I
22019951
| United States Office of Information
Environmental Protection Resources Management
Agency Washington DC 20406 December 1989
I
| £EPA EPA INFORMATION
. SECURITY MANUAL
I
I
I
«
I
I
I
I
I
I
U.S. Environmental Protection Age
I Re;;ion 5, Library (5PL-16)
230 £. Dearborn Street, Room 167Q
Chicago, IL 60604
I
1
-------
Information Security Manual 12/15/89
PREFACE
Recently, information security has achieved a new and unfamiliar prominence. In-
formation security issues have appeared on the covers of both "Time" and "Business
Week" magazines. Congress has emphasized the importance of information secu-
rity through its passage of the Computer Security Act of 1987.
What this newfound prominence seems to highlight is that we are nowtruly in the Age
of Information. The explosion in personal computing is the latest step in creating this
information society. As we have become more dependent on our information re-
sources, so have we also become more concerned about what might happen if those
resources were lost or misused.
At the Environmental Protection Agency (EPA), the Agency information security
policy is contained in a formal policy statement. (The policy statement, issued in
1987, is reproduced here as Appendix A.) The policy statement recognizes that
information is an Agency asset and that the EPA is highly dependent on its informa-
tion resources to carry out program and administrative functions in a timely, efficient,
and accountable manner.
The policy statement formally establishes a comprehensive, Agency-wide informa-
tion security program and describes individual and organizational responsibilities
under the program. Two procedural manuals which explain to EPA managers and
staff how to comply with these responsibilities have now been developed.
This is one of the two manuals and it deals comprehensively with all types of infor-
mation assets (paper records, mainframes and minicomputers, information sys-
tems, PCs, and word processors). The other manual deals exclusively with PC
security. Because PC security affects the most employees and is a relatively new
area of security vulnerability, it is important to handle it separately so that the PC
procedures will be accessible and will not get lost in discussions of mainframe or
software development security.
Each manual begins with similar introductory sections. Information security and in-
formation sensitivity are defined in terms of the three objectives of the EPA program,
which are to maintain information availability, integrity, and confidentiality. The in-
formation security problem is then described in terms of threats to the objectives.
-------
Information Security Manual 12/15/89
Each manual is structured to allow the reader, whether manager or staff member, to
tailor it to his/her own particular security situation by completing one or two work-
sheets and by reading selected portions of the text. Specifically, each reader works
through a sensitivity evaluation table to determine if he/she has sensitive informa-
tion. If not, only minimal security controls need to be implemented. If the reader
does have sensitive information, he/she uses a worksheet to identify why the
information is sensitive and which of the three security objectives are relevant. The
reader is then referred to later sections of the manual as appropriate. For example,
there is a subsection on safeguards for maintaining the availability of critical PC ap-
plications and a subsection on safeguards for preserving the confidentiality of
confidential paper records.
Because a common problem in information security is determining exactly who is re-
sponsible for what aspects of security, each manual devotes a chapter to information
security roles and responsibilities. While the manuals are as user friendly as pos-
sible in explaining to readers howto fulfill those responsibilities, they are not painless.
To ensure that information resources are adequately protected, they describe three
different control processes. The processes establish a structure of security checks
and balances by approaching security both from an equipment perspective and from
an application or information system perspective.
-------
I
I
I
I
I
I
I
f
I
I
I
1
Information Security Manual 12/15/89
TABLE OF CONTENTS
Section Page
I 1. GENERAL INFORMATION 1-1
2. INFORMATION SECURITY ROLES AND RESPONSIBILITIES 2-1
3. MINIMAL SECURITY CONTROLS FOR MINICOMPUTER/MAINFRAME
g INSTALLATIONS, PCs, PC LANS, AND WORD PROCESSORS 3-1
m
4. DETERMINING THE NEED FOR ADDITIONAL CONTROLS 4-1
I 5. PERSONNEL SECURITY AND TRAINING 5-1
6. SECURITY FOR MINICOMPUTER AND MAINFRAME INSTALLATIONS 6-1
7. SECURITY FOR PERSONAL COMPUTERS AND PC LANs 7-1
8. SECURITY FOR WORD PROCESSORS 8-1
9. SECURITY FOR APPLICATION SYSTEM DEVELOPMENT, OPERATIONS AND
MAINTENANCE 9-1
10. SECURITY FOR PAPER RECORDS 10-1
APPENDIX A: POLICY A-1
APPENDIX B: APPLICATION RISK ANALYSIS AND
APPLICATION CERTIFICATION B-1
APPENDIX C: INSTALLATION RISK ANALYSIS C-1
APPENDIX D: DISASTER RECOVERY AND CONTINUITY
OF OPERATIONS PLANS D-1
-------
I
I
I
I
I
I
I
I
I
I
I
I
1
I
I
1
I
I
I
Information Security Manual 12/15/89
1. GENERAL INFORMATION
1.1 PURPOSE, SCOPE, AND APPLICABILITY
In accordance with the Agency's Information Security Policy, this manual estab-
lishes security procedures for safeguarding Agency information resources and
provides overall guidance to EPA managers and staff in implementing those
procedures. The security controls specified in this manual are designed to ensure
that information resources are adequately protected and that EPA organizations and
staff are in compliance with all requirements of the policy.
As used in this manual, information resource (or information asset) is a broad term.
It includes automated information systems, computerized data bases, computer
programs, collections of paper records, information on microfiche or microfilm, and
computer installations.
Consistent with the Information Security Policy, this manual applies to all EPA or-
ganizations and their employees. It also applies to the personnel of agents (including
contractors and grantees) of the EPA who are involved in designing, developing,
operating, or maintaining Agency information and information systems.
The specific purposes of this manual are as follows:
To save organizations money by ensuring that only focused, cost-
effective security safeguards (or controls) are implemented
To protect organizations and individuals from the embarrassment of an
unauthorized disclosure or from the disruption that would result if critical
information were destroyed
To help organizations meet internal control review requirements by
providing them with a sound basis for assuring that automated information
systems are adequately protected
To assist staff in developing the system documentation required by the
"EPA System Design and Development Guidance"
To enable organizations to successfully undergo any security audits that
may be conducted by the Office of the Inspector General.
1-1
-------
Information Security Manual 12/15/89
1.2 INTRODUCTION TO THE EPA INFORMATION SECURITY PROGRAM
Through the Information Security Policy, the EPA has established a comprehensive,
Agency-wide information security program to adequately safeguard the Agency's in-
formation resources. (The policy, which is Chapter 8 of the EPA's "Information
Resources Management Policy Manual," is reproduced here as Appendix A.) The
concept of adequacy means that security controls should be neither overapplied nor
underapplied. Overapplication wastes financial and ADP resources, and underap-
plication exposes the information to various security threats.
The policy categorizes information and applications (or systems) as either sensitive
or not sensitive. Sensitive information means information that requires protection
due to the loss or harm that could result from inadvertent or deliberate disclosure, al-
teration, ordestruction of the information. Examples of sensitive information include
Confidential Business Information (CBI), Privacy Act Information, and data critical to
the performance of primary Agency missions. A sensitive application is an applica-
tion that processes sensitive information or an application that requires protection
because of the loss or harm that could result from the improper operation or
deliberate manipulation of the application itself.
In short, information security involves the precautions taken to protect sensitive in-
formation resources from potential loss and misuse. The three major objectives of
the EPA program, as illustrated in Exhibit 1-1, are to maintain:
Information Availability
Information Integrity
Information Confidentiality
The availability objective is associated with information where the loss of the infor-
mation would cause serious problems, either because it would be costly to replace
the information or because it would be difficult to function without the information.
Thus, availability involves both the dollar value and the time value (or criticality) of
the information. An example of an Agency information system or application where
availability is important is the Resource Conservation and Recovery Information
System (RCRIS).
The integrity objective is associated with information or applications where accuracy
1-2
-------
I
I
i
I
i
i
I
i
I
l
i
I
i
I
i
l
l
i
i
Information Security Manual
12/15/89
EXHIBIT 1-1
INFORMATION SECURITY OBJECTIVES
Prevent
Information
Loss
AVAILABILITY
CONFIDENTIALITY
Prevent
Information
Corruption
Prevent
Information
Disclosure
1-3
-------
Information Security Manual 12/15/89
I
I
and reliability are of particular concern. In short, integrity is concerned with protecting
information from corruption. An example of an Agency information system where in- «
tegrity is important is the Integrated Financial Management System (IFMS).
m
The confidentiality objective is concerned with information where disclosure would
be undesirable or unlawful. Examples of information of this type include Toxic
Substances Control Act (TSCA) CBI or personnel files.
As Exhibit 1-1 indicates, a particular application could involve only one objective or
could involve some combination of objectives. For example, a data base could
contain information critical to a primary Agency mission and yet contain no confiden-
tial information. In other words, while the availability objective is key, confidential-
ity is not a factor and the information in the data base could be widely disseminated
without any damage resulting from disclosure. On the other hand, another data base
could be both critical and confidential.
1.3 THE INFORMATION SECURITY PROBLEM
The EPA is highly dependent on its information resources to carry out program and
administrative functions in a timely, efficient, and accountable manner. For
example, the Agency relies on its information collection authority under various
enabling statutes to fulfill its environmental missions. The willingness of the regu-
lated community and state and local agencies to supply requested information in a
cooperative and timely fashion depends on their confidence that the information will
be adequately protected.
The nature of the information security problem is illustrated in Exhibit 1-2. A wide
range of intentional or unintentional events can threaten Agency information
resources. These threats include:
External and environmental threats, such as fire, water damage, orpower
failure
Hardware and software error, such as disk or operating system failure for
automated information systems
Operations/procedural error, such as accidental modification or destruc-
tion of data
Malicious actions, such as theft or data sabotage.
1-4
-------
I
1
1
1
I
I
I
I
I
I
I
1
I
I
I
I
I
I
I
Information Security Manual
12/15/89
EXHIBIT 1-2
THE SECURITY PROBLEM
Environmental Threats
Hardware & Software Errors
Malicious Actions
it
'ersonnel t'irj1
Controls -Mr-
li'i'iVi'i'iVi'i'!'!'
:|4r| Software J44jJ
44: &Data 44y
-rVi ContrOlS rMr1
WH-
?
; ?'
\
u^i,' Equipment i£tjj
^ & Physical ff
44 Controls 44s
,:.>- '
INFORMATION
RESOURCES
Programs
Data
Equipment
S Administrative S
P Controls 53
U-o^
1-5
-------
Information Security Manual 12/15/89
How vulnerable a particular information resource is to these threats depends on two
basic factors. The first is the type or nature of information involved, that is, the
relevance of each of the three security objectives. The second factor is the environ-
ment in which the information asset is used, for example, is a PC stand-alone or part
of a network. Information security involves identifying threats and applying controls
to prevent threats from being realized. When threats are realized (for example, dis-
closure or damage/loss of information), the three security objectives are not
achieved.
1.4 STRUCTURE OF THIS MANUAL
Security manuals are typically organized by type of security and include chapters on
physical security, data security, and communications security. While such manuals
provide good technical discussions of security controls, they typically overwhelm the
reader with a hodgepodge of safeguards that leave him/her unclear about exactly
which safeguards should be implemented. In addition, these manuals provide little
overall implementation guidance.
This manual is structured in a completely different manner. It is organized to allow
each reader, whether manager or staff member, to tailor it to his/her own particular
security situation. In a very real sense, the manual allows each reader to work
through his/her security problem by completing one or two worksheets and by
reading selected portions of the text.
Following the introductory material presented in this first section, Section ? ad-
dresses individual and organizational information security responsibilities and is to
be read by all EPA managers and staff. Because it is not easy to coordinate the
diverse elements of an information security program, Section 2 recommends that
one management official, the Senior Information Resources Management Official
(SIRMO), be the focal point for information security in each major organizational unit.
Section 3 describes minimal security controls to be used regardless of the type of
information involved. Section 3 should also be read by all EPA managers and staff.
Section 4 is the last section that needs to be read by all managers and staff. Section
4 analyzes the need for additional security controls by determining whether or not the
reader has a sensitive information asset. Based on the Section 4 determination, the
1-6
-------
I
I
I
I
I
I
I
I
f
I
I
I
1
I
1
I
I
I
I
Information Security Manual 12/15/89
reader is referred to later sections of the manual as appropriate.
1.5 RELATIONSHIP TO OTHER SECURITY PROCEDURES
In this manual, the Office of Information Resources Management (OIRM) is estab-
lishing overall, Agency-wide security procedures for safeguarding EPA information
resources. Other EPA organizations have developed specialized procedures in
particular information security areas. As an important example, the National Data
Processing Division (NDPD) in Research Triangle Park issues technical policies
concerning systems (for example, Prime or VAX) supported and approved by it.
These policies are contained in the "NDPD Operational Policies Manual." In
addition, EPA organizations with statutory authority for certain types of information
(for example, the Office of Toxic Substances for TSCA CBI) issue security proce-
dures dealing exclusively with a certain type of information.
Nothing contained in this manual is intended to contradict or replace the specialized
security procedures of these other organizations. Those specialized procedures
supplement the core procedures presented in this manual. EPA organizations that
issue such procedures must ensure that they are consistent with this manual. EPA
employees must make sure they adhere to all such specialized procedures, as well
as to the procedures presented in this manual.
1-7
-------
I
I
I
I
I
1
I
I
f
i
i
i
i
i
i
i
i
i
i
Information Security Manual 12/15/89
2. INFORMATION SECURITY ROLES
AND RESPONSIBILITIES
2.1 BACKGROUND
Information security involves much more than technical hardware and software
issues. Above all, a successful information security program needs strong organ-
izational and administrative controls. Administrative/managerial factors such as top
management support and employee awareness contribute significantly to program
success. An information security program needs to involve all employees and to be
a part of the day-to-day operations of an organization.
Because of these factors, the Information Security Policy assigns information secu-
rity responsibilities to top management, to supervisors, and to employees. This
manual is intended to explain to EPA managers and staff how to comply with these
responsibilities without burdening programs and individuals. The remainder of this
section describes a suggested overall framework for implementing the Information
Security Policy.
The framework of security roles set forth in this section is not mandatory. While
programs must meet the requirements of the Information Security Policy, they may
find they are able to do so by creating somewhat different roles than those defined
here. OIRM recognizes that programs may need to modify the framework to meet
unique program needs. The framework is not meant to be inflexible and bureau-
cratic; instead, its intent is to assist programs and individuals in implementing
adequate protection of sensitive information.
2.2 INFORMATION SECURITY ROLES: AN INTRODUCTION
A common problem in information security is determining exactly who is responsible
for what aspects of security. In determining accountability for information security,
it is extremely useful to start with a framework of owner/user/custodian. Throughout
this manual, security actions are cast in terms of this framework, while oversight and
coordinating actions are the responsibility of management. The framework is
described in detail in the next subsection.
2-1
-------
Information Security Manual 12/15/89
It is important to recognize that there may not always be a one-to-one correspon-
dence between individuals and roles. In other words, at times it may be more
efficient to have several individuals share the responsibilities of a role. Again, the
framework described here is meant to be a flexible implementation tool.
2.2.1 Owners. Users, and Custodians
These three roles are defined as follows:
Application (or Information) Owner: The owner of the information is the
individual or organization who creates and sponsors it. Ownership in-
volves authority and responsibility forthe information, either in a program-
matic or administrative sense. For example, the Office of Solid Waste and
Emergency Response is the owner of RCRIS. The Office of Administra-
tion and Resources Management is the owner of IFMS. The owner
determines the sensitivity of the application (or information system),
assigns custody of the application, and decides who will be allowed to use
the application. Consulting with the custodian as appropriate, the owner
specifies and approves security controls and ensures that the application
is protected on an ongoing basis. The owner also determines backup and
availability requirements and communicates them to the custodian.
Application (or Information^ User: Users are individuals who are author-
ized by the owner to access an application or collection of information.
Custodian: Custodians possess (or have physical custody of) ADP equip-
ment or the files housing paper records. For example, for PCs and word
processors (WPs), the custodian is the individual to whom the PC or WP
is assigned, that is, the person responsible for the equipment in the
property management sense. In the minicomputeror mainframe environ-
ment, custodians are typically suppliers of information services who
possess, store, process, and transmit the information. For certain major
applications, the custodial role is shared by OIRM and the National
Computer Center (NCC). In these cases, OIRM acts as a "software
custodian," that is, OIRM acts as a custodian of the files, databases,
libraries, and programs that are stored and processed at NCC.
These roles are not always discrete; the owner can be the principal user and cus-
todian of the information. For example, an individual who develops an end-user ap-
plication for stand-alone processing on his or her own PC is at once the PC custodian,
application owner, and application user.
2.2.2 The SIRMQ as Focal Point
Because information security covers a variety of information resources and involves
2-2
-------
1
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
i
I
Information Security Manual 12/15/89
so many different employees and supervisors, it is important to have one manage-
ment official in each major organizational unit coordinate the security program for
that organization. This individual will serve as a security focal point by identifying all
owners, custodians, and users, and by disseminating security-related information
throughout the organization. While each Primary Organization Head (as defined in
the policy statement) may designate whomever he/she wishes for this coordinating
role, the SIRMO is strongly recommended for this function. The designate may
delegate portions of this security function (for example, identifying owners) to other
knowledgeable individuals in the organization, as long as the Primary Organization
Head approves and as long as the coordinating role is retained.
2.2.3 Managerial and Administrative Roles
In addition to owners, users, custodians, and SIRMOs, the implementation of the se-
curity procedures in this manual also requires the involvement of several other
individuals in eight different roles. The first six of these roles exist at present while
the remaining two are unique to the security program.
The eight roles are:
Primary Organization Head
First-line supervisors
PC Site Coordinators
Records Management Officer (paper and microform)
Systems Analyst/Application Programmer
Local Area Network (LAN) System Administrator
Certifying Official: A management official(s) appointed by the Primary Or-
ganization Head. This official certifies that the security safeguards in
place for each sensitive application are adequate.
Minicomputer/Mainframe Security Officer: An official(s) appointed by the
Primary Organization Head to be responsible for security at the organiza-
tion's own on-site computer processing installation(s). The term computer
installation covers the range of computer processing capabilities from
large scale service center support for multiple users (such as NCC) down
to smaller general purpose systems for multiple users or dedicated use
(such as Prime or VAX systems). The term does not include personal
computer installations.
2-3
-------
Information Security Manual 12/15/89
2.2.4 Tying Roles to Information Assets
It is important to recognize that not all roles apply to all types of information assets.
Clearly, the role of Minicomputer/Mainframe Security Officer does not apply to PCs
and a PC site coordinator is not relevant for paper record systems. Table 2-1 ties
roles to the various types of assets.
2.3 ASSIGNING RESPONSIBILITIES TO THE SECURITY ROLES:
IMPLEMENTING INFORMATION SECURITY
Ensuring that information resources are adequately protected involves three differ-
ent management control processes. First, basic common-sense security measures
need to be implemented for ADP equipment, regardless of whether or not it
processes sensitive information. Second, an application certification process must
be established to determine the sensitivity of each automated application and to
certify that the security safeguards for each sensitive automated application are ade-
quate. Third, an installation risk analysis process needs to be established to make
sure that the security measures in place at the installation adequately protect the
sensitive automated applications stored and processed there. Note that the second
and third processes establish a structure of security checks and balances. They
approach information security both from an installation or equipment perspective
and from an application (or information system) perspective.
Each of the three management control processes is described in more detail below.
Table 2-2 lays out the security responsibilities associated with the processes on a
role-by-role basis.
2.3.1 Minimal Controls
Section 3 describes the safeguards that need to be in place to ensure the basic
physical and environmental protection of ADP equipment and magnetic media.
Section 3 also sets forth administrative procedures governing the use of computers
and commercial software. Minimal controls for PCs and word processors are imple-
mented by custodians or users as appropriate, with oversight provided by the
cognizant PC site coordinator. Minimal controls for minicomputer/mainframe instal-
lations are implemented by the Minicomputer/Mainframe Security Officer.
2-4
-------
1
1
1
Information Security Manual
TABLE 2-1
12/15/89
TYING SECURITY ROLES TO INFORMATION ASSETS
1
1
1
1
1
1
1
I
IV
1
1
1
1
1
1
1
Information
Resource or Asset
Mini/ Paper/ Software
Mainframe Microform Development/
Installation PC WP Records Maintenance
Primary Organization Head x x
- SIRMO x x
Owner x x
PC/WP Custodian x
Mini/Mainframe x
Security Officer
User x x
Supervisor x x
PC Site Coordinators x
Certifying Officer x x
LAN Administrator x
Records Management
Officer
Application Programmer/
Systems Analyst
2-5
XX X
XX X
XX X
X X
X
XX X
XX X
X
X
X
X
-------
Information Security Manual
12/15/89
TABLE 2-2
IMPLEMENTING A MANAGEMENT CONTROL PROCESS FOR
INFORMATION SECURITY: RESPONSIBILITIES BY ROLE
Role
Primary Organization Head
SIRMO
Application (or Information System Owner)
PC/Word Processor Custodian
Minicomputer/Mainframe Security Officer
Application (or Information System) User
Supervisor
PC Site Coordinator
Certifying Officer
LAN System Administrator
Records Management Officer
Applications Programmer/Systems Analyst
Responsibilities
Implements the organization-wide security pro-
gram. Designates Certifying Officer(s). Assigns
a person the responsibility for information
security at each installation.
Coordinates the organization-wide security
program. Identifies owners, users, and
custodians.
Determines information sensitivity. Assigns cus-
tody. Initiates application certification process.
Authorizes users. Specifies and approves
security controls. Specifies backup and avail-
ability requirements. Makes sure users and
custodian adhere to security requirements.
Responsible for the security of his/her equip-
ment. Must implement minimal controls.
Performs risk analysis.
Responsible for the security of the equipment
at the installation. Implements minimal controls.
Performs risk analysis. Establishes disaster
recovery/continuity of operations plan. Assists
owner in selecting controls during system
development/operation.
Adheres to security requirements of owner.
Reviews application certification form. Ensures
employees fully comply with information
security responsibilities.
Ensures minimal controls are in place. Advises
owner on application certification process.
Certifies sensitive applications. Advises owner
on application certification process.
Coordinates the selection of security safe-
guards for networks.
Responsible for ensuring that controls are in
place for his/her "manual" record systems.
Incorporates controls into software. Coordinates
selection of safeguards with owner and
custodian.
2-6
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
2.3.2 Sensitivity Determination. Automated Application Risk Analysis, and
Automated Application Certification
The requirements of the certification process, including the completion of the Appli-
cation Certification Worksheet, are described in detail in Appendix B. Key elements
of the process are summarized below:
Each Primary Organization Head will designate one or more Certifying Of-
ficials for his/her organization.
Each application/information owner will determine the sensitivity of each
of his/her applications or collections of information. This determination will
be made in accordance with the instructions set forth in Section 4 of this
manual.
Each sensitive automated application must undergo initial certification
and then review or audit leading to re-certification every three years. The
certification or recertification process will begin with the application
owner's completion of the Application Certification Worksheet. The work-
sheet will capture basic information on application sensitivity, security
specifications, design reviews, and tests of security safeguards.
When the worksheet is complete, it will be forwarded through the owner's
immediate supervisorto the cognizant Certifying Official for approval/dis-
approval.
The worksheet will be used by the application owner to communicate the
sensitivity of the application and the required security procedures to the
users of the application.
It should be noted that in developing the worksheet, the owner performs
a qualitative risk analysis, that is, the owner assesses the relative vulnera-
bilities and threats to the application and then specifies safeguards.
2.3.3 Installation Risk Analysis Process
All Agency installations, including PCs and word processors, are required to undergo
a risk analysis. A risk analysis is a means of measuring and assessing the.relative
vulnerabilities and threats to an installation. Its purpose is to determine how security
safeguards can be effectively applied to minimize potential loss. In everyday terms,
risk analysis is a procedure for identifying what could go wrong, how likely it is that
things could go wrong, and what can be done to prevent them from going wrong.
There are two accepted methods for performing a risk analysis quantitative and
2-7
-------
Information Security Manual 12/15/89
qualitative. For all Agency installations, a qualitative risk analysis approach may
be used. Simply put, this method handles typical situations quickly and efficiently by
combining the analysis of risks with safeguard selection. It consists of the following
basic components:
Determine what information is sensitive and non-sensitive. This determi-
nation will be made in accordance with the instructions set forth in Section
4 of this manual. If the installation does not process any sensitive
information, the risk analysis is at an end and only minimal controls need
to be implemented. If the installation does process sensitive information,
categorize the sensitive information, for example, "confidential" sensitive.
For each category of sensitive information, determine the level of sensi-
tivity, for example, highly confidential.
Decide on an overall set of safeguards or security controls to use.
Tie subsets of those safeguardsto particular categories of information and
to levels of sensitivity.
Implementation of a PC or word processor installation risk analysis is the responsi-
bility of the custodian. Implementation of a minicomputer/mainframe installation risk
analysis is the responsibility of that installation's Security Officer. By working
through this manual, an informal and qualitative risk analysis will be performed. The
custodian or Security Officer need only adhere to the procedures presented in this
document and complete the Risk Analysis Worksheet described in Appendix C. No
special analytical process has to be undertaken.
Under certain circumstances, PC custodians and Security Officers may feel that
more rigorous, quantitative methods are warranted. OIRM does not wish to prohibit
quantitative analyses. Interested individuals should reviewthe last section of Appen-
dix C for more information.
2.4 STREAMLINING THE IMPLEMENTATION OF INFORMATION SECURITY
In establishing these management control processes, OIRM wants to achieve ade-
quate security throughout the Agency without unduly burdening programs and indi-
viduals. To that end, organizations may find that the following can help streamline
the management control processes discussed above:
In some organizations, one individual (or a handful of individuals) may be
knowledgeable enough about an information asset (for example, PCs and
2-8
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
1
I
I
I
Information Security Manual 12/15/89
the information contained on them) to function as a composite or aggre-
gate owner, user, and custodian for the asset. In other words, the
individual has the requisite knowledge to complete the organization's
Application Certification and Risk Analysis Worksheets, not just the work-
sheets for his/her own hardware and applications. This aggregated
approach is consistent with the owner/user/custodian framework and is an
acceptable approach to achieving compliance.
In identifying applications for sensitivity determination and certification, in-
dividuals/organizations may find that some applications are subsystems
or "children" of larger "mother" applications. Similarly, some applications
may be so related that the boundaries between them are fuzzy and that
for the purposes of this dpcument they can be thpught of as one. In
implementing the certification process, such sensitive applications may
be combined into a single sensitive application. A key test of whether or
not a sensitive application has been properly delineated is whether or not
the questions on the certification worksheet can be meaningfully an-
swered. If the responses are full of exceptions and two-part answers, the
aggregation is probably incorrect.
2.5 ORGANIZATIONAL SECURITY REPORT
To tie together the diverse elements of its information security program, each major
organizational unit (corresponding to each Primary Organization Head) will prepare
an annual security report. In establishing this reporting requirement, OIRM wants to
make sure organizations are implementing and maintaining security safeguards;
OIRM does not want to bog organizations down in atime-consuming paper exercise.
To that end, the report will be a compilation of the worksheets and documents
prepared during the day-to-day implementation of each organization's security
program.
Specifically, the report should contain the following:
A listing of all sensitive automated information systems in the organization
Copies of Application Certification Worksheets and Installation Risk
Analysis Worksheets prepared in the organization within the past year
Copies of installation disaster recovery/continuity of operations plans or
quantitative installation risk analyses prepared or updated in the last year
Copies of any local security procedures developed in the last year
A statement, signed by the SIRMO, that all employees in the organization
2-9
-------
Information Security Manual 12/15/89
have completed basic security awareness training (per Section 5.5)
Descriptions of any security concerns or weaknesses that the organiza-
tion may wish to discuss. This could include weaknesses identified as part
of audits, vulnerability assessments, or other internal control review
processes.
The security report should be sent by the end of each calendar year to the Director,
OIRM. The first report will be due at the end of 1990. The report will provide OIRM
with evidence of compliance with the security program.
2.6 SECURITY PLANS
The Computer Security Act of 1987 required the EPA to prepare security plans for
certain of its applications and computer processing installations. The purpose of the
security plan was to provide a basic overview of the security requirements of the
subject application or installation and EPA's plan for meeting those requirements.
The plan was not intended to be a detailed technical description of risks or security
mechanisms. The plans were a new reporting requirement for agencies; they were
not designed to replace such existing processes as application certification.
Completed security plans were submitted in FY 1989 to the National Institute of
Standards and Technology (NIST) (formerly the National Bureau of Standards) and
to the National Security Agency (NSA) for comment and review. Requirements for
FY 1990 and beyond have not yet been determined by NIST, NSA or the Office of
Management and Budget. Organizations will be informed of any reporting require-
ments under separate cover.
2-10
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
3. MINIMAL SECURITY CONTROLS FOR
MINICOMPUTER/MAINFRAME INSTALLATIONS,
PCs, PC LANs, AND WORD PROCESSORS
3.1 INTRODUCTION
This section applies to all individuals with security responsibilities for minicomputer/
mainframe installations, PCs, or word processors (such as PC users, PC custodians,
LAN Administrators, or Computer Installation Security Officers). This section does
not apply to individuals with security responsibilities for paper records or for applica-
tion system development. Because there are no minimal security controls associ-
ated with paper records or application system development, individuals responsible
only for these types of assets should skip to Section 4.
The purposes of this section are: (1) to describe the security measures that need
to be taken to ensure the basic physical and environmental protection of ADP
equipment and magnetic media, and (2) to set forth administrative procedures
governing the use of computers and commercial software. All measures described
in this section can be implemented at little or no cost, ensuring their overall cost-
effectiveness. The emphasis here is on common-sense measures that are justified
without a risk analysis. Section 3.2 below deals with PCs and word processors;
Section 3.3 addresses minimal controls for minicomputer/mainframe installations.
3.2 MINIMAL CONTROLS FOR PCs, PC LANS, AND WORD PROCESSORS
The responsibility for making sure these controls are in place rests with custodians
or users as indicated below. Cognizant PC site coordinators should ensure compli-
ance with these requirements through periodic, informal inspections.
3.2.1 Physical Controls
Agency physical security procedures issued by the Facilities Management and
Services Division (FMSD) state that:
"All office equipment-should be locked up when not in
use...Cables and anchor pads can be used to secure
typewriters, calculators, computer peripherals, and the
like. See SCR 1-08 for information about locking de-
vices." (Directives Volume 4850-1, SCR 1-06, page 7)
3-1
-------
Information Security Manual 12/15/89
Consistent with these procedures, the following controls for PCs and word proces-
sors are required to prevent theft and physical damage. Custodians are responsible
for ensuring that these controls are in place.
Locate equipment away from heavily traveled and easily accessible areas
to the extent possible.
When possible, install the device in a locked room, making sure the lock
is used whenever the room is unoccupied (and not just at night). If the
device cannot be installed in a locked room, a locking device such as a
locking anchor pad or hardened cables can be used. For further informa-
tion or assistance, contact the Security Management Section of FMSD.
All IBM PC/AT and most compatible microcomputers are delivered with
standard system locks which prevent the system from being operated and
prevent the cover from being removed, guarding against component theft.
Use these locks. When adding valuable expansion boards (such as
additional memory or graphics interfaces) to PCs that do not have factory-
installed locks, install a cover lock.
Place equipment and peripherals on stable and secure platforms away
from objects that could fall on them.
Portable PCs require additional security considerations because their
portability increases their vulnerability to theft. In addition to the physical
security measurers already mentioned, store all portable PCs in a locked
cabinet when not in use. For further information or assistance, contact
the Security Management Section of FMSD. Assign a person to track the
location of the portable PCs on a regular basis, log them out for use to
authorized users, and ensure the portable PCs have been returned to the
locked storage area when not in use. Moreover, any employee removing
a portable PC from an EPA building for official use must have a property
pass.
3.2.2 Environmental Controls
Custodians are responsible for ensuring that the following controls are in place:
PCs and word processors are sensitive to surges in electrical power. To
provide protection against current surges, install a surge protection
device. Good quality, multi-stage surge protectors are available for under
$100.
Do not install the device in direct sunlight or in a location with extremes of
hot and cold temperatures (less than 50 degrees Fahrenheit or greater
than 100 degrees Fahrenheit). Do not leave a portable PC in a parked
car, which would also subject it to temperature extremes.
3-2
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
1
I
I
I
Information Security Manual 12/15/89
Equipment (and media) are sensitive to contamination from dirt, smoke,
or magnetic fields. Do not eat or drink in the immediate vicinity of the
equipment and media. In accordance with the Agency's smoking policy,
do not smoke in the vicinity of the equipment. (Smoke is drawn into the
vents and through the disk units, covering the units with tar. Tar reduces
the life of the disk and the read head.)
To avoid problems from dust and possible overhead water leaks, protect
equipment with inexpensive plastic covers when not in use. Install the
equipment as far as practical from overhead water pipes or sprinkler
heads.
Control static electrical charges by placing antistatic mats under the
equipment or workstation or by using antistatic sprays. (Laundry fabric
softeners containing antistatic ingredients can be used for this purpose
and they are quite inexpensive when compared to special purpose
antistatic sprays.) Because the problem of static electricity is increased
when the air is extremely dry, it can be reduced by the use of humidifiers
if these are available.
3.2.3 Magnetic Media Controls
At present, virtually all information on microsystems is stored on magnetic media in
the following forms:
Diskettes
Fixed disks inside the computer
Cartridge tapes
Removable disk cartridges (for example, Bernoulli cartridges).
PC and word processor users need to treat the magnetic media with special care.
Flexible diskettes are especially susceptible to damage.
Keep all magnetic media away from all electrical devices and magnets to
avoid magnetic fields. This includes magnetic paperclip holders, building
passes or credit cards with magnetized strips, PC hard drive units, and
telephones. For example, if a diskette is left on a desk and a telephone
is placed over the diskette, data on the diskette may be destroyed when
the telephone rings.
Do not flex diskettes. Bending the media can damage its delicate surface
and destroy data.
Store diskettes in their jackets as soon as they are removed from the
equipment. The jackets are made of a special material that is intended to
3-3
-------
I
I
Information Security Manual 12/15/89
protect the diskette. Cartridge tapes and removable disk cartridges I
should also be stored in their original containers. m
Never touch the surface of the diskette platter.
I
Do not write on a diskette with a pencil or hard-tipped pen. Useonlyasoft-
tipped marker.
Keep diskettes in a disk file container when not in use. Dust and other par-
ticulate materials can scratch and damage the disk. _
To prevent permanent loss of data on the fixed disk drive, all files need to
be backed up and the heads need to be parked before a PC is moved.
Some portable PCs also may require that the heads be parked and/or a
disk inserted into the disk drive when transporting the portable.
3.2.4 Backups
When it comes to making backups of data and programs, it unfortunately seems that ^
experience is the best teacher. A user often needs to lose an important file before |
he/she realizes the importance of backup.
For certain types of applications (discussed later in Sections 4 and 6), routine and
systematic backups are of particular importance and this manual sets forth specific _
backup procedures. As a minimal control, however, users should be in the habit of £
regularly backing up their work. While a precise set of criteria for determining how
often to make these backups cannot be provided, how active the data file is and how
long it took to create are key factors to consider. The appropriate backup media can
vary and can include floppy disks, cartridge tapes, removable disk cartridges, or
remote hosts such as minicomputers. f
Users should note that if they are using their PC as a terminal for processing data
and programs stored at another site (such as a minicomputer, LAN file server, or
mainframe facility like the National Computer Center), that site may already be
backing up the data on a regular basis. Consult the manager of the remote facility
or the LAN System Administrator for information.
3.2.5 Software Copyrights/Licenses and Master Copies
Owners and users who purchase commercial software must follow the procedures
below. Supervisors are responsible for ensuring that their employees adhere to
these procedures.
3-4
-------
I
I
I
I
I
I
1
I
I
1
I
I
I
I
I
1
I
I
I
Information Security Manual 12/15/89
Commercial software is typically under copyright and accompanied by a
licensing agreement which specifies whether copies may be made. EPA
employees must adhere to these licensing agreements; unauthorized
duplication of software is strictly prohibited and is not condoned by the
Agency under any circumstances. A copyright means that any duplicat-
ing, selling, or other distribution of the software for other than backup use
by the lawful user(s) is a crime. Willful violations of U.S. copyright law can
result in significant penalties (civil damages of up to $50,000 in addition
to actual damages plus criminal penalties of up to one year in jail and/or
a $10,000 fine).
In general, there are two types of licenses single-machine and site. A
single-machine license allows the user to install the master copy of the
software on his/her machine only. With a site license, the software may
be installed on more than one machine, typically for a higher fee.
Software purchased by EPA must be used exclusively on PCs and word
processors owned by EPA.
Software licensing agreements should be signed upon receipt and imme-
diately filed with the vendor. A copy of the agreement containing the
registration number should be filed in a safe place. Returning the agree-
ment to the vendor will register the purchase and may result in free user
assistance, free or reduced price software upgrades, and other advan-
tages. Registration of the software will also provide the basis for getting
assistance from the manufacturer if the software is lost, stolen, or
damaged.
Existing OIRM procedures concerning master copies of software state
that each Primary Organization Head needs to establish a central reposi-
tory for the organization's master copies to ensure accountability and
control. The Washington Information Center (WIC) can be used for this
purpose if an organization executes an Operational Service Agreement
for Archiving of PC Software.
3.2.6 Unauthorized Use of Personal Computers. Word Processors, and
Associated Software
EPA PCs, word processors, and associated software are for official EPA business
only. Use of these devices is not allowed for personal business of any kind, even
if it is done on the employee's own time. Appropriation of EPA-owned software for
personal use, whether done by unauthorized copying or by actual removal of the
master software, is prohibited. Training and practice on EPA PCs and word
processors should be done using work-related examples. Employees who use this
equipment for other than official Agency business are subject to disciplinary action
ranging from a reprimand to dismissal.
3-5
-------
Information Security Manual 12/15/89
3.2.7 Non-EPA Software and Viruses
Computer viruses have received a great deal of attention in the press. While some
of the coverage is sensational, it is clear that the problem is real and that risk does
exist. The threat of viruses has made the need for regular backups (per Section
3.2.4) even greater.
In general, a computer virus is an extra program hidden within an apparently normal
program or software package referred to as the virus "host" or 'Trojan Horse". Like
a biological virus, the computer virus has two important characteristics it can
replicate itself and it can cause harm or mischief. This replicating ability means that
a virus can quickly spread via shared diskettes, networks, electronic bulletin boards,
or file servers as programs or files are stored, executed, uploaded, or downloaded.
Potentially infected host software includes operating system tools such as an editor
or file utility, data base management software, or spreadsheet macro languages.
Some viruses are relatively harmless and only flash a message on the monitor before
destroying themselves. Others are truly malicious and modify or destroy programs
and data. To detect and combat viruses, a number of specialized programs or
software 'Vaccines" have been developed. Because various computer viruses op-
erate in different ways, no single vaccine is currently effective against all of them.
Indeed, some of the vaccines have harbored viruses themselves.
Under these circumstances, it is not possible to develop a set of generic, straightfor-
ward procedures to ensure the integrity of non-EPA or public domain software.
Consequently, EPA employees should not install non-EPA or public domain soft-
ware on their computers without the express approval of their SIRMOortheSIRMO's
designate. In addition, EPA employees and contractors who use PCs or LANs
supported and approved by NDPD are also subject to virus prevention policies set
forth in the "NDPD Operational Policies Manual." Those policies include recom-
mendations related to new software, backups, and regular checks for program/file
size changes.
Readers may also wish to consultthe additional guidance presented in NIST Special
Publication 500-166, entitled "Computer Viruses and Related Threats: A Manage-
ment Guide." The publication, which was issued in August 1989, provides general
guidance for managing the threats of computer viruses and unauthorized use. It
deals with different computing configurations such as multi-user systems, personal
3-6
-------
I
I
I
Information Security Manual 1 2/1 5/89
computers, and networks. A copy is available in the EPA Headquarters Library or
through the Government Printing Office.
I
I
I
1
I
I
I
Limit the number of entrances to the installation to those needed for
effective, efficient operations.
3.3 MINIMAL CONTROLS FOR MINICOMPUTER/MAINFRAME
INSTALLATIONS
Computer Installation Security Officers are responsible for making sure the following
controls are in place.
3.3.1 Physical Controls
Locate computer installations away from heavily traveled and easily ac-
cessible areas, and away from potential sources of explosions (such as
boiler rooms, laboratories, or hot water heaters). When choosing a site,
take advantage of existing physical security.
Avoid locating installations on the ground floor, where an intruder is more
likely.
Install locks on doors and windows. Make sure the lock is used whenever
the room is unoccupied (and not just at night).
3.3.2 Environmental Controls
When possible, locate master power switches near emergency exits. The
I switch should cut all power to the computer system and should also turn
off the air conditioning system if it is not designed to filter out smoke. Make
sure these master switches are clearly labeled to avoid an accidental
power shut-down.
I
I
1
I
Computer equipment (and media) are sensitive to contamination from dirt,
1
I
Mount hand-held fire extinguishers in visible, accessible areas. Use types
that will not damage computer equipment, that is, do not use extinguishers
that emit water or powder.
Install smoke and heat detectors.
Avoid installing the computer room underneath water pipes or steam
pipes. If this is not possible, use water sensors to detect water seepage.
Store waterproof plastic in a visible, accessible location so that it can be
draped over equipment in the event of an emergency.
-------
Information Security Manual 12/15/89
dust, and smoke. Prohibit eating, drinking, and smoking in the computer
room. To cut down on dust, avoid coat racks, throw rugs, Venetian blinds,
and other furnishings that collect dust and static electricity. Vacuum
carpeted areas frequently.
Control static electrical charges by using antistatic carpeting or sprays.
Laundry fabric softeners containing antistatic ingredients can be used for
this purpose and they are quite inexpensive when compared to special
purpose antistatic sprays.
To reduce fire hazards, never store flammables in the computer room.
Keep on-site paper supplies to a minimum.
3.3.3 Configuration Management and Change Control
Because threats can be introduced through unauthorized hardware or software, only
Agency authorized hardware and software should be used. Before installation,
changes to both hardware and software need to be tested and properly authorized.
To help achieve effective configuration management, adhere to the following
procedures:
Maintain accurate records of hardware/software inventories, configura-
tions, and equipment locations.
Comply with the terms of software licensing agreements. Penalties for
violations of U.S. copyright law are set forth in Section 3.2.5 above.
Adhere to the procedures concerning non-EPA software and viruses that
are set forth in Section 3.2.7 above.
More detailed guidance concerning configuration management and change control
as they relate to the software life cycle is contained in the EPA "Operations and
Maintenance Manual."
3.3.4 Unauthorized Use of Computers and Software
EPA computers and associated software are for official EPA business only. Use of
these computers is not allowed for personal business of any kind, even if it is done
on the employee's own time. Employees who use hardware and software for other
than official Agency business are subject to disciplinary action ranging from a
reprimand to dismissal.
3-8
-------
I
I
I
I
I
1
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
4. DETERMINING THE NEED FOR
ADDITIONAL CONTROLS
The minimal controls described in Section 3 are always required regardless of
information sensitivity. The purpose of this section is to determine whether or not
additional controls are necessary.
Application/information owners use this section to evaluate the sensitivity of each
of his/her applications or collections of information. Determining sensitivity is an
owner responsibility. If sensitive applications/information are owned, later sections
of this manual need to be consulted to determine safeguards and to develop the
information required for the application certification process and the Application
Certification Worksheet (see Appendix B).
Application/information users review this section to develop a working understand-
ing of information sensitivity. Users can also use this section to determine the
sensitivity of applications or collections of information not yet evaluated by the owner
(for example, existing applications that are undergoing certification). Later sections
of this manual should then be reviewed as appropriate.
PC custodians. LAN System Administrators, and Minicomputer/Mainframe Security
Officers review this section to develop a working understanding of information
sensitivity. They then combine this understanding with owner sensitivity designa-
tions to determine the number and type of sensitive applications being processed by
users of his/her installation. This determination becomes an input to the risk analy-
sis process outlined in Appendix C.
4.1 DETERMINING SENSITIVITY AND THE TYPE OF INFORMATION
The reader should review Section 2.4 before proceeding. That section contains in-
formation on combining applications or collections of information for sensitivity
determination purposes.
The questions presented in the sensitivity evaluation table (Table 4-1) are designed
to determine whether a particular application or collection of information is sensitive.
To use the table, first read through all 11 questions presented in columns (1 )-(11) of
4-1
-------
Information Security Manual
12/15/89
TABLE 4-1
TABLE FOR SENSITIVITY EVALUATION
01
Si
I
2
o
f!
m
&:
ui
O
ll
Its
1-lfl
- i
a. £ 5 3 S
§£
sSlll
It;
I
II
'
"5 o
§1
* 2?
il
: s s=
B HI
Ul o
oi ?
§
o
4-2
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
the table.
If all questions can be answered "No" for all applications/information, the remainder
of this manual does not apply. If any question can be answered "Yes" for any
application or collection of information, continue with the instructions in the next
paragraph. (After completing the table, make sure to have it reviewed as described
in Section 4.3.)
The table has been designed to be a worksheet for evaluating sensitivity. To use the
table, list in the first column the name of each application or collection of information
for which at least one question can be answered 'Yes." For each listed application
or collection of information, answer each question. A sample entry is provided.
(Leave the last three columns (security objectives) blank for the time being; how to
use these columns is explained below.) If more than one type of sensitive information
asset is at issue (for example, three sensitive paper record systems and two sensitive
PC applications), fill out a separate worksheet for each type of asset.
4.2 DETERMINING RELEVANT SECURITY OBJECTIVES ANDTHE DEGREE
OF SENSITIVITY
The next step is to determine the degree of sensitivity and the relevance of each of
the three security objectives. Table 4-2 maps each type of information to its
corresponding objective(s) and sensitivity level (that is, high versus medium).
(Cases of little or no sensitivity are covered by the minimal controls specified in
Section 3.)
For each application or collection of information, determine the relevant security
objective(s) and sensitivity level(s) based on the type of information the application/
collection contains. Note that the time value of critical information/applications must
be evaluated to determine sensitivity level, and the approximate dollar value of high
value information/applications must be estimated to determine sensitivity level.
Most life critical and mission critical applications will probably involve high level
sensitivity.
It may be helpful to make notes about security objectives and sensitivity levels in the
last three columns of the Table 4-1 worksheet. A sample entry is provided. In
instances where an application or collection of information turns out to be at both the
4-3
-------
information Security Manual 12/15/89
TABLE 4-2
DETERMINING RELEVANT SECURITY OBJECTIVES
AND DEGREE OF SENSITIVITY
Availability Integrity Confidentiality
High Med. High Med. High Med.
Type of Information Level Level Level Level Level Level
National Security Information x
Critical to Performing a
Primary Agency Mission
-Must be Available Continu-
ously or Within 1 Day x x
-Must be Available
Within 1-5 Days x x
Life Critical
-Must be Available Continu-
ously or Within 1 Day x
-Must be Available
Within 1-5 Days x
Financial Where Misuse
Could Cause Loss x
Automated Decision-
Making Application x
Subject to the Privacy Act x
Confidential
Business Information x
Enforcement Confidential x
Budgetary Prior to
OMB Release x
High Value
-Very High Value* x
-Other High Value x
Other** xxx
*While a precise set of criteria for distinguishing between "very high value" and "other high value"
cannot be provided, the cost of replacing the information is the primary factor to consider. Clearly, an
automatedinformationsystemthatcost$3,000,000ormoretodevelopandprogramwouldbeof"very
high value."
** Reader must determine which objectives are relevant based on characteristics of information/
application.
4-4
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
high and medium sensitivity levels vis-a-vis an objective, the higher level dominates.
For example, an application that contained both National Security Information (high
level confidentiality) and Privacy Act data (medium level confidentiality) would be of
high level confidentiality.
By completing the Table 4-1 worksheet, a security profile is developed that includes
information on types of sensitive information or applications, security objectives, and
sensitivity levels. The security profile contains the basic information owners need to
complete the top of the Application Certification Worksheet. It also contains the basic
information PC custodians and Security Officers need to complete the top of the
Installation Risk Analysis Worksheet.
4.3 VALIDATING SENSITIVITY RESULTS
Determinations of sensitivity and degree of sensitivity must always be reviewed by
the cognizant supervisor. Because implementing security safeguards can involve
considerable expense and investment of staff time, management review of these
determinations is important.
Management review is also important because some of these determinations can in-
volve an element of judgment for which an organizational perspective is important.
Critical or high value information is not as easily identified as Confidential Business
Information or Privacy Act data. There may be a tendency for individuals to
overdesignatetheirapplication as critical or high value. SIRMOs should be consulted
when employees and supervisors need guidance in making a sensitivity determina-
tion.
4.4 USING THE REST OF THIS MANUAL
The next section, Section 5, discusses personnel security. This section needs to be
read by all EPA managers and staff who have sensitive applications or information.
The remainder of the manual, Sections 6-10, is organized on an information
resource-by-information resource basis, such as PCs or paper records. Within each
of these sections, procedures are presented in terms of security objective, for
4-5
-------
Information Security Manual 12/15/89
example, security procedures to maintain high-level availability. Read only those
sections and subsections that are applicable. If more than one security objective is
applicable (for example, an application where both availability and confidentiality are
relevant), make sure to read the subsection pertaining to each applicable objective.
4-6
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
5. PERSONNEL SECURITY AND TRAINING
5.1 INTRODUCTION
Given the large number of Agency information resources, security is as much a
people issue as it is a technical issue. SIRMOs need to make sure that cognizant
supervisors in their organizations adhere to the following procedures.
5.2 SCREENING AND CLEARANCE
Federal regulations require clearance of all persons involved in the design, develop-
ment, maintenance, and operation of sensitive automated systems and facilities.
These requirements apply to Federal employees and to the personnel of agents
(including contractors and grantees) of the EPA who have access to sensitive EPA
information. Determinations of the degree of sensitivity of each position are accom-
plished by the program office. The level of screening requi red should then vary from
minimal checks to full background investigations, depending upon the sensitivity of
the information to be handled by the individual in the position and the risk and mag-
nitude of loss or harm that could be caused by the individual. The responsibility for
the implementation and oversight of the personnel clearance program rests with the
Office of the Inspector General and the Personnel Management Division. EPA
organizations should consult with them when obtaining clearances or designating
sensitive positions.
5.3 SEPARATION OF DUTIES
An individual has a hardertime concealing errors and irregularities if he/she does not
control all aspects of an activity or transaction. For example, by separating the
functions of cash handling and bookkeeping, the bookkeeper cannot get to the cash
and the cash register clerk cannot adjust the books to hide cash shortages.
To the extent possible, the following 11 functions should be assigned to different
individuals:
Data Creation and Control Functions:
1. Data collection and preparation
2. Data entry
5-1
-------
Information Security Manual 12/15/89
3. Data base administration
4. Custody of data
Software Development and Maintenance Functions:
5. Applications programming
6. Design review
7. Application testing and evaluation
8. Application maintenance
Administrative Functions:
9. Security planning
10. Security implementation
11. Security audit.
Given the very definition of personal computing, it is often impractical to separate
functions for PCs. The same individual often collects data, programs the application,
enters the data, and generates the reports. Given the realities of computer-related
staffing, it is also sometimes difficult to separate functions in the minicomputer or
mainframe environment. To minimize the potential for fraud, abuse, or sabotage,
these functions should be performed by separate individuals to the maximum extent
practicable. When it is not possible to have each function performed by a different
individual, try to separate the following: (1) data creation/control functions from
software development/maintenance functions, (2) application programming and
maintenance functions from design review and testing/evaluation functions, and
(3) security audit from all other functions.
In the case of all financial applications (relating to check issuance, funds transfer, and
the like) where misuse could cause loss, separation of functions or duties is
mandatory. This separation also applies to financial applications which may be PC-
based. For example, the task of preparing payment vouchers must be kept separate
from the task of approving payments. For such financial applications, other preven-
tive measures include periodically rotating jobs and asking people to take vacations
of one to two weeks. Because the perpetrator of a fraud often has to manipulate
accounts on a daily basis to avoid detection, these measures may be a strong
deterrent.
5.4 TERMINATION/SEPARATION
In the event an employee must be removed or laid off, it is a good idea to rotate the
employee to a non-sensitive position prior to giving notice of the action. While this
5-2
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
may seem extreme, angry and demoralized employees have been known to
sabotage programs, erase data bases, or plant computer viruses.
Regardless of the type of separation (resignation, removal, etc.), supervisors need
to make sure the following actions are performed for personnel separating from a
sensitive position:
Change or cancel all passwords, codes, user IDs, and locks associated
with the separating individual
Collect all keys, badges, and similar items
Reconcile any financial accounts over which the employee had control.
The SIRMO or his/her designate should then certify thatthese procedures have been
accomplished by signing and dating a short statement that says: "Information
security procedures for separating employee (NAME) have been completed."
These statements should be kept on file for inspection by OIRM or the Office of the
Inspector General.
5.5 TRAINING
The Office of Administration and Resources Management (OARM) is coordinating
the development of a comprehensive information security training program for the
Agency to supplement the procedures in this manual. Details and requirements of
the program will be issued under separate cover. These requirements will include
mandatory basic security awareness training for every employee. The program will
include both information security awareness training for all employees and training
in accepted security practices for those employees involved in the management,
use, or operation of sensitive information. The program will identify and reference,
as appropriate, existing training in the information security area, such as training
done by NDPD.
5-3
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
6. SECURITY FOR MINICOMPUTER AND
MAINFRAME INSTALLATIONS
6.1 INTRODUCTION
This section sets forth security procedures for minicomputer and mainframe instal-
lations. Installations of this type coverthe range of computer processing capabilities
from large scale service center support for multiple users (such as the NCC) down
to smaller general purpose systems for multiple users or dedicated use (such as
Prime or VAX systems).
Minicomputer/Mainframe Security Officers are responsible for implementing the
procedures in this section. Because of the size of WIC and NCC, certain of the
procedures below apply only to the Security Officers of those two installations.
However, NCC/WIC procedures may also be appropriate for other installations,
depending on the results of the risk analyses performed for those installations. Pro-
cedures that distinguish between NCC/WIC and other installations will be clearly
identified.
The remainder of this section is organized as follows. Because the selection of
safeguards or security measures for a minicomputer/mainframe installation needs
to begin with a risk analysis, Subsection 6.2 introduces techniques for performing
this analysis. Subsection 6.3 introduces a second important technique disaster
recovery and continuity of operations planning. Subsection 6.4 specifies controls
that help achieve all three security objectives simultaneously. The last three
subsections set forth specific controls for ensuring the availability, integrity, or
confidentiality of installation information resources. If more than one objective
applies to the installation (for example, availability and confidentiality), make sure to
review the subsection for each applicable objective.
The reader must note that NDPD issues technical policies (for example, governing
passwords or backup frequency) for systems supported and approved by it.
Readers also need to refer to these policies, which are contained in the "NDPD
Operational Policies Manual". These policies are typically more hardware specific
and technically oriented than the procedures presented here. Security Officers must
also comply with NDPD policies when applicable.
6-1
-------
Information Security Manual 12/15/89
6.2 RISK ANALYSIS
As explained in Section 2, each Minicomputer/Mainframe Security Officer must
perform a risk analysis for his/her installation. For all installations, a qualitative risk
analysis may be used. Detailed procedures for performing the analysis are pre-
sented in Appendix C.
Any harm to an installation will manifest itself as a loss of information integrity, a loss
of information confidentiality, and/ora loss of processing availability. One of the key
outputs of the risk analysis process will be an understanding of the threats (fire, theft,
etc.) likely to cause harm to the installation.
In selecting control measures from Subsections 6.4-6.7, Security Officers must
always consider the reduction in risk the security measures will achieve. In other
words, do not implement the procedures in this section in a vacuum; instead
implement these procedures only in conjunction with the Appendix C risk analysis.
6.3 DISASTER RECOVERY AND CONTINUITY OF OPERATIONS PLANNING
Security Officers are responsible for preparing a plan for disaster recovery and
continuity of operations for each minicomputer/mainframe installation. Procedures
for preparing the plan are presented in Appendix D.
Such plans are particularly important for ensuring the availability of critical or high
value Agency applications. To the extent an installation limits itself to confidential or
integrity-oriented applications, contingency planning is less important. Appendix D
requires a less extensive plan for installations of this type.
6.4 PROCEDURES FOR ALL SENSITIVE INSTALLATIONS
For sensitive minicomputer/mainframe installations, there are a number of controls
that help achieve all three security objectives simultaneously. For example,
requiring the user to provide a password when logging on to a system can prevent
disclosure by denying unauthorized users access to the host computer. The
password scheme can also reduce the potential for fraud or sabotage by effectively
locking-out unauthorized users. Finally, the chance of accidental data destruction
6-2
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
(a threat to availability) is reduced if inexperienced users are unable to access the
host computer due to password protection.
Universal controls of this type fall into four broad categories: (1) hardware controls,
(2) software controls, (3) procedural controls, and (4) communications controls. All
four categories are discussed below.
6.4.1 Hardware Controls
Many important security safeguards can be built into hardware. Hardware-based
protection mechanisms are often cost-effective because they can be applied to so
many different information systems and files. By way of contrast, most application-
based controls are limited in usefulness to the one application. Hardware-based
controls are also typically more difficult to circumvent.
To determine what hardware security features are standard and what features can
be obtained at additional cost, contact the appropriate vendor representative.
From a security perspective, the following hardware features need to be imple-
mented when they are available and cost-effective:
User Isolation: This is the capability to isolate users from each other.
Alarm: An audible alarm notifies the computer operator when certain
events occur, such as an unauthorized access attempt.
Identifiable Remote Terminals: This is the capability of knowing the
identity of remote terminals. This feature augments a password scheme
which authorizes each user. With terminal identification, an intruder must
have a valid password and access to a valid terminal.
Error Detection During Processing: This feature involves checking for
errors each time memory is accessed. The error checks typically take the
form of parity and address bpunds checks. Error detection is particularly
useful for maintaining integrity.
Memory Access Control: This capability limits each user to the memory
of his/her own partition.
Privileged Command Control: With this feature, certain commands are
only executed when the computer is in a master or executive mode (as
opposed to a user mode). Commands of this type include input/output
instructions and partition transfers, and are generally available only to
operators or system programming personnel.
6-3
-------
Information Security Manual 12/15/89
6.4.2 Software Controls
The following controls need to be implemented using the operating system and other
system software (unless they have already been built into the hardware):
User programs must be prevented from executing privileged instructions.
Users must be isolated from each other.
Hardware and software error logs need to be maintained.
Error checking needs to occur each time memory is accessed.
Atypical occurrences that may indicate a security violation need to be
recorded. These include unlocking terminals via operator overrides or
access failures, such as incorrect passwords.
In addition, the operating system must control the following functions:
Information transfers between the main memory and on-line storage, and
between the central computer and remote equipment
All functions that allocate ADP resources, such as memory or peripher-
als
Utilities and programs that maintain and change the operating system.
6.4.3 Procedural Controls
Memory dumps must be limited to a user's memory partition. System
memory dumps need to be strictly controlled.
When installation size warrants it, maintain a storage location and a library
system for tape and disk storage.
- Only the media librarian or individuals authorized by the installation's
Security Officer will be allowed access to the storage location.
- All media not scheduled for use within the next day should be stored
in the library.
- Mark each item with a serial number.
- Keep a record of each item that includes its sensitivity designation,
age, frequency of usage, owner, and cleaning schedule.
Maintain console logs and operating logs.
6-4
-------
I
* Information Security Manual _ 12/15/89
I 6.4.4 Communications Controls
I Host-level password protection is required for any on-line access to the computer.
(Host-level passwords are those used when first logging on to the computer system,
for example, VAX or IBM Mainframe.) In implementing password protection, make
sure of the following:
Passwords are at least six characters in length.
The password must contain at least one alpha and one numeric character.
Passwords can be deleted or changed in a straightforward, controlled
fashion. Passwords are changed at least quarterly.
I
Consecutive password failures are limited to no more than four before a
user is revoked from the system.
Passwords are not composed of names or similar personal types of
m information.
6.5 ADDITIONAL PROCEDURES TO MAINTAIN AVAILABILITY
6.5.1 Procedures for Medium-Level Availability
I 6.5.1.1 Backups and Continuity of Operations
I In general, the most important step to be taken to protect information availability is
to implement a regular schedule of backups. If information has been backed up and
if the backup has been safely stored, the information will be recoverable no matter
I what happens. Procedures for backup, disaster recovery, and continuity of opera-
tions are contained in Appendix D.
I 6.5.1.2 Power Protection
Provide for adequate power to guard against fluctuations and failures through the
use of surge protectors. Consider implementation of an Uninterruptible Power
Supply (UPS) to avoid system failure during brief power disruptions.
6.5.1.3 Physical Access Control
INCC and WIC must maintain a physical access control that includes at least one of
the following: key cards, magnetic card locks, remote controlled locks, or closed-
circuittelevision. At night, this system must be supplemented with either an intrusion
6-5
I
-------
Information Security Manual 12/15/89
alarm or a guard patrol.
Other installations must, at a minimum, maintain a list of personnel authorized to
enterthe installation. At night, this must be supplemented with a guard control. More
rigorous access control systems are acceptable for other installations if they are
cost-effective.
6.5.1.4 Visitor Control
All visitors must log-in/log-out and be escorted during the visit.
6.5.1.5 Fire Control
WIC and NCC must install a centralized fire suppression system.
6.5.2 Procedures for High-Level Availability
Follow all procedures set forth in Subsection 6.5.1. In addition, install an emergency
power standby capability.
6.6 ADDITIONAL PROCEDURES TO PRESERVE INTEGRITY
To maintain medium level integrity, adhere to the procedures in Subsection 6.5.1
above. To maintain high level integrity, adhere to the procedures in Subsection 6.5.2
above.
6.7 ADDITIONAL PROCEDURES TO PRESERVE CONFIDENTIALITY
6.7.1 Procedures for Medium-Level Confidentiality
6.7.1.1 Control Hard-Copy Reports and Output
Control the production and distribution of confidential output. Keep such output in
a locked cabinet or room when not in use. Establish safeguards to prevent confi-
dential reports from being misrouted.
6-6
-------
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
1
Information Security Manual 1 2/1 5/89
6.7.1.2 Encryption
Some application system owners may determine that encryption is a needed security
control when transmitting confidential data. The NCC will provide encryption where
required upon request. Other installations may also provide encryption if it is cost-
effective, but they must consult with the NCC regarding potential technical and
logistical problems.
6.7.1 .3 Physical Access Control
See Subsection 6.5.1.3.
6.7.1. 4 Visitor Control
All visitors must log in/log out and be escorted during the visit.
6.7.1.5 Disposal Practices
Shred confidential reports when they are no longer needed. Make sure that
confidential data are erased from magnetic tapes before releasing them as work
tapes, etc. Assist application system owners who wish to erase confidential data
from their disk space before releasing it for other uses.
6.7.2 Procedures for Hiah-Level Confidentiality
The EPA has only one type of information in this category - National Security
Information (NSI). The amount of NSI possessed by the Agency is extremely small
and the need to computerize any of it would be very infrequent.
Because of the small quantity of NSI in the Agency and because NSI involves special
security considerations (emanations security and TEMPEST devices), NSI should
not be placed on computers without the express approval of the Director, OIRM.
6-7
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
7. SECURITY FOR PERSONAL COMPUTERS
AND PC LANs
7.1 BACKGROUND
This section applies to personal computers (PCs) only. A single PC installation is
generally comprised of a microprocessor, a video monitor and various peripheral
devices for entering, storing, transmitting and printing data. The PC installation may
process in isolation as a standalone personal tool and/or it may function as a smart
terminal in a communications configuration (such as PC to mainframe). This section
does not apply, however, to other types of microsystems such as Lexitron word
processors (see Section 8) or dumb terminals (those that are not programmable).
The expanding use of personal computers is creating major new opportunities for
productivity improvement at the EPA. At the same time, however, this expanding
use of personal computers is placing new information security responsibilities on
office managers, research personnel, and others not previously considered to be in-
formation processing professionals. This decentralized processing of Agency
information means that mainframe and minicomputer processing installations can
no longer be relied upon to protect all automated Agency operations.
Certain PC characteristics pose special problems in information security. In general,
these include the following:
Personal computer systems software is typically rudimentary and affords
little protection to information and programs.
Personal computers typically lack the built-in hardware mechanisms
needed to isolate users from each other and from certain system functions
(such as reading and writing to memory).
PC information is typically in the form of reports, spreadsheets, lists, and
memoranda. These relatively final forms mean that PC data are more
readily accessed and understood by unauthorized users than are data in
larger computer systems.
7-1
-------
Information Security Manual 12/15/89
7.2 DETERMINING THE PROCESSING ENVIRONMENT; RELATIONSHIP TO
OTHER PROCEDURES
Several of the procedural controls specified in Subsections 7.4-7.6 are presented in
terms of the environment in which the application or information is being processed.
In using those subsections, be alert to procedures that depend on three key
environmental characteristics, which can be defined by answering the following
questions:
Is the PC a single-user device or is it shared among multiple users?
Is the information/application stored on removable media (like a floppy
disk) or non-removable media (like a fixed disk) or both (like a fixed disk
with a floppy disk backup)?
Does the PC process in isolation or does it communicate with other
hardware? If it does communicate, which of the following communication
configurations applies:
- Remotely accessible by modem (dial-up capability)?
- PC to resource server?
- Local area network (LAN)?
Regarding LANs, LAN System Administrators must note that NDPD issues policies
(for example, governing access control or backup frequency) for Agency LANs.
These policies are contained in Section 310 of the "NDPD Operational Policies
Manual." These policies are typically more detailed and technically oriented than
the core procedures presented here. LAN System Administrators must make sure
that they comply with applicable NDPD policies.
7.3 USING THE REST OF THIS SECTION
The remainder of this section is organized by information security objective. Consult
completed Table 4-1 to determine which security objective or objectives are relevant.
If availability is a security objective, review Subsection 7.4
If integrity is a security objective, review Subsection 7.5
If confidentiality is a security objective, review Subsection 7.6.
7-2
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
In discussing procedural controls, Subsections 7.4-7.6 reference hardware and
software security products that are available under the PC contract. Information on
products and prices was current as of December 1989. Because the Agency peri-
odically updates contract offerings and prices, the reader should consult with his/her
PC site coordinator prior to placing an order.
7.4 MAINTAINING INFORMATION AVAILABILITY
7.4.1 Introduction
This subsection sets forth security procedures for owners, users, LAN System
Administrators, and custodians of applications of high-level and medium-level
availability (as determined in Section 4). This section is to be used as follows:
Owners develop the security specifications and the tests needed for ap-
plication certification based on the procedures presented here.
Users make surethey are in compliance with ownersecurity specifications
based on these procedures. In addition, users may consult these proce-
dures when an owner has designated an application as sensitive, but has
not yet identified his/her security specifications.
Custodians and LAN System Administrators use these procedures to
make sure that applications can be recovered in the event of a processing
disaster and can be run elsewhere if necessary. They also use these
procedures to develop the information required for the risk analysis
outlined in Appendix C.
The remainder of this subsection is organized as follows. The next part catalogs and
describes specific threats to information availability. Subsections 7.4.3 and 7.4.4
specify security measures for medium availability applications and high availability
applications, respectively. The last part describes some steps that can be taken to
recover from a processing disaster.
7.4.2 Threats to Application and Information Availability
Specific threats to data availability include:
Theft
Damage to magnetic media
Hardware failure: inability to restart
7-3
-------
Information Security Manual 12/15/89
Hardware failure: failure during use
Accidental data destruction or other operator errors
Sabotage (deliberate data destruction)
Failure of users to back-up data and programs.
The threats of theft and damage to magnetic media were addressed in Section 3.
The remaining threats are described below.
7.4.2.1 Hardware Failure: Inability to Restart
Because of the generally high reliability of microcomputers, users tend to become
overconfident and to not protect themselves from system failures.
In some cases, microcomputer systems are incapable of being restarted (booted)
because of a hardware failure.
If the inability to start the system is caused by a failure of the hard disk drive
subsystem and it is necessary to repair or replace the drive, the data on the drive will
probably be unavailable after the system has been repaired.
7.4.2.2 Hardware Failure: Failure During Use
Although microcomputers do not often break down, the hardware can fail during use
for a variety of reasons. The most common problem is adisruption or surge of electric
power, but the failure of almost any internal component can cause the system to
crash.
In addition to the problems that may be encountered if the system cannot be booted,
failure during use will result in a disruption of ongoing processing. If the system
crashes while in use, all data in the volatile, random access memory (RAM) will be
lost. In addition, if data files are open at the time of the failure, they may be corrupted.
7.4.2.3 Accidental Data Destruction
The most common way that data are accidentally destroyed is by users issuing
incorrect commands. For example, it is possible for users to destroy all of the data
on a disk by inadvertently reformatting it. This can be especially damaging if the hard
disk is reformatted. Files can also be inadvertently deleted. It is also possible to copy
a file on top of an existing file if the name of the existing file is used as the destination
7-4
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
of a copy command.
Data can also be accidentally destroyed by software malfunctions or incompatibility.
A particularly serious potential problem is caused by an incompatibility between
versions 2.x and 3.x of PC/MS DOS. Specifically, if a system containing a 20mb or
larger fixed disk formatted under version 3.x of DOS is booted from a diskette that
contains a 2.x operating system, the File Allocation Table of the hard disk will be
damaged when data are written to the hard disk. If this happens, it might not be
possible to access data stored on the hard disk.
7.4.2.4 Sabotage
Data can be deliberately destroyed by malicious individuals, who may be either
authorized or unauthorized users. Such destruction can be the result of vandalism
by those outside the office, but it can also be an act by an employee who has been
dismissed or disciplined, an act by an individual who is hostile to the mission of an
office, or an act by an individual hostile to the implementation of a new computer
system. Examples include:
An employee may oppose the implementation of performance monitoring
software.
An individual may use the data overwriting programs in PC utilities
packages to erase files or disks.
An individual may feel that the automation of the individual's duties may
make him or her more expendable.
A dismissed employee may plant a "virus" in an organization's software
prior to departure.
An individual may believe that the implementation of a system intended to
make his or her job easier will actually make his or her job more difficult.
7.4.2.5 Failure to Backup Data and Programs
When it comes to regular and systematic backup, it unfortunately seems that expe-
rience is the best teacher. A user often needs to lose an important file before he/
she realizes the importance of backup. Failure to perform regular backups is
probably the most common and the most serious threat to availability.
7.4.3 Procedures to Maintain Medium-Level Availability
This part applies to applications that can be unavailable for a period of only one-to-
7-5
-------
Information Security Manual 12/15/89
five days and/or applications that are of other high value.
7.4.3.1 Lock-up Media
To avoid theft, store media in a locked cabinet or room.
7.4.3.2 Write Protection
Whenever possible, write-protect files and programs to avoid accidental destruction.
7.4.3.3 Isolated Storage
Isolate the critical/high value application on its own storage media to the extent
possible. For an application residing on a floppy disk, this means dedicating the disk
to the one sensitive application. For an application residing on a fixed disk, this could
mean dedicating a separate subdirectory or partition to the software. Such isolation
speeds the backup process (discussed below).
7.4.3.4 Backups
In general, the most important step to be taken to protect information availability is
to implement a regular schedule of backups. Backups are performed to provide for
easy recovery from a disaster. If information has been backed up and if the backup
is safely stored, the information will be recoverable no matter what happens.
Note, however, that transactions that have occurred since the last backup may have
been lost and may need to be re-input.
DATA BACKUPS
Each PC user needs to establish a backup loop to protect his/her data and
files. The backup loop is a systematic way of creating multiple generations
of copies. The frequency and number of backup generations made and
stored should be a direct function of the value of the information and the cost
of regenerating it. In general, two to five generations are recommended. Two
examples involving diskettes are provided below.
A two-generation scheme for a floppy disk would be performed as follows:
- On the first day, the data on the original diskette would be copied on
to diskette 1.
- On the second day, the data on the original diskette would be copied
on to diskette 2.
- On the third day, the data would be copied on to diskette 1, over the
backup from the first day.
7-6
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
A five-generation scheme for a fixed disk system would be performed as
follows:
- On Monday of the first week, the user's data on the fixed disk would be
copied to a set of diskettes designated as set 1.
- On Tuesday, the data could be copied to set 2. Wednesday's backup
would be copied to set 3, Thursday's to set 4, and Friday's to set 5.
- OnMondayofthesecondweek.thedatawouldbecopiedtosetl ,over
the Monday backup from the previous week.
Under a five-generation scheme, the user has a significant level of protection.
Even if the original data and one or two of the backups were destroyed, only
one or two days of work would be lost.
The backup loop does not have to involve diskettes. As discussed below, tape
backup systems or Bernoulli boxes can be more efficient. Moreover, if the
PC is connected to a LAN file server or remote host (such as a mainframe
computer), the remote device may provide backup protection. Consult the
manager of the remote facility or the LAN System Administrator for informa-
tion.
Backup copies stored in the general vicinity of the original data protect against
problems such as a system crash or an accidental erasure of data. They do
not, however, protect against a threat such as a fire which could affect an
entire floor or building. As a result, each month a copy should be taken out
of the backup loop and stored in a physically separate location. This archival
copy would probably not be completely current in the event of a major
disaster, but it would have great data recovery utility. To prevent archival
copies from piling up, the copy that has been in archives can replace the one
taken out of the backup loop. There may also be advantages in retaining
several generations of archival copies.
For Headquarters employees, the WIC is recommended as an "off-site"
location. The WIC does charge a fee for storing backup copies. Participating
organizations execute an "Operational Service Agreement for Archiving of
PC Software" with the WIC. If the PC is connected to a remote host or file
server, it may be possible to use the remote device as the off-site location.
Consult the manager of the remote facility or the LAN System Administrator
7-7
-------
Information Security Manual 12/15/89
for assistance.
When files get large, users are tempted to employ the incremental backup
approach. An incremental backup focuses only on what has been changed
and includes only those files that have been modified since the last backup.
The advantage of an incremental backup is that it can be performed faster
than the full backups discussed above. The disadvantage of incremental
backups is that no single backup will contain all of the files and data. If the
original files are destroyed or lost, it will be necessary to reconstruct the data
from the most recent full backup and all of the incremental backups that have
been performed since. In addition to being inconvenient, this process of
reconstructing the files is risky. If the last full backup orany of the incremental
backups has anything wrong with it, it may be impossible to perform a fully
successful recovery.
Because of these difficulties, incremental backups are not recommended.
Instead, if the data files are so large that the backup process fills about 15
diskettes, consider using a streaming tape backup system or a Bernoulli box.
A streaming tape backup system is available under the PC contract for about
$500. The Bernoulli box, which is available for about $800 (10 megabyte) or
about $1200 (20 megabyte) under the PC contract, makes backups straight-
forward and quick. It also provides certain access controls, for example,
partitioning software. If the PC is also used for confidential processing, the
box becomes more cost effective. In addition, if software as well as data are
stored on Bernoulli disks and a second PC with a Bernoulli box is available,
each PC can be a backup facility for the other.
SOFTWARE BACKUPS
Backups should not be limited to data and files. End user applications (soft-
ware developed or maintained locally) should also be backed up and stored
at the off-site storage facility. Source program files, loadable versions of all
software, and required compiler or interpreter programs should be included.
7.4.3.5 Continuity of Operations
Backup computing facilities shall be identified for critical applications and an
agreement for the use of the backup facility shall be executed. The agreement for
7-8
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
the backup facility should not be an informal and vague oral agreement, but instead
must involve a memorandum between the PC custodians identifying all conditions
(for example, the amount of machine time to be made available).
7.4.4 Procedures to Maintain High-level Availability
This part applies to applications that must be available continuously or within one day
and/or applications that are of very high value. All procedures set forth in Subsection
7.4.3 also apply here. In addition, the following additional procedures will be adhered
to.
7.4.4.1 Uninterruptible Power
Obtain an Uninterruptible Power Supply (UPS) device to provide virtually complete
surge protection, a filter for line noise, and power in the event of an outage. A UPS
is available for approximately $1100 under the PC contract.
7.4.4.2 Manual Fallback
Identify and formalize manual procedures to be followed in the event of a complete
disaster.
7.4.4.3 More Frequent Backups
Consider preparing full backups for off-site storage on a weekly or even daily basis.
7.4.5 Suggestions for Recovering from a Disaster
In the event of a problem or disaster, it is often best to stop using the PC and seek
help from the PC Site Coordinator. The following may then help restore availability:
It may be possible to recover data stored on the undamaged portions of
the damaged medium using the DOS DEBUG facility or some other
hexadecimal editor. This will be a difficult task and should only be
undertaken by individuals with athorough understanding of theirsystems.
Commercially available utility packages (such as the Norton Utilities
package available under the PC contract for about $100) can help in
recovering data and in unformatting an accidentally formatted disk.
If backups have been made, data and software that are not copy-protected
can be restored from the backups. Contact the manufacturers of copy-
protected software to investigate their policy for replacing damaged
software.
7-9
-------
Information Security Manual 12/15/89
If summary data have been damaged, but detailed records or other audit
trails were undamaged, it may be possible to recreate the summary data
from the detailed records. In some cases it might even be possible to
recreate detailed records if sufficient audit trail information is available.
7.5 PRESERVING INFORMATION INTEGRITY
7.5.1 Introduction
This subsection sets forth security procedures for owners, users, LAN System
Administrators, and custodians of applications of high-level and medium-level integ-
rity (as determined in Section 4). This section is to be used as follows:
Owners develop the security specifications and the tests needed for ap-
plication certification based on the procedures presented here.
Users make sure they are in compliance with owner security specifica-
tions based on these procedures. In addition, users may consult these
procedures when an owner has designated an application as sensitive,
but has not yet identified his/her security specifications.
Custodians and LAN System Administrators use these procedures to
determine what security measures must be in place at his/her installation
to maintain integrity. They also use these procedures to develop the
information required for the risk analysis outlined in Appendix C.
The remainder of this subsection is organized as follows. The next part catalogs and
describes specific threats to information integrity. Subsections 7.5.3 and 7.5.4 then
specify security measures for applications of medium-level integrity and high-level
integrity, respectively. Finally, the last part describes some steps that can be taken
to recover from data corruption.
7.5.2 Threats to Integrity
7.5.2.1 Deliberate Distortion of Information: Fraud and Sabotage
Data integrity can be damaged by the deliberate actions of system users or other in-
dividuals with access to the system. Such damage could take the form of a virus.
These actions could be motivated by revenge (for example, by recently disciplined
or reprimanded employees) orcould be intended to perpetrate orcover up fraudulent
activities, mismanagement, or waste.
7-10
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
Fraudulent activities include embezzlement or any other deception intended to
cause the deprivation of property or some lawful right. Fraud could be intended to
prevent or influence enforcement actions or other operations of the Agency.
7.5.2.2 Accidental Damage
Accidental damage to data integrity results when individuals inadvertently and un-
knowingly modify data, erase files, input incorrect data, or introduce program bugs.
Accidental threats to data integrity overlap with the issues discussed under data
availability. The distinction is based on whether the data distortion is discovered. If
so, the distortion would be generally be considered to consist of a loss of data and
would therefore be considered to be a data availability problem. When the damage
remains undetected, decisions may be made or other actions may be taken based
upon incorrect information, resulting in a failure of data integrity.
7.5.2.3 Other Considerations
In addition to the above, information integrity can also be affected by flaws in soft-
ware applications design and development (for example, incorrect algorithms or
mathematical formulae). A review of all system design issues that are relevant to
data integrity is beyond the scope of this manual. Instead, the reader is referred to
the three volume set of "EPA System Design and Development Guidance" issued by
OIRM. This comprehensive set of standards includes references to security at
appropriate points in the software design/development process. For more explicit
guidance on designing security into applications, the reader is also referred to
Federal Information Processing Standard (FIPS) 73 and to Section 9 on application
system development. FIPS 73 is available in the EPA Headquarters library or
through the National Technical Information Service.
This section will limit itself to a consideration of threats to data integrity involving
deliberate and accidental actions of users and involving other events that can occur
during system use.
7.5.3 Procedures to Maintain Medium-Level Integrity
The security measures needed to ensure integrity represent a mix of those associ-
ated with maintaining availability and those associated with preserving confidential-
ity. Availability and confidentiality are almost opposites; backup copies of a data
7-11
-------
Information Security Manual 12/15/89
base made to enhance availability can aggravate the problem of preventing the
disclosure of data stored in the data base. In a very real sense, however, integrity
is the objective in the middle.
Integrity involves elements of the availability objective because if data are corrupted
or partially destroyed, intact backup copies are essential. On the other hand,
integrity involves elements of the confidentiality objective because preventing fraud
and sabotage are largely problems of controlling access.
7.5.3.1 Availability-Related Procedures
Adhere to the procedures described in Subsection 7.4.3, with the exception of those
associated with continuity of operations. This will ensure that backups are created.
7.5.3.2 Confidentiality-Related Procedures
Adhere to the access control procedures described in Subsections 7.6.3.2 and
7.6.3.3. Also, follow the password management practices outlined in Subsection
7.6.3.1. In addition, for PCs in a local area network (LAN), adhere to the procedures
outlined in the following two paragraphs.
In a LAN, all points can read traffic on the network. In addition, all points have access
to common storage media. Indeed, the ability to share printers or storage (file
servers) is often a primary reason why networks are created.
The LAN System Administrator is responsible for coordinating the selection of
security safeguards for the network to ensure overall effectiveness. LANs some-
times have security packages available as part of their operating systems. These
may be considered in selecting safeguards for the network. If all network users have
access to all information processed on the network, establish a formal list of those
authorized users (an administrative control). To the extent possible, bolster this
administrative control by keeping each PC on the network under lock and key when
not in use. Require users to provide a password when logging on to the network.
7.5.3.3 Audit Trails and User Accountability Tracking
If fraud and sabotage are threats, audit trails and operator tracking should be incor-
porated into the application software. The software should be designed to automati-
cally insert the operator identifiers into each record based upon a password supplied
during the system sign-on process. Data integrity and user accountability would be
7-12
-------
I
I
I
I
I
I
I
I
Identify and formalize manual procedures to be followed in the event of a complete
I
I
|
I
I
I
Information Security Manual 12/15/89
further enhanced if the application software and data base were compiled and
encrypted to prevent the password and accountability tracking mechanism from
being bypassed.
7.5.4 Procedures to Maintain High-level Integrity
All procedures set forth in Subsection 7.5.3 above also apply here. In addition, the
procedures listed below will be followed.
7.5.4.1 Uninterruptible Power
Obtain an Uninterruptible Power Supply (UPS) device to provide virtually complete
surge protection, a filter for line noise, and power in the event of an outage. A UPS
is available for about $1100 under the PC contract.
7.5.4.2 Manual Fallback
disaster.
7.5.4.3 More Frequent Backups
Consider preparing backups for off-site storage on a weekly or even daily basis.
7.5.5 Suggestions for Recovering from a Disaster
I In the event of a problem or disaster, it is often best to stop using the machine and
seek help from the PC Site Coordinator. The following may then help restore
integrity:
It may be possible to recover data stored on the undamaged portions of
I the damaged medium using the DOS DEBUG facility or some other
hexadecimal editor. This will be a difficult task and should only be
undertaken by individuals with athorough understanding of their systems.
Commercially available utility packages (such as the Norton Utilities
package available under the PC contract for about $100) can help in
recovering data and in unformatting an accidentally formatted disk.
If backups have been made, data and software that is not copy-protected
can be restored from the backups. Contact the manufacturers of copy-
protected software to investigate their policy for replacing damaged
software.
7-13
-------
Information Security Manual 12/15/89
If summary data have been damaged, but detailed records or other audit
trails were undamaged, it may be possible to recreate the summary data
from the detailed records. In some cases it might even be possible to
recreate detailed records if sufficient audit trail information is available.
7.6 PRESERVING INFORMATION CONFIDENTIALITY
7.6.1 Introduction
This subsection sets forth security procedures for owners, users, LAN System
Administrators, and custodians of confidential applications and information. This
section is to be used as follows:
Owners develop the security specifications and the tests needed for ap-
plication certification based on the procedures presented here.
Users make sure they are in compliance with owner security specifica-
tions based on these procedures. In addition, users may consult these
procedures when an owner has designated an application as sensitive,
but has not yet identified his/her security specifications.
Custodians use these procedures to determine what security measures
must be in place to protect the confidential information being stored and
processed by users of his/her installation. They also use these proce-
dures to develop the information required for the risk analysis outlined in
Appendix C.
LAN System Administrators must note (per Section 7.6.3.3) that no
confidential data may be loaded on to a LAN or made available via a LAN
unless specifically approved in writing by the Director, OIRM.
The remainder of this subsection is organized as follows. The next part catalogs and
describes specific threats to confidentiality. Subsections 7.6.3 and 7.6.4 specify
security measures for applications of medium level confidentiality and high level con-
fidentiality, respectively. Features of the processing environment are particularly
important for preserving confidentiality and are discussed in those subsections as
appropriate.
Unlike Subsections 7.4 and 7.5, there is no separate discussion here of steps to
recoverfrom a breach of confidentiality. Once information has been disclosed, there
is little the individual can do to remedy the situation. Instead, the breach must be
reported to appropriate Agency officials, as described in the Information Security
Policy.
7-14
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
7.6.2 Threats to Application and Information Confidentiality
Specific threats to information confidentiality are largely problems of access control.
Note that the threats described below apply to confidential information in its various
forms, that is, in the computer, in hard copy, on removable media like diskettes, and
on printer ribbons.
Magnetic media containing confidential data can be accessed by individu-
als from whom the data should be restricted. If the computer is not in a
secure area, intruders can start the system containing the information and
browse information on the fixed disk. If diskettes containing confidential
information are not secured, unauthorized individuals can install them on
a computer and browse their contents.
Unauthorized individuals could see data on a computer screen or printout
if confidential data are processed in an unsecured area or if printouts are
not protected in storage.
Confidential data can be deciphered from printer ribbons used to print
confidential reports.
Unauthorized individuals could access confidential data across a local
area network or other communications device if confidential data are
stored or processed on a microcomputer that can be accessed remotely.
Files erased from a magnetic disk using only the standard DOS "DEL" or
"ERASE" commands are not actually erased from the computer disk
they are only marked for deletion and the space on which they are written
is freed for use by later files. For this reason, until they have been
overwritten, they can be "unerased" using commercially available utility
programs.
Some software systems use work files that are temporarily stored on disk.
Although the systems usually delete these files when they are finished
with them, the deleted files may be recoverable using commercially
available utility programs. Similarly, information could be left in the volatile
(RAM) memory of the computer if the computer is not turned off after
confidential data have been processed.
Individuals authorized to access confidential information could deliber-
ately share printed reports or magnetic media containing confidential data
with unauthorized individuals.
7.6.3 Procedures to Preserve Medium-Level Confidentiality
Preserving confidentiality involves controlling access to information and applica-
tions. How easy or difficult it is to control access is highly dependent on the three
7-15
-------
Information Security Manual 12/15/89
key environmental characteristics (single user versus shared, stand-alone versus
communicating, removable versus non-removable media). The simplest situation
consists of asingle user who does stand-alone processing and stores all confidential
information on floppy disks. When the PC is shared or in a communicating
configuration, the security situation becomes more complicated.
The procedures which follow are presented largely in terms of processing environ-
ment. Following a short subsection on controls which apply to all environments,
more complicated environments are discussed. The security controls required fall
into the following categories:
Physical, such as door locks
Administrative, such as lists which specify who is allowed access to a
given PC
Svstem-based. such as password protection
Information-based, that is, rendering information unusable (even if it is
obtained by unauthorized individuals) through scrambling or encryption
techniques. As an example, some commercial software (for example,
Lotus 1 -2-3 Version 2) contain data encryption capabilities. The Lotus 1 -
2-3 data encryption capability enables users to password-protect their
Lotus spreadsheets. The encrypted spreadsheets cannot be accessed
without the assigned password and data in them are encoded to prevent
the data files from being read through DOS functions or other utilities.
It should be noted that EPA organizations with statutory authority for certain types
of confidential information may issue security procedures dealing exclusively with a
particular type of information (for example, TSCA or FIFRA CBI). Because of
statutory requirements, some of those procedures may be more stringent than those
required here. EPA employees must make sure that they also adhere to such
organizational standards and procedures.
7.6.3.1 Procedures for all Environments
Discourage traffic in the area where the computer is located when in use.
Unauthorized individuals should be kept out of the area so that they cannot
view data that might appear on the computer screen.
Log off or otherwise inactivate the PC whenever leaving it.
Store hard-copy reports and removable media containing confidential
data in locked cabinets or rooms.
Printer ribbons used to print confidential data should be considered
confidential as well. Destroy exhausted ribbons so that they cannot be
7-16
-------
I
I
I
I
1
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
deciphered by an unauthorized individual.
Be careful when disposing of disks, diskettes, or tapes that contain
confidential data. Before these media are thrown away or recycled, they
must be degaussed, overwritten, or shredded. (Degaussing erases data
through demagnetization.) The WIPEDISK program in the Norton Utilities
package (available underthe PC contract for about $100) destroys all data
on a disk by overwriting them.
When erasing individual files on diskettes or fixed disks, use an overwrit-
ing program like WIPEFILE in the Norton Utilities package. These over-
writing programs are effective; be careful not to erase needed files.
It should be noted that programs designed to purge and overwrite individ-
ual files (like WIPEFILE) may only overwrite the most recent generation
of a file. This would also destroy previous generations of the file if they
were physically located in the same disk addresses as the last generation
of the file. If the previous generations were located elsewhere on the disk,
or if the last generation file is smaller than the previous generations, the
previous generations may not be entirely overwritten by the file destruc-
tion utility. Recovery of these undestroyed fragments, however, would be
extremely difficult and tedious for even the most knowledgeable intruder,
and it is unlikely that more than small fragments of the sensitive informa-
tion could be recovered.)
If passwords are selected as a control measure (based on the procedural
guidance below), make sure passwords are selected and handled as
follows:
- Passwords are at least six characters long
- Passwords contain at least one alpha and one numeric character
- Passwords are not composed of names or similar personal types of
information
- Passwords are not shared
- Passwords are changed at least quarterly
- Passwords are not written out and left where an unauthorized person
could find them
- Passwords are not incorporated into automated log-on procedures in
batch files or application programs (for example, Crosstalk) and they
are not defined under function keys.
Passwords can either be incorporated into applications systems or imple-
mented through add-on circuit boards. While application-based pass-
word schemes may prevent casual intruders, they usually do not thwart
7-17
-------
I
Information Security Manual 12/15/89 '
the knowledgeable intruder unless special steps are taken (for example,
encryption). Knowledgeable intruders may be able to avoid the pass- |
words altogether or may scan application listings to determine the
password. For this reason, the more sophisticated hardware-based
password schemes are recommended. Cylock, available under the PC
contract for about $300, is hardware based.
7.6.3.2 Procedures for Stand-Alone Processing I
This part applies to PCs that process in isolation and do not communicate with any
other equipment. I
CONFIDENTIAL DATA ON REMOVABLE MEDIA ONLY; SINGLE OR -
SHARED USER PC I
Clear the system of confidential information after each confidential process-
ing session. Power off the unit to clear any volatile memory, that is, random I
access memory (RAM).
CONFIDENTIAL DATA ON NON-REMOVABLE MEDIA; SINGLE OR I
SHARED USER PC
Keep the computer under lock and key when not in use, that is, keep it in a |
locked cabinet or a locked room.
If all users of a shared PC have access to all information processed on the PC, '
establish a formal list of those authorized users (an administrative control). ^
Limit access to those on this authorized list. If this is not the case, users must |
be protected from each other via either a password scheme or encryption.
Encryption software (Datasafe) is available under the PC contract for under
$100.
7.6.3.3 Procedures for Communicating PCs
This part applies to PCs that are connected to other equipment such as auto-answer
modems, other PCs, or resource servers.
AUTOANSWER MODEM; SINGLE USER OR SHARED
PCs are sometimes used as host systems. An autoanswer modem allows a
person to use the system remotely. Keep the computer under lock and key
when not in use, that is, keep it in a locked room or a locked cabinet.
7-18
-------
I
I
I
Information Security Manual 12/15/89
I Use a password scheme that requires both a traditional user identifier and a
password logon process. Under no circumstances should users share
passwords.
1 TERMINAL EMULATION
I At times, a PC is used as a terminal device to a large host system. In this
situation, security controls are the responsibility of the host system. The host
should control access and the extent to which data are sent (uploaded) or
received (downloaded).
{The PC user needs to make sure he/she adheres to all host-imposed security
requirements. In addition, the PC must never store host telephone numbers,
logon sequences, or passwords in the PC itself.
LOCAL AREA NETWORKS; SINGLE USER OR SHARED PC
No confidential data may be loaded on to a local area network (LAN) or made
* available via a LAN unless specifically approved in writing by the Director,
OIRM.
7.6.4 Procedures to Preserve High-Level Confidentiality
The EPA has only one type of information in this category - National Security
I Information (NSI). The amount of NSI possessed by the Agency is extremely small
and the need to computerize any of it would be very infrequent.
I Because of the small quantity of NSI in the Agency and because NSI involves special
security considerations (emanations security and TEMPEST devices), NSI should
* not be placed on PCs without the express approval of the Director, OIRM.
I
I
I
I 7-19
I
-------
I
I
I
I
I
I
I
I
I If the above conditions are not met, the Telex or PC is covered by the Section 7
procedures. (The Telex is a programmable, IBM-compatible microcomputer,
I
I
i
i
Information Security Manual 12/15/89
8. SECURITY FOR WORD PROCESSORS
8.1 INTRODUCTION
This section applies to users of equipment designed primarily for word processing,
such as the remaining Lexitrons still in use. Such equipment has little or no
programming capability. Under certain circumstances, this section applies to the
newer Telex devices (which have been replacing Lexitrons) and to PCs. This section
can be used for a Telex or PC if all of the following conditions are met:
The Telex or PC is used exclusively for word processing
The Telex or PC does not communicate with other computers
Confidential documents are never stored on non-removable media like a
fixed disk
making Section 7 applicable when the conditions above are not met.)
In terms of security threats and safeguards, word processors have much in common
with PCs. Both are office automation microsystems used by large numbers of EPA
employees. In essence, the procedures presented here are a simpler, quicker-to-
use version of the PC procedures set forth in Section 7.
The remainder of this section is organized as follows. The next subsection identifies
and describes specific threats to information security. Subsections 8.3 and 8.4
specify security measures for maintaining availability and preserving information
integrity, respectively. The last subsection specifies security measures for preserv-
Iing information confidentiality. If more than one security objective applies to the word
processor (for example, availability and confidentiality), make sure to review the
subsection for each applicable objective.
I
8.2 THREATS TO SECURITY
8.2.1 Threats to Information Availability
m Specific threats to information availability include:
Hardware Failure: In some cases, word processors are incapable of
I
I
-------
I
Information Security Manual _ 1 2/1 5/89
being restarted because of hardware failure. In addition, sometimes the
hardware fails during use for a variety of reasons. The most common
problem isadisruptionorsurge of electrical power, butthe failure of almost
any internal component can cause the system to crash.
Accidental Data Destruction: The most common way that information is
accidentally destroyed is by users issuing incorrect commands. For
example, documents can be inadvertently deleted.
Sabotage: Information can be deliberately destroyed by malicious
individuals. Such destruction can be the result of random vandalism, but
it can also be an act by an employee who has been dismissed or
disciplined, or an act by an individual who is hostile to the mission of the
office.
Two additional threats to availabilitytheft and damage to mediawere discussed
in Section 3.
8.2.2 Threats to Information Integrity
Specific threats to information integrity include:
Deliberate Distortion of Information - Fraud and Sabotage: Data integ-
rity can be damaged by the deliberate actions of system users or other
individuals with access to the systems. These actions could be motivated
by revenge (for example, by recently disciplined or reprimanded employ-
ees) or could be intended to perpetrate or cover up fraudulent activities,
mismanagement, or waste.
Accidental Damage: This occurs when individuals unknowingly modify
information or erase pages and documents.
Accidental threats to information integrity overlap with the issues discussed under
availability. The distinction is based on whether the distortion is discovered. If so,
the distortion would be generally be considered to consist of a loss of information and
would therefore be considered to be a availability problem. When the damage
remains undetected, decisions may be made or other actions may be taken based
upon incorrect information, resulting in a failure of integrity.
8.2.3 Threats to Information Confidentiality
Specific threats to information confidentiality are largely problems of access control.
Note that the threats described below apply to confidential information in its various
forms, that is, in hard copy, on removable media like diskettes, and on printer ribbons.
8-2
-------
I
I
I
I
I
I
I
I
I
i
I
I
i
i
i
i
i
i
i
Information Security Manual 12/15/89
Magnetic media containing confidential information can be accessed by
individuals from whom the information should be restricted. If diskettes
containing confidential information are not secured, unauthorized indi-
viduals can install them on a microsystem and browse their contents.
Unauthorized individuals could see information on a screen or printout if
confidential data are processed in an unsecured area or if printouts are not
protected in storage.
Confidential information can be deciphered from printer ribbons used to
print confidential reports.
Individuals authorized to access confidential information could deliber-
ately share printed reports or magnetic media containing confidential data
with unauthorized individuals.
8.3 PROCEDURES TO MAINTAIN AVAILABILITY
8.3.1 Lock-up Media
To avoid theft, store media in a locked cabinet or room.
8.3.2 Write Protection
Whenever possible, write-protect files to avoid accidental destruction.
8.3.3 Isolated Storage
Isolate the critical/high value information on its own storage media. This means
dedicating the diskette to the one sensitive document or collection of information.
8.3.4 Backups
In general, the most important step to be taken to protect information availability is
to make copies of the information. Backups are performed to provide for easy
recovery from a disaster. If information has been backed up and if the backup is
safely stored, the information will be recoverableno matter what happens. Note,
however, that information or documents that have been created since the last
backup may have been lost and may need to be re-input.
Two backup copies should be made of information or documents of medium-level
availability. One of the copies should be a hard copy (paper) version for storage in
8-3
-------
Information Security Manual 12/15/89
8.4.1 Availability-Related Procedures
8-4
I
I
the office files. The second copy should be on magnetic media and should be kept
in a location other than the original (for example, in the offices of another branch or "
division).
Two backup copies should also be made of information or documents of high-level
availability. The paper copy should be stored as above. The copy on magnetic ft
media, however, should be kept in a physically separate, off-site location.
8.4 PROCEDURES TO PRESERVE INTEGRITY "
The security measures needed to ensure integrity represent a mix of those associ- J
ated with maintaining availability and those associated with preserving confidential-
ity. Availability and confidentiality are almost opposites; backup copies of informa-
tion made to enhance availability can aggravate the problem of preventing the
disclosure of the information. In a very real sense, however, integrity is the objective _
in the middle. |
Integrity involves elements of the availability objective because if information is 0
corrupted or partially destroyed, intact backup copies are essential. On the other "
hand, integrity involves elements of the confientiality objective because preventing
fraud and sabotage are largely problems of controlling access.
I
Adhere to all procedures described in Section 8.3. This will ensure that backups are
created.
8.4.2 Confidentiality-Related Procedures
Adhere to the access control procedures described in Section 8.5.
8.5 PROCEDURES TO PRESERVE CONFIDENTIALITY *
8.5.1 Procedures for Medium-Level Confidentiality I
EPA organizations with statutory authority for certain types of confidential informa-
tion may issue security procedures dealing exclusively with a particular type of I
I
I
-------
I
I
Information Security Manual 12/15/89
I information (for example, TSCA or FIFRA CBI). Because of statutory requirements,
some of those procedures may be more stringent than those required here. EPA
I employees must make sure that they also adhere to such organizational standards
and procedures.
ft 8.5.1.1 Discourage Traffic
Discourage traffic in the area where the word processor is located when in use.
I Unauthorized individuals should be kept out of the area so that they cannot view data
that might appear on the screen.
ft 8.5.1.2 Printer Ribbons
Printer ribbons used to print confidential documents should be considered confiden-
j tial as well. Destroy exhausted ribbons so that they cannot be deciphered by an
" unauthorized individual.
8.5.1.3 Disposal
Be careful when disposing of diskettes or paper containing confidential information.
Before the paper is thrown away, it must be shredded or burned. Diskettes must
either be degaussed or placed in burn bags. (Degaussing erases information
through demagnetization.)
* 8.5.1.4 Lock-Up Media
J Lock-up diskettes and paper copies when not in use in a locked cabinet or a locked
I
I
room.
| 8.5.1.5 Clear System
I Clear the system of confidential information after each confidential processing ses-
sion. Power-off the unitto clear any volatile memory, that is, random access memory
(RAM).
8.5.2 Procedures for Hiah-Level Confidentiality
The EPA has only one type of information in this category - National Security
Information. Procedures for handling and storing this information are contained in
I the "National Security Information Handbook" issued by OARM. The Handbook also
contains procedures governing self-inspection.
8-5
-------
I
I
1
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
9. SECURITY FOR APPLICATION SYSTEM
DEVELOPMENT, OPERATIONS AND
MAINTENANCE
9.1 INTRODUCTION
The determination of application security requirements and appropriate controls
requires three-way communication among the owner, application programmer/
system analyst, and processing installation. Once the owner has determined and
communicated the system's sensitivity and security objectives, the owner needs to
work with the installation and the application programmer/system analyst to develop
the appropriate, cost-effective mix of installation and software-based controls. Once
the system has become operational, the installation maintains the installation-
oriented controls and the owner authorizes users and makes sure the users and the
installation adhere to the security requirements.
Security issues and concerns must be an essential part of the entire software
lifecycle (from development to operation to modification). If they are not, the owner
runs the risk the application will be underprotectedoroverprotected. Overprotection
wastes resources and underprotection requiresthat security safeguards be imposed
after the fact. Retrofitting security measures on adeveloped piece of software is both
complex and expensive.
This section sets forth security procedures for the application system development
and operation process. While this section emphasizes the importance of installation
involvement in developing a cost-effective mix of system controls, this section deals
with security primarily from an application, ratherthan installation, perspective. The
focus here is on application systems and the responsibilities of ownership. The
responsibilities of installations and custodians are set forth in Sections 6 and 7. This
section is to be used as follows:
Application Programmers/System Analysts use these procedures to de-
termine what security measures must be in place to protect the availability,
confidentiality, and integrity of sensitive Agency applications.
Owners develop the security specifications and the tests needed for ap-
plication certification based on the procedures presented here and based
on dialogue with the application developers and processing installation.
9-1
-------
1
Information Security Manual 12/15/89
Owners then make sure the operational application is protected on an j|
ongoing basis using the procedures presented here.
The remainder of this section is organized as follows. The next subsection catalogs
and describes the basic application development controls that can be used to
achieve the three security objectives. Subsection 9.3 introduces the concept of the
software lifecycle and explains how to address, build in, and maintain security
controls at the various life cycle stages.
The overall structure and content of this section is based in large part on Federal I
Information Processing Standards Publication (FIPS PUB) 73, entitled "Guidelines
for Security of Computer Applications." FIPS PUB 73 is extremely helpful and
application developers may wish to consult it for more detailed information on
selected topics. A copy is available in the EPA Headquarters library or through the m
National Technical Information Service. To a lesser extent, this section is also based |
on the "Management Guide to the Protection of information Resources" issued by
the National Institute of Standards and Technology. II
9.2 BASIC DEVELOPMENT CONTROLS
I
This subsection introduces six basic development controls to be used to meet these-
curity objectives of availability, integrity, and confidentiality. The six controls, which
are explained in detail below, are as follows:
Data Validation J
User Identity Verification
Authorization
Journalling or Logging g
Variance Detection *
Encryption
Table 9-1 shows the security objective (or objectives) addressed by each of these
basic controls. Note that most controls preserve confidentiality and integrity rather
than maintain availability. This is because continued availability is often achieved
through administrative/procedural safeguards such as backup routines and contin- g
gency planning. m
9-2
I
I
-------
I
I
1
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual
Control
Data Validtion
User Identity
Verification
Authorization
Journalling/
Logging
Variance
Detection
Encryption
TABLE 9-1
BASIC CONTROLS AND THE
OBJECTIVES THEY ADDRESS
Objectives
Availability
X
X
X
9-3
Integrity
X
X
X
X
12/15/89
Confidentiality
X
X
X
X
X
-------
1
Information Security Manual 12/15/89 '
It should be noted that some of these controls may be partially implemented by the
operating system, the hardware, or the management of the processing installation.
Such joint implementation results because the boundaries between the application
and operating systems or between hardware and software are sometimes fuzzy. J
9.2.1 Data Validation
User identity verification involves establishing a means to control access to the
application by requiring each individual to prove who he/she is. The basic access
Data validation involves checking data to make sure they are accurate, complete, _
and consistent. This checking or examination should occur both during entry and |
during processing. In addition, input data elements should be compared with one
another to ensure consistency and reasonableness. ft
Techniques for validating data during entry include: ^
Examining fields for various characteristics, including proper format, *
values within certain bounds, and check digits.
Maintaining control totals, record/transaction counts and batch number I
checks for groups of records or transactions.
Techniques for validating data during processing include: |
Incorporating dummy records into a data base and doing test transactions *
against these records during normal processing of the application to
evaluate processing accuracy. *
Tracing specially marked transactions through the processing cycle to de-
termine if processing was correct. I
Sampling methods where certain data are selected for close exami nation m
to determine their validity. jj
Techniques for ensuring consistency and reasonableness include: *
Comparing one field against another for a certain relationship, for ex-
ample, one field with a value less than half of another field.
Evaluating the current record against the previous record. *
9.2.2 User Identity Verification I
I
9-4 I
I
-------
I
I
I
I
I
I
I
1
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
control methods include: (1) passwords, (2) objects like magnetic cards or keys,
and (3) personal characteristics such as signatures or voiceprints.
User identification based on personal characteristics like signature is prohibitively
expensive. For most on-line applications, the most practical technique is a password
scheme.
There are two predominant types of passwords: (1) Host-level passwords, and (2)
information access passwords. Host-level passwords are those used when first
logging-on to the computer system, for example, VAX, Prime, or IBM mainframe. A
host-level password verifies the identity of the user before the user is allowed to do
anything on the system.
An information access or "second level" password is used to protect individual files
or data sets resident on the computer system. Information access passwords are
entered when the logged-on user requests access to a password-protected file or
data set. Information access passwords can be either unique like host-level
passwords or shared by multiple users needing access to common data. Unique
information access passwords require access control software apart from the host-
level log-on process.
Host-level passwords are administered by the processing installation, as described
in Section 6. NDPD (which operates NCC and WIC and supports other sites) does
not advocate the use of information access passwords. Instead, the NCC makes
Resource Access Control Facility (RACF) available to application owners. RACF
bases information access on user identification; Prime and VAX have similar
schemes based upon access control lists (ACL).
Any contemplated use of information access passwords at an NDPD managed or
supported facility must be discussed with the Security Officer for that facility. If
information access passwords are selected as a control measure, make sure of the
following:
Passwords of at least six characters in length can be accepted
Passwords must contain at least one alpha and one numeric character
Passwords can be deleted or changed in a straightforward, but controlled
fashion.
9-5
-------
I
Information Security Manual 12/15/89
9.2.3 Authorization
For automated applications, some users may only be authorized to perform certain
functions or to use certain data files. If there are many users of a sophisticated Jj
application that has many data files, confidentiality and integrity will be preserved if
users are only allowed access to needed functions and files. A basic authorization
scheme can be enforced if the application has different interfaces for different "
purposes, for example, for data entry or for report generation.
While the security literature describes many different types of authorization schemes,
they all have three essential features. They control: (1) who will have access, (2)
what modes of access they will have, and (3) which objects or resources they will be
allowed to access. The "who" component includes both users and terminals. Modes
of access usually include read-only access, read/write access, and the like. Objects
or resources typically include:
Data objects like files, record types, and libraries I
Executable objects like commands or programs
Devices like printers or various storage media such as tapes or disks. m
9.2.4 Journalling or Logging
9-6
I
I
Any authorization scheme that is selected should have two basic properties. First,
it should operate under the principle of least privilege where users should be limited
to only what they need to do. Second, the scheme should be flexible enough to allow
for changes in authorization in a straightforward, yet controlled way.
I
Journalling or logging involves recording particular events as they occur during data
entry or processing. Journalling provides an audit trail for tracking down errors or I
security violations. Journalling provides a basis for establishing accountability, that
is, a basis for holding individuals responsible for their activities. It also may aid in
recovering from a processing mishap or disaster.
I
While it is possible to journal every event and transaction, this is typically impractical I
and not cost-effective. In selecting what to log, owners and system developers
should focus on the type of information and security objectives involved. Clearly a g
financial system that disburses funds must keep track of who makes each credit and |
I
I
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
debit transaction, exactly when each transaction was made, and similar events. In
an application where integrity is not as crucial, associating each transaction with a
user is probably unnecessary.
Any journalling activity typically falls into one or more of the following categories:
Logging the nature of the event (for example, system usage like log-ons,
input/output like opening a file, or updates like file changes).
Logging the identity of those associated with the event, including users,
devices, or files.
Logging characteristics of the event such as time, date, or number of data
entry errors.
9.2.5 Variance Detection
As the term implies, variance detection is concerned with identifying departures from
the norm that are deemed to be of significance. Variance detection may either
augment an authorization scheme or be used instead of authorization when
authorization is impractical.
Variance detection can be accomplished through:
Review and analysis of the results of the journalling or logging process
External methods such as audits or surprise visits
Dynamic monitoring, which involves real-time detection of certain trigger
events. For example, an application designed to electronically transmit
funds only at certain times could be programmed to warn the console
operator if transfer is attempted at some othertime. As asecond example,
a system can automatically count the number of attempts made to gain
access through password guesses before it ends the log-in session.
9.2.6 Encryption
' Encryption involves scrambling or encoding information so that it is of no use even
if it is obtained by unauthorized individuals. Encryption is the primary means of
protecting data during communication. The decision whether or not to encrypt data
during communication would depend on the communication configuration. If confi-
dential data are being transmitted over a dedicated line, encryption may be unnec-
essary unless line tapping is a serious threat. If the data are traveling over a network
9-7
-------
Information Security Manual 12/15/89
where many unauthorized users could potentially intercept the information, encryp-
tion may be effective.
Information stored off-line in tapes or other media may also be encrypted to prevent
it from being read if it is stolen. In most instances, however, physical security
measures (such as keeping the media under lock and key) are easier to implement
and are adequate.
The encryption of on-line data files will be cumbersome unless the operating system
and hardware have certain supporting capabilities. In most instances, a password
protection scheme should probably be sufficient. In instances where it is deemed
necessary to supplement the passwords with encryption, choose a processing
location like the NCC where the supporting hardware and operating system features
are already in place.
9.3 CONTROLS AND THE SOFTWARE LIFECYCLE
9.3.1 The Software Lifecycle
The only way to ensure that the kind of controls described in Section 9.2 are correctly
implemented is to make them an explicit part of the software development process.
The three-volume "EPA System Design and Development Guidance" issued by
OIRM describes the software design and development process at EPA and includes
general references to security at appropriate points. The "Operations and Mainte-
nance Manual," also issued by OIRM, completes the guidance for managing the
software lifecycle by addressing the day-to-day performance of system operations
and maintenance activities. It also includes general references to security at appro-
priate points. The purpose of this section is to describe more specifically how to
incorporate security controls into the lifecycle.
The "EPA System Design and Development Guidance" and the "Operations and
Maintenance Manual" define four basic lifecycle phases:
Phase 1: Mission Need Analysis
Phase 2: Preliminary Design and Option Analysis
Phase 3: System Design, Development, and Implementation, including
system testing and evaluation
9-8
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
Phase 4: Operations and Maintenance
At a minimum, application development and operation need to include security
specifications, security design reviews, system tests of security controls, and
ongoing system monitoring to ensure controls are implemented. Table 9-2 presents
the relationship between these requirements, the EPA lifecycle, and the participants
or roles associated with the lifecycle.
The process begins with the owner's determination of sensitivity and relevant
security objectives. The next step is to develop control requirements based on
Section 9.2. Determining a cost-effective mix of adequate controls depends on the
owner understanding why the application is sensitive (that is, relevant security
objectives and degree of sensitivity) and the types of controls the processing
installation can provide to address that sensitivity.
If the availability objective is relevantto the application, the owner needstodetermine
backup and availability requirements and communicate them to the installation. The
owner then needs to make sure the installation can satisfy any special requirements,
such as more frequent backup than is typical or the need for continuous availability
(that is, downtime of more than just a few hours would be unacceptable).
As the development process proceeds, the owner creates the security information
needed for the Application Certification Worksheet. Please see Appendix B.
The development process ends with the application being placed into use or produc-
tion. This is a formal milestone that clearly separates the developmental version of
the system from the operational version. At this point, key security responsibilities
transfer to the installation; the required installation controls are specified in Section
6. Once the system is ready to use, the owner needs to make decisions about who
can access the system and what kind of access they will have (for example, read-
only access). The responsibilities of ownership do not end at this point, however. On
a continuing basis, the owner needs to make sure the application is protected and
that the users and installation adhere to security requirements.
In the middle of the development process, the focus is on security design and test! ng.
These activities are the subject of Subsection 9.3.2 below.
9-9
-------
Information Security Manual
12/15/89
TABLE 9-2
SECURITY AND THE SOFTWARE LIFECYCLE
Lifecycle
Phase
Security
Activity
Role/
Participant
Mission Need Analysis Identification of Security
Needs and Considerations
Preliminary Design
and Options Analysis
System Design,
Development, and
Implementation
Operations and
Maintenance
Determine Security
Requirements and
Specifications
Design Controls; Conduct
Design Review; Test and
Review Security Controls;
Determine Backup and
Availability Requirements
Maintain/Alter Security
Controls as needed;
Authorize Users; Monitor
Users/Installation for
Compliance with Security
Requirements
Owner
Owner with
Application Programmer/
System Analyst and Mini/
Mainframe Computer
Security Officer
Application
Programmer/System
Analyst with Owner
Conducting Reviews;
Owner Determines Back-
up and Availability Needs
Owner with Applic-
ation Programmer
as needed and Mini/
Mainframe Computer
Security Officer
Implementing Installation-
Based Controls
9-10
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
9.3.2 Implementing Controls: Building Security into the Development Phase
9.3.2.1 Designing for Security
This is the stage when decisions about how to implement the basic development
controls must be made. Security considerations should be an integral part of the
overall design effort because security opportunities missed now will be difficult to
recapture later. In designing the necessary basic controls, adhere to the following
overall procedures:
Restrict user interfaces to the functions and files users need to access.
Unnecessary flexibility greatly complicates security. Limit the number of
unsuccessful attempts to access an application or file. It should be noted
that certain processing facilities have made access control features
readily available. For example, Resource Access Control Facility (RACF)
is available on the NCC IBM mainframe and on the logical mainframes.
RACF can be used to protect data sets from unauthorized users or from
deletion. The NCC and other installations also limit the number of
consecutive password failures before a user is blocked from the system.
See the "NDPD Operational Policies Manual" for more information.
Design user interfaces that are easy to understand. This reduces user
errors and the potential for data corruption. Specific engineering tasks can
include intelligible system and error messages and on-line help functions.
If the application will be used continuously and has significant storage re-
quirements, consider dedicating a micro or minicomputer to the applica-
tion. The choice of hardware environment involves many other factors,
including needed physical security, access controls, and logging/auditing
capability. Dedicated hardware, such as a micro or minicomputer, can
make it easier to protect software and data. In many circumstances a
mainframe environment may be more appropriate. This is why three-way
communication among the owner, application developer, and installation
is important.
Isolate the code that is critical to security. If possible, create separate mod-
ules for the security controls, which facilitates both protection and audit.
Consider using automated controls to protect these modules. These
include: (1) checksums on the object code to detect unauthorized
changes, (2) hardware protection states or domains to protect code, and
(3) placin g critical code in a fixed area of memory so that read-only
memory can be used.
Design the system so that it is auditable, that is, so that it is relatively easy
to confirm that the system is functioning as it was intended to function.
Systems that are not designed for auditability are harder to test and
evaluate.
If availability is important, design the system so that recovery from minor
9-11
-------
1
Information Security Manual 12/15/89
problems or major disruptions is facilitated. For example, if a computer I
at another site has been designated as a backup, make sure the system
is readily transportable to the alternative environment.
9.3.2.2 Programming for Security
I
Programming practices can have three impacts on security. First, errors in program-
ming security controls (such as journalling or logging) can limit or cancel the effec-
tiveness of the control. Second, programming errors in the non-security-related fc
portions of the code can greatly affect data reliability and accuracy. Finally, £
unauthorized additions or changes to the code by programmers can result in fraud
or abuse.
During the programming stage, adhere to the following practices:
Have each section of the code peer-reviewed as it is completed. The |
review should focus on the efficiency, maintainability, and correctness of
the code.
Have the program library:
- Limit access to program modules to authorized individuals
- Record all accesses to program modules
- Store previous versions of a module so that comparisons with the
present version can be made.
Document all security-related portions or modules of code. Security-
related code is code that implements basic controls, code that accesses
sensitive data, or code that processes sensitive data. Once the documen-
tation is developed, it also needs to be protected so that the integrity or
confidentiality of the system are not compromised.
9.3.2.3 Testing and Evaluating Software
The last thing the application developer needs to do is to test the software to make
sure it meets the security requirements. Effective testing begins with the develop-
ment of a test plan, which describes what will be tested with what methods. For
effective security testing, particular emphasis should be placed on how the applica-
tion handles unusual, unlikely, and illegal events.
The test plan should include both static evaluation and dynamic evaluation. For
9-12
-------
I
I
I
I
I
1
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
static evaluation, the following techniques are recommended:
Code review by an independent party
Source code analyzers to provide details about selected characteristics of
the source program
Penetration analysis to determine whether a determined individual could
bypass controls.
Dynamic evaluation is concerned with testing the operation of portions of the
program with dummy data and comparing the results with the expected results. To
aid in the evaluation process, the following techniques are recommended:
Program analyzers to collect operating data about the executing program,
for example, the number of times a particular data file is accessed
Comparative analysis, which involves testing the new system for known
flaws in similar existing systems.
If disclosing confidential information is a security concern, care should be taken
when granting individuals testing the software access to "live" data from the
operational environment.
9.3.3 Operating and Maintaining Controls
Security considerations do not cease once the application becomes operational.
Even the best conceived and developed controls need to be managed on a
continuing basis. In operating and maintaining security safeguards, adhere to the
following procedures:
As the system becomes operational, the owner needs to make decisions
about who can access the system and what kind of access they will have
(for example, read-only access). The responsibilities of ownership do not
end at this point, however. On an ongoing basis, the owner needs to make
sure that the application is protected and that users and the installation
adhere to security requirements. At a very minimum, the application must
be re-certified every three years (see Appendix B).
Mechanisms for ensuring ongoing compliance can vary from system to
system. If, for example, journalling/logging or variance detection are
important controls, the owner can request that the installation produce
standard reports. If frequent backup is essential, the owner can simulate
a disaster by requesting that certain files be restored within a specified
time period. Or, the owner may structure an internal control review or
related study as part of the Agency's internal control review process to
9-13
-------
Information Security Manual 12/15/89
gauge user and installation compliance with security requirements.
In monitoring compliance, it is not expected that the owner will have a
detailed technical understanding of how all his/her security controls work
(for example, how an encryption algorithm operates or how variance
detection code operates), but ratherthat he/she will take the steps needed
to be confident that the system is adequately protected.
Maintenance programmers are subjecttothe same procedures as system
development programmers for programming, testing, and evaluating
software (see Section 9.3.2). In addition, if disclosing confidential infor-
mation is a security concern, care should be taken when granting main-
tenance programmers access to "live" confidential systems for problem
identification or testing purposes.
9-14
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
10. SECURITY FOR PAPER
AND MICROFORM RECORDS
10.1 INTRODUCTION
The purpose of this section is to describe the security measures that need to be taken
to ensure adequate protection of collections of paper and microform (that is,
microfiche and microfilm) records. The focus here is not on normal desk or office
files, but rather on significant quantities of records that constitute manual information
systems.
This section is to be used as follows:
Owners develop the security requirements for the information collection
based on the procedures presented here.
Records Management Officers assign responsibility for the physical
custody of the records and make sure that custodians are properly
implementing these procedures.
Custodians are responsible for making sure the necessary security
controls are in place.
The remainder of this section is organized as follows. The next subsection explains
the relationship between this section and other Agency security procedures, for
example, the "TSCA CBI Manual." Subsection 10.3 catalogs and describes specific
threats to the security of manual information systems. The last three subsections
set forth security measures for ensuring the availability, integrity, and confidential-
ity of record systems. If more than one objective applies to the record system (for
example, availability and confidentiality), make sure to review the subsection for
each applicable objective.
10.2 RELATIONSHIP TO OTHER PROCEDURES
Over the years, the EPA has developed several sets of procedures governing
specific types of sensitive information. The great majority of these existing proce-
dures deal with some type of confidential information, especially CBI. These
procedures are typically issued by EPA organizations with statutory authority forthe
information (for example, the Office of Pesticides and Toxic Substances for TSCA
10-1
-------
Information Security Manual 12/15/89
or FIFRA CBI). EPA employees must make sure they adhere to all of these
organizational standards and procedures, as well as to the procedures presented
here.
The scope and nature of these other, type-of-information procedures is as follows:
The Office of Administration and Resources Management has issued
procedures governing National Security Information (in the "National
Security Information Handbook") and Privacy Act data. The NSI hand-
book also contains self-inspection procedures for organizations dealing
with National Security Information.
The Office of Pesticides and Toxic Substances has developed manuals
governing both TSCA and FIFRA CBI.
The Office of Solid Waste and Emergency Response has issued proce-
dures concerning RCRA CBI.
The Office of Enforcement and Compliance Monitoring has established
enforcement docket security procedures for handling and disposing of
docket reports.
Within the Office of Air and Radiation, the Office of Mobile Sources has
procedures for the handling of proprietary data received from auto
manufacturers and the Office of Air Quality Planning and Standards
(Emission Standards and Engineering Division) has procedures for safe-
guarding the CBI it receives.
The Office of the Inspector General Manual contains sections dealing with
confidential information obtained during the course of investigations and
audits.
The Office of Water has developed procedures related to trade secret data
obtained under Section 308 of the Clean Water Act.
Most of these procedures contain special instructions and handling requirements.
To make sure they are in compliance, EPA employees must review these other
procedures when appropriate.
10.3 THREATS TO MANUAL INFORMATION SYSTEMS
10.3.1 Threats to Availability
Specific threats to record availability include:
Theft: Paper and microform records are small, light, and easily moved.
10-2
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 1 2/1 5/89
Accidental Destruction of Records: A record may be accidentally de-
stroyed or lost through an act of nature (such as a flood or fire) or through
human error (such as inadvertently throwing it away).
Deliberate Destruction of Records: Records can be deliberately de-
stroyed by malicious individuals. Such destruction can be the result of
random vandalism, but it can also be an act by an employee who has been
dismissed, disciplined, or is hostile to the mission of the office.
10.3.2 Threats to Integrity
Specific threats to record integrity include:
Accidental Damage: This occurs when individuals inadvertently and
unknowingly change records. While this is a common threat to automated
information systems, it is less prevalent for manual systems. It would
occur, for example, if a system of records became jumbled. If the
disorganization went undetected, decisions could be made based on
information that seemed complete, but was not because crucial informa-
tion had been misfiled elsewhere.
Deliberate Distortion of Records Through Fraud and Sabotage: The
integrity of records can be damaged by the deliberate actions of individu-
als with access to the records. These actions could be motivated by
revenge (for example, by recently disciplined or reprimanded employees)
or could be intended to perpetrate or cover up fraudulent activities,
mismanagement, or waste.
10.3.3 Threats to Confidentiality
Threats to confidentiality are largely problems of access control. Specific threats to
record confidentiality include:
Unauthorized Disclosure: If rooms or cabinets housing confidential rec-
ords are not secure, unauthorized individuals can open them and review
the records. Unauthorized disclosure can also occur if authorized individu-
als deliberately share confidential records with unauthorized individuals.
Typewriter and Printer Ribbons: Confidential information can be deci-
phered from typewriter and printer ribbons that have been used to produce
confidential reports.
10-3
-------
Information Security Manual 12/15/89
10.4 PROCEDURES TO MAINTAIN AVAILABILITY
10.4.1 Procedures for Medium-Level Availability
10.4.1.1 Environmental Controls
To avoid water damage, do not store the records directly beneath sprinkler heads or
water pipes. Do not locate the records near boiler rooms or water heaters.
10.4.1.2 Access Control List
The information owner must establish for the custodian a list of individuals who are
allowed access to the records. On a quarterly basis, the owner should review the list
to update it with employee additions or deletions.
10.4.1.3 Document Control and Tracking
To prevent the loss of records, establish a document control and tracking system.
This system may be automated or manual. In either the case, the system must
include:
A unique identifier, the Document Control Number (DCN), for each
document in the collection of records.
A cradle-to-grave tracking capability which follows a record from the time
it is received or written until it is destroyed or transferred elsewhere. For
a manual system, the worksheets shown as Exhibits 10-1 and 10-2 can
be used. Exhibit 10-1 is an inventory of all records in the collection. Exhibit
10-2 is a sign-out log indicating who has which records. Automated
tracking systems should capture the same information shown in the
exhibits, that is:
- Date record created or received
- DCN
- Dates record checked out and returned
- Identity of who has a checked out record
- The disposition of a record, that is, transfer or destruction
10.4.1.4 Backup Copy
Maintain a second copy of the records at an off-site storage location. In the event
of a major disaster that destroys the original set of records, this second set will prove
invaluable. The backup copy maybe in several different forms, including microfiche,
10-4
-------
I
I Information Security Manual 12/15/89
- EXHIBIT 10-1
" INVENTORY
1
Date No. of Document
Received DCN Pages Originator Disposition
I
I
I
I
I
I
I
I
I
I
I
I
I
I
10-5
-------
Information Security Manual 12/15/89
EXHIBIT 10-2
SIGN-OUT LOG
Date User Information Date
Checked Out DCN User Name EPA ID Number Checked In
10-6
-------
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
paper, or word processing diskettes.
10.4.2 Procedures for High-Level Availability
This part applies to all record collections that must be available continuously or within
one day and/or collections that are of very high value. All procedures set forth in
Subsection 10.4.1 also apply here. In addition, the procedures described below will
be followed.
10.4.2.1 Fire Protection
Store the records in a fireproof file cabinet.
10.4.2.2 More Accessible Backup Copy
For critical collections, make sure the second copy that is being stored at an off-site
location can be retrieved within a few hours. Storage locations that require one to
two days notice to retrieve records are of limited usefulness.
10.5 PROCEDURES TO MAINTAIN INTEGRITY
The security measures needed to ensure integrity represent a mix of those
associated with maintaining availability and those associated with preserving
confidentiality. As was noted earlier, copies of records made to enhance availability
can aggravate the problem of preventing the disclosure of information stored in the
record collection. In a very real sense, integrity is the objective in the middle.
Integrity involves elements of the availability objective because if information is
altered or partially destroyed, an intact backup copy is essential. On the other hand,
integrity involves elements of the confidentiality objective because preventing fraud
and sabotage are largely problems of controlling access.
10.5.1 Procedures for Medium-Level Integrity
10.5.1.1 Availability-Related Procedures
Adhere to all procedures described in Section 10.4.1.
10.5.1.2 Confidentiality-Related Procedures
Make sure the records are kept in a locked cabinet or a locked room. Use the lock
10-7
-------
Information Security Manual 12/15/89
wheneverthe records are not in use, not just at night. If the lock is a combination lock,
change the combination at least annually or whenever there is a change in who is
allowed access to the records.
10.5.2 Procedures for High-level Integrity
All procedures set forth in Section 10.5.1 above also apply here. In addition, store
the records in a fireproof cabinet or container.
10.6 PROCEDURES TO PRESERVE CONFIDENTIALITY
Preserving confidentiality involves controlling access to information and records.
Access controls for manual information systems are of two types: (1) physical, such
as door locks, and (2) administrative, such as lists which specify who is allowed
access to the records.
10.6.1 Procedures for Medium-Level Confidentiality
10.6.1.1 Access Control List
The information owner must establish for the custodian a list of individuals who are
allowed access to the records. On a monthly basis, the owner should review the list
to update it with any additions or deletions.
10.6.1.2 Document Control and Tracking
To maintain accountability and to further control access, establish a document
control and tracking system. This system may be automated or manual. Develop
and maintain the system in accordance with the procedures described in Section
10.4.1.3.
10.6.1.3 Lock Up Records
Make sure the records are kept in a locked cabinet or a locked room. Use the lock
wheneverthe records are not in use, not just at night. Ifthelockisacombinationlock,
change the combination at least annually or whenever there is a change in who is
allowed access to the records.
10.6.1.4 Photocopies
A lack of photocopying controls can defeat strong access controls in other areas. It
10-8
-------
1
1
1
w
1
1
1
1
1
1
1
1
1
1
1
1
Information Security Manual
does little good to lock everything up and log each document in
using the document is allowed to make copies at will.
12/15/89
and out if the person
Only the owner or custodian should be allowed to make photocopies. Photocopying
by all others should be prohibited. All photocopies must be entered into the
document control and tracking system under their own DCNs.
10.6.1.5 Disposal
All confidential paper documents must be shredded or burned
away. Place discarded microfiche or microfilm into burn bags
1 0.6.1 .6 Typewriter and Printer Ribbons
before being thrown
for proper disposal.
Ribbons used to produce confidential documents should be considered confidential
as well. Place exhausted ribbons in burn bags so that they cannot be deciphered by
an unauthorized individual.
1 0.6.2 Procedures for Hiah-Level Confidentiality
The EPA has only one type of information in this category
- National Security
Information (NSI). Procedures for handling and storing NSI are contained in the "NSI
Handbook" issued by OARM.
10-9
-------
I
I
I
1
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
APPENDIX A
INFORMATION SECURITY *
1. PURPOSE. This document establishes a comprehensive, Agency-wide
security program to safeguard Agency information resources. This document sets
forth the Agency's information security policy for both manual and automated
systems and assigns individual and organizational responsibilities for implementing
and administering the program.
2. SCOPE AND APPLICABILITY. This document applies to all EPA organiza-
tions and their employees. It also applies to the facilities and personnel of agents
(including contractors and grantees) of the EPA who are involved in designing,
developing, operating or maintaining Agency information and information systems.
3. BACKGROUND
a. Information is an Agency asset, just as property, funds and personnel are
Agency assets. The EPA is highly dependent upon its information re-
sources to carry out program and administrative functions in a timely,
efficient and accountable manner.
b. The EPA relies on its information collection authority under various
enabling statutes to fulfill effectively its environmental missions. The
willingness of the regulated community and State and local agencies to
supply requested information in a cooperative and timely fashion depends
on their confidence that the information will be adequately protected.
c. The Agency's information resources are exposed to potential loss and
misuse from a variety of accidental and deliberate causes. This potential
loss and misuse can take the form of destruction, disclosure, alteration,
delay or undesired manipulation. Moreover, the Agency can be subject to
acute embarrassment and litigation if certain business or personal infor-
mation is inadvertently or maliciously disclosed.
d. As a result, it is essential that an overall program be established to
preserve and adequately protect the Agency's information resources. At
the same time, it is equally essential that the program not unnecessarily
restrict information sharing with other Federal agencies, universities, the
Source: EPA Information Resources Management Policy Manual,
Chapter 8.
A-1
-------
Information Security Manual 12/15/89
public and State and local environmental authorities. Such information
sharing has historically pjayed a vital role in the overall fulfillment of the
Agency environmental mission.
e. The management, control and responsibility for information resources
within EPA are decentralized. Consequently, the management and re-
sponsibility for information security are also decentralized. An important
example of this is the expanding use of personal computers, networking,
distributed data bases and telecommunications. These trends place new
responsibilities on office managers, research personnel and others not
previously considered information processing professionals. The "com-
puter center" cannot be relied upon to protect Agency operations. Controls
must be implemented and maintained where they are most effective.
f. In determining responsibilities for information security, it is useful to define
a framework of owner/custodian/user. Owners are those who create or
maintain information. Custodians are typically suppliers of information
services who possess, store, process and transmit the information. These
roles are often not discrete; the owner is often the principal custodian and
user of the information.
4. AUTHORITIES
a. OMB Circular A-130, Management of Federal Information Resources.
5. POLICY. It is EPA policy to protect adequately sensitive information and
sensitive applications, maintained in any medium (e.g., paper, computerized data
bases, etc.), from improper use, alteration or disclosure, whether accidental or
deliberate. Information and applications will be protected to the extent required by
applicable law and regulation in accordance with the degree of their sensitivity in
order to ensure the cost-effectiveness of the security program.
a. Information security measures will be applied judiciously to ensure that
automated systems operate effectively and accurately and to ensure the
continuity of operation of automated information systems and facilities
that support critical agency functions.
b. As required by OMB Circular No. A-130, all automated installations will
undergo a periodic risk analysis to ensure that appropriate, cost-effective
safeguards are in place. This risk analysis will be conducted on new
installations, on existing installations undergoing significant change and
on existing installations at least every five years.
c. Appropriate administrative, physical, and technical safeguards shall be
incorporated into all new ADP application systems (including PC-based
applications) and major modifications to existing systems.
A-2
-------
I
I
I
I
I
I
I
I
I
I
Information Security Manual 12/15/89
d. As required by OMB A-130, all new applications will undergo a control
review leading to formal certification. Existing sensitive applications will
be recertified every three years.
e. Access to sensitive personnel information and employment applications
will be limited to appropriate personnel in accordance with procedures
established by the Office of Personnel Management and monitored by the
EPA Office of the Inspector General.
f. Appropriate ADP security requirements will be incorporated into specifi-
cations for the acquisition of ADP related services and products.
g. An information security awareness and training program will be estab-
lished so that all Agency and contractor personnel are aware of their
information security responsibilities.
h. Information security must be a major factor in evaluating the use of
microcomputers. Microcomputer systems software is typically rudimen-
tary and affords little or no protection to information and programs.
Consequently, networked microcomputers, the ability to download data
from larger, protected computers onto microcomputers and microcom-
puter data processing, generally present problems in information security
(for example, problems of access controlorcontroloverthe dissemination
of information). All EPA employees and managers must be aware of the
information security implications of storing and processing sensitive infor-
mation on microcomputers, whether networked or stand-alone.
Ii. Therefore, it is EPA policy to discourage the use of microcomputers for
storing or processing sensitive information, unless cognizant EPA em-
ployees and managers have made sure that adequate information secu-
rity measures are in use. If adequate information security cannot be
maintained, an alternative system configuration must be used.
j. Information security violations will be promptly reported to appropriate
tm officials, including the Inspector General.
6. RESPONSIBILITIES
I
I
I
I
I
I
a. The Office of Information Resources Management is responsible for:
(1) Developing and issuing an information security policy in accordance
with all applicable Federal laws, regulations, and executive orders.
(2) Ensuring that all Agency organizational units are in compliance with
the information security program.
(3) Establishing training criteria and coordinating the development of an
information security training and awareness program.
A-3
-------
Information Security Manual 12/15/89
(4) Providing guidance on selecting and implementing safeguards.
(5) Participating as it deems appropriate, in management and internal
control reviews conducted by the Office of the Comptroller to ensure
compliance with the information security program.
b. Each "Primary Organization Head" (defined by EPA Order 1000.24 as the
Deputy Administrator, Assistant Administrators, Regional Administrators,
the Inspector General and the General Counsel) is responsible for:
(1) Ensuring that sensitive information and applications within the organi-
zation are adequately protected.
(2) Establishing an organization-wide program for information security
consistent with organizational mission and Agency policy, including
assigning responsibility for the security of each installation to a
management official(s) knowledgeable in information technology and
security.
(3) Assure annually the Assistant Administrator for Administration and
Resources Management that organizational information resources
are adequately protected. This will be done as part of the internal
control review process required under OMB Circular No. A-123
(revised) and implemented under EPA Order 1000.24.
(4) Making sure that all automated installations within the organization
undergo a periodic "risk analysis" to ensure that appropriate, cost-
effective safeguards are in place.
(5) Ensuring the continuity of operations of automated information sys-
tems and facilities that support critical functions.
(6) Making sure that appropriate safeguards are incorporated into all new
organizational application systems and major modifications to existing
systems, that all new organizational applications undergo an informa-
tion security review leading to formal certification and that existing
sensitive applications are recertified every three years.
(7) Making sure that Federal employees and contractor personnel under-
stand their security responsibilities and that organizational security
regulations are properly distributed.
(8) Making sure that all organizational procurements of ADP equipment,
software and services incorporate adequate security provisions.
c. The Director, Facilities Management and Services Division, is responsible
for:
(1) Establishing and implementing physical security standards, guide-
lines and procedures in accordance with EPA information security
policy.
A-4
-------
I
* Information Security Manual 12/15/89
1(2) Establishing and implementing standards and procedures for National
Security Information in accordance with EPA informa^n security
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
I
policy and all applicable Federal laws, regulations and executive
orders.
d. The Procurement and Contracts Management Division and the Grants
Administration Division are responsible for:
(1) Ensuring that Agency grant and contract policies, solicitations and
award documents contain provisions concerning the information
security responsibilities of contractors and grantees that have been
promulgated by OIRM.
(2) Establishing procedures to ensure that contractors and grantees are
in compliance with their information security responsibilities. Project
Officers are responsible for ensuring contractor compliance with
security requirements on individual contracts. Violations shall be re-
ported to the contracting officer, Inspector General and appropriate
OIRM official. Specific violations involving National Security Informa-
tion shall be reported to the Director, FMSD and the Contracting
Officer.
e. The Office of the Inspector General is responsible for:
(1) Establishing and implementing personnel security standards, guide-
lines and procedures in accordance with EPA information security
policy and all applicable Federal laws and regulations.
(2) Conducting or arranging investigations of known or suspected person-
nel security violations as it deems appropriate.
f. The Office of the Comptroller is responsible for:
(1) Allowing OIRM to review written internal control reports so that OIRM
is aware of the status of information security weaknesses.
g. Each EPA Manager and Supervisor is responsible for:
(1) Making sure their employees are knowledgeable of their information
security responsibilities.
(2) Ensuring that their employees adhere to the organizational informa-
tion security program established by the applicable Primary Organiza-
tion Head.
h. Each EPA Employee, Contractor and Grantee is responsible for:
(1) Complying fully with his/her information security responsibilities.
(2) Limiting his/her access only to information and systems he/she is
authorized to see and use.
A-5
-------
Information Security Manual 12/15/89
(3) Adhering to all Agency and organizational information security poli-
cies, standards and procedures.
(4) Reporting information security violations to appropriate officials.
Violations involving National security Information shall also be re-
ported to the Director, FMSD.
7. DEFINITIONS.
a. "Applications Security" means the set of controls that makes an informa-
tion system perform in an accurate and reliable manner, only those
functions it was designed to perform. The set of controls includes the fol-
lowing: programming, access, source document, input data, processing
storage, output and audit trail.
b. "Confidential Business Information" includes trade secrets, proprietary,
commercial/financial information, and other information that is afforded
protection from disclosure under certain circumstances as described in
statutes administered by the Agency. Business information is entitled to
confidential treatment if: (1) business asserts a confidentiality claim, (2)
business shows it has taken its own measures to protect the information,
(3) the information is not publicly available or (4) disclosure is not required
by statute and the disclosure would either cause competitive harm or
impair the Agency's ability to obtain necessary information in the future.
c. "Information" means any communication or reception of knowledge such
as facts, data or opinions, including numerical, graphic, or narrative forms,
whether oral or maintained in any medium, including computerized data
bases (e.g., floppy disk and hard disk), papers, microform (microfiche or
microfilm), or magnetic tape.
d. "Information Security" encompasses three different "types" of security:
applications security, installation security and personnel security. In total,
information security involves the precautions taken to protect the confi-
dentiality integrity and availability of information.
e. "Information System" means the organized collection, processing, trans-
mission and dissemination of information in accordance with defined
procedures, whether automated or manual.
f. "Installation" means the physical location of one or more information
systems, whether automated or manual. An automated installation
consists of one or more computer or office automation systems including
related peripheral and storage units, central processing units, telecommu-
nications and operating and support system software. Automated instal-
lations may range in size from large centralized computer centers to
stand-alone personal computers.
g. "Installation Security" includes the use of locks, badges and similar
measures to control access to the installation and the measures required
A-6
-------
Information Security Manual
12/15/89
for the protection of the structure housing the installation from accident,
fire and environmental hazards. In addition to the above physical security
measures, installation security also involves ensuring continuity of opera-
tions through disaster planning.
h. "National Security Information" means information that is classified as Top
Secret, Secret, orConfidential under Executive Order 12356 or predeces-
sor orders.
i. "Personnel Security" involves making a determination of an applicant's or
employee's loyalty and trustworthiness by ensuring that personnel inves-
tigations are completed commensurate with position sensitivity definitions
according to the degree and level of access to sensitive information.
j. "Privacy" is the right of an individual to control the collection, storage and
dissemination of information about himself/herself to avoid the potential
for substantial harm, embarrassment, inconvenience or unfairness.
k. "Risk Analysis" is a means of measuring and assessing the relative
vulnerabilities and threats to a collection of sensitive data and the people,
systems and installations involved in storing and processing that data. Its
purpose is to determine how security measures can be effectively applied
to minimize potential loss. Risk analyses may vary from an informal,
quantitative review of a microcomputer installation to a formal, fully
quantified review of a major computer center.
I. "Sensitive Information" means information that requires protection due to
the risk and magnitude of loss or harm that could result from inadvertent
or deliberate disclosure, alteration or destruction of the information. For
the purposes of this program, information is categorized as being either
sensitive or not sensitive. Because sensitivity is a matter of degree,
certain sensitive information is further defined as being "highly" sensitive.
Hiahlv Sensitive:
Other Sensitive:
This is information whose loss would seriously
affect the Agency's ability to function, threaten
the national security or jeopardize human life
and welfare. Specifically, information of this
type includes National Security Information, in-
formation critical to the performance of a pri-
mary Agency mission, information that is life
critical and financial information related to check
issuance, funds transfer and similar asset ac-
counting/control functions.
This is information whose loss would acutely
embarrass the Agency, subject the Agency to
litigation or impair the long-run ability of the
Agency to fulfill its mission. Information of this
A-7
-------
Information Security Manual 12/15/89
type includes Privacy Act information, Confi-
dential Business Information, enforcement con-
fidential information, information that the Free-
dom of Information Act exempts from disclo-
sure, budgetary data prior to release by OMB
and information of high value to the Agency or
a particular organization (see below).
The sensitivity if any, of all other information, shall be determined by the
organizational owner of the information. While a precise set of criteria for
determining the sensitivity of this other information cannot be provided,
the cost of replacing the information and the problems that would result
from doing without the information are primary factors to consider in de-
termining sensitivity.
m. "Sensitive Applications (or Systems)" are applications which process
highly sensitive or sensitive information or are applications that require
protection because of the loss or harm which could result from the
improper operation or deliberate manipulation of the application itself.
Automated decision-making applications are highly sensitive if the wrong
automated decision could cause serious loss.
8. PROCEDURES AND GUIDELINES. Standards, procedures and guidelines
for the Agency information security program will be identified and issued under
separate cover in the "Information Security Manual." This manual will identify and
reference, as appropriate existing procedures in the information security area, such
as the "Privacy Act Manual," the "National Security Information Security Handbook,"
and Confidential Business Information manuals like the TSCA Security Manual.
9. PENALTIES FOR UNAUTHORIZED DISCLOSURE OF INFORMATION.
a. EPA employees are subject to appropriate penalties if they knowingly,
willfully or negligently disclose sensitive information to unauthorized
persons. Penalties may include, but are not limited to, a letter of warning,
a letter of reprimand, suspension without pay, dismissal, loss or denial of
access to sensitive information (including National Security Information),
or other penalties in accordance with applicable law and Agency rules and
regulations, which can include criminal or civil penalties. Each case will
be handled on an individual basis with afull review of all the pertinent facts.
The severity of the security violation or the pattern of violation will
determine the action taken.
b. Non-EPA personnel who knowingly, willfully or negligently disclose sen-
sitive information to unauthorized persons will be subject to appropriate
laws and sanctions.
A-8
-------
Information Security Manual 12/15/89
APPENDIX B
APPLICATION RISK ANALYSIS
AND APPLICATION CERTIFICATION
A. The Certification Process
Owners should review Section 2.4 before proceeding with this Appendix. That
section contains information on combining applications for certification purposes.
Owners should also note that in working through this Appendix a qualitative risk
analysis is performed, that is, relative vulnerabilities and threats are assessed and
safeguards are specified.
1. New Applications
Each new sensitive application must undergo initial certification and then re-
certification every three years. This certification must take place prior to the appli-
cation being put into use or production. The certification or recertification will begin
with the application owner's completion of the Certification Worksheet, Exhibit B-1.
The worksheet and specific instructions for completing it are described in Section B.
For PC applications, the Certifying Official, PC site coordinator, and PC custodian
will be available to answer owner questions on an as needed basis. For minicom-
puter/mainframe applications, the Minicomputer/Mainframe Security Officer, the
Systems Analyst, and the Applications Programmer must not only answer questions
on an as needed basis, but they must also be an integral part of the process. The
determination of security requirements and appropriate controls requires communi-
cation among all these parties. Safeguards to meet the owner's sensitivity
requirements can be placed in the application itself and/or at the installation level.
How the application is ultimately protected depends upon the safeguards already in
place at the installation (and the results of the installation risk analysis) and the
particular threats to the application.
After completing the worksheet, the owner will forward it to his/her immediate
supervisor for review. The supervisor will review the worksheet for completeness
and then forward it to the designated Certifying Official.
The Certifying Official will either certify that the application is adequately safe-
B-1
-------
Information Security Manual
12/15/89
EXHIBIT B-1
CERTIFICATION WORKSHEET AND EXAMPLE
SENSITIVE APPLICATION CERTIFICATION WORKSHEET
1.
3.
5.
7.
APPLICATION TITLE
RCRA Settlement Offers
TYPE(S) OF INFORMATION
Enforcement confidential;
high value
PROCESSING ENVIRONMENT
Standalone; non-removable and
removable media; shared user; Room 1123,
West Tower, Washington, D.C.
2. OWNER
I ma Safe
OSWER, OSW
4. SENSITIVITY LEVEL & OBJECTIVE
Confidential: Medium Level
Availability: Medium Level
6. DESCRIPTION
Database application that tracks
settlement offers by case. All
users of PC may see confidential
data.
SECURITY SPECIFICATIONS/REQUIREMENTS
a. Controls to Maintain Availability
- Back-up database to diskettes in accordance with the procedures manual.
- Identify backup computing facility.
b. Controls to Maintain Integrity
(Minimal controls only)
c. Controls to Maintain Confidentiality
- Keep PC and removable media in a locked room.
- Establish a formal list of authorized users.
8.
9.
10
EVIDENCE OF ADEQUACY/DESIGN REVIEW
Check to make sure door lock installed.
Check to see that formal list of authorized users created.
Are backups created by user?
Memorandum outlining agreement for backup facility.
TEST SCENARIO AND RESULT
Lock installed on 6-15-89.
List developed on 6-5-89.
Local backups kept in adjacent office; archival backup stored in Crystal City.
Memorandum with PC custodian in same branch executed 6-15-89.
X CERTIFIED
NOT CERTIFIED
B-2
-------
Information Security Manual 12/15/89
guarded or deny certification by marking the appropriate box on the worksheet and
returning it to the supervisor. A Certifying Official may conclude that safeguards are
adequate if the application is protected in accordance with the procedures set forth
in Sections 6-9 of this manual. When certifying the application, the Certifying Official
must mark the appropriate box on the worksheet and sign the one-page certification
statement shown as Exhibit B-2. These documents must be retained on file for
inspection by OIRM, auditors, or the Office of the Inspector General.
Recertification of the operational application should be based on reviews or audits
that test and evaluate the adequacy of implemented safeguards and that identify any
new vulnerabilities. These reviews or audits should be considered part of vulnera-
bility assessments and internal control reviews conducted in accordance with OMB
Circular No. A-123.
2. Existing Applications
Each existing sensitive application must also undergo initial certification (and recer-
tification every three years) in accordance with the instructions above. However, to
avoid overwhelming organizations, initial certification may take place on a phased
basis over the next two years. All initial certifications of existing systems should be
complete by the end of 1991. More sensitive applications (as defined in Section 4)
and those for which security plans were prepared (as described in Section 2.6) need
to be certified first and as expeditiously as possible (by the end of 1990 at the latest).
Because of their overall organizational knowledge, SIRMOs may be able to quickly
prioritize applications for certification.
B. The Certification Worksheet
The certification worksheet should be completed by the application owneras follows.
The numbers below correspond to the numbered blocks on the worksheet. The
worksheet has been filled in with a PC application as an example of what is expected.
In instances where major applications have many security requirements, owners
may wish to reproduce the worksheet several times, using one copy for each
individual requirement.
1. Application Title: Provide the name of the information system or applica-
tion.
B-3
-------
Information Security Manual 12/15/89
EXHIBIT B-2
CERTIFICATION STATEMENT
I have carefully examined the information presented on the Certification Worksheet
for (application name^ . dated . Based on my authority and judgement,
and weighing any remaining risks against operational requirements, I authorize con-
tinued operation of (application name) under the restrictions/conditions listed
below.
(List any Restrictions and Special Conditions o_r enter "None")
(Signature and Date)
B-4
-------
Information Security Manual 12/15/89
2. Owner: List the application owner and organization.
3. Type of Information: Indicate the type of sensitive information (for
example, CBI or high value) in terms of Section 4 of this manual.
4. Sensitivity Level and Objective: Provide the relevant security objective
(for example, availability) and the associated sensitivity level (for ex-
ample, high level).
5. Processing Environment: For PC applications, describe the processing
environment in terms of shared versus single user PC, removable versus
non-removable storage media, and standalone processing versus com-
municating with other equipment. Also indicate the physical and geo-
graphic location of the system. For other applications, describe the
processing hardware, the communications configuration, the user com-
munity, and the physical and geographic location of the system.
6. Description: Provide a brief functional description of the application.
7. (a)-(c). Security Specifications/Requirements: For PC applications, ex-
press the needed availability, integrity and/or confidentiality security
controls in terms of Section 7 of this manual. For other applications,
describe the needed availability, integrity, and/or confidentiality controls
in terms of Sections 6 and 9.
8. Evidence of Adequacy/Design Review: Indicate how the owner will
ensure the security specs are being implemented.
9. Test Scenario and Results: Describe how the owner will satisfy himself/
herself thatthe safeguards workorthatthe procedures are being followed.
10. Certifying blocks to be checked by the Certifying Officer as appropriate.
The application owner should note that the worksheet can also be used as a set of
security procedures for the application's users. In other words, the worksheet can
be used to communicate the sensitivity of the application and the security procedures
to the user.
B-5
-------
I
Information Security Manual 12/15/89
APPENDIX C
INSTALLATION RISK ANALYSIS
I
A. Background
A risk analysis is a means of measuring and assessing the relative vulnerabilities and
threats to an installation. Its purpose is to determine how security safeguards can
I be effectively applied to minimize potential loss. In everyday terms, risk analysis is
simply a procedure for identifying what could go wrong, how likely it is that things
could go wrong, and what can be done to prevent them from going wrong.
Risk analyses may vary from an informal, qualitative review of a microcomputer or
I minicomputer installation to a formal, fully quantified review of a major computer
center. For all Agency installations, including PCs and WP equipment, aqualitative
approach may be used (see part C below).
B. Applicability and Required Schedule
All Agency installations, including PCs and word processors, are required to undergo
a risk analysis. An installation risk analysis shall be performed:
Prior to the approval of design specifications for a new installation. In the
case of a PC or WP, the risk analysis shall be performed at the time the
equipment is installed.
I« Whenever a significant change occurs to the installation. For a PC or WP
installation, significant changes include:
- Physically moving the equipment to another location
- Going from a single user to multiple users, or vice versa
I- Altering the communication configuration, for example, adding a dial-
up capability or becoming part of a LAN.
For a minicomputer/mainframe installation, significant changes include,
I but are not limited to:
- Adding new technology
I
I
- Adding new equipment that is not the same as existing equipment
C-1
-------
Information Security Manual 12/15/89
- Adding dial-up capability
It is difficult to specify a precise set of criteria for identifying significant
changes for mini/mainframe installations. At a large installation like NCC,
adding hardware is commonplace and changing network definitions is
also common; for the NCC, these do not constitute significant changes.
If more guidance is needed to determine if a change warrants a new risk
analysis, the Security Officer should consult his/her SIRMO.
At least every five years, if no significant change to the installation
necessitating an earlier analysis has occurred. Existing installations that
have not undergone a risk analysis during the last five years must undergo
one by the end of 1990.
C. Risk Analysis: Qualitative Approach
To perform the qualitative risk analysis required by this manual, the Security Officer
or PC/WP custodian should complete the worksheet shown as Exhibit C-1 as
follows. The numbers below correspond to the numbered blocks on the worksheet.
The worksheet has been filled in for a hypothetical installation as a simple example
of what is expected.
1. Location: Provide the physical and geographic location and the organi-
zation for the equipment.
2. Custodian and Equipment Type: List the person to whom the equipment
is assigned and the type of equipment.
3. Type of Information: Indicate the type of sensitive information (for
example, CBI or high value) in terms of Section 4 of this manual. If the
installation does not process any sensitive information, the risk analysis
is at an end and only the minimal controls set forth in Section 3 need to be
implemented.
4. Number of Sensitive Applications: Indicate the number of sensitive
applications processed at the installation.
5. Processing Environment: For a PC/WP, describe the processing envi-
ronment in terms of shared versus single user, removable versus non-
removable storage media, and standalone processing versus communi-
cating with other equipment. For other installations, describe the com-
munications environment, the users, the operating system, and installa-
tion hardware not described in 2 above.
6. Sensitivity Level and Objective: Provide the relevant security objective
(for example, availability) and the associated sensitivity level (for ex-
ample, high level).
C-2 '
-------
Information Security Manual
12/15/89
EXHIBIT C-1
INSTALLATION QUALITATIVE RISK ANALYSIS
WORKSHEET AND EXAMPLE
1. LOCATION
Room 1123, West Tower
OIRM
2. CUSTODIAN & EQUIPMENT TYPE
R.U. Secure
IBM 4381
3. TYPE(S) OF INFORMATION
Enforcement confidential;
high value
4. NUMBER OF SENSITIVE
APPLICATIONS
2
5. PROCESSING ENVIRONMENT
Storage/communications capability
located at OIRM; users limited to OIRM
and other specifically authorized/trained
personnel; OEM operating system.
6. SENSITIVITY LEVEL & OBJECTIVE
Confidential: Medium Level
Availability: Medium Level
7. CONTROLS TO MAINTAIN AVAILABILITY
Disaster recovery/continuity of operations plan developed.
Uninterruptible power supply installed.
List of personnel authorized to enter installation established.
Visitor log developed; all visitors escorted during visit.
8. CONTROLS TO PRESERVE INTEGRITY
See items 7 and 9.
9. CONTROLS TO PRESERVE CONFIDENTIALITY
Confidential hard-copy reports stored in a locked cabinet prior to distribution. Confidential
reports are delivered by hand in sealed envelopes.
Unneeded confidential reports are shredded and outdated magnetic tapes with confiden-
tial data are degaussed.
Physical access control and visitor control are as described in 7 above.
10. COMMENTS
The procedures for all sensitive install-
ations described in Section 6.4 have
been implemented, including those
related to password protection. RACF
implemented for sensitive applications.
11. MINIMAL CONTROLS IN PLACE?
x YES
NO
C-3
-------
Information Security Manual 12/15/89
7. Controls to Maintain Availability: Express the needed availability controls
in terms of Section 6, 7, or 8 of this manual.
8. Controls to Preserve Integrity: Express the needed integrity controls in
terms of Section 6, 7, or 8 of this manual.
9. Controls to Preserve Confidentiality: Express the needed confidentiality
controls in terms of Section 6, 7,or 8 of this manual.
10. Comments: Self-explanatory.
11. Minimal Controls in Place: Indicate whether or not the minimal physical
and environmental controls described in Section 3 are in place.
D. Risk Analysis: Quantitative Approach
In essence, a quantitative risk analysis is an exercise in cost/benefit analysis.
Specifically, it involves the following steps:
Identify the asset to be protected (equipment, application, data, etc.)
Determine the threats to the asset
- Natural, such as flood or earthquake
- Man-made, such as fraud or accidental error
Determine the probability the threat will be realized and the dollar loss (re-
placement cost, damages, etc.) if the threat is realized. Manipulate the
two numbers to obtain the annual loss expectancy (ALE).
Calculate the cost of security safeguards.
Compare the cost of safeguards with the ALE and implement those
controls that are cost-effective.
A simple example involving protecting a data base from fire follows:
Asset is data base with a replacement cost of $20,000
Threat is fire
Rate of occurrence of fire is once every 50 years
Annual probability of fire is 2%
C-4
-------
Information Security Manual 12/15/89
Annual Loss Expectancy is $400 (.02 x $20,000)
Cost of safeguard (fire extinguisher) is $100 with a life of 5 years, or $20/
year
Obtain the fire extinguisher because it is cost-effective ($20 versus $400).
As the example shows, the concept of risk analysis is not difficult and is one the
Agency already uses in formulating regulatory policy. What is challenging about risk
analysis is identifying all the installation assets and threats and coming up with the
needed dollar figures. Once these activities have been performed for the first
analysis, however, subsequent risk analyses for the installation should be less time-
consuming.
There are several different approaches for developing the numbers needed for a
quantitative analysis. The procedures presented here are based in large part on
Federal Information Processing Standard (FIPS) 65, entitled "Guideline for Auto-
matic Data Processing Risk Analysis." Additional analytical concepts presented
here are based on information in the HUD "ADP Security Procedures" handbook,
theGSA "Automated Information Security" handbook, and the USDA "ADP Security
Manual".
The approach outlined here should provide a reasonably accurate risk assessment,
but other quantitative approaches may also provide accurate results. Security
Officers may use alternative approaches if: (1) the approach includes the basic
steps outlined at the beginning of this part, and (2) the approach yields all the
information required for the risk analysis report (described in Step 5).
1. Step 1: Identify Assets and Determine Threats
Any risk analysis must begin with an inventory of installation assets. The essential
first question is: "What potentially requires protection?" Basic categories of assets
are as follows:
Building (furnishings, detection systems, etc.)
Supplies
Hardware
Communication Systems (equipment and service)
c-5
-------
Information Security Manual 12/15/89
Environmental "Systems" (power, air conditioning, etc.)
Software (operating system and application)
Data (source documents, output, files, data bases)
Documentation and Procedures.
The threats to those assets must then be determined. To assist in this process,
Exhibit C-2 has been developed. Exhibit C-2 is a simple matrix which presents
assets by threats. To use the worksheet, put a check in each relevant square or
matrix cell. For example, fire isathreatto hardware. Note that the threats have been
tied to the three security objectives of availability, integrity, and confidentiality.
2. Step 2: Identify Existing Safeguards
The next step is to list all security safeguards that are currently in place. Each
safeguard also needs to be tied to the asset it is protecting and to the threat it is
counteracting. In other words, in terms of the Exhibit C-2 matrix, each safeguard
should be tied to one or more squares or cells.
It is important to identify existing safeguards early, since additional controls can only
be meaningfully selected in light of the existing security baseline. In addition, to the
extent that threat/asset combinations are without corresponding safeguards, vul-
nerabilities are present. For example, if fire is a threat to hardware and there are no
fire protection controls in place, the installation is vulnerable to fire.
3. Step 3: Calculate Annual Loss Expectancies
This step involves determining the annual loss expectancy (ALE) of each checked
matrix cell. This calculation involves two components:
Determining the probability the threat will be realized (or the frequency of
occurrence)
Determining the dollar loss if the threat is realized (the dollar impact of the
occurrence)
Note that the frequency of occurrence implicitly incorporates how applicable the
C-6
-------
Information Security Manual
12/15/89
Installation:
THREAT
Availability:
Fire
Water
Storms
Earthquakes
Environ. System
Failures
Equip./System
Failure
Theft
Accidental Data
Destruction
Sabotage
Confidentiality:
Unauthorized
Disclosure
Integrity:
Fraud
Sabotage
Accidental
Damage
EXHIBIT C-2
ASSET/THREAT WORKSHEET
Prepared by:
Date:
Assets
Hard- Comm. Environ.
Bldg. Sup. ware Systems Systems
Soft-
ware Data Doc.
C-7
-------
Information Security Manual 12/15/89
threat is. For example, if a threat is not relevant to an asset, the frequency of
occurrence is zero.
To simplify the analysis without reducing its usefulness, the impact and frequency
estimates should be rounded to the factors of 10 shown below. This is the approach
recommended in FIPS 65.
Impact:
$ 10
$ 100
$ 1,000
$ 10,000
$ 100,000
$ 1,000,000
$ 10,000,000
$ 100,000,000
Frequency:
100 times a day
10 times a day
1 time a day
Once in 10 days
Once in 100 days
Once in 3 years (1000 days)
Once in 30 years
Once in 300 years
This kind of rounding is possible because it really makes little difference to the overall
analysis if a threat is realized every 20 years or every 30 years. Similarly, the
analysis is not significantly affected by an estimated dollar loss of $80,000 versus
$125,000.
Impact and frequency estimates can be developed through interviews with Agency
operational and technical experts. In many instances, common sense will be of great
help. For example, in estimating the frequency of a wind storm, once in three years
is probably too often and once in 300 years is probably too long. A more reasonable
C-8
-------
Information Security Manual 12/15/89
estimate may be once in 30 years. Similarly, in assigning a dollar impact to fraud
involving the payroll system, $1,000,000 is probably too much while $10,000 is too
little. $100,000 is probably a reasonable estimate.
Oftentimes, impact and frequency estimates are more readily developed for physical
or facility-related assets such as buildings or hardware. Estimates for assets such
as data or documentation can involve more judgment, making the risk analysis
conclusions for such assets less certain.
The ALE of a particular asset/threat combination is the product of the annualized fre-
quency and impact estimates. To simplify the computation, Exhibit C-3 has been
developed. Exhibit C-3 presents ALEs by impact/frequency combinations. For
further convenience in performing the analysis, Exhibit C-4 has been developed.
Like Exhibit C-2, Exhibit C-4 is a simple matrix which presents assets by threats. The
ceils in Exhibit C-4 should be filled not with checkmarks, however, but with ALEs. In
other words for each checkmark in Exhibit C-2, there should be a corresponding ALE
in Exhibit C-4.
In developing ALEs, two final items should be noted. First, in developing these
estimates, do not factor in the effect of existing safeguards. For example, an existing
fire detection system could reduce the dollar loss in the event of a fire, but to include
that reduction here would muddy the analysis because it would assume the cost-
effectiveness of the existing system. Instead, all ALEs should be developed as if
there were no existing security controls. (The cost-effectiveness of existing safe-
guards is factored in later in the analysis.)
The second item to note is that in many instances it may be useful to make several
copies of both Exhibits C-2 and C-4 and to create new asset headings on those
copies. For example, Exhibit C-2 includes the assets "software" and "data." Within
each of these categories, there may be several different data bases and applications,
each with its own unique set of threats. In determining threats for applications and
collections of information, always consult with the owner to find out the sensitivity
designation and the relevant security objectives.
4. Step 4: Evaluate and Select Safeguards
To begin this final analytical step, identify the types of safeguards needed based on
C-9
-------
Information Security Manual 12/15/89
EXHIBIT C-3
ALE by IMPACT/FREQUENCY COMBINATION
FREQUENCY
1 in 1 in 1 in 1 in 1 in 1 in 10 100
300 30 3 100 10 1 Per Per
IMPACT Years Years Years Days Days Day Day Day
$10 $300 $3K $30K $ 300K
$100 $300 3K 30K 300K 3M 30M
$1,000 $300 3K 30K 300K 3M 30M
$10,000 $300 3K 30K 300K 3M 30M
$100,000 $300 3K 30K 300K 3M 30M 300M
$ 1,000,000 3K 30K 300K 3M 30M 300M
$10,000,000 30K 300K 3M 30M 300M
$100,000,000 300K 3M 30M 3COM
Source: FIPS65
C-10
-------
Information Security Manual
12/15/89
EXHIBIT C-4
CALCULATING EXPECTED LOSS ALE WORKSHEET
Installation:
THREAT
Availability:
Fire
Water
Storms
Earthquakes
Environ. System
Failures
Equip./System
Failure
Theft
Accidental Data
Destruction
Sabotage
Confidentiality:
Unauthorized
Disclosure
Integrity:
Fraud
Sabotage
Accidental
Damage
Total
Prepared by:
Date:
Assets
Hard- Comm. Environ. Soft-
Bldg. Sup. ware Systems Systems ware Data Doc.
C-11
-------
Information Security Manual 12/15/89
the procedural guidance in Section 6. This is now the appropriate point to include
existing safeguards, so make sure to factor those in to this process.
Once the safeguards have been identified, estimate their annual costs. Again, a high
degree of precision is unnecessary. For example, if a physical access control
system has a cost of $50,000 and a useful life of about 5 years, use $10,000 as the
annual cost. Remember, however, that the cost of an existing control is only the
annual maintenance cost and does not include the initial installation costs. Those
initial costs have already been expended.
Construct alternative clusters of safeguards that address the threats to the installa-
tion's assets. Compute the costs, benefits, and overall cost-effectiveness of each
set of safeguards as shown in Exhibit C-5.
Remember that most security measures are effective against more than one threat
and will reduce the ALE of several different asset/threat combinations. Indeed, it is
this characteristic that makes administrative and physical safeguards so cost-
effective.
Experiment with various combinations of safeguards until a satisfactory aggregation
is achieved. A satisfactory aggregation is one that: (1) addresses all important
threats, (2) results in a significant reduction in the ALE, (3) creates overall benefits
that are greater than costs, and (4) is affordable for the organization. A satisfactory
aggregation need not drive the ALE to 0. Indeed, at an ALE of 0, it is possible that
safeguard costs will exceed their benefits.
5. Step 5: Prepare A Report
Complete the risk assessment process by documenting the results. There is no
standard length required. The report could be 10 pages long or 200 pages long,
depending on the size and sensitivity of the installation. The report should include
the following sections:
Summary of Findings and Recommendations
Introduction
C-12
-------
Information Security Manual 12/15/89
EXHIBIT C-5
COSTS AND BENEFITS OF SAFEGUARDS
(1) ALE Now
(2) New ALE with
Safeguards
(3) Benefits ((1)-(2))
(4) Safeguard Costs
(5) Cost-Effectiveness
(0) - (4))
Safeguard Safeguard Safeguard
Set 1 Set 2 Set 3
C-13
-------
Information Security Manual 12/15/89
Description of Existing Security Controls
Discussion of Asset/Threat Combinations and the Overall Risk Profile of
the Installation
Findings and Recommendations
Appendix Containing the Risk Analysis Worksheets.
C-14
-------
Information Security Manual 12/15/89
APPENDIX D
DISASTER RECOVERY AND CONTINUITY OF
OPERATIONS PLANNING
A. GENERAL
A disaster recovery and continuity of operations plan is required for each minicom-
puter/mainframe computer processing installation. Preparation of the plan is the
responsibility of the installation's Security Officer. The Security Officer may delegate
portions of this function to other knowledgeable individuals as long as the coordinat-
ing responsibility is retained.
These plans cover three distinct areas:
Emergency Response Procedures: These are the actions taken during
or immediately after an emergency to protect life and property and to
minimize the impact of the emergency.
Backup: This area involves two components: (1) establishing a routine
schedule for backing up programs and data, and (2) determining where
those programs and data would run in the event of an emergency. Taken
together, the two backup components ensure the continuity of installation
operations.
Recovery: While the backup area focuses on establishing an alternative,
temporary processing capability, the recovery area focuses on restoring
a permanent, ongoing capability.
Clearly, disaster recovery plans are crucial for ensuring the continued availability of
applications identified by owners as being critical or high value Agency applications.
To the extent an installation does not process applications of this type, contingency
planning is less important. Consequently, installations that only process applica-
tions involving confidentiality and integrity should focus primarily on emergency
response and recovery; continuity of operations is relatively unimportant for these
installations and may be omitted from their plans.
Each installation should prepare a plan in accordance with these procedures by the
end of 1990. Plans should then by updated on an annual basis. Forward completed
plans or updates to your organization's SIRMO.
D-1
-------
Information Security Manual 12/15/89
B. STEPS TO DEVELOP THE PLAN
1. Step 1: Determine What Constitutes a Disaster
An emergency can vary from a temporary disruption of processing to the complete
destruction of the installation. Determine what kinds of events will cause: (1)
limited, temporary disruption, (2) major, serious disruption, and (3) catastrophic
disruption. If the Asset Threat Worksheets were developed as part of the risk
analysis, they can assist in this determination.
2. Step 2: Develop Emergency Procedures
Define and describe what needs to happen during and immediately after an emer-
gency by developing procedures for:
Notifying personnel of the emergency
Responding to fire and other acts of nature
Evacuating the installation
Shutting the hardware down
Protecting data and records.
These procedures must be written and must identify who will be responsible for what
function during the emergency. All installation employees should have an assigned
function during an emergency, which may be simply to evacuate the installation
immediately and to remain home until called.
The procedures should be accompanied by an installation floor plan that shows the
location of fire extinguishers, plastic for covering equipment, and other items useful
in responding to the emergency.
3. Step 3: Ensure Continuity of Operations
Based on owner sensitivity designations, develop a listing of critical and high-value
applications. Establish a plan for data and software backup that includes frequency
of backup, a retention schedule, and an off-site location for storage. The plan should
recognize that transactions that have occurred since the last data backup may be lost
and may need to be re-input. Make sure the plan is responsive to any special owner
D-2
-------
Information Security Manual 12/15/89
requirements, such as more frequent backup than is typical.
Locate and execute an agreement for an alternative processing site to be used in the
event of major or catastrophic damage. Because of cost and compatibility consid-
erations, it is probably best to be backed-up by another installation at the EPA, for
example, one Prime location backing-up another or WIC and NCC backing each
other up. NCC can also back-up regional logical mainframe facilities and will
consider backup arrangements for VAX and microVAX.
Make sure the agreement is in writing and sn JHS . .^ ,. t as the amount
of processing capability to be made available, the associated cost, and the extra
supplies like blank tapes to be maintained at the backup site.
4. Step 4: Plan for Recovery
Develop a plan for re-establishing a permanent, on-going processing installation.
Identify a new installation location in the event the old site cannot be rebuilt.
Determine how hardware supplies and other needed items will be obtained.
Determine how applications will be migrated back to the original processing
installation or to the new installation.
5. Step 5: Testing and Training
Test the plan. For example, confirm compatibility with the backup processing in-
stallation by actually running a critical application there.
Train personnel in their emergency responsibilities.
6. Step 6: Prepare a Written Plan
Complete the process by documenting the plan. The report should include the
following sections:
Introduction
Definition of Disaster for the Installation
Description of Emergency Procedures
Strategy for Ensuring Continuity of Operations (not required for installa-
tions with only confidentiality and/or integrity as objectives)
D-3 U.S. Envirciv ^ntal Protection Agency
-':-; I or. n, I.li'fiiry \-.rL-\'.<)
-------
Information Security Manual 12/15/89
Plan for Recovery
Testing Procedures
Training Plan
Appendix Containing a Listing of Critical and High Value Applications at
Installation.
D-4
------- |