home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Underworld 2: Forbidden Knowledge
/
Hackers Underworld 2: Forbidden Knowledge.iso
/
HACKING
/
TRUSTBLT.TXT
< prev
next >
Wrap
Text File
|
1994-07-17
|
15KB
|
310 lines
NCSL BULLETIN
Advising users on computer systems technology
July 1990
NCSL Bulletins are published by the National Computer Systems
Laboratory (NCSL) of the National Institute of Standards and
Technology (NIST). Each bulletin presents an in-depth
discussion of a single topic of significant interest to the
information systems community. Bulletins are issued on an
as-needed basis and are available from NCSL Publications,
National Institute of Standards and Technology, B151,
Technology Building, Gaithersburg, MD 20899, telephone (301)
975-2821 or FTS 879-2821.
The following bulletins are available:
Data Encryption Standard, June 1990
GUIDANCE TO FEDERAL AGENCIES
ON THE USE OF
TRUSTED SYSTEMS TECHNOLOGY
INTRODUCTION
Purpose. The purpose of this document is to provide initial
guidance to federal departments and agencies on the use of
trusted systems technology in computer systems which handle
unclassified sensitive information.
Background. The National Institute of Standards and
Technology (NIST) has received many inquiries from federal
agencies regarding the applicability of Department of Defense
(DoD) Standard 5200.28-STD, DoD Trusted Computer Systems
Evaluation Criteria (TCSEC), and National Telecommunications
and Information Systems Security Policy (NTISSP) Number 200,
National Policy on Controlled Access Protection, to computer
systems which are used to process unclassified sensitive
information and which are covered by the Computer Security
Act of 1987 (Public Law 100-235). The TCSEC, often called
the "Orange Book," was developed by the National Computer
Security Center (NCSC) of the National Security Agency (NSA).
NTISSP 200 was published under authority of National Security
Decision Directive (NSDD) 145 prior to the passage of the
Computer Security Act, which established new federal
authorities and policy on protection of unclassified computer
systems.
Authority -- NIST Responsibilities under Computer Security
Act. The Computer Security Act of 1987 assigns NIST the
responsibility for developing security standards and
guidelines for federal computer systems, with the exception
of classified and a specified category of Department of
Defense unclassified systems (referred to as "Warner
Amendment" systems). NIST is therefore responsible for
advising all federal agencies on the use of trusted systems
technology in most unclassified computer systems.
Objectives. Specific objectives of this document are to:
o provide guidance to federal agencies on the use of
trusted systems technology;
o clarify the applicability of the TCSEC and NTISSP
Number 200; and
o describe NIST's long-range plans for the development
of additional policy, guidance, and technical
recommendations on the use of trusted system
technology.
Definition. Trusted Systems Technology - The technical
methods and mechanisms that are used to develop trusted
systems, are used to assure the enforcement of a security
policy in such systems, and are contained within the trusted
systems. Examples of trusted systems are trusted operating
systems, trusted networks, trusted databases, and trusted
applications. Examples of methods are modeling, software
engineering, and automated evaluation. Examples of
mechanisms include identification, authentication, auditing,
and access control.
Applicability. This guidance applies to those federal
computer systems defined in the Computer Security Act of
1987.
POLICY GUIDANCE
Use of Trusted Systems Technology. Each agency should select
computer security controls, including trusted systems
technology, for its systems which are commensurate with the
estimated risk and magnitude of potential loss of
confidentiality, integrity or availability. The selection
should be based upon an analysis of the security risks for
each system within its particular environment. Trusted
systems technology can be particularly useful for agencies
with significant requirements for confidentiality of
computer-based information. It can also provide basic access
control protection to help meet information integrity
requirements.
Applicability of NTISSP Number 200. There is no binding
national policy on the applicability and use of trusted
systems technology in federal computer systems which process
unclassified information. In particular, NTISSP Number 200
does not apply to unclassified systems covered by the
Computer Security Act of 1987.
USE OF TRUSTED SYSTEMS TECHNOLOGY
Value of Trusted Systems. NIST recommends the use of trusted
systems technology when such technology satisfies
requirements for adequate and cost-effective access control
protection. Such requirements exist when there is a need for
safeguarding the confidentiality and integrity of
information. In addition, the assurance process which is a
part of trusted systems technology can help support system
availability requirements. All these requirements should be
planned for and validated by a formal risk management
procedure. As an integral part of the planning process
required by the Computer Security Act, the first step in risk
management is the conduct of a thorough risk analysis. The
second step in risk management is selection of appropriate
security controls based on the analysis of the security risks
for the environment involved. This risk management process
should balance security and performance requirements and
provide for cost-effective security and privacy of sensitive
information in the system. Effective use of trusted systems
technology, like any other security control, should
substantially increase the protection relative to the
additional acquisition, operating and maintenance costs of
the security mechanisms obtained.
Computer Security Planning and Protection Strategy. A
security protection strategy consists of a mix of physical,
administrative, and technical safeguards, including trusted
systems technology. The use of trusted system technology can
be an effective part of a larger computer security protection
strategy for satisfying confidentiality, integrity, and
availability requirements. As with other types of protection
mechanisms, the benefits attainable from trusted systems
technology can only be realized if these mechanisms are used
properly in a complementary fashion.
Use of Evaluated Products. Agencies with a need for systems
with trusted technology features should select those systems
from NSA's Evaluated Products List (EPL). If EPL products
are not available, then agencies may select or design systems
that best meet their security requirements using the TCSEC as
a guide. NSA's Information Systems Security Products and
Services Catalog contains the EPL, which lists evaluated
products, those systems that are currently undergoing
evaluation, and the current status of such evaluations.
Use of Class "C2" Systems. Systems designed to meet "C2" or
higher classes of the TCSEC should first be considered when
acquiring multi-user computer systems with a requirement to
control user access to information according to "need to
know" and authorization. The "C2" and other TCSEC criteria
were designed to achieve confidentiality through improved
access control. The same access control mechanisms can also
be beneficial for helping to maintain information integrity.
While it should be recognized that access controls are a
necessary part of achieving integrity and availability, there
are other requirements for integrity and availability not
covered by the TCSEC. NIST recommends that federal
departments and agencies consider using "C2" functionality as
a minimum to help protect their multi-user systems having
confidentiality or integrity control requirements.
Use of Division "B" Systems. When acquiring multi-user
computer systems with a req