home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 107.3 KB | 2,426 lines |
-
-
-
-
-
-
-
-
-
-
- A GUIDELINE ON OFFICE AUTOMATION SECURITY
-
-
-
-
-
-
-
-
-
-
-
-
-
- 5 DECEMBER 1986
-
-
-
-
-
-
- EXECUTIVE SUMMARY
-
- Office Automation Systems (OA systems) are small, microprocessor-
- based Automated Information Systems that are used for such functions
- as typing, filing, calculating, sending and receiving electronic
- mail, and other data processing tasks. They are becoming commonly
- used by managers, technical employees, and clerical employees to
- increase efficiency and productivity. Examples of OA systems
- include personal computers, word processors, and file servers.
-
- This guideline provides security guidance to users of OA systems, to
- the ADP System Security Officers responsible for their operational
- security, and to others who are responsible for the security of an
- OA system or its magnetic storage media at some point during its
- life-cycle.
-
- This guideline explains how OA system security issues differ from
- those associated with mainframe computers. It discusses some of the
- threats and vulnerabilities of OA systems, and some of the security
- controls that can be used. It also discusses some of the
- environmental considerations necessary for the safe, secure
- operation of an OA system.
-
- This guideline suggests some security responsibilities of OA system
- users, and of ADP System Security Officers. Also described are some
- of the security responsibilities of the organization that owns or
- leases the OA system.
-
- In addition, guidance is given to the procurement officer who must
- purchase OA systems or components, and guidance is also provided to
- the officer who is responsible for securely disposing of OA systems,
- components, or the associated magnetic media.
-
- This document is issued as a National Telecommunications and
- Information Systems Security Advisory Memorandum, and is therefore
- intended as guidance only. Nothing in this guideline should be
- construed as encouraging or permitting the circumvention of existing
- Federal Government or organizational policies.
- TABLE OF CONTENTS
-
-
- PART I: INTRODUCTION
-
-
- 1.O INTRODUCTION. . . . . . . . . . . . . . . . . . . . . . . . . . 3
-
- 1.1 Purpose and Scope . . . . . . . . . . . . . . . . . . . 3
-
- 1.2 Structure . . . . . . . . . . . . . . . . . . . . . . . 3
-
- 2.0 THE OFFICE AUTOMATION SECURITY PROBLEM . . . . . . . . . . . . . 5
-
- 2.1 Protecting Information From Unauthorized
- Personnel . . . . . . . . . . . . . . . . . . . . 5
-
- 2.2 Sensitivity Levels of Magnetic Media. . . . . . . . . . 6
-
- 2.3 OA Systems With Fixed Media vs. OA Systems With
- Removable Media . . . . . . . . . . . . . . . . . 7
-
-
-
- PART II: GUIDANCE FOR THE OFFICE AUTOMATION SYSTEM USER
-
-
-
- 3.0 RESPONSIBILITIES OF OA SYSTEM USERS . .. . . . . . . . . . . . . 11
-
-
- 4.0 OPERATIONAL SECURITY FOR STAND-ALONE OFFICE AUTOMATION
- SYSTEMS. . . . . . . . . . . . . . . . . . . . . . . . . . . 12
-
- 4.1 OA Systems With Removable Media Only. . . . . . . . . . 12
-
- 4.2 OA Systems With Fixed Media . . . . . . . . . . . . . . 17
-
-
- 5.0 OPERATIONAL SECURITY FOR CONNECTED OFFICE AUTOMATION
- SYSTEMS. . . . . . . . . . . . . . . . . . . . . . . . . . . 21
-
- 5.1 Using an OA System as a Terminal
- Connected to Another Automated Information System 21
-
- 5.2 OA Systems Used as Hosts on Local
- Area Networks . . . . . . . . . . . . . . . . . . 22
-
-
- PART III: GUIDANCE FOR ADP SYSTEM SECURITY OFFICERS
-
-
- 6.0 RESPONSIBILITIES OF THE ADPSSO . . . . . . . . . . . . . . . . . 27
-
- 7.0 THREATS, VULNERABILITIES, AND CONTROLS . . . . . . . . . . . . . 28
-
- 7.1 Threats, Vulnerabilities, and Controls: an Overview . 28
-
- 7.2 Physical and Personnel Security . . . . . . . . . . . . 29
-
- 7.3 Communications Security . . . . . . . . . . . . . . . . 31
-
- 7.4 Emanations Security . . . . . . . . . . . . . . . . . . 32
-
- 7.5 Hardware/Software Security. . . . . . . . . . . . . . . 32
-
- 7.6 Magnetic Media. . . . . . . . . . . . . . . . . . . . . 34
-
- 7.7 Environmental Considerations. . . . . . . . . . . . . . 36
-
- 7.8 Preparing Downgraded Extracts . . . . . . . . . . . . . 38
-
-
- PART IV: GUIDANCE FOR OTHERS
-
-
- 8.0 RESPONSIBILITIES OF THE ORGANIZATION OWNING THE OA SYSTEM . . . 41
-
- 9.0 REQUIRING SECURITY IN THE PROCUREMENT OF OFFICE AUTOMATION
- SYSTEMS. . . . . . . . . . . . . . . . . . . . . . . . . . . 43
-
- 9.1 Processing Classified Information:
- Policy Requirements . . . . . . . . . . . . . . . 43
-
- 9.2 Physical Environment of the OA System . . . . . . . . . 44
-
- 9.3 Identification of Non-Volatile Components . . . . . . . 44
-
- 9.4 System Communications Capabilities. . . . . . . . . . . 44
-
- 9.5 Shared-Use Systems and Multi-User Systems . . . . . . . 45
-
- 10.0 SECURE DISPOSAL OF OFFICE AUTOMATION SYSTEMS. . . . . . . . . 47
-
- 10.1 Removable Media . . . . . . . . . . . . . . . . . . . . . . 47
-
- 10.2 Fixed Media . . . . . . . . . . . . . . . . . . . . . . 47
-
- 10.3 The Remainder of the OA System . . . . . . . . . . . . 47
-
-
- APPENDIX: A Guideline on Sensitivity Marking of the Office
- Automation System and Its Storage Media . . . . . 49
-
-
- LIST OF ACRONYMS. . . . . . . . . . . . . . . . . . . . . . . . . 53
-
- GLOSSARY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
-
- REFERENCES. . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
-
-
-
-
-
- PART I:
-
- INTRODUCTION
-
-
-
-
- 1.0 INTRODUCTION
-
- In recent years, there has been a tremendous increase in the number of
- Federal Government personnel using Automated Information Systems (AIS)
- to help with their jobs. In a large number of cases, the AIS involved
- are small, microprocessor-based systems referred to as "Office
- Automation Systems," or "OA Systems," for short. These OA Systems can
- increase efficiency and productivity of those whose jobs include such
- functions as typing, filing, calculating, and sending and receiving
- electronic mail. In addition, these systems can be used by technical
- and other personnel to performs functions such as computing and data
- processing.
-
- When used wisely, OA Systems can be a boon to the office worker and
- the engineer alike, helping to get more work done in less time. Not
- using them in a secure manner, however, can result in the compromise,
- improper modification, or destruction of classified or sensitive, but
- unclassified, information (as defined in NTISSP No. 2[18]). It is
- therefore necessary that OA System users be made aware of: (1)
- procedures and practices which will aid in the secure usage of these
- systems, and (2) the consequences of not employing security measures.
- The objective of this guideline is to address these two issues in the
- context of protecting classified or sensitive, but unclassified,
- information.
-
- 1.1 Purpose and Scope
-
- This document provides guidance to users, managers, security officers,
- and procurement officers of Office Automation Systems. Areas
- addressed include: physical security, personnel security, procedural
- security, hardware/software security, emanations security (TEMPEST),
- and communications security for stand-alone OA Systems, OA Systems
- used as terminals connected to mainframe computer systems, and OA
- Systems used as hosts in a Local Area Network (LAN). Differentiation
- is made between those Office Automation Systems equipped with
- removable storage media only (e.g., floppy disks, cassette tapes,
- removable hard disks) and those Office Automation Systems equipped
- with fixed media (e.g., Winchester disks).
-
- 1.2 Structure
-
- This guideline is divided into four parts, which are further
- subdivided into a total of ten chapters. Part I is the introductory
- part of this guideline. Chapter 1 gives an introduction, while
- Chapter 2 discusses the Office Automation security problem and why it
- is different from security problems involving larger Automated
- Information Systems.
-
- Part II provides guidance to the users of OA Systems. Chapter 3
- details some security responsibilities of all OA System users.
- Chapter 4 provides guidance to users of stand-alone OA Systems, while
- Chapter 5 provides guidance to users of connected OA Systems.
-
- Part III provides guidance to those ADP System Security Officers
- (ADPSSO) who are responsible for the security of OA systems. (Note:
- throughout this document, the term "security officer" will be used to
- mean ADPSSO.) Chapter 6 describes some of the responsibilities of
- security officers. Chapter 7 details some of the threats,
- vulnerabilities and security controls associated with Office
- Automation Systems.
-
- Part IV provides guidance to others associated with OA Systems.
- Chapter 8 is a discussion of some of the security responsibilities
- incumbent upon the organization that owns an OA System. Chapter 9
- provides guidance to procurement officers about addressing security
- during the procurement phase of the OA System life-cycle. Chapter 10
- provides guidance concerning the disposal of Office Automation Systems
- and/or their components.
-
- There is an Appendix that discusses security markings for the OA
- System and media used in it, a List of Acronyms that gives expansions
- for acronyms used in this guideline, and a Glossary that defines terms
- used in this document.
-
-
- 2.0 THE OFFICE AUTOMATION SECURITY PROBLEM
-
- There are three major points to remember about Office Automation
- Systems when considering security of these systems throughout their
- life-cycle. These points are:
-
- (1) Most current Office Automation Systems do not provide the
- hardware/software controls necessary to protect information from
- anyone who gains physical access to the system. Therefore, the most
- effective security measures to be used with these systems are
- appropriate physical, personnel, and procedural controls.
-
- (2) All information stored on a volume of magnetic media (e.g.,
- floppy disk, cassette tape, fixed disk) should be considered to have
- the same sensitivity level. This level should be at least as
- restrictive as the highest sensitivity level of any information
- contained on the volume of media.
-
- (3) There are different security considerations for OA Systems with
- fixed media versus those with removable-media-only.
-
- 2.1 Protecting Information From Unauthorized Personnel
-
- United States Government policy requires that classified information
- not be given to an individual unless he or she has the required
- clearance and needs the information for the performance of the
- job*[6,20]. For sensitive, but unclassified, information, no
- clearance is required; therefore, all access is based solely on need-
- to-know[20]. These policies must be enforced for information
- contained within OA Systems as well as for all other information.
- Therefore, information contained in OA Systems must be protected from
- compromise, unauthorized modification, and destruction.
-
- Most current Office Automation Systems processing classified or
- sensitive, but unclassified, information do not provide sufficient
- hardware/software security controls to prevent a user from accessing
- information stored anywhere in the system. Simply put, most current
- OA Systems are based on microprocessors that do not support multiple
- hardware states. In almost all cases, multiple hardware states are
- necessary to identify users, limit their actions, or keep them from
- accessing information for which they are not authorized. (See Section
- 7.5 of this document for a detailed discussion of this problem.)
-
-
- ____________
- * Bracketed numbers correspond to References, p. 57
-
-
-
- In fact, at the time of this writing, no Office Automation Systems
- have been certified as meeting even the class C1 requirements listed
- in the Department of Defense Trusted Computer System Evaluation
- Criteria[2], (hereafter known as the TCSEC).
-
- Because of the lack of adequate hardware/software security, proper
- physical, procedural, and personnel access controls must be used to
- prevent personnel from accessing the system while it contains any
- information (either in memory or on resident media) for which they are
- not authorized.
-
- 2.2 Sensitivity Levels of Magnetic Media
-
- All information contained on a volume of magnetic storage media should
- be considered to have the same sensitivity level. This sensitivity
- level should be at least as restrictive as the highest sensitivity
- level of any information contained on the media.
-
- The reason for this requirement is simple: under ordinary
- circumstances, a user of an OA System has no way of knowing exactly
- what is written where on a volume of media. It is possible that there
- have been errors made in writing on the disk that result in parts of
- various files being combined without the user's knowledge.
-
- Example: On most magnetic disks, there is a file
- allocation table with entries pointing to where on the
- disk each file is stored. Compromise of data can occur
- if there is a cross-link; that is, if an entry in the
- file allocation table for one file actually points to
- part of another file. As files are accessed and
- modified, it is often not possible to write the entire
- file in a contiguous set of storage locations.
- Therefore, the file becomes fragmented. The more a disk
- is used, the more fragmented the files become, and the
- greater the probability of a cross-link. In order to
- guard against compromise of information due to a cross-
- link, all information on the disk is considered to have
- the same sensitivity.
-
- It is also likely that classified or sensitive, but unclassified,
- information that has been "deleted" from the system is still resident
- on the media, unless it has been completely written over in an
- approved manner. (See Reference 4 for guidance on overwriting media.)
- Therefore, the media and all information on the media should be
- regarded as having a single sensitivity level.
-
- It is certainly permissible to have some information on a volume of
- magnetic media that is actually less sensitive than the sensitivity
- level of the volume; however, due to the fact that it is impossible
- for the average user of an OA System to tell exactly what is written
- where, security dictates that this information be treated as having
- the higher sensitivity level.
-
- Example: Suppose that a floppy disk is marked
- "Personnel privileged information," and there is a file
- on this disk that contains only unsensitive information,
- such as the General Schedule salary tables. While this
- unsensitive file is on the sensitive disk, it must be
- treated as sensitive, because bad pointers or other
- problems could cause the file to actually contain
- sensitive information. Further, this file CANNOT be
- copied to another floppy disk unless the second floppy
- disk is also considered to be sensitive, due to the
- possibility of "Personnel privileged information"
- unintentionally being copied.
-
-
- If there is a file that is believed to be unsensitive that is stored on a
- sensitive disk, it is permissible to have a copy of that file printed,
- manually reviewed, and determined to be unsensitive. This paper copy can
- then be treated as unsensitive; however, the disk itself should still be
- considered to be sensitive. This applies to classified information as
- much as it does to sensitive, but unclassified, information.
-
- 2.3 OA Systems With Fixed Media vs. OA Systems With Removable Media
-
- "Removable media" are any magnetic storage media that are meant to be
- frequently and easily removed from the OA System by a user. Examples of
- removable media include floppy disks, cassette tapes, and removable hard
- disks.
-
- "Fixed media" are any magnetic storage media that are not meant to be
- removed from the system by a user. Examples of fixed media include fixed
- disks and nonvolatile memory expansion boards.
-
- An OA System with removable-media-only is one which meets both of the
- following criteria: (1) the system does not currently use fixed media
- (e.g., Winchester disks) to store or process information; and (2) other
- than removable media such as floppy disks or cassette tapes, the OA System
- must have only volatile memory. (In determining whether or not the OA
- System contains fixed media, any read-only memory (ROM) the system
- contains can be ignored.) If either condition is not met, the system
- should be regarded as containing fixed media.
-
- The sensitivity level of an OA System with removable-media-only can be
- easily changed, because all classified and sensitive, but unclassified,
- information can be removed from the system after each use. This is not
- true of an OA System with fixed media--the sensitivity level of the system
- cannot be lowered without a great deal of effort, because it is virtually
- impossible to remove all classified and sensitive, but unclassified,
- information from the system. Therefore, if it is desired that the OA
- System be used to process information of several different sensitivity
- levels, or that it be used by personnel with different levels of
- clearances, an OA System with removable-media-only should be used. (See
- Sections 4.1.2.2 and 4.2.2.2 of this guideline for guidance on changing
- the sensitivity levels of OA Systems.)
-
-
-
-
-
- PART II:
-
- GUIDANCE FOR THE OFFICE AUTOMATION SYSTEM USER
-
-
-
-
- 3.0 RESPONSIBILITIES OF OA SYSTEM USERS
-
- One of the most common problems in Information Security is determining
- exactly who is responsible for what. This is a particularly important
- issue when Office Automation Systems are involved, since there is much
- less opportunity for oversight of "average users" by "professional
- security people." Therefore, it is incumbent upon each person to do his
- or her part to prevent the compromise of information.
-
- The "average user" of an Office Automation System is the most important
- person in maintaining OA System security. If security is to be
- maintained, the user must develop a "security mindset"[16]. In view of
- this, the following general responsibilities of all OA System users are
- described. It should be remembered that responsibilities discussed in
- this section apply equally to each user of an OA System, regardless of
- whether or not that person has been formally designated as the security
- officer for that OA System.
-
- (1) Each user of an OA System should know who the security officer for
- that system is, and how to contact that person.
-
- (2) Each user of an OA System should have an awareness of the applicable
- security guidelines[5,11,16,23]. Users should follow the applicable
- guidelines. If it is necessary in an emergency to deviate from the
- security guidelines, the user should report this deviation to a security
- officer as soon as possible, so that the security officer can take
- appropriate action.
-
- (3) In addition to violations of security procedures, each user should
- report suspected or known compromise of information and/or theft of
- property to a security officer[5,23]. If a user believes that a part of
- the OA System (including software and magnetic media) is missing or
- damaged, or has been changed, and the user is unable to determine why and
- by whom the change was made, then the problem should be reported to the
- ADPSSO at once. Similarly, if a user has reason to believe that
- information may have been copied, modified, or destroyed improperly, the
- security officer should immediately be notified.
-
- (4) It is the responsibility of each user not to use software provided by
- an unauthorized source. The user should not violate any copyrights or
- other license agreements, and is responsible for reporting any known
- violations to the security officer. Further, the user should not use any
- software which he has obtained without ensuring that it has first been
- thoroughly tested in an environment in which no operational information
- can be compromised or damaged.
- 4.0 OPERATIONAL SECURITY FOR STAND-ALONE OFFICE AUTOMATION SYSTEMS
-
- 4.1 O A Systems With Removable-Media-Only
-
- 4.1.1 Physical Access to Systems and Media
-
- Physical access to the OA System at any given time should be limited to
- those with clearance and need-to-know for all information then contained
- in the system. It may be necessary to keep the OA System in a separate
- room or part of a room to keep unauthorized personnel from being able to
- read information displayed on the screen or on a printer. If the OA
- System is not in a protected area, special care should be taken to ensure
- that unauthorized personnel cannot gain access to sensitive, but
- unclassified, or classified information.
-
- Example: Kelly, who is in charge of office personnel
- affairs, must process the quarterly promotion list,
- which contains personnel information that must be
- protected under the Privacy Act of 1974[20]. The OA
- System on which he must work, however, is located in the
- middle of the office, where several people who are not
- authorized to see the information can see what he is
- doing. Kelly should therefore take care to ensure that
- none of his co-workers can see the information he is
- processing. One way he might do this is to use
- partitions to surround the OA System and block the view
- of other employees. A second way is to position the CRT
- screen and printer in such a way that no one else in the
- office can see them, and then to ensure that no one is
- watching what he is doing. A third way is to make sure
- that the room is empty before doing his work.
-
- It is important to emphasize that these rules also apply for personnel
- performing maintenance on the OA System. Maintenance, regardless of
- whether preventive or corrective, should only be done by authorized
- persons. Maintenance personnel should not be allowed physical access
- to the OA System until all classified and sensitive, but unclassified,
- information for which they do not have a clearance and need-to-know
- has been removed.
-
- 4.1.2 Using the Stand-Alone OA System With Removable Media
- Only
-
- 4.1.2.1 Normal Operation
-
- The following procedures should be followed at all times during normal
- operation of the OA System:
-
-
- (1) Monitor screens, printers, and other devices that
- produce human-readable output should be placed away from
- doors and windows. This helps ensure that casual
- passersby cannot read information from
- them[5,8,11,19,23].
-
- (2) Never leave an OA System running unattended while it
- contains information that should not be seen by everyone
- with physical access to it. Especially, do not leave an
- OA System unattended while classified or sensitive, but
- unclassified, information is displayed on the screen.
- If a user must leave an OA System, he/she should follow
- the procedures outlined in Section 4.1.2.4 of this
- Guideline.
-
- Example: Suppose that Tom edits a large data file
- containing personnel records on an OA System. When
- he is finished, he saves the edited file. Since
- writing the new file over the old one will take
- some time, Tom leaves the OA System to run an
- errand. Sue sees that the OA System is
- unattended, and accesses and modifies the
- personnel file, destroying its integrity.
-
- (3) Electronic labels attached by the OA System to
- information on magnetic storage media should not be
- trusted to be accurate unless the OA System has been
- evaluated by the National Computer Security Center and
- has been found to be a B1 or higher trusted system.
- While it is a good practice to indicate the apparent
- sensitivity of information by an electronic label of
- some sort (e.g., by a character string in the file name
- or directory name, or by the value of the first byte in
- the file), these labels should not be trusted to be
- accurate. Therefore, all data on the media should be
- treated as being at a single sensitivity level--that
- which is indicated by the physical label attached to the
- media.
-
- (4) It is not normally permissible to have a classified
- or sensitive, but unclassified, volume of magnetic
- storage media on line at the same time as a volume with
- a lower sensitivity level, unless the sensitivity level
- of the latter volume is immediately raised. (The
- exception to this is discussed Section 4.1.2.3.)
-
- Example: Suppose that Terry has a file that she
- believes to contain only Unclassified information,
- but that is stored on a TOP SECRET floppy disk.
- Terry therefore copies the file to an Unclassified
- disk. The previously Unclassified disk should then
- become TOP SECRET. The reason for this is that
- there is no way for a user to determine exactly
- what has been written onto the disk; there is a
- chance that an error caused TOP SECRET information
- to be written onto the disk.
-
- (5) Printers should not be left unattended while
- classified or sensitive, but unclassified, information
- is being printed unless the area in which it is located
- provides a level of physical security adequate to
- protect the printout from being read, copied, or stolen
- by an unauthorized individual.
-
- (6) Any user who prints out classified or sensitive,
- but unclassified, information should remove that
- printout from the printer and/or printer area at the
- earliest possible time. If this is not done, classified
- or sensitive, but unclassified, information could be
- compromised by an unauthorized person reading, copying,
- or stealing a printout. (Note: this is particularly
- true if the printer is shared, and/or is not collocated
- with the rest of the OA System. Even if adequate
- physical security can be provided, it is good practice
- to remove the printout from the printer area at the
- earliest possible time.)
-
- Example: Suppose that Pat is John's supervisor,
- and prints out John's personnel records on a
- printer. Pat then leaves the printout next to the
- printer, and leaves the room to attend a meeting.
- While Pat is gone, John's co-worker George walks
- into the room, notices the printout, and reads
- John's personnel records. This is a compromise of
- information, and is a violation of the Privacy Act
- of 1974[20].
-
- (7) The user should ensure that all printouts have
- appropriate sensitivity markings (e.g., "Personnel
- Privileged Information," "Proprietary," "Confidential,"
- etc.) at the top and bottom.
-
- (8) If the printer ribbon is used to print classified
- information, it should be marked at the highest
- classification level it was used for, removed from the
- printer when not in use and stored and otherwise
- protected and disposed of as any other classified item.
-
- (9) Use only software that has been obtained from
- authorized sources. Do not pirate software yourself,
- and do not use any software which has been obtained by
- violation of a copyright or license agreement.
- Furthermore, software should not be used unless it has
- been thoroughly tested by someone trustworthy (such as
- the organizational software distribution office, or the
- ADPSSO) for errors and malicious logic before it is
- exposed to operational information. (This is especially
- true for software obtained from the public domain.)
-
- (10) Do not eat, drink, or smoke while using the OA
- System. Any spillage could seriously damage the system
- and/or magnetic media.
-
- (11) Protect magnetic media from exposure to smoke,
- dust, magnetic fields, and liquids. Diskettes that get
- wet will generally warp or become otherwise deformed.
- If a diskette or other volume of media does get wet, do
- not attempt to use it in an OA System, as doing so could
- result in damage to the system.
-
- (12) If a manual audit log is kept for the system,
- record in it all necessary information.
-
- (13) No information should be processed or stored on
- any OA System until a risk analysis has been completed
- and appropriate countermeasures have been determined.
-
- (14) No classified information should be processed or
- stored on any OA System unless that system has been
- TEMPEST-approved for the zone in which it is
- operating[14,15].
-
- 4.1.2.2 Changing the Sensitivity Level of Information the OA
- System is Processing
-
- OA Systems using removable-media-only contain no fixed media, and
- therefore can be used to process information of different sensitivity
- levels. In some instances it may be more cost effective to simply
- process all information as being at the system high level, and then
- manually review all output for the proper sensitivity. However, if
- this is impractical, then the sensitivity level of the OA System may
- be changed. When a change in the sensitivity level is desired, the
- following steps should be taken:
-
- (1) Remove all storage media from the system (this
- includes media containing both applications and systems
- programs).
-
- (2) Power off the system, preferably for at least one
- minute. (This will allow any latent capacitance to
- bleed off, and ensure that memory is cleared. Again,
- the exact time required depends on the particular system
- used, and the system security officer should specify an
- appropriate minimum time for systems under his/her
- control.)
-
- (3) Power on and reboot the system with the copy of the
- operating system that is at the proper sensitivity
- level.
-
- (4) Insert the applications media for the new
- sensitivity level into the system. There should be a
- different copy of the operating system, and of each
- applications package (e.g., a word processing package)
- for each classification of information the system
- processes (e.g., an Unclassified copy, a SECRET copy).
- It is recommended that there also be a different copy of
- the operating system for each sensitivity level of
- information the OA System processes (e.g., a "Personnel
- Privileged" copy, a "Company X Proprietary" copy). Each
- copy should be protected to a level appropriate for the
- sensitivity of information it is used to process.
-
- There is one exception to this guidance. To use only
- one copy of an operating system or applications package
- for all sensitivity levels, the procedure is: first,
- boot the system or load the package with no classified
- or sensitive, but unclassified, information in the
- system. Then, remove the diskette or tape containing
- the software BEFORE any classified or sensitive, but
- unclassified, information is introduced into the system.
- DO NOT reinsert the software into the system until the
- sensitivity level of the system has been changed using
- the procedures described in Section 4.1.2.2
-
- (5) The ribbon used to print classified or sensitive,
- but unclassified, information should be replaced by one
- used to print information of the new sensitivity level.
- The sensitive (or classified) ribbon should be either
- securely stored or disposed of, as appropriate.
-
- 4.1.2.3 Preparing Downgraded Extracts
-
- In some instances, it may be necessary to copy some information from a
- volume of media at one sensitivity level to another volume that is at
- a lower sensitivity level (e.g., copy a file from a SECRET disk to an
- Unclassified disk). This is an extremely dangerous practice, and
- should only be done following the procedures that have been set by the
- security officer. Users should contact their system's security
- officer for specific guidance on preparing downgraded extracts of
- classified or sensitive, but unclassified, information.
-
- 4.1.2.4 When a User is Finished Using the OA System
-
- When a user is through using the OA System, remove all removable media
- from the system and store it in a manner commensurate with information
- of that sensitivity. Record any audit trail information that may be
- required. If the system is used by more than one person at different
- times, it is advisable to power the system off at the conclusion of
- each person's use.
-
- 4.1.2.5 At the End of the Shift
-
- At the end of the shift or workday, the following steps should be
- taken before leaving.
-
- (1) Remove all removable media from the OA System.
-
- (2) Overwrite each location in the system's memory with
- some pattern (e.g., all zeros, then all ones, then a
- random pattern) before the system is powered off.
-
- (3) Power off the system. If there is a key, it should
- be stored in a secure place until the next shift or
- working day.
-
- (4) Any printer ribbon that has been used to print
- classified or sensitive but unclassified, information
- should be removed, and either securely stored or
- properly disposed of.
-
- The OA System should remain powered off during non-duty hours.
-
- A checklist should be maintained that is signed or initialed at the
- end of each day to verify that the OA System has been properly shut
- down and removable media have been removed. This will assist in
- determining accountability for a discovered security problem.
-
- 4.2 OA Systems With Fixed Media
- 4.2.1 Physical Access to Systems and Media
-
- Physical access to the system should be restricted to those who are
- authorized access for all data currently being stored on the system.
- In addition, these users should be authorized access for all data that
- has been stored on the system since the system was last declassified.
- (See Reference 4 for declassification procedures.)
-
- 4.2.2 Using the Stand-Alone OA System with Fixed Media
-
- 4.2.2.1 Normal Operation
-
- During normal operation of a stand-alone OA System with fixed media,
- all recommendations given in Section 4.1.2.1 which apply to the
- operation of an OA System with removable media are still applicable.
- However, additional vulnerabilities exist with OA Systems containing
- fixed media and therefore additional precautions must be taken.
-
- Even though only one user can directly access the system at a time, it
- is likely that information originated by more than one user will be
- stored on the fixed media. Access to any classified information by a
- user not possessing a clearance or need-to-know for it is a violation
- of Executive Order 12356[6]. Access to certain other types of
- sensitive, but unclassified, information is contrary to the provisions
- of Section 3 of the Privacy Act of 1974[20]. Systems which do not
- meet the requirements of at least class C2 cannot provide assurance of
- protection of information from anyone who gains physical access to the
- system. Therefore, if the OA System has been evaluated and found to
- be a class C2 or higher system, then the guidelines detailed in
- Reference 3 apply. Otherwise, all users should have proper clearance
- and need-to-know for all data that is stored or processed on the
- system.
-
- Any removable media which is placed in the OA System automatically
- acquires the same sensitivity level as the system. However, if the
- original sensitivity level of the removable media is more restrictive
- than that of the OA System, the OA System and its fixed media acquire
- the more restrictive sensitivity level, and should be marked as such.
-
- Example: Suppose that there is an OA System with one
- fixed disk and one floppy disk drive. The system and its
- fixed disk are classified SECRET. A previously Unclass-
- ified floppy disk placed in the system's floppy disk
- drive becomes classified SECRET. If a TOP SECRET floppy
- disk is placed in the floppy disk drive, however, the
- entire OA System and its fixed disk become classified TOP
- SECRET.
-
- It should not normally be permissible to copy a file from a classified
- or sensitive, but unclassified, volume of removable storage media to a
- volume of fixed media with a lower sensitivity level, unless the
- sensitivity level of fixed media, and of the entire OA System, is
- immediately raised to the level of the removable media. (The
- exception to this is discussed in Section 4.2.2.3.)
-
- Example: Suppose that there is a file that is apparently
- Unclassified, yet it currently resides on a TOP SECRET
- diskette. If this file is copied to an Unclassified fixed
- disk, the sensitivity level of the previously Unclassified
- disk should now be TOP SECRET. The reason for this
- requirement is that we have no way of being sure exactly
- what is being copied; therefore, we must assume the worst
- case: that some TOP SECRET information may be
- inadvertently copied onto the Winchester disk. Therefore,
- the sensitivity level of this previously Unclassified disk
- should be raised.
-
- Furthermore, it should not be permissible to copy a file from a
- classified or sensitive, but unclassified, volume of fixed media to a
- volume of removable media with a lower sensitivity. If this does
- occur, the sensitivity of the removable media should be immediately
- raised.
-
-
- Information that individual users wish to protect from other users of
- the OA System should be stored on removable media. This removable
- media can then be appropriately protected when it is not in use. This
- recommendation stems from the fact that OA Systems that do not meet
- the TCSEC requirements for at least class C1 cannot prevent any system
- user from gaining access to any location in the system's memory, to
- include the locations where the hardware/software controls themselves
- are stored. If the information is removed from the system along with
- the media it resides on, however, it cannot be accessed by others.
- (However, users should be very careful, as quite often information is
- left on the fixed media in the form of scratch files or backup files.)
- Users should make sure that media they remove from the OA System are
- properly secured. For example, if a floppy disk is removed, it should
- be locked away, not left lying on top of a desk or put in an unlocked
- container. One of the conditions for security is that adequate
- physical protection must be provided; if it is not, then all
- information is vulnerable.
-
- 4.2.2.2 Changing the Sensitivity Level of Information the OA
- System Is Processing
-
- It is not permissible to lower the sensitivity level of the OA System
- unless it has been declassified using the procedures described in
- Reference 4.
-
- Unless the OA System meets the requirements of at least class B1 when
- evaluated against the TCSEC, it should not be used to process multiple
- sensitivity levels of information simultaneously. In this case, it is
- not permissible to change the sensitivity level of the information the
- OA System is processing. Any information which is being processed by
- the OA System must be regarded as having the same sensitivity level as
- the system itself, regardless of its apparent sensitivity.
-
-
- 4.2.2.3 Preparing Downgraded Extracts
-
- In some instances, it may be necessary to copy some information from a
- volume of media at one sensitivity level to another volume that is at
- a lower sensitivity level (e.g., copy a file from a SECRET disk to an
- Unclassified disk). This should only be done following the procedures
- that have been set by the security officer. Users should contact
- their ADPSSO for specific guidance on preparing downgraded extracts of
- classified or sensitive, but unclassified, information.
-
- 4.2.2.4 When a User is Finished Using the OA System
-
- If there are any classified or sensitive, but unclassified, files
- stored on the fixed media that other users of the system should not be
- able to access, they should be removed from the system[8,9]. First,
- copy the files to a volume of removable media. Then, remove the
- information contained in these files from the fixed media by
- overwriting each location that contained these files with some pattern
- (e.g., all zeros, then all ones, then a random pattern)[8,9]. The
- software that is used to do the overwrite should be trusted to a level
- commensurate with the OA system level of sensitivity.
-
- 4.2.2.5 At the End of the Shift
-
- See Section 4.1.2.4. All safeguards described there are equally
- applicable to OA Systems with fixed media.
-
- In addition, the OA system itself should be physically secured in some
- way. If the room containing the OA system is approved for open
- storage of classified information at the highest level of information
- contained on the OA System, it may be sufficient to secure the room in
- the appropriate manner. If the room is not approved for open storage
- of classified information, then the OA System itself should be secured
- by locking it in an approved cabinet.5.0 OPERATIONAL SECURITY FOR CONNECTED OFFICE AUTOMATION SYSTEMS
-
- (Note: In addition to the guidance given in this section, all
- guidance given in Chapter 4 of this guideline is also applicable, and
- should be followed whenever the OA System is used.)
-
- 5.1 Using an OA System as a Terminal Connected to Another Automated
- Information System
-
- When an OA System is used as a terminal, all of the normal rules for
- connecting terminals to AIS should apply[10]. For example, these
- rules should include never leaving the OA System unattended while it
- is connected to another AIS, unless a software locking mechanism is
- used which prevents anyone, not passing an authentication check, from
- interacting with the remote AIS.
-
- 5.1.1 Office Automation Systems Versus "Dumb Terminals"
-
- Office Automation Systems used as terminals can cause security
- problems that do not occur when "dumb terminals" (i.e., those that are
- not programmable) are used. Among these are the possibility of
- malicious communications software in the OA System, and the ability of
- the OA System to store such things as passwords.
-
- Users of OA Systems should be wary of untested communications
- software. The organization owning the OA System should take any steps
- practicable to ensure that communications software used with their
- systems does exactly what its documentation claims, and nothing else.
- In general, at least one copy of the software should be tested, either
- by someone within the organization or by someone outside of the
- organization who can adequately test software.
-
- If communications software is used that contains malicious code, the
- communications software can cause information (including the user's
- password) to be compromised, can corrupt information flowing between
- the OA System and other AIS, or can cause service to be denied
- completely. Worse still, it can do much of this without the knowledge
- of the person using the software. Therefore, it is very important not
- to use communications software packages that have not been approved
- for use by a responsible security officer.
-
- Under no circumstances should a user's password for any remote AIS
- ever be stored in an OA System[11]. While it may seem convenient to
- program the OA System to execute the login routine on a mainframe
- computer system for you, it is important to remember that the OA
- System can also execute the same routine for someone else. This can
- result in another user of the OA System being logged into a remote AIS
- as you!
-
-
- Example: Suppose that Janet programs her personal computer
- so that when she is communicating with the AIS called
- MAINFRAME and presses the CONTROL and BREAK keys at the same
- time, her PC sends out her user-identifier and password to
- MAINFRAME. In other words, the PC executes Janet's login
- routine on MAINFRAME for her. She thus saves the keystrokes
- involved in typing the information each time she logs in,
- and doesn't even have to remember her password!
-
- The problem occurs when Pat sees what Janet does, and
- decides to take advantage of this "user-friendliness." When
- Joe is not around, Pat simply connects Janet's PC to
- MAINFRAME, presses the CONTROL and BREAK keys
- simultaneously, and is now logged onto MAINFRAME as Janet.
- Once this happens, there is no way to prevent the compromise
- of information, since MAINFRAME has no way of knowing that
- it is not really Janet at the other end of the terminal!
-
- In summary, storing a password in an OA System is the same as writing
- it down on a piece of paper--if anyone ever finds it, the security
- that was to be provided by that password has been defeated.
-
- 5.1.2 Consequences of Removable Media vs. Fixed Media
-
- Because the sensitivity level of an OA System with fixed media cannot
- be easily changed, it is difficult to use one of these systems as a
- terminal to a wide variety of other AIS, particularly if each of these
- remote AIS is processing information of different sensitivity levels.
- Therefore, once an OA System with fixed media is connected to an AIS
- processing classified information, that OA System should be considered
- to be classified. It should NOT be connected at a later time as a
- terminal to an AIS that is not approved to process information
- classified at the same or a higher level.
-
- An AIS with removable-media-only, however, can more easily be used as
- a terminal to, for example, a SECRET host at 2:00 pm and an
- Unclassified host at 4:30 pm, because its sensitivity level can be
- changed. If you are using an OA System with removable-media-only, and
- it is necessary to connect to an AIS that is processing a different
- sensitivity level of information than the last AIS that the OA System
- was connected to, the sensitivity level of your OA System should be
- changed in accordance with Section 4.1.2.2 of this guideline.
-
- 5.2 OA Systems Used as Hosts on Local Area Networks
-
- Suppose that there is an OA System attached to a Local Area Network
- (LAN). It is important for both the user and the security officer to
- understand that, as a general rule, any person who can access any
- other component of that LAN can access any information contained in
- that OA System. This includes any information that is stored on both
- fixed and removable media that are currently contained in the system,
- and applies regardless of whether the person is accessing the OA
- System from its keyboard or over a network. Therefore, the problem of
- compromise of information to an unauthorized individual is greatly
- increased any time an OA System is connected to a network. For this
- reason, the user should NEVER leave the OA System while it is logged
- in to the LAN.
-
- 5.2.1 Consequences of Removable Media vs. Fixed Media
-
- If some information in the OA System is stored on removable media,
- those media can be removed from the system so that the information
- cannot be accessed by a remote user. If the information is stored on
- fixed media, it cannot be easily removed from the system, and the
- owner of the information should be aware of its vulnerability to
- compromise.
-
- Suppose that there is an OA System that does not meet the class B1
- requirements and that is used as a LAN host. Any information that
- should not be shared with every user of the LAN should be stored on
- removable media, and these media kept out of the OA System when this
- information is not needed.
-
- If the OA System meets the requirements of class B1 or higher, then
- these media may be left in the system.
-
- 5.2.2 Controlling Access to System Resources
-
- In order to prevent the compromise of information, access to the
- resources of the LAN and of each OA System connected to it should be
- controlled. These controls may include physical, procedural, and
- hardware/software features, or some combination thereof.
-
- One way to ensure that information is not compromised is to provide
- such hardware/software features as access control, identification and
- authentication, and audit. If these features are provided, and the
- network as a whole can be trusted to prevent users from gaining access
- to information for which they are not authorized, then the other
- controls needed for security (e.g., procedural controls, physical
- access controls) are similar to those required for stand-alone OA
- Systems.
-
- However, since the hardware/software controls necessary to provide
- security in a LAN are often unavailable, procedural controls should be
- implemented. These include:
-
- (1) Have all OA Systems connected to the LAN operate at the same
- sensitivity level. That is, there should be no information
- processed anywhere on the LAN that some user of the LAN does not
- have a clearance, formal access approval, and need-to-know.
- Users should make certain that they remove from their OA Systems
- any media containing information that they do not want to share
- with each other user of the LAN.
-
- (2) Provide specific LAN-oriented physical access controls.
- Instead of keeping unauthorized personnel away from a single OA
- System, it is now necessary to keep them away from all OA Systems
- that are connected to the LAN. Some of these OA Systems may be
- located or may have peripheral devices (e.g., shared laser
- printers) that are located in public areas. Therefore, each user
- must help to ensure that no one is using any part of the LAN
- without authorization. Further, each user should pick up any
- human-readable output from any shared devices as soon as
- possible. For example, printouts should not be left in the
- printer room for six or eight hours if the room is not
- sufficiently protected to keep unauthorized personnel from
- gaining access to classified or sensitive, but unclassified,
- information. A good rule of thumb is, if you don't want others
- to read a sensitive file, do not leave it where it can be seen.
-
-
-
-
-
- PART III:
-
- GUIDANCE FOR ADP SYSTEM SECURITY OFFICERS
-
-
-
-
- 6.0 RESPONSIBILITIES OF THE ADPSSO
-
- There should be one individual who is responsible for the security of
- each Office Automation System[5,11]. This individual may be one of
- the users of the system itself, or he/she may be a person who has
- responsibility for the security of all OA Systems within the
- organization. (It should not be the OA System manager, due to the
- potential lack of accountability.) Regardless of who the individual
- is, the ADPSSO has certain responsibilities which must be carried out
- in order to ensure that the OA security policy is enforced. These
- include:
-
- (1) Ensuring that each OA System is certified and accredited, if
- required by organization policy.
-
- (2) Ensuring that all users of the system are aware of the security
- requirements, and assuring that all procedures are being followed.
-
- (3) Investigating all reported or suspected security violations, and
- determining (to the best of his/her ability) what has happened.
-
- (4) Reporting violations to appropriate authorities (e.g., top
- management, agency security officers, etc.).
-
- (5) Ensuring that the configuration management program is followed.
- He/she should approve maintenance before it is done, and ensure that
- no changes are made to either the hardware or software of the system
- without approval.
-
- (6) Reviewing the audit logs for anomalies (if audit logs are used).
-
- (7) Enforcing (and possibly also developing) procedures by which
- downgrading of information contained on magnetic media can be done, if
- the organization permits such downgrading.7.0 THREATS, VULNERABILITIES AND CONTROLS
-
- 7.1 Threats, Vulnerabilities, and Controls: an Overview
-
- The security officer of any OA System should have a familiarity with
- some of the security issues involved with that system. This chapter
- will give the security officer that familiarity.
-
- In computer security terminology, a threat is a person, thing, or
- event that can exploit a vulnerability of the system. Examples of
- threats include a maintenance man who wants information to sell, a
- wiretapper, or a business competitor.
-
- A vulnerability is an area in which an attack, if made, is likely to
- be successful. Examples of vulnerabilities include lack of
- identification and authentication schemes, lack of physical access
- controls, and lack of communications security controls.
-
- If a threat and a vulnerability coincide, then a penetrator can cause
- a violation of the system's security policy. For example, suppose
- that there is a maintenance person (the threat) who is secretly
- working for an unscrupulous contractor. In addition, there is a
- vulnerability in that lack of physical access controls allows
- maintenance personnel to work on the OA System without supervision.
- In this case, information may be corrupted, causing a disruption in
- the normal work routine.
-
- A security control is a step that is taken in an attempt to reduce the
- probability of exploitation of a vulnerability. This control may take
- one of many forms: an operational procedure, a hardware/software
- security feature, the use of encryption, or several others.
-
- There are many possible threats to the information being stored by an
- Office Automation System, as well as to the system itself. The system
- may be stolen or destroyed. Information stored on the system may be
- compromised; that is, it may be exposed to a user or process that does
- not have proper authorization to see it. Information may also be
- corrupted or destroyed altogether by a malicious user. Another threat
- might be the interference with the system's ability to process
- information correctly. It is the purpose of this document to educate
- the security officer and the user as to the proper defenses against
- each of these threats. The following is a breakdown of some of the
- security issues involved in combating each of several types of
- threats.
-
-
-
-
-
-
- 7.2 Physical and Personnel Security
-
- 7.2.1 Physical and Personnel Security Threats and
- Vulnerabilities
-
- In many instances, there is a danger that classified or other
- sensitive, but unclassified, data being processed in an OA System will
- be exposed to someone without a proper clearance or authorization for
- it. This is particularly true if the OA System is not physically
- located in an appropriate area, or if an OA System is directly
- accessible to external users by a communications line.
-
- (An "appropriate area" is one that is approved for the highest level
- of information that has ever been processed or stored on the OA
- System.)
-
- For the purposes of determining the level of security needed for an OA
- System, the following rule should be used:
-
- Any information that can be accessed using the
- communications capability of an OA System should be
- regarded as being processed by that OA System.
-
- This may mean that a more stringently controlled area is needed for a
- particular OA System, or that certain communications should not be
- allowed.
- Example: Suppose that there is an OA System
- physically located in an area that is approved for
- no higher than SECRET information. If the OA
- System is connected to another AIS that contains
- TOP SECRET information, and the remote AIS is not
- trusted to separate TOP SECRET and SECRET
- information, then the OA System should be regarded
- as processing TOP SECRET information. In this
- case, there are two things that can be done: not
- allow the connection of the OA System to the remote
- AIS, or upgrade the physical surroundings of the OA
- System so that TOP SECRET information may be stored
- there, and institute physical and procedural
- controls to ensure that only personnel with TOP
- SECRET clearances can gain physical access to the
- OA System.
- Regardless of the physical area in which the OA System is located, it
- is possible that all or part of the machine can be stolen or modified.
- The theft of a hardware part of the system may result in damage being
- done to the owning organization, since many times it is possible to
- recover residual information directly from the hardware.
-
-
- 7.2.2 Physical Access Controls
-
- The OA System should be located in an area that is approved for data
- as sensitive as the highest level of information it has stored or
- processed since all of its fixed media and semiconductor media were
- last declassified. Further, any other AIS or AIS component that can
- access the OA System should also be located in an area that is
- approved for this highest sensitivity of information.
-
-
- Example: Suppose that an OA System is used to process
- TOP SECRET data. This system should be stored in an
- area that is approved to store at least TOP SECRET
- material. (This requirement holds even if some or most
- of the information processed on the system is classified
- at a lower level than TOP SECRET.) Any other AIS or AIS
- component that is logically connected to this OA System
- must also be kept in an area that is approved for TOP
- SECRET data.
-
- Regardless of the physical area in which it is located, the OA System
- should be marked with the most restrictive sensitivity of information
- that may be processed on it. (See the Appendix of this Guideline for
- detailed guidance on the marking of OA Systems.)
-
- The OA System itself should be protected in such a way that sufficient
- protection is provided against theft or destruction of the system or
- its components. Possible precautions that can be taken include
- locking the OA System and its peripheral devices to a table, locking
- it in a cabinet, or keeping it in a locked room or vault. Any
- apparent theft or destruction of the OA System or any of its
- components (to include software) should be reported immediately to the
- security officer.
-
- 7.2.3 Personnel Security Controls
-
- Executive Order 12356 states that "A person is eligible for access to
- classified information provided that a determination of
- trustworthiness has been made by agency heads or designated officials
- and provided that such access is essential to the accomplishment of
- lawful and authorized Government purposes"[6]. The Privacy Act of
- 1974 states that no agency may disclose privacy information to any
- person without the prior written consent of the person to whom the
- information pertains, except for a limited set of purposes[20]. In
- order to meet these and other policy-based requirements, only
- personnel who possess the proper clearances, formal access approvals,
- and need-to-know for all information then contained in the OA system
- should be allowed physical access to the system. Under ideal
- circumstances, maintenance or configuration changes that must be done
- by vendor or support personnel should only be done by personnel who
- are cleared for and have a need-to-know for all information then
- contained in the system. If this is not possible, then vendor or
- support personnel should be escorted by someone who is cleared and has
- a need-to-know for all information on the system. If the OA system or
- parts of it must be sent to another location for repair, care should
- be taken to ensure that no one without the proper clearances and need-
- to-know for information previously contained (or possibly contained)
- in the system at any given time has access to the OA System at that
- time.
-
-
- 7.3 Communications Security
-
- 7.3.1 Communications Security Threats and
- Vulnerabilities
-
- Communications Security vulnerabilities are those that can be
- exploited whenever an Office Automation system has the capability to
- electronically send information to or receive information from another
- AIS. These vulnerabilities exist primarily in two areas: (a)
- interception of information during transmission, and (b) non-detection
- of improper messages and message headers received by the OA System.
-
- Whenever an OA System is used to electronically send information to or
- receive information from another computer system, there is a chance
- that the information will be compromised by being intercepted while en
- route. Therefore, steps should be taken to ensure that no information
- is compromised during transmittal.
-
- In addition to the problem of compromise, an OA System receiving
- information from another system should have some amount of assurance
- that the message and its header are authentic--that is, the receiving
- OA System is not being tricked into believing a false header. The
- integrity of messages and control information is crucial to the secure
- operation of a network. If a message were to be received with a phony
- header that was not detected, it could cause the system or a human
- using that system to take some action that would violate the security
- policy. Therefore, any forged messages or message playback should be
- detected by the OA System or by the network it is connected to.
-
- For additional information, please contact your organization's
- Computer Security Office. Additional information is available from
- NSA, 9800 Savage Road, Ft. George G. Meade, MD 20755-6000, Attention:
- DDI.
-
- 7.3.2 Communications Security Controls
-
- Regardless of whether the system is being used as a terminal attached
- to a mainframe or as a host attached to a local area network, either
- encryption or physically protected communications media should be used
- whenever the OA System is used for the communication of classified
- information. This protection must be sufficient for the highest
- classification of data that will be transmitted over the
- communications media.
-
- Encryption should be used to protect information from being
- compromised any time it is not possible to physically protect the
- communications media. In addition, cryptographic techniques may be
- considered even when communications media can be physically protected
- to the desired level. This is because the use of encryption will not
- only help prevent compromise of information by interception, it will
- also help prevent spoofing. Cryptographic checksums can be used to
- verify the integrity of the message and its sender.
-
- The term "physically protected communications media" means that the
- media (e.g., the communications lines) cannot be accessed by a system
- penetrator (that is, they are immune to a hostile wiretap, either
- active or passive), and that TEMPEST considerations do not raise a
- significant problem in the specific environment. An example of
- physically protected communications lines is communication cables that
- are physically located within a secure area and are used to connect OA
- Systems in a LAN.
-
- 7.4 Emanations Security
-
- Under certain circumstances, it is possible to detect what information
- is being processed by a computer system by analyzing the
- electromagnetic emanations coming from the system. This could result
- in the compromise of classified or sensitive, but unclassified,
- information. To prevent this, OA Systems that process classified
- information must be protected in accordance with the National Policy
- on the Control of Compromising Emanations. For specific applications
- see NACSI 5004, "TEMPEST Countermeasures for Facilities Within the
- United States (U)"[14], and NACSI 5005, "TEMPEST Countermeasures for
- Facilities Outside the United States (U)"[15]. (Note: The entire OA
- System must be protected. Connecting a TEMPEST approved CPU, monitor,
- printer, and keyboard together with an unapproved cable or without due
- regard for proper RED/BLACK separation and installation criteria can
- result in the failure of the entire system to meet the TEMPEST
- requirements.)
-
- 7.5 Hardware/Software Security
-
- 7.5.1 Hardware/Software Threats and Vulnerabilities
-
- Hardware/Software vulnerabilities are those that can be
- exploited because of the inability of the OA System's hardware,
- software, and firmware to prevent users from accessing data in
- or controlled by the system.
-
- The threats to exploit these vulnerabilities generally fall into one
- of three general categories: compromise of classified or sensitive,
- but unclassified, data; unauthorized modification or destruction of
- data; and denial of services to authorized users. More specifically,
- an unauthorized user can access data, can modify data, or can deny use
- of the data or even the OA System itself to authorized users.
-
- If an OA System is networked, the vulnerability of data is greatly
- increased. First, a user of one OA System may be able to access
- another AIS, and data that was previously inaccessible is vulnerable
- to attack. Second, an unauthorized user may be able to access the OA
- System from a remote location, and thus evade the physical and
- procedural controls that have been set up to protect the OA System
- locally.
-
- 7.5.2 Hardware/Software Controls
-
- Most current OA System architectures do not provide the hardware
- features which are needed to implement separate address spaces (or
- "domains") for the operating system and applications programs. They
- also do not provide the privileged instructions that are necessary to
- prevent applications programs from directly performing security-
- relevant operations, nor do they provide memory protection features to
- prevent unauthorized access to sensitive parts of the
- system[16,21,23].
-
- The limitations of these single-state OA Systems prevent them from
- providing effective hardware/software security features. For example,
- a knowledgeable user can access any memory location directly by using
- assembly language-type commands. (The memory locations which he/she
- can access in this manner include not only the system's own
- semiconductor memory, but also everything currently accessible to any
- part of the system, such as floppy disks, fixed disks, and cassette
- tapes.) In this manner, a user can read, modify, and/or destroy any
- information contained in the OA System--including security critical
- entities such as password files and encryption information. The
- system cannot protect itself from an unauthorized user.
-
- There are currently a number of hardware and software packages
- available on the market that claim to provide security for data
- resident on the system. On all current OA Systems that support only a
- single processor state, it is easy to circumvent these packages. For
- example, a user may be able to bypass a security package by booting
- the system with a different copy of the operating system--one that
- does not have the security features on it[16,21]. A user may
- additionally be able to use one of the commercially-available
- utilities packages to bypass security controls[16,21].
-
- Despite their weaknesses, some current hardware/software packages do
- have uses. Packages which provide such mechanisms as user
- identification and authentication, discretionary access controls, and
- audit trails can provide a degree of protection that is certainly
- better than that provided by an OA System without them. In addition,
- hardware/software controls can help to prevent accidents. If these
- controls are used, it is much less likely that a non-malicious user of
- the OA System will accidentally gain access to, modify, or delete
- information belonging to other users. A user will have to make a
- determined effort to gain access to information belonging to other
- users.
-
- There are currently some microprocessors available that provide the
- hardware features necessary to support hardware/software security
- controls (e.g., multiple processor states). OA Systems that are based
- on these microprocessors and that have the necessary security
- mechanisms can be evaluated against the TCSEC[2]. With the proper
- hardware/software security features added on, it is possible for the
- OA System to reach the class B1 level, when evaluated against the
- TCSEC. In addition, if OA Systems are designed with hardware/software
- security as an initial consideration, they would be able to achieve
- any trust level defined by the TCSEC.
-
- In summary, hardware/software controls should not be relied upon by
- themselves to provide separation of users from information in most
- current OA Systems. However, as long as these controls do not lull
- the user into a false sense of security, they will not harm and may
- assist in raising the overall level of Office Automation security.
-
- 7.6 Magnetic Media
-
- 7.6.1 Magnetic Remanence: Threats, Vulnerabilities,
- and Controls
-
- Magnetic remanence is the residue remaining on magnetic storage media
- after a file has been overwritten or the media have been degaussed.
- Many times, after a file has been overwritten or media have been
- degaussed, it is still possible for someone with physical possession
- of the media to recover the information that was formerly present.
- This magnetic remanence, therefore, is a major vulnerability of any OA
- System employing magnetic storage media. The threat corresponding to
- this vulnerability is that persons may come into possession of
- magnetic media which contain classified or sensitive, but
- unclassified, information for which they are not authorized. The
- general control to combat this is for all magnetic media to be
- properly cleared or declassified before being released for reuse. The
- following sections give general guidance in the areas of clearing and
- declassifying magnetic storage media. For more detailed guidance,
- please see the Department of Defense Magnetic Remanence Security
- Guideline [4].
-
-
- 7.6.2 Clearing and Declassification of Magnetic Media
-
- Clearing of magnetic media refers to a procedure by which the
- classified information recorded on the media is removed, but the
- totality of declassification is lacking. Clearing is a procedure used
- when magnetic media will remain within the physical protection of the
- facility in which it was previously used. Declassification refers to
- a procedure by which all classified information recorded on magnetic
- media can be totally removed. Declassification is required when
- magnetic media which have ever contained classified data are to be
- released outside of a controlled environment.
-
- 7.6.2.1 Clearing of Magnetic Media
-
- Certain types of removable media (e.g., magnetic tapes, floppy disks,
- cassettes, and magnetic cards) may be cleared by overwriting the
- entire media one time with any one character. Floppy disks may be
- cleared by applying a vendor's formatting program that overwrites each
- location with a given character.
-
- Fixed media (e.g., Winchester disks) should be cleared by overwriting
- at least one time with any one character. One way to do this is by
- applying a vendor-supplied formatting program that overwrites each
- location on the disk with a given character, if it can be shown that
- this program actually works as advertised. The user should beware:
- some programs that purport to overwrite all locations do not actually
- do this.
-
- Cleared media may be reused within the controlled facility or released
- for destruction; however, they should be marked and controlled at the
- level of the most restrictive sensitivity of information ever
- recorded.
-
- 7.6.2.2 Declassification of Magnetic Media
-
- Certain types of removable media can be declassified using a
- degaussing device that has been approved for declassifying media of
- that type. (A list of approved devices is maintained by NSA.)
-
- If a fixed medium (for example, a hard, or Winchester, disk) is
- operative, an approved method of declassifying the disk pack is to
- employ an overwrite procedure which must overwrite all addressable
- locations at least three times by writing any character, then its
- complement (e.g., binary ones and binary zeros) alternately.
-
- When fixed media become inoperative, it is impossible to declassify
- the media by the overwrite method. In this case, there are two
- alternate procedures that may be used: (1) disassemble the disk pack,
- and degauss each platter with the appropriate approved degaussing
- equipment; and (2) courier the inoperative media to the vendor's
- facility, have the magnetic media (e.g., disk platters) removed in
- sight of the courier and returned to the courier for destruction at
- the secure site. The vendor can then install new platters and repair
- any other problems with the disk unit. See Reference 4 for a detailed
- discussion of each of these alternatives.
-
- 7.6.3 Destruction of Magnetic Media
-
- Magnetic media that have contained classified or sensitive, but
- unclassified, information and are no longer useful should be
- destroyed. Prior to destruction, all labels or other markings that
- are indicative of classified or other sensitive, but unclassified, use
- should be removed.
-
- Detailed methods for destruction of different types of magnetic media
- are given in Reference 4.
-
- 7.6.4 Media Encryption
-
- Cryptography has important applications in an Office Automation
- environment, since in many cases it is impossible to physically
- protect magnetic media from all individuals who lack either the
- clearance or need-to-know for all information contained on the
- media[22]. (For example, if an OA System with fixed media is shared
- by two or more users, there quite often is information for which one
- user does not have a need-to-know that needs to be stored in the
- system.) In these cases, the use of cryptography to help prevent
- compromise of classified or sensitive, but unclassified, information
- should be considered.
-
- In many cases, information security can be enhanced if the information
- is stored on the media in encrypted form. There are two strategies
- which can be used: bulk file encryption and integral file encryption.
- Each of these strategies has its advantages and disadvantages; see
- Reference 23 for a description of each.
-
- 7.7 Environmental Considerations
-
- Office Automation Systems are generally designed to be used in the
- "typical" office environment[23]. Therefore, they seldom require
- special environmental controls such as air conditioning or air
- contamination controls. However, an OA System and its media can be
- seriously damaged or even destroyed by such things as electrical
- surges, fire, water, crumbs of food, termites, chemicals, or dust.
- Since destruction of the system and/or information represents a
- serious loss to the organization, it is imperative that steps be taken
- to help prevent unnecessary damage to the OA System. The following
- discussion is adapted from NBS Special Publication 500-120, Reference
- 23.
-
- 7.7.1 Electrical Power Quality
-
- Surges in electrical power can cause a great deal of damage to an OA
- System, and can cause information stored within to be permanently
- inaccessible. Furthermore, frequent power outages cause the loss of
- use of the system and its resources. Therefore, if the local power
- supply quality is unusually poor (e.g., large fluctuations in voltage
- or frequency, voltage spikes, or frequent outages), then such devices
- as surge protectors, battery backup, or uninterruptible power supply
- systems should be considered. In addition, disconnecting the system
- should be considered during intense electrical storms.
-
- 7.7.2 Air Contaminants
-
- The general cleanliness of the area in which OA Systems are operated
- has an effect on reliability, both of the equipment and of the
- magnetic storage media. Although it is generally not necessary to
- install special-purpose air purifiers for the OA System, cutting down
- or eliminating such contaminants as smoke and dust can only help the
- OA System and its media. The best guidance that can be given in this
- area is to keep smoke, dust, cigar and cigarette ashes, and similar
- airborne contaminants as far away from the OA System as possible.
-
- 7.7.3 Fire Damage
-
- Fire and excess heat can cause the destruction of an OA System in a
- very short time. Therefore, any Office Automation equipment in the
- office should be kept as far away from any open flames or other heat
- sources as possible. In addition to this, all users of the system
- should be familiar with procedures to be followed in case a fire
- should break out. Fire protection equipment (e.g., extinguishers)
- should be present and conveniently located so that the damage caused
- by a fire is limited as much as possible[5].
-
- 7.7.4 Static Electricity
-
- Another way in which Office Automation equipment can be damaged is by
- static electricity. If the climate in a particular area results in
- the presence of large amounts of static electricity, the use of anti-
- static sprays, carpets or pads should be considered. In addition,
- since static electricity can quite often build up in personnel,
- particularly when carpeting is used, personnel can be instructed to
- discharge any built-up static charge by simply touching a grounded
- object, such as a metal desk or doorknob.
-
- 7.7.5 Other Environmental Considerations
-
- There are other ways in which Office Automation equipment can be
- damaged by environmental hazards. One of these is by the spillage of
- food or liquid onto the equipment or media. Spilling a soft drink on
- a keyboard, for example, can cause damage that requires extensive
- repair or replacement of the keyboard. Spilling water or crumbs of
- food onto a floppy disk can cause it to be unusable, possibly
- resulting in the loss of information stored on it. Therefore, keep
- all food and drinks away from Office Automation equipment and
- media[5].
-
- 7.8 Preparing Downgraded Extracts
-
- In some instances, it is operationally necessary to copy information
- from a volume of media at one sensitivity level to another volume that
- is at a lower sensitivity level. If the OA System does not meet the
- requirements of at least Class B1, this is always dangerous, as
- classified or sensitive, but unclassified, information could be
- compromised without the user's knowledge. Therefore, any decision to
- permit the electronic downgrading of information should be made only
- after the risks of compromise have been carefully considered. The
- person or organization making the decision should be willing to accept
- the risk that classified or other sensitive, but unclassified,
- information will be compromised.
-
- Each ADPSSO is responsible for enforcing the procedures by which
- downgrading of information can be done. The ADPSSO may also be
- responsible for developing these procedures; however, they may be
- dictated by organizational policy. The following method is
- appropriate in some instances; however, the reader should again be
- warned that the possibility of information compromise exists when this
- is done:
-
- (1) Format a new volume of media; make sure that it has never
- been written on before. It would be best if the volume
- could be removed from a sealed container (e.g., a new box
- of diskettes).
-
- (2) Copy the necessary information from its current location
- to the new media.
-
- (3) Carefully examine the new media. Look for any signs that
- information other than what was intended has been copied.
- If it is feasible, print out everything on the target
- media, to verify that they contain no other information.
-
- Of course, it is still possible that information could have been
- copied onto the new media without being detected. However, if it is
- necessary that downgrading be permitted, this is a risk that must be
- taken.
-
-
-
-
-
- PART IV:
-
- GUIDANCE FOR OTHERS
-
-
-
-
-
- 8.0 RESPONSIBILITIES OF THE ORGANIZATION OWNING* THE OA SYSTEM
-
- Good Information Security begins at the top levels of an organization.
- If the organization has a commitment to Information Security, there is
- a far better chance of a security program succeeding. In order to
- foster good Office Automation System Security, and in turn good
- Information Security, the following conditions should exist within the
- organization (e.g., Department, Agency) that "owns" the OA system.
-
- (1) The organization should have a comprehensive Information Security
- policy. Further, the organization should have an AIS Security policy
- that ensures the implementation of its Information Security policy for
- information contained within or processed by AIS. In addition, the
- organization should have an OA System Security policy that is
- consistent with both its overall Information Security policy and its
- AIS Security policy[5]. This OA System Security policy should
- describe, at a minimum:
-
- (a) What actions are permissible on an Office Automation
- System, what information may be processed when and by
- whom, and what is prohibited.
-
- (b) What the organization permits regarding the use of
- government-owned OA Systems offsite (e.g., at home, or
- while traveling on official business), the use of
- personally-owned OA Systems to do government work, and the
- use of government-owned resources to do outside work
- (e.g., schoolwork).
-
- (c) Procedures for maintenance of OA Systems.
-
- (d) Procedures for the proper secure operation of an OA
- System.
-
- (e) Procedures for the secure handling, marking, storage, and
- disposal of classified or sensitive, but unclassified,
- information handled by an OA System.
-
- (2) The owning organization should set up a training program to
- properly instruct users and security officers in the areas of
- information security, including computer security and Office
- Automation security. If each person that uses the OA System is
- properly trained in the security aspects as well as the functional
- aspects of the system, the chance of a security problem occurring
- because of user error is significantly decreased.
- ____________________
- * This section applies to any organization responsible for the
- operation of an OA System, regardless of whether the system is owned,
- leased, or otherwise obtained.
-
- (3) The owning organization should have a policy concerning the
- procurement and use of hardware/software. The organization is
- responsible for ensuring that all copyrights and license agreements
- are followed, and that no pirated or otherwise illegally obtained
- software is used in its OA Systems. Furthermore, the organization
- should set up a program to test newly purchased or developed software
- prior to its use in operational systems. The purpose of this program
- is to ascertain that the software works as advertised, and does not
- contain trapdoors, Trojan horses, worms, viruses, or other malicious
- code. (A program of this type is also an excellent way to detect bugs
- in the software.)
-
- (4) The owning organization should have a configuration management
- program that maintains control over changes to the OA System. This
- program can also maintain records of maintenance done to the system,
- and keep an inventory of hardware and software to help detect
- theft[5].
-
- (5) The organization should have a policy covering whether or not
- audit trails are required and what information is required to be
- recorded.
-
- (6) The organization should have a policy covering the certification
- and accreditation of OA Systems that handle classified or sensitive,
- but unclassified, information[9].
-
- 9.0 REQUIRING SECURITY IN THE PROCUREMENT OF OFFICE AUTOMATION
- SYSTEMS
-
- Security is an important consideration throughout the entire life-
- cycle of an Office Automation System. If security is not considered
- during the initial system specifications and Request for Proposal
- (RFP), it may not be designed into the OA System, and will remain a
- problem throughout the system life-cycle. Often, when deciding upon
- what OA System to buy, security is ignored in favor of performance and
- compatibility with other AIS. Security does not have to be
- incompatible with other goals; therefore, ignoring it because of them
- is not valid.
-
- OMB Circular A-130 requires that a risk analysis be done by the person
- or organization responsible for the security of any AIS before
- procurement of the system is begun[13]. (Risk analyses are also
- required at other times during the system life-cycle; see Reference 13
- for further guidance.) This requirement applies as much to OA Systems
- as to any other AIS.
-
- This risk analysis, which may be anything from a very informal review
- to a fully quantified risk analysis, should help identify potential
- security problems. These problems can then be addressed before and
- during the procurement of the system.
-
- (Note: At this point, it is helpful to remind procurement officers
- and security officers that the prospective vendor's security claims
- should be verified to the greatest extent possible. Many times,
- mechanisms or features claimed by vendors are either not present, or
- are so easily subvertible that they are of little use.)
-
- The following guidelines should be considered when writing system
- specifications and Requests for Proposal.
-
- 9.1 Processing Classified Information: Policy Requirements
-
- If the OA System will be processing classified information, it must
- comply with the appropriate national TEMPEST policy directive[13,14].
- The Request for Proposal must state that the system is to meet this
- policy. Furthermore, if in addition to processing classified
- information the OA System is to have a communications capability, then
- appropriate Communications Security (COMSEC) measures, as approved by
- the National Security Agency, must be taken. The RFP and the system
- specification should require the capability to adapt to whatever
- COMSEC measures will be used to protect the system's communications
- (e.g., compatibility with cryptographic devices).
-
-
-
-
- 9.2 Physical Environment of the OA System
-
- An OA System is generally considered to be a high-dollar asset. If
- the OA System will be kept in an area that does not provide an
- adequate level of protection against theft, then the purchase of
- devices that lock the system to a table or in a closet should be
- considered. Also, the use of OA Systems with the capability for
- removable-media-only may be considered if there is a high probability
- of vandalism to the system. If a system with fixed media were to be
- vandalized, the information stored on the fixed media since the last
- backup could also be lost, while information contained on removable
- media can be protected by locking up the media. The probability of
- vandalism cannot be appreciably lowered by this method, but the damage
- caused by a vandal can be significantly lessened by protecting the
- information.
-
- If the OA System will be used to process classified information, and
- will be kept in an area that is not approved for open storage of
- information of that sensitivity, an OA System with removable-media-
- only should be used. This will lessen the chance of compromise of
- information if an unauthorized user were able to access the system, as
- classified or sensitive, but unclassified, information could be
- removed from the system and secured when the system is unattended.
-
- A GSA-approved, tamper-resistant cabinet in which the entire system
- can be secured should be purchased if the system will be used to
- process classified information, will contain fixed media, and will be
- kept in an area that is not approved for open storage of classified
- information. Given this scenario, this cabinet is the only way in
- which the security requirements of the system can be satisfied.
-
- 9.3 Identification of Non-Volatile Components
-
- All components of the proposed OA System that are non-volatile (i.e.,
- that retain information after power has been removed) should be
- identified prior to procurement. If the OA System is identified as
- having only removable media, and there is non-volatile memory that has
- not been identified as such, then the OA System has been incorrectly
- identified, since it contains a type of fixed media.
-
- 9.4 System Communications Capabilities
-
- If it is known at the time of procurement that the OA System is to be
- connected with other OA Systems to form a Local Area Network (LAN),
- then the security requirements of the entire LAN must be considered
- first. If the procurement is to be of the entire LAN (i.e., of all of
- its components), then the issues in this chapter must be addressed for
- the LAN as a whole, as well as for each of its components. Individual
- nodes of the LAN may have different security requirements than other
- nodes on the LAN.
-
- If the procurement is to be for an OA System which is to be attached
- to an existing LAN, then the security requirements and mechanisms of
- the existing LAN must be examined prior to writing the specifications
- of the OA System. The new OA System should support all security
- mechanisms that already exist in the LAN, and should not allow a
- violation of the LAN's security policy.
-
- (Note: The LAN should enforce a security policy, as any AIS should.
- This particular security policy should be driven by the owning
- organization's overall Information Security Policy, and the particular
- environment in which it operates. See Chapter 8.0 of this guideline
- for a further discussion of security policies.)
-
- If the OA System must be alternately connected as a terminal to
- several different AIS that process different sensitivity levels of
- information, the procurement should specify that only OA Systems using
- removable-media-only shall be considered. Since the sensitivity level
- of an OA System with fixed media cannot be easily lowered, switching
- between AIS with different sensitivity levels of information is
- impractical, if not impossible, for these systems.
-
- 9.5 Shared-Use Systems and Multi-User Systems
-
- A "shared-use system" is an OA System that is used by more than one
- person, but not by more than one at a time. A "multi-user system" is
- an OA System that can be used by more than one person at a time.
- Whenever an OA System is to be shared by more than one person, either
- serially or simultaneously, there are security concerns which should
- be addressed that do not occur if the OA System is used exclusively by
- one person.
-
- 9.5.1 Shared-Use Systems Processing One Sensitivity Level of
- Information
-
- If the system is to be shared by several users, and not all users will
- have the necessary clearances and need-to-know for all information
- that will ever be processed or controlled by that OA System, the
- possibility of acquiring an OA System that uses removable-media-only
- should be investigated. With this type of system, information can be
- removed and locked away to prevent its compromise.
-
- If a system with fixed media is procured and used, any information
- that is stored on fixed media may be accessible to all users of the
- system. If some users of the OA System do not have a need-to-know for
- some of the information stored on it, this access is contrary to the
- provisions of the Privacy Act of 1974 [20] (See Section 3, paragraph
- (b) of Reference 20). Therefore, if a system that contains fixed
- media is to be used in this situation, it should meet the requirements
- of at least class C2, when evaluated against the TCSEC.
-
- 9.5.2 Shared-Use Systems Processing Information of Multiple
- Sensitivity Levels
-
- In many cases, it is desirable to send machine-readable copies of
- information processed on one OA System to another site for use (e.g.,
- copy a file from one OA System onto a floppy disk, and then use that
- floppy disk in another OA System). If this is the case, and if the OA
- System will be used to process several different sensitivity levels of
- information (e.g., Unclassified through TOP SECRET; personnel,
- medical, and financial), an OA System that uses removable-media-only
- should be used. An OA System with fixed media should not be used,
- since the sensitivity level of the system may not be lowered, and
- since any removable media which is inserted into an OA System with
- fixed media must be regarded as having the same sensitivity level as
- the system itself.
-
- 9.5.3 Shared-Use Systems and Multi-User Systems With Fixed
- Media
-
- If the OA System is to utilize fixed media, and it is desired that
- users with differing clearances and/or need-to-know be able to access
- the system, hardware/software security should be specified in the RFP.
- Specifically, if some users of the OA System do not have a clearance
- and/or a need-to-know for some of the information to be processed on
- the system, the RFP should follow the guidance given in References 2
- and 3. It is possible that no vendor will be able to respond to the
- RFP, because there are currently no OA Systems available that meet
- these requirements. If this occurs, the planned mode of operation of
- the OA System should be revised to reflect the security capabilities
- of those systems that are available.
-
- 9.5.4 Multi-User Systems Processing Information of Multiple
- Sensitivity Levels
-
- If it is desired that the OA System be able to simultaneously process
- and store information of different sensitivity levels, and the system
- must be trusted to maintain the separation of information by
- sensitivity level, the specifications should require a system that
- meets the recommendations given in References 2 and 3. If no vendor
- is able to respond to the RFP because of lack of hardware/software
- security controls, the planned mode of operation of the OA System
- should be revised to reflect the security capabilities of those
- systems that are available.
-
-
-
- 10.0 SECURE DISPOSAL OF OFFICE AUTOMATION SYSTEMS
-
- When an Office Automation System has outlived its usefulness and has
- become obsolete, or when it has become damaged beyond repair, it must
- be disposed of properly. If the OA System has been used to process or
- store classified or sensitive, but unclassified, information, certain
- precautions should be taken before the system can be disposed of
- through normal channels. These precautions will help to prevent the
- compromise of any classified or sensitive, but unclassified,
- information remaining in the system after it is beyond the control of
- the organization that once used it.
-
- 10.1 Removable Media
-
- Any removable media that were used in the OA System should be removed.
- If these media will be used in another OA System without being
- cleared, care must be taken to ensure that the new OA System is
- approved for processing information of the removable media's
- sensitivity level.
-
- If it is desired that the removable media be reused in the same
- facility (but after information currently stored on them is erased),
- they may be cleared by one of the methods detailed in Reference 4.
-
- In all other cases, removable media that once contained classified or
- sensitive, but unclassified, information should be either declassified
- or destroyed, as appropriate, using the methods detailed in Reference
- 4.
-
- 10.2 Fixed Media
-
- Fixed media attached to the OA System that contain or formerly
- contained classified or sensitive, but unclassified, information
- should be declassified, destroyed, or removed from the system before
- they leave the controlling organization. Declassification and
- destruction procedures are described in Reference 4.
-
- 10.3 The Remainder of the OA System
-
- Once both fixed and removable media have been removed from the system
- and handled appropriately, any semiconductor memory that remains in
- the system should be properly declassified. To declassify
- semiconductor memory, the following procedures should be followed
- prior to disconnecting the power supply. A random pattern of bits
- must be written over each location. No further data is to be inserted
- for a 24-hour period and the power is to remain on. This same
- overwrite procedure should be used a second and third time, i.e.,
- inserting a random pattern of bits and leaving the system powered up
- for 24 hours, for a total of 72 hours, and no interim insertion of
- bits. Upon completion of the third cycle, the memory will be
- considered unclassified. As a second option, the security officer may
- have the semiconductor memory removed from the OA system and destroyed
- before the system leaves his control.
-
- Users who cannot use either of these options should contact their
- organization's Computer Security Office. Additional information is
- also available from NSA, Ft. George G. Meade, MD 20755-6000, ATTN:
- Division of Computer Security Standards.
-
- APPENDIX
-
- A Guideline on Sensitivity Marking of the Office Automation System and
- Its Storage Media
-
- Throughout this guideline, sensitivity marking of OA Systems
- processing classified or sensitive, but unclassified, information and
- of magnetic storage media is discussed. This appendix provides
- guidance on how to mark the OA System and its media appropriately.
-
- A.1 Sensitivity Marking of OA Systems Having Removable-Media-Only
-
- The OA System and its peripheral devices must be clearly marked with
- the highest sensitivity of information that it is allowed to
- process[9,22]. Stickers indicating the highest sensitivity of
- information that may be processed by that device should be applied
- directly to the OA System and each peripheral device. Under normal
- circumstances, this label should not be removed from the system.
-
- An OA System with removable media (and with only volatile
- semiconductor memory) is considered to have the same sensitivity level
- as the media which are currently contained in it. Since OA Systems
- that do not contain fixed media can change sensitivities (see Section
- 4.1.2.2), it is recommended that there be a clearly-visible sign
- placed near the system that indicates when the OA System is being used
- to process a specific type or range of information (e.g., classified,
- personnel privileged, proprietary). In this manner, others in the
- office can be forewarned not to allow visitors to wander about in the
- vicinity of the OA System. (The user should be aware that this sign
- might also have the effect of "advertising" the fact that classified
- or sensitive, but unclassified, information is being processed. This
- could draw unwanted attention from curious people. Again, the user
- should be very careful that no one is looking at what is being done.)
-
- A.2 Sensitivity Marking of OA Systems Containing Fixed Media
-
- Any OA System on which classified or sensitive, but unclassified,
- information is stored is considered to be a sensitive OA System. Any
- sensitive OA System is assumed to have the same sensitivity level as
- the highest classified or most sensitive information stored on it.
- This includes systems with fixed media, as well as systems with
- nonvolatile semiconductor memory. These systems must always be given
- the same level of protection as any other information of that
- sensitivity level[22].
-
- There should be attached to the OA System and each peripheral device,
- which is not physically collocated with it, a human-readable label
- (e.g., a sticker) on which is clearly and legibly written the
- sensitivity of the OA System. Under normal circumstances, this label
- should never be removed. If the sensitivity level of the system or
- device changes, a new label indicating the new sensitivity of the
- system can be placed on top of the old one.
-
- Because of the presence of the fixed media, the sensitivity level of
- the OA System may never be decreased, unless the system is
- declassified in accordance with Reference 4.
-
- The label attached to a peripheral device (e.g., a laser printer) that
- is shared among several OA Systems should indicate the highest (most
- restrictive) sensitivity of information that may be sent to that
- device.
-
- A.3 Sensitivity Marking of Removable Storage Media
-
- The sensitivity level of a volume of removable media is the same as
- the most restrictive sensitivity level of information stored on that
- volume. All information on a volume of removable media should be
- regarded as being at the same sensitivity level (e.g., it is not
- permissible to consider one file on a diskette to be TOP SECRET and
- another file on the same diskette to be Unclassified).
-
- There should be a human-readable label attached to the container of
- each volume of removable media (e.g., the outside of a diskette, the
- outside of a tape reel) that clearly indicates the current sensitivity
- level of that volume of media[5,11,12,22,23]. Under normal
- circumstances, this label should not be removed unless the volume of
- media is declassified using procedures specified in Reference 4.
- Labels should be color coded in accordance with applicable government
- and agency or departmental standards.
-
- Example: An orange label may be used to indicate a TOP
- SECRET diskette, a red label indicates a SECRET
- diskette, a blue label indicates CONFIDENTIAL, a purple
- label means personnel data is contained on the diskette,
- a grey label indicates "Company X Proprietary
- Information," a green label may be used on a diskette
- that contains unsensitive information only.
-
-
- The volume of media should then be protected to a level that is at
- least commensurate with this label.
-
- Example: A floppy disk that is marked SECRET should be
- given the same level of protection as a piece of paper
- that is marked SECRET (e.g., stored in a GSA-approved
- safe when not in use).
-
-
-
-
- It is permissible to raise the sensitivity level of a volume of
- media. When this happens, the label on the media should also be
- changed. A new label indicating the higher sensitivity level may be
- placed on top of the old label, or the old label may be removed before
- the new label is applied.
-
- It should not be permissible to decrease the sensitivity level of a
- volume of media without first declassifying it using one of the
- approved methods described in Reference 4.
-
- Any volume of media which is in the OA System at the same time as
- other media of a more restrictive sensitivity level should
- automatically acquire that more restrictive sensitivity[16].
-
- Example: If an Unclassified system disk is placed in
- drive A of an OA System, with a TOP SECRET disk in drive
- B, the system disk should be considered to be TOP SECRET
- and protected as such. The reason for this is that the
- average user has no way of being absolutely certain what
- is being written on each disk, and must therefore guard
- against the OA System writing to the wrong disk by
- upgrading the sensitivity of the system disk.
-
- Any volume of removable media that is not sealed in its original
- package and is not labeled should be presumed to be at the same
- sensitivity level as the OA System in which it is used[5,15]. If this
- OA System can have a range of sensitivity levels (e.g., is a system
- with removable-media-only), the volume of media should be considered
- to have the same sensitivity level as the highest classified or most
- sensitive information the system can process.
-
- If there is an unsealed, unlabeled volume of media, and it cannot be
- determined which (if any) OA System it has been used in, the media
- should be considered to have the same sensitivity level as the highest
- sensitivity level of any OA System that they could have been used in.
-
- Example: Suppose that there are four OA Systems in the
- same room. Three are Unclassified systems, while the
- fourth is TOP SECRET. An unlabeled floppy disk is found
- lying on top of a desk in this room, and it cannot be
- determined in which, if any, of these four OA Systems
- this particular floppy has been used. This floppy disk
- should therefore be considered to be TOP SECRET.
-
- A.4 Sensitivity Marking of Fixed Storage Media
-
- All fixed media should be regarded as having the same sensitivity
- level as the OA Systems to which they are attached.
-
-
- Unless the OA System has been approved to simultaneously process
- information of a range of sensitivity levels, all information on the
- fixed media should be regarded as being at the same level: the
- highest sensitivity level of any information on the media.
-
- LIST OF ACRONYMS
-
- ACRONYM EXPANSION
- ADPSSO ADP System Security Officer
-
- AIS Automated Information System
-
- LAN Local Area Network
-
- NACSI National Communications Security Instruction
-
- NCSC National Computer Security Center
-
- OA System Office Automation System
-
- PC Personal Computer
-
- TCSEC Department of Defense Trusted Computer System
- Evaluation Criteria
-
- WP Word Processor
-
- GLOSSARY
-
- ADP System Security Officer (ADPSSO)
-
- The person who is nominally responsible for the secure
- operation of an OA system.
-
- Automated Information System (AIS)
-
- An assembly of computer hardware, software, and firmware
- configured in such a way that it can collect, communicate, compute,
- process, disseminate, and/or control data.
-
- Connected Office Automation System
-
- An OA System that is electrically connected to one or more AIS.
- The OA System may be used as a host, a file server, a terminal, or any
- other component of a network.
-
- Local Area Network
-
- An interconnected group of OA Systems or system components that
- are physically located within a small geographic area, such as a
- building or campus.
-
- Magnetic Remanence
-
- A measure of the magnetic flux density remaining after removal
- of an applied magnetic force. Can also mean any data remaining on ADP
- storage media after removal of the power.
-
- Multi-User System
-
- An OA System that can be used by more than one person
- simultaneously.
-
- Non-removable Magnetic Media
-
- Any magnetic media used for the storage of information that is
- not designed to be regularly removed from the system. Examples of
- non-removable media include fixed or "Winchester" disks. (This will
- also be referred to as "fixed media" for short.)
-
- Nonvolatile Memory
-
- Memory contained within an Office Automation System that
- retains its information after power has been removed.
-
-
-
-
-
- Office Automation System
-
- Any microprocessor-based AIS or AIS component that is commonly
- used in an office environment. This includes, but is not limited to,
- Personal Computers, Word Processors, printers, and file servers. It
- does not include electric typewriters, photocopiers, and facsimile
- machines.
-
- Personal Computer (PC)
-
- A microprocessor-based computer which is primarily intended to
- be used by one person at a time. It is usually characterized by
- relatively low cost and small physical size (usually small enough to
- fit on a desk or table).
-
- Physically Protected Communications Media
-
- Any communications media to which physical access is
- sufficiently controlled that the chance of compromise, improper
- modification, or destruction of information is assumed to be zero.
-
- Removable Magnetic Media
-
- Any magnetic media used for the storage of information that is
- designed to be frequently and easily removed from the Office
- Automation System by a user. Examples of removable magnetic media
- include floppy disks, removable hard disks (e.g., Bernoulli disks) and
- magnetic tapes. (This will also be referred to as "removable media"
- for short.)
-
- Sensitive, but Unclassified Information
-
- Information the disclosure, loss, misuse, alteration, or
- destruction of which could adversely affect national security or other
- Federal Government interests. National security interests are those
- unclassified matters that relate to the national defense or the
- foreign relations of the U.S. Government. Other government interests
- are those related, but not limited to the wide range of government or
- government-derived economic, human, financial, industrial,
- agricultural, technological, and law enforcement information, as well
- as the privacy or confidentiality of personal or commercial
- proprietary information provided to the U.S. Government by its
- citizens[19].
-
- Sensitivity Label
-
- The physical representation of the sensitivity level of information.
-
-
-
- Sensitivity Level
-
- A designation, associated with information, indicating (1) the
- amount of harm that can be caused by the exposure of that information
- to an unauthorized user, (2) any formal access approvals that must be
- granted prior to the granting of access to that information, and (3)
- any specific handling restrictions placed on that information.
- Sensitivity levels contain both a hierarchical component (e.g.,
- Unclassified, CONFIDENTIAL, SECRET, TOP SECRET) and a non-hierarchical
- component (e.g., For Official Use Only (FOUO), Proprietary Information
- Enclosed (PROPIN)).
-
- Shared-Use System
-
- An OA System that is used by more than one person, but is used
- by only one person at a time.
-
- Stand-Alone Office Automation System
-
- An OA System that is electrically and physically isolated from
- all other AIS.
-
- Volatile Memory
-
- Memory contained within an Office Automation System that loses
- its information a short time after power has been removed.
-
- Word Processor (WP)
-
- An Office Automation System that is designed to be used
- primarily in the preparation of documents containing alphanumeric
- text.
-
- Workstation
-
- The total collection of Office Automation equipment, physically
- located in one place, that makes up the resources meant to be used by
- one person at a time.
-
-
- REFERENCES
-
- 1. U.S. Air Force Computer Security Program Office, "Guidance
- for Secure Operating Procedures for the Zenith Z-150
- Personal Computer," 1 June 1985.
-
- 2. Department of Defense Standard 5200.28-STD, "Department of
- Defense Trusted Computer System Evaluation Criteria," 26
- December 1985.
-
- (Note: this document is also referenced as: DoD Computer
- Security Center, Department of Defense Trusted Computer
- System Evaluation Criteria, CSC-STD-001-83, 15 August
- 1983.)
-
- 3. DoD Computer Security Center, Computer Security
- Requirements--Guidance for Applying the Department of
- Defense Trusted Computer System Evaluation Criteria in
- Specific Environments, CSC-STD-003-85, 25 June 1985.
-
- 4. DoD Computer Security Center, Department of Defense Magnetic
- Remanence Security Guideline, CSC-STD-005-85, 15 November
- 1985 (FOR OFFICIAL USE ONLY).
-
- 5. Department of Energy, "Security Guidelines for
- Microcomputers and Word Processors," DOE/MA-0181,
- March 1985.
-
- 6. Executive Order 12356, National Security Information,
- 6 April 1982.
-
- 7. Federal Emergency Management Agency, "Information Systems
- Policy," Instruction 1500.3, 23 March 1984.
-
- 8. Federal Emergency Management Agency Manual 1540.2,
- "Automated Information Systems (AIS) Security," September
- 1984.
-
- 9. Federal Information Processing Standards Publication (FIPS
- PUB) 102, Guideline for Computer Security Certification and
- Accreditation, 27 September 1983.
-
- 10. Department of the Interior, "Acquisition and Use of
- Microcomputers," 376 DM 12.1.
-
- 11. Lawrence Livermore National Laboratory, "Computer Security
- Guidelines for Microcomputer Users," January 1985.
-
-
- 12. Los Alamos National Laboratory, "Word Processor Security
- Policy," June 1982.
-
- 13. Office of Management and Budget (OMB) Circular A-130,
- "Management of Federal Information Resources,"
- 12 December 1985.
-
- 14. National COMSEC Instruction (NACSI) 5004, "TEMPEST
- Countermeasures for Facilities Within the United States
- (U)," 1 January 1984 (SECRET).
-
- 15. National COMSEC Instruction (NACSI) 5005, "TEMPEST
- Countermeasures for Facilities Outside of the United States
- (U)," 1 January 1984 (SECRET).
-
- 16. National Computer Security Center, Personal Computer
- Security Considerations, NCSC-WA-002-85, December 1985.
-
- 17. National Security Decision Directive 145, National Policy on
- Telecommunications and Automated Information Systems
- Security, September 17, 1984.
-
- 18. National Telecommunications and Information Systems
- Security Policy (NTISSP) No. 2, "National Policy on
- Protection of Sensitive, but Unclassified Information in
- Federal Government Telecommunications and Automated
- Information Systems", 29 October 1986.
-
- 19. U.S. Nuclear Regulatory Commission, NRC Manual, Chapter
- NRC-2301, "Systems Security", March 16, 1985.
-
- 20. Public Law 93-579, "Privacy Act of 1974," 31 December, 1974.
-
- 21. Schaefer, Marvin, "Security Vulnerabilities of Office
- Automation Systems," in Proceedings of the Security Affairs
- Support Association's Fall 1985 Symposium: "INFOSEC FOR THE
- NINETIES", 21-22 November 1985.
-
- 22. Department of State, "Security Standards for Office
- Automation Systems used for National Security Information in
- the Washington, D.C. Metropolitan Area," A/ISS Systems
- Security Standard Number 1, 22 December 1985.
-
- 23. Steinauer, Dennis D., Security of Personal Computer Systems:
- A Management Guide, NBS Special Publication #500-120,
- January 1985.
-