Information Type: Sample Format
INTEK-MC - Strawman Network Security Plan
1. General Information: 40 Fill in the blanks
2. Scope and Applicability: 2 Fill in the blanks
3. Objective: 1 Fill in the blank
4. Personnel Assignments: 8 Fill in the blanks
5. Protection Requirements: 50 Fill in the blanks
6. Risk Analysis Guidance: 4 Fill in the blanks
7. Security Test & Evaluation Guidance: 3-4 Fill in the
blanks
1. General Information:
|
a. Facility Name/Address.
|
|
b. Contract Number.
|
|
c. Mission - Business.
|
|
d. Network environment and special considerations.
|
|
e. Criticality and Sensitivity.
|
|
(1) Applicable laws or regulations affecting the network.
|
|
(2) General description of information sensitivity.
|
|
(3) Classified data volume.
|
|
f. Network Identification:
|
|
(1) Responsible organization.
|
|
(2) Official network title.
|
|
(3) System category.
|
|
(a) Major application, or
|
|
(b) General support system.
|
|
(4) System operational status.
|
|
(a) Operational,
|
|
(b) Under development, or
|
|
(c) Major modification.
|
|
(5) Network inventory.
|
|
(a) Description of the network.
|
|
(b) Node interfaces.
|
|
(c) Interfaces to other networks.
|
|
(d) Identification of designated points of demarcation between
networks.
|
|
(e) Hardware components.
|
|
1. Transmission media.
|
|
2. Network nodes.
|
|
3. User nodes.
|
|
4. Hardware protection mechanisms such as PDS or encryption devices.
|
|
5. Gateways, bridges, filters, repeaters, etc.
|
|
6. Identification of components of network nodes involved in.
|
|
a. Operation
|
|
b. Administration
|
|
c. Control.
|
|
7. Identification of the system security plans.
|
|
(f) Software components.
|
|
1. Protocols used.
|
|
2. Network monitor software.
|
|
3. Analysis software.
|
|
4. Security databases.
|
|
5. Applications software.
|
|
(6) Network configuration. This paragraph provides a network
configuration description.
|
|
(7) Network purpose. This paragraph describes the purpose of the
network and the advantages provided by networking.
|
|
(8) Physical location.
|
|
(a) Include the full name and address of all facilities
interconnected by the network.
|
|
(b) Identify all areas in which the installation will take place;
including building designations, floors, and room numbers. Where
appropriate (e.g. for EMSEC considerations) a building schematic may be
required. Identify the types of areas (exclusion, security, controlled,
open) traversed by the network.
|
BACK
2. Scope and Applicability:
|
a. Who will use the network?
|
|
b. State if the plan will be used for life-cycle security procedures.
|
BACK
3. Objective: Explain the planned objectives. This should include the
implementation of security measures to protect the facilities, hardware,
software and information.
BACK
4. Personnel Assignments:
|
a. Designated Approving Authority.
|
|
b. Office of Primary Responsibility.
|
|
c. Computer Systems Manager.
|
|
d. Network Manager.
|
|
e. Network Security Officer.
|
|
f. TASOs for the network.
|
|
g. Functional OPR.
|
|
h. Any other assignments.
|
BACK
5. Protection Requirements:
|
a. Applicable Guidance.
|
|
b. Personnel Security.
|
|
(1) Describe the controls used to ensure that personnel accessing the
network have proper clearance and need to know for the resources they
may access via the network.
|
|
(2) Outline the various components of a network which a user may have
access to while performing their normal duties.
|
|
c. Physical Security.
|
|
(1) Physical Protection Measures:
|
|
(a) Describe the physical security measures utilized to protect the
general area(s) in which the network is installed and restrict access to
the various components of the network including the transmission media.
|
|
(b) Describe the physical protection employed for storage media
associated with network control nodes. Do not include media covered by
the individual system security plans unless the node is also used to
control, administer, or operate the network.
|
|
(2) Protection against civil disorder. Highlight physical security
protection available to limit interference by civil disorders.
|
|
d. Telecommunication Security:
|
|
(1) Transmission security. Describe the methods used to meet the
transmission security requirement. Also, describe the type of
transmission used, since digital compared to analog transmission will
increase intercept difficulty because the perpetrator must determine the
transmission rate and digital coding scheme used by carrier or user
equipment.
|
|
(2) EMSEC Security. Describe the signaling level of the network
components and determine if it conforms with INTEK-SSI 7000 requirements
for low-level signaling. Non-EMSEC constrained networks should include a
statement of non applicability regarding EMSEC requirements.
|
|
(3) Circuit Routing. Alternative routing compared with dedicated
routing will increase intercept difficulty because the targeted
transmission will not be limited to the same circuit.
|
|
e. Administrative Security.
|
|
(1) Individual Node Security. A statement assuring that all nodes on
the network are covered by an active accredited System Security Plan.
|
|
(2) Network Operating Procedures. Verify the existence of network
operating procedures available to maintenance and operations personnel.
|
|
(3) Configuration Management Procedures. Describe the procedures for
maintaining configuration control.
|
|
(4) Physical Access Procedures. Describe the procedures for
controlling physical access to network components.
|
|
(5) User Authorization Procedures. Describe the rules and
restrictions for determination of user identification, authentication,
and authorization.
|
|
(6) Audit Procedures. Describe the procedures for gathering,
examining, and archiving audit information.
|
|
(7) Procedures for reporting security incidents. Describe the
procedures for reporting observed network violations to the proper
authorities.
|
|
(8) User responsibilities. Describe training available to the users
of the network to increase their network security awareness.
|
|
(9) Information Security. Describe procedures for handling classified
information and for the destruction of classified data.
|
|
(10) Node responsibilities. Describe the minimum security a node must
meet before it will be allowed connection to the network.
|
|
f. Hardware and Software Security.
|
|
(1) User access Control
Describe the procedures used to uniquely identify and authenticate
both users and nodes.
Describe how the log in information is protected during transmission
on the network and on the individual nodes processing or storing that
information.
Describe how requests for connections are authorized.
Describe the methods used to authorize/verify the usage of network
services. Include descriptions of those controls to be provided by the
network and those to be provided by the nodes.
|
|
(2) Need-to-know protection. Describe the method used to provide
need-to-know protection.
|
|
(3) Discretionary/mandatory access controls.
Describe the security aspects inherent to the protocol(s) used,
including information such as how data are labeled during transmission
and how connections are initiated, controlled, and terminated.
Describe the error recovery/processing techniques used by the
protocol and why information cannot be misrouted as a result of
transmission errors.
Describe how discretionary/mandatory access controls are fulfilled.
Identify the network components that are labeled.
Identify the classification level of all interconnected subnetworks.
Describe the features provided by any security filters (if
applicable). Include descriptions of those controls to be provided by
the network and those to be provided by the nodes.
|
|
(4) Audit and monitoring function.
Describe the methods and hardware/software components used to support
the audit requirements. Include information about what data are to be
gathered, how the data are to be obtained, how the audit information is
protected from unauthorized access, and types of analyses to be
performed on the audit information.
Describe mechanisms in place to monitor the network including usage
statistics, performance, and node identification. Include descriptions
of those controls to be provided by the network and those to be provided
by the nodes.
|
|
g. Operational Controls. Describe the operational controls used to
provide the following:
|
|
(1) Physical and environmental protection.
|
|
(2) Production, I/O controls.
|
|
(3) Emergency, backup, and contingency planning
|
|
(4) Audit and variance detection.
|
|
(5) Application software maintenance controls.
|
|
(6) Documentation.
|
|
h. Security Control Measures for Major Applications.
|
|
(1) Development/implementation controls.
|
|
(a) Security specifications
|
|
(b) Design review and testing.
|
|
(c) Certification.
|
|
(2) Technical Controls.
|
|
(a) User identification and authentication.
|
|
(b) Authorization/access controls.
|
|
(c) Integrity controls.
|
|
(d) Audit trail mechanisms.
|
|
(e) Confidentiality controls.
|
|
(3) Controls over the security of applications.
|
|
i. Security Awareness and Training.
|
BACK
6. Risk Analysis Guidance: Include guidelines for performing the risk
analysis; for example, scope of the risk analysis, list any assumption or
constraints and include criteria each system or user must meet to connect to the
network.
BACK
7. Security Test & Evaluation Guidance: Include guidelines for performing
the ST&E; for example, the scope for the ST&E requirements to test
against.
8. Additional Comments:
File Owner: Jim Tracy
Organization: INTEK
Phone: (314) 596-8750
E-mail: jimt@intek.net
Date Last Reviewed: May 2001
BACK
Open
this portion of the document in Word (36 KB) |