include:
a) Application Rules. Establish a set of rules concerning use of and behavior within the application. The
rules shall be as stringent as necessary to provide adequate security for the application and the
information in it. Such rules shall clearly delineate responsibilities and expected behavior of all
individuals with access to the application. In addition, the rules shall be clear about the consequences of
behavior not consistent with the rules.
b) Specialized Training. Before allowing individuals access to the application, ensure that all individuals
receive specialized training focused on their responsibilities and the application rules. This may be in
addition to the training required for access to a system. Such training may vary from a notification at the
time of access (e.g., for members of the public using an information retrieval application) to formal
training (e.g., for an employee that works with a high-risk application).
c) Personnel Security. Incorporate controls such as separation of duties, least privilege and individual
accountability into the application and application rules as appropriate. In cases where such controls
cannot adequately protect the application or information in it, screen individuals commensurate with
the risk and magnitude of the harm they could cause. Such screening shall be done prior to the
individuals' being authorized to access the application and periodically thereafter.
d) Contingency Planning. Establish and periodically test the capability to perform the agency function
supported by the application in the event of failure of its automated support.
e) Technical Controls. Ensure that appropriate security controls are specified, designed into, tested, and
accepted in the application in accordance with appropriate guidance issued by NIST.
f) Information Sharing. Ensure that information shared from the application is protected appropriately,
comparable to the protection provided when information is within the application.
g) Public Access Controls. Where an agency's application promotes or permits public access, additional
security controls shall be added to protect the integrity of the application and the confidence the public
has in the application. Such controls shall include segregating information made directly accessible to
the public from official agency records.
3) Review of Application Controls. Perform an independent review or audit of the security controls in
each application at least every three years. Consider identifying a deficiency pursuant to OMB Circular
No. A-123, "Management Accountability and Control" and the Federal Managers' Financial Integrity Act
if there is no assignment of responsibility for security, no security plan, or no authorization to process

for the application.
4) Authorize Processing. Ensure that a management official authorizes in writing use of the application
by confirming that its security plan as implemented adequately secures the application. Results of the
most recent review or audit of controls shall be a factor in management authorizations. The application
must be authorized prior to operating and re-authorized at least every three years thereafter.
Management authorization implies accepting the risk of each system used by the application.
Assignment of Responsibilities
Department of Commerce. The Secretary of Commerce shall:
1) Develop and issue appropriate standards and guidance for the security of sensitive information in
Federal computer systems.
2) Review and update guidelines for training in computer security awareness and accepted computer
security practice, with assistance from OPM.
3) Provide agencies guidance for security planning to assist in their development of application and
system security plans.
4) Provide guidance and assistance, as appropriate, to agencies concerning cost-effective controls when
interconnecting with other systems.
5) Coordinate agency incident response activities to promote sharing of incident response information
and related vulnerabilities.
6) Evaluate new information technologies to assess their security vulnerabilities, with technical
assistance from the Department of Defense, and apprise Federal agencies of such vulnerabilities as soon
as they are known.
Department of Defense. The Secretary of Defense shall:
1) Provide appropriate technical advice and assistance (including work products) to the Department of
Commerce.
2) Assist the Department of Commerce in evaluating the vulnerabilities of emerging information
technologies.
Department of Justice. The Attorney General shall:
1) Provide appropriate guidance to agencies on legal remedies regarding security incidents and ways to
report and work with law enforcement concerning such incidents.

2) Pursue appropriate legal actions when security incidents occur.
General Services Administration. The Administrator of General Services shall:
1) Provide guidance to agencies on addressing security considerations when acquiring automated data
processing equipment (as defined in section 111(a)(2) of the Federal Property and Administrative
Services Act of 1949, as amended).
2) Facilitate the development of contract vehicles for agencies to use in the acquisition of cost-effective
security products and services (e.g., back-up services).
3) Provide appropriate security services to meet the needs of Federal agencies to the extent that such
services are cost-effective.
Office of Personnel Management. The Director of the Office of Personnel Management shall:
2) Assist the Department of Commerce in updating and maintaining guidelines for training in computer
security awareness and accepted computer security practice.
Security Policy Board. The Security Policy Board shall coordinate the activities of the Federal government
regarding the security of information technology that processes classified information in accordance
with applicable national security directives;
Correction of Deficiencies and Reports
Correction of Deficiencies. Agencies shall correct deficiencies which are identified through the reviews
of security for systems and major applications described above.
Reports on Deficiencies. In accordance with OMB Circular No. A-123, "Management Accountability and
Control", if a deficiency in controls is judged by the agency head to be material when weighed against
other agency deficiencies, it shall be included in the annual FMFIA report. Less significant deficiencies
shall be reported and progress on corrective actions tracked at the appropriate agency level.
Summaries of Security Plans. Agencies shall include a summary of their system security plans and major
application plans in the strategic plan required by the Paperwork Reduction Act (44 U.S.C. 3506).
B. Descriptive Information.
The following descriptive language is explanatory. It is included to assist in understanding the
requirements of the Appendix.
The Appendix re-orients the Federal computer security program to better respond to a rapidly changing
technological environment. It establishes government-wide responsibilities for Federal computer
security and requires Federal agencies to adopt a minimum set of management controls. These

management controls are directed at individual information technology users in order to reflect the
distributed nature of today's technology.
For security to be most effective, the controls must be part of day-to-day operations. This is best
accomplished by planning for security not as a separate activity, but as an integral part of overall
planning.
"Adequate security" is defined as "security commensurate with the risk and magnitude of harm resulting
from the loss, misuse, or unauthorized access to or modification of information." This definition
explicitly emphasizes the risk-based policy for cost-effective security established by the Computer
Security Act.
The Appendix no longer requires the preparation of formal risk analyses. In the past, substantial
resources have been expended doing complex analyses of specific risks to systems, with limited tangible
benefit in terms of improved security for the systems. Rather than continue to try to precisely measure
risk, security efforts are better served by generally assessing risks and taking actions to manage them.
While formal risk analyses need not be performed, the need to determine adequate security will require
that a risk-based approach be used. This risk assessment approach should include a consideration of the
major factors in risk management: the value of the system or application, threats, vulnerabilities, and
the effectiveness of current or proposed safeguards. Additional guidance on effective risk assessment is
available in "An Introduction to Computer Security: The NIST Handbook" (March 16, 1995).
Discussion of the Appendix's Major Provisions. The following discussion is provided to aid reviewers in
understanding the changes in emphasis in the Appendix.
Automated Information Security Programs. Agencies are required to establish controls to assure
adequate security for all information processed, transmitted, or stored in Federal automated
information systems. This Appendix emphasizes management controls affecting individual users of
information technology. Technical and operational controls support management controls. To be
effective, all must interrelate. For example, authentication of individual users is an important
management control, for which password protection is a technical control. However, password
protection will only be effective if both a strong technology is employed, and it is managed to assure
that it is used correctly.
Four controls are set forth: assigning responsibility for security, security planning, periodic review of
security controls, and management authorization. The Appendix requires that these management
controls be applied in two areas of management responsibility: one for general support systems and one
for major applications.
The terms "general support system" and "major application" were used in OMB Bulletins Nos. 88-16 and
90-08. A general support system is "an interconnected set of information resources under the same
direct management control which shares common functionality." Such a system can be, for example, a
local area network (LAN) including smart terminals that supports a branch office, an agency-wide
backbone, a communications network, a departmental data processing enter including its operating

system and utilities, a tactical radio network, or a shared information processing service organization.
Normally, the purpose of a general support system is to provide processing or communications support.
A major application is a use of information and information technology to satisfy a specific set of user
requirements that requires special management attention to security due to the risk and magnitude of
harm resulting from the loss, misuse or unauthorized access to or modification of the information in the
application. All applications require some level of security, and adequate security for most of them
should be provided by security of the general support systems in which they operate. However, certain
applications, because of the nature of the information in them, require special management oversight
and should be treated as major. Agencies are expected to exercise management judgement in
determining which of their applications are major.
The focus of OMB Bulletins Nos. 88-16 and 90-08 was on identifying and securing both general support
systems and applications which contained sensitive information. The Appendix requires the
establishment of security controls in all general support systems, under the presumption that all contain
some sensitive information, and focuses extra security controls on a limited number of particularly highrisk or major applications.
General Support Systems. The following controls are required in all general support systems:
1) Assign Responsibility for Security. For each system, an individual should be a focal point for assuring
there is adequate security within the system, including ways to prevent, detect, and recover from
security problems. That responsibility should be assigned in writing to an individual trained in the
technology used in the system and in providing security for such technology, including the management
of security controls such as user identification and authentication.
2) Security Plan. The Computer Security Act requires that security plans be developed for all Federal
computer systems that contain sensitive information. Given the expansion of distributed processing
since passage of the Act, the presumption in the Appendix is that all general support systems contain
some sensitive information which requires protection to assure its integrity, availability, or
confidentiality, and therefore all systems require security plans.
Previous guidance on security planning was contained in OMB Bulletin No. 90-08. This Appendix
supersedes OMB Bulletin 90-08 and expands the coverage of security plans from Bulletin 90-08 to
include rules of individual behavior as well as technical security. Consistent with OMB Bulletin 90-08, the
Appendix directs NIST to update and expand security planning guidance and issue it as a Federal
Information Processing Standard (FIPS). In the interim, agencies should continue to use the Appendix of
OMB Bulletin No. 90-08 as guidance for the technical portion of their security plans.
The Appendix continues the requirement that independent advice and comment on the security plan for
each system be sought. The intent of this requirement is to improve the plans, foster communication
between managers of different systems, and promote the sharing of security expertise.

This Appendix also continues the requirement from the Computer Security Act that summaries of
security plans be included in agency strategic information resources management plans. OMB will
provide additional guidance about the contents of those strategic plans, pursuant to the Paperwork
Reduction Act of 1995.
The following specific security controls should be included in the security plan for a general support
system:
a) Rules. An important new requirement for security plans is the establishment of a set of rules of
behavior for individual users of each general support system. These rules should clearly delineate
responsibilities of and expectations for all individuals with access to the system. They should be
consistent with system-specific policy as described in "An Introduction to Computer Security: The NIST
Handbook" (March 16, 1995). In addition, they should state the consequences of non-compliance. The
rules should be in writing and will form the basis for security awareness and training.
The development of rules for a system must take into consideration the needs of all parties who use the
system. Rules should be as stringent as necessary to provide adequate security. Therefore, the
acceptable level of risk for the system must be established and should form the basis for determining
the rules.
Rules should cover such matters as work at home, dial-in access, connection to the Internet, use of
copyrighted works, unofficial use of government equipment, the assignment and limitation of system
privileges, and individual accountability. Often rules should reflect technical security controls in the
system. For example, rules regarding password use should be consistent with technical password
features in the system. Rules may be enforced through administrative sanctions specifically related to
the system (e.g. loss of system privileges) or through more general sanctions as are imposed for
violating other rules of conduct. In addition, the rules should specifically address restoration of service
as a concern of all users of the system.
b) Training. The Computer Security Act requires Federal agencies to provide for the mandatory periodic
training in computer security awareness and accepted computer security practice of all employees who
are involved with the management, use or operation of a Federal computer system within or under the
supervision of the Federal agency. This includes contractors as well as employees of the agency. Access
provided to members of the public should be constrained by controls in the applications through which
access is allowed, and training should be within the context of those controls. The Appendix enforces
such mandatory training by requiring its completion prior to granting access to the system. Each new
user of a general support system in some sense introduces a risk to all other users. Therefore, each user
should be versed in acceptable behavior -- the rules of the system -- before being allowed to use the
system. Training should also inform the individual how to get help in the event of difficulty with using or
security of the system.
Training should be tailored to what a user needs to know to use the system securely, given the nature of

that use. Training may be presented in stages, for example as more access is granted. In some cases, the
training should be in the form of classroom instruction. In other cases, interactive computer sessions or
well-written and understandable brochures may be sufficient, depending on the risk and magnitude of
harm.
Over time, attention to security tends to dissipate. In addition, changes to a system may necessitate a
change in the rules or user procedures. Therefore, individuals should periodically have refresher training
to assure that they continue to understand and abide by the applicable rules.
To assist agencies, the Appendix requires NIST, with assistance from the Office of Personnel
Management (OPM), to update its existing guidance. It also proposes that OPM assure that its rules for
computer security training for Federal civilian employees are effective.
c) Personnel Controls. It has long been recognized that the greatest harm has come from authorized
individuals engaged in improper activities, whether intentional or accidental. In every general support
system, a number of technical, operational, and management controls are used to prevent and detect
harm. Such controls include individual accountability, "least privilege," and separation of duties.
Individual accountability consists of holding someone responsible for his or her actions. In a general
support system, accountability is normally accomplished by identifying and authenticating users of the
system and subsequently tracing actions on the system to the user who initiated them. This may be
done, for example, by looking for patterns of behavior by users.
Least privilege is the practice of restricting a user's access (to data files, to processing capability, or to
peripherals) or type of access (read, write, execute, delete) to the minimum necessary to perform his or
her job.
Separation of duties is the practice of dividing the steps in a critical function among different individuals.
For example, one system programmer can create a critical piece of operating system code, while
another authorizes its implementation. Such a control keeps a single individual from subverting a critical
process.
Nevertheless, in some instances, individuals may be given the ability to bypass some significant technical
and operational controls in order to perform system administration and maintenance functions (e.g.,
LAN administrators or systems programmers). Screening such individuals in positions of trust will
supplement technical, operational, and management controls, particularly where the risk and
magnitude of harm is high.
d) Incident Response Capability. Security incidents, whether caused by viruses, hackers, or software
bugs, are becoming more common. When faced with a security incident, an agency should be able to
respond in a manner that both protects its own information and helps to protect the information of
others who might be affected by the incident. To address this concern, agencies should establish formal

incident response mechanisms. Awareness and training for individuals with access to the system should
include how to use the system's incident response capability.
To be fully effective, incident handling must also include sharing information concerning common
vulnerabilities and threats with those in other systems and other agencies. The Appendix directs
agencies to effectuate such sharing, and tasks NIST to coordinate those agency activities governmentwide.
The Appendix also directs the Department of Justice to provide appropriate guidance on pursuing legal
remedies in the case of serious incidents.
e) Continuity of Support. Inevitably, there will be service interruptions. Agency plans should assure that
there is an ability to recover and provide service sufficient to meet the minimal needs of users of the
system. Manual procedures are generally NOT a viable back-up option. When automated support is not
available, many functions of the organization will effectively cease. Therefore, it is important to take
cost-effective steps to manage any disruption of service.
Decisions on the level of service needed at any particular time and on priorities in service restoration
should be made in consultation with the users of the system and incorporated in the system rules.
Experience has shown that recovery plans that are periodically tested are substantially more viable than
those that are not. Moreover, untested plans may actually create a false sense of security.
f) Technical Security. Agencies should assure that each system appropriately uses effective security
products and techniques, consistent with standards and guidance from NIST. Often such techniques will
correspond with system rules of behavior, such as in the proper use of password protection.
The Appendix directs NIST to continue to issue computer security guidance to assist agencies in planning
for and using technical security products and techniques. Until such guidance is issued, however, the
planning guidance included in OMB Bulletin 90-08 can assist in determining techniques for effective
security in a system and in addressing technical controls in the security plan.
g) System Interconnection. In order for a community to effectively manage risk, it must control access to
and from other systems. The degree of such control should be established in the rules of the system and
all participants should be made aware of any limitations on outside access. Technical controls to
accomplish this should be put in place in accordance with guidance issued by NIST.
There are varying degrees of how connected a system is. For example, some systems will choose to
isolate themselves, others will restrict access such as allowing only e-mail connections or remote access
only with sophisticated authentication, and others will be fully open. The management decision to
interconnect should be based on the availability and use of technical and non-technical safeguards and
consistent with the acceptable level of risk defined in the system rules.

3) Review of Security Controls. The security of a system will degrade over time, as the technology
evolves and as people and procedures change. Reviews should assure that management, operational,
personnel, and technical controls are functioning effectively. Security controls may be reviewed by an
independent audit or a self review. The type and rigor of review or audit should be commensurate with
the acceptable level of risk that is established in the rules for the system and the likelihood of learning
useful information to improve security. Technical tools such as virus scanners, vulnerability assessment
products (which look for known security problems, configuration errors, and the installation of the latest
patches), and penetration testing can assist in the on-going review of different facets of systems.
However, these tools are no substitute for a formal management review at least every three years.
Indeed, for some high-risk systems with rapidly changing technology, three years will be too long.
Depending upon the risk and magnitude of harm that could result, weaknesses identified during the
review of security controls should be reported as deficiencies in accordance with OMB Circular No. A123, "Management Accountability and Control" and the Federal Managers' Financial Integrity Act. In
particular, if a basic management control such as assignment of responsibility, a workable security plan,
or management authorization are missing, then consideration should be given to identifying a
deficiency.
4) Authorize Processing. The authorization of a system to process information, granted by a
management official, provides an important quality control (some agencies refer to this authorization as
accreditation). By authorizing processing in a system, a manager accepts the risk associated with it.
Authorization is not a decision that should be made by the security staff.
Both the security official and the authorizing management official have security responsibilities. In
general, the security official is closer to the day-to-day operation of the system and will direct or
perform security tasks. The authorizing official will normally have general responsibility for the
organization supported by the system.
Management authorization should be based on an assessment of management, operational, and
technical controls. Since the security plan establishes the security controls, it should form the basis for
the authorization, supplemented by more specific studies as needed. In addition, the periodic review of
controls should also contribute to future authorizations. Some agencies perform "certification reviews"
of their systems periodically. These formal technical evaluations lead to a management accreditation, or
"authorization to process." Such certifications (such as those using the methodology in FIPS Pub 102
"Guideline for Computer Security Certification and Accreditation") can provide useful information to
assist management in authorizing a system, particularly when combined with a review of the broad
behavioral controls envisioned in the security plan required by the Appendix.
Re-authorization should occur prior to a significant change in processing, but at least every three years.
It should be done more often where there is a high risk and potential magnitude of harm.

Controls in Major Applications. Certain applications require special management attention due to the
risk and magnitude of harm that could occur. For such applications, the controls of the support
system(s) in which they operate are likely to be insufficient. Therefore, additional controls specific to the
application are required. Since the function of applications is the direct manipulation and use of
information, controls for securing applications should emphasize protection of information and the way
it is manipulated.
1) Assign Responsibility for Security. By definition, major applications are high risk and require special
management attention. Major applications usually support a single agency function and often are
supported by more than one general support system. It is important, therefore, that an individual be
assigned responsibility in writing to assure that the particular application has adequate security. To be
effective, this individual should be knowledgeable in the information and process supported by the
application and in the management, personnel, operational, and technical controls used to protect the
application.
2) Application Security Plans. Security for each major application should be addressed by a security plan
specific to the application. The plan should include controls specific to protecting information and
should be developed from the application manager's perspective. To assist in assuring its viability, the
plan should be provided to the manager of the primary support system which the application uses for
advice and comment. This recognizes the critical dependence of the security of major applications on
the underlying support systems they use. Summaries of application security plans should be included in
strategic information resource management plans in accordance with this Circular.
a) Application Rules. Rules of behavior should be established which delineate the responsibilities and
expected behavior of all individuals with access to the application. The rules should state the
consequences of inconsistent behavior. Often the rules will be associated with technical controls
implemented in the application. Such rules should include, for example, limitations on changing data,
searching databases, or divulging information.
b) Specialized Training. Training is required for all individuals given access to the application, including
members of the public. It should vary depending on the type of access allowed and the risk that access
represents to the security of the application and information in it. This training will be in addition to that
required for access to a support system.
c) Personnel Security. For most major applications, management controls such as individual
accountability requirements, separation of duties enforced by access controls, or limitations on the
processing privileges of individuals, are generally more cost-effective personnel security controls than
background screening. Such controls should be implemented as both technical controls and as
application rules. For example, technical controls to ensure individual accountability, such as looking for
patterns of user behavior, are most effective if users are aware that there is such a technical control. If
adequate audit or access controls (through both technical and non-technical methods) cannot be
established, then it may be cost-effective to screen personnel, commensurate with the risk and

magnitude of harm they could cause. The change in emphasis on screening in the Appendix should not
affect background screening deemed necessary because of other duties that an individual may perform.
d) Contingency Planning. Normally the Federal mission supported by a major application is critically
dependent on the application. Manual processing is generally NOT a viable back-up option. Managers
should plan for how they will perform their mission and/or recover from the loss of existing application
support, whether the loss is due to the inability of the application to function or a general support
system failure. Experience has demonstrated that testing a contingency plan significantly improves its
viability. Indeed, untested plans or plans not tested for a long period of time may create a false sense of
ability to recover in a timely manner.
e) Technical Controls. Technical security controls, for example tests to filter invalid entries, should be
built into each application. Often these controls will correspond with the rules of behavior for the
application. Under the previous Appendix, application security was focused on the process by which
sensitive, custom applications were developed. While that process is not addressed in detail in this
Appendix, it remains an effective method for assuring that security controls are built into applications.
Additionally, the technical security controls defined in OMB Bulletin No. 90-08 will continue, until that
guidance is replaced by NIST's security planning guidance.
f) Information Sharing. Assure that information which is shared with Federal organizations, State and
local governments, and the private sector is appropriately protected comparable to the protection
provided when the information is within the application. Controls on the information may stay the same
or vary when the information is shared with another entity. For example, the primary user of the
information may require a high level of availability while the secondary user does not, and can therefore
relax some of the controls designed to maintain the availability of the information. At the same time,
however, the information shared may require a level of confidentiality that should be extended to the
secondary user. This normally requires notification and agreement to protect the information prior to its
being shared.
g) Public Access Controls. Permitting public access to a Federal application is an important method of
improving information exchange with the public. At the same time, it introduces risks to the Federal
application. To mitigate these risks, additional controls should be in place as appropriate. These controls
are in addition to controls such as "firewalls" that are put in place for security of the general support
system.
In general, it is more difficult to apply conventional controls to public access systems, because many of
the users of the system may not be subject to individual accountability policies. In addition, public
access systems may be a target for mischief because of their higher visibility and published access
methods.
Official records need to be protected against loss or alteration. Official records in electronic form are
particularly susceptible since they can be relatively easy to change or destroy. Therefore, official records

should be segregated from information made directly accessible to the public. There are different ways
to segregate records. Some agencies and organizations are creating dedicated information
dissemination systems (such as bulletin boards or World Wide Web servers) to support this function.
These systems can be on the outside of secure gateways which protect internal agency records from
outside access.
In order to secure applications that allow direct public access, conventional techniques such as least
privilege (limiting the processing capability as well as access to data) and integrity assurances (such as
checking for viruses, clearly labeling the age of data, or periodically spot checking data) should also be
used. Additional guidance on securing public access systems is available from NIST Computer Systems
Laboratory Bulletin "Security Issues in Public Access Systems" (May, 1993).
3) Review of Application Controls. At least every three years, an independent review or audit of the
security controls for each major application should be performed. Because of the higher risk involved in
major applications, the review or audit should be independent of the manager responsible for the
application. Such reviews should verify that responsibility for the security of the application has been
assigned, that a viable security plan for the application is in place, and that a manager has authorized
the processing of the application. A deficiency in any of these controls should be considered a deficiency
pursuant to the Federal Manager's Financial Integrity Act and OMB Circular No. A-123, "Management
Accountability and Control."
The review envisioned here is different from the system test and certification process required in the
current Appendix. That process, however, remains useful for assuring that technical security features
are built into custom-developed software applications. While the controls in that process are not
specifically called for in this Appendix, they remain in Bulletin No. 90-08, and are recommended in
appropriate circumstances as technical controls.
4) Authorize Processing. A major application should be authorized by the management official
responsible for the function supported by the application at least every three years, but more often
where the risk and magnitude of harm is high. The intent of this requirement is to assure that the senior
official whose mission will be adversely affected by security weaknesses in the application periodically
assesses and accepts the risk of operating the application. The authorization should be based on the
application security plan and any review(s) performed on the application. It should also take into
account the risks from the general support systems used by the application.
4. Assignment of Responsibilities. The Appendix assigns government-wide responsibilities to agencies
that are consistent with their missions and the Computer Security Act.
Department of Commerce. The Department of Commerce, through NIST, is assigned the following
responsibilities consistent with the Computer Security Act.
1) Develop and issue security standards and guidance.

2) Review and update, with assistance from OPM, the guidelines for security training issued in 1988
pursuant to the Computer Security Act to assure they are effective.
3) Replace and update the technical planning guidance in the appendix to OMB Bulletin 90-08 This
should include guidance on effective risk-based security absent a formal risk analysis.
4) Provide agencies with guidance and assistance concerning effective controls for systems when
interconnecting with other systems, including the Internet. Such guidance on, for example, so-called
"firewalls" is becoming widely available and is critical to agencies as they consider how to interconnect
their communications capabilities.
5) Coordinate agency incident response activities. Coordination of agency incident response activities
should address both threats and vulnerabilities as well as improve the ability of the Federal government
for rapid and effective cooperation in response to serious security breaches.
6) Assess security vulnerabilities in new information technologies and apprise Federal agencies of such
vulnerabilities. The intent of this new requirement is to help agencies understand the security
implications of technology before they purchase and field it. In the past, there have been too many
instances where agencies have acquired and implemented technology, then found out about
vulnerabilities in the technology and had to retrofit security measures. This activity is intended to help
avoid such difficulties in the future.
Department of Defense. The Department, through the National Security Agency, should provide
technical advice and assistance to NIST, including work products such as technical security guidelines,
which NIST can draw upon for developing standards and guidelines for protecting sensitive information
in Federal computers.
Also, the Department, through the National Security Agency, should assist NIST in evaluating
vulnerabilities in emerging technologies. Such vulnerabilities may present a risk to national security
information as well as to unclassified information.
Department of Justice. The Department of Justice should provide appropriate guidance to Federal
agencies on legal remedies available to them when serious security incidents occur. Such guidance
should include ways to report incidents and cooperate with law enforcement.
In addition, the Department should pursue appropriate legal actions on behalf of the Federal
government when serious security incidents occur.
General Services Administration. The General Services Administration should provide agencies guidance
for addressing security considerations when acquiring information technology products or services. This
continues the current requirement.
In addition, where cost-effective to do so, GSA should establish government-wide contract vehicles for

agencies to use to acquire certain security services. Such vehicles already exist for providing system
back-up support and conducting security analyses.
GSA should also provide appropriate security services to assist Federal agencies to the extent that
provision of such services is cost-effective. This includes providing, in conjunction with the Department
of Defense and the Department of Commerce, appropriate services which support Federal use of the
National Information Infrastructure (e.g., use of digital signature technology).
Office of Personnel Management. In accordance with the Computer Security Act, OPM should review its
regulations concerning computer security training and assure that they are effective.
In addition, OPM should assist the Department of Commerce in the review and update of its computer
security awareness and training guidelines. OPM worked closely with NIST in developing the current
guidelines and should work with NIST in revising those guidelines.
Security Policy Board. The Security Policy Board is assigned responsibility for national security policy
coordination in accordance with the appropriate Presidential directive. This includes policy for the
security of information technology used to process classified information.
Circular A-130 and this Appendix do not apply to information technology that supports certain critical
national security missions, as defined in 44 U.S.C. 3502(9) and 10 U.S.C. 2315. Policy and procedural
requirements for the security of national security systems (telecommunications and information
systems that contain classified information or that support those critical national security missions (44
U.S.C. 3502(9) and 10 U.S.C. 2315)) is assigned to the Department of Defense pursuant to Presidential
directive. The Circular clarifies that information classified for national security purposes should also be
handled in accordance with appropriate national security directives. Where classified information is
required to be protected by more stringent security requirements, those requirements should be
followed rather than the requirements of this Appendix.
5. Reports. The Appendix requires agencies to provide two reports to OMB:
The first is a requirement that agencies report security deficiencies and material weaknesses within their
FMFIA reporting mechanisms as defined by OMB Circular No. A-123, "Management Accountability and
Control," and take corrective actions in accordance with that directive.
The second, defined by the Computer Security Act, requires that a summary of agency security plans be
included in the information resources management plan required by the Paperwork Reduction Act.


File Typeapplication/pdf
Authornetteluser
File Modified2021-02-11
File Created2014-11-12

© 2024 OMB.report | Privacy Policy