INFORMATION PROCEDURE
|
|
|
- Hugh Andrews
- 10 years ago
- Views:
Transcription
1 INFORMATION PROCEDURE Information Security - Identification and Authentication Procedure Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY IDENTIFICATION AND AUTHENTICATION PROCEDURE 1. PURPOSE To implement security control requirements for the Identification and Authentication (IA) control family, as identified in National Institute of Standards and Technology (NIST) Special Publication (SP) , Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. 2. SCOPE AND APPLICABILITY The procedures cover all EPA information and information systems to include those used, managed, or operated by a contractor, another agency, or other organization on behalf of the agency. The procedures apply to all EPA employees, contractors, and all other users of EPA information and information systems that support the operations and assets of the EPA. 3. AUDIENCE The audience is all EPA employees, contractors, and all other users of EPA information and information systems that support the operations and assets of the EPA. 4. BACKGROUND Based on federal requirements and mandates, the EPA is responsible for ensuring that all offices within the agency meet the minimum security requirements defined in the Federal Information Processing Standards (FIPS) Publication 200, Minimum Security Requirements for Federal Information and Information Systems. All EPA information systems must meet the security requirements through the use of the security controls defined in the NIST SP , Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. This document addresses the procedures and standards set forth by the EPA to implement the family of Identification and Authentication controls. Page 1
2 5. AUTHORITY E-Government Act of 2002, Public Law , Title III, Federal Information Security Management Act (FISMA) as amended Federal Information Security Modernization Act of 2014, Public Law , chapter 35 of title 44, United States Code (U.S.C.) Freedom of Information Act (FOIA), 5 U.S.C. 552, as amended by Public Law No , 110 Stat. 3048, Electronic Freedom of Information Act Amendments of 1996 Clinger-Cohen Act of 1996, Public Law Paperwork Reduction Act (44 USC ), May 1995 Privacy Act of 1974 (5 USC 552a), as amended Office of Management and Budget (OMB) Memorandum M-04-04, E-Authentication Guidance for Federal Agencies, December 2003 OMB Memorandum M-05-24, Homeland Security Presidential Directive 12 (HSPD-12), Policy for a Common Identification Standard for Federal Employees and Contractors, August 2004 OMB Memorandum M-06-16, Protection of Sensitive Agency Information, June 2006 OMB Memorandum M-08-05, Implementation of Trusted Internet Connections (TIC), November 2007 OMB Memorandum M-08-22, Guidance on the Federal Desktop Core Configuration (FDCC), August 2008 OMB Memorandum M-14-04, Fiscal Year 2013 Reporting Instructions for the Federal Information Security Management Act (FISMA) and Agency Privacy Management, November 2013 Federal Information Processing Standards (FIPS) 140-2, Security Requirements for Cryptographic Modules, May 2001 Federal Information Processing Standards (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems, February 2004 Federal Information Processing Standards (FIPS) 200, Minimum Security Requirements for Federal Information and Information Systems, March 2006 Federal Information Processing Standards (FIPS) 201-1, Personal Identity Verification (PIV) of Federal Employees and Contractors, March 2006 EPA Information Security Program Plan EPA Information Security Policy EPA Information Security Roles and Responsibilities Procedures CIO Policy Framework and Numbering System Page 2
3 6. PROCEDURES For the following section titles, the "IA" designator identified in each procedure represents the NIST-specified identifier for the Identification and Authentication control family and the number represents the control identifier, as identified in NIST SP , Revision 4, Security and Privacy Controls for Federal Information Systems and Organizations. Abbreviations including acronyms are summarized in Attachment A. IA-2 Identification and Authentication 1) System Owners (SO), in coordination with Information Security Officers (ISO), Information Management Officers (IMO), Information Owners (IO), Information System Security Officers (ISSO), Common Control Providers (CCP), and Security Control Assessors (SCA), for EPA-operated systems shall; and Service Managers (SM), in coordination with IOs, ISOs, IMOs, ISSOs, CCPs, and SCAs, for systems operated on behalf of the EPA, shall ensure service providers: a) Configure information systems to uniquely identify and authenticate users (or processes acting on behalf of users). Note: Users include EPA employees, contractors, interns, and others that access EPA information and information systems. i) Users shall be uniquely identified and authenticated for all access other than those accesses explicitly identified and documented as exceptions regarding permitted actions without identification and authentication. (1) Refer to the latest version of the EPA Information Security Access Control Procedures for requirements on permitted actions without identification and authentication. (2) Unique identification of individuals in group accounts (e.g., shared privilege accounts) may not be needed for detailed accountability of activity depending upon risks. SOs shall base their recommendation to not use unique identifiers for individuals in group accounts on a risk assessment. b) Implement identification and authentication mechanisms at the application level, as determined by a risk assessment, to provide increased security for the information system and the information processes. This shall be in addition to identifying and authenticating users at the information system level (e.g., when initially logging into a desktop, laptop or smart phone). c) Authenticate user identities through the use of passwords, personal identification numbers (PINs), tokens, biometrics, or in the case of multifactor authentication, some combination thereof. 1 1 Multifactor authentication consists of factors of different types, e.g., for two-factor authentication, an acceptable combination is where one is something you know (PIN) and one is something you have (PIV card). Two of the same factor types, e.g., both factors are something you know, is not two-factor. Page 3
4 IA-2(1) Identification and Authentication Network Access to Privileged Accounts a) Implement multifactor authentication with assurance level 4 2 for network access 3 to privileged accounts. IA-2(2) Identification and Authentication Network Access to Non-Privileged Accounts For Moderate and High impact Information Systems: a) Use multifactor authentication for network access to non-privileged accounts. IA-2(3) Identification and Authentication Local Access to Privileged Accounts For all Information Systems: a) Use multifactor authentication with assurance level 4 for local access to privileged accounts. IA-2(4) Identification and Authentication Local Access to Non-Privileged Accounts For High impact Information Systems: a) Implement multifactor authentication for local access to non-privileged accounts. 2 Assurance levels are defined in National Institute for Standards and Technology, Special Publication rev 2. 3 Access to organizational information systems is defined as either local access or network access. Local access is any access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained by direct connections without the use of networks. Network access is access to organizational information systems by users (or processes acting on behalf of users) where such access is obtained through network connections (i.e., nonlocal accesses). Page 4
5 IA-2(5) Identification and Authentication Group Authentication For FedRAMP 4 Moderate Systems: 1) SMs, in coordination with IOs, ISOs, IMOs, and CCPs shall ensure service providers: a) Requires individuals to be authenticated with an individual authenticator when a group authenticator is employed. IA-2(6) Identification and Authentication Network Access to Privileged Accounts Separate Device IA-2(7) Identification and Authentication Network Access to Privileged Accounts Separate Device IA-2(8) Identification and Authentication Network Access to Privileged Accounts Replay Resistant For Moderate and High impact Information Systems: a) Use replay-resistant authentication protocols for network access to privileged accounts. i) Techniques used to address this include protocols that use challenges (e.g., Transport Layer Security TLS), and time synchronous or challenge-response onetime authenticators. IA-2(9) Identification and Authentication Network Access to Non-Privileged Accounts Replay Resistant For High impact Information Systems: a) Use replay-resistant authentication protocols for network access to non-privileged accounts. i) Techniques used to address this include protocols that use challenges (e.g., Transport Layer Security TLS), and time synchronous or challenge-response onetime authenticators. 4 The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. Page 5
6 IA-2(10) Identification and Authentication Single Sign-On IA-2(11) Identification and Authentication Remote Access Separate Device For Moderate and High impact Information Systems: a) Use multifactor authentication with assurance level 4 for remote access to privileged and non-privileged accounts such that a device separate from the system gaining access provides one of the factors and the device meets minimum token requirements. b) Conduct Electronic Authentication (E-Authentication) Risk Assessments (e-ra) for agency information systems 5 that require authentication of public users remotely over an open network, such as the Internet. i) e-ras shall be conducted in accordance with OMB M-04-04, OMB M and NIST SP , Revision 2 or its successors and shall be used to determine the compliance requirements for access consistent with FIPS 190, as amended. ii) The e-ra shall be conducted as part of conducting a general risk assessment or it may be a separate activity, in which case it shall be informed by a general risk assessment for the information system. (1) Refer to the latest version of the EPA Information Security Risk Assessment Procedures for requirements on risk assessments. iii) The e-ra process shall identify potential impacts should proper authentication fail or should there be an authentication error. (1) These impacts are rated as low, moderate, or high risks. iv) The identified risks shall be mapped to the appropriate assurance level. OMB M sets four identity authentication assurance levels: (1) Level 1: Little or no confidence in the asserted identity s validity. (2) Level 2: Some confidence in the asserted identity s validity. (3) Level 3: High confidence in the asserted identity s validity. (4) Level 4: Very high confidence in the asserted identity s validity. v) The information system s System Security Plan (SSP) IA-2 control description shall state if E-Authentication is required and, if not required, an explanation shall 5 As defined in OMB issued Memorandum M-14-04, an e-authentication application is an application that meets the following criteria: 1) Is web-based; 2) Requires authentication; and 3) Extends beyond the borders of the enterprise (e.g. multiagency, government-wide, or public facing). For additional e-authentication requirements, refer to NIST SP , Electronic Authentication Guidance, at Page 6
7 be included (e.g., the system is a public site or the system does not require user authentication). vi) Technologies for E-Authentication shall be selected and implemented based on technical guidance provided in NIST SP , Revision 2 as amended. (1) Authenticators (e.g., passwords, randomly generated PINs, tokens, biometric, and other authenticators) and the selected technologies shall comply with Level 2, 3 or 4 requirements. (2) Technology selection shall be based first on technology standards or approved technologies within the EPA s approved technology and security architecture. (3) If available technologies and mechanisms prove inadequate, alternatives that are consistent with NIST guidance may be proposed. vii) The guidance provided by NIST SP , Revision 2 shall apply to both local and remote access to the information system. (1) Remote access connections shall be both authenticated and authorized to be accepted. viii) Validation shall be conducted to ensure that the implemented system has met the required assurance level. c) Reassess the information system periodically, subsequent to the e-ra and in accordance with requirements of the information system s life cycle stage and Security Assessment and Authorization (SA&A) requirements, to determine technology refresh requirements. IA-2(12) Identification and Authentication Acceptance of PIV Credentials a) Configure systems to accept and electronically verify Personal Identity Verification (PIV) credentials. FIPS and NIST SP , , and shall be used as guidance on PIV credentials for use in the unique identification and authentication of federal employees and contractors. 6 IA-2(13) Identification and Authentication Out-of-Band Authentication 6 Note: An authentication process resists replay attacks if it is impractical to achieve a successful authentication by recording and replaying a previous authentication message. Techniques used to address this include protocols that use challenges (e.g., Transport Layer Security TLS), and time synchronous or challenge-response one-time authenticators. Page 7
8 IA-3 Device Identification and Authentication For Moderate and High impact Information Systems: a) Configure information systems to uniquely identify and authenticate end user-operated devices (e.g., workstations, laptops, voice-over-internet Protocol (VoIP) phones, cell phones) and servers before establishing a network connection. b) Determine the required strength of the device authentication mechanism by the security categorization of the information system as well as an assessment of risk incurred. c) Use only approved procedures, mechanisms, or protocols for host or device authentication. i) Approved mechanisms and protocols include, but are not limited to, the following: (1) Media Access Control (MAC) address filtering, which provides basic filtering based on Open Systems Interconnection (OSI) Layer 2 (Data Link Layer) address information. (2) Vendor-specific solutions such as Cisco s Port Security, which provide basic identification and authentication for devices in a wired network on a per-port basis. (3) Wi-Fi Protected Access 2 (WPA2) in combination with MAC filtering. (4) Institute of Electrical and Electronics Engineers (IEEE) 802.1x. (5) Network Access Control (NAC) technology, which is most commonly built on the foundations of 802.1x. d) Document the procedures, mechanisms, or protocols used for device identification and authentication clearly, with diagrams, in the SSP. IA-3(1) Device Identification and Authentication Cryptographic Bidirectional Authentication IA-3(2) Device Identification and Authentication Cryptographic Bidirectional Network Authentication Incorporated into IA-3(1). IA-3(3) Device Identification and Authentication Dynamic Address Allocation IA-3(4) Device Identification and Authentication Device Attestation Page 8
9 IA-4 Identifier Management a) Receive authorization from a designated EPA official (e.g., system administrator, technical lead or system owner) to assign individual, group, role, or device identifiers. b) Select and assign information system identifiers that uniquely identify an individual, group, role, or device. i) Assignment of individual, group, role, or device identifiers shall ensure that no two users or devices have the same identifier. c) Prevent reuse of identifiers for seven (7) years. d) Disable identifiers after 30 days of inactivity. e) Delete or archive user accounts with more than 365 days of non-use. IA-4(1) Identifier Management Prohibit Account Identifiers as Public Identifiers IA-4(2) Identifier Management Supervisor Authorization IA-4(3) Identifier Management Multiple Forms of Certification IA-4(4) Identifier Management Identify User Status For Moderate impact Information Systems hosted by a FedRAMP compliant cloud environment: 1) SMs, in coordination with IOs, ISOs, IMOs, and CCPs shall ensure service providers: a) Manage individual identifiers by uniquely identifying each individual as either Contractors or Foreign Nationals. IA-4(5) Identifier Management Dynamic Management IA-4(6) Identifier Management Cross-Organizational Management IA-4(7) Identifier Management In-Person Registration Page 9
10 IA-5 Authenticator Management a) Verify the identity of the individual, group, role, or device receiving an information system authenticator as part of the initial authenticator distribution. i) Unique initial authenticator content shall be established for information system authenticators. Note: Initial authenticator content is the actual content (e.g., the initial password) as opposed to requirements about authenticator content (e.g., minimum password length). ii) Authenticators for individuals, groups, roles, or devices shall have sufficient strength of mechanism for their intended use. 7 iii) Administrative procedures shall be established and implemented for initial authenticator distribution, lost/compromised, or damaged authenticators, and for revoking authenticators. (1) If a user knows or suspects that their password has been compromised, they shall immediately: (a) Notify their supervisor. (b) Report a known or potential security breach to the EPA Call Center. (c) Request the EPA Call Center reset or change their password, or if selfservice password mechanisms are used, immediately change their own password. iv) Default content of authenticators (i.e., passwords provided for initial entry to a system) shall be changed before implementation of the information system or component (e.g., routers, switches, firewalls, printers, workstations, servers). (1) The information system owner shall confirm that software and/or hardware upgrades, updates, and patches do not reinstall default passwords. v) Authenticators shall be changed or replaced periodically. (1) All newly assigned passwords shall be changed the first time a user logs into the information system. (2) Passwords shall be set to automatically expire in 60 days or sooner. (3) PIV (Smart Cards) certificates shall be renewed every three (3) years. vi) The following minimum and maximum lifetime restrictions and re-use conditions shall be adhered to regarding authenticators: 7 User authenticators include, for example, tokens, Public Key Infrastructure (PKI) certificates, biometrics, passwords, and key cards ( smart cards ). Page 10
11 (1) Passwords shall have a minimum lifetime of one (1) day and a maximum lifetime of 60 days. (a) Passwords cannot be changed in less than one (1) day. (2) Password reuse for a specific account is prohibited for 24 generations or four (4) years. (a) Password history shall be set with a history of at least 24 passwords, so a user cannot quickly re-use a previous password. vii) Authenticator content shall be protected from unauthorized disclosure and modification. viii) Users shall take reasonable and specific measures to safeguard authenticators. (1) Users shall maintain possession of their individual authenticators, not loan or share authenticators with others, and report lost or compromised authenticators immediately to their supervisor and the EPA Call Center as a security event. (2) Devices shall be configured to safeguard authenticators (e.g., certificates, passwords). ix) Authenticators for shared group/role accounts shall be changed when membership to those accounts changes. IA-5(1) Authenticator Management Password-based Authentication a) Ensure the information system enforces the following for password-based and PINbased authentication: i) Passwords shall be at least twelve (12) non-blank characters long. ii) The PIN shall be at least eight (8) non-blank characters long. iii) All passwords, including initial passwords, shall be composed of a minimum of one (1) character from at least three (3) of the following four (4) categories, as provided in the application or operating system schema: (1) English uppercase characters (e.g., A-Z); (2) English lowercase letters (e.g., a-z); (3) Non-Alphanumeric special characters #, $, %, ^, &, etc.); and (4) Base 10 Digits/Numerals (e.g., 0-9). (a) Passwords shall not contain any of the following: (i) Dictionary words (e.g., computer, work) or common names (e.g., Betty, Fred, Rover). (ii) Portions of associated account names (e.g., user ID, login name). Page 11
12 (iii) Consecutive character strings (e.g., abcdef, 12345). (iv) Simple keyboard patterns (e.g., QWERTY, asdfgh). (v) Generic passwords (i.e., password consisting of a variation of the word password [e.g., P@ssw0rd1]). iv) Passwords shall have a minimum lifetime of one (1) day and a maximum lifetime of 60 days. v) At least 50% of the characters shall be changed when new passwords are created. vi) Passwords and PINs shall not be displayed when entered. vii) Passwords and PINs shall be encrypted when stored and transmitted. viii) Temporary passwords can be used to facilitate password changes or initial account establishment if the system forces an immediate change to a permanent password. ix) A waiver of the password requirements and standards may be requested, provided the request includes at a minimum: (1) Specific designation of which requirement(s) the waiver request is addressing. (2) A detailed analysis of the password resistance to compromise in accordance with password entropy and strength factors detailed in Appendix A of NIST SP , Revision 2, as amended. (a) FIPS and NIST SP , , and shall be used as guidance on PIV credentials. (b) NIST SP , Revision 2 shall be used as guidance on remote electronic authentication. (c) The information system, for hardware token-based authentication, such as PKI-based tokens, employs mechanisms that satisfy EPA-defined specific requirements and NIST SP requirements on PKI technology. IA-5(2) Authenticator Management PKI-based Authentication For Moderate and High impact Information Systems: a) Enforce the following for PKI-based authentication on applicable information systems: i) Certificates are validated by constructing a certification path with status information (e.g., certificate revocation lists, online certificate status protocol responses) to an accepted trust anchor. ii) Authorized access is enforced to the corresponding private key. iii) The authenticated identity is mapped to the user account. Page 12
13 IA-5(3) Authenticator Management In-Person or Trusted Third-Party Registration For Moderate and High impact Information Systems: a) Enforce the registration process for EPA employees and contractors to receive HSPD- 12 Personal Identity Verification (PIV) Cards. The registration process shall be carried out in person with the Office of Administration and Resources (OARM) with authorization by a designated organizational official (e.g., a supervisor or manager). b) Enforce the registration process for EPA employees and contractors to receive an account with privileged access to the information system. The registration process shall be carried out in person with the Office of Technology Operations and Planning (OTOP) with authorization by a designated organizational official (e.g., a supervisor or manager). IA-5(4) Authenticator Management Automated Support for Password Strength Determination For Moderate impact Information Systems hosted by FedRAMP compliant cloud solutions: 1) SMs, in coordination with IOs, ISOs, IMOs, and CCPs shall ensure service providers: a) Employ automated tools to determine if password authenticators are sufficiently strong to satisfy defined requirements. IA-5(5) Authenticator Management Change Authenticators Prior to Delivery IA-5(6) Authenticator Management Protection of Authenticators For Moderate impact Information Systems hosted by FedRAMP compliant cloud solutions: 1) SMs, in coordination with IOs, ISOs, IMOs, and CCPs shall ensure service providers: a) Protect authenticators commensurate with the security category of the information to which use of the authenticator permits access. IA-5(7) Authenticator Management No Embedded Unencrypted Static Authenticators For Moderate impact Information Systems hosted by FedRAMP compliant cloud solutions: 1) SMs, in coordination with IOs, ISOs, IMOs, and CCPs shall ensure service providers: a) Ensure that unencrypted static authenticators are not embedded in applications or access scripts or stored on function keys. Page 13
14 IA-5(8) Authenticator Management Multiple Information System Accounts IA-5(9) Authenticator Management Cross-Organization Credential Management IA-5(10) Authenticator Management Dynamic Credential Association IA-5(11) Authenticator Management Hardware Token-Based Authentication a) Employ mechanisms that satisfy NIST SP , Level 4 requirements for hardware token-based authentication. IA-5(12) Authenticator Management Biometric Authentication IA-5(13) Authenticator Management Expiration of Cached Authenticators IA-5(14) Authenticator Management Managing Content of PKI Trust Stores IA-5(15) Authenticator Management FICAM-Approved Products and Services IA-6 Authenticator Feedback a) Ensure the information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation or use by unauthorized individuals. i) Passwords shall be masked upon entry (e.g., displaying asterisks or dots when a user types in a password) and not displayed in clear text. Page 14
15 b) Ensure feedback from the information system does not provide information that would allow an unauthorized user to compromise the authentication mechanism. IA-7 Cryptographic Module Authentication a) Configure the information system to implement mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication. i) The applicable federal standard for authenticating to a cryptographic module is FIPS Validation certificates issued by the NIST Cryptographic Module Validation Program (including FIPS 140-1, FIPS 140-2, and future amendments) remain in effect and the modules remain available for continued use until a validation certificate is specifically revoked. IA-8 Identification and Authentication (Non-Organizational Users) a) Configure the information system to uniquely identify and authenticate non-epa users or processes acting on behalf of non-epa users. (Non-EPA users include all information system users other than organizational users explicitly covered by IA-2 including individuals and processes that simply receive data/information from federal information systems. These individuals and processes are uniquely identified and authenticated for accesses other than those accesses explicitly identified and documented in AC-14, Permitted Actions without Identification or Authentication. ) i) Non-EPA users shall be uniquely identified and authenticated for all access other than those accesses explicitly identified and documented as exceptions regarding permitted actions without identification and authentication in control AC-14. (1) Refer to the latest version of the EPA Information Security Access Control Procedures for requirements on permitted actions without identification and authentication. b) Use the results of the information system risk assessment to determine the authentication needs of the organization. i) In accordance with the E-Authentication E-Government initiative, authentication of non-organizational users accessing federal information systems may be required to protect federal, proprietary, or privacy-related information (with exceptions noted for national security systems). Page 15
16 ii) Scalability, practicality, and security shall be simultaneously considered in balancing the need to ensure ease of use for access to federal information and information systems with the need to protect and adequately mitigate risk to EPA s operations, EPA s assets, individuals, other organizations, and the Nation. IA-8(1) Identification and Authentication (Non-Organizational Users) Acceptance of PIV Credentials From Other Agencies a) Configure the information system to accept and electronically verify PIV credentials from other federal agencies. IA-8(2) Identification and Authentication (Non-Organizational Users) Acceptance of Third-Party Credentials a) Configure the information system to accept only Federal Identity, Credential and Access Management (FICAM)-approved third-party credentials. This applies to organizational information systems that are accessible to the public. Third-party credentials are those credentials issued by nonfederal government entities approved by the FICAM Trust Framework Solutions initiative. IA-8(3) Identification and Authentication (Non-Organizational Users) Use of FICAM- Approved Products a) Employ only FICAM-approved information system components in public-facing systems to accept third-party credentials. IA-8(4) Identification and Authentication (Non-Organizational Users) Use of FICAM- Issued Profiles Page 16
17 a) Ensure the information system conforms to FICAM-issued profiles. b) Refer to IA-2 for identification and authentication requirements regarding information system access by organizational users. IA-8(5) Identification and Authentication (Non-Organizational Users) Acceptance of PIV-I Credentials IA-9 Service Identification and Authentication IA-9(1) Service Identification and Authentication Information Exchange IA-9(2) Service Identification and Authentication Transmission of Decisions IA-10 Adaptive Identification and Authentication IA-11 Re-Authentication 7. RELATED DOCUMENTS NIST Special Publications, 800 series Federal Identity, Credential and Access Management (FICAM) 8. ROLES AND RESPONSIBILITIES Common Control Provider (CCP) 1) CCPs have the following responsibilities with respect to identification and authentication: a) Coordinate with the CIO, SAISO, IOs, SOs, ISOs, IMOs, and SMs regarding information security requirements, and determine and carry out responsibilities for defining, developing, documenting, implementing, assessing, and monitoring all controls to include common and hybrid controls. b) Assist the SOs and IOs with developing, implementing, assessing, configuring, continuously monitoring and determining common controls to adequately protect information stored, processed or transmitted within acceptable risks. c) Coordinate with SOs and IOs to identify controls required to adequately protect information stored, processed, or transmitted by assigned systems. Page 17
18 d) Assist SOs and IOs with determining information systems security controls in accordance with the Agency s security requirements. Information Owners (IO) 1) The IO has the following responsibilities with respect to identification and authentication: a) Authorize and approve all special accounts; ensure they are monitored while in use; and that they are removed, disabled or otherwise secured when not in use. Special accounts include guest, training, anonymous maintenance or temporary emergency accounts. Information Management Officer (IMO) 1) IMOs have the following responsibilities with respect to identification and authentication: a) Ensure independent assessors and/or assessment teams conduct assessments. b) Ensure testing and exercises are conducted in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. Information Security Officers (ISO) 1) ISOs have the following responsibilities with respect to identification and authentication: a) Provide expert advice in developing and updating enterprise and local information security documents to include policy, procedures, standards, and guides. b) Coordinate with and supporting the IMO and AODR in implementing EPA Information Security Program requirements. c) Provide expert advice in: i) developing and updating mandatory configurations for information technology products and solutions used by EPA; ii) determining local controls to ensure compatibility and interoperability with enterprise tools and controls; and iii) implementing, operating, and maintaining enterprise tools and controls. Information System Security Officer (ISSO) 1) The ISSO has the following responsibilities with respect to identification and authentication: a) Ensure the day-to-day security operations of an information system, including verifying security controls (technical or otherwise) are functioning as intended. Office of Administration and Resources Management (OARM) 1) OARM has the following responsibilities with respect to identification and authentication: a) Coordinate with OEI on personnel and identification requirements associated with smart card issuance and implementation. b) Ensure that smart card certificates are compatible and capable of implementing identification and authentication requirements. c) Register and issue HSPD-12 PIV cards. Page 18
19 Office of Technology Operations and Planning (OTOP), Office of Environmental Information (OEI) 1) OEI, OTOP has the following responsibilities with respect to identification and authentication: a) Provide central management of identification and authentication to ensure unique naming of users and devices. b) Develop enterprise identification and authentication standards as needed to ensure consistency. c) Coordinate with the Office of Administration and Resources Management (OARM) on personnel and identification requirements associated with smart card issuance and implementation. Service Managers (SM) 1) SMs have the following responsibilities with respect to identification and authentication: a) Establish and administer privileged user accounts in accordance with a role-based access scheme that organizes information system and network privileges into roles. Security Control Assessors (SCA) 1) SCAs have the following responsibilities with respect to identification and authentication: a) Test security controls according to the security assessment plan in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards. b) Provide SO and IO with documented information system security assessment results (i.e., SAR). System Owner (SO) 1) The SO has the following responsibilities with respect to identification and authentication: a) Conduct an e-ra. b) Manage user and device identifiers, as applicable. c) Ensure that upgrades or patches do not reinstall factory default passwords or other types of backdoors. d) Ensure that appropriate identification, authentication, and authorization are implemented. Users/Individuals 1) Users/individuals have the following responsibilities with respect to identification and authentication: a) Notify their supervisors immediately if they suspect their password, PIN, or other authenticator has been compromised. b) Report a known or potential security breach to the EPA Call Center. c) Change a compromised password or request the EPA Call Center to reset or change their password immediately. Page 19
20 d) Take reasonable measures to safeguard authenticators. 9. DEFINITIONS Assurance for identity authentication, (1) the degree of confidence in the vetting process used to establish the identity of the individual or device to which the credential was issued, and (2) the degree of confidence that the individual or device that uses the credential is the resource to which the credential was issued. Authentication the process of verifying the identity of an individual, group, role, process, or device, often as a prerequisite to allowing access to resources in an information system. Identity a unique name of an individual, group, role, or device. Since the legal names of persons are not necessarily unique, the identity of a person must include sufficient additional information (for example an address, or some unique identifier such as an employee or account number) to make the complete name unique. Local Access access to an organizational information system by a user (or process acting on behalf of a user) where such access is obtained by direct connection without the use of a network. Multifactor Authentication the process of using two or more different factors for verifying identity. Factors are typically categorized as something you know (e.g., a password), something you have (e.g., a token), and something you are (e.g., a biometric). Network Access access to an organizational information system by a user, or process acting on behalf of a user, where such access is obtained through a network connection. Non-Organizational Users all information system users other than organizational users explicitly covered by IA-2. Organizational Users organizational employees or individuals the organization deems to have equivalent status of employees (e.g., contractors, guest researchers, individuals from allied nations). Remote Access a type of network access that involves communication through an external network (e.g., the Internet). Signature (of an individual) a mark or sign made by an individual to signify knowledge, approval, acceptance or obligation (can be accomplished manually, sometimes referred to as a wet signature, or electronically). Written (or in writing) to officially document the action or decision, either manually or electronically, and includes a signature. 10. WAIVERS Waivers may be requested from the CIO by submitting a justification based on: Substantive business case need(s) Page 20
21 Demonstration of, or a proposal for, establishment of adequate compensating controls that provide a suitable alternative to the mandated protection The CIO may grant a waiver for sufficient reasons exercising judgment in the best interests of the agency. The SAISO and Director, OTOP shall coordinate to maintain a central repository of all waivers. 11. RELATED POLICY, PROCEDURES, STANDARDS AND GUIDELINES Related policy and procedures are available on OEI s Policy Resources website. Related standards and guidelines are available on OEI s website. 12. MATERIAL SUPERSEDED EPA Information Directive: Information Security Interim Identification and Authentication Procedures, CIO 2120-P-07.1, July 13, ADDITIONAL INFORMATION N/A Ann Dunkin Chief Information Officer U.S. Environmental Protection Agency Page 21
22 APPENDIX A: ACRONYMS & ABBREVIATIONS CCP Common Control Provider CIO Chief Information Officer EPA Environmental Protection Agency e-ra Electronic Authentication Risk Assessment FDCC Federal Desktop Core Configuration FIPS Federal Information Processing Standards FICAM Federal Identity, Credential, and Access Management FISMA Federal Information Security Management Act FOIA Freedom of Information Act HSPD-12 Homeland Security Presidential Directive 12 IEEE Institute of Electrical and Electronics Engineers IMO Information Management Officer IO Information Owner ISO Information Security Officer ISSO Information System Security Officer IT Information Technology MAC Media Access Control NAC Network Access Control NIST National Institute of Standards and Technology OARM Office of Administration and Resources Management OEI Office of Environmental Information OMB Office of Management and Budget OSI Open Systems Interconnection OTOP Office of Technology Operations and Planning PIN Personal Identification Number PIV Personal Identity Verification PKI Public Key Infrastructure P.L. Public Law RFC Request for Comment SA&A Security Assessment and Authorization SAISO Senior Agency Information Security Officer SCA Security Control Assessor SM Service Manager SO System Owner SP Special Publication SSP System Security Plan TIC Trusted Internet Connection TLS Transport Layer Security UPN User Principal Name USC United States Code VOIP Voice-Over-Internet Protocol WPA2 Wi-Fi Protected Access 2 Page 22
EPA Classification No.: CIO-2150.3-P-09.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM MAINTENANCE PROCEDURES V1.8 JULY 18, 2012 1. PURPOSE The purpose of this procedure
EPA Classification No.: CIO-2150.3-P-02.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM AWARENESS AND TRAINING PROCEDURES V3.1 JULY 18, 2012 1. PURPOSE The purpose of this
PASSWORD MANAGEMENT POLICY OCIO-6012-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER PASSWORD MANAGEMENT POLICY OCIO-6012-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY
INFORMATION DIRECTIVE GUIDANCE GUIDANCE FOR MANUALLY COMPLETING INFORMATION SECURITY AWARENESS TRAINING
INFORMATION DIRECTIVE GUIDANCE GUIDANCE FOR MANUALLY COMPLETING INFORMATION SECURITY AWARENESS TRAINING Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19,dated 07/07/2005 GUIDANCE
EPA Classification No.: CIO-2150.3-P-04.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM SECURITY ASSESSMENT AND AUTHORIZATION PROCEDURES V2 JULY 16, 2012 1. PURPOSE The
Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veterans Affairs VA DIRECTIVE 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Directive defines the policy and responsibilities to
DEPARTMENTAL REGULATION
U.S. DEPARTMENT OF AGRICULTURE WASHINGTON, D.C. 20250 DEPARTMENTAL REGULATION SUBJECT: Identity, Credential, and Access Management Number: 3640-001 DATE: December 9, 2011 OPI: Office of the Chief Information
REMOTE ACCESS POLICY OCIO-6005-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER REMOTE ACCESS POLICY OCIO-6005-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III.
Best Practices for Privileged User PIV Authentication
NIST Cybersecurity White Paper csrc.nist.gov Best Practices for Privileged User PIV Authentication Computer Security Division Information Technology Laboratory Applied Cybersecurity Division Information
Identity and Access Management Initiatives in the United States Government
Identity and Access Management Initiatives in the United States Government Executive Office of the President November 2008 Importance of Identity Management within the Federal Government "Trusted Identity"
Authentication Tokens
State Capitol P.O. Box 2062 Albany, NY 12220-0062 www.its.ny.gov New York State Information Technology Standard IT Standard: Authentication Tokens No: NYS-S14-006 Updated: 05/15/2015 Issued By: NYS ITS
Identification and Authentication on FCC Computer Systems
FCC Computer Security TABLE OF CONTENTS Desk Reference 1 INTRODUCTION...1 Identification and Authentication on FCC Computer Systems 1.1 PURPOSE...1 1.2 BACKGROUND...1 1.3 SCOPE...2 1.4 AUTHORITY...2 2
INFORMATION PROCEDURE
INFORMATION PROCEDURE Information Security - Privacy Procedures Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY PRIVACY PROCEDURES 1. PURPOSE
Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper
Regulatory Compliance Solutions for Microsoft Windows IT Security Controls Supporting DHS HIPAA Final Security Rules Health Insurance Portability and Accountability Act Enterprise Compliance Auditing &
Information Technology Branch Access Control Technical Standard
Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,
NIST Cybersecurity White Paper
The attached DRAFT document (provided here for historical purposes) has been superseded by the following publication: Publication: Title: NIST Cybersecurity White Paper Best Practices for Privileged User
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL
NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL INDEPENDENT EVALUATION OF THE NATIONAL CREDIT UNION ADMINISTRATION S COMPLIANCE WITH THE FEDERAL INFORMATION SECURITY MANAGEMENT ACT (FISMA)
DHHS Information Technology (IT) Access Control Standard
DHHS Information Technology (IT) Access Control Standard Issue Date: October 1, 2013 Effective Date: October 1,2013 Revised Date: Number: DHHS-2013-001-B 1.0 Purpose and Objectives With the diversity of
EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07
EVALUATION REPORT Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review March 13, 2015 REPORT NUMBER 15-07 EXECUTIVE SUMMARY Weaknesses Identified During the FY 2014
GOALS (2) The goal of this training module is to increase your awareness of HSPD-12 and the corresponding technical standard FIPS 201.
PERSONAL IDENTITY VERIFICATION (PIV) OVERVIEW INTRODUCTION (1) Welcome to the Homeland Security Presidential Directive 12 (HSPD-12) Personal Identity Verification (PIV) Overview module, designed to familiarize
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS
Department of Homeland Security Management Directive System MD Number: 4900 INDIVIDUAL USE AND OPERATION OF DHS INFORMATION SYSTEMS/ COMPUTERS 1. Purpose This directive establishes the Department of Homeland
2012 FISMA Executive Summary Report
2012 FISMA Executive Summary Report March 29, 2013 UNITED STATES SECURITIES AND EXCHANGE COMMISSION WASHINGTON, D.C. 20549 OI'!'ICEOI' lnstfl! C1'0R GENERAt MEMORANDUM March 29,2013 To: Jeff Heslop, Chief
EPA Classification No.: CIO-2150.3-P-11.1 CIO Approval Date: 08/06/2012 CIO Transmittal No.: 12-003 Review Date: 08/06/2015
Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY INTERIM PHYSICAL AND ENVIRONMENTAL PROTECTION PROCEDURES V1.9 MAY 4, 2012 1. PURPOSE The
What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form. December 3, 2012
Federal CIO Council Information Security and Identity Management Committee IDManagement.gov What Does it Mean to be PIVish in PACS ICAM PIV in E-PACS Guidance v2.0.2 the short form December 3, 2012 HSPD-12
INFORMATION PROCEDURE
INFORMATION PROCEDURE Information Security Media Protection Procedures Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 INFORMATION SECURITY MEDIA PROTECTION PROCEDURES
Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013
Audit Report The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013 A-14-13-13086 November 2013 MEMORANDUM Date: November 26,
Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program
U.S. ENVIRONMENTAL PROTECTION AGENCY OFFICE OF INSPECTOR GENERAL Information Technology Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program Report.
Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)
Privacy Impact Assessment (PIA) for the Cyber Security Assessment and Management (CSAM) Certification & Accreditation (C&A) Web (SBU) Department of Justice Information Technology Security Staff (ITSS)
PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM
PREFACE TO SELECTED INFORMATION DIRECTIVES CIO Transmittal No.: 15-010 CIO Approval Date: 06/12/2015 Issued by the EPA Chief Information Officer, Pursuant to Delegation 1-19, dated 07/07/2005 CHIEF INFORMATION
CMS POLICY FOR THE INFORMATION SECURITY PROGRAM
Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS POLICY FOR THE INFORMATION SECURITY PROGRAM FINAL Version 4.0 August 31, 2010 Document Number: CMS-CIO-POL-SEC02-04.0
User Authentication Guidance for IT Systems
Information Technology Security Guideline User Authentication Guidance for IT Systems ITSG-31 March 2009 March 2009 This page intentionally left blank March 2009 Foreword The User Authentication Guidance
Security Language for IT Acquisition Efforts CIO-IT Security-09-48
Security Language for IT Acquisition Efforts CIO-IT Security-09-48 Office of the Senior Agency Information Security Officer VERSION HISTORY/CHANGE RECORD Change Number Person Posting Change Change Reason
NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO-6011-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016
National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy Version 1.1 February 2, 2016 Copyright 2016, Georgia Tech Research Institute Table of Contents TABLE OF CONTENTS I 1 INTRODUCTION
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS
NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS Scope and Applicability: These Network and Certificate System Security Requirements (Requirements) apply to all publicly trusted Certification Authorities
Federal Identity, Credential, and Access Management Trust Framework Solutions. Relying Party Guidance For Accepting Externally-Issued Credentials
Federal Identity, Credential, and Access Management Trust Framework Solutions Relying Party Guidance For Accepting Externally-Issued Credentials Version 1.1.0 Questions? Contact the FICAM TFS Program Manager
2. Each server or domain controller requires its own server certificate, DoD Root Certificates and enterprise validator installed.
Purpose and Scope The purpose of this policy is to define the roles and responsibilities on implementing the Homeland Security Presidential Directive 12 (HSPD-12) Logical Access Control (LAC) throughout
FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM
FOUR PILLARS FOR A SUCCESSFUL PIV ECOSYSTEM Four Pillars that HSPD-12 Programs must consider for a secure, efficient, interoperable PIV enterprise deployment. Continued HSPD-12 Implementation under OMB
NOAA HSPD-12 PIV-II Implementation October 23, 2007. Who is responsible for implementation of HSPD-12 PIV-II?
NOAA HSPD-12 PIV-II Implementation What is HSPD-12? Homeland Security Presidential Directive 12 (HSPD-12) is a Presidential requirement signed on August 27, 2004 requiring Federal agencies comply with
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
Information Technology Policy
Information Technology Policy Identity Protection and Access Management (IPAM) Architectural Standard Identity Management Services ITP Number ITP-SEC013 Category Recommended Policy Contact [email protected]
Authorized. User Agreement
Authorized User Agreement CareAccord Health Information Exchange (HIE) Table of Contents Authorized User Agreement... 3 CareAccord Health Information Exchange (HIE) Polices and Procedures... 5 SECTION
FSIS DIRECTIVE 1306.3
UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC FSIS DIRECTIVE 1306.3 REVISION 1 12/13/12 CONFIGURATION MANAGEMENT (CM) OF SECURITY CONTROLS FOR INFORMATION SYSTEMS
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES
5 FAM 140 ACCEPTABILITY AND USE OF ELECTRONIC SIGNATURES 5 FAM 141 PURPOSE (CT-IM-112; 07-30-2010) (Office of Origin: IRM/OPS/ITI/SI/IIB) The purpose of this FAM chapter is to enable the Department to
Identity, Credential, and Access Management. Open Solutions for Open Government
Federal CIO Council Information Security and Identity Management Committee Identity, Credential, and Access Management www.idmanagement.gov Open Solutions for Open Government Judith Spencer Co-Chair, ICAM
Subject: Public Key Infrastructure: Examples of Risks and Internal Control Objectives Associated with Certification Authorities
United States Government Accountability Office Washington, DC 20548 August 10, 2004 The Honorable Tom Davis Chairman, Committee on Government Reform House of Representatives Dear Mr. Chairman: Subject:
Homeland Security Virtual Assistance Center
for the Homeland Security Virtual Assistance Center November 3, 2008 Contact Point Donald M. Lumpkins National Preparedness Directorate (FEMA) (202) 786-9754 Reviewing Official Hugo Teufel III Chief Privacy
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
A unique biometrics based identifier, such as a fingerprint, voice print, or a retinal scan; or
SBA Procedural Notice TO: All SBA Employees CONTROL NO.: 5000-1323 SUBJECT: Acceptance of Electronic Signatures in the 7(a) and 504 Loan Program EFFECTIVE: 10/21/14 The purpose of this Notice is to inform
E X E C U T I V E O F F I CE O F T H E P R E S I D EN T
EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 THE DIRECTOR M-05-24 August 5, 2005 MEMORANDUM FOR THE HEADS OF ALL DEPARTMENTS AND AGENCIES FROM: SUBJECT: Joshua
OWA/2-Factor Authentication VPN FAQ. Outlook Web Access (OWA) QUESTIONS
Outlook Web Access (OWA) QUESTIONS Q1. With OWA and ActiveSync going away, how does an employee/contractor access Outlook (email, calendar and contacts)? A1. An employee must use their government/contractor
Appendix H: End User Rules of Behavior
Appendix H: End User Rules of Behavior 1. Introduction The Office of Management and Budget (OMB) has established the requirement for formally documented Rules of Behavior as set forth in OMB Circular A-130.
BPA Policy 434-1 Cyber Security Program
B O N N E V I L L E P O W E R A D M I N I S T R A T I O N BPA Policy Table of Contents.1 Purpose & Background...2.2 Policy Owner... 2.3 Applicability... 2.4 Terms & Definitions... 2.5 Policy... 5.6 Policy
Security Control Standard
Department of the Interior Security Control Standard Maintenance January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior, Chief Information Officer
Department of Veteran Affairs VA HANDBOOK 6510 VA IDENTITY AND ACCESS MANAGEMENT
Department of Veteran Affairs VA HANDBOOK 6510 Washington, DC 20420 Transmittal Sheet VA IDENTITY AND ACCESS MANAGEMENT 1. REASON FOR ISSUE: This Handbook defines roles, responsibilities, and procedures
Audio: This overview module contains an introduction, five lessons, and a conclusion.
Homeland Security Presidential Directive 12 (HSPD 12) Overview Audio: Welcome to the Homeland Security Presidential Directive 12 (HSPD 12) overview module, the first in a series of informational modules
Office of Inspector General
DEPARTMENT OF HOMELAND SECURITY Office of Inspector General Security Weaknesses Increase Risks to Critical United States Secret Service Database (Redacted) Notice: The Department of Homeland Security,
Department of Veterans Affairs VA Handbook 6500. Information Security Program
Department of Veterans Affairs VA Handbook 6500 Washington, DC 20420 Transmittal Sheet September 18, 2007 Information Security Program 1. REASON FOR ISSUE: To provide specific procedures and establish
Justice Management Division
Justice Management Division Privacy Impact Assessment for the Personal Identity Verification (PIV) Card System Issued by: Stuart Frisch, Senior Component Official for Privacy Reviewed by: Vance E. Hitch,
Authentication, Authorization, and Audit Design Pattern: Internal User Identity Authentication
Authentication, Authorization, and Audit Design Pattern: Internal User Identity Authentication Office of Technology Strategies (TS) Architecture, Strategy, and Design (ASD) Office of Information and Technology
Open Data Center Alliance Usage: Provider Assurance Rev. 1.1
sm Open Data Center Alliance Usage: Provider Assurance Rev. 1.1 Legal Notice This Open Data Center Alliance SM Usage:Provider Assurance is proprietary to the Open Data Center Alliance, Inc. NOTICE TO USERS
Glossary of Key Terms
and s Branch Glossary of Key Terms The terms and definitions listed in this glossary are used throughout the s Package to define key terms in the context of. Access Control Access The processes by which
SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)
UNIVERSITY OF PITTSBURGH POLICY SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA) DATE: March 18, 2005 I. SCOPE This
I. U.S. Government Privacy Laws
I. U.S. Government Privacy Laws A. Privacy Definitions and Principles a. Privacy Definitions i. Privacy and personally identifiable information (PII) b. Privacy Basics Definition of PII 1. Office of Management
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL
U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT: U.S. Election Assistance Commission Compliance with the Requirements of the Federal Information Security Management Act Fiscal
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
COORDINATION DRAFT. FISCAM to NIST Special Publication 800-53 Revision 4. Title / Description (Critical Element)
FISCAM FISCAM 3.1 Security (SM) Critical Element SM-1: Establish a SM-1.1.1 The security management program is adequately An agency/entitywide security management program has been developed, An agency/entitywide
GAO PERSONAL ID VERIFICATION. Agencies Should Set a Higher Priority on Using the Capabilities of Standardized Identification Cards
GAO United States Government Accountability Office Report to Congressional Requesters September 2011 PERSONAL ID VERIFICATION Agencies Should Set a Higher Priority on Using the Capabilities of Standardized
U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE. Privacy Impact Assessment
U.S. DEPARTMENT OF COMMERCE UNITED STATES PATENT AND TRADEMARK OFFICE Privacy Impact Assessment Enterprise Software Services PTOI-020-00 July 8, 2015 Privacy Impact Assessment This Privacy Impact Assessment
PCI DSS Requirements - Security Controls and Processes
1. Build and maintain a secure network 1.1 Establish firewall and router configuration standards that formalize testing whenever configurations change; that identify all connections to cardholder data
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
Compliance and Industry Regulations
Compliance and Industry Regulations Table of Contents Introduction...1 Executive Summary...1 General Federal Regulations and Oversight Agencies...1 Agency or Industry Specific Regulations...2 Hierarchy
Information Security Program Management Standard
State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES
Nuclear Regulatory Commission Computer Security Office Computer Security Standard
Nuclear Regulatory Commission Computer Security Office Computer Security Standard Office Instruction: Office Instruction Title: CSO-STD-2105 Remote Access Security Standard Revision Number: 1.0 Effective
Virginia Commonwealth University School of Medicine Information Security Standard
Virginia Commonwealth University School of Medicine Information Security Standard Title: Scope: Data Handling and Storage Standard This standard is applicable to all VCU School of Medicine personnel. Approval
SECURE APPLICATION DEVELOPMENT CODING POLICY OCIO-6013-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER OCIO-6013-09 Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: TABLE OF CONTENTS Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS
FITSP-Auditor Candidate Exam Guide
FITSP-Auditor Candidate Exam An Overview of the FITSP-A Certification 2010 Edition Copyright 2009-2010 FITSI 1 FITSP-Auditor Candidate Exam This page is left intentionally blank Copyright 2009-2010 FITSI
FedRAMP Standard Contract Language
FedRAMP Standard Contract Language FedRAMP has developed a security contract clause template to assist federal agencies in procuring cloud-based services. This template should be reviewed by a Federal
CA Technologies Solutions for Criminal Justice Information Security Compliance
WHITE PAPER OCTOBER 2014 CA Technologies Solutions for Criminal Justice Information Security Compliance William Harrod Advisor, Public Sector Cyber-Security Strategy 2 WHITE PAPER: SOLUTIONS FOR CRIMINAL
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions
The DoD Public Key Infrastructure And Public Key-Enabling Frequently Asked Questions May 3, 2004 TABLE OF CONTENTS GENERAL PKI QUESTIONS... 1 1. What is PKI?...1 2. What functionality is provided by a
Announcing Approval of Federal Information Processing Standard (FIPS) Publication 201-2,
This document is scheduled to be published in the Federal Register on 09/05/2013 and available online at http://federalregister.gov/a/2013-21491, and on FDsys.gov Billing Code 3510-13 DEPARTMENT OF COMMERCE
ORDER 1370.108. National Policy. Effective Date 09/21/09. Voice Over Internet Protocol (VoIP) Security Policy SUBJ:
National Policy ORDER 1370.108 Effective Date 09/21/09 SUBJ: Voice Over Internet Protocol (VoIP) Security Policy 1. Purpose of This Order. This Order establishes the Federal Aviation Administration s (FAA)
Review of the SEC s Systems Certification and Accreditation Process
Review of the SEC s Systems Certification and Accreditation Process March 27, 2013 Page i Should you have any questions regarding this report, please do not hesitate to contact me. We appreciate the courtesy
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
LogRhythm and PCI Compliance
LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent
Ginnie Mae Enterprise Portal (GMEP) User Registration for Custodian ONLY
Ginnie Mae Enterprise Portal (GMEP) User Registration for Custodian ONLY Instructions (1) Complete the information in the boxes below please print. (2) Select the requested roles(s). (3) Read the User
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
United States Citizenship and Immigration Services (USCIS) Enterprise Service Bus (ESB)
for the United States Citizenship and Immigration Services (USCIS) June 22, 2007 Contact Point Harry Hopkins Office of Information Technology (OIT) (202) 272-8953 Reviewing Official Hugo Teufel III Chief
www.xceedium.com 2: Do not use vendor-supplied defaults for system passwords and other security parameters
2: Do not use vendor-supplied defaults for system passwords and other security parameters 2.1: Always change vendor-supplied defaults and remove or disable unnecessary default accounts before installing
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates. September 2006
Card Management System Integration Made Easy: Tools for Enrollment and Management of Certificates September 2006 Copyright 2006 Entrust. All rights reserved. www.entrust.com Entrust is a registered trademark
PRIVACY IMPACT ASSESSMENT
Name of System/Application: LAN/WAN PRIVACY IMPACT ASSESSMENT U. S. Small Business Administration LAN/WAN FY 2011 Program Office: Office of the Chief Information Officer A. CONTACT INFORMATION 1) Who is
ICT USER ACCOUNT MANAGEMENT POLICY
ICT USER ACCOUNT MANAGEMENT POLICY Version Control Version Date Author(s) Details 1.1 23/03/2015 Yaw New Policy ICT User Account Management Policy 2 Contents 1. Preamble... 4 2. Terms and definitions...
