home *** CD-ROM | disk | FTP | other *** search
-
- GENERAL SERVICES ADMINISTRATION
- Washington, DC 20405
-
-
- FIRMR BULLETIN C-22
-
- TO: Heads of Federal agencies
-
- SUBJECT: Security and privacy protection of Federal information
- processing (FIP) resources
-
- 1. Purpose. This bulletin provides guidance to help agencies
- achieve security for FIP resources, including those resources
- provided by contractors.
-
- 2. Expiration date. This bulletin contains information of a
- continuing nature and will remain in effect until canceled.
-
- 3. Contents.
-
- Topic Paragraph
-
- Related material..........................................4
- Information and assistance................................5
- Definitions...............................................6
- Acronyms..................................................7
- Agency responsibilities...................................8
- Security program elements.................................9
- Identification and review...............................9a
- Security controls.......................................9b
- Continuity of operations................................9c
- Security audit or evaluation............................9d
- Physical and environmental security.....................9e
- Contingency plan........................................9f
- NSEP....................................................9g
- Cancellation..............................................10
-
- 4. Related material.
-
- a. Computer Security Act of 1987, 40 U.S.C. 759
- b. Privacy Act of 1974, 5 U.S.C. 552a
- c. OMB Circular A-130, Management of Federal Information
- Resources
- d. FIRMR part 201-18, Planning and Budgeting
- e. FIRMR sectioon 201-21.302, Security and Privacy
- f. FIRMR Bulletin C-20, National Security and Emergency
- Preparedness (NSEP)
- g. 47 CFR Part 64 - Appendix A
-
- TC 90-1
-
- FEDERAL INFORMATION RESOURCES MANAGEMENT REGULATION
- APPENDIX B
- FIRMR Bulletin C-22
-
-
- 5. Information and assistance.
-
- General Services Administration
- Regulations Branch (KMPR)
- 18th and F Streets, NW
- Washington, DC 20405
-
- Telephone: FTS 241-3194 or (202) 501-3194
-
- 6. Definitions.
-
- a. "Risk analysis" means identification of the events,
- threats, or hazards that could have an adverse impact on FIP
- resources and an understanding of the impact of loss or compromise
- of information on the organization, expressed in economic or social
- terms, and the probability of such a loss occurring.
-
- b. "Sensitive information" means any information, the loss,
- misuse, or unauthorized access or modification, of which, could
- adversely affect the national interest or the conduct of Federal
- programs, or the privacy to which individuals are entitled under
- the Privacy Act, but that has not been specifically authorized
- under criteria established by an Executive Order or an Act of
- Congress to be kept secret in the interest of national defense or
- foreign policy.
-
- 7. Acronyms.
-
- FIP Federal Information Processing
- FIRMR Federal Information Resources Management Regulation
- NIST National Institute of Standards and Technology
- NSEP National Security and Emergency Preparedness
- OMB Office of Management and Budget
- TSP Telecommunications Service Priority (TSP) System
-
- 8. Agency responsibilities.
-
- a. FIRMR Part 201-18 requires agencies to consider security
- and privacy needs in the development of their 5-year plan for
- meeting the agency's information technology needs.
-
- b. FIRMR 201-21.302 requires each agency to ensure that--
-
- (i) A satisfactory level of security, commensurate with
- the value of resources being protected, is maintained for all FIP
- resources, including those maintained or provided by contractors;
-
-
- 2
- FIRMR Bulletin C-22
-
-
- (ii) FIP resources are operated and maintained to
- safeguard information from threats and hazards, including
- prevention of loss from natural hazards, fire, and accidents; and
-
- (iii) FIP resources are operated and maintained in a
- manner that protects the personal privacy of individuals.
-
- 9. Security program elements. Agency security programs should
- include the following procedures and safeguards:
-
- a. Identification and review. For each FIP system, the agency
- should determine the level of security required and perform a risk
- analysis to provide an understanding of the probable losses and the
- effect of those losses upon the agency mission. The review of each
- system should determine that only that information essential to the
- system's purpose is maintained. The Privacy Act of 1974 requires
- that agencies maintain only that information about an individual
- that is relevant and necessary to accomplish a purpose of the
- agency as required by statute or executive order of the President.
- Thus, protection of privacy is promoted by limiting the amount of
- information maintained.
-
- b. Security controls. Administrative, physical, and technical
- controls help meet agency security program objectives. Examples
- include--
-
- (i) Controls that have the potential to reduce damage or
- loss to the agency through concentration or distribution of FIP
- resources functions;
-
- (ii) Controls used to protect data during physical
- handling;
-
- (iii) Controls that identify and ensure the accountability
- of individuals whenever an action is taken that may have an effect
- on the data, application, or physical installation; and
-
- (iv) Controls that limit or prevent access to FIP
- resources and that record entry attempts.
-
- c. Continuity of operations. To ensure continuity of
- operations--
-
- (i) Identify critical computer records and develop a
- contingency plan for each FIP system that processes sensitive
- information;
-
-
-
- 3
- FIRMR Bulletin C-22
-
-
- (ii) Identify essential programs, systems of records, and
- alternative sites or services;
-
- (iii) Develop an agreement to use an alternate facility or
- services;
-
- (iv) Periodically operate at the alternative facility or
- service center;
-
- (v) Duplicate essential information, programs, and
- documentation for backup at an off-site protected location; and
-
- (vi) Assure that all sites meet current fire codes and
- regulations. Have the fire department inspect the site and test
- fire protection systems and safeguards.
-
- d. Security audit or evaluation.
-
- (i) Agencies should perform audits to evaluate the
- adequacy of security safeguards, including FIP systems operated by
- contractors.
-
- (ii) Audits should be conducted by personnel other than
- those responsible for operating and developing the system.
-
- (iii) The audit or evaluation should include an
- examination of information sensitivity; a verification and
- validation of the adequacy of physical, administrative, and
- technical controls; and a review of the adequacy of security
- administration. The agency should determine time intervals for
- audits or evaluations on the basis of the sensitivity of the
- operation, but should conduct one at least every 3 years. This
- audit should ensure that all applicable Federal policies,
- regulations, and standards are met and that logs and inventories
- are current.
-
- e. Physical and environmental security. Agencies should
- maintain a safe physical environment for FIP resources that ensures
- the protection of personnel, the safeguarding of the physical
- assets of the facility, and the effective performance of the
- facility's mission. Ventilation, smoke detection, fire, flooding,
- personnel security,and emergency power are major factors to
- consider when developing environmental security safeguards.
-
- f. Contingency plan. Agencies should develop, test, and
- maintain a contingency plan for each FIP system that processes
- sensitive information.
-
-
- 4
- FIRMR Bulletin C-22
-
-
- g. National Security Emergency Preparedness (NSEP). Certain
- telecommunications resources are installed and operated to meet
- agency NSEP requirements. Agencies need to identify resources that
- use telecommunications services and transmit sensitive information.
- These FIP reources need to be included in the agency's providing
- carriers' Telecommunications Service Priority (TSP) System,
- formerly known as the "Restoration Priority System." FIRMR
- Bulletin C-20 contains guidance on NSEP. See Appendix A to 47 CFR
- Part 64 for TSP system coverage.
-
- 10. Cancellation. FIRMR Bulletin 34 is canceled.
-
-
-
-
-
-
- Thomas J. Buckholtz
- Commissioner
- Information Resources
- Management Service
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- 5
-