![]() NSTSSI Security Education Standards |
1. Maintain a plan for site security improvements and progress towards meeting the
accreditation
a. Facilities
(1) Planning
E - cite significance of facilities planning in INFOSEC;
E - identify issues that need to be addressed in facilities plan; make
suggestions for enhancement to plan; and
I - review facility plan and make suggestions for upgrades and modifications
to enhance INFOSEC posture;
(2) Management
E - list basic principles of facility management; and
I - ensure the plan is implemented as planned.
(3) Housekeeping
E - list general procedures in facility, e.g., standard operating procedures
(SOP), access roster, etc.;
I - develop the SOP, maintain the access roster.
(4) Data Processing Center (DPC) Security
E - list unique security requirements above and beyond general facility
management for DPCs.
b. INFOSEC Program Planning
E - describe the overall program to users and managers;
E - prepare input to the overall security plan;
I - prepare the plan;
I - present the plan to management and users; and
I - propose changes to the plan.
(1) Procedures
E - describe the policy, etc. to users and managers;
E - identify potential flaws in policy, etc., and initiate corrective actions;
E - provide periodic reports to managers with status and recommendations;
I - write the procedures as required;
I - design the procedures and test them; and
I - modify procedures as required.
(2) Contingency Plans
E - prepare input to contingency plan;
E - write the contingency plan;
E - identify items for which plans must be developed; and
I - modify the contingency plan to reflect changes.
(3) Continuity Plans
E - prepare input to continuity plan;
E - write the continuity plan;
E - identify items for which plans must be developed; and
I - modify the contingency plan reflecting changes.
(4) Emergency Destruction Procedures (EDP)
E - explain the EDP to those who execute the plans;
E - ensure executors of EDP plans are trained in environmental and safety
issues;
I - demonstrate the EDP to users and managers; and
I - integrate EDP into overall plans.
(5) Network Monitoring
E - list capabilities, limitations, and data available from network monitors;
E - identify networks to be monitored including times and amount/types of
data to be collected;
E - ensure laws, for instance, warning banners in place, are followed;
I - determine the need to monitor suspicious activity; start the monitoring
process; and
I - justify to management the need for the detailed monitoring.
(6) Password Management
E - list the underlying password management principles explaining the need
for password management;
E - issue passwords to users; ensure that passwords are chosen in accordance
with policy; disable accounts when necessary;
E - address questions or concerns of users and managers; and
I - develop local policies and procedures for password management in
accordance with higher level policies, etc.
(a) Password Sharing
E - inform users they are not to share passwords and the consequences of
doing so (explain the potential criminal penalties involved);
I - identify abuses, e.g., who is sharing passwords or files; and
I - propose methods to share files without sharing passwords.
(b) Password Choosing
E - describe to users how to choose appropriate passwords, and how/why to
protect them;
I - enforce good selection of passwords in accordance with password
management practices, and also notify user/managers of violations for
appropriate action; and
I - provide examples of good and bad passwords as an awareness activity.
(7 ) Rules-based Access Controls (RBAC)
E - defin e RBAC;
I - integrate the access controls into the appropriate operating plans,
procedures, etc.; and
I - ensure the access controls are properly and correctly installed in
accordance with the security policy.
(8) Protection from Malicious Code
E - describe malicious code and outline the various types of malicious code;
E - describe techniques for protection from malicious code to users, and
provide examples (real and theoretical);
E - report suspected or actual occurrences of malicious code and initiate
corrective actions as appropriate;
I - propose methods and policies to combat introduction of malicious code
into a site; and
I - integrate protection techniques into the system and into policies.
c. Administrative Security
E - outline the components of administrative security;
E - prepare input to the administrative security plan for which he/she is
responsible;
E - implement parts of plan for which he/she is responsible;
E - report to management on variations from the plan and suggest improvements to
the plan;
I - modify the administrative security plan in accordance with higher level policies;
and
I - enforce the plan.