Download:
pdf |
pdfAPPENDIX F
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
FNS Handbook 702
Version 4.0
INFORMATION SYSTEMS SECURITY
GUIDELINES & PROCEDURES
PREPARED BY: INFORMATION SECURITY OFFICE
RELEASE DATE: NOVEMBER 2015
Last Modified: 11/20/2015
For Official Use Only
Page 2 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Document Control
This is a controlled document produced by the United States Department of Agriculture
(USDA), Food, Nutrition and Consumer Services, Chief Information Officer (CIO). The control
and release of this document is the responsibility of the Information Security Office (ISO) and
document owner.
Issue Control
Document
Reference
FNCS 702 v4.0
Document Title
FNCS Information System Security Guidelines and Procedures
702 Handbook, v4.0
Document Owner Details
Name
Leo Wong
Contact Number
703-605-1181
Leo.Wong@fns.usda.gov
E-mail Address
Revision History
Revision
Date
Author
1.0
January 2008
Carol Ware,
ISO
1.1 Draft
October 2008
Information
Security Office
(ISO)
1.2 Draft
October 2009
Bill Ramo
Revised Draft
1.3 Draft
November 2010
Leo Wong
Updated Document
1.4 Draft
August 2011
Vishad Pathak
Updated frequency of review
for monitoring least privilege, IT
restricted space.
1.5 Draft
October 2011
Vishad Pathak
Updated PII, mobile code
usage, and foreign use
policies.
1.6 Draft
December 2011
Leo Nguyen
2.0
March 2012
Information
Security Office
Updated Release
2.1
June 2013
Information
Security Office
Annual Update
3.0
August 2014
Information
Security Office
Annual Update
− Added reference to
Child System and
Last Modified: 11/20/2015
For Official Use Only
Comments
Created original version of the
702 Handbook.
Updated entire document.
Added 4 new guidelines
Updated Citrix Policy
Page 3 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
−
−
4.0
August 2015
Information
Security Office
Application Assessment
Policy, V1.0
Added reference to IR
policy
Added Vulnerability
Policy
Annual Update
− Revised document to
reflect changes
introduced with NIST
SP-800-53 revision 4
− Added reference to
Guest Wireless
− Revised to remove
incorrect web links and
created reference
section in Appendix J
Distribution List
Name
Food, Nutrition and
Consumer Services
Last Modified: 11/20/2015
Title
Agency/Office
All Personnel
FNCS/All
For Official Use Only
Contact Information
Page 4 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
TABLE OF CONTENTS
INFORMATION SYSTEM SECURITY OVERVIEW ------------------------------------------------------------------------------------ 13
ENFORCEMENT STATEMENT ------------------------------------------------------------------------------------------------------------- 13
UPDATE AND REVIEW ----------------------------------------------------------------------------------------------------------------------- 13
INFORMATION SYSTEM SECURITY PLANNING AT FNCS----------------------------------------------------------------------- 14
050
060
070
071
072
073
080
081
082
083
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 14
REFERENCES ----------------------------------------------------------------------------------------------------------------- 14
GUIDELINES ------------------------------------------------------------------------------------------------------------------ 14
MANAGEMENT CONTROLS ------------------------------------------------------------------------------------------------- 14
OPERATIONAL CONTROLS ------------------------------------------------------------------------------------------------- 14
TECHNICAL CONTROLS ----------------------------------------------------------------------------------------------------- 15
FNCS INFORMATION SYSTEM SECURITY COMPLIANCE --------------------------------------------------------------- 15
COMPLIANCE PROGRAM: THE FISMA SCORECARD ------------------------------------------------------------------- 16
STANDARD OPERATING PROCEDURES (SOPS) -------------------------------------------------------------------------- 17
SECURITY ASSESSMENTS --------------------------------------------------------------------------------------------------- 17
GUIDANCE ON ACCEPTABLE USE OF FNCS INFORMATION RESOURCES ---------------------------------------------- 18
100
110
120
130
131
132
140
141
142
150
151
152
160
161
162
164
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 18
REFERENCES ----------------------------------------------------------------------------------------------------------------- 18
GUIDELINES ------------------------------------------------------------------------------------------------------------------ 18
PERSONAL USE -------------------------------------------------------------------------------------------------------------- 19
ACCEPTABLE PERSONAL USE --------------------------------------------------------------------------------------------- 19
UNACCEPTABLE PERSONAL USE ------------------------------------------------------------------------------------------ 19
E-MAIL USE ------------------------------------------------------------------------------------------------------------------ 21
ACCEPTABLE E-MAIL USE ------------------------------------------------------------------------------------------------- 21
UNACCEPTABLE E-MAIL USE ---------------------------------------------------------------------------------------------- 21
INTERNET USE --------------------------------------------------------------------------------------------------------------- 22
ACCEPTABLE INTERNET USE ---------------------------------------------------------------------------------------------- 22
UNACCEPTABLE INTERNET USE ------------------------------------------------------------------------------------------- 22
TELEPHONE EQUIPMENT AND SERVICES --------------------------------------------------------------------------------- 23
ACCEPTABLE TELEPHONE USE -------------------------------------------------------------------------------------------- 23
UNACCEPTABLE TELEPHONE USE ---------------------------------------------------------------------------------------- 23
VIOLATING FNCS INFORMATION RESOURCE ACCEPTABLE USE STANDARDS ------------------------------------ 24
GUIDANCE ON ACCESSING THE FNCS NETWORK ------------------------------------------------------------------------------- 27
200
210
220
221
222
223
224
225
226
227
228
229
230
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 27
REFERENCES ----------------------------------------------------------------------------------------------------------------- 27
FNCS NETWORK ACCESS FOR GOVERNMENT-FURNISHED EQUIPMENT (GFE) ----------------------------------- 27
FNCS NETWORK ACCESS FOR PERSONALLY OWNED EQUIPMENT (POE) ----------------------------------------- 28
FNCS NETWORK SECURITY CONTROLS --------------------------------------------------------------------------------- 29
FNCS NETWORK RESTRICTIONS ------------------------------------------------------------------------------------------ 29
HOW TO REQUEST ACCESS TO THE FNCS NETWORK ----------------------------------------------------------------- 30
HOW TO LOG ON AND OFF THE FNCS NETWORK (INTERNAL AND REMOTE) -------------------------------------- 31
HOW TO LOCK A WORKSTATION------------------------------------------------------------------------------------------- 31
SEPARATION FROM FNCS -------------------------------------------------------------------------------------------------- 31
PROCESS FOR ACCESSING ANOTHER USER’S DATA -------------------------------------------------------------------- 32
COLLABORATIVE COMPUTING DEVICES --------------------------------------------------------------------------------- 32
PUBLIC KEY INFRASTRUCTURE CERTIFICATE--------------------------------------------------------------------------- 32
GUIDANCE ON THE PROTECTION AND USE OF WIRELESS TECHNOLOGIES ------------------------------------------ 33
Last Modified: 11/20/2015
For Official Use Only
Page 5 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
300
310
320
321
322
323
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 33
REFERENCES ----------------------------------------------------------------------------------------------------------------- 33
WIRELESS TECHNOLOGY GUIDELINES ----------------------------------------------------------------------------------- 33
CURRENT STATE OF WIRELESS TECHNOLOGIES AT FNCS ------------------------------------------------------------ 33
HOME/COMMERCIAL USE -------------------------------------------------------------------------------------------------- 33
WIRELESS CONNECTION RULES ------------------------------------------------------------------------------------------- 33
GUIDANCE ON INCIDENT RESPONSE AND REPORTING ----------------------------------------------------------------------- 36
400
410
420
421
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 36
REFERENCES ----------------------------------------------------------------------------------------------------------------- 36
LOSS OF PERSONALLY IDENTIFIABLE INFORMATION (PII) ------------------------------------------------------------ 36
ALL OTHER INCIDENTS ----------------------------------------------------------------------------------------------------- 37
GUIDANCE ON AUDIT & ACCOUNTABILITY OF THE FNCS NETWORK ---------------------------------------------------- 38
500
510
520
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 38
REFERENCES ----------------------------------------------------------------------------------------------------------------- 38
AUDIT AND ACCOUNTABILITY GUIDANCE ------------------------------------------------------------------------------ 38
GUIDANCE ON ACCESS CONTROL FOR FNCS INFORMATION SYSTEMS------------------------------------------------ 41
600
610
620
621
640
641
642
643
644
645
646
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 41
REFERENCES ----------------------------------------------------------------------------------------------------------------- 41
FNCS ACCESS CONTROL GUIDANCE ------------------------------------------------------------------------------------ 41
FNCS RECERTIFICATION OF ACCESS CONTROLS ---------------------------------------------------------------------- 42
FNCS PASSWORD GUIDANCE --------------------------------------------------------------------------------------------- 42
GENERAL USER - PASSWORD GUIDELINES ------------------------------------------------------------------------------ 42
PRIVILEGED USER - PASSWORD GUIDELINES --------------------------------------------------------------------------- 43
SERVICE ACCOUNTS - PASSWORD GUIDELINES ------------------------------------------------------------------------ 44
PASSWORD GUIDELINES FOR GOVERNMENT-FURNISHED WIRELESS PDAS ---------------------------------------- 44
ACCEPTANCE OF PIV CREDENTIALS ------------------------------------------------------------------------------------- 45
DEVICE IDENTIFICATION AND AUTHENTICATION ---------------------------------------------------------------------- 45
GUIDANCE ON IT RESTRICTED SPACE AND PHYSICAL ACCESS CONTROL ------------------------------------------- 46
700
710
720
721
722
720
721
722
723
724
725
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 46
REFERENCES ----------------------------------------------------------------------------------------------------------------- 46
PHYSICAL ENVIRONMENT -------------------------------------------------------------------------------------------------- 46
ROLES AND RESPONSIBILITIES -------------------------------------------------------------------------------------------- 46
THE FNCS CIO WILL: ------------------------------------------------------------------------------------------------------ 46
THE FNCS SUPERVISORS AND POINT OF CONTACTS (POC) WILL: --------------------------------------------------- 47
THE SYSTEM OWNERS WILL: ---------------------------------------------------------------------------------------------- 47
THE INFORMATION SYSTEMS SECURITY PROGRAM MANAGER (ISSPM) WILL: ----------------------------------- 47
THE PHYSICAL SECURITY BRANCH WILL: ------------------------------------------------------------------------------- 47
FNCS USERS WILL: --------------------------------------------------------------------------------------------------------- 47
IT RESTRICTED SPACE AND USER ACCESS RECERTIFICATION PROCESS (PROPERTY MANAGEMENT BRANCH)
48
GUIDANCE ON FNCS COMPUTER SECURITY AWARENESS AND TRAINING -------------------------------------------- 48
800
810
820
830
831
832
833
834
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 48
REFERENCES ----------------------------------------------------------------------------------------------------------------- 49
INFORMATION SYSTEM SECURITY AWARENESS ------------------------------------------------------------------------ 49
INFORMATION SECURITY AWARENESS (ISA) TRAINING -------------------------------------------------------------- 49
ISA TRAINING REQUIREMENTS ------------------------------------------------------------------------------------------- 49
ISA SPECIALIZED TRAINING REQUIREMENTS --------------------------------------------------------------------------- 50
ISA TRAINING RECORDS --------------------------------------------------------------------------------------------------- 50
ROLE-BASED SECURITY TRAINING --------------------------------------------------------------------------------------- 50
GUIDANCE ON ASSESSMENT AND AUTHORIZATION (A&A) OF INFORMATION SYSTEMS AT FNCS ---------- 51
Last Modified: 11/20/2015
For Official Use Only
Page 6 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
900
910
920
921
922
923
924
925
926
927
928
930
931
932
933
934
935
936
937
938
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 51
REFERENCES ----------------------------------------------------------------------------------------------------------------- 51
ROLES AND RESPONSIBILITIES -------------------------------------------------------------------------------------------- 51
THE CIO WILL:--------------------------------------------------------------------------------------------------------------- 51
THE AUTHORIZING OFFICIAL (AO) WILL: ------------------------------------------------------------------------------- 52
THE SYSTEM OWNER WILL: ------------------------------------------------------------------------------------------------ 52
THE IT PROJECT MANAGER (ITPM) WILL: ------------------------------------------------------------------------------ 52
THE ISSM WILL: ------------------------------------------------------------------------------------------------------------- 52
THE ASSESSMENT TEAM WILL: -------------------------------------------------------------------------------------------- 53
THE AUTHORIZATION TEAM WILL: --------------------------------------------------------------------------------------- 53
ADDITIONAL CONTINUOUS A&A GUIDANCE --------------------------------------------------------------------------- 53
GENERAL INFORMATION --------------------------------------------------------------------------------------------------- 54
STEP 1: CATEGORIZE THE PROGRAM/SYSTEM -------------------------------------------------------------------------- 54
STEP 2: SELECT SECURITY CONTROLS ----------------------------------------------------------------------------------- 55
STEP 3A: IMPLEMENT SECURITY CONTROLS ---------------------------------------------------------------------------- 57
STEP 3B: CONCURRENCY REVIEW ---------------------------------------------------------------------------------------- 58
STEP 4: ASSESS SECURITY CONTROLS ----------------------------------------------------------------------------------- 58
STEP 4B SUBMIT THE PACKAGE FOR FINAL CONCURRENCY REVIEW ----------------------------------------------- 60
STEP 5 AUTHORIZE INFORMATION SYSTEM ----------------------------------------------------------------------------- 60
STEP 6 MONITOR SECURITY CONTROLS --------------------------------------------------------------------------------- 62
GUIDANCE ON THE INFORMATION SYSTEMS SECURITY PROGRAM (ISSP) FOR FNCS---------------------------- 64
1000
1010
1020
1030
1040
1050
1051
1052
1053
1054
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 64
REFERENCES ----------------------------------------------------------------------------------------------------------------- 64
PURPOSE ---------------------------------------------------------------------------------------------------------------------- 64
FNCS ISSP STRUCTURE --------------------------------------------------------------------------------------------------- 65
MANAGEMENT STRUCTURE OF THE ISSP-------------------------------------------------------------------------------- 66
ISO ROLES AND RESPONSIBILITIES: -------------------------------------------------------------------------------------- 67
THE CIO WILL:--------------------------------------------------------------------------------------------------------------- 67
THE CISO/DEPUTY CISO/ISSPM WILL: -------------------------------------------------------------------------------- 67
THE ISSM WILL: ------------------------------------------------------------------------------------------------------------- 69
THE ISSO WILL: ------------------------------------------------------------------------------------------------------------- 70
GUIDANCE ON RISK MANAGEMENT AT FNCS-------------------------------------------------------------------------------------- 73
1200
1210
1220
1221
1222
1223
1230
1240
1241
1242
1243
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 73
REFERENCES ----------------------------------------------------------------------------------------------------------------- 73
FNCS RISK MANAGEMENT ------------------------------------------------------------------------------------------------ 73
RISK ASSESSMENT GUIDELINES ------------------------------------------------------------------------------------------- 73
RISK MITIGATION GUIDELINES-------------------------------------------------------------------------------------------- 75
RISK EVALUATION AND ASSESSMENT GUIDELINES -------------------------------------------------------------------- 76
RISK ACCEPTANCE GUIDELINES ------------------------------------------------------------------------------------------ 76
FNCS RISK MANAGEMENT PROGRAM TEAM --------------------------------------------------------------------------- 76
VULNERABILITY IDENTIFICATION AND REMEDIATION PROCEDURES ----------------------------------------------- 76
IDENTIFICATION, VALIDATION, AND REPORTING ---------------------------------------------------------------------- 77
REMEDIATION OF IDENTIFIED VULNERABILITIES----------------------------------------------------------------------- 77
GUIDANCE ON IT CONTINGENCY PLANNING AND DISASTER RECOVERY ---------------------------------------------- 79
1300
1310
1320
1321
1322
1323
1324
1330
1331
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 79
REFERENCES ----------------------------------------------------------------------------------------------------------------- 79
ROLES AND RESPONSIBILITIES -------------------------------------------------------------------------------------------- 79
THE CIO AND CISO WILL: ------------------------------------------------------------------------------------------------- 79
THE CONTINGENCY PLAN AND DISASTER RECOVERY COORDINATOR AND STAKEHOLDERS WILL: ------------ 80
THE SYSTEM OWNER WILL: ------------------------------------------------------------------------------------------------ 81
THE ITPM AND ISSM WILL: ----------------------------------------------------------------------------------------------- 81
CONTINGENCY PLAN AND DISASTER RECOVERY GUIDELINES ------------------------------------------------------- 81
CONTINGENCY TRAINING -------------------------------------------------------------------------------------------------- 82
Last Modified: 11/20/2015
For Official Use Only
Page 7 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
1332
CONTINGENCY PLAN TESTING -------------------------------------------------------------------------------------------- 82
GUIDANCE ON FNCS SYSTEM SECURITY PLANS (SSP) ------------------------------------------------------------------------ 83
1400
1410
1420
1421
1422
1423
1424
1430
1431
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 83
REFERENCES ----------------------------------------------------------------------------------------------------------------- 83
ROLES AND RESPONSIBILITIES -------------------------------------------------------------------------------------------- 83
THE CISO WILL: ------------------------------------------------------------------------------------------------------------- 83
THE ISSPM WILL: ----------------------------------------------------------------------------------------------------------- 84
THE SYSTEM OWNER WILL: ------------------------------------------------------------------------------------------------ 84
THE ITPM WILL: ------------------------------------------------------------------------------------------------------------ 84
USDA DEFINITIONS OF SYSTEM AND MAJOR APPLICATIONS -------------------------------------------------------- 85
SSP GUIDELINES ------------------------------------------------------------------------------------------------------------ 85
GUIDANCE ON THE FNCS SYSTEMS DEVELOPMENT LIFE CYCLE (SDLC) ---------------------------------------------- 87
1500
1510
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 87
REFERENCES ----------------------------------------------------------------------------------------------------------------- 87
ROLES AND RESPONSIBILITIES -------------------------------------------------------------------------------------------- 87
THE CISO WILL: ------------------------------------------------------------------------------------------------------------- 87
THE INFORMATION SYSTEM SECURITY PROGRAM MANAGER (ISSPM) WILL: ------------------------------------ 87
THE ISSM WILL: ------------------------------------------------------------------------------------------------------------- 88
THE ITPM WILL: ------------------------------------------------------------------------------------------------------------ 88
THE SYSTEM OWNER WILL: ------------------------------------------------------------------------------------------------ 88
THE PRIVACY OFFICER WILL: --------------------------------------------------------------------------------------------- 88
THE LEGAL ADVISOR WILL: ----------------------------------------------------------------------------------------------- 88
THE RECORDS MANAGEMENT OFFICER WILL: -------------------------------------------------------------------------- 88
CONTRACTOR/DEVELOPMENT TEAM WILL ------------------------------------------------------------------------------ 88
SDLC REQUIRED SECURITY DOCUMENTATION AND RESPONSIBLE TEAMS --------------------------------------- 89
SDLC PHASES --------------------------------------------------------------------------------------------------------------- 90
SDLC PHASES AND SECURITY REQUIREMENTS ------------------------------------------------------------------------ 91
SDLC PHASES AND DETAILED SECURITY REQUIREMENTS FOR EACH PHASE ------------------------------------- 92
PHASE 1: INITIATION -------------------------------------------------------------------------------------------------------- 92
PHASE 2: REQUIREMENTS GATHERING AND ANALYSIS --------------------------------------------------------------- 93
PHASE 3: DESIGN ------------------------------------------------------------------------------------------------------------ 94
PHASE 4: DEVELOPMENT --------------------------------------------------------------------------------------------------- 95
PHASE 5: INTEGRATION & TESTING -------------------------------------------------------------------------------------- 95
PHASE 6: IMPLEMENTATION ----------------------------------------------------------------------------------------------- 96
PHASE 7: OPERATIONS / MAINTENANCE (O&M) ----------------------------------------------------------------------- 97
PHASE 8: DISPOSITION ------------------------------------------------------------------------------------------------------ 98
GUIDANCE ON FNCS CAPITAL PLANNING AND INVESTMENT CONTROL (CPIC) ------------------------------------- 99
1600
1610
1620
1621
1620
1621
1622
1623
1630
1631
1632
1633
1634
1635
1636
1637
OVERVIEW -------------------------------------------------------------------------------------------------------------------- 99
REFERENCES ----------------------------------------------------------------------------------------------------------------- 99
RESPONSIBILITIES --------------------------------------------------------------------------------------------------------- 100
THE CISO WILL: ----------------------------------------------------------------------------------------------------------- 100
THE ISSPM WILL: --------------------------------------------------------------------------------------------------------- 100
THE TECHNICAL REVIEW BOARD (TRB) WILL: ---------------------------------------------------------------------- 100
THE ITPM WILL: ---------------------------------------------------------------------------------------------------------- 100
THE SYSTEM OWNER/ITPM WILL: ------------------------------------------------------------------------------------- 101
THE PORTFOLIO MANAGER WILL: -------------------------------------------------------------------------------------- 101
CPIC PHASES -------------------------------------------------------------------------------------------------------------- 102
PRE-SELECT PHASE ------------------------------------------------------------------------------------------------------- 102
SELECT PHASE ------------------------------------------------------------------------------------------------------------- 102
CONTROL PHASE ---------------------------------------------------------------------------------------------------------- 103
EVALUATE PHASE --------------------------------------------------------------------------------------------------------- 103
STEADY STATE PHASE ---------------------------------------------------------------------------------------------------- 103
CPIC PHASES -------------------------------------------------------------------------------------------------------------- 103
Last Modified: 11/20/2015
For Official Use Only
Page 8 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
1638
1639
1640
CPIC PHASES AND SECURITY REQUIREMENTS ----------------------------------------------------------------------- 104
CPIC REQUIRED DOCUMENTATION BY PHASE ----------------------------------------------------------------------- 104
FNCS CPIC PROCESS FLOW DIAGRAM (PER PHASE)---------------------------------------------------------------- 107
GUIDANCE ON MAINTENANCE OF FNCS INFORMATION SYSTEMS ------------------------------------------------------ 112
1700
1710
1720
1721
1730
OVERVIEW ------------------------------------------------------------------------------------------------------------------ 112
REFERENCES --------------------------------------------------------------------------------------------------------------- 112
RESPONSIBILITIES AND GUIDANCE ------------------------------------------------------------------------------------- 112
THE ORGANIZATION RESPONSIBLE FOR MAINTAINING THE SPECIFIC EQUIPMENT WILL: ----------------------- 112
INFORMATION SECURITY ARCHITECTURE ----------------------------------------------------------------------------- 113
GUIDANCE ON MEDIA PROTECTION FOR FNCS INFORMATION SYSTEM RESOURCES -------------------------- 114
1800
1810
1820
1821
1822
OVERVIEW -----------------------------------------------------------------------------------------------------------------REFERENCES --------------------------------------------------------------------------------------------------------------ROLES AND RESPONSIBILITIES -----------------------------------------------------------------------------------------THE OIT TECHNOLOGY DIVISION WILL: ------------------------------------------------------------------------------MEDIA PROTECTION GUIDELINES---------------------------------------------------------------------------------------
114
114
114
114
115
GUIDANCE ON FNCS PERSONNEL INFORMATION SECURITY ------------------------------------------------------------- 116
1900
1910
1920
1921
1922
1923
1924
1925
1926
1927
1928
1929
1930
1931
OVERVIEW ------------------------------------------------------------------------------------------------------------------ 116
REFERENCES --------------------------------------------------------------------------------------------------------------- 116
ROLES AND RESPONSIBILITIES ------------------------------------------------------------------------------------------ 116
THE CIO WILL:------------------------------------------------------------------------------------------------------------- 116
THE ISO WILL: ------------------------------------------------------------------------------------------------------------- 116
THE CONTRACTING OFFICER’S REPRESENTATIVE (COR) AND ITPM WILL: ------------------------------------- 116
THE USERS WILL----------------------------------------------------------------------------------------------------------- 116
PERSONNEL SECURITY GUIDELINES ------------------------------------------------------------------------------------ 117
CATEGORIZATION OF FNCS JOB POSITIONS --------------------------------------------------------------------------- 117
PERSONNEL SCREENING -------------------------------------------------------------------------------------------------- 117
PERSONNEL TERMINATION----------------------------------------------------------------------------------------------- 117
PERSONNEL TRANSFER --------------------------------------------------------------------------------------------------- 118
ACCESS AGREEMENTS ---------------------------------------------------------------------------------------------------- 118
THIRD-PARTY PERSONNEL SECURITY ---------------------------------------------------------------------------------- 118
GUIDANCE ON CONFIGURATION MANAGEMENT OF FNCS INFORMATION SYSTEMS ---------------------------- 119
2000
2010
2020
2021
OVERVIEW -----------------------------------------------------------------------------------------------------------------REFERENCES --------------------------------------------------------------------------------------------------------------ROLES AND RESPONSIBILITIES -----------------------------------------------------------------------------------------CHANGE CONTROL BOARD ----------------------------------------------------------------------------------------------
119
119
119
119
APPENDIX A – GLOSSARY --------------------------------------------------------------------------------------------------------------- 120
APPENDIX B – FORM FNS-674 COMPLETION INSTRUCTIONS -------------------------------------------------------------- 139
APPENDIX C – PASSWORD HINTS ---------------------------------------------------------------------------------------------------- 140
APPENDIX D – REQUIRED C&A SYSTEM SECURITY DOCUMENTS ------------------------------------------------------- 141
APPENDIX E – FNCS RISK MANAGEMENT ACCEPTANCE REPORT ------------------------------------------------------ 145
APPENDIX F – ITIRB PORTFOLIO MANAGEMENT OFFICE CHECKLIST ------------------------------------------------- 149
APPENDIX G – CPO-ITIRB RECOMMENDATION ---------------------------------------------------------------------------------- 151
APPENDIX H – FNCS INITIAL INCIDENT REPORT TEMPLATE --------------------------------------------------------------- 152
APPENDIX I – INFORMATION SYSTEM SECURITY GUIDANCE AND SECURITY CONTROL MAPPING -------- 156
APPENDIX J – LINKS TO REFERENCE DOCUMENTS --------------------------------------------------------------------------- 159
Last Modified: 11/20/2015
For Official Use Only
Page 9 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
LIST OF TABLES
Table 1 – FNCS Information System Security Plan Families and Identifiers .................................. 16
Table 2 – RMF Step 1 Requirements (Categorization)..................................................................... 55
Table 3 – RMF Step 2 Requirements (Select Security Controls) ..................................................... 56
Table 4 – RMF Step 3 Requirements (Implement Security Controls) .............................................. 57
Table 5 – RMF Step 4 Tasks (Assess Security Controls) ................................................................. 59
Table 6 – RMF Step 5 Tasks (Authorize Security Controls) ............................................................ 61
Table 7 – RMF Step 6 Tasks (Monitor Security Controls) ............................................................... 62
Table 8 – Vulnerability Assessment Risk Score Matrix ................................................................... 78
Table 9 – SDLC Phases and Processes ............................................................................................. 91
Table 10 – SDLC Phases and System Security Considerations ....................................................... 92
Table 11 – USDA IT Capital Planning Phases ............................................................................... 104
LIST OF FIGURES
Figure 1 – RMF Step 1 Process (Categorization) ............................................................................. 55
Figure 2 – RMF Step 2 Process (Select Security Controls) .............................................................. 56
Figure 3 – RMF Step 3 Process (Implement Security Controls) ...................................................... 57
Figure 4 – RMF Step 4 Process (Assess Security Controls) ............................................................. 60
Figure 5 – RMF Step 5 Process (Authorize Security Controls)........................................................ 61
Figure 6 – RMF Step 6 Process (Monitor Security Controls) .......................................................... 63
Figure 7 – OIT Information Security Office Management 4-Tier Structure .................................... 66
Figure 8 – General USDA Risk Assessment Methodology .............................................................. 74
Last Modified: 11/20/2015
For Official Use Only
Page 10 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Figure 9 – SDLC Phase 1 Initiation Overview ................................................................................. 93
Figure 10 – SDLC Phase 2 Requirements Gathering and Analysis Overview ................................. 94
Figure 11 – SDLC Phase 3 Design Overview .................................................................................. 95
Figure 12 – SDLC Phase 4 Development Overview ........................................................................ 95
Figure 13 – SDLC Phase 5 Integration & Testing Overview ........................................................... 96
Figure 14 – SDLC Phase 6 Implementation Overview..................................................................... 97
Figure 15 – SDLC Phase 7 Operations & Maintenance Overview................................................... 98
Figure 16 – SDLC Phase 8 Disposition Overview ........................................................................... 98
Figure 17 – USDA IT Capital Planning Phases .............................................................................. 102
Figure 18 – FNCS CPIC Pre-Select Phase ..................................................................................... 107
Figure 19 – FNCS CPIC Select Phase ............................................................................................ 108
Figure 20 – FNCS CPIC Control Phase .......................................................................................... 109
Figure 21 – FNCS CPIC Evaluate Phase ........................................................................................ 110
Figure 22 – FNCS CPIC Steady State Phase .................................................................................. 111
Last Modified: 11/20/2015
For Official Use Only
Page 11 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
[This page intentionally left blank.]
Last Modified: 11/20/2015
For Official Use Only
Page 12 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Information System Security Overview
The purpose of the FNCS Information Systems Security Guidelines and Procedures is to protect
agency information and information processing assets from theft, fraud, misuse or unauthorized
modification. This Handbook addresses requirements and guidance set forth by the Federal
Information Security Management Act (FISMA). It also encompasses minimum security controls
as required by the Federal Information Processing Standard (FIPS) 200, Minimum Security
Requirements for Federal Information and Information Systems; and defined by the current
National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53, Security
and Privacy Controls for Federal Information Systems and Organizations, commensurate with
security categorization defined by FIPS 199, Standards for Security Categorization of Federal
Information and Information Systems.
•
•
•
•
•
•
•
•
Information used by any business enterprise must be safeguarded against tampering, loss,
unauthorized disclosure, denial of service, destruction and must be available when and
where needed.
IT Information Security guidance applies to the areas of: administrative, physical and/or
environmental, personnel, professional behavior, communications, and computer security
(e.g., hardware and software).
All guidelines within the 702 Handbook are written in accordance with USDA policies within
the Department Manual Cyber Security 3500-3599 series and the Department Regulations,
and NIST Special Publications.
FNCS IT systems should not process or contain any Classified, Secret, or Top Secret data.
Control measures are in place to protect FNCS data and the supporting IT systems
commensurate with the sensitivity of the data. If any classified data should pass through
the FNCS network, users are to contact the Information Security Office (ISO) at
SecurityOfficers.Mailbox@fns.usda.gov
Mechanisms shall be integrated into the FNCS architecture to detect and minimize
inadvertent and/or malicious modification or destruction of FNCS data.
All FNCS employees, contractors, state partners and official visitors shall adhere to the
guidelines within the 702 Handbook and ensure that information is used only for its
intended purpose, retains its content integrity, and is marked properly as required.
Requests to deviate from FNCS security policies must be approved by the FNCS Chief
Information Officer (CIO) prior to implementation.
For assistance or questions on FNCS Information Systems Security Guidelines and
Procedures, please contact the ISO at SecurityOfficers.Mailbox@fns.usda.gov .
Enforcement Statement
Compliance with this Handbook is mandatory. Violations of the Information Systems Security
Guidelines and Procedures as stated in the 702 Handbook may lead to immediate removal from
the FNCS Network and/or may be the basis for disciplinary action. Supervisors and/or
management officials considering disciplinary action must consult with the Labor & Employee
Relations Branch in the Human Resources Division prior to taking any action.
Update and Review
Policies will be reviewed, at minimum, on an annual basis. Policies may be reviewed and updated
more frequently as necessary.
Last Modified: 11/20/2015
For Official Use Only
Page 13 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Information System Security Planning at FNCS
050
Overview
In a world of evolving threats to our information systems, it has become clear that we must
continuously ensure we are satisfying a level of information security within FNCS that meets with
the information we are expected to protect. System Security Plans (SSP) have become the
foundation document in the overall security process since they define the system security features
and controls.
SSPs support Capital Planning and Investment Control (CPIC), Federal Information Security
Management Act (FISMA) reporting, System Life Cycle efforts, Risk Management activities as well
as the Certification and Accreditation of Information Technology (IT) systems. Therefore, it is
critical that they be prepared and updated on an ongoing basis with the most current information
concerning each agency’s information security practices.
060
References
This guidance is written in accordance with:
•
•
070
NIST Special Publication 800-53 Rev. 4
DM 3565-001 USDA Annual Security Plans for Information Technology Systems
Guidelines
The FNCS System Security Plan consists of three (3) security control classes: Management,
Operational and Technical.
The three classes and control families are described as follows:
071
Management Controls
Management Controls focus on the management of the information system and the management
of risk for a system. Management Controls are techniques and concerns that are normally
addressed by FNCS Management.
Control families for the Management Controls are:
1.
2.
3.
4.
5.
072
Security Assessment and Authorization (CA)
Planning (PL)
Risk Assessment (RA)
System and Services Acquisition (SA)
Program Management (PM)
Operational Controls
Operational Controls address security methods focusing on mechanisms primarily implemented
and executed by people (as opposed to systems). These controls are put in place to improve the
security of a particular system (or group of systems). They often require technical or specialized
expertise and often rely upon management activities as well as technical controls.
Last Modified: 11/20/2015
For Official Use Only
Page 14 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Control families included in the Operational Controls are:
1.
2.
3.
4.
5.
6.
7.
8.
9.
073
Awareness and Training (AT)
Configuration Management (CM)
Contingency Planning (CP)
Incident Response (IR)
Maintenance (MA)
Media Protection (MP)
Physical and Environmental Protection (PE)
Personnel Security (PS)
System and Information Integrity (SI)
Technical Controls
Technical Controls focus on security controls executed by computer systems. The controls can
provide automated protection for unauthorized access or misuse, facilitate detection of security
violations, and support security requirements for applications and data.
Control families included in the Technical Controls are:
1.
2.
3.
4.
074
Access Control (AC)
Audit and Accountability (AU)
Identification and Authentication (IA)
System and Communications Protection (SC)
Security Tools
Security tools are used at FNCS to provide effective security protection for FNCS Information
resources and are used as part of the comprehensive security process to monitor compliance for
some of the aforementioned control families. Some of the security tools utilized at FNCS are:
1.
2.
3.
4.
5.
6.
7.
8.
Vulnerability Scanning
Firewalls
Anti-virus Program
Encryption
Intrusion Detection / Prevention System (IDS/IPS)
Security Information and Event Management (SIEM) & Log Management Tool
Enterprise Content Filtering
File Integrity Monitoring
The NIST Special Publication 800-53 Revision 4 (page F-1) outlines the recommended security
controls that are management, operational and technical security domains for low, moderate, and
high baseline systems. The FNCS security program is compliant to FISMA security requirements
as well as FIPS 199 regulations for security categorization of Federal information systems and
FIPS 200 regulations for the minimum security requirements for Federal information systems.
080
FNCS Information System Security Compliance
The guidance established within this document authorizes the ISO to promote and execute
information security control compliance for all phases of the System Development Life Cycle
Last Modified: 11/20/2015
For Official Use Only
Page 15 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
(SDLC), Capital Planning and Investment Control (CPIC), operations & maintenance, and other IT
functions that may impact the effectiveness of maintaining the confidentiality, integrity, or
availability of FNCS data.
The table below highlights the relevant sections created to comply with the Management (indicated
as “M” on the table), Technical (indicated as “T” on the table) and Operational (indicated as “O” on
the table) controls for FNCS System Security Plans.
ID
SA
SC
IR
AU
AC
IA
PE
AT
CA
PM
RA
CP
PL
MA
MP
PS
CM
Security Requirements
System and Services Acquisition (M)
System and Communications Protection (T)
Incident Response (O)
Audit and Accountability (T)
Access Control (T)
Identification and Authentication (T)
Physical and Environmental Protection (O)
Awareness and Training (O)
Security Assessment and Authorization (M)
Program Management (M)
Risk Assessment (M)
Contingency Planning (O)
Planning (M)
Maintenance (O)
Media Protection (O)
Personnel Security (O)
Configuration Management (O)
Section Series
Section 100
Section 200
Section 400
Section 500
Section 600
Section 600
Section 700
Section 800
Section 900
Section 1000
Section 1200
Section 1300
Section 1600
Section 1700
Section 1800
Section 1900
Section 2000
Table 1 – FNCS Information System Security Plan Families and Identifiers
081
Compliance Program: The FISMA Scorecard
The FNCS ISO responds to Department requirements to report specific FISMA scorecard
variables used to measure and ensure compliance to security controls for each system at FNCS.
The scorecard reports on the total score and grade for:
1. Systems Inventory
2. CSAM Controls
3. Plan of Actions and Milestones (POA&Ms) and due dates
4. Contingency planning
5. Monthly scanning
6. Monthly patching
7. USDA Information Security Awareness (ISA) Training
8. Specialized Role Based IT Training
9. Security Assessments and Authorization (SA&A)
10. Systems scheduled for a Security Assessment & Authorization (SA&A)
11. Annual Security Plans
12. Privacy Impact Assessment (PIA)
13. Privacy Threshold Analysis (PTA)
Last Modified: 11/20/2015
For Official Use Only
Page 16 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
14. Systems of Records
15. United States Government Configuration Baseline (USGCB)
16. Whole Disk Encryption
17. Security Incidents
18. Wireless Devices
19. Network Account Management
The FNS Information Security Office (ISO) conducts monthly compliance reviews and reports on
security data such as the status for overdue POA&Ms, monthly patches, and scan information.
The results of the reviews and reports are communicated via a FISMA scorecard that is reported
to USDA when requested. The CIO reviews and approves the FISMA scorecard and reports to
USDA. In the event that non-compliance is discovered, the system owners are given an
opportunity to create POA&Ms that documents the planned, implemented and evaluated remedial
actions to correct the deficiency or non-compliance. POA&Ms are currently entered and managed
within the Cyber Security Assessment and Management (CSAM) tool and the FNS ISO POA&M
Tracker application.
082
Standard Operating Procedures (SOPs)
FNCS has developed various SOPs detailing the procedure for maintaining security tools used at
FNCS, including: vulnerability scanning, patch management, firewalls, anti-virus program, data
encryption and log management. These SOPs are necessary to maintain compliance.
083
Security Assessments
FNCS, through the ISO, performs annual security assessments of security controls for FNCS
systems. The assessments are required for OMB A-123 Management Controls of financial
systems and NIST SP 800-53 of FISMA reportable systems, including financial and non-financial
and General Support Systems (GSS).
FNCS may be selected to participate in OIG audits of FISMA controls on an annual basis.
Last Modified: 11/20/2015
For Official Use Only
Page 17 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on Acceptable Use of FNCS Information Resources
100
Overview
Acceptable use provides guidelines on the proper usage of networks. It also details behaviors that
are acceptable and unacceptable on the FNCS Network.
This guidance applies to all FNCS Users (i.e., employees, contractors, official visitors (including
external clients and third party vendors with access to the network) for both internal and remote
access connections to the FNCS Network).
The purpose of this 702 Handbook is to document security policies and procedures, in accordance
with Federal government mandated requirements for connecting to the FNCS network from any
device. Acceptable Use is to set forth the principles that govern appropriate use of FNCS
information resources and is intended to promote the efficient, ethical, and lawful use of the
resources. Access to Government Furnished Equipment (GFE) and the FNCS network is a
privilege which imposes certain responsibilities and obligations to each FNCS users.
110
References
This guidance is written in accordance with:
•
•
•
•
120
NIST Special Publication 800-53 Rev. 4
DM 3525-000 USDA Internet and E-mail Security
DN 3300-011 USDA Commercial Wireless Technologies
DR 3300-001, DR 3300-1-1 through DR 3300-1-M
Guidelines
When using FNCS information resources, FNCS users shall:
•
Ensure the ethical use of FNCS information resources in accordance with FNCS guidelines
and procedures.
•
Acknowledge that FNCS has the right to restrict or rescind network privileges at any time.
•
Utilize all security measures that are in place to protect the confidentiality, integrity and
availability of information and systems.
•
Refrain from using FNCS information resources for inappropriate activities.
•
Adhere to all licenses, copyright laws, contracts, and other restricted or proprietary
information.
•
Always safeguard user IDs, passwords, and smartcards.
•
Access only those information systems, networks, data, control information, and software
that you are authorized to use.
Last Modified: 11/20/2015
For Official Use Only
Page 18 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
.
•
Use any special accounts to which they have been given access (privilege, system, etc.)
only for the purposes for which the account was intended. Users should not modify
accounts or elevate other accounts with privileged accounts without written approval from
the Information Security Office.
•
Know who the Information System Security Officers (ISSO) are and how to contact them.
•
Determine the sensitivity of the information and programs on their computing resources
(e.g., non-sensitive, sensitive but unclassified). Please refer to the Guidance and
Protection of SBU Information for more detail. Sensitivity of information is also classified by
security categorizations. Refer to NIST SP 800-53 Revision 4 for more information or refer to
the FIPS 199 guidelines on security categorizations.
•
Avoid the introduction of harmful files/data that may contain spy-ware, viruses, etc. into any
computing resource.
130
Personal Use
Federal employees are permitted limited use of GFE for personal needs if the use does not
interfere with official business and involves minimal additional expense to the Government. This
policy also applies to contractor personnel, interns, and other non-government employees through
incorporation by reference in contracts or memorandums of agreement as conditions for using
GFE and space. This limited personal use of GFE should take place during the employee's
personal time, not during official duty time. This privilege to use GFE for non-government purposes
may be revoked or limited at any time by appropriate Federal agency or department officials.
Below are guidelines on the acceptable and unacceptable personal use at FNCS.
131
Acceptable Personal Use
FNCS Users shall have limited personal use of FNCS information systems if it is determined that
such communication:
•
Does not adversely affect the performance of their official duties or degrade the
performance of the network (e.g., any personal use that could cause congestion, delay or
disruption of service to FNCS Information Systems or equipment).
•
Does not put Federal Government telecommunication systems to uses that would reflect
adversely on FNCS, to include activities that are illegal, inappropriate, or offensive to fellow
employees, partners, contractors or the public.
132
Unacceptable Personal Use
Employees are not to connect any personal equipment to GFE; this restriction includes but is not
limited to:
• Personal removable media (flash drives, external hard drives, etc.);
• Personal Mobile Devices; and
• Any other type of Personal Electronic Property.
Last Modified: 11/20/2015
For Official Use Only
Page 19 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Employees are reminded that they should not try to read media such as CD-ROMs using their
GFE unless they can confirm the source of the media. Using unfamiliar media on GFE increases
the probability of system comprises. Users should always validate the source before using.
Personal use that could cause congestion, delay, or disruption of service to any government
system or equipment should be avoided. For example, greeting cards, video, sound or other large
file attachments can degrade the performance of the entire network. “Instant Messaging” and web
casting on the Internet and other continuous data streams would also degrade the performance of
the entire network. Creating, copying, transmitting, or retransmitting chain letters or other
unauthorized mass mailings regardless of the subject matter.
Use of GFE for activities that are illegal, inappropriate, or offensive to fellow employees or the
public is not permitted. Such activities include, but are not limited to: hate speech, or material that
ridicules others on the basis of race, creed, religion, color, sex, disability, national origin, or sexual
orientation.
Creating, downloading, viewing, storing, copying, or transmitting sexually explicit or sexually
oriented materials is not permitted.
Creating, downloading, viewing, storing, copying, or transmitting materials related to illegal
gambling, illegal weapons, terrorist activities, and non-FNCS – owned music, videos and any other
illegal activities is not permitted.
Commercial use or in support of “for-profit” and “non-profit” activities or in support of other outside
employment or business activity (e.g., consulting for pay, sales or administration of business
transactions, and sale of goods or services) is not permitted.
Engaging in any outside fund-raising activity, endorsing any product or service, participating in any
lobbying activity, or engaging in any prohibited partisan political activity is not permitted
Posting agency information (all Intellectual Property) to external newsgroups, bulletin boards or
other public forums without authority is not permitted. This includes any use that could create the
perception that the communication was made in one’s official capacity as a Federal Government
employee, unless appropriate Agency approval has been obtained.
Any use that could generate any additional expense to the U.S. government should be avoided.
The unauthorized acquisition, use, reproduction, transmission, or distribution of any controlled
information including computer software and data, that includes privacy information, copyrighted,
trademarked or material with other intellectual property rights (beyond fair use), proprietary data is
not permitted.
Last Modified: 11/20/2015
For Official Use Only
Page 20 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
140
E-mail Use
USDA DR 3300-1-F states that electronic mail (e-mail) shall be used for the conduct of official
business or limited personal use. Below is guidance on acceptable and unacceptable e-mail use
at FNCS.
141
Acceptable E-mail Use
Appropriate e-mail use includes, but is not limited to:
•
Limited personal use of the FNCS e-mail system as long it does not interfere with official
business nor reflect adversely on FNCS Information Systems.
•
Any message containing information exchanged by employees for the purpose of
accomplishing government business.
•
Access to the FNCS e-mail system by users when they are not at their duty station site, or
at another installed site, are permitted only through FNCS approved secured methods,
such as Virtual Private Network (VPN) or Citrix.
•
Securing SBU information prior to transmission. Please see Guidance for the Protection of
Sensitive but Unclassified (SBU) information for further guidance on E-mailing SBU
information.
•
If you receive Spam email, immediately forward this email to the spam mailbox at:
spamabuse@fns.usda.gov..
142
Unacceptable E-mail Use
Inappropriate e-mail use includes, but is not limited to:
•
Sharing a User ID and password to obtain access to another user’s e-mail for any purpose.
•
Opening attached file extensions on FNCS e-mail servers to include, but not limited to:
.ade, .adp, .bas, .bat, .chm, .cmd, .com, .cpl, .crt, .exe, .hta, .ins, .isp, .lnk, .mda, .mde,
.mdz, mp3, .msc, .msi, .msp, .mst, ocx, .pcd, .pif, .reg, .sct, .shs and vbs. In the event you
receive an email attachment that is not listed here and you are unsure if it is safe to open,
please send an e-mail to spamabuse@fns.usda.gov.
•
Sending an email that is inappropriate, or not authorized for distribution on the FNCS
network. An inappropriate email can include but not limited to profanity, sexual content or
abusive language.
Last Modified: 11/20/2015
For Official Use Only
Page 21 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Users may not send e-mail for work purposes through personal e-mail account without
prior approval from a supervisor, unless there is an extenuating circumstance, according to
the FNCS COOP plan.
•
Automatically forwarding emails to non-USDA email addresses without prior approval from
a supervisor.
•
Sending emails with sensitive organizational information to external parties (i.e., internet
protocol (IP) addresses, system information, vulnerability data, etc.).
•
Sending username and password information in clear text. Separate emails should be used
with encryption.
150
Internet Use
USDA DR 3300-1-I states that mission areas and staff offices may utilize the Internet to support
departmental and mission area responsibilities.
Below are guidelines for the acceptable and unacceptable Internet use at FNCS.
151
Acceptable Internet Use
Appropriate Internet use includes, but is not limited to:
•
Limited personal use of the Internet as long it does not interfere with official business nor
reflect adversely on FNCS Information Systems.
•
Communication and exchange of data between state and local governments, private sector
organizations, and educational and research institutions, both in the United States and
abroad.
•
Viewing inter-Agency non-sensitive data in support of departmental mission, FNCS
missions, or other official purposes.
•
Downloading and storing information related to official FNCS business on Government
Furnished Equipment (GFE) only.
152
Unacceptable Internet Use
Inappropriate Internet use includes, but is not limited to:
•
Accessing pornographic, gambling, on-line auction and other inappropriate sites.
•
Downloading, streaming, copying, sharing, or sending software, music videos, movies,
radio or pictures (whether purchased or not purchased) that are not job related as use of
Last Modified: 11/20/2015
For Official Use Only
Page 22 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
these constitute copyright violations and are a non-business use of limited network
bandwidth.
•
Using peer-to-peer software and file sharing products not expressly identified for
authorized use may not be used on or through FNCS servers and workstations, i.e. nonFNCS Instant Messaging (IM) Software.
•
Subscribing to ‘list servers’, ‘user groups’, or ‘bulletin boards’ that
authorized business needs.
160
do not align to
Telephone Equipment and Services
USDA DR 3300-1-F states that use of Government telephone systems (including cellular
telephones and calls over commercial systems which will be paid for by the Government) are in
place for the conduct of official business or limited personal use.
Below are guidelines on acceptable and unacceptable telephone use at FNCS.
161
Acceptable Telephone Use
Use of government telephone and mobile phone equipment and services for limited personal use
may be authorized if used according to the following acceptable use:
•
Use does not adversely affect the performance of official duties by the employee or the
employee’s organization.
•
Use could not have been reasonably accomplished at another time using another means.
•
It is provided for in a collective bargaining agreement.
•
FNCS Users are authorized to use Government telephone equipment and services to:
162
o
Call to notify family, doctor, etc., when an employee is injured on the job.
o
Contact family while on official business travel.
o
Make calls to arrange for emergency repairs for their residence or automobile while on
official business travel.
Unacceptable Telephone Use
Inappropriate telephone use includes, but is not limited to:
•
Accepting collect calls from non-government numbers.
Last Modified: 11/20/2015
For Official Use Only
Page 23 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Participating in a monitored or recorded telephone conversation without making the other
party aware of the monitoring and/or recording.
•
Telephone conversations over a speaker-phone or other audio equipment without listing
the names or numbers of persons included on the call.
•
International Calls by users are prohibited without prior supervisor approval.
164
Violating FNCS Information Resource Acceptable Use Standards
Violations of the Information Systems Security Guidelines and Procedures as stated in the 702
Handbook may lead to immediate removal from the FNCS Network and/or may be the basis for
disciplinary action. Supervisors and/or management officials considering disciplinary action must
consult with the Labor & Employee Relations Branch in the Human Resources Division prior to
taking any action.
170
International Travel
International travel consists of all travel outside the United States and its Territories. International
travel poses additional risk to GFE technology being utilized while on travel. Generally, access to
FNCS network resources and systems from foreign countries is prohibited unless approved by the
FNCS senior management in advance.
Users should understand that they are subject to the laws of that country, there is no expectation
of privacy in most countries, and wireless devices are particularly vulnerable to interception and
malware infection.
Users are expected to remain in compliance with all domestic policies when traveling
internationally, especially the policies highlighted below:
•
No GFE devices and removable media used domestically shall be used on foreign travel to
perform government related work. Only FNCS approved and furnished devices are
allowed.
To the extent possible, approved GFE must provide protection against malware and have up-todate antivirus, spyware, security patches, and firewall software installed.
Unneeded and unnecessary features shall be disabled in accordance with the agency secure
configuration baseline.
All sensitive information stored, transmitted or viewed on GFE and removable media shall be
protected in accordance with DR 3440-002, “Control and Protection of Sensitive Security
Information,” DM 3550-002, Chapter 10, Part 2, “Sensitive But Unclassified (SBU) Information
Protection.
Last Modified: 11/20/2015
For Official Use Only
Page 24 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Approved foreign travel devices including removable media should be configured to
encrypt stored data using USDA Regulation DR 3170-001 Appendix B Section 16.0 Policy
for the requirements governing data encryption.
•
GFE used for international travel shall be prepared as follows:
•
•
o
GFE devices and removable media will only be used in the performance of officially
sanctioned travel; if the devices are not essential to the mission, the equipment shall
not be taken.
o
FNCS shall document approval and acceptance of risk for any GFE, which includes,
but not limited to, laptops, Citrix token, mobile devices and removable media, allowed
to be used during travel.
o
Approved GFE for use while on travel shall be decommissioned or wiped immediately
upon return.
o
The servicing Information Technology (IT) unit shall make a copy of all GFE profiles,
including but not limited to, OS, configuration, signatures for system and applications
used on the device. This “snapshot” shall be used to evaluate any possible changes
made to the device upon return to the office.
o
Agencies and Offices shall consult with the Office of Homeland Security Emergency
Coordination (OHSEC) for current precautions to be observed for destination countries
prior to departure.
Upon return to FNCS after international travel, the GFE:
o
All equipment must be turned off or not used domestically until it can be examined by
the appropriate IT staff to ensure the GFE has not been modified or infected by
malicious code.
o
Shall not connect to any FNCS servers or networks for any reason prior to this
examination.
o
Shall have device passwords changed upon return to the United States (US).
Users shall exercise a higher level of due diligence in the protection of GFE while on
international travel than would be expected in the domestic environment.
o
GFE and removable media shall not be transported in checked baggage.
o
Whenever possible, GFE shall be powered off and the batteries removed and stored
separately from the device when not in use to minimize the opportunity for misuse.
Last Modified: 11/20/2015
For Official Use Only
Page 25 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
o
Foreign thumb drives, compact disks (CDs), or other media shall not be used in FNCS
GFE. If such use cannot be avoided, the GFE shall be assumed to be compromised
and shall be cleaned and/or reformatted as soon as feasibly possible.
o
FNCS GFE and removable media shall not be used with or in foreign equipment due to
the possibility of compromise.
o
Travelers must ensure physical security of the device while in transit and while on
international travel or foreign duty.
o
Public internet kiosks, cafes, and hotel Wi-Fi sites are particularly susceptible to
monitoring, data interception, and control by foreign entities. Transmission, storage or
printing of sensitive government and personal information is prohibited unless by an
area pre-approved for printing. Potential solutions for international printing: (1) USDA
in-country office location, (2) U.S. Embassy location, (3) U.S. Consulate location, (3)
other U.S.G. in-country office or approved printing location, and (5) portable printer.
o
If GFE is lost or stolen while on international travel, the loss must be reported to the
FNCS incident response team and the local US embassy or consulate immediately
upon detection/discovery.
Last Modified: 11/20/2015
For Official Use Only
Page 26 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on Accessing the FNCS Network
200
Overview
This guidance applies to all devices/technologies (to include but not limited to computers, laptops,
printers, personal digital assistants (PDAs), routers, firewalls, servers, switches, access points,
Universal Serial Bus (USB) network devices, etc. owned by FNCS or not) that are connected to
the FNCS Network. The procedures also apply to internal and remote access connections to the
FNCS Network. Personally-owned equipment (POE) is only permitted to access the FNCS and
USDA networks via Citrix.
The purpose of this 702 Handbook is document security policies and procedures, in accordance
with Federal government mandated requirements for connecting to the FNCS network from any
device. These standards are designed to minimize the risk of exposure to damage which may
result from authorized or unauthorized use of FNCS resources. Damages include the loss of
FNCS SBU information, Personally Identifiable Information (PII), intellectual property, damage to
public image and critical FNCS internal systems, etc. The following guidelines shall be observed
by all users connecting to the FNCS Network.
210
References
This guidance is written in accordance with:
•
•
•
•
220
NIST Special Publication 800-3 Rev. 4
DM 3525-003 USDA Telework and Remote Access
DM 3535-001 USDA CD Level of Trust Policy
DM 3530-000, 001, 004 USDA Security Protection
FNCS Network Access for Government-Furnished Equipment (GFE)
FNCS Internal Access
•
All requests for user level network access shall be made only after the successful
completion of the FNS-674 form. Please see Section 224 for details on requesting access to
the FNCS Network. Access granted is applicable to only those applications that are
necessary for the FNCS user’s job. New hires, temporary personnel, contract staff and
official visitors to FNCS must complete the USDA Information Security Awareness (ISA)
training prior to requesting access to the FNCS Network. New Employees will be given
these
materials
by
HR;
other
employees
please
e-mail
SecurityOfficers.Mailbox@fns.usda.gov to receive instructions for taking this CD or paperbased training. For new hires, communication should be initiated with the regional HR
Points of Contact to ensure compliance. For all other hires requiring access, employees
and supervisors should contact the Information Security Office (ISO).
•
Any equipment connecting to the FNCS Network within FNCS facilities shall conform to
FNCS OIT standards. Such devices shall adhere to FNCS software standards and security
controls (e.g., operating systems, antivirus software, service packs, hot-fixes, and FNCS
approved applications). System configurations shall not be changed, added or modified.
Last Modified: 11/20/2015
For Official Use Only
Page 27 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Any non-GFE brought into FNCS by employees, contractors or official visitors shall not be
connected directly to the FNCS Network.
•
An official warning banner shall be displayed before a user successfully gains access to
the FNCS Network. By clicking “ok”, the user has agreed to the terms as outlined in the
official banner. Refusal to agree will mean that the user will not be granted access.
Remote Access (VPN)
FNCS VPN access to Information Technology (IT) systems from remote location is provided to
FNCS users in a secure and effective manner.
FNCS VPN access is built into all employee furnished GFE laptops and is only permitted through
GFE laptops.
•
FNCS employees, contractors or official visitors requiring remote access to FNCS Network
resources shall conform to all security standards.
•
Devices connecting to the FNCS Network shall adhere to FNCS software standards and
security controls (e.g., operating systems, antivirus software, service packs, hot-fixes, and
FNCS approved applications). System configurations shall not be changed, added or
modified. FNCS users are required to connect via VPN to the FNCS network to ensure all
software patches, anti-virus software, etc. are up-to-date.
•
An official warning banner shall be displayed before a user successfully gains access to
the FNCS Network. By clicking “OK”, the user has agreed to the terms as outlined in the
official banner. Refusal to agree will mean that the user will not be granted access.
•
Network connections shall be terminated at the end of the session or after a maximum of
30 minutes of inactivity.
•
Connections to the FNCS network through the VPN will automatically disconnect a user
from the network when inactivity is detected for 30 minutes by the VPN server; however, if
the user is running Microsoft Outlook, the VPN will continue to stay connected. As a result,
users of FNCS VPN are reminded to always lock the desktop of all unattended devices
logged into VPN and to shut down Outlook when the application is not needed.
221
FNCS Network Access for Personally Owned Equipment (POE)
Remote Access (Citrix)
FNCS Citrix access is available through most Internet web browsers and may be accessed
through GFE, or POE.
•
FNCS employees, contractors or official visitors requiring remote access to FNCS Network
resources shall conform to all security standards.
•
Devices connecting to the FNCS Network via Citrix must have up-to-date antivirus
software, OS service packs, and hot-fixes applied. An official warning message shall be
displayed before a user enters in their login info to the FNCS Network. By clicking “OK”,
Last Modified: 11/20/2015
For Official Use Only
Page 28 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
the user has agreed to the terms as outlined in the official banner. Refusal to agree will
mean that the user will not be granted access.
•
222
POE access to the FNCS network is permitted only via FNCS Citrix.
FNCS Network Security Controls
•
Firewalls, VPN, router-based Access Control Lists (ACL) and audit logs shall be used to
control, restrict, and monitor all network access to any FNCS Network.
•
The Firewall, VPN and router-based ACLs should be monitored at least on a quarterly
basis by a system administrator. Any discrepancies should be noted and corrected during
the review.
•
All network traffic between FNCS locations shall be transported on dedicated FNCS/USDA
owned circuits and VPN connections meeting data encryption levels set by FNCS
encryption standards.
•
At any time, FNCS/USDA may monitor and/or audit user activity and/or network traffic.
•
Network routers, switches, wireless access points and hubs are points of vulnerability and
need to be managed centrally to ensure manageability, security and reliability.
Unauthorized FNCS Users are not permitted to extend or re-transmit network services.
•
Connections to the FNCS Network shall automatically lock a user from the network when
15 minutes of inactivity is detected by enabling a password protected screen saver.
223
FNCS Network Restrictions
•
FNCS offices shall not have Internet connectivity other than the connectivity provided by
FNCS/USDA. Users inside the FNCS firewall may not be connected to the FNCS Network
at the same time they are connected to any other network.
•
FNCS devices or any devices approved by FNCS shall not be used as a vehicle to gain
unauthorized access to other devices or networks for any illegal, unauthorized or
inappropriate activity.
•
FNCS employees and contractors are prohibited from remotely accessing the FNCS
network, systems, and any related component of the IT infrastructure from foreign
countries unless prior approval is provided by the CIO. Any unauthorized use from a
foreign country increases the risk of foreign access to information system access and will
result in immediate termination of access to the FNCS network. Additional consequences
may be taken into action depending on the severity of the incident. Please reference
section 170 for International Travel requirements.
•
FNCS employees and contractors are prohibited from installing and using unapproved
software and mobile code-based products (e.g., Flash, Java, and ActiveX). Unauthorized
software or mobile code installation increases the risk in introducing vulnerabilities onto the
FNCS network. Users may request software installation from an approved software list
established by OIT and distributed via DSB. If a user needs software or mobile code that is
Last Modified: 11/20/2015
For Official Use Only
Page 29 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
not on the approved software list, the user may submit a service ticket to DSB for OIT
review.
•
FNCS Users shall only use network Internet Protocol (IP) addresses issued by FNCS.
Selecting or manually entering an IP address to configure a computer network device is
prohibited.
•
The use of private IP addressing behind FNCS firewalls and proxy servers, as well as the
use of Network Address Translation (NAT) is prohibited unless authorized.
•
An unauthorized deliberate attempt to obtain proprietary (non-public information) FNCS
Network information is prohibited. This applies to all FNCS Network locations, and the
wide area network (WAN).
•
Unauthorized FNCS users are prohibited from downloading, installing or running security
programs or utilities that reveal weaknesses in the security of a system. FNCS users may
not run password cracking programs, packet sniffers, network mapping tools, or port
scanners while connected in any manner (remotely or internally) to the FNCS Network
unless approved by FNCS management.
224
How to Request Access to the FNCS Network
After completing the required Information Security Awareness (ISA) training, complete the FNS
User Access Request form, FNS-674. This form can be accessed through the Intranet (E-forms)
or by contacting the Service Desk (IT Customer Support).
•
If you currently have access to the FNCS Network and need to request access to the
FNCS systems requiring e-Authentication access, you must request the appropriate level 2
e-Authentication User ID.
•
Attach the ISA training certificate to form FNS-674 and submit to your supervisor for
signature. Submit both documents to the Service Desk. Regional Security representatives
will be notified through the Information Security Office.
Upon approval:
o
Users will be notified when access has been granted.
o
Users must report to their corresponding OIT Security Office to obtain an FNCS
network user ID and temporary password.
o
Users must contact the Service Desk and request to have user profiles and Outlook
set-up.
o
Users are provided with and required to read the Rules of Behavior. Pending the type
of access provided, the FNS-674 form is required to be signed.
o
Users may refer to Appendix B of this document for instructions on how to fill out FNS
674 access forms.
Last Modified: 11/20/2015
For Official Use Only
Page 30 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
225
If you currently have access to the FNCS Network and need to request privileged access to
the FNCS systems, you must request the account using form FNS-674.
o
How to log on and off the FNCS Network (Internal and Remote)
•
After receiving an FNCS network user ID and password, the user is required to change the
temporary password immediately. Please see the Access Control Procedure on creating
acceptable passwords.
•
Prior to logging onto the FNCS network, the user is prompted to read and acknowledge the
Official warning banner. By selecting “ok”, the user has agreed to the terms as outlined in
the official banner. Refusal to agree will mean that the user will not be granted access.
•
Users must connect Government-Furnished Equipment (GFE) to the FNCS Network every
30 days for a minimum of 120 minutes to ensure the device receives updates to virus
definitions, operating systems and hot fixes. Computers which are identified as not updated
on a 30 day window will not be allowed to join the network.
•
To log off the FNCS network, the user must be fully logged onto the FNCS network. Select
the Ctrl-Alt-Del keys simultaneously, when the task manager dialog box is open, choose
“log off”. Also, a user can click the “Start” menu of the Windows Task bar and select the
“Log off” button.
226
How to lock a workstation
While a user is successfully logged onto the FNCS network, their network sessions must be locked
if they leave the work area. Select the Ctrl-Alt-Del keys simultaneously, when the task manager
dialog box is open, choose “lock computer” or on the task bar, select the “lock computer icon”. All
FNCS users are encouraged to shut down their computers at the end of each day. For
workstations using a PIV card, the user must pull out their PIV card to lock station. Each
workstation needs to be locked when a user leaves their workstation.
227
Separation from FNCS
All users are required to send an E-mail to the Security Officers Email Address,
SecurityOfficers.Mailbox@fns.usda.gov, when access to a particular computing resource is no
longer required for reasons that may include project completion, work assignment transfers,
retirement, termination, or resignation.
All FNCS supervisors will have their employee’s complete form FNS 677, Final Salary Payment
Report. FNCS employees can request to have their Outlook contacts saved to a CD by the IT
Staff.
All FNCS separating contractors’ CORs will complete form FNS 744, Government Contractor’s
Employee Separation Checklist (GCESC). The COR will ensure that the checklist is completed
with all applicable signatures on the last day of employment.
All FNCS Students/Interns/Volunteers will follow relevant procedures outlined in the Personnel
Termination section of the 702 handbook. Note that accounts for students/interns/volunteers will
be disabled after 30 days and deleted in 90 days.
Last Modified: 11/20/2015
For Official Use Only
Page 31 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
228
Process for Accessing another User’s Data
Users who require access to another user’s FNCS data may submit a request for access with a
valid business justification.
Request should be submitted with business justification to the Director of Human Resources for
federal employees or to the Contracts Director for contractors.
If you are not the employee/contractor’s COR, the COR should also be CC’ed or be the one to
initiate the communication.
The CISO and CIO should also be CC’ed on the communication; the CISO will make sure the
request is submitted to the Service Desk once all approvals are in place.
229
Collaborative Computing Devices
FNCS must ensure that information system prohibits remote activation of computing devices with
expectations identified in the department policy under DM 3530-003 and DM 3530-005.
230
Public Key Infrastructure Certificate
FNCS must ensure that public key certificates are issued under identity access and management
policy DM 3530-003 and DM 3530-005 and approved by the department.
Last Modified: 11/20/2015
For Official Use Only
Page 32 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on the Protection and Use of Wireless technologies
300
Overview
Wireless is a technology that permits the active transfer of information between separated points
without physical connection. Currently, FNCS permits the use of wireless technologies to connect
to the FNCS Network. Users who connect to FNCS wirelessly must comply with the organizations
rules and regulations regarding wireless technologies.
310
References
This guidance is written in accordance with:
•
•
320
DM 3300-005 Policies for Planning and Managing Wireless Technologies in USDA and
DM 3300-01 Wireless Communications
Wireless Technology Guidelines
Wireless technology guidelines are intended to help everyone use FNCS’s Wireless network
responsibly, safely, and efficiently thereby maximizing the availability of these facilities to all
employees.
321
•
•
Current State of Wireless Technologies at FNCS
FNCS does not currently support a wireless networking infrastructure that provides access
to the FNCS network and resources. FNCS does currently provide guest wireless access
to the Internet. GFE with Wi-Fi capabilities may be used to access Citrix and VPN.
FNCS has approved the use of the following wireless devices/technologies:
o
Smart phone/Personal Digital Assistant (PDA) – Only approved users
o
Government Issued Air Card or MiFi – Only approved users
All wireless services and devices are to be procured through OIT via the Designated Agency
Representative (DAR) and the Telecommunications Mission Area Control Officer (TMACO) only.
322
Home/Commercial Use
Anyone using a home/commercial wireless network to connect to the FNCS Network will comply
with all USDA Wireless policies for securing information. When using a home/commercial wireless
network to connect to the FNCS Network, users must access the FNCS network via VPN or Citrix.
If a user is connected via a wireless network or FNCS approved wireless device, the user is not to
be simultaneously connected to the local FNCS network.
323
Wireless Connection Rules
The purpose of the FNCS Wireless network is to allow guest users connectivity for internet only
access. As a FNCS guest user, guests have an obligation to conduct activities in keeping with the
Last Modified: 11/20/2015
For Official Use Only
Page 33 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
FNCS mission, goals, and objectives. All use of the FNCS Wireless network, must be consistent
with this purpose.
The Wireless Connection Rules are intended to help guests use the FNCS Wireless network
responsibly, safely, and efficiently. A guest user must adhere to the FNCS Rules of Behavior and
follow the terms when using the FNCS’s wireless resources. Complying with rules will maximize
access to these facilities and help ensure the use is responsible legal respectfully of privacy.
Users shall abide with following:
Comply with the Intended Use of The Wireless network.
•
Do not conduct unauthorized business.
•
The purpose of the FNCS Wireless network is to allow connectivity allowing guests to be
more productive. All use of the FNCS Wireless network, must be consistent with this
purpose. The following are appropriate uses of the FNS Wireless network:
•
o
Exchange of information that supports the FNCS mission, goals, and objectives.
o
Communications and exchange of information intended to maintain job currency or gain
additional knowledge that is directly or indirectly related to job functions.
o
Communications and exchange of information generally supportive of otherwise
acceptable uses.
Engaging in any activity that would discredit the FNCS, including the creation,
downloading, viewing, storage, copying, or transmission of sexually explicit and/or sexually
oriented materials or materials related to gambling, illegal weapons, terrorist activities, and
any other illegal activities or activities otherwise are prohibited.
Do not attempt to circumvent any security controls.
•
FNCS has implemented security controls to prevent inappropriate access and monitor
traffic. All users should be aware of the restrictions in place and never attempt to
circumvent these controls. Any attempt to circumvent the implemented security controls
will be viewed as malicious activity on the network.
•
Do not attempt to connect unauthorized devices to wireless network. The wireless service
is not to be connected to the FNS wired internal network. The FNCS may terminate,
modify, limit use of, make changes to, or modify the Terms of Service of this capability at
any time without notice.
Use the Wireless FNCS Network Ethically.
•
Appropriate use of the FNCS Network includes maintaining the security, protecting privacy,
and conforming to applicable laws, particularly copyright and harassment laws.
Last Modified: 11/20/2015
For Official Use Only
Page 34 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Do not transmit sensitive data.
o
•
Anything with sensitive personnel data such as names with Social Security numbers,
leave balances, salaries, or any other PII.
In efforts to create a work environment free from all forms of harassment. As a Wireless
connection user should not use these resources in any way that unreasonably interferes
with anyone’s work or creates an atmosphere where others feel harassed. Any FNCS
employee who feels harassed should seek assistance and resolution of the complaint.
Use the Wireless FNS Network Responsibly
In order for the FNCS to obtain maximum use of its Wireless connection, users should carefully
evaluate the use of these resources and not overly tax processing and storage capabilities or
restrict access by other users. You are encouraged to observe the following:
•
Do not overload or abuse the wireless network.
•
Avoid sending e-mail attachments larger than 1 megabyte.
•
Do not download voice or video files from the Internet.
Last Modified: 11/20/2015
For Official Use Only
Page 35 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on Incident Response and Reporting
400
Overview
FNCS must be able to respond to computer security incidents in a manner that protects its
information and helps to protect the information of other Agencies that may be impacted by the
incident.
A security incident is defined to be any adverse event that threatens the security of information
resources. Adverse events include compromises of confidentiality, integrity, and availability of
FNCS IT and telecommunications resources. This guidance will assist FNCS users (employees,
contractors or official visitors) to properly identify, declare and report security incidents.
Refer to the current Incident Response Procedure version for the detailed incident response
procedure. The document represents the formal documented FNCS information security policies
and addresses purpose, scope, roles responsibilities, and compliance as they pertain to
information security.
410
References
This guidance is written in accordance with:
•
•
•
•
420
NIST Special Publication 800-53 Rev.4
NIST Special Publication 800-61 Rev. 2
NIST Special Publication 800-86
DM 3505-000 USDA Computer Incident Response Procedures Manual
Loss of Personally Identifiable Information (PII)
Personally Identifiable Information (PII) refers to information that can be used to distinguish or
trace an individual’s identity. PII can include information or combinations of information such as
social security numbers (in complete or truncated form), place of birth, date of birth, mother’s
maiden name, biometric record, fingerprint, iris scan, DNA, medical history, medical conditions,
financial information, credit card numbers, bank account numbers, etc. USDA is committed to
protecting PII for employees, contractors and customers.
The following are procedures on how to notify the appropriate authority of any suspected incident
in a timely manner:
•
•
During business hours, if there is an actual loss or potential loss of PII, please contact the
Security Incidents mailbox at Security_Incidents@fns.usda.gov or call the OIT Service
Desk: 888-OIT-4FNS.
After normal business hours, please contact the USDA toll-free PII Incident Hotline at 1877-PII-2YOU. The hotline is available 24 hours a day, 7 days a week.
Last Modified: 11/20/2015
For Official Use Only
Page 36 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
421
All Other Incidents
All other incidents should follow the Incident Response procedures as communicated from the
Information Security Office and follow the FNCS Incident Response Standard Operation Procedure.
Last Modified: 11/20/2015
For Official Use Only
Page 37 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on Audit & Accountability of the FNCS Network
500
Overview
An audit of FNCS Information Systems consists of a systematic examination to determine whether
or not activities and their associated results comply with Information Systems Security standards
and guidelines.
The purpose of this guidance is to provide details for conducting and implementing the security
audits on FNCS Information Systems. Auditing is the process of identifying problems, and
deficiencies in an information system for the purpose of correcting such issues. Auditing is
necessary to protect information resources from harm or misuse.
Below are common security threats including but not limited to:
•
Access to confidential data
•
Unauthorized access to computers
•
Password disclosure
•
Detection of Viruses
•
Denial of Service (DoS)
•
Open ports, which may be accessible to the public
•
Use of other IP addresses, not assigned by FNCS
Audits may be conducted to:
•
Ensure integrity, confidentiality and availability of information and resources.
•
Assess, analyze, or investigate security incidents.
For systems requiring audit logging and monitoring (typically determined by the business), FNS
requires that at a minimum, execution of privilege functions and failed login events are logged and
monitored.
510
References
This guidance is written in accordance with:
•
520
NIST Special Publication 800-53 Rev.4
Audit and Accountability Guidance
It is the responsibility of members from the Information Security Office, System Administrators, and
System Security Officers to:
•
Create and maintain an auditable events list for each Information System within FNCS.
o
Manage the selection of auditable events to be included in audit logs.
o
Review audit logs at least once a week or when unusual or suspicious activity occurs.
Last Modified: 11/20/2015
For Official Use Only
Page 38 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Protect audit records and audit mechanisms from unauthorized access, modification or
deletion.
•
The following list is representative of audit events for FNS information systems including
but not limited to servers, network devices, and applications:
•
o
Servers, at minimum, will audit the following events:
System events, including:
• Server startup and shutdown
• Loading and unloading of services
• Installation and removal of software
System alerts and error messages, including:
• Logins, successful and failed
• Remote access attempts, successful and failed
• Unauthorized attempts to access sensitive information and systems
• Host based IDS alerts
System administration activities, including
• Modifications of access controls
• Account changes, including modifications of privileges
• Modifications to system files.
Other security related events as may be required for Incident Response.
o
Network devices (router, firewall, or other major network device), at minimum, will
audit the following transactions:
Device startup and shutdown
Administrator logon and logoff
Configuration changes
Account creation, modification, or deletion
Modifications of privileges and access controls
System alerts and error messages
o
Applications, at minimum will audit the following events:
Modifications to the application
Application alerts and error messages
User sign on and sign off
System administration activities
Accesses to sensitive information
Modifications of privileges and access controls
Significant application-specific actions (ex: changes to pricing information)
The following list is a list of content of audit records for information system audit logs:
o
Type of event;
Last Modified: 11/20/2015
For Official Use Only
Page 39 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
o
o
o
o
o
Date and time of the event, e.g. Time stamps are synchronized, every hour, with a
defined system clock;
Where the event occurred;
Event origin (software/hardware)
Outcome (success or failure) of the event.
User’s identity, if applicable;
•
Allocate audit storage space to handle the FNCS audit mechanism.
•
Provide information system alerts for designated personnel when audit record storage has
reached 75% of its capacity.
•
Authorize and properly trained to post public content onto the Information system to ensure
that information does not contain non-public content. These individuals are responsible for
ensuring that all information to be posted on the Information system has been thoroughly
reviewed and approved prior to posting. If any non-public information is incorrectly posted,
it must be removed from the Information System immediately upon discovery. This control
only applies to an information system that has publicly accessible content.
•
Provide capabilities to perform monitoring, analysis and reporting of incidents.
•
Respond to alerts for potential or confirmed security incidents.
•
Review audit reports to assist in security incident investigations.
•
Perform audit reviews on a daily basis.
•
Archive audit logs and maintain for a minimum of three (3) years.
Last Modified: 11/20/2015
For Official Use Only
Page 40 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on Access Control for FNCS Information Systems
600
Overview
In computer security, access controls include authorization, authentication and audit. Access
control protects information by managing access to all entry and exit points, both logical and
physical. Perimeter and logical security measures protect against unauthorized access to
sensitive information stored on the FNCS network or applications.
The purpose of this guidance is to maintain information security by preventing unauthorized
access to FNCS Information systems and data. This guidance is reviewed and updated at least
annually. The Access Control Guidance is written to:
•
•
•
•
610
Communicate the need for access controls within FNCS.
Establish specific requirements for protecting against unauthorized access.
Define FNCS user privileges, password restrictions and login limitations.
Provide guidelines for Identification and Authentication.
References
This guidance is written in accordance with:
•
•
620
NIST Special Publication 800-53 Rev.4
DM 3535-001 USDA C2 Level of Trust Policy
FNCS Access Control Guidance
•
FNCS mainly uses Microsoft Active Directory to manage all information systems that
establish, activate, modify, review, disable, and remove user accounts. eAuthentication
accounts are also used to manage user accounts for externally, and some internally,
accessible web applications.
•
Accounts that are created, modified, disabled and terminated are to be reviewed as
determined by the system owner. All FNCS information systems must manage information
system accounts by reviewing accounts for compliance with account management
requirements at least annually.
•
Automated mechanisms should be employed to ensure that account creation, modification,
disabling, and termination actions are audited and, as required, appropriate individuals
must be notified.
•
FNCS systems should prevent non-privileged users from executing privileged functions to
include disabling, circumventing, or altering implemented security safeguards and/or
countermeasures.
•
FNCS systems should end user authentication sessions after 30 minutes of inactivity.
•
Accounts inactive for more than a month are automatically disabled.
Last Modified: 11/20/2015
For Official Use Only
Page 41 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Temporary and emergency accounts are automatically disabled after the appropriate time
as determined by the system owner – 48 hours.
•
System Owners may restrict access to system objects such as: files, directories, devices,
databases and programs based on the identity of the users and/or groups to which they
belong, these controls are Discretionary Access Controls.
•
FNCS shall establish separation of duties that allow appropriate information system
authorization based on individual or role.
•
A FNCS user may request access to information based on a need-to-know basis. This will
be determined by the executive or manager deemed to be the system owner of the asset.
•
FNCS shall implement least privilege (most restrictive settings) that grants users only those
accesses required to perform their duties. User listings which show least privilege settings
for administrators will be updated on an annual basis or as needed after a major update.
•
FNCS requires that users with access to the security functions use non-privileged
accounts when accessing non-security functions.
•
A FNCS user under OIG or law enforcement investigation, can have his privileged account
revoked.
•
FNCS shall establish a limit of three (3) concurrent sessions on high impact systems as
defined by FIPS 199 security baseline categorizations. Currently, no high impact systems
exist at FNS.
•
FNCS shall establish object reuse capabilities to ensure storage objects/devices that store
SBU information are rendered inaccessible before the object/device is used for other
purposes. All FNCS laptops and workstations will be re-imaged when the device is no
longer used by the FNCS employee or contractor.
621
FNCS Recertification of Access Controls
•
All system user access lists must be reviewed and recertified at a minimum of once a year
by the System Owner, and/or as needed by the System Owner based on risk. This review
includes all user privilege levels to any or all portions of a system.
•
Recertification forms can be found on the Intranet (E-Library). Once a recertification is
completed, the signed form must be submitted to the Information Security Office (ISO) and
signed by the ISSM.
640
FNCS Password Guidance
641
General User - Password Guidelines
General users do not have administrative rights on a system or application.
Last Modified: 11/20/2015
For Official Use Only
Page 42 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Passwords to any system used for FNCS business are confidential and must not be
shared.
•
General user accounts shall have passwords with a maximum sixty (60) day age limit and
a minimum one (1) day age limit.
•
User passwords must be twelve (12) or more characters in length containing upper and
lower case, alphanumeric, and special character combinations (at least one of each).
•
Dictionary words used for passwords are prohibited.
•
User accounts are locked after five (5) consecutive failed invalid logon attempts during a
maximum of 15 minutes. If this occurs, call the Service Desk or submit a work order via
the IT Customer Support Web portal to report that your account is locked. Follow
instructions given by the Service Desk.
•
As a routine courtesy, the system will notify the user in advance when passwords will
expire.
•
When prompted, change your password within the allocated time given. A history of 24
previously used passwords are maintained, please do not repeat passwords.
•
Do not automate passwords through use of function keys, scripts or other methods that
store passwords on systems.
•
Do not store passwords within near proximity of the workstation, such as underneath the
keyboard, behind the monitor, under the desk, etc.
•
Please refer to Appendix C for Password Hints.
642
Privileged User - Password Guidelines
Privileged users are users who have administrative type access for all or part of an operating
system or application, e.g. System or LAN Administrator.
•
Passwords to any system used for FNCS business are confidential and must not be shared
with others.
•
Privileged account holders will have at least two (2) accounts, one for privileged use and
one for common network use such as e-mail and Internet access.
•
Privileged accounts will not be e-mail or Internet enabled.
•
Privileged user accounts shall have passwords with a maximum thirty (30) day age limit
and a minimum one (1) day age limit.
•
User passwords must be twelve (12) or more characters in length, containing alphanumeric
and special characters.
•
Dictionary words used for passwords are prohibited.
Last Modified: 11/20/2015
For Official Use Only
Page 43 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
User accounts are locked after three (3) consecutive failed invalid logon attempts during a
maximum of 15 minutes. If this occurs, call the Service Desk or submit a work order via
the IT Help Desk Tracking System, Alloy, to report that your account is locked. Follow
instructions given by the Service Desk.
•
As a courtesy, the system will notify the Network user prior to the expiration of passwords.
•
When prompted, change password within the allocated time given.
•
Do not repeat passwords since the system maintains a history of the last 24 passwords.
•
Passwords cannot be shared between privileged users.
•
Do not automate passwords through use of function keys, scripts or other methods that
store passwords on systems.
•
Once privileged users leave or their accounts are terminated, their access accounts are
disabled.
•
Please refer to Appendix C for Password Hints.
643
Service Accounts - Password Guidelines
Service accounts are privileged accounts that are used by an application or service to interact with
other systems or applications. These accounts typically have elevated privileges and should be
protected.
•
Service account passwords must be twelve (12) or more characters in length, containing
alphanumeric and special characters.
•
Dictionary words used for passwords are prohibited.
•
Service accounts shall have passwords that are changed on an annual basis.
644
•
Password guidelines for Government-Furnished Wireless PDAs
User passwords must be eight (8) or more characters in length, containing alpha, numeric
and special characters.
•
The number of incorrect password attempts are currently set to seven (7) during a
maximum of 15 minutes, if this limit is exceeded, the device is wiped. If this occurs,
contact the Service Desk.
•
Government Furnished Wireless PDAs must have the USDA mandated security
configuration settings and software installed. These settings are FIPS 140-2 compliant and
users are not allowed to modify or delete these settings.
•
Lock the device after five (5) minutes of inactivity.
Last Modified: 11/20/2015
For Official Use Only
Page 44 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
645
Acceptance of PIV Credentials
Multifactor authentication for remote access to FNCS Information Systems, is used for privileged
and non-privileged accounts, such that one of the factors is provided by a device separate from
the system gaining access and the device meets USDA policy for multifactor security
requirements.
•
FNCS systems accept PIV credentials from other federal agencies.
•
FNCS systems use FICAM-approved third-part credentials, FICAM-approved information
system components, and FICAM-issued profiles.
646
Device Identification and Authentication
FNCS must ensure that information systems uniquely identify and authenticate components in
inventory that support the ability to connect to outside systems before establishing a remote
and/or network connection.
Last Modified: 11/20/2015
For Official Use Only
Page 45 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on IT Restricted Space and Physical Access Control
700
Overview
The United States Department of Agriculture, Food, Nutrition and Consumer Services houses
and/or processes information relating to the privacy of US citizens, payroll and financial
transactions, proprietary information and life/mission critical data. It is essential that this
information be protected from the risk and magnitude of loss or harm that could result from
inadvertent or deliberate disclosure, alteration or destruction.
FNCS must protect information resources through layered physical security, high logical data
security and effective security procedures and administration. Successful IT security protection
dictates the physical control of restricted space that contains major FNCS computer and
telecommunications resources.
This procedure will define the physical security standards for all IT restricted space(s) located at
FNCS facilities. This procedure includes the physical access control requirements for Computer
Facilities, Telecommunications/Local Area Network (LAN) Rooms, IT equipment storage rooms,
Web Farms, Sensitive Compartmented Information Facility (SCIF) and isolation zones.
710
References
This guidance is written in accordance with:
•
•
•
720
NIST Special Publication 800-53 Rev.4
DM 3510-001 USDA Physical Security Standards for IT Restricted Space
GSA Facilities Standards P100
Physical Environment
FNS leases restricted space from General Services Administration (GSA). FNS policy and
procedures for Physical and Environmental Protection adheres to policies and standards provided
through the GSA Facilities Standards, P100, and the USDA Physical Security Standards for
Information Technology Restricted Space, DM 3510-001. Property Management Branch receives
delegated authority for protection of the FNS secured space through GSA.
721
Roles and Responsibilities
The key roles and responsibilities for carrying out the provisions of this Handbook are outlined
below.
722
•
The FNCS CIO will:
Inform the Property Management Branch of their duties on maintaining and managing user
access to IT restricted space(s).
•
Approve and implement this procedure.
•
Review and approve all modifications to this procedure.
Last Modified: 11/20/2015
For Official Use Only
Page 46 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
720
•
The FNCS Supervisors and point of contacts (POC) will:
Provide contractors and non-FNCS employees with form FNS 767 to complete when
access to IT restricted space is requested.
•
Ensure form FNS 767 is complete, approved and forwarded to the appropriate System
Owner for approval.
721
•
The System Owners will:
Authorize user requests for data center access by approving form FNS 767.
•
Forward form FNS 767 to the
SecurityOfficers.Mailbox@fns.usda.gov.
•
FNCS System Owners are:
o OIT Director of Technology or their representative
722
•
Information
Security
Office
(ISO)
at
The Information Systems Security Program Manager (ISSPM) will:
Approve form FNS 767 after the System Owner and Supervisor approval.
•
Forward form FNS 767 to the Property Management Branch for final processing.
•
Conduct reviews of all FNCS IT restricted space and ensure they are compliant to physical
security requirements as outlined in DM 3510-001 USDA Physical Security Standards for
Information Technology Restricted Space.
723
The Physical Security Branch will:
•
Maintain all user access requests to IT restricted space by generating monthly reports of
user access sending them to Operational Security. Operational Security performs audits for
unauthorized access.
•
Remove access to users who have been inactive for 90 days.
•
Remove all access for users who have been terminated: FNCS employees, contractors
and others who are no longer at FNCS.
•
Ensure that all user access requests to IT restricted spaces meet the appropriate security
standards required to receive access.
•
Block access to IT restricted space for those individuals who lack the required security
authorization.
•
Perform user recertification, quarterly. See section 725 for details on recertification.
724
•
•
FNCS Users will:
Request access to IT restricted space by completing Form FNS 767.
Notify the ISO when access to IT Restricted Space is no longer needed.
Last Modified: 11/20/2015
For Official Use Only
Page 47 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Escort guests who request access to IT Restricted Space and ensure they have signed-in
via the IT restricted space sign-in sheet. Guests include but are not limited to:
o Fire detection personnel
o Alarm system personnel
o Air Conditioning maintenance personnel
o UPS maintenance personnel
o Hardware maintenance personnel
o Software maintenance personnel
o Other Vendors
•
In the event that the automated system is not functional (power outages, etc.), the
restricted space needs to maintain a log of user access via a manual process such as a
sign-in sheet.
725 IT Restricted Space and User Access Recertification Process (Property Management
Branch)
Step 1: The Facility Management Branch will produce a site-specific list of all users who have
access to FNCS IT restricted space.
Step 2: The Technology Division will review and determine which users need access to IT
restricted space at least on an annual basis or as needed
Step 3: The annual recertification of user access will be performed only for those users
deemed necessary to continue accessing IT restricted space.
Step 4: The Facility Management Branch and the appropriate point of contact from the
Technology Division will take appropriate actions to modify or terminate user access as
indicated by the results of the recertification process.
Step 5: FNCS Management will review and verify results of the recertification and ensure the
Facility Management Branch has the appropriate corrective action plans in place.
Step 6: The Information Security Office will retain all recertification documents for five (5)
years.
Guidance on FNCS Computer Security Awareness and Training
800
Overview
The Federal Information Security Management Act (FISMA) mandates general training of
employees to ensure that they are aware of their security responsibilities; specialized training of
agency employees with significant security responsibilities; and reporting of agency statistics on
security awareness and training efforts.
This procedure will detail plans to develop, conduct and implement computer security awareness
and training as required by USDA and FISMA. This procedure will also provide guidance on
reporting and monitoring training and creating an information security training program for
specialized information security professionals at FNCS.
Last Modified: 11/20/2015
For Official Use Only
Page 48 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
This procedure is applicable to all FNCS employees, contractors and official visitors who engage
in FNCS business.
The procedure is reviewed and updated at least annually.
810
References
This guidance is written in accordance with:
•
•
•
•
820
NIST Special Publication 800-53 Rev.4
NIST Special Publication 800-16
NIST Special Publication 800-50
DM 3545-001 Computer Security Training and Awareness Policy
Information System Security Awareness
The FNCS Information Security Office (ISO) will conduct computer security awareness campaigns
by distributing interactive electronic-based training.
Other informal security awareness promotion will be conducted on a frequent basis in the form of
emails, posters, videos and hard copy reading materials, all designed to encourage information
system security awareness at FNCS.
830
Information Security Awareness (ISA) Training
ISA training is currently implemented annually by USDA.
ISA training consists of an interactive, electronic-based training module that provides computer
security information and assessments of that information.
Basic security awareness training must be provided and completed annually.
All FNCS employees, contractors and official visitors, regardless of their job duties are required to
complete this training with a passing score. If the employee does not pass with a score of at least
70%, the employee may take the training two more times with different versions of the test.
Currently, the ISA training is available on AgLearn. All users must request an eAuthentication ID
then register with AgLearn to access the security training modules. For more information on
eAuthentication follow this link, http://www.eauth.egov.usda.gov/index.html. For additional
information on AgLearn, click here, http://www.aglearn.usda.gov/.
831
ISA Training Requirements
Information Security Awareness Training requirements are to be included in all new procurement
requests, specifications, statement of work (SOW), grants and cooperative agreements. The
security requirements will detail the appropriate level of training needed based on the job duties,
access and need-to-know.
Last Modified: 11/20/2015
For Official Use Only
Page 49 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
ISA training requirements are to be included in new employee orientation at FNCS. All FNCS
new-hires are required to complete this training prior to receiving access to the FNCS Network.
The ISA training certificate must accompany the Form FNS-674, User Access Request Form.
The FNCS ISO will participate in the annual review and redesign of the security awareness
program and vendors to ensure the training is accurate.
Information systems security professionals are encouraged to request additional training as
needed for their job functions at FNCS.
832
ISA Specialized Training Requirements
In accordance with NIST Special Publication 800-16, Information Technology Security Training
Requirements, the Department mandates that all IT Professionals with specific information security
responsibilities are required to complete IT Security Specialized Training.
As an IT Professional with specific information security responsibilities, once you have been
identified, you will need to complete the annual IT Security Specialized Training. Failure to
complete this training by the deadline may result in the temporary removal of your individual rights,
roles, and responsibilities where those individual attributes impact the security of the system or
application.
833
ISA Training Records
Individual training records, including security awareness training certificates and specific
information systems security records are retained for a minimum of one year.
834
Role-Based Security Training
Personnel with assigned security roles and responsibilities are trained before authorizing access to
the information system or performing assigned duties, and trained again at a minimum annually
thereafter.
Last Modified: 11/20/2015
For Official Use Only
Page 50 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on Assessment and Authorization (A&A) of Information Systems at FNCS
900
Overview
The Office of the Chief Information Officer (OCIO), Agriculture Security Operations Center
(ASOC), Compliance, Audits, Policy & Enforcement (CAPE) provides oversight for the United
States Department of Agriculture’s (USDA) Assessment and Authorization (A&A) program,
formerly known as the Certification and Accreditation (C&A) program. The program is based on
guidance provided in the National Institute of Standards and Technology (NIST) Special
Publication (SP) 800-37 Revision (Rev.) 1, Guide for Applying the Risk Management Framework
to Federal Information Systems: A Security Life Cycle Approach; mandates identified in the
Federal Information Processing Standards (FIPS) Publication (Pub)199, Standards for Security
Categorization of Federal Information and Information Systems; FIPS Pub 200, Minimum Security
Requirements for Federal Information and Information Systems; and USDA enhancements
created to accommodate the Department’s environment.
The intent of the Continuous A&A process is to evaluate Information Technology (IT) systems
against documented specific information security requirements, verify information security control
test results, summarize the residual risk, and involve the Department’s senior management (the
System Owner and the Authorizing Official (AO) in the security lifecycle of the system. Each
system will go through the Continuous A&A process every year, but only 1/3 of their controls will
be tested each year.
This guide is designed to lead System Owners and certification and risk assessment teams
through the USDA's Continuous A&A process. It provides a basic understanding of the process
steps and examples of what information to input (system information and documents) into the
Cyber Security Assessment Management (CSAM) System.
910
References
This guidance is written in accordance with:
•
•
•
•
•
•
920
USDA Six Step Risk Management Framework (RMF) Process Guide
USDA DM 3540-001 Risk Assessment Methodology
NIST SP 800-37 Rev 1
NIST SP 800-53 Rev 4
FIPS Publication 199
FIPS Publication 200
Roles and Responsibilities
This sections details the responsibilities of all teams and individuals who are impacted by or
involved in system A&As. System owners will be responsible for developing A&A documents.
921
•
•
The CIO will:
In coordination with the System Owner, determine when a Continuous A&A is needed for a
system after a major change has occurred.
Act as the Certifying Official for FNCS. As appropriate, the CIO may delegate this
responsibility to a Security Officer, but must continue to recognize their accountability in
that delegation.
Last Modified: 11/20/2015
For Official Use Only
Page 51 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
922
•
The Authorizing Official (AO) will:
Authorize systems for operation.
•
Act in the role of Business Owner to a system being certified.
•
Assume the responsibility for the residual risks of operation of the systems.
•
Approve security requirements documents, memoranda of agreement (MOA), memoranda
of understanding (MOU) and any deviations from security policies.
923
•
The System Owner will:
Represent the user community and IT system throughout the systems’ life cycle.
•
Ensure the system is delivered and operating in accordance with the security controls
documented in the security plan.
•
Uphold training requirements by ensuring system users and security support personnel
receive security training.
•
Work with the IT Project Manager (ITPM) throughout the Continuous A&A process.
•
Create POA&Ms for deficiencies along with milestone dates and submit to the ISSM/ITPM.
924
•
The IT Project Manager (ITPM) will:
In coordination with the ISO, maintain the Continuous A&A schedule for all existing
systems.
•
Notify the Systems Owners of upcoming Continuous A&As.
•
Oversee the system maintenance, operation and disposal.
•
Submit the completed A&A documents to the ISO templates to System Owners for each
phase of the Continuous A&A.
•
Perform a preliminary review of the Continuous A&A documents.
•
Provide updates to the ISO on the system’s Continuous A&A progress.
•
Report suggested changes to Continuous A&A documents from the ISO to the System
Owners.
•
Work with ISO to ensure security controls based on NIST 800-37 rev 1, are included in
system documentation.
925
•
The ISSM will:
Monitor the physical, personnel, incident handling, security awareness and training needs
of a system on a daily basis.
Last Modified: 11/20/2015
For Official Use Only
Page 52 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Identify the pending system or environment changes that may necessitate re-assessment
and re-authorization of the system.
•
Serve as the principal technical advisor to the ITPM for all security-related issues.
926
•
•
The Assessment Team will:
Receive approval by the Certifying Official (CO) prior to commencement of the Continuous
A&A.
Consist of individuals independent of the IT infrastructure and business function:
o
Members of the Assessment Team have not been involved in development of the
system.
o
Members of the Assessment Team have not been involved in other certification
activities such as writing the System Security Plans (SSP) and conducting the risk
assessments.
•
Perform the security control assessment on the system to validate the results of the risk
assessment.
•
Create POA&Ms for deficiencies found, if any, during the evaluation. POA&Ms will be
created after discussing potential weaknesses with System Owner and their representative.
•
Validate that the controls listed in the SSP are present and in operation.
•
Update the SSP, if needed.
•
Update the Risk Assessment, if needed.
927
•
The Authorization Team will:
Identify, assess, and document the risks associated with the operating system.
•
Identify the level of residual risk to the system.
•
Assess the vulnerabilities in the system.
•
Determine if the security controls are correctly implemented and effective.
•
Coordinate Continuous A&A activities and consolidate the final Continuous A&A package.
928
Additional Continuous A&A Guidance
FNCS follows the six step approach to achieve an Authority to Operate (ATO) and to effectively
manage risk for their systems. FNCS uses the Cyber Security Assessment and Management
(CSAM) as its automated FISMA management tool and the system of record to capture system
Last Modified: 11/20/2015
For Official Use Only
Page 53 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
information throughout the A&A process. At USDA, all system information, documentation, and
assessment results require recording in CSAM
930
General Information
1. A&A’s are initiated upon the creation of a new system
2. Continuous A&As are performed every year
3. Only 1/3 of the controls and the USDA selected “Key” controls will be tested
4. If a system undergoes a major change, it may need to undergo a full A&A
5. Refer to the Child System and Application Assessment Policy, V1.0 for determining if a
system is a parent or a child. The document represents the formal documented FNS
information security policies and addresses purpose, scope, roles responsibilities, and
instructions of assessment and the categorization of an application.
6. Systems may use modified Continuous A&A process if their system categorization rating is
“low” in all three of the assessment categories; confidentiality, availability and integrity
7. The Continuous A&A process consist of six (6) steps:
7.1.
Step 1- Categorize the Program/System
7.2.
Step 2 - Select Security Controls
7.3.
Step 3 – Implement Security Controls
7.3.1.
Step 3a – Implement Security Controls
7.3.2.
Step 3b – Concurrency Review
7.4.
Step 4 – Assess Security Controls
7.4.1.
Step 4a – Assess Security Controls
7.4.2.
Step 4b – Submit the Package for Final Concurrency Review
7.5.
Step 5 – Authorize Information System
7.6.
Step 6 – Monitor Security Controls
931
Step 1: Categorize the Program/System
Step 1 of the RMF focuses on the collection of general system information, completing the Privacy
Threshold Assessment (PTA), Privacy Impact Assessment (PIA) and completion of the FIPS 199
system categorization. This collected information includes the mission, environment, boundary
definition, architecture, and information the system transmits or processes. The system owner is
responsible for completing the categorization and may require the participation of the information
system security officer or others as needed.
Last Modified: 11/20/2015
For Official Use Only
Page 54 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Requirements for All Systems/Programs
•
•
•
•
•
Collect general system information
Create CSAM entry and enter information
Create PTA and upload to CSAM
Perform security categorization
Enter remaining information in CSAM
System Identification (Purpose, attributes,
funding, etc.) and Narratives (System
description and Technical description)
Potential Additional Requirements
• Perform PIA and upload to CSAM
• Perform E-Authentication Risk
Assessment and upload to CSAM
(under Appendix G5: E-Auth Risk
Assessment OMB M04-04)
Table 2 – RMF Step 1 Requirements (Categorization)
Below is the overall process for RMF Step 1.
Begin Step 1
Process 1.1
Collect system information
• Is the data contained in system correct?
• PTA/PIA reviewed by Privacy Office?
• Does categorization reflect data risk?
Process 1.2
Perform PTA and the PIA, if required
Categorizati on
System Owner
accepts
categorization
(H,M,L)
Process 1.3
Perform the system categorization
-
Step 1
Contact System Owner
and resolve issues
No
Yes
Begin Step 2 – Select
security controls
Figure 1 – RMF Step 1 Process (Categorization)
932
Step 2: Select Security Controls
Just as FIPS 199 and NIST 800-60, Rev. 1 are mandatory for the categorization of information
systems, FIPS 200 and NIST 800-53, Rev. 4 are mandatory for the selection of the corresponding
security control baselines. Once the FIPS 199 security categorization of the information system is
documented in CSAM, the corresponding set of controls (high, moderate or low) will automatically
be selected for the information system within CSAM. This security control baseline must then be
tailored within CSAM to include the selection of inherited controls and the documentation of the
implementation of each control.
Last Modified: 11/20/2015
For Official Use Only
Page 55 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Requirements for All Systems/Programs
• Identification of all common/inherited
controls
• Compliance descriptions identified for every
control including tailoring
• Create any needed compensating controls
• Develop Contingency Plan (CP), CP test
training and testing documents
Potential Additional Requirements
•
•
•
•
•
•
508 Compliance
System of Record Notice (SORN)
Configuration Management Plan(CMP)
Incident Response Plan (IRP)
Disaster Recovery Plan (DRP)
Interconnection Security Agreement
(ISA) (Optionally this could be in the
form of a Memorandum of
Understanding (MOU) or Service Level
Agreement (SLA) )
Table 3 – RMF Step 2 Requirements (Select Security Controls)
Below is the overall process for RMF Step 2.
Begin Step 2
Process 2.1
Identify common controls
• Common controls available?
• All controls documented?
• SSP accepted by System
Owner?
Process 2.2
Tailor controls and document in
CSAM
Process 2.3
Develop a strategy to monitor
the controls
System
Owner
Accepts SSP
Contact System Owner
and resolve issues
No
Yes
Begin Step 3
Implement security
controls
Figure 2 – RMF Step 2 Process (Select Security Controls)
Step 2 focuses on completion of the compliance descriptions in CSAM for all security controls. The
documentation includes the identification of all common controls, selection and documentation of
the remaining controls, and any tailoring or compensating controls.
Last Modified: 11/20/2015
For Official Use Only
Page 56 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
At USDA, identification of the controls the system can inherit is the responsibility of both the
common controls provider and the system owner and/or ISSO/ISSPM. In the case of Department
Program Management controls, this may involve the Department’s CIO and/or CISO. The
common controls provider must publish what controls are inheritable in CSAM and may also have
them listed in other documents that are required by the data centers and/or other service
providers. The controls are then formally documented as an appendix to the ISA which is then
confirmed by signature by the common controls and/or data center provider.
933
Step 3a: Implement Security Controls
Step 3 focuses on the implementation of security controls during system development and/or after
the system has been completed. Implementation of the security controls is the responsibility of the
System Owner and/or the common controls provider where controls are inherited. Once the
controls are implemented, the SSP compliance descriptions, CP, CMP and IRP should be finalized
to capture the true “as-built” implementation. A CMP, IRP, and CP may need to be developed for
the system unless these are covered under another plan elsewhere in the hosted environment.
Requirements for All Systems
• Finalize SSP compliance descriptions
• Finalize CP
Potential Additional Requirements
• 508 Compliance
• Finalize CMP, IRP and DRP (If required)
Table 4 – RMF Step 3 Requirements (Implement Security Controls)
Below is the overall process for RMF Step 3a.
Figure 3 – RMF Step 3 Process (Implement Security Controls)
Last Modified: 11/20/2015
For Official Use Only
Page 57 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
934
Step 3b: Concurrency Review
When the SSP is complete, it needs to be submitted for Step 3 concurrency review. The user
submits an email to the concurrency review team at Cyber.Communication@usda.gov stating the
package is ready for review in CSAM.
This concurrency review is primarily for the security plan and the categorization; however, the
supporting documents (CP, CMP, ISA, PTA, and/or PIA) that are present at the time of the review
will also be reviewed. If the concurrency review team finds any issues with the documentation,
they will notate the issues in the concurrency review checklists and return the checklists to the
agency. The key items for the Step 3 review are the system categorization and the security plan.
Since Issues with the remaining documents do not have a significant effect on testing they can be
addressed concurrently with performing Step 4 testing. The checklists utilized for concurrency
review are located in Appendix C.
The result of the concurrency review is either passage of the system to Step 4 (Assess Security
Controls), or the documentation is returned for further refinement with a checklist of items to
remediate. Agencies cannot proceed to Step 4 until notified via concur memo that the system has
successfully completed the Step 3b concurrency review. If the documentation is returned with a
remediation checklist noting issues identified with the security plan, system categorization or other
documents to be addressed, the system must be re-submitted to the concurrency review manager
for verification that the issues have been adequately addressed.
Upon satisfactory completion of concurrency review, the concurrency review manager will ensure
that the RMF Step 3 concur memo is issued. Once the RMF Step 3 concur memo is issued, the
SSP shall not be modified without first discussing the changes with the COE liaison and the
concurrency review team. The SSP should not be unilaterally modified by the System Owner until
after the Program/system is authorized to operate
935
Step 4: Assess Security Controls
The purpose of this step is to determine the extent to which the security controls in the information
system are implemented correctly, operating as intended, and producing the desired outcome with
respect to meeting the security requirements for the system. This step also addresses specific
actions to be taken or planned to correct deficiencies in the security controls, and to reduce or
eliminate known vulnerabilities in the information system.
Please note that the RMF Step 4 (Assessment) for moderate/high systems must be performed by
a different (independent) entity than the one utilized for RMF Steps 1-3 (Documentation and
Implementation).
The term independent assessor is defined as follows:
•
•
•
An independent assessor is one who is impartial and not influenced by the system owner
or their direct staff during the conduct of the assessment of security controls or the
reporting of the results.
Independent assessors and/or assessment teams may be in-house permanent teams or
outsourced as needed. However the services are performed, strict measures must be put
in place to obtain an impartial assessment result.
To obtain impartiality, the system owner should not be directly involved in the management
of, or contracting for, the assessment services. If this cannot be done, the system owner
Last Modified: 11/20/2015
For Official Use Only
Page 58 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
•
must put in place strict measures and/or contracting language to ensure that they cannot
influence said assessment services.
The assessor (contractor’s company) cannot be directly or indirectly involved in the
development, management, or operation of the security controls to be assessed.
If a system is working through RMF steps 4 through 6 for the first time, assessment of this
system must be performed by a different contractor than the one that performed RMF steps
1 through 3.
An independent assessor or ISO team must ensure that Plans of Actions and Milestone
(POA&M) are developed for information that document the planned remedial actions to
correct weakness or deficiencies noted during assessment and to reduce and eliminate
known vulnerabilities in the system.
Tasks Performed by Certifier
•
•
•
•
System Owner Requirements
• Provide certification coordination
Develop Security Assessment Plan
with Certifier
Assess security controls
• Ensure support system
Analyze findings / quantify results
Develop/update Plans of Action and Milestones
(POA&Ms)
administration personnel are
available during testing
• Ensure system is ready for testing
Table 5 – RMF Step 4 Tasks (Assess Security Controls)
Last Modified: 11/20/2015
For Official Use Only
Page 59 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Below is the overall process for RMF Step 4.
Figure 4 – RMF Step 4 Process (Assess Security Controls)
936
Step 4b Submit the Package for Final Concurrency Review
The system owner/ISSPM/CISO sends an email to the concurrency review team at
Cyber.Communication@usda.gov stating the package is ready for review in CSAM. The
concurrency review team will review the system’s Step 4 documentation against the concurrency
review checklists for compliance with NIST and Departmental standards. This concurrency review
covers all Continuous A&A package documents. At the conclusion of the concurrency review
process, the System Owner/Authorizing Official will receive either a concur memorandum from
CAPE with a recommendation to proceed to authorization or one or more checklists listing items
that must be remediated and re-reviewed prior to the issuance of a concur memorandum
937
Step 5 Authorize Information System
During Step 5, the required evidence is produced to provide the AO with the information needed to
make an informed risk based decision. The residual risk report documents the risk determined for
the vulnerabilities found during assessment of the security controls. The subsequent POA&Ms
include costs and remediation plans.
Last Modified: 11/20/2015
For Official Use Only
Page 60 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Tasks Performed by
System Owner (SO)
Authorizing Official (AO)
• Remediate AO identified issues if
• Review/validate risk, POA&M and ATO
necessary to achieve ATO
constraints with System Owner
• E-mail ATO letter to
• Generate authorization
Cyber.CSAM@ocio.usda.gov and
recommendation or denial with System
owner involvement
request to update the restricted ATO field
in CSAM
Table 6 – RMF Step 5 Tasks (Authorize Security Controls)
During authorization, the certification official or ISSPM gathers the key Continuous A&A package
documents (Step 4 concur memorandum, POA&M, Security Assessment Report, and SSP) for the
AO/DAA to make a decision concerning the authority to operate (ATO). The AO/DAA weighs any
remaining vulnerabilities and risks of system operation and then determines what residual risk to
accept, what remedial actions are required (i.e., POA&Ms), and whether or not to issue an ATO.
Below is the overall process for RMF Step 5.
Figure 5 – RMF Step 5 Process (Authorize Security Controls)
Last Modified: 11/20/2015
For Official Use Only
Page 61 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
938
Step 6 Monitor Security Controls
Once the system is authorized for operation, it is ready to enter the continuous monitoring phase.
Continuous monitoring consists of three tasks: (1) configuration management and control; (2)
security control monitoring; and (3) status reporting and documentation.
The purpose of this step is to provide oversight and monitoring of the security controls in the
information system on an ongoing basis and to inform the AO when changes occur that may
impact the security of the system. Continuous monitoring activities ensure that secure system
management, operation, and maintenance preserve an acceptable level of residual risk.
The activities in this step are performed continuously throughout the life cycle of the information
system.
Tasks Performed by
System Owner (SO)
Authorizing Official (AO)
• Review system changes and start reaccreditation if major change occurs
• Remediate POA&Ms
• Document updates to SSP, CP, CMP, IRP
• Continual scanning of information systems for
• Review/validate risk, POA&M, system
changes, and documentation with
System Owner annually
vulnerabilities
• Review the system and complete the “System
Annual Review Memo” found in Appendix B
of this document annually
Table 7 – RMF Step 6 Tasks (Monitor Security Controls)
Below is the checklist for Step 6, Monitor Security Controls.
•
Validate that the vulnerability scanning is being accomplished and configuration
management issues remediated in a timely fashion.
•
Validate that progress is being made on POA&Ms items and milestones are updated in
CSAM. Existing Plans of Action and Milestones (POA&M) are updated at least quarterly
based on the finding from security controls assess and continuous monitoring activities
•
Validate that key controls and the set of controls defined for assessment in that fiscal year
are tested annually (reference Appendix E for the sets of controls to assess).
•
Annually complete the “System Annual Review Memo” found in Appendix B - Templates to
this document.
Last Modified: 11/20/2015
For Official Use Only
Page 62 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Below is the overall process for RMF Step 6.
Begin Step 6
Process 6.1
Review system changes and start
re-accreditation if major change
occurs
Process 6.4
Continual scanning of
information systems for
vulnerabilities
Monthly
Annually
If Changed
Continually
Process 6.3
Document updates to baseline
(SSP, CP, CMP, IRP)
Process 6.2
Remediate POA&Ms
Process 6.5
Continuous Assessment
(See Continuous Assessment Process)
Figure 6 – RMF Step 6 Process (Monitor Security Controls)
Last Modified: 11/20/2015
For Official Use Only
Page 63 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on the Information Systems Security Program (ISSP) for FNCS
1000
Overview
On January 23, 2002, Congress enacted Public Law, 107-347, E-Government Act of 2002. The
Federal Information Security Management Act (FISMA) of 2002, Title III, of this law requires that
each agency have effective information security controls over Information Technology (IT) to
support Federal operations and assets and provide a mechanism for improved oversight of
Federal agency information security programs. This Act was designed to strengthen OMB Circular
A-130, Appendix III that initially established specific requirements for all agency security programs.
As technology has grown more complex and open, the need for effective Federal information
security programs in each agency and staff office is essential. In USDA, this program is referred
to as the Information Systems Security Program (ISSP).
USDA has undertaken an aggressive role in support of E-Gov to include ensuring that IT systems
have been certified and accredited or otherwise authorized as being properly secured. All of these
actions require that each agency ISSP be responsive and responsible in supporting security
requirements. The material in this guidance is designed to outline the responsibilities of FNCS’
ISSP and to specifically define the security roles of the Agency Administrator or Head, Chief
Information Officer (CIO) and Information Systems Security Program Manager (ISSPM). These
positions are vital components in securing FNCS information technology assets by providing
effective agency management and oversight of its ISSP.
1010
References
This guidance is written in accordance with:
•
•
•
1020
NIST Special Publication 800-50
DM 3545-001 Computer Security Training and Awareness Policy
DM 3545-002 USDA Information Systems Security Program (ISSP) Policy
Purpose
The purpose of this guidance is to establish, organize, implement and maintain an ISSP that
ensures IT security compliance within FNCS.
Establishment of the ISSP ensures that security is adequately addressed in all phases of the
System Development Life Cycle (SDLC), CPIC process, operations, maintenance activities and
other IT functions. The FNCS agency ISSP will include the following responsibilities:
•
•
•
•
•
•
Create a Security Plan for the FNCS Security Program.
Categorize sensitivity of information and information systems in accordance with FIPS 199.
Conduct regular risk assessments for IT systems and computing devices.
Implement effective risk mitigation strategies.
Manage the formal Certification and Accreditation (C&A) of all agency IT systems.
Monitor security controls throughout the System Life Cycle.
Last Modified: 11/20/2015
For Official Use Only
Page 64 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
•
•
•
•
•
•
•
•
•
•
•
1030
Use the Capital Planning and Investment Controls (CPIC) process to formulate and plan
security costs for all systems.
Monitor the system Configuration Management (CM) process of all systems.
Maintain agency annual Program and System Security Plans.
Manage an effective Security Awareness and Training Program.
Manage the agency Security Incident Response Program.
Conduct annual self-assessments of the agency IT systems using NIST 800-53.
Monitor IT systems using audit trails, control logs and other mechanisms.
Establish an electronic inventory of all IT systems and computing devices.
Maintain an IT system inventory in the FNCS approved systems.
Disseminate Department policy and procedures to all agency personnel.
Respond to regular and ad hoc reporting requirements and audits by internal or external
agencies.
Monitor agency compliance to USDA, OMB, NIST and other governing bodies’ policy for
security.
FNCS ISSP Structure
FNCS has elected an alternative structure for the ISSP. An alternative structure is useful in
agencies that have more than 1,000 IT users. Currently, FNCS has approximately 1,700 users
that are made up of employees and contractors. The FNCS Information Security Office (ISO) is
responsible for implementing FNCS’ ISSP. Within the hierarchy of OIT, the ISO will be located
under the Office of the Chief Information Officer.
The Alternative structure of an ISSP consists of a three-tier management approach, ISSPM, ISSM
and ISSO:
•
•
•
The duties of the ISSPM, ISSM and ISSO shall be designated as the agency sees fit, as
long as all responsibilities are designated in writing and effectively executed.
The Associate CIO for Cyber Security (ACIO CS) must be notified in writing, that an
Alternative ISSP is being implemented at FNCS.
The FNCS CIO has formally designated one (1) Information Systems Security Program
Manager (ISSPM) via the “Designation of ISSPM and Deputy ISSPM” form.
Last Modified: 11/20/2015
For Official Use Only
Page 65 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
CIO
CISO
Deputy CISO/ISSPM
Information Security Office
(ISO)
ISSM
ISSM
ISSM
ISSO (s)
Figure 7 – OIT Information Security Office Management 4-Tier Structure
1040
Management Structure of the ISSP
The Chief Information Security Officer (CISO) and Deputy CISO/ISSPM:
The duties and responsibilities of a CISO and Deputy CISO are diverse, comprehensive and
complex. This position is responsible for understanding and mitigating the Agency’s information
system risks. This position is also responsible for leading investigatory and compliance work. The
CISO, Deputy CISO/ISSPM, and some ISSM positions, as defined by OIT leadership, should be
considered High Risk Public Trust positions as defined by 5 CFR 731. As a result, FNCS must
ensure that the individuals in these positions have the appropriate level of background
investigation completed. Additionally, FNCS is responsible for determining the National Defense
sensitivity level of these positions as defined in 5 CFR 732 and obtaining the appropriate level of
security clearance. Individuals in these positions will have a direct reporting relationship with the
Last Modified: 11/20/2015
For Official Use Only
Page 66 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
USDA Agriculture Security Operations Center (ASOC) and will require a level of clearance
meeting with the USDA ASOC’s minimum security clearance requirements. Information Systems
Security Manager (ISSM):
The ISSM is responsible for managing the tactical efforts of a business, functional, or operational
entity within an agency. Their responsibilities include the daily operational security issues of the
business area and overall management of the “front line” security requirements for the business
area. This individual may often be called upon to assist in the resolution of certain system
security issues.
Information Systems Security Officer (ISSO)
The System Owners shall appoint as many Information Systems Security Officers (ISSOs) as
necessary to comply with this guidance. This person is responsible for the day-to-day security
administration for one or more information systems. Theirs is an operational security effort
regarding the system(s) for which they are responsible. The ISSOs will be responsible for
coordinating audit and certification/accreditation activities. The ISSOs will work closely with and
report directly to the ISSM assigned to their system.
1050
ISO Roles and Responsibilities:
1051
The CIO will:
1. Act as or designate the FNCS Chief Information Security Officer (CISO).
2. Support the strategic requirements of the ISSP.
3. Ensure adequate funding, training and resources are provided to the ISSP to support the
agency mission.
4. Facilitate the resolution of high-level security matters within the agency by acting as a
proponent for ISSPM.
5. Serve as the Certifying Official for FNCS security requirements (i.e., Annual Security Plans,
FISMA, C&A and other formal reporting requirements, waiver requests and certification of
agency IT Systems).
6. Determine the need for C&As with the System Owner.
7. Communicate to the ACIO CS in writing, the designated ISSPM.
8. Designate a Contingency Planning Coordinator (CPC).
9. Other responsibilities for the CIO are written in the procedures for C&A, IT Contingency
Planning, SSP, SDLC, CPIC and IT Restricted Space and Physical Access Control.
1052
The CISO/Deputy CISO/ISSPM will:
1. Manage the agency ISSP including the activities and training from USDA Enterprise
training vehicles of the ISSM/ISSOs.
Last Modified: 11/20/2015
For Official Use Only
Page 67 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
2. Support the strategic security program requirements to include: planning, budget analysis,
Department policy review and internal policy formulation, agency FISMA, POA&M and
audit reporting requirements, agency Security Architecture and agency IT CPIC.
3. Consolidate individual security reports from all functional and operation business areas into
one agency combined report (i.e., monthly scans, patches, incidents) for higher level
management, including ACIO CS.
4. Monitor progress of the ISSM/ISSOs to ensure that they meet the necessary program
security requirements of NIST 800-53 and departmental policy directives.
5. Serve as the principle consultant to the agency CIO and senior management, including the
ACIO CS, on the Agency’s security posture, policy, procedures and strategic planning
6. Submit all system SSPs to the Office of Cyber Security by the last working day of April
each year. Include POA&Ms for security weaknesses not corrected from the prior year
submissions.
7. Coordinate agency Incident Response with the ISSM/ISSOs to include all associated
actions necessary to mitigate the risk to business area systems.
8. Oversee the implementation of agency security policies, procedures and guidelines and
ensure compliance.
9. Participate in monthly Information Technology Management Group (ITMG) and Information
Security Sub-Council (ISSC) meetings.
10. Monitor server room access list with ASD; verify and approve list quarterly.
11. Host monthly ITMG & ISSC sub-meetings with ISSMs, ISSOs, and Privacy Officer to
disseminate information.
12. Communicate with the OIT/Security liaisons in other agencies and USDA.
13. Lead the development of the agency security architecture for all IT systems, including data
encryption standards.
14. Oversee the C&A process. Oversee Contingency and Disaster Recovery Plans for each
site, in coordination with COOP.
15. Approve updates to SSPs.
16. Enter all POA&Ms into the USDA approved tool.
17. Create and disseminate updated security document templates to the ITPM, System
Owners and Contractor/Development Teams.
18. Lead special projects, e.g. CSAMS development, 702 handbook updates, etc.
19. Ensure that ISSM/ISSOs are designated to provide adequate security to business,
functional or operational entities.
20. Ensure that the designated ISSPM is a permanent member of all system development,
telecommunications planning and the System Development Life Cycle (SDLC) planning
teams.
Last Modified: 11/20/2015
For Official Use Only
Page 68 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
21. Ensure that the ISSPM receives role-based and specialized security-based training.
1053
The ISSM will:
1. Serve as point of contact (POC) for all information security matters and provide subject
matter expert guidance to agency personnel.
2. Manage C&A process every three years or when major system changes occur.
3. Ensure all systems follow and complete the C&A process prior to actual operation.
4. Review Privacy Impact Analysis (PIA) annually in coordination with the Privacy Officer.
5. Review Systems of Record Notice (SORN) annually in coordination with the Privacy
Officer.
6. Create and disseminate updated security document templates to the ITPM, System
Owners and Contractor/Development Teams.
7. Disseminate/Issue departmental security policy and procedures.
8. Create and monitor compliance with the agency Communication Plan.
9. Ensure FISMA compliance in the System Development Life Cycle (SDLC), operations,
maintenance and other IT functions of all FNCS systems.
10. Ensure FISMA compliance in telecommunications planning.
11. Attend system status meetings as the subject matter expert for security.
12. Perform internal self-assessments and audits of IT systems to ensure compliance with
federal and departmental policy and procedures, includes Annual OMB A-123 selfassessments, FISMA and annual on-site security reviews.
13. Participate in general and role-based security training to enhance knowledge and skill
level.
14. Enforce system security controls that protect agency information using authentication
techniques, cryptography, firewalls, logical and physical access controls and
comprehensive departmental incident response procedures with all system administrators
(SA) and system owners.
15. Assist in the categorization of information systems and determine sensitivity levels in
coordination with system owners.
16. Lead the development of disaster recovery, contingency plans and other emergency plans
for IT systems. Ensure all plans are NIST compliant.
17. Lead the effort to test disaster recovery and contingency plans as directed by the ISSPM.
18. Monitor physical spaces to ensure that the security requirements of IT restricted spaces
are upheld.
19. Assist in the planning of IT restricted space which includes advising the
Last Modified: 11/20/2015
For Official Use Only
Page 69 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
ISSPM when IT restricted space does not comply with security requirements.
20. Assist in managing a Security Awareness program that is compliant with departmental
policy.
21. Participate in the development of FNCS architecture for IT systems.
22. Monitor and coordinate patch management and scanning techniques for all systems.
23. Participate in identification and mitigation of all system vulnerabilities.
24. Evaluate system environments for security requirements and control including: IT Security
architecture, hardware, software, telecommunications, security trends and associated
threats and vulnerabilities.
25. Implement system security controls that ensure the protection of Sensitive but Unclassified
(SBU) information.
26. Coordinate the provision of security controls for Portable Electronic Devices (PEDS) and
other wireless technology.
27. Participate in the Overall Agency Security Plan and coordinate with Information ISSOs to
ensure that current system specific plans are in place for all IT systems.
28. Coordinate or participate in risk assessments of all systems and mitigate vulnerabilities.
29. Monitor Configuration Management (CM) practices to ensure that security controls are
maintained over the life of the IT systems, and formulate and prepare an electronic agency
inventory for business area computing devices.
30. Plan and document security costs for IT investments and systems.
31. Prepare and update reports to ensure that systems comply with mandated internal and
external security reporting requirements, including monthly OMB A-123 Reporting and
CPIC.
32. Monitor quarterly LAN/Application user recertification for all systems.
33. Proactively participate in new CS initiatives including, but not limited to, computer
investigations and forensics.
34. Prepare and coordinate system owner Incident Responses with the agency ISSPM to
include all associated actions necessary to mitigate the risk to systems.
35. In coordination with the ISSO, conduct annual NIST 800-53 self-assessments and create
POA&Ms.
36. Participate in special projects as directed by the ISSPM.
1054
The ISSO will:
1. Be knowledgeable of Federal, Departmental, and agency security regulations when
developing functional and technical requirements; serve as a POC for system users with
security issues.
Last Modified: 11/20/2015
For Official Use Only
Page 70 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
2. Manage security controls to ensure confidentiality, integrity and availability of information;
build security into the system development process and define security specifications to
support the acquisition of new systems; develop testing processes that ensure adequate
testing of security controls, either by recreating production environment or by developing
tests that provide the same effect.
3. Review and sign off on system procurement requests to ensure that security has been
considered and included.
4. Assist with security controls and associated costs in the CPIC Process.
5. Perform monthly patching.
6. In coordination with the ISSM, conduct annual NIST 800-53 self-assessments and create
POA&Ms.
7. Participate in the Risk Management meetings.
8. Prepare and update reports to ensure that the system(s) complies with mandated internal
and external security reporting requirements, including monthly Patching & Scanning
Certification and monthly FISMA scorecard.
9. Provide artifacts and data to the ISSM for monthly A-123 reports, annual A-123 Audits and
annual on-site security reviews.
10. Create POA&Ms as needed after scans and patch reports.
11. Ensure adherence to system security controls that protect Sensitive But Unclassified (SBU)
information using authentication techniques, encryption, firewalls, and access controls.
12. Report all incidents to the ISSPM in following Incident Response Procedures.
13. Participate in the C&A process, including updates to the overall Agency and System
Security Plans (SSP) for the program; serve as a key advisor in risk assessments of all
systems and mitigate vulnerabilities; adhere to CM practices to ensure that security
controls are maintained over the life of IT systems; update the electronic agency inventory
for all agency computing devices.
14. Develop Disaster Recovery/Contingency Plans (DR/CP) and other emergency plans for
systems, and update annually. Develop, test, and maintain system contingency plans,
backup and storage procedures; document all procedures according to departmental and
agency standards; conduct annual executable or table-top DR tests and create POA&Ms;
Update system SORN annually in coordination with ISSM and Privacy Officer. Update
SSP, Risk Management Plan (RMP) and CMP annually Audit and monitor application,
system and security logs for security threats, vulnerabilities and suspicious activities; report
suspicious activities to the agency ISSPM; Participate in identification and mitigation of all
system vulnerabilities.
15. Grant access and password requests after receiving authorization from system owners or
from authorization officers designated by system owners.
16. Update the CCB Charter annually and as needed, and CCB minutes as needed.
Last Modified: 11/20/2015
For Official Use Only
Page 71 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
17. Support and facilitate the security awareness, training and education program; follow up
with users for annual CSAT and Privacy training;
18. Participate in monthly Security Office/Privacy meetings.
19. Assist the ISSM in any other security related duties, as required; participate in special
projects as directed by the ISSPM.
Last Modified: 11/20/2015
For Official Use Only
Page 72 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on Risk Management at FNCS
1200
Overview
Protection of information assets and maintaining the confidentiality, integrity and availability of
FNCS information assets and telecommunications resources are vital in meeting FNCS program
delivery requirements. Implementation of security measures such as a risk management program,
effective security controls, certification and accreditation of IT systems and updated security plans
are vital components in our response to this situation.
Risk “is the net negative impact of the exercise of a vulnerability, considering both the probability
and the impact of occurrence”.
This guidance provides the strategies used to implement an FNCS Risk Management (RM)
Program. RM includes a structured approach to assessing risk, identifying vulnerabilities,
reporting, accepting risk, implementing appropriate mitigation strategies and continuous evaluation
and assessment of information resources. Procedure is updated and reviewed annually.
1210
References
This guidance is written in accordance with:
•
•
•
•
NIST Special Publication 800-53 Rev. 4
NIST Special Publication 800-30
USDA DM 3540-000 Risk Management Program
USDA DM 3540-001 Risk Assessment Methodology
1220
FNCS Risk Management
1221
Risk Assessment Guidelines
Risk assessments evaluate the sensitivity and criticality of the system or application data to the
vulnerabilities, threats, impacts, and potential countermeasures that may exist in its environment.
A risk assessment includes the following activities:
• Conduct System Characterization
• Conduct Vulnerability and Control Analysis
• Conduct Threat Analysis
• Conduct Impact Analysis
• Develop Risk Mitigation Strategies
• Determine Risk Levels
• Develop Business Cases
• Report Residual Risks
Risk assessments are performed for new system development and major system modifications.
Risk assessments are performed on systems and major applications every three (3) years.
USDA has established a risk assessment methodology. For the complete methodology on
assessing risk, please refer to the USDA DM 3540-001 Risk Assessment Methodology.
Last Modified: 11/20/2015
For Official Use Only
Page 73 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
SYSTEM
CHARACTERIZATION
CONDUCT
VULNERABILITY &
CONTROL ANALYSIS
CONDUCT THREAT
ANALYSIS
RISK
ASSESSMENT
INITIATION
CONDUCT IMPACT
ANALYSIS
MAJOR
SYSTEM
CHANGE
REPORT THE
RESIDUAL RISK
DEVELOP A RISK
MITIGATION
STRATEGY
DETEMINE THE RISK
LEVEL
Figure 8 – General USDA Risk Assessment Methodology
Step 1:
1. Identify system mission, review system architecture and determine system boundaries,
interfaces and data flow.
2. Determine data categories and sensitivity.
3. Understand system users.
4. Review system security policies.
Step 2:
1. Conduct manual assessments.
2. Conduct automated scans, penetration tests and security control assessments.
3. Review previous security plans and risk assessments.
Step 3:
1. Determine threat types.
2. Develop a listing of threat sources.
3. Determine probability of threat occurrence.
Last Modified: 11/20/2015
For Official Use Only
Page 74 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Step 4:
1. Consider data categories.
2. Determine mission impact severity in terms of confidentiality, integrity and availability.
Step 5:
1. Determine threat probability of occurrence.
2. Determine impact criticality.
Step 6:
1. Review threat list.
2. Determine impacts.
3. Implementation countermeasures.
4. Develop a threat mitigation list based on available resources.
Step 7:
1. Document remaining risk(s) and a plan for future action.
2. Include residual risk in Certification and Accreditation package.
1222
Risk Mitigation Guidelines
The process for risk mitigation is as follows:
•
Review each potential threat and the action(s) that are necessary to reduce or eliminate
the threat such as adding access controls to critical assets.
•
Determine the cost of mitigating the threat to the organization.
•
Decide whether the financial output is possible for each threat. For instance, what
hardware or software measures will add protection and is the cost justifiable.
•
Implement the solution that reduces or mitigates the threat.
•
Risk mitigation is a systematic methodology used by senior management to reduce mission
risk.
•
Risk mitigation can be achieved through any of the following risk mitigation options:
1. Risk Assumption. To accept the potential risk and continue operating the IT system or
to implement controls to lower the risk to an acceptable level.
2. Risk Avoidance. To avoid the risk by eliminating the risk cause and/or consequence
(e.g., forgo certain functions of the system or shut down the system when risks are
identified).
3. Risk Limitation. To limit the risk by implementing controls that minimize the adverse
impact of a threat’s exercising vulnerability (e.g., use of supporting, preventive,
detective controls).
4. Risk Planning. To manage risk by developing a risk mitigation plan that prioritizes,
implements, and maintains controls.
Last Modified: 11/20/2015
For Official Use Only
Page 75 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
5. Research and Acknowledgment. To lower the risk of loss by acknowledging the
vulnerability or flaw and researching controls to correct the vulnerability.
6. Risk Transference. To transfer the risk by using other options to compensate for the
loss, such as purchasing insurance.
1223
Risk Evaluation and Assessment Guidelines
Within the SDLC Operations/Maintenance phase, each system is a part of the continuous
monitoring process. FNCS continuous monitoring includes the monitoring of risks identified in risk
assessments and evaluating risks that were discovered and accepted. This is an ongoing
process.
1230
Risk Acceptance Guidelines
A Risk Management Acceptance report is to be completed and submitted to the ISSPM when
vulnerabilities are found within a system and the System Owner accepts the risk (vulnerability).
This includes discovery of vulnerabilities through:
•
•
•
•
Recognition by a user or system administrator.
An equipment or network scan.
An annual self-assessment.
The Certification and Accreditation (C&A) and security control assessment process.
Please see the Appendix E for the Risk Management Acceptance Report and instructions.
1240
FNCS Risk Management Program Team
•
The Risk Management Team will provide communication, support and mitigation
techniques for all FNCS Systems.
•
The risk management program requires each team member to manage:
o
o
o
o
Vulnerability mitigation
Patch management
Virus maintenance
POA&M and/or possible waiver information
•
Weekly meetings facilitated by an ISO ISSM and the Deputy CISO allow each member to
report on vulnerability scans, patch and virus reports and discuss how the results have
impacted the business continuation and risk minimization for each portion of the FNCS GSS
Net network.
•
Collectively, the Risk Management Team will create a weekly all-inclusive report on risk
management results to be submitted to the ISO for approval.
1241
Vulnerability Identification and Remediation Procedures
As part of FNS’s Continuous Monitoring Process, vulnerability identification and remediation is
crucial to keeping FNS data safe and secure. This procedure is meant to outline how the agency
Last Modified: 11/20/2015
For Official Use Only
Page 76 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
identifies, validates, and reports the vulnerabilities as well as setting the requirements for
remediating those vulnerabilities as required by NIST SP 800-53 Control RA-5: Vulnerability
Scanning.
1242
Identification, Validation, and Reporting
FNS’s Information Security Office is responsible for identifying, validating, and reporting
vulnerabilities with the organization. FNS utilizes an Enterprise Vulnerability Scanning and Risk
Management Appliance, in conjuncture with other security tools, to scan FNS’s network. Scans
are scheduled to run continuously.
The Enterprise Vulnerability Scanner produces a vulnerability score for every asset scanned. This
score is converted to a Risk Score for that asset on a “0-100” scale. A Risk Score of “0”
represents a low risk to the organization while a score of “100” represents a severe threat. This is
to create a more standardized and simplistic representation of the severity of any given asset to
management and system administrators.
As we move towards continuous monitoring, the FNS Information Security Office (ISO) reports on
the security posture of the organization through the Executive Situational Awareness Briefing
(ESAB) on a predefined schedule. This briefing is intended to illustrate the current state of the
security of the organization’s IT infrastructure. This includes identifying the top vulnerable
workstations, internal servers, and our DMZ environment, patch deployment compliance, and
software version trends. The ESAB reports on the network segments it has visibility on and has
limited capability on reporting on cloud infrastructure such as but not limited to National
Information Technology Center (NITC), National Technology Information Service (NTIS), and the
USDA’s Enterprise Virtual Private Network (EVPN). The ESAB will serve as the means for ISO to
report IT Security weakness to FNS Office of Information Technology (OIT) management. Based
upon the severity of an asset’s weakness, ISO will then create tickets through the OIT ticketing
system and assign them to the responsible parties for remediation. It is the responsibility of ISO to
validate vulnerabilities identified and expel any false positives from the ESAB report.
1243
Remediation of Identified Vulnerabilities
The remediation of an asset’s vulnerabilities is determined by the type of asset and the severity of
the Risk Score. An asset is defined by one of the following types: Demilitarized Zone (DMZ)
Server, High Value Target (HVT), an Internal Server, or User Workstation. A DMZ server is
defined as asset hosted within the DMZ network segmentation and public facing. An Internal
server is any asset that manages access to a centralized resource or service in a network. A HVT
is defined as a resource with access to a mission critical data within the organization. Finally a
General User is an asset operated by non-high-value target.
An asset’s Risk Score is categorized the following severity categories: High, Moderate, Low, and
Very Low. A system identified on the ESAB Top 10 list with a High Risk Score must have steps to
be remediated in place within 30 days; a Moderate Risk Score must have steps to be remediated
in place within 60 days; a Low Risk Score must have steps to be remediated in place within 90
days; finally, a Very Low Risk Score must have steps to be remediated in place with 180 days.
Vulnerabilities identified exceeding the threshold listed will be the System Owner and their
representatives’ responsibility for remediating. They will work with ISO to create and update
POA&Ms in the USDA’s Cyber Security Assessment Management (CSAM) for tracking purposes.
If the vulnerability cannot be remediated, a risk acceptance must be drafted and signed by the
Last Modified: 11/20/2015
For Official Use Only
Page 77 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
responsible parties. Vulnerability scores less than the Very Low threshold will be considered
informational and not need immediate remediation.
The following scale is used to determine the severity of an asset based on the asset’s Risk Score:
DMZ Servers
High (30 days)
High Value
Target
Internal Servers
User
Workstation
65+
70+
70+
-
Moderate (60 Days)
50-64
55-69
55-69
-
Low (90 Days)
30-49
44-54
44-54
50+
Very Low (180 days)
18-29
25-44
25-44
30-49
Table 8 – Vulnerability Assessment Risk Score Matrix
Last Modified: 11/20/2015
For Official Use Only
Page 78 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on IT Contingency Planning and Disaster Recovery
1300
Overview
IT Contingency Planning is necessary to ensure that IT systems continue to be operational in the
event of major or minor interruptions or a large-scale disaster. Use of formal Contingency and
Disaster Recovery Plans (DRP) also ensures that FNCS offices have effective and efficient
recovery solutions for their systems.
IT Contingency Planning includes activities designed to recover and sustain critical IT services
following an emergency. The IT Contingency Plan and Disaster Recovery Plan are tested,
minimally, annually. These arrangements fit into a much broader emergency preparedness
environment that includes organizational and business process continuity and recovery planning.
This guidance will cover developing, testing, training, reporting and updating IT systems
contingency and disaster recovery plans.
USDA has formed a Contingency Plan Working Group (CPWG) that meets to discuss current
issues with agency-wide IT Contingency and Disaster Recovery Plans and to provide
recommendations for change to USDA Cyber Security. So far, the CPWG has recommended and
has been approved to standardize the IT Contingency Plan. Other recommendations to Cyber
Security include:
•
Standardized Disaster Recovery Plans
•
Standardized Business Impact Analysis (BIA)
•
Standardized Disaster Recovery Test Plan
•
Standardized After Action Report
This procedure is reviewed and updated at least annually.
1310
References
This guidance is written in accordance with:
•
•
•
•
•
NIST Special Publication 800-34
NIST Special Publication 800-53 Rev. 4
NIST Special Publication 800-84
USDA DM 3570-000 IT Contingency Planning
USDA DM 3570-001 Disaster Recovery and Business Resumption Plans
1320
Roles and Responsibilities
1321
The CIO and CISO will:
•
Establish and manage the IT Contingency Planning Program within FNCS.
•
Ensure sufficient resources exist to develop, maintain and implement IT Contingency Plans
and DRPs for each system.
Last Modified: 11/20/2015
For Official Use Only
Page 79 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Designate a Contingency Planning Coordinator and provide training for a Contingency
Planning Coordinator and an opportunity for certification.
•
Advise Senior Management on Cyber Security reviews and comments on existing
Contingency and DRPs.
•
Ensure all plans are developed using a USDA approved tool.
•
Ensure alternate sites are in place as a back-up operations facility where trained personnel
are in place to run systems or applications as needed.
•
Ensure all contingency and disaster recovery plans are closely related to the COOP and
other Contingency Plans.
•
Ensure DRPs are tested at least bi-annually or when a major change occurs to a system.
•
Ensure all system recovery procedures are developed, published and tested.
•
Provide specialized training for the disaster recovery teams and coordinate general
disaster awareness training for all employees.
•
Ensure all Contingency and Disaster Recovery plans are reviewed, approved and stored in
the USDA recommended database.
1322
The Contingency Plan and Disaster Recovery Coordinator and Stakeholders will:
•
Document such appointments in writing and include specific responsibilities in each
appointee’s job description.
•
Serve as the IT contingency planning expert resource for the agency
•
Prepare an agency Contingency Program proposal annually for management consideration
and approval which describes and schedules contingency activities to ensure compliance
with department and agency requirements documented in BIAs with continual improvement
as needed from year to year.
•
Ensure the following specific activities are included in the Contingency Program proposal
and facilitate completion of the activities during the program year:
o
Test-Exercise such that all plans are tested annually,
o
Annual plan review and update of every plan,
o
Review an update recovery strategies annually,
o
BIA review and update at least every two years,
o
Annual contingency training for agency staff and
o
Bi-Annual Refresher training.
•
Provide contingency program reports to agency management as needed.
•
Ensure new applications and GSS components are brought into the Contingency Program
Last Modified: 11/20/2015
For Official Use Only
Page 80 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
1323
The System Owner will:
•
Review and update the Contingency and Disaster Recovery Plans, annually.
•
In conjunction with the ITPM, ensure new personnel receive training for their roles on
Disaster Recovery.
•
Perform scheduled table top tests, functional exercises and failover tests.
•
Perform scheduled system integration tests.
•
Ensure the Alternate Site Coordinator has updated contingency and disaster recovery
plans along with recovery and reconstitution procedures.
1324
The ITPM and ISSM will:
•
Include development, review and updates of contingency and disaster recovery plan in the
project management plan.
•
Document results of the tests and provide mitigation strategies for deficiencies (POA&Ms).
•
Include costs of contingency plan creation, update, testing and training in the project
management plan.
•
Work in coordination with the Contingency Planning Coordinator to review/approve all
contingency and disaster recovery plans.
1330
•
Contingency Plan and Disaster Recovery Guidelines
Each system will have a Business Impact Analysis (BIA) performed to identify and prioritize
critical IT resources. The BIA identifies essential business functions and defines recovery
objectives such as the Recovery Time Objective (RTO) and Recovery Point Objective
(RPO).
•
Identify preventive controls. Determine which measures are necessary to reduce the
effects on a system in the event of a disruption.
•
Develop disaster recovery plans that include all of the guidance and supporting procedures
needed to restore the system. Recovery and reconstitution procedures are developed at
this time. These procedures will address the recovery and reconstitution of the system to a
known secure state after a disruption or failure occurs.
•
All disaster recovery personnel will maintain an up-to-date (hard copy and/or electronic)
DRP in a place easily accessible in the event of a disaster.
•
The ISO will provide a schedule for all FNCS system contingency and disaster recovery
plans to be tested. All results to be captured in After Action Reports along with mitigation
strategies documented in POA&Ms. All contingency plan test results will be reviewed by
Cyber Security.
•
Each system will have an alternate storage site where the system’s data back-ups are
stored.
Last Modified: 11/20/2015
For Official Use Only
Page 81 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Each system will have a designated alternate site where recovery procedures and trained
personnel are located to operate the system in the event of a disaster. The alternate site
will have an Alternate Site Coordinator for each system.
•
FNS’s telecommunication and e-mail services are provided by Networx. Currently, FNS
has a Service Level Agreement (SLA) with AT&T. The details of the timeframe of
resumption of system operations can be found in the SLA.
1331
Contingency Training
Contingency training must be provided to information system users consistent with assigned
roles and responsibilities when new employees start at FNCS or after a major change to a
system occurs and annually thereafter.
1332
Contingency Plan Testing
The ISO will provide a schedule for all FNCS system contingency and disaster recovery plans to
be reviewed and updated annually or after major systems changes have occurred.
Last Modified: 11/20/2015
For Official Use Only
Page 82 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on FNCS System Security Plans (SSP)
1400
Overview
Information security has escalated as a result of high-level attention from both the press and
media. Based on the continuously evolving threat landscape, terrorist attacks have highlighted the
need to ensure that we have the highest level of information security practices. IT System security
plans have become the foundation document in the overall security process because they define
the system security features and controls.
The SSP provides a summary of the security requirements for the information system and
describes the security controls in place or planned for meeting those requirements. The SSP may
also reference other key security-related documents for the information system such as a risk
assessment, plan of action and milestones, accreditation decision letter, privacy impact
assessment, contingency plan, configuration management plan, security configuration checklists,
and system interconnection agreements as appropriate.
It is critical that FNCS SSPs are prepared and updated on an ongoing basis with the most current
information concerning each agency’s information security practices.
1410
References
This guidance is written in accordance with:
• NIST Special Publication 800-53 Rev.4
• NIST Special Publication 800-18
• USDA DM 3565-001 Annual Security Plans for Information Technology (IT) Systems
• Federal Information Processing Standards (FIPS) 199
• Federal Information Processing Standard (FIPS) 200
1420
Roles and Responsibilities
1421
The CISO will:
•
In coordination with the ISSPM, ensure the CIO signs the transmittal cover letter attesting
the completeness and correctness of the plans.
•
Ensure all personnel are familiar with annual SSP requirements.
•
In coordination with the System Owner, determine which major changes warrant updates to
the SSP.
•
Develop and maintain an inventory of all IT systems.
•
Determine data sensitivity and identify all GSS and applications.
•
In coordination with the ISSPM, prepare detailed plans for the overall security program,
GSS and applications. Submit to USDA’s Cyber Security for review and evaluation.
•
In coordination with the ISSPM, submit all SSPs to the Office of Cyber Security by the last
working day in April each year; Plans will include a POA&M for security weaknesses not
Last Modified: 11/20/2015
For Official Use Only
Page 83 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
corrected from the prior year submissions. Submit the package electronically and in hard
copy to the Office of Cyber Security.
•
Ensure that copies of the SSPs are maintained in the ISO.
•
Ensure that all IT systems have adequate security controls based on the sensitivity of data,
mission critical and value of the data in the system.
•
In coordination with the System Owner, determine the need to update the SSPs based on
major changes to the system.
1422
The ISSPM will:
•
In coordination with the CISO, submit all SSPs to the Office of Cyber Security by the last
working day in April each year; Plans will include a POA&M for security weaknesses not
corrected from the prior year submissions. Submit the package electronically and in hard
copy to the Office of Cyber Security.
•
Act as the Subject Matter Expert (SME) on all SSP requirements.
•
Approve updates and newly developed SSPs.
•
Prepare a security plan for the overall FNCS System Security Program.
•
Participate in the development of exception requests.
•
Ensure all SSPs are submitted to the CIO with a cover letter for signature attesting the
accuracy and completeness of the plans.
1423
The System Owner will:
•
Have a thorough knowledge of USDA policy and FNCS procedures for creating and
updating SSPs.
•
Develop SSPs in coordination with the system administrator, ISSM, ITPM and functional
end users.
•
Maintain the SSP and verify that the system is deployed and operated according to the
agreed-upon security requirements.
•
Update the SSP whenever a significant change occurs.
•
Assist in identifying, implementing and assessing common security controls.
•
Ensure that system users and support personnel receive the required security training.
1424
The ITPM will:
•
Have a thorough knowledge of USDA policy and FNCS procedures for creating and
updating SSPs.
•
Assist the system owner in the creation of the SSP.
Last Modified: 11/20/2015
For Official Use Only
Page 84 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Perform a preliminary review of the SSP and SSP checklist prior to being released to the
ISSPM.
•
In coordination with the ISSM, ensure SSPs are reviewed and updated annually or as
determined when a major change has occurred.
1430
USDA Definitions of System and Major Applications
Please see the following for the USDA Definitions of a system
•
USDA Definitions Document
1431
•
SSP Guidelines
An Information System Inventory is required for the General Support System (GSS) all
FNCS systems. The systems inventory consists of all systems categorized in accordance
with FIPS 199. Please refer to the FIPS 199 for details on system categorization. The
System Categorization is documented and submitted to the ISSPM.
•
All systems, whether Major Application or GSS are required to have a security plan. Initial
SSPs are drafted in the Initiation phase of the SDLC.
•
ISO will plan and coordinate with NOEB and TB security-related activities affecting the
information system with individuals or groups prior to conducting such activities in order to
reduce the impact on other organizational entities.
•
During and prior to completion of the C&A, the security plan is reviewed, updated and
formally accepted by the ISSPM.
•
All new software or hardware to be considered for inclusion in the Net GSS environment
must receive CCB approval.
•
All SSPs are reviewed and updated based on upcoming certification and accreditation
dates as noted in the CSAM tool. CSAM has the capability of holding SSP documents
within the “Appendices” section. For updated templates, contact the Information Security
Office. These documents will reference C&A items such as:
a. Risk Assessment
b. Plan of Action and Milestones (POA&M)
c. Accreditation decision letter
d. Privacy impact assessment
e. Contingency plan
f.
Configuration management plan
g. Security configuration checklist
h. Results of penetration testing
Last Modified: 11/20/2015
For Official Use Only
Page 85 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
i.
All system interconnection agreements (MOUs)
j.
Management, Operational and Technical controls based on SP 800-53.
Last Modified: 11/20/2015
For Official Use Only
Page 86 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on the FNCS Systems Development Life Cycle (SDLC)
1500
Overview
The Systems Development Life Cycle (SDLC) is a conceptual model used in project management
that describes the stages involved in an information system development project, from an initial
feasibility study through maintenance and final disposition.
The inclusion of security requirements early in the SDLC will result in less expensive and more
effective security than adding it after a system is operational. This guidance presents a framework
for incorporating security into all phases of the SDLC process, from initiation through disposal.
This document will provide information to select and acquire cost-effective security controls by
explaining how to include information system security requirements in appropriate phases of the
SDLC.
It is important to involve other members to be a part of the development team, dependent on the
complexity of the system. Other roles may include, but are not limited to: Designated Accrediting
Authority (DAA), Certifying Official (CO), member of OIT, Configuration Management Team,
Design and Engineering staff and the facilities group.
1510
References
This guidance is written in accordance with:
•
•
•
NIST Special Publication 800-53 Rev. 4
DM3575-001 Security Controls on the Systems Development Life Cycle
NIST Special Publication 800-64
1520
Roles and Responsibilities
1521
The CISO will:
•
Be responsible for the organization’s information system planning, budgeting, investment,
performance and acquisition.
•
Provide advice and assistance to senior organization personnel in acquiring the most
efficient and effective information system to fit the organization’s enterprise architecture.
1522
The Information System Security Program Manager (ISSPM) will:
•
Be responsible for developing enterprise standards for information security.
•
Play a leading role in introducing an appropriate, structured methodology to help identify,
evaluate, and minimize information security risks to the organization.
•
Coordinate and perform system risk analyses, analyzes risk mitigation alternatives, and
build the business case for the acquisition of appropriate security solutions that help ensure
mission accomplishment in the face of real-world threats.
•
Support senior management in ensuring that security management activities are conducted
as required meeting the organization’s needs.
Last Modified: 11/20/2015
For Official Use Only
Page 87 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
1523
•
1524
The ISSM will:
Ensure all security requirements are met throughout the life of a system.
The ITPM will:
•
Ensure security requirements are budgeted for and met throughout the life of a system.
•
Work in collaboration with the ISSPM to ensure security needs are incorporated in the
system lifecycle.
1525
•
1526
•
1527
•
1528
•
1529
•
The System Owner will:
Play an essential role in security and be intimately aware of functional system
requirements.
The Privacy Officer will:
Ensure that the system meets existing privacy policies regarding protection, dissemination
(information sharing and exchange) and information disclosure.
The Legal Advisor will:
Advise the team on legal issues related to security during the lifecycle.
The Records Management Officer will:
Work with the ISSPM and the ITPM to ensure that the system security documents are
compliant with all applicable laws and regulations.
Contractor/Development Team will
Ensure all development is compliant with all security requirements within each phase of the
SDLC.
Last Modified: 11/20/2015
For Official Use Only
Page 88 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
1530
SDLC Required Security Documentation and Responsible Teams
Security Requirement Documentation
Responsible Team/Individual
System Categorization
Contractor/Development Team
Preliminary Risk Assessment
Contractor/Development Team
Privacy Impact Assessment (PIA)
Contractor/Development Team
System Security Plan (SSP)
Contract Development Staff, System Owner
and ITPM
Interconnection Service Agreement (ISA)
System Owner
Configuration Management Plan
Contractor/Development Team
Risk Assessment
Contractor/Development Team
Security Functional Requirements Analysis
ISSM
Security Assurance Requirements Analysis
ISSM
Cost Considerations and Reporting
System Owner/ITPM
Security Planning
ISSM
Security Control Development
ISSM
Development Security Control Assessment
Security Control Assessment Team
Other planning components
ITPM
Inspection and Acceptance
QA/CM
System Integration
Contractor/Development Team
Security Certification
CIO
Security Accreditation
DAA
IT Contingency Plan
Contractor/Development Team, System
Owner, ITPM
Disaster Recovery Plan (DRP)
Contractor/Development Team, System
Owner, ITPM
Last Modified: 11/20/2015
For Official Use Only
Page 89 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Configuration Management Control
Contractor/Development Team
Continuous Monitoring
ISSM, ITPM, System Owner
Re-Certification
CIO
Re-Accreditation
DAA
Information Preservation
Records Management Officer
Media Sanitization
IB
Hardware and Software Disposal
IB
1540
SDLC Phases
There are eight (8) basic phases of the SDLC as defined by FNCS Office of Information
Technology, Systems Development Lifecycle Guide (SDLC Guide), they are:
1.
2.
3.
4.
5.
6.
7.
8.
Initiation
Requirements Gathering/Analysis
Design
Development
Integration &Testing
Implementation
Operations/Maintenance (O&A)
Disposition
Within each phase of the SDLC security requirements are put in place and tested, please see
Tables 9 and 10 for the SDLC Phases and Security Requirements.
Last Modified: 11/20/2015
For Official Use Only
Page 90 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
1541
SDLC Phases and Security Requirements
Initiation
Research
Gathering and
Acquisition/
Development
Functional
• Installation
Statement of Need • Inspection
• Acceptance
• Perception of a • Market Research testing
Need
• Feasibility Study • Initial user
• Linkage of
training
• Requirements
Need to Mission Analysis
documentation
and
• Alternatives
Performance
Analysis
Objectives
• Cost-Benefit
• Assessment of
Analysis
Alternative to
• Software
Capital Assets
Conversion
• Preparing for
Study
investment
• Cost Analysis
review and
• Risk
budgeting
Management
• Acquisition
Planning
• Acquisition
Approval
Request (AAR)
Needs
Determination:
Operations/
Maintenance
Implementation
• Performance
measurement
• Contract
modifications
• Operations
• Maintenance
Disposition
• Appropriateness
of disposal
• Exchange and
sale
• Internal
organization
screening
• Transfer and
donation
• Contract
closeout
Table 9 – SDLC Phases and Processes
Last Modified: 11/20/2015
For Official Use Only
Page 91 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Initiation
• System
Categorization
• Preliminary
Risk
Assessment
• Privacy Impact
Assessment
(PIA)
• System
Security Plan
(SSP)
• Interconnection
Service
Agreement
(ISA)
• Configuration
Management
Plan (CMP)
Research
Gathering and
Acquisition/
Development
• Risk
Assessment
• Security
Functional
Requirements
Analysis
• Security
Assurance
Requirements
Analysis
• Cost
Considerations
and Reporting
• Security
Planning
• Security Control
Development
• Security Control
Assessment
• Other planning
components
Operations/
Maintenance
Implementation
• Inspection and
Acceptance
• System
Integration
• Security
Certification
• Security
Accreditation
• IT Contingency
Plan
• Disaster
Recovery
Plan(DRP)
• Configuration
Management
Control
• Configuration
Management
and Control
• Continuous
Monitoring
• Re-Certification
• Re-Accreditation
• Configuration
Management
Control
Disposition
• Information
Preservation
• Media
Sanitization
• Hardware and
Software
Disposal
• Configuration
Management
Control
Table 10 – SDLC Phases and System Security Considerations
1542
SDLC Phases and Detailed Security Requirements for each Phase
1543
Phase 1: Initiation
The purpose of the Initiation Phase is to conduct initial assessment of a potential OIT
system/application development effort. This Phase helps establish a framework for project
success, and includes establishing processes for defining, planning, controlling and
communicating about the project.
Deliverables in this Phase include:
•
•
•
•
•
•
•
•
Business Case (FNS758; FNS755)
Project Management Plan (optional)
Acquisition Plan / Strategy
Acquisition Approval Request
Alternative Analysis
Cost Benefit Analysis
Integrated Project Team Charter (optional)
Security and Privacy Document
Last Modified: 11/20/2015
For Official Use Only
Page 92 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
•
•
Project Process Agreement (optional)
Privacy Impact Analysis (optional)
Privacy Threshold Analysis (optional)
A critical governance body is established in this Phase: the Integrated Project Team (IPT). The IPT
should consist of the following core members: Project Lead; Developers; Business Leads;
Technical Representative; Security Representative; and COTR. Associate members should
include Governance, Network, Telecommunications, Records, O&M, and the Contracting Officer.
The IPT is documented in this Phase and functions from Initiation through the Implementation
Phase.
The Initiation Phase includes activities, reviews and approvals as identified in the below flowchart.
Figure 9 – SDLC Phase 1 Initiation Overview
Upon successful completion of the “Approve to Next Phase” step, the project progresses to the
Requirements Gathering and Analysis Phase.
1544
Phase 2: Requirements Gathering and Analysis
This Phase transforms the needs and high-level requirements specified in earlier Phases into
unambiguous (measurable and testable), traceable, complete, consistent, and stakeholderapproved requirements. Defining requirements helps ensure development of the required
capability on-time and within budget.
Deliverables in this Phase include:
•
•
•
•
•
•
•
•
•
Privacy Threshold Analysis (PTA)
Privacy Impact Analysis (PIA)
System of Records Notices (SORN)
Electronic Information System Questionnaire for Records Management Scheduling
System Requirements Specification (SRS)
Concept of Operations
Requirements Traceability Matrix
Project Process Agreement (PPA)
Project Management Plan
Last Modified: 11/20/2015
For Official Use Only
Page 93 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Integrated Project Team Charter
The Requirements Gathering and Analysis Phase undergoes activities, reviews and approvals as
identified in the below flowchart.
Figure 10 – SDLC Phase 2 Requirements Gathering and Analysis Overview
Upon successful completion of the “Approve to Next Phase” step, the project progresses to the
Design Phase.
1545
Phase 3: Design
The purpose of the Design Phase is to transform requirements into complete and detailed
system design specifications. The physical characteristics of the system are designed during
this Phase, the operating environment is established, major subsystems and their inputs and
outputs are defined, and processes are allocated to resources. The concept is further
developed to describe how the business will operate once the approved project is implemented
(i.e. becomes a “system”), and to assess impact on employee and customer privacy.
Additionally, security authorization (formally known as certification and accreditation) activities
begin with the identification of security requirements and the completion of a high level
vulnerability assessment. Deliverables in this Phase include: • Procurement Documents (e.g.
Statement of Work (SOW) / Performance Work Statement (PWS) / Statement of Objectives
(SOO))
• System Design Document
• Configuration Management Plan
• Security Business Impact Assessment
• Security Contingency Plan
• Disaster Recovery Plan
• Domain Name Request
Last Modified: 11/20/2015
For Official Use Only
Page 94 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
The Design Phase undergoes activities, reviews and approvals as identified in the below flowchart.
Figure 11 – SDLC Phase 3 Design Overview
Upon successful completion of the “Approve to Next Phase” step, the project progresses to the
Development Phase.
1546
Phase 4: Development
The purpose of the Development Phase is to convert the system design prototyped in the
Design Phase into a working system that addresses all documented system requirements.
Further, everything requiring user input or approval must be documented in this Phase.
Deliverables in this Phase include: • Test Plan
The Development Phase undergoes activities, reviews and approvals as identified in the below
flowchart.
Figure 12 – SDLC Phase 4 Development Overview
Upon successful completion of the “Approve to Next Phase” step, the project progresses to the
Integration & Testing Phase.
1547
Phase 5: Integration & Testing
The purpose of the Integration & Testing Phase is to lay the foundation for a smooth and
successful implementation. Key activities in this Phase include: • Attaining user input or
approval as defined in the prior Phase (Development)
• Preparing detailed logic specifications for each system module
• Testing and integrating units into larger components
Last Modified: 11/20/2015
For Official Use Only
Page 95 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Preparing the technical environment for the system
This Phase focuses on achieving proof that the system meets all requirements, functions
according to design parameters, and satisfies all business, technical, and management
stakeholders. Additionally, prior to installing and operating the system in a production
environment, the system must undergo security authorization activities, as necessary.
Deliverables in this Phase include:
• Transition Plan
• Operations/Maintenance Manual
• UAT sign-off
• App Scan Results
• Training Manual
• User Manual
• Test Results
• Section 508 VPAT and/or Certification
• Security Risk Assessment Report
• System Security Plan
• Security Assessment Plan (Security Test & Evaluation Plan)
The Integration & Testing Phase undergoes activities, reviews and approvals as identified in the
below flowchart.
Figure 13 – SDLC Phase 5 Integration & Testing Overview
Upon successful completion of the “Approve to Next Phase” step, the project progresses to the
Implementation Phase.
1548
Phase 6: Implementation
The purpose of the Implementation Phase is to deploy and enable operations of the new
information system in the production environment. Successful completion of the Implementation
Phase should comprise both system deployment and training on the system.
Deliverables in this Phase include:
•
•
•
•
Installation Document
Compliance Certification
Operations Readiness
Life Cycle Cost
Last Modified: 11/20/2015
For Official Use Only
Page 96 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
•
•
•
•
Project Closeout
Performance Measures
Authority to Operate/Concurrency Review
Application Guide
Source Code
The Implementation Phase undergoes activities, reviews and approvals as identified in the below
flowchart.
Figure 14 – SDLC Phase 6 Implementation Overview
Upon successful completion of the “Approve to Next Phase” step, the project progresses to the
Operations / Maintenance (O&M) Phase.
1549
Phase 7: Operations / Maintenance (O&M)
The purpose of the Operations / Maintenance (O&M) Phase is to ensure the information system is
fully functional and performs optimally until the system reaches its end of life. The system is
monitored for continued performance in accordance with user requirements, and needed system
modifications are incorporated. The operational system is periodically assessed through InProcess Reviews to determine how the system can be made more efficient and effective.
Operations continue as long as the system can be effectively adapted to respond to an
organization’s needs. When modifications or changes are identified as necessary, the system may
reenter the planning Phase.
Deliverables in this Phase include:
•
•
•
•
•
•
•
•
•
System Post Implementation Review Report
Operational Analysis
Annual Updates Required:
Systems Security Plan
Contingency Plan
Disaster Recovery Plan
System Risk Management Plan
Life Cycle Cost
Authority to Operate (Every 3 Years)
Last Modified: 11/20/2015
For Official Use Only
Page 97 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
The O&M Phase undergoes activities, reviews and approvals as identified in the below flowchart.
Figure 15 – SDLC Phase 7 Operations & Maintenance Overview
Upon advancement to the “Continue in Phase or Retire” step, the project is determined to continue
operating or advance to the Disposition Phase.
1550
Phase 8: Disposition
The purpose of the Disposition Phase is to shut down the operational system in a controlled
manner. The disposition activities allow for the orderly termination of the system and preserve the
vital information about the system so that some or all of the information may be retrieved in the
future, if necessary. Particular emphasis is given to proper preservation of the data processed by
the system, so that the data is effectively migrated to another system or archived in accordance
with applicable records management regulations and policies for potential future access.
Deliverables in this Phase include:
•
•
•
System Disposition Plan
System Disposition Checklist
Post-Termination Review Report
The Disposition Phase undergoes activities, reviews and approvals as identified in the below
flowchart.
Figure 16 – SDLC Phase 8 Disposition Overview
Last Modified: 11/20/2015
For Official Use Only
Page 98 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on FNCS Capital Planning and Investment Control (CPIC)
1600
Overview
The Clinger-Cohen Act of 1996 requires that Federal agencies institute a disciplined approach to
managing and controlling Information Technology (IT) investments. The Office of Management
and Budget Circular A-130, “Management of Federal Information Resources” also mandates the
disciplines of Capital Planning and Investment Control (CPIC) and information system security.
These requirements, combined with the newly enacted Federal Information Security Management
Act (FISMA), have now established a clear and convincing need for a systematic capital planning
and investment process in FNCS.
CPIC is USDA’s primary process for (1) making decisions about which initiatives and systems
USDA should invest in and (2) creating and analyzing the associated rationale for these
investments.
Through sound management of these investments, the USDA Executive Information Technology
Investment Review Board (EITIRB) determines the IT direction for USDA, and ensures that FNCS
manages IT investments with the objective of maximizing return and achieving business goals.
Currently, the IT Governance Branch coordinates all CPIC IT investments for the FNCS. The CPO
reviews Agency IT investments based on their size, scope, or strategic impact on the Agency. The
IT Governance Branch forwards the IT investments to OMB through the USDA Office of the Chief
Information Officer for review and approval.
For further information and assistance on the FNCS CPIC process, please review section 1640 for
the FNCS process flow of the CPIC process, by phase.
For the complete overview of the USDA CPIC Guidelines, please click on the following
link: http://www.ocio.usda.gov/sites/default/files/docs/2012/DM3560-000.htm
1610
References
This guidance is written in accordance with:
•
•
•
•
•
•
•
NIST Special Publication 800-53 Rev.4
NIST Special Publication 800-65
USDA DM 3560-001, Security Requirements for CPIC
FNCS Information Technology Investment Review Board Instructions
FNS IT Governance Branch Charter
Appendix F – ITIRB Portfolio Management Office Checklist
Appendix G – CPO-ITIRB Recommendation
Last Modified: 11/20/2015
For Official Use Only
Page 99 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
1620
Responsibilities
1621
The CISO will:
•
Assist senior FNCS officials with IT issues.
•
In coordination with the ISSPM, develop an overall Information Security Program for FNCS.
•
Develop and maintain information system security procedures and control techniques.
•
Designate an FNCS Information Systems Security Program Manager (ISSPM) who will
perform the CIO directives as required by FISMA, including POA&M responsibilities.
•
Design, implement and maintain processes for maximizing the value and managing the
risks of IT acquisitions.
•
Present proposed IT portfolios to the IT Investment Review Board (ITIRB).
•
Provide final portfolio endorsements.
•
Present and recommend control and evaluate decisions and recommendations.
1620
The ISSPM will:
•
In conjunction with the System Owner create a preliminary security budget estimate,
security analysis to determine estimated baseline costs e.g. resources.
•
Provide training to all Information Security personnel.
•
Assist senior agency officials with IT security-related responsibilities.
1621
The Technical Review Board (TRB) will:
•
Conduct detailed IT investment reviews, security analyses and review business cases for
the presence of security requirements.
•
Balance IT investment portfolios based on the CIO/ITIRB security priorities and
prioritization criteria.
•
Recommend business case actions to the CIO; return to the originator for more information
and forward to the ITIRB and/or refer to the OIT.
•
Act as a focal point for agency coordination of the OCIO strategic planning, architectural
standards and outreach to organizations and bureaus.
1622
The ITPM will:
•
Develop a project management plan that integrates security throughout the SDLC.
•
Develop a cost and schedule baseline; complete the project within schedule, under budget
and to meet the needs of the customer.
•
Coordinate the development, implementation, operation and maintenance of a system
along with the System Owner, and others within FNCS.
Last Modified: 11/20/2015
For Official Use Only
Page 100 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Report status of project to the System Owner, CPO and security personnel within FNCS.
•
Provide baseline assessment performance measures to evaluate the security of the
delivered IT initiative.
•
Adhere to the established FNCS CPIC and project methodology.
•
Provide feedback and lessons learned to the FNCS project management repository.
•
Present, when applicable, the progress of critical systems to the CIO, ITIRB, CPO and
security personnel within FNCS.
1623
The System Owner/ITPM will:
•
In conjunction with the ISSPM create a preliminary budget estimate, security analysis to
determine estimated baseline costs.
•
In conjunction with the ISSPM and ITPM, create the SSP.
•
Establish and maintain security costs.
•
Review the security analyses for accuracy and update cost information based on actual
acquisitions or additional items include since the select phase.
•
Maintain a record of any security changes.
•
Perform a Post Implementation Review (PIR) of the investment’s security performance
measures compared to the original performance goals.
•
Identify initiative security risks and how they were managed or mitigated.
•
Assess the continuing ability of the investment to meet the system’s security performance
goals.
1630
The Portfolio Manager will:
•
Ensure that FNCS personnel adhere to CPIC procedures.
•
Notify the OCIO CPIC staff of findings/documents.
•
Update eCPIC and the Enterprise Architecture Repository (EAR) with CPIC related
artifacts.
•
Update the OMB Exhibit 300 and A-11 report with the appropriate security related
information.
•
Perform quarterly reviews.
Last Modified: 11/20/2015
For Official Use Only
Page 101 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
1631
CPIC Phases
There are five (5) phases of the CPIC as defined by NIST SP 800-65, Integrating IT Security into
the CPIC process and the USDA IT CPIC Guide.
Figure 17 – USDA IT Capital Planning Phases
1632
Pre-Select Phase
The Pre-Select phase provides a process to assess a proposed investment’s support of agency
strategic and mission needs and to provide initial information to further support investments. It is
during this phase that the business/mission need is identified and relationships to the Department
and/or agency strategic planning efforts are established. There are significant information
requirements and a potential expenditure of funds in the preliminary planning phase to prepare for
review and selection of IT investments.
1633
Select Phase
In this phase, assess and prioritize proposed IT projects and then create a portfolio of IT projects.
In doing so, this phase helps to ensure that the organization:
(1) Selects those IT projects that will best support mission needs and
(2) Identifies and analyzes a project’s risks and returns before spending a significant amount of
project funds.
A critical element of this phase is that a group of senior executives makes project selection and
prioritization decisions based on a consistent set of decision criteria that compares costs, benefits,
risks, and potential returns of the various IT projects.
Last Modified: 11/20/2015
For Official Use Only
Page 102 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
1634
Control Phase
In this phase, we manage investments while monitoring the development process. Once the IT
projects have been selected, senior executives periodically assess the progress of the projects
against their projected cost, scheduled milestones, and expected mission benefits.
1635
Evaluate Phase
In this phase, there is a means for constantly improving the organization’s IT investment process.
The goal of this phase is to measure, analyze, and record results based on the data collected
throughout each phase. Senior executives assess the degree to which each project has met its
planned cost and schedule goals and has fulfilled its projected contribution to the organization’s
mission. The primary tool in this phase is the post-implementation review (PIR), which should be
conducted once a project has been completed. PIRs help senior managers assess whether a
project’s proposed benefits were achieved and also help to refine the IT selection criteria to be
used in the future.
1636
Steady State Phase
In this phase, there is a means to assess mature investments (fully implemented), ascertain their
continued effectiveness in supporting mission requirement, evaluate the cost of continued
maintenance support, assess technology opportunities and consider potential retirement or
replacement of the investment. The primary review focus during this phase is on the mission
support, cost and technological assessment. Process activities during the Steady-State phase
provide the foundation to ensure mission alignment and support for system and technology
succession management.
CPIC PHASES AND PROCESSES
1637
CPIC Phases
Pre-Select
Select
Control
Evaluation
Steady State
• Identify project
sponsor
• Conduct
mission
analysis
• Develop
concept
• Prepare
preliminary
business case
• Prepare
investment
review
submission
package
• Review /
approve
investment
submission
• Review the
mission needs
statement and
update if
needed
• Approve
integrated
project team
membership
• Identify
funding
source(s) and
obtain
approvals.
• Develop major
investment
supporting
materials.
• Prepare IT
• Establish and
maintain initiative
costs schedule
and technical
baselines
• Maintain current
initiative and
security costs,
schedule technical
and general status
information.
• Assess initiative
progress against
performance
measures using
Earned Value
Management
Methodologies.
• Prepare annual
• Conduct PIR
and present
results
• Prepare
annual
investment
review
submission
package
• Review/appro
ve investment
submission
• Review
initiative’s PIR
results and
recommend
appropriate
action
• Make final
• Analyze mission
• Assess
user/customer
satisfaction
• Assess
technology
• Conduct O&M,
e-Gov strategy
and operational
analysis (as
necessary)
• Prepare
investment
review
submission
package
• Review/approve
investment
submission
Last Modified: 11/20/2015
For Official Use Only
Page 103 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
• Review
initiative and
recommend
appropriate
action
• Make final
investment
decision
investment
supporting
materials
• Review/Appro
ve investment
submission
• Review
initiative and
recommend
appropriate
action.
• Make final
investment
decisions.
investment review
investment
submission
decisions
package.
• Evaluate IT
capital
• Review/approve
investment
investment
management
submission.
process
• Review initiative
and recommend
appropriate action.
• Make final
investment
decisions
• Work with project
sponsor to
develop solutions.
• Review initiative
and recommend
appropriate
action
• Make final
investment
decisions.
Table 11 – USDA IT Capital Planning Phases
1638
CPIC Phases and Security Requirements
1639
CPIC Required Documentation by Phase
This section outlines the needed documents required in each phase of the CPIC process.
•
Pre-Select Phase required documents list:
Preliminary Business Case
Mission Analysis
Other FNCS documentation requirements
Mission Analysis Concept Document
OMB Exhibit 300
•
Select Phase required documents list:
Major Initiatives:
Business Case
Performance Measures
Functional Requirements
Feasibility Study
CPIC Risk Assessment/Mitigation Plan
Last Modified: 11/20/2015
For Official Use Only
Page 104 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Update LC Cost Projections
Alternatives Analysis
Funding Source Identification
Technical Requirements
*System Security Plan
Telecommunications Plan
Enterprise Architecture Plan
e-Government Plan
System Dependencies
Project Plan
Telecommunication/Risk Mitigation Plan
Integrated Logistics Plan (if required)
Acquisition Plan and Strategy
IV&V Documentation (if required)
Section 508 Compliance Plan
Minor Initiatives:
*System Security Plan
Compliance with:
Telecommunications Standards
Enterprise Architecture
E-Government Requirements
Section 508 Requirements
*Please see Guidance on FNCS System Security Plans (SSP)
•
Control Phase required documents list:
o Costs
Overall Security Schedule
Last Modified: 11/20/2015
For Official Use Only
Page 105 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
o
o
o
o
o
o
o
o
Baselines
Performance Measures
Risk Factors
Investment Summary
Assessments (Earned Value)
Cost vs. Baseline
Schedule vs. Baseline
Validation/Updates:
Cost-Benefits
Risk
Security
Telecommunications Architecture
Section 508
OMB Exhibit 300
System Documentation
System Test and Evaluation
Security Certification and Accreditation
Confirmed PIR Schedule
•
Evaluate Phase required documents list:
o Stakeholder Impact
o Progress against Performance measures
o Baseline goals evaluation
Cost
Return
Funding/Funding Sources
Schedule
Architecture
Accessibility
Telecommunications
Risk Management
Security Risk Mitigation
o Lessons Learned
•
Steady State Phase required documents list:
o Annual Review/Update
o Security Plan
o Operational Analysis Report
Stakeholder Assessment
Cost/Schedule Performance
Risk Status Review
Alternatives Review
OMB Exhibit 300
Last Modified: 11/20/2015
For Official Use Only
Page 106 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
1640
FNCS CPIC Process Flow Diagram (per Phase)
Ini t ial Concept Development & Approval
(Pre-Select Phase)
LC > $50M, or
LC > $500K (Financial), or
Multi-agency impact, or
Common Infrastructure, or
USDA Strategic/Mandatory, or
Legislated or Exec. Order, or
USDA Secretary Defines as Critical, or
Differs fr. or Impacts USDA Standards,
Infrastructure or Architecture, or
Tied to Fed. Enterprise Architecture
No
Prelim . Business Case
Mission Anal ysis
Follow FNS Normal
Documentati on
Requirements
Estimated
FY Spending
over $ 2 5 K
?
Yes
No
Yes
Major
Investment
?
Yes
Continue
Terminate
Modify
Continue
Terminate
Modify
A AR
Approved
?
No
Pre-Select
Documentation
Required
Mission Analysis
Concept Document
Prelim. Business Case
OMB Exhibit 300
OC I O A AR
Required
Spending
Au thori t y
Denied
FNS ITIRB
Review
USDA OC I O Rev iew,
Recommendations
USDA
EITIRB
Approved
?
No
Yes
Proceed to
Select Phase
Figure 18 – FNCS CPIC Pre-Select Phase
Last Modified: 11/20/2015
For Official Use Only
Page 107 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Complete Business Case Development & Approval
(Select Phase)
USDA EIT IRB
Approval to
Enter Phase
( Ma jor )
AAR Approval >25K)
(Annual Requirement)
Prepare
Select Phase
Documenta tion
Update Mission Stmt
Select Integrated Team
Identify Fund Sources
Select Phase Analyses
OMB Exhibit 300
Major Initiatives:
Business Case
Performance Measures
Functional Requirements
Feasibility Study
Risk Assess/Mitigation Plan
Update LC Cost Projections
Alternatives Analysis
Funding Source Ident.
Technical Requirements
Security Plan
Telecommunications Plan
Enterprise Architecture Plan
eGovernment Plan
System Dependencies
Project Plan
Telecomm. Risk/Mitigation Plan
Integrated Logistics Plan (if Rq’d)
Acquisition Plan & Strategy
IV&V Documentation (if Rq’d)
Section 508 Compliance Plan
Continue
Terminate
Modify
FNS ITIRB
Review
USDA OCI O Review,
Recommendations
Continue
Terminate
Modify
Update /
Re-Submi t
Terminate
USDA
EITIRB
Approval
?
No
Yes
Proceed to
Con trol Phase
Non-Major Initiatives:
Security Plan
Compliance with:
Telecommunications Standards
Enterprise Architecture
eGovernment Requirements
Section 508 Requirements
Figure 19 – FNCS CPIC Select Phase
Last Modified: 11/20/2015
For Official Use Only
Page 108 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Detailed System Design & Implementation
(Control Phase)
Costs:
Overall
Security
Schedule
Technical
Baselines
Performance Measures
Risk Factors
USDA EITIRB
Approval to
Enter Phase
( Major )
AAR Approval >25K)
(Annual Requirement)
Establish / Main tain
Baselines
Cont inual
Progress Assessment
Annual Investment
Review Package
Investment Summary
Assessments (Earned Value):
Cost vs Baseline
Schedule vs Baseline
Performance vs Baseline
Validation/Updates:
Cost-Benefits
Risk
Security
Telecommunications
Architecture
Section 508
OMB Exhibit 300
FNS ITIRB
Review
Continue
Terminate
Modify
Continue
Terminate
Modify
USDA OCI O Review,
Recommendations
EITIRB
Annual Review
I m plementatio n
System Documentation
System Test/Evaluation
Security Certification
& Accredition
Confirmed PIR Schedule
Rollou t
EITIRB
Final Review
Proceed to
Evaluate Phase
Figure 20 – FNCS CPIC Control Phase
Last Modified: 11/20/2015
For Official Use Only
Page 109 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Post- Implementation Evaluat ion
(Evaluate Phase)
USDA EIT IRB
Approval to
Enter Phase
( Ma jor )
Stakeholder Impact
Progress against
Performance Measures
Baseline goals evaluation
Cost
Return
Funding/Funding Sources
Schedule
Architecture
Accessibility
Telecommunications
Risk Management
Security Risk Mitigation
Lessons Learned
AAR Approval >25K
(Annual
Requirement)
Conduct
Post- I mplemen tati on
Review
(after 6 months)
OMB Exhibit 300
Annual Repor t i ng
FNS ITIRB
Review
Continue
Terminate
Modify
Continue
Terminate
Modify
USDA OC I O Review,
Recommendations
EITIRB
Review
Proceed to
Steady State Phase
Figure 21 – FNCS CPIC Evaluate Phase
Last Modified: 11/20/2015
For Official Use Only
Page 110 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Continuing Operations and Main tenance
(Steady State Phase)
USDA EIT IRB
Approval to
Enter Phase
( Ma jor )
AAR Approval >25K
(Annual Requirement)
Operations &
Main tenance
Activi ties
Review &
Re-Assessment
Annual Review/Update:
Security Plan
Operational Analysis Report
Stakeholder Assessment
Cost/Schedule Performance
Risk Status/Review
Alternatives Review
OMB Exhibit 300
Every 3 Years
(& after Major Changes) :
Security Certification
& Accreditation
Post-Implementation Review
Continue
Terminate
Modify
FNS ITIRB
Review
USDA OCI O Review,
Recommendations
Continue
Terminate
Modify
EITIRB
Annual Review
Con tinue
In Phase
Figure 22 – FNCS CPIC Steady State Phase
Last Modified: 11/20/2015
For Official Use Only
Page 111 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on Maintenance of FNCS Information Systems
1700
Overview
NIST Special Publication 800-53 recommends that all Information Systems are maintained through
a structured process. This process includes all steps necessary to perform scheduled
maintenance, emergency repairs and routine maintenance onsite or remote to FNCS Information
Systems.
This guidance includes processes that are involved in the maintenance of an information system,
software and hardware. This guidance covers controlled maintenance, maintenance tools, remote
maintenance, maintenance personnel and timely maintenance of information systems. The
procedures are reviewed and updated at least annually.
1710
References
This guidance is written in accordance with:
•
NIST SP 800-53 Rev.4
1720
Responsibilities and Guidance
1721
The Organization responsible for maintaining the specific equipment will:
•
Develop Standard Operating Procedures (SOPs) for performing maintenance on all
Information Systems.
o
•
Create logs of maintenance performed on all Information Systems and include:
o
o
o
o
o
•
Obtain and utilize appropriate automated tools to schedule and perform
maintenance on Information Systems.
Date and time of maintenance
Person (name) performing maintenance
FNCS personnel (name) escorting the repair person
Description of maintenance performed
List of equipment removed or replaced, if applicable.
numbers.
Including identification
Assign authorized personnel (for local or remote maintenance) to perform the maintenance
on Information Systems.
o
Assign authorized FNCS personnel to supervise maintenance personnel who do not
have the appropriate authorizations.
o
Assign FNCS personnel to ensure all maintenance logs are kept current, complete and
readily available for audits/assessments.
o
Ensure all use of maintenance tools are restricted to authorized personnel only.
Last Modified: 11/20/2015
For Official Use Only
Page 112 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Approve all maintenance tools brought into the FNCS facility.
maintenance of the tools.
•
Check all media containing diagnostic and test programs for malicious code prior to using
on the Information System.
•
Ensure all maintenance equipment that can retain information does not contain FNCS
information on it. If information is retained on the equipment, properly sanitize it prior to
leaving the FNCS facility.
•
Monitor and control all remotely executed maintenance and diagnostic activities.
1730
•
Implement ongoing
o
Ensure mechanisms are in place to audit remote maintenance sessions and provide all
records to FNCS personnel for review.
o
Document the installation and use of remote maintenance and diagnostics links in the
System Security Plan (SSP).
Information Security Architecture
FNS develops information security architecture for the information system that describes
the overall philosophy, requirements, and approach to be taken with regard to protecting
the confidentiality, integrity, and availability of organizational information.
•
FNS describes how the information security architecture is integrated into and supports the
enterprise architecture; and any information security assumptions about, and
dependencies on, external services.
•
FNS reviews and updates the information security architecture at a minimum annually or
when a significant change occurs to reflect updates in the enterprise architecture.
•
FNS ensures that planned information security architecture changes are reflected in the
security plan, the security Concept of Operations (CONOPS), and organizational
procurements/acquisitions.
Last Modified: 11/20/2015
For Official Use Only
Page 113 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on Media Protection for FNCS Information System Resources
1800
Overview
NIST recommends that controls are in place to protect all FNCS media. Media includes both digital
and non-digital, e.g. diskettes, magnetic tapes, external/removable hard drives, flash/thumb drives,
compact disks (CD), digital video disks, paper and microfilm. Other examples of media include
laptop computers, PDAs and cell phones. Media is also referred to as portable electronic devices
(PED).
This document is written as a guide to ensure that media is protected through its life to include;
access, labeling, storage, transport, sanitization, protection from theft and disposal.
This guidance applies to all FNCS Users, i.e. employees, contractors and official visitors who use
government-furnished media for official FNCS business. This procedure is updated and reviewed
at least annually.
1810
References
This guidance is written in accordance with:
•
•
NIST SP 800-53 Rev.4
Sensitive But Unclassified Guidance
1820
Roles and Responsibilities
1821
The OIT Technology Division will:
•
Provide and maintain Active Directory polices to restrict access to media storage areas.
•
Provide a means to audit successful and unsuccessful logon attempts to FNCS media.
•
Supply physical access controls as a means to protect information stored on media and
ensure it is secured within a controlled area.
•
Offer protection of media throughout its life until the media is destroyed or sanitized.
•
Provide media that supports and enables encryption.
•
Track any GFE that contains data and/or has the ability to store or transit data. This can
included but not limited to laptops, printers, mobile devices, USB, tablets, and external
drives.
•
Sanitize media, through destruction, prior to disposal:
•
o
Track all sanitized media and include verification of sanitization and disposal methods
used.
o
Test sanitization equipment to validate performance on an annual basis.
Provide ability to audit selected removable FNCS information system media.
Last Modified: 11/20/2015
For Official Use Only
Page 114 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
FNCS prohibits the use of portable storage devices in information systems when devices
have no identifiable owner and do not comply with FNCS acceptable use.
•
All removable media must be government furnished and will be encrypted when sensitive
data is put on to the media.
1822
Media Protection Guidelines
FNCS users who extract (print) output from SBU information systems are required to provide
appropriate labels to clearly identify the output, its level of protection and to determine how it is
used, handled and disseminated. When printing SBU information to a shared resource, retrieve all
hard-copy printouts in a timely manner. If the originator of a printout cannot be determined, the
printout must be shredded to protect against unwanted disclosure of SBU information.
FNCS users must exercise adequate precautions to ensure that FNCS Portable Electronic
Devices (PEDs) are secure at all times. Precautions include, but are not limited to:
a. Encrypt the PED and any external media using a FNCS approved method.
b. Encrypt the PED using container based encryption.
c. Do not leave PEDs unattended in public places.
d. Always shut down, lock in a secured storage container and keep PEDs out of view.
e. Best practices are to never leave PEDs in vehicles. If you must, always conceal from view.
f.
Report within one-hour if your PED is lost or stolen.
g. Connect PED (laptops) to the FNCS network every 30 days for a minimum of 60 minutes to
ensure the device receives updates to virus definitions, operating systems and hot fixes.
Last Modified: 11/20/2015
For Official Use Only
Page 115 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on FNCS Personnel Information Security
1900
Overview
The greatest harm/disruption to a system may stem from the actions of individuals, both intentional
and unintentional. Users, designers, implementers and managers are involved in many important
issues in securing the information contained in FNCS Information Systems. Users of FNCS
Information systems must adhere to the personnel requirements contained in this guidance.
1910
References
This guidance is written in accordance with:
•
•
NIST SP 800-53 Rev. 4
Background Investigation Request from FNCS
1920
Roles and Responsibilities
1921
The CIO will:
•
Ensure all security access requirements are defined for each position.
•
Ensure all personnel have undergone the appropriate background investigation.
1922
The ISO will:
•
Develop, disseminate and periodically review/update personnel and information system
security procedures and guidelines.
•
Monitor the adherence to the personnel security guidance.
•
Ensure all personnel are trained annually in computer security, privacy and specific
security responsibilities that are applicable to their jobs.
•
Promptly delete and/or request deletion of system access for application and/or systems
when user terminates employment, suspects password has been compromised or no
longer needs access.
1923
The Contracting Officer’s Representative (COR) and ITPM will:
•
Ensure all new contract personnel are aware of personnel security requirements prior to
start of work at FNCS.
•
Distribute the Background Investigation Request forms to all contract personnel.
•
Approve the Background Investigation Request form and recommend the type of
investigation that is needed.
1924
•
The Users will
Understand their personnel security responsibilities and duties.
Last Modified: 11/20/2015
For Official Use Only
Page 116 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
Understand consequences as written in the Enforcement Statement if they do not comply
with the Information Systems Security Procedures and Guidelines.
•
Notify the ISO and Supervisor if misuse of data, security breach, violations of procedures
or compromise of password occurs. Please refer to the Incident Reporting and Response
guidance for additional instruction on reporting an incident.
1925
Personnel Security Guidelines
1926
Categorization of FNCS job positions
•
FNCS assigns risk designations to all job positions.
•
Risk designations are compliant with 5 CFR 731.106(a) and Office of Personnel
Management (OPM) policy and guidance.
•
FNCS establishes screening criteria for individuals filling all positions.
•
FNCS reviews/updates job position risk designations any time
description/duties/responsibilities of the position are significantly changed.
1927
Personnel Screening
FNCS screens personnel who require access to FNCS information and information systems by
requiring a specified level of background investigation and the completion/approval of the User
Access Request Form, FNS-674.
1928
Personnel Termination
•
Upon voluntary termination of employment for FNCS personnel, the user must complete
and have approved the Final Salary Report, form FNS-677.
•
Contract personnel who voluntarily terminate employment will contact their COR and
request the Government Contractor’s Employee Separation Checklist (GCESC).
o
The GCESC is also available for download from the E-forms, it can be found at:
http://fncs/ondemand/elibrary/EForms/FNS-774.pdf.
o
The GCESC must be completed with all applicable signatures on the last day of
employment for the contract personnel.
•
FNCS immediately terminates or submits requests to terminate system access following
receipt of the FNS-677 or GCESC forms.
•
FNS ensures that when employees and contractors are terminated the user access to the
FNS information the information system is disabled no later than 24 to 48 hours
•
Supervisors are required to notify OIT of terminations. OIT can then begin the process of
removing system accesses.
•
Notification can consist of calling the Help Desk or E-mailing the Security Officers Mailbox.
Last Modified: 11/20/2015
For Official Use Only
Page 117 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
•
HRD will require completion of Form FNS-865 (Offboarding Procedures) for
Students/Interns/Volunteers.
1929
•
Personnel Transfer
FNCS federal employees must notify his/her supervisor regarding transfer/reassignment.
The supervisor contacts Human Resources (HR) via email with the specifics of the
employee’s transfer/reassignment. The supervisor notifies Operation Security (OPSec)
and Desktop Services Branch (DSB) via email of the employee’s transfer/reassignment.
Once notified of the employee’s transfer/reassignment, OPSec and DSB have 72 hours to
disable accounts associated to the employee.
•
FNCS contractors must notify his/her project manager regarding transfer/reassignment.
The project manager contacts the project Contracting Officer Representative (COR)
regarding the transfer/reassignment. The COR must notify DSB and OPSec to disable
access to applications. OPSec and DSB have 72 hours to disable accounts associated to
the contractor.
•
FNCS personnel who are transferred or reassigned to a new location within FNCS will
complete the FNS-674 to request access to new systems and/or file shares.
•
FNCS personnel who are transferred or reassigned to a new position within FNCS will
have all system accesses re-assessed based on the location and job type/categorization.
The completion of the FNS-674 is needed to approve this request.
1930
Access Agreements
•
FNCS requires the completion and approval of the FNCS User Access Request form, FNS674 prior to providing access to FNCS Information Systems.
•
FNCS ensures access agreements are reviewed and if necessary updated annually.
•
FNCS requires through signature, an acknowledgement that the FNCS User understands
and complies with network rules of behavior.
•
The Rules of Behavior, distributed to each user prior to obtaining access to the FNCS
Network, contains sanctions for personnel who fail to comply with information system
security policies and procedures.
1931
Third-Party Personnel Security
All vendors and contractors that perform official FNCS business outside of FNCS facilities are
given FNCS Information Systems Security policies/procedures within acquisition related
documents and are required to adhere to them.
Last Modified: 11/20/2015
For Official Use Only
Page 118 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Guidance on Configuration Management of FNCS Information Systems
2000
Overview
NIST recommends that controls are in place to identify and manage changes to deliverables and
other work products. CM controls provide the requirements and procedures necessary for CM
activities and establishes the methodology for configuration for configuration identification and
control of releases and changes to configuration items. It also describes the process for
maintaining status accounting and verifying the completeness and correctness of configuration
items throughout the system lifecycle.
This document is written as a guide to ensure that all system changes are tracked and verified
through the lifecycle.
This guidance applies to all FNCS Users that have a responsibility in system configuration
changes. This procedure is updated and reviewed at least annually.
2010
References
This guidance is written in accordance with:
•
NIST SP 800-53 Rev. 4
2020
Roles and Responsibilities
2021
Change Control Board
•
The Change Control Board (CCB) is a group which meets on a regular basis to review,
assess and approve or reject Change Requests. The CCB is also tasked with coordinating
the scheduling of changes as well as ensuring that technical, business and budgetary
considerations are addressed prior to implementation of changes.
•
The CCB is chartered with preserving the operational integrity of the service delivery
infrastructure through the comprehensive review, analysis and authorization of all proposed
changes to the infrastructure, including hardware, software, configuration, policy, process,
procedural and other changes.
•
The CCB membership includes the following roles: CCB Leader, CCB Authorizing Body,
CCB Chairperson, Board of Advisors and Presenter.
•
All system change requests must be presented at the CCB for approval.
Last Modified: 11/20/2015
For Official Use Only
Page 119 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Appendix A – Glossary
Terms
Definitions
ACCESS
Interaction between a subject (person, process, or input
device), and an object, (Information Technology resources
e.g., a record file, program, or output device) that results in
the flow of information from one to another. Also, the
ability to obtain knowledge of information stored on the
system.
ACCESS CONTROL
Measures imposed to limit to the exposure of Information
Technology resources to only authorized users, programs,
processes or other systems.
ACCESS POINT
An access point is the entry point from a wireless station to
a Wireless Local Area Network (WLAN) or Wireless Wide
Area Network (WWAN), from a WLAN or WWAN to a
wired Local Area Network (LAN), between WLANs,
WLANs and WWANs, or between WWANS. Access points
generally consist of a radio, a wired network interface, and
management and bridging software. Access point
functionality can be implemented using a hardware device
or an application installed in another network device (a
router for example) and is configured based on
architecture requirements. Some vendors have removed
the management and bridging software from the access
point and placed these features into a wireless switch. In a
WLAN system with wireless switches, the access points
are usually called access ports and are essentially
transceivers (transmitter/receiver of data) with a network
interface. Software applications are available that can be
used to turn a laptop computer acting as a wireless station
(wireless client) into an access point.
ACCREDITATION
The official management decision given by a senior
agency official to authorize operation of an information
system and to explicitly accept the risk to agency
operations (including mission, functions, image, or
reputation), agency assets, or individuals, based on the
implementation of an agreed-upon set of security controls.
ACL
In computer security, an access control list (ACL) is a list
of permissions attached to an object. The list specifies who
or what is allowed to access the object and what
operations are allowed to be performed on the object. In a
typical ACL, each entry in the list specifies a subject and
an operation: for example, the entry (Alice, delete) on the
ACL for file XYZ gives Alice permission to delete file XYZ.
ACCESS CONTROL LIST
AES - ADVANCED ENCRYPTION
STANDARD
Last Modified: 11/20/2015
In cryptography, the Advanced Encryption Standard (AES),
also known as Rijndael, is a block cipher adopted as an
encryption standard by the U.S. government. It has been
For Official Use Only
Page 120 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
analyzed extensively and is now used widely worldwide [2]
as was the case with its predecessor, the Data Encryption
Standard (DES). AES was announced by National Institute
of Standards and Technology (NIST) as U.S. FIPS PUB
197 (FIPS 197) in November 26, 2001 after a 5-year
standardization process (see Advanced Encryption
Standard process for more details). It became effective as
a standard May 26, 2002. As of 2006, AES is one of the
most popular algorithms used in symmetric key
cryptography.
AIR CARD (aka) PC Card or Personal PCMC Personal Computer Memory Card International
Computer Memory Card International Association card, also called a PC Card or Air Card®. A
Association (PMCIA)
PCMCIA card may fit into an open slot in a mobile
computing device, or may need to be installed. It can be
equipped with a variety of features including modem and
network interface capabilities, and may act as a radio
transceiver. PCMCIA cards are often configured to work
with specific wireless carriers, but may support more than
one.
APPLICATION SYSTEM
An automated process or collection of processes, with the
supporting hardware, operating systems and
communication links that supports a business need.
AUDIT TRAIL
A chronological record of system activities sufficient to
enable the reconstruction, review, and examination of the
sequence of events and activities surrounding or leading to
a given operation, procedure, or event in a transaction
AUTHENTICATION
The means of establishing the validity of a claim to
authorized status. Three means of authenticating a user’s
identity can be used alone or in combination.
Something the individual knows (secret password,
Personal Identification Number (PIN), or cryptographic
key);
Something the individual possesses (token, an ATM card
or a smart card);
Something that belongs uniquely to or is part of the
individual (a biometrics such as a voice pattern,
handwriting dynamic, or fingerprint).
AVAILABILITY
The fractional amount of time that a system provides the
services and meets the mission requirements for which it is
designed and operated.
BACKGROUND INVESTIGATION
Review into a person’s past in the determination of
granting a security clearance.
Last Modified: 11/20/2015
For Official Use Only
Page 121 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
BIOMETRICS
Biometrics (ancient Greek: bios =”life”, metron
=”measure”) is the study of methods for uniquely
recognizing humans based upon one or more intrinsic
physical or behavioral traits. In information technology,
biometric authentication refers to technologies that
measure and analyzes human physical and behavioral
characteristics for authentication purposes. Examples of
physical (or physiological or biometric) characteristics
include fingerprints, eye retinas and irises, facial patterns
and hand measurements, while examples of mostly
behavioral characteristics include signature, gait and
typing patterns. All behavioral biometric characteristics
have a physiological component, and, to a lesser degree,
physical biometric characteristics have a behavioral
element.
BLUETOOTH
Bluetooth® enabled electronic devices connect and
communicate wirelessly via short-range (100m or less) in
ad hoc networks called piconets. IEEE 802.15 Wireless
Personal Area Networks (WPANs) formalized the
specification. The Bluetooth® standard is a computing and
telecommunications industry specification that describes
how mobile phones, computers, and PDAs should
interconnect with each other, with home and business
phones, and with computers using short-range
connections. Bluetooth® does not address audit and nonrepudiation security services. Since Bluetooth® devices do
not register when they join a network; they are invisible to
network administrators. Consequently, it is difficult for
administrators to apply traditional physical security
measures.
CAPITAL PLANNING AND
INVESTMENT CONTROL (CPIC)
A process resulting from the Clinger-Cohen Act
(Information Technology Management Reform Act of
(CPIC) 1996), which directs the head of each agency to
design and implement a process to maximize the value
and manage risks, associated with information technology
(IT) investments. The primary objective of CPIC is for
senior managers to systematically maximize the benefits of
IT investments using a five phased management process
established by the Office of Management and Budget and
the General Accounting Office.
•
•
Last Modified: 11/20/2015
Pre-Select Phase: Initial concept and definition of
business needs and the system’s scope and
functionality
Select Phase: Concise quantification of the system’s
design, project schedule, benefits, budget, and
For Official Use Only
Page 122 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
•
•
•
performance standards
Control Phase: The design, development, and
implementation of the system
Evaluate Phase: A review and analysis process that
takes place after an IT investment is operational to
determine whether the investment meets expectations.
Steady State Phase: The ongoing operation,
maintenance, and monitoring of the investment against
its planned schedules, budgets, and performance
measures.
CERTIFICATION
The technical evaluation that establishes the compliance of
a computer system, application, or network design and
implementation with prescribed security requirements.
CERTIFICATION AUTHORITY
The official responsible for reporting the comprehensive
evaluation of the technical and non-technical security
features of the FNCS system and other safeguards made
in support of the accreditation process to establish the
extent to which the system design and implementation
satisfies the FNCS Security Guidance and other cognizant
security requirements.
CLASSIFICATION
Designation of the sensitivity level of an entity (i.e.
sensitive, unclassified).
CLEARANCE VERIFICATION
The act of ensuring that a user has the proper security
clearance authorizations prior to granting access to a
facility or Information Technology system.
COLD SITE
A facility designated for emergency backup operations of
another system but not in operation until staffed and
uploaded for that task.
CONFIDENTIALITY
The physical and electronic condition that protects
information and data from unauthorized disclosure.
CONFIGURATION MANAGEMENT
(CM)
Oversight activities for changes and enhancements to the
FNCS system’s hardware, firmware, software, and
documentation to ensure that unintentional modifications
do not occur.
CONTINGENCY PLAN
A plan detailing emergency response, backup operations,
and post-disaster recovery steps for an information
technology system or program that will ensure the
availability of critical resources and facilitate the continuity
of operations in an emergency situation. FNCS OIT refers
to its CP as the ITCP IT Contingency Plan.
CONTINUITY OF OPERATIONS
PLAN (COOP)
A plan developed to support the organization in case of a
protracted infrastructure problem when relocation is
Last Modified: 11/20/2015
For Official Use Only
Page 123 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
necessary. A COOP specifies the actions necessary to
accomplish a smooth transition to an alternate site and
resumption of business operation. A COOP consists of
two components:
•
•
Disaster Recovery Plan – A plan that estimates how
long a system can be down before adversely affecting
the core business operation, the value of assets that
will be affected, emergency support personnel
required, and the availability of software, hardware and
telecommunication facilities needed to support the
system.
Business Resumption Plan – A plan developed for the
re-establishment of business processes when the
primary location for the business has been destroyed
or rendered unavailable for an extended period of time.
It typically covers relocating to a facility, business
equipment requirements, local area network support,
and all elements necessary to resume business
functions for mission critical business processes.
CONTROLLED AREAS
The areas within the FNCS facility where access is
monitored and restricted to authorized personnel.
COMMERCIAL OFF-THE-SHELF
(COTS) SYSTEMS
Software acquired by government contract through a
commercial vendor. The software is a standard product,
not developed for a particular government project.
COMMERCIAL WIRELESS
Devices, Services and Technologies commercially
procured and intended for use in commercial and
unlicensed frequency bands, e.g., Starbucks, airports.
COMPROMISE
The disclosure of information to persons who are not
authorized access thereto.
COMPUTER VIRUS
A program designed to infect system software or
application programs in much the same way as a biological
virus infects humans. The typical virus reproduces by
making copies of itself when inserted into other programs.
DATA
A representation of facts, concepts, information, or
instructions suitable for communication, interpretation, or
processing by humans or by Information Technology
resources.
DATA INTEGRITY
The attribute of data relating to the preservation of (1) its
meaning and completeness, (2) the consistency of its
representation(s) and (3) its correspondence to what it
represents.
Last Modified: 11/20/2015
For Official Use Only
Page 124 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
DMZ – DEMILITARIZED ZONE
A part of the network that is neither part of the internal
network nor directly part of the Internet. Basically a
network sitting between two networks.
DECRYPT
To convert, by use of the appropriate key, encrypted
(encoded or enciphered) text into its equivalent plain text.
DENIAL OF SERVICE (DoS)
Action or actions that deteriorate all or part of the ability of
an Information Technology infrastructure to perform its
designated mission.
DEPUTY REGIONAL INFORMATION An individual appointed for each region within the
SYSTEMS SECURITY OFFICER
organization. The DRISSO acts on behalf of the
(DRISSO)
Information Systems Security Office to ensure compliance
with the information systems security procedures
developed for the local environment.
DIAL-BACK
A procedure used by some remote access software or
hardware that receives a connection and authenticates the
user, then hangs up the connection and dials a
predetermined number in order to establish a
communications session with the user.
DIGITAL SIGNATURES
A digital signature (not to be confused with a digital
certificate) is an electronic signature that can be used to
authenticate the identity of the sender of a message or the
signer of a document, and possibly to ensure that the
original content of the message or document that has been
sent is unchanged. Digital signatures are easily
transportable, cannot be imitated by someone else, and
can be automatically time-stamped. The ability to ensure
that the original signed message arrived means that the
sender cannot easily repudiate it later.
DISASTER
An event with the potential to disrupt computer operations,
thereby disrupting critical mission and business functions.
Such an event could be a power outage, hardware failure,
fire, or storm.
EMERGENCY/INCIDENT
RESPONSE
The prompt and effective reaction to disruptions in normal
processing activities through preplanned, measured steps.
EMPLOYEE PERSONAL TIME
Non-Work Hours. Employees may use government
furnished equipment during their own off-duty hours such
as before or after a workday (subject to local office hours),
lunch periods, authorized breaks, or weekends or holidays
(if their duty station is normally available at such times).
ENCRYPTION
The process of transforming data into a format that the
original data either cannot be obtained (one-way
encryption) or cannot be obtained without using the
inverse decryption process.
Last Modified: 11/20/2015
For Official Use Only
Page 125 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
ENCRYPTION ALGORITHM
A set of mathematically expressed rules through which
transmitted information is rendered unintelligible.
Cryptography affects a series of transformations through
the application of variable elements, controlled by use of a
cryptographic key, to the normal representation of the
information.
EXTERNAL NETWORK
Any network outside of the control of the FNCS IT
infrastructure staff. Examples are the Internet, the Public
Telephone System (PTS), Value Added Networks (VANs),
vendor networks, other Agency/Department networks, etc.
FIRMWARE
Logic circuits in read-only memory that can be altered by
software under certain circumstances.
FIREWALL
A firewall is a device that guards the entrance to a private
network and keeps out unauthorized or unwanted traffic.
GATEWAY
The interface between electronic mail environments to
facilitate the exchange of messages and attachments
despite the size and type of message content.
GENERAL SUPPORT SYSTEM
(GSS)
An interconnected set of information resources under the
same direct management control which shares common
functionality. A system normally includes hardware,
software, information, data, applications, communications,
and people. A system can be, for example, a local area
network (LAN) including smart terminals that supports a
branch office, an agency-wide backbone, a
communications network, a departmental data processing
center including its operating system and utilities, a tactical
radio network, or a shared information processing service
organization (IPSO).
GOVERNMENT OFF-THE-SHELF
Software developed by the government. This software is a
standard product, not developed for a particular
government project.
GFE – GOVERNMENT-FURNISHED
EQUIPMENT
Any government issued equipment, issued by FNCS or
USDA.
HOT FIX
A hot fix is code (sometimes called a patch) that fixes a
bug in a product. Users of the products may be notified by
e-mail or obtain information about current hot fixes at a
software vendor’s Web site and download the hot fixes
they wish to apply. Hot fixes are sometimes packaged as a
set of fixes called a combined hot fix or a service pack.
HOT SITE
A processing facility already equipped with processing
capability and fully operational.
HUB
A common connection point for devices in a network. Hubs
are commonly used to connect segments of a LAN. A hub
Last Modified: 11/20/2015
For Official Use Only
Page 126 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
contains multiple ports. When a packet arrives at one port,
it is copied to the other ports so that all segments of the
LAN can see all packets.
IDENTIFICATION
The means by which a user provides a claimed identity to
the system.
INCIDENT
Event that has an actual or potential effect on an
Information System.
INFORMATION SECURITY OFFICE
(ISO)
The focal point for all organizational information systems
security concerns and who ensures that the program
requirements described in the FNCS security Guidance
statements are implemented.
INFORMATION TECHNOLOGY
INFRASTRUCTURE
The equipment used in the acquisition, processing,
storage, and dissemination of information in all its forms
(auditory, pictorial, textual, and numerical) through a
combination of computers, telecommunications networks,
networks (LAN’s/WAN’s consisting of switches, router,
hubs, etc.), and electronic devices.
INTEGRITY
The quality of data that ensures the continuity of its format,
content, and veracity.
INTERNET
The collection of worldwide “network of networks” that use
the TCP/IP protocol suite for communications.
INTERCONNECTION SERVICE
AGREEMENT (ISA)
An agreement established between the organizations that
own and operate connected IT systems to document the
technical requirements of the interconnection. The ISA
also supports a Memorandum of Understanding or
Agreement (MOU/A) between the organizations.
INTRANET
A network internal to the organization that is based on
TCP/IP protocols.
MEMORANDUM OF
UNDERSTANDING/AGREEMENT
(MOU/MOA)
A document established between two or more parties to
define their respective responsibilities in accomplishing a
particular goal or mission. MOU/A defines the
responsibilities of two or more organizations in
establishing, operating, and securing a system
interconnection.
MISSION CRITICAL SYSTEM
Systems that are essential to the execution of FNCS
business functions. There would be major financial losses,
as well as losses to the creditability of FNCS if these
systems fail or become inoperable for any period of time.
NEED-TO-KNOW
A determination made by the owner or controller of certain
information that a prospective recipient of the information
has a valid requirement for access to, knowledge of, or
possession of the information.
Last Modified: 11/20/2015
For Official Use Only
Page 127 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
NETWORK
A communication medium including all components
connected to that medium (computers, routers, controllers,
packet switches, etc.) used for the transference of
information.
NETWORK ACCESS CONTROL
MECHANISM
Hardware or software responsible for restricting access to
network hosts. Examples are firewalls, secure application
gateways, secure dial-up devices, Virtual Private
Networking, etc.
NAT – NETWORK ADDRESS
TRANSLATION
NAT (Network Address Translation or Network Address
Translator) is the translation of an Internet Protocol
address (IP address) used within one network to a different
IP address known within another network. One network is
designated the inside network and the other is the outside.
Typically, a company maps its local inside network
addresses to one or more global outside IP addresses and
un maps the global IP addresses on incoming packets
back into local IP addresses. This helps ensure security
since each outgoing or incoming request must go through
a translation process that also offers the opportunity to
qualify or authenticate the request or match it to a previous
request. NAT also conserves on the number of global IP
addresses that a company needs and it lets the company
use a single IP address in its communication with the
world.
NAT is included as part of a router and is often part of a
corporate firewall. Network administrators create a NAT
table that does the global-to-local and local-to-global IP
address mapping. NAT can also be used in conjunction
with Guidance routing.
NETWORK MAPPING TOOL
An example of a Network Mapping Tool is Network
Analyzer. It is a hardware or software device that monitors
and analyses data traveling over a network. Network
Analyzer offers various network troubleshooting features,
including protocol-specific packet decodes, specific
preprogrammed troubleshooting tests, packet filtering, and
packet transmission.
NIC - NETWORK INTERFACE
CONTROLLER(CARD)
A network card, network adapter or NIC (network interface
controller) is a piece of computer hardware designed to
allow computers to communicate over a computer network.
It is both an OSI layer 1 (physical layer) and layer 2 (data
link layer) device, as it provides physical access to a
networking medium and provides a low-level addressing
system through the use of MAC addresses. It allows users
to connect to each other either by using cables or
wirelessly.
Last Modified: 11/20/2015
For Official Use Only
Page 128 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
PACKET SNIFFERS
A packet sniffer (also known as a network analyzer or
protocol analyzer or, for particular types of networks, an
Ethernet sniffer or wireless sniffer) is computer software or
computer hardware that can intercept and log traffic
passing over a digital network or part of a network. As data
streams travel back and forth over the network, the sniffer
captures each packet and eventually decodes and
analyzes its content according to the appropriate RFC or
other specifications.
PASSWORD CRACKING
Password cracking is the process of recovering secret
passwords from data that has been stored in or transmitted
by a computer system. A common approach is to
repeatedly try guesses for the password. The purpose of
password cracking might be to help a user recover a
forgotten password (though installing an entirely new
password is less of a security risk, but involves system
administration privileges), to gain unauthorized access to a
system, or as a preventive measure by system
administrators to check for easily crack-able passwords.
PATCH
A patch (sometimes called a “fix”) is a quick-repair job for a
piece of programming. During a software product’s beta
test distribution or try-out period and later after the product
is formally released, problems (called bug) will almost
invariably be found. A patch is the immediate solution that
is provided to users; it can sometimes be downloaded from
the software maker’s Web site. The patch is not
necessarily the best solution for the problem and the
product developers often find a better solution to provide
when they package the product for its next release.
A patch is usually developed and distributed as a
replacement for or an insertion in compiled code (that is, in
a binary file or object module). In larger operating systems,
a special program is provided to manage and keep track of
the installation of patches.
PED – PORTABLE ELECTRONIC
DEVICES
Last Modified: 11/20/2015
A PED is any electronic device that is capable of receiving,
storing or transmitting information using any format (i.e.,
radio, infrared, network or similar connections) without a
permanent link to Federal networks. Handheld devices
such as PDAs and cell phones allow remote user to
synchronize personal databases and provide access to
network services such as wireless e-mail, Web browsing
and Internet Access. Generally, PEDs include but are not
limited to: cell phones, pagers, text messaging devices
(Blackberries), hand scanners, PDAs, voice recorders and
flash memory.
For Official Use Only
Page 129 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
PEER-TO-PEER
WLANs may be configured into a peer-to-peer (also known
as ad hoc or independent) network that permits devices to
communicate directly. Peer-to-peer WLAN
communications can bypass required encryption and
authentication mechanisms, making transmissions
vulnerable to interception and unauthorized access from
outsiders. Peer-to-peer voice communications are an
exception to this Guidance.
PERFORMANCE MEASUREMENT
The use of measures for monitoring and assessing
progress toward an effective Information Systems Security
Program.
PDA – PERSONAL DIGITAL
ASSISTANT/SMART PHONE
Personal digital assistants (PDAs) are handheld computers
that were originally designed as personal organizers, but
became much more versatile over the years. PDAs are
also known as pocket computers or palmtop computers.
PDAs have many uses: calculation, use as a clock and
calendar, playing computer games, accessing the Internet,
sending and receiving E-mails, video recording, typewriting
and word processing, use as an address book, making and
writing on spreadsheets, use as a radio or stereo, and
Global Positioning System (GPS). Newer PDAs also have
both color screens and audio capabilities, enabling them to
be used as mobile phones (smart phones), web browsers,
or portable media players. Many PDAs can access the
Internet, intranets or extranets via Wi-Fi, or Wireless WideArea Networks (WWANs). One of the most significant PDA
characteristic is the presence of a touch screen.
Personal Electronic Equipment
An electronic device that emits an audible or visual signal,
displays a message, or otherwise summons the
possessor, including, but not limited to, cellular telephones,
tablets, paging devices, electronic e-mailing devices,
radios, tape players, CD players, DVD players, video
cameras, iPods or other MP3 players, portable video game
players, laptop computers, personal digital assistants
(PDA’s), cameras, and any device that provides a wireless
connection to the Internet.
PHYSICAL SECURITY
The physical application of barriers and control procedures
as preventive measures or countermeasures against
threats to IT resources, and sensitive information.
PERSONALLY IDENTIFIABLE
INFORMATION (PII)
Any piece of information which can potentially be used to
uniquely identify, contact, or locate a single person.
PICONET
A piconet is established when two or more portable
devices make a wireless connection. When a piconet is
Last Modified: 11/20/2015
For Official Use Only
Page 130 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
formed, one device controls one or more other devices for
the duration of the communication session. A piconet is
sometimes called a Personal Area Network (PAN).
POA&M – PLAN OF ACTION AND
MILESTONES
A plan of action and milestones (POA&M) is a tool that
identifies tasks that need to be accomplished. It details
resources required to accomplish the elements of the
plan, any milestones in meeting the task, and scheduled
completion dates for the milestones.
The purpose of this POA&M is to assist agencies in
identifying, assessing, prioritizing, and monitoring the
progress of corrective efforts for security weaknesses
found in programs and systems.
POE – PERSONALLY-OWNED
EQUIPMENT
This is equipment that is not owned by FNCS or the
Federal Government. Please see Network Access
Guidance for restrictions on POEs.
PORT SCANNER
A port scanner is a piece of software designed to search a
network host for open ports. This is often used by
administrators to check the security of their networks and
by crackers to compromise it.
PRIVACY
The concept that a user’s data, such as stored files and email, is not to be examined by anyone else without that
user’s permission.
PROXY SERVER
In computer networks, a proxy server is a server (a
computer system or an application program) which
services the requests of its clients by making requests to
other servers. A client connects to the proxy server,
requesting a file, connection, web page, or other resource
available from a different server. A proxy server provides
the resource by connecting to the specified server, with
some exceptions: A proxy server may alter the client’s
request or the server’s response. A proxy server may
service the request without contacting the specified server.
QUALITATIVE RISK ASSESSMENT
A methodology used to assess risk based on descriptions
and rankings.
QUANTITATIVE RISK
ASSESSMENT
A methodology used to assess risk based on
computational means.
REMOTE ACCESS
The interface by a user operating on a device at a location
outside the internal environment of a specified internal IT
network structure into that structure.
Last Modified: 11/20/2015
For Official Use Only
Page 131 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
Removable Media
Device or media that is readable and/or writeable by the
end user and is able to be moved from computer to
computer. This includes but is not limited to flash memory
devices such as thumb drives, cameras, MP3 players and
PDAs; removable hard drives (including hard drive-based
MP3 players); optical disks such as CD and DVD disks;
floppy disks and any commercial music and software
disks.
REMOVABLE STORAGE MEDIA
USB/Flash drive, External hard drive, CD and DVD,
Floppy Disks and Back-up Tapes
RISK
A combination of the likelihood that a threat shall occur,
the likelihood that a threat occurrence shall result in an
adverse impact, and the severity of the resulting adverse
impact.
RISK ASSESSMENT
The process of identifying, validating and analyzing the
existing threats and vulnerabilities of an information
system, and the potential impact that the realization of any
of those risks would have on the delivery of agency
service. The resulting analysis is then used as a basis for
identifying appropriate and cost-effective measures to
mitigate the risk. Risk analysis is the part of risk
management that evaluates specific security measures
and their commensurability with the value of the resources
to be protected, the vulnerabilities of those resources, and
the identified the identified threats against them.
RISK MANAGEMENT
Process concerned with the identification, measurement,
safeguard, and control of security risks in the FNCS
system.
RISK MITIGATION
The selection and implementation of security controls to
reduce risk to a level acceptable to management.
ROUTER
A device or setup that finds the best route between any
two networks, even if there are several networks to
traverse. Like bridges, remote sites can be connected
using routers over dedicated or switched lines to create
WANs.
SECURITY
Measures, safeguards and controls that ensure
confidentiality, integrity, availability, and accountability of
information transmitted, processed, and stored on FNCS
IT systems.
SECURITY CLEARANCE
A level of assurance that an individual is trustworthy and
reliable, so that he or she can have access to agency IT
systems.
SECURITY CERTIFICATION
A formal testing of the security safeguards implemented in
Last Modified: 11/20/2015
For Official Use Only
Page 132 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
and about the computer system to determine whether it
meets applicable requirements and specifications.
SECURITY DOCUMENTATION
The technical records used and maintained throughout the
information system’s life cycle and the written guidance for
users of the system’s software applications and hardware.
Technical documentation includes system and design
specifications; management plans, architectural prototype,
and detail design documents; test specifications and
reports, and engineering change requests and results.
User documentation includes customer reference and
usage information.
SECURITY MANAGEMENT
Supporting services that oversee to the protection of
Information and resources in accordance with applicable
security Guidance.
SECURITY SAFEGUARDS
Measures and controls that are prescribed to meet
specified system security requirements. Safeguards may
include, but are not limited to, hardware and software
security features; operation procedures; accountability
procedures; access and distribution controls; management
constraints; personnel security; and physical structures,
areas, and devices.
SECURITY TEST AND EVALUATION Examination and analysis of the measures, safeguards
and controls required to protect the FNCS system, as they
have been applied in an operational environment, to
determine the security posture of the system.
SENSITIVE INFORMATION
“Any information the loss, misuse or unauthorized access
to or modification of which could adversely affect the
national interest or the conduct of Federal programs, or the
privacy to which individuals are entitled under section 552
a of title 5 USC (The Privacy Act), but which has not been
specifically authorized under criteria established by an
Executive Order or an Act of Congress to be kept secret in
the interest of national defense or foreign Guidance.”
SENSITIVITY ASSESSMENT
Looks at the sensitivity of both the information to be
processed and the system itself. The assessment
considers legal implications, organization Guidance, and
the functional needs of the system.
Last Modified: 11/20/2015
For Official Use Only
Page 133 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
SERVER
Definitions
Server (computing) a computer that provides services to
other computers, or the software that runs on it also like
the internet sites like Google and Yahoo.
Application server, a server dedicated to running certain
software applications
Communications server, carrier-grade computing platform
for communications networks
Database server provides database services
Proxy server Provides database IT server in services
Fax server provides fax services for clients
File server provides file services
Game server a server that video game clients connect to in
order to play online together
Standalone server an emulator for client-server (webbased) programs
Web server a server that HTTP, WWW, COM, ORG, NET,
CC, Info, and TV clients connect to in order to send
commands and receive responses along with data
contents.
Client-server a software architecture that separates
“server” functions from “client” functions
The X Server part of the X Window System
Peer-to-peer a network of computers running as both
clients and servers.
SERVICE PACK
A service pack is an orderable or downloadable update to
a customer’s software that fixes existing problems and, in
some cases, delivers product enhancements. IBM and
Microsoft are examples of companies that use this term to
describe their periodic product updates.
SERVICE SET IDENTIFIER (SSID)
Short for service set identifier, a 32-character unique
identifier attached to the header of packets sent over a
WLAN that acts as a password when a mobile device tries
to connect to the Basic Service Set (BSS). The SSID
differentiates one WLAN from another, so all access points
Last Modified: 11/20/2015
For Official Use Only
Page 134 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
and all devices attempting to connect to a specific WLAN
must use the same SSID. A device will not be permitted to
join the BSS unless it can provide the unique SSID.
Because an SSID can be sniffed in plain text from a packet
it does not supply any security to the network. An SSID is
also referred to as a network name because essentially it
is a name that identifies a wireless network.
SPAM OR Spam
Electronic, unsolicited or undesired bulk electronic
messages. There are many types of electronic spam,
including
E-mail spam, unsolicited e-mail.
SPECIALIZED (CUSTOM) SYSTEMS Software that is developed for a specific function/project by
a vendor or internal source.
STRONG AUTHENTICATION
The use of at least two forms of authentication to identify
and authenticate a subject. Forms of authentication
include something the subject knows (e.g. passwords.),
something the subject has (e.g. keys, authentication
tokens, smart cards, etc.), or something the subject is (e.g.
biometrics).
SWITCHES
A switch is a device for changing the course (or flow) of a
circuit. The prototypical model is a mechanical device (for
example a railroad switch) which can be disconnected
from one course and connected to another. The term
"switch" typically refers to electrical power or electronic
telecommunication circuits. In applications where multiple
switching options are required (e.g., a telephone service),
mechanical switches have long been replaced by
electronic variants which can be intelligently controlled and
automated.
SYSTEM INTERCONNECTION
The state of systems being mutually connected to each
other.
SYSTEM
A discrete set of information technology, data, and related
resources, such as personnel, hardware, software, and
associated technology services organized for the
collection, processing, maintenance, use, sharing,
dissemination or disposition of information. A system must
have logical boundaries around a set of processes,
communications, storage and must: (1) be under the same
direct management control; (2) have the same function or
mission objective; (3) have essentially the same operating
characteristics and security needs; and (4) reside in the
same general operating environment.
SYSTEM SECURITY PLAN (SSP)
A formal document that fully describes the in place security
features and procedures and the planned security tasks
Last Modified: 11/20/2015
For Official Use Only
Page 135 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
required to meet security requirements and eventualities.
THREAT
Any circumstance or event with the potential to cause
harm to FNCS IT systems in the form of destruction,
disclosure, modification of data, or denial of service.
TCP/IP - TRANSMISSION CONTROL A suite of rules (protocols) that define how data is
PROTOCOL (TCP) INTERNET
transported among computers on the Internet.
PROTOCOL (IP)
TRUSTED FACILITY MANUAL
A document prepared to satisfy the requirement of any
Trusted Computer Security (TCSEC) class. The Trusted
Facility Manual provides detailed information on how to: 1)
configure and install a secure system; 2) operate the
system securely; 3) correctly and effectively use system
privileges and protection mechanisms to control access to
administrative functions; and 4) avoid improper use of
those functions which could compromise the trusted
computer base (TCB) and user security. A Trusted Facility
Manual is a necessary tool for all system administrators to
ensure that they are running in a “trusted manner”.
UNAUTHORIZED ACCESS
The use of IT resources by any person not authorized to
have access to the facilities housing the FNCS system, the
system itself or the information residing therein.
USB – UNIVERSAL SERIAL BUS
USB (Universal Serial Bus) is a plug-and-play interface
between a computer and add-on devices (such as audio
players, joysticks, keyboards, telephones, scanners, and
printers). With USB, a new device can be added to your
computer without having to add an adapter card or even
having to turn the computer off. The USB peripheral bus
standard was developed by Compaq, IBM, DEC, Intel,
Microsoft, NEC, and Northern Telecom and the technology
is available without charge for all computer and device
vendors.
USERS
Personnel or processes accessing an Information
Technology resource either by direct connections (i.e., via
terminals) or indirect connections (i.e., prepare input data
or receive output).
VALIDATION
Determination of the correct implementation in the
completed FNCS system with the security requirements
and approach agreed upon by FNCS, and the user
community.
VPN - VIRTUAL PRIVATE
NETWORK
A private data network that makes user of the
telecommunication infrastructure, maintaining privacy
through the use of a tunneling protocol and security
procedures.
Last Modified: 11/20/2015
For Official Use Only
Page 136 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
VULNERABILITY
A weakness in the physical layout, organization,
procedures, personnel, management, administration,
hardware, or software that may be exploited to cause harm
to FNCS systems.
WAN
A wide area network (WAN) is a geographically dispersed
telecommunications network. The term distinguishes a
broader telecommunication structure from a local area
network (LAN). A wide area network may be privately
owned or rented, but the term usually connotes the
inclusion of public (shared user) networks. An intermediate
form of network in terms of geography is a metropolitan
area network (MAN).
Wi-Fi – Wireless Fidelity
Wi-Fi is a brand originally licensed by the Wi-Fi Alliance to
describe the embedded technology of wireless local area
networks (WLAN) based on the IEEE 802.11
specifications. Wi-Fi was developed to be used for mobile
computing devices, such as laptops in LANs, but is now
increasingly used for more services, including Internet and
VOIP phone access, gaming, and basic connectivity of
consumer electronics such as televisions, DVD players,
and digital cameras. More standards are in development
that will allow Wi-Fi to be used by cars on highways in
support of an Intelligent Transportation System to increase
safety, gather statistics, and enable mobile commerce (see
IEEE 802.11p). Wi-Fi and the Wi-Fi CERTIFIED logo are
registered trademarks of the Wi-Fi Alliance - the trade
organization that tests and certifies equipment compliance
with the 802.11x standards.
WIRELESS DEVICE
Hardware that provides wireless capabilities. This
definition includes, but is not limited to wireless handheld
devices like PDAs, cellular/PCS phones, two-way pagers,
wireless audio/video recording devices, telemetry devices
with wireless integrated technologies, electronic tablets
and laptop computers.
WIRELESS HANDHELD DEVICE
Small computers often capable of synchronizing with a PC
on specific software applications. Many handheld devices
are capable of “beaming” data with the use of Infrared (IR)
or Bluetooth technologies. Handheld wireless devices
include a range of PDAs and Smart phones that may
combine the capabilities of a traditional PDA, digital
cellular telephone with voice services as well as E-mail,
text messaging, Web access, voice recognition and any
number of applications that serve a productivity tools.
WLAN – Wireless LAN
A wireless LAN (or WLAN, for wireless local area network,
Last Modified: 11/20/2015
For Official Use Only
Page 137 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Terms
Definitions
sometimes referred to as LAWN, for local area wireless
network) is one in which a mobile user can connect to a
local area network (LAN) through a wireless (radio)
connection. The IEEE 802.11 group of standards specify
the technologies for wireless LANs. 802.11 standards use
the Ethernet protocol and CSMA/CA (carrier sense
multiple access with collision avoidance) for path sharing
and include an encryption method, the Wired Equivalent
Privacy algorithm.
WORM
A complete program that propagates itself from system to
system, usually through a network or other communication
facility. A worm is similar to a virus and can infect other
systems and programs. A worm differs from a virus in that
a virus replicates itself, and a worm does not. A worm
copies itself to a person’s workstation over a network or
through a host computer and then spreads to other
workstations, possibly taking over a network. Unlike a
Trojan horse, a worm enters a system uninvited.
WPAN - WIRELESS PERSONAL
AREA NETWORK
WPANs operate in the Personal Operating Space (POS) of
a user, which extends 10 meters in any directions. Also
known as Bluetooth®, WPAN communications are
governed by the IEEE 802.15 family of standards.
Additional Terms are located in the DM3595-00, 1 USDA Cyber Security Manual Series 3500
Glossary. http://www.ocio.usda.gov/directives/doc/DM3595-001.pdf.
Last Modified: 11/20/2015
For Official Use Only
Page 138 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Appendix B – Form FNS-674 Completion Instructions
The FNS-674 form is to be used to obtain access to the network, escalation of privileges, access
to privileged information systems, etc.
Please refer to the system Access FNS -674 User guide located online here for further details on
how to complete the FNS-674 form.
FNS-674 User Access Forms must be signed by all authorizing officials before an account is
created.
Last Modified: 11/20/2015
For Official Use Only
Page 139 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Appendix C – Password Hints
Password Protection Standards
•
Treat passwords as sensitive, confidential information.
•
Memorize your password.
•
Passwords should never be written down or stored online.
•
Never share your password with anyone.
•
Immediately contact your ISSO if you feel your password has been compromised.
Creation of Password Standards
•
Passwords must contain a minimum of twelve (12) characters.
•
Include at least three of the following character sets: upper case; lower case; numeric
characters; special non-alphanumeric characters such as # & % ! @ ( ).
•
Maximum password age must be 60 days.
Password Suggestions
•
Do not include any simple pattern of letters or numbers such as “aaabbbccc” or
“12345678910.”
•
Do not make passwords easy to guess e.g., “my family name” or a birth date or a street
address.
•
Do not use words in any language, slang, jargon or words found in a dictionary. For
example, you cannot use xylophone, but you can use “Xy!oph0ne12!”
•
Try using a favorite quotation as an acronym by using the first letter of each word in the
quotation including upper case, lower case and punctuation to make your password more
secure and easier to remember. Don’t forget to make your password 12 characters or
more. Some examples follow:
a. “Once upon a midnight dreary, while I pondered, ...”Ouamd,wip...”
b. “T’was the night before Christmas and all, ...”Ttnbcaa…”
c. “I’d walk a mile for a camel…!,” “Iwamfacl,…!”
Remember, more secure passwords are those which are based on pass phrases and/or nondictionary words (including “nonsense” words), combined with obscure character substitutions.
These types of passwords can be extremely difficult to either guess or crack.
Last Modified: 11/20/2015
For Official Use Only
Page 140 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Appendix D – Required C&A System Security Documents
Security
Categorization
Document (SCD)
The SCD is used to determine the appropriate
security categorization for the system or
application, and the levels of involvement
identified for confidentiality, integrity, and
availability. Federal Information Processing
Standards Publication (FIPS PUB) 199
provides guidance for assigning security
categorization factors for information
processed on federal systems. Each factor is
assigned a level of low, moderate, or high.
Business reference models (lines of business
and data types) should be referenced from
NIST SP800-60. The completed System
Categorization aka “Syscat” from the
ASSERT/CSAM tool is acceptable for meeting
this requirement. Unique Project Identifier
(UPI) codes must be included in the SCD of
ASSERT/CSAM document for systems
covered by the document. This document may
be included as an appendix in the system
security plan (SSP).
FIPS PUB 199
NIST SP 80060
Risk Assessment
(RA)
The baseline for the risk assessment is the
agency self-evaluation from NIST SP 800-30. The
agency RA should be completed in accordance
with NIST guidance to ensure that system
security controls are maintained to protect
system assets and information. This document
may be included as an appendix in the SSP.
NIST SP 80030
Privacy Impact
Assessment (PIA)
The PIA provides an analysis of how personal
information is handled in an information
system. Agencies must complete a PIA for all
systems. This document may be included as
an appendix in the SSP.
Privacy Act of
1974
System Security
Plan (SSP)
The SSP should contain a description of the
security controls required for the system and
how these controls are implemented as part of
the system’s security posture.
NIST SP 80018
DM 3565-001
Security Control
Assessment Plan
The Security Control Assessment plan should
contain detailed procedures and/or checklists
for validating the implementation of each
required security control.
NIST SP 80053
Security Control
Assessment
Report
The Security Control Assessment report
contains results of functional and security
testing conducted on the system as required by
the security categorization.
NIST SP 80053
Security
The format and content of the security
USDA
Last Modified: 11/20/2015
For Official Use Only
Page 141 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Assessment
Report (SAR)
Contingency and
Disaster
Recovery Plans
(CDRP)
assessment are described, including major
findings, recommended corrective actions, and
a proposed accreditation statement. In
particular, the major findings should include
both proposed residual vulnerabilities and
proposed vulnerabilities requiring correction.
CDRPs should include all procedures that will be
taken in the event of an incident that shuts down
the system, or a large emergency that destroys
the system entirely. These procedures should
provide for system and data restoration within a
prescribed time based on system criticality.
Often, for USDA systems, this information can
be found in LDRPS.
Certification
and
Accreditation
Guide
NIST SP 80034
DM 3570-001
FPC-65
Plans must be tested annually. The following
systems must have a fully functional test
performed annually:
Systems categorized as “High” by NIST FIPS
199;
Systems that retrieve records by personally
identifiable information (PII) and/or requires
a system of record (SOR) notice to be
posted; and
Systems storing, processing, or transmitting
agency financial information.
Tabletop tests may be conducted for all other
systems twice a year.
Trusted Facilities
Manual (TFM) or
Equivalent
(Note for re-accreditation: If a system has
undergone no major changes and has satisfied
its annual contingency plan test requirement,
this will satisfy the C&A requirement of a tested
contingency plan.)
The purpose of a TFM is to document the
necessary information to operate the system in a
secure and effective manner. The requirement
includes the following:
Documentation shall include guide(s)
or manual(s) for the system’s
privileged users. The manual(s) shall
at a minimum provide information on
(1) configuring, installing, and
operating the system; (2) making
optimum use of the system’s security
features; and (3) identifying known
security vulnerabilities regarding the
Last Modified: 11/20/2015
For Official Use Only
Page 142 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
configuration and use of
administrative functions. The
documentation shall be updated as
new vulnerabilities are identified.
Security Features
Users Guide
(SFUG) or
Equivalent
The TFM is not meant for general users of the
system, but for use by those personnel
designated as having specific security-related
responsibilities. It provides information about the
environment, roles, and responsibilities that
guide security administrators and others with
security responsibilities in the use of the security
features provided by the IS. The TFM
documents the configuration guidance used, the
operational requirements, the security
environment, the hardware and software
configurations and interfaces, and all security
procedures, measures, and contingency plans
for an IS. It also identifies known security
vulnerabilities and any risk mitigation
approaches employed. This document may be
included as an appendix in the SSP.
The SFUG should be written for system and
application users, and should clearly explain
the security procedures and precautions that
users are expected to follow (i.e., procedures
for maintaining password secrecy, etc.). This
document may be included as an appendix in
the SSP.
Configuration
Management
Plan (CMP)
The configuration management plan is used to
manage the changes that occur during a
system’s life cycle to ensure the integrity of the
system. The National Consensus Standard for
Configuration Management Government
Electronics and Information Technology
Association describes Configuration
Management functions and principles, and
defines a neutral Configuration Management
terminology for use with any product line. This
document may be included as an appendix in
the SSP.
ANSI/GEIA
EIA-649-A
Security Control
Compliance
Matrix (SCCM)
The matrix should list each security control, the
reference from which the security control was
derived, and whether or not the control was
implemented. The SCCM should start with the
appropriate NIST SP800-53 control baseline. It
should then be tailored with supplemental and
compensating controls as determined by the
risk assessment. Baseline tailoring should be
described in the SSP. This document may be
NIST SP 80025
NIST SP 80053
FIPS PUB 199
FIPS PUB 200
Last Modified: 11/20/2015
For Official Use Only
Page 143 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
included as an appendix in the SSP.
System of
Records Notice
(SORN)
The Privacy Act of 1974 requires agencies to
publish in the Federal Register a “notice of the
existence and character of the system of
records.” A “system of records” is defined as a
group of any records under the control of any
agency from which information is retrieved by
the name of the individual or by some
identifying number, symbol, or other identifying
particular assigned to the individual. This
document may be included as an appendix in
the SSP.
Privacy Act of
1974
Plan of Action
and Milestones
(POA&Ms)
POA&Ms are descriptions of measures
implemented or planned to correct deficiencies
and reduce/eliminate vulnerabilities identified
by the certification team. This document may
be included as an appendix in the SSP.
OMB
Memorandum
02-01
Interconnection
Security
Agreement
(ISA)
Memorandum of
Understanding
(MOU)
Memorandum of
Agreement (MOA)
NIST Special Publication 800-47 “Security
Guide for Interconnecting Information
Technology Systems” (August, 2002) provides
a management approach for interconnecting IT
systems, with an emphasis on security. The
document recommends development of an
Interconnection Security Agreement (ISA) and
a Memorandum of Understanding (MOU). The
ISA specifies the technical and security
requirements of the interconnection, and the
MOU defines the responsibilities of the
participating organizations. The security guide
recommends regular communications between
the organizations throughout the life cycle of
the interconnection. One or both organizations
shall review the security controls for the
interconnection at least annually or whenever a
significant change occurs to ensure the
controls are operating properly and are
providing appropriate levels of protection.”
This document may be included as an
appendix in the SSP as appropriate by system.
NIST SP800-47
Last Modified: 11/20/2015
For Official Use Only
Page 144 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Appendix E – FNCS Risk Management Acceptance Report
Risk Number:
Report Date:
POA&M Number:
Date Risk was Identified:
Expiration Date for the Risk
Acceptance:
Originator: (Who identified the risk?)
C&A Name of the System:
Risk Statement: (Enter a simple statement of what the risk is.)
Risk Rating (Circle One if
High
Medium
Low
known)
List all Devices impacted by this vulnerability: (System(s), Server(s), Router(s), Printer(s),
Workstation(s), etc.).
If there is a deviation from applicable laws, regulations, standards and/or policies –
explain:
If so, has a waiver been approved:
Justification for Acceptance: (State the brief reasoning for the risk acceptance.)
Risk Control: (State the current controls and/or corrective actions to mitigate the threat.)
Are there any budgeting constraints? (Check if ‘Yes’)
If ‘Yes’, explain:
Last Modified: 11/20/2015
For Official Use Only
Page 145 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines and Procedures v 4.0
Risk Number:
Report Date:
Future Mitigation: (Describe any plans/system changes that would mitigate this risk in the
future.)
Approximate Completion Date: None
Designated Approving Authority Name:
Designated Approving Authority:
Actual Closing Date:
Date Approved:
_______________________________________________________
________
___________________
___
System Owner Name:
System Owner Signature:
Date Approved:
_______________________________________________________
________
___________________
___
Certifying Agent Name:
Certifying Agent Signature:
Date Approved:
_______________________________________________
___________________
___
FNCS Risk Management Acceptance Report Instructions
Use the following instructions to complete the FNCS Risk Management Acceptance Report.
•
•
•
•
Report Date: Fill in the date of the report.
Risk/POA&M Number: Leave this field blank. The number will be assigned by FNCS.
Date Risk Was Identified: Enter the exact date the risk was recognized. This date should
be the date of a scan report or the date of an official or formal audit report (e.g., Security
Evaluation Report (SER); internal audit; etc.).
Originator: Enter the name of the person or business source that identified the risk. If an
official audit, include the audit number and date and the source (e.g., OIG-11101-1-1,
04/15/05). If done via contract support in support of Certification and Accreditation, show
the name of the company (e.g., Acme Solutions) and the C&A project name (e.g., Telecom
GSS, 2004).
Last Modified: 11/20/2015
For Official Use Only
Page 146 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
•
•
•
Risk Statement: Enter a simple statement describing the risk. This information should
reflect verbiage used in the audit or actual scan report. If originating from an audit, use the
statement in full or summarize if the statement is in excess of one paragraph. Reference a
number in the audit report, a category label, and/or security category if provided (e.g., #11,
AU-3, Audit and Accountability).
Risk Rating: Indicate the risk rating provided by the source. If the rating came from a
scanner, provide the name of the scanner (e.g., nCircle) along with the scan vendor’s
classification (i.e., H, M, L). If the source is an audit, the risk rating will be available in the
details associated with the vulnerability that is cited; ensure that references (i.e., a security
control abbreviation or number, and the number assigned by the audit source) to the audit
are included in the Risk Statement area.
Is there a deviation from applicable laws, regulations, standards and/or policies?
Answer ‘Yes’ or ‘No’ and then explain your response. If ‘Yes’, explain. If FNCS or USDA
policy states that a specific standard is required, such as the initiation of the screen saver
after 10 minutes of inactivity, and the risk to be accepted cannot meet that policy or
requirement, such as the screen saver locking up an application, state the pertinent
information here. If there is a deviation from policy, answer ‘Yes’. Answering ‘Yes’ will
require the eventual submission of a waiver, or providing waiver-oriented answers, if the
condition is in opposition to an existing policy; refer to the FNCS policy regarding ‘Waivers’.
If there is no current policy regarding the vulnerability, answer ‘No’ and go to the next
question.
If so, has a waiver been approved? Answer ‘Yes’ or ‘No’.
•
•
•
Justification for Acceptance: Enter a brief reason for the risk acceptance. State why the
‘acceptance’ is necessary (e.g., the vulnerability mitigation will require funds that are not
available; the vulnerability mitigation is not cost effective based on the available resources;
etc.). If there has been a temporary workaround to lessen the risk associated with the
vulnerability, state what that interim workaround is as well as any future plans for mitigating
long term.
Risk Control: Enter the current controls and/or corrective actions to mitigate the threat.
Respond with what you will be doing in the immediate future to attempt to combat this
vulnerability, which could be a workaround, temporary solution, or a decision to do nothing
(as long as you have some justification to accept the full extent of risk). The project
manager and the system owner are the individuals who will really assume any risks and
responsibilities.
Are there any budgetary constraints? Place a check in the checkbox if the answer is
‘Yes.’
If ‘Yes’, explain: Enter an explanation for any budgetary constraints in this space. Include
cost of hardware and software, but also identify human resources and contract support that
may justify the decision to ‘accept’ the risk (e.g., performing activities manually, to replace
what monies may be needed to purchase an automated function may far exceed the cost of
hardware and/or software).
•
Future Mitigation: Enter any information that outlines any plans/system changes that would
mitigate this risk in the future. State if a future mitigation has been evaluated or is planned.
A future mitigation may not be considered. If a software upgrade may mitigate a current
vulnerability, state when that upgrade is scheduled for deployment.
Last Modified: 11/20/2015
For Official Use Only
Page 147 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
•
•
•
•
•
•
•
•
•
•
•
Approximate Completion Date: Enter the estimated complete date. Using FY notation is
acceptable (e.g., end FY-2006; mid FY2007.
Actual Closing Date: Fill in the actual date the risk was closed. Leave blank as long as the
risk is open. When the risk closes, such as when an upgrade is deployed, list the date of
closure.
Primary Contact Name: Enter the telephone number or email address for the Primary Point
of Contact that the vulnerability is associated with, such as a project team leader or a
Branch Chief, which is usually the person who is responsible for operation of a function.
Primary Contact Signature: The primary POC should sign the form in this space; the POC
will be at the Branch Chief or Project Leader level.
Date Approved: The date the form is signed by the primary POC.
System Owner’s Name: Enter the system’s owner’s name. The system owner will be at
the level of Division Director.
System Owner’s Signature: The system owner should sign the form in this space.
Date Approved: The date the system owner signed the form.
ISSPM Concur by Name: Enter the name of an ISSPM who will approve the form.
Approval (Concur) Signature: The designated ISSPM should sign the form in this space.
Date Approved: The date the form was approved by an ISSPM should be entered.
Last Modified: 11/20/2015
For Official Use Only
Page 148 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
Appendix F – ITIRB Portfolio Management Office Checklist
This checklist is to be used when process consultants submit requests for assist in processing
IT requests. It is intended to assist you in ensuring that the Program Management Branch steps
are completed and that all of the documentation required to justify the IT services and IT polices
being requested by different branches are present and is as complete as necessary to present
to FNCS managers and, when appropriate, the FNCS ITIRB.
ITIRB PMB Steps
Discuss the request with the processing consultant and /or the originator and understand the
request and how they intend to justify the request. Provide assistance on the viability of the
request.
Verify with the process consultant and/or the originator that the following forms filled out
correctly:
o
o
o
FNS-754 ITIRB User Request Form Template – Policy
FNS-755 ITIRB User Request Form Template – System
FNS-758 ITIRB User Business Case Summary Template
Verify with the process consultant the required content for Sections 1-8 of FNS-755 or the
required content for Sections 1-4 of FNS-754.
After the request has been submitted and once the Branch Chief provides approval, assist
the originator with any additional information on sections 1-8 of form 755 or sections 1-4 of
754 (If necessary). Then assist the originator if necessary, with additional justification by
completing sections 9 -10 of form 755.
If asked, assist the originator with the proper completion of the business case summary
(FNS Form 758). After form 758 is complete, ensure that all forms and all sections are
complete.
Make sure the user submits the request to the Division Director for approval and signature.
Last Modified: 11/20/2015
For Official Use Only
Page 149 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
The Process consultant facilitates the communication to Senior Management of all requests
coming from their area.
Receive the completed forms from the user/process consultant.
Review all forms for content and ensure all signatures are in place.
Review the content of all sections to ensure that sufficient justification exists.
Review database and other sources for duplications or potential solutions.
Certify alignment with enterprise architecture, if not discuss with CIO.
Enter the request into the database.
Prepare recommendation to CIO.
Last Modified: 11/20/2015
For Official Use Only
Page 150 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
Appendix G – CPO-ITIRB RECOMMENDATION
PMO ITIRB RECOMMENDATION
Requirement Title:
Originating Office
Process Consultant
Description
Technical Feasibility – Can the requirement be technically capable?
Technical Alternatives – Have feasible alternatives been considered?
Technical Compatibility – Does the requirement technically fit within the structure of the
agency? Does the requirement align with the current enterprise architecture?
Resources – Does the requirement require funding and personnel resources beyond the
capability of the agency
Other – Does the requirement already exist, etc.?
Recommendation
Forward to ITIRB
□
Refer to OIT □
Return to Originator
□
Comments Supporting Recommendation
Reviewed by:
ITIRB PMO
Chief, SAB
Approved by:
CIO
Last Modified: 11/20/2015
For Official Use Only
Page 151 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
APPENDIX H – FNCS Initial Incident Report Template
Status of Incident:
(circle one)
Incident Severity:
Severe Impact
New
Progress
Closed
Serious Impact
Limited Impact
In
(circle one)
FNCS Initial Contact Information
FNCS Incident Number:
Date & Time Reported to
FNCS:
US-CERT Number:(if applicable)
Date & Time
applicable)
Date & Time SNCC Hotline was
notified: (if applicable)
Date & Time the incident occurred:
Reported
Name of person
taking the report:
to
US-CERT:
(if
Incident Contact Information
Reported By:
Name:
Type of employee: (Fed,
Contractor.…)
Office & Cell:
Other contact information:
Email:
Name:
Office & Cell:
Name:
Office & Cell:
Agency/
Location:
(Region/HQ…)
Impact and Scope (Complete only those items applicable to this incident)
Last Modified: 11/20/2015
For Official Use Only
Page 152 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
Type Incident:
Personally Identifiable Information (PII) involved? (Yes or No)
Type of PII: (SSN, Patient Data, Research Data etc.), if yes, has USDA been contacted?
Information Security Categorization (FIPS 199 / Risk Level): (L,H,M)
Potential affected population size (1-99, 100-999, 1000-9999, 10000 or more):
Location of Incident:
Potential affected geographic area:
Was the data encrypted? (Yes or No)
Incident Description
Give a detailed description of the incident:
List the next steps to be taken in the investigation process
Incident Response Team Actions
Last Modified: 11/20/2015
For Official Use Only
Page 153 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
List actions taken by all incident handlers (Incident Response Team) on this incident
Incident Evidence Gathered
List evidence gathered during this incident investigation by the Incident Response
Team
Comments from Incident Response Team
List comments related to this incident
Last Modified: 11/20/2015
For Official Use Only
Page 154 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
1. List evidence gathered during this incident investigation by the Incident
Response Team
Next Steps
List the next steps to be taken in the investigation process
Last Modified: 11/20/2015
For Official Use Only
Page 155 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
APPENDIX I – Information System Security Guidance and Security Control Mapping
FNCS
SECTION
NUMBER
FNCS SECTION
NAME
NIST SP 800-53
SECURITY CONTROLS
OTHER NIST
PUBLICATIONS
RELATED USDA
POLICY
050
INFORMATION
SYSTEM
SECURITY
PLANNING
PL-1, PL-2, PL-3, PL4, PL-5, PL-6
100
ACCEPTABLE
USE
AC-1, AC-11, AC-14, 800-18, 800-37
AC-20, MP-5, SA-7,
RA-5, PE-1, IR-1,
SC-9, PL-4
USDA DN 3300011; DM 3525000; DR 3300001;DR 33001A-1M
200
NETWORK
ACCESS
AC-8, AC-9, AC17,AC-20,AC-11, SI4, SI-8
USDA DM 3535001; DM 3530000;001;004,
DM 3525-003
300
WIRELESS
AC-18
USDA DM 3550003; DN 330012 3300-19
400
INCIDENT
RESPONSE &
REPORTING
IR-1, IR-2, IR-3, IR-4, 800-86, 800-61,
IR-5, IR-6, IR-7
Rev. 1
USDA Security
COMPUTER
Incident
Response Team
Standard
Operating
Procedures;
DM 3505-000
USDA Computer
Incident
Response
Procedures
Manual;
USDA
Memorandum
on Reporting
Lost or Stolen
Information
Technology
Equipment
Last Modified: 11/20/2015
For Official Use Only
Page 156 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
FNCS
SECTION
NUMBER
FNCS SECTION
NAME
NIST SP 800-53
SECURITY CONTROLS
OTHER NIST
PUBLICATIONS
RELATED USDA
POLICY
500
AUDIT &
AU-1, AU-2, AU-3,
ACCOUNTABILITY AU-4, AU-5, AU-6,
AU-7, AU-8, AU-9,
AU-11
USDA DM 3535001
600
ACCESS
CONTROL
USDA DM 3535001, Password
policy
memorandum
Dated: 6/2007;
AC-1,AC-2, AC-3,
AC-4, AC-5, AC-6,
AC-7, AC-8, AC-9,IA2, IA-4, IA4, IA9,
USDA DR 3180001 Information
Network
Standards,
Appendix O
700
IT RESTRICTED
SPACE &
PHYSICAL
ACCESS
PE-2, PE-3, PE-3,
PE-4, PE-5, PE-6,
PE-7, PE-8
800
COMPUTER
SECURITY
AWARENESS &
TRAINING
AT-1, AT-2, AT-3,
AT-4
800-16, 800-50
USDA DM 3545001
900
SECURITY
ASSESSMENT &
AUTHORIZATION
CA-1,CA-2, CA-3,
CA-4, CA-5, CA-6,
CA-7
800-37
USDA
CONDENSED
Guide
Certification and
Accreditation
Methodology;
USDA DM 3510001
USDA
Certification and
Accreditation
Guide, Appendix
A;
USDA DM 3540001 Risk
Assessment
Methodology;
FIPS Publication
199
Last Modified: 11/20/2015
For Official Use Only
Page 157 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
FNCS
SECTION
NUMBER
FNCS SECTION
NAME
NIST SP 800-53
SECURITY CONTROLS
1000
INFORMATION
SYSTEMS
SECURITY
PROGRAM
PL-1
USDA DM 3545002
1100
PERSONALLY
IDENTIFIABLE
INFORMATION
PL-5, RA-3
USDA DM 3515002,
Memorandum
on transporting
PII INFO. Dated
2/22/07.
1200
RISK
MANAGEMENT
RA-2, RA-3, RA-4,
RA-5
USDA DM 80030; DM 3540000; DM 3540001
1300
IT CONTINGENCY CP-2, CP-3, CP-4,
PLANNING AND
CP-5, CP-6, CP-7,
DISASTER
CP-8, CP-9, CP-10
RECOVERY
800-34, 800-84
USDA DM 3570000, DM 3570001
1400
SYSTEM
PL-2, PL-3, PL-4
SECURITY PLANS
800-18, FIPS
199, FIPS 200
USDA DM 3565001, USDA SSP
(GSS) and (MA)
Checklists
1500
SDLC
RA-2, RA-3, RA-4,
CM-3, MP-6, PL-5
800-64
USDA DM 3575001
1600
CPIC
SA-2, SA-3, SA-4
800-65
USDA DM 3560001
1700
MAINTENANCE
MA-1, MA-2, MA-3,
MA-4, MA-5, MA-6
1800
MEDIA
PROTECTION
MP-1, MP-2, MP-3,
MP-4, MP-5, MP-6
1900
PERSONNEL
SECURITY
PS-2, P2-3, PS-4,
PS-5, PS-6, PS-7,
PS-8
Last Modified: 11/20/2015
For Official Use Only
OTHER NIST
PUBLICATIONS
RELATED USDA
POLICY
Page 158 of 159
Office of Information Technology (OIT) ● FNCS Information Systems Security Guidelines & Procedures
APPENDIX J – Links to Reference Documents
FNCS Forms
http://fncs/ondemand/elibrary/Pages/default.aspx
FNCS IT Governance
Branch Charter
NIST Special Publications
http://fncs/fns/mtf/oit/itgb/Documents/ITGB%20Charter.pdf
USDA CIO Policies &
Directives
http://www.ocio.usda.gov/policy-directives-records-forms
Last Modified: 11/20/2015
http://csrc.nist.gov/publications/PubsSPs.html
For Official Use Only
Page 159 of 159
File Type | application/pdf |
Author | Administrator |
File Modified | 2018-02-06 |
File Created | 2015-11-20 |