DHS Sensitive Systems Policy Directive 4300A Version 8 0 March 14 2011 This is the implementation of DHS Management Directive 140-01 Information Technology System Security July 31 2007 DEPARTMENT OF HOMELAND SECURITY DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A This page intentionally left blank DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A FOREWORD The Department of Homeland Security DHS 4300 series of information security policy is the official series of publications relating to Departmental standards and guidelines adopted and promulgated under the provisions of DHS Management Directive 140-01 Information Technology System Security Comments concerning DHS Information Security publications are welcomed and should be submitted to the DHS Director for Information Systems Security Policy at INFOSEC@dhs gov or addressed to DHS Director of Information Security Policy OCIO CISO Stop 0182 Department of Homeland Security 245 Murray Lane SW Washington DC 20528-0182 Robert C West DHS Chief Information Security Officer DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A This page intentionally left blank DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A TABLE OF CONTENTS 1 0 INTRODUCTION 1 1 1 Information Security Program 1 1 2 Authorities 1 1 3 Policy Overview 2 1 4 Definitions 2 1 4 1 Classified National Security Information 2 1 4 2 National Intelligence Information 2 1 4 3 National Security Information 2 1 4 4 Foreign Intelligence Information 2 1 4 5 Sensitive Information 3 1 4 6 Public Information 3 1 4 7 Information Technology 3 1 4 8 DHS System 3 1 4 8 1 General Support System 3 1 4 8 2 Major Application 4 1 4 9 Component 4 1 4 10 Trust Zone 4 1 4 11 Continuity of Operations 4 1 4 12 Continuity of Operations Plan 5 1 4 13 Essential Functions 5 1 4 14 Vital Records 5 1 4 15 Operational Data 5 1 4 16 Federal Information Security Management Act 5 1 4 17 Personally Identifiable Information 7 1 4 18 Sensitive Personally Identifiable Information 7 1 4 19 Privacy Sensitive System 7 1 4 20 Strong Authentication 7 1 4 21 Two-Factor Authentication 7 1 5 Waivers and Exceptions 8 1 5 1 Waivers 8 1 5 2 Exceptions 8 1 5 3 Waiver or Exception Requests 8 1 5 4 U S Citizen Exception Requests 10 1 6 Information Sharing and Electronic Signature 10 1 7 Changes to Policy 11 2 0 ROLES AND RESPONSIBILITIES 12 2 1 Information Security Program Roles 12 2 1 1 DHS Senior Agency Information Security Officer 12 2 1 2 DHS Chief Information Security Officer 12 2 1 3 Component Chief Information Security Officer 14 2 1 4 Component Information Systems Security Manager 16 2 1 5 Risk Executive 17 2 1 6 Authorizing Official 18 2 1 7 Security Control Assessor 19 i v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 2 2 2 1 8 Information Systems Security Officer 20 Other Roles 20 2 2 1 Secretary of Homeland Security 20 2 2 2 Under Secretaries and Heads of DHS Components 21 2 2 3 DHS Chief Information Officer 22 2 2 4 Component Chief Information Officer 23 2 2 5 DHS Chief Security Officer 24 2 2 6 DHS Chief Privacy Officer 24 2 2 7 DHS Chief Financial Officer 25 2 2 8 Program Managers 26 2 2 9 System Owners 26 2 2 10 Common Control Provider 27 2 2 11 DHS Employees Contractors and Others Working on Behalf of DHS 28 3 0 MANAGEMENT POLICIES 29 3 1 Basic Requirements 29 3 2 Capital Planning and Investment Control 30 3 3 Contractors and Outsourced Operations 31 3 4 Performance Measures and Metrics 31 3 5 Continuity Planning for Critical DHS Assets 32 3 5 1 Continuity of Operations Planning 32 3 5 2 Contingency Planning 33 3 6 System Engineering Life Cycle 34 3 7 Configuration Management 34 3 8 Risk Management 36 3 9 Security Authoziation and Security Assessments 36 3 10 Information Security Review and Assistance 39 3 11 Security Working Groups and Forums 39 3 11 1 CISO Council 39 3 11 2 DHS Information Security Training Working Group 40 3 12 Information Security Policy Violation and Disciplinary Action 40 3 13 Required Reporting 41 3 14 Privacy and Data Security 41 3 14 1 Personally Identifiable Information 41 3 14 2 Privacy Threshold Analyses 43 3 14 3 Privacy Impact Assessments 43 3 14 4 System of Records Notices 44 3 14 5 Protecting Privacy Sensitive Systems 45 3 14 6 Privacy Incident Reporting 46 3 14 7 E-Authentication 47 3 15 DHS CFO Designated Systems 47 3 16 Social Media 49 3 17 Health Insurance Portability and Accountability Act 50 4 0 OPERATIONAL POLICIES 52 4 1 Personnel 52 4 1 1 Citizenship Personnel Screening and Position Categorization 52 4 1 2 Rules of Behavior 53 ii v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 4 2 4 3 4 4 4 5 4 6 4 7 4 8 4 9 4 10 4 11 4 12 4 13 5 0 4 1 3 Access to Sensitive Information 53 4 1 4 Separation of Duties 53 4 1 5 Information Security Awareness Training and Education 54 4 1 6 Separation From Duty 54 Physical Security 55 4 2 1 General Physical Access 55 4 2 2 Sensitive Facility 56 Media Controls 56 4 3 1 Media Protection 56 4 3 2 Media Marking and Transport 57 4 3 3 Media Sanitization and Disposal 57 4 3 4 Production Input Output Controls 57 Voice Communications Security 58 4 4 1 Private Branch Exchange 58 4 4 2 Telephone Communications 58 4 4 3 Voice Mail 58 Data Communications 58 4 5 1 Telecommunications Protection Techniques 58 4 5 2 Facsimiles 59 4 5 3 Video Teleconferencing 59 4 5 4 Voice Over Data Networks 59 Wireless Network Communications 60 4 6 1 Wireless Systems 60 4 6 2 Wireless Portable Electronic Devices 61 4 6 2 1 Cellular Phones 63 4 6 2 2 Pagers 63 4 6 2 3 Multifunctional Wireless Devices 63 4 6 3 Wireless Tactical Systems 64 4 6 4 Radio Frequency Identification 64 Overseas Communications 65 Equipment 66 4 8 1 Workstations 66 4 8 2 Laptop Computers and Other Mobile Computing Devices 66 4 8 3 Personally Owned Equipment and Software 66 4 8 4 Hardware and Software 67 4 8 5 Personal Use of Government Office Equipment and DHS Systems Computers 68 4 8 6 Wireless Settings for Peripheral Equipment 68 Department Information Security Operations 69 Security Incidents and Incident Response and Reporting 70 4 10 1 Law Enforcement Incident Response 72 Documentation 73 Information and Data Backup 73 Converging Technologies 74 TECHNICAL POLICIES 75 5 1 Identification and Authentication 75 iii v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 5 2 5 3 5 4 5 5 5 6 5 7 5 1 1 Passwords 75 Access Control 76 5 2 1 Automatic Account Lockout 77 5 2 2 Automatic Session Termination 77 5 2 3 Warning Banner 78 Auditing 79 Network and Communications Security 79 5 4 1 Remote Access and Dial-In 79 5 4 2 Network Security Monitoring 80 5 4 3 Network Connectivity 81 5 4 4 Firewalls and Policy Enforcement Points 83 5 4 5 Internet Security 84 5 4 6 Email Security 85 5 4 7 Personal Email Accounts 86 5 4 8 Testing and Vulnerability Management 86 5 4 9 Peer-to-Peer Technology 87 Cryptography 87 5 5 1 Encryption 87 5 5 2 Public Key Infrastructure 88 5 5 3 Public Key Private Key 90 Malware Protection 91 Product Assurance 92 6 0 DOCUMENT CHANGE REQUESTS 94 7 0 QUESTIONS AND COMMENTS 94 APPENDIX A ACRONYMS 95 APPENDIX B GLOSSARY 101 APPENDIX C REFERENCES 106 APPENDIX D DOCUMENT CHANGE HISTORY 109 iv v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 1 0 INTRODUCTION This document articulates the Department of Homeland Security DHS Information Security Program policies for sensitive systems Procedures for implementing these policies are outlined in a companion publication DHS 4300A Sensitive Systems Handbook The handbook serves as a foundation for Components to develop and implement their information security programs The baseline security requirements BLSRs included in the handbook must be addressed when developing and maintaining information security documents 1 1 Information Security Program The DHS Information Security Program provides a baseline of policies standards and guidelines for DHS Components This document provides direction to managers and senior executives for managing and protecting sensitive systems It also outlines policies relating to management operational and technical controls necessary for ensuring confidentiality integrity availability authenticity and nonrepudiation within the DHS information system infrastructure and operations Policy elements are designed to be broad in scope Specific implementation information can often be found in specific National Institute for Standards and Technology NIST publications such as NIST Special Publication SP 800-53 Recommended Security Controls for Federal Systems and Organizations The policies and direction contained in this document apply to all DHS Components Information security policies and implementing procedures for National Security Systems are covered in separate publications DHS National Security Systems Policy Directive 4300B and DHS 4300B National Security Systems Handbook These publications are available on the DHS Chief Information Security Officer CISO website Policy elements are effective when issued Any policy elements that have not been implemented within ninety 90 days shall be considered a weakness and either a system or program Plan of Action and Milestones POA M must be generated by the Component for the identified weaknesses Whenever the DHS Security Compliance tools Risk Management System RMS and TrustedAgent FISMA TAF require updating to reflect policy element changes tool changes shall be available to the Department within forty-five 45 days of the policy changes 1 2 Authorities The following list provides the authoritative references for the DHS sensitive information security program Additional references are located in Appendix C of this document • Public Law 107-347 E-Government Act of 2002 including Title III Federal Information Security Management Act FISMA • Office of Management and Budget OMB Circular A-130 Management of Federal Information Resources • DHS Management Directive MD 140-01 Information Technology Security Services • NIST Federal Information Processing Standards FIPS 200 Minimum Security Requirements for Federal Information and Information Systems • NIST SP 800-53 Recommended Security Controls for Federal Information Systems and Organizations 1 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 1 3 Policy Overview DHS information security policies delineate the security management structure and foundation to measure progress and compliance Policies in this document are organized under three areas • Management Controls – Focus on managing both the system information security controls and system risk These controls consist of risk mitigation techniques and concerns normally addressed by management • Operational Controls – Focus on mechanisms primarily implemented and executed by people These controls are designed to improve the security of a particular system or group of systems and often rely on management and technical controls • Technical Controls – Focus on security controls executed by information systems These controls provide automated protection from unauthorized access or misuse They facilitate detection of security violations and support security requirements for applications and data 1 4 Definitions The following definitions apply to the policies and procedures outlined in this document Other definitions may be found in the National Information Assurance IA Glossary as well as the Privacy Incident Handling Guidance and the Privacy Compliance documentation 1 4 1 Classified National Security Information Information that has been determined pursuant to Executive Order 13526 Classified National Security Information to require protection against unauthorized disclosure and is marked to indicate its classified status 1 4 2 National Intelligence Information The following definition is provided in Public Law 108-458 Intelligence Reform and Terrorism Prevention Act of 2004 December 17 2004 “The terms ‘national intelligence’ and ‘intelligence related to national security’ refer to all intelligence regardless of the source from which derived and including information gathered within or outside the United States that – “ A pertains as determined consistent with any guidance issued by the President to more than one United States Government agency and “ B that involves – i threats to the United States its people property or interests ii the development proliferation or use of weapons of mass destruction or iii any other matter bearing on United States national or homeland security ” 1 4 3 National Security Information Information that has been determined pursuant to Executive Order 13526 Classified National Security Information or any predecessor order to require protection against unauthorized disclosure 1 4 4 Foreign Intelligence Information This type of information relates to the capabilities intentions and activities of foreign powers organizations or persons but does not include counterintelligence except for information on international terrorist activities 2 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 1 4 5 Sensitive Information Sensitive information is information not otherwise categorized by statute or regulation that if disclosed could have an adverse impact on the welfare or privacy of individuals or on the welfare or conduct of Federal programs or other programs or operations essential to the national interest Examples of sensitive information include personal data such as Social Security number trade secrets system vulnerability information pre-solicitation procurement documents such as statements of work and law enforcement investigative methods similarly detailed reports related to computer security deficiencies in internal controls are also sensitive information because of the potential damage that could be caused by the misuse of this information System vulnerability information about a financial system shall be considered Sensitive Financial Information All sensitive information must be protected from loss misuse modification and unauthorized access With the exception of certain types of information protected by statute e g Sensitive Security Information Critical Infrastructure Information there are no specific Federal criteria and no standard terminology for designating types of sensitive information Such designations are left to the discretion of each individual Federal agency “For Official Use Only” FOUO is the term used within DHS to identify unclassified information of a sensitive nature that is not otherwise categorized by statute or regulation DHS will adopt the term “Controlled Unclassified Information” CUI at a later date 1 4 6 Public Information This type of information can be disclosed to the public without restriction but requires protection against erroneous manipulation or alteration e g Public Web sites 1 4 7 Information Technology The Clinger-Cohen Act defines information technology IT as any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition storage manipulation management movement control display switching interchange transmission or reception of data or information by an Executive agency For purposes of the preceding definition “equipment” refers to that used by any DHS Component or contractor if the contractor requires the use of such equipment in the performance of a service or the furnishing of a product in support of DHS The term “information technology” includes computers ancillary equipment software firmware and similar procedures services including support services and related resources The term “information system ” as used within this policy document is equivalent to the term “IT system ” 1 4 8 DHS System A DHS system is any information system that transmits stores or processes data or information and is 1 owned leased or operated by any DHS Component 2 operated by a contractor on behalf of DHS or 3 operated by another Federal state or local Government agency on behalf of DHS DHS systems include general support systems and major applications 1 4 8 1 General Support System A general support system GSS is an interconnected set of information resources under the same direct management control that share common functionality A GSS normally includes hardware 3 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A software information applications communications data and users Examples of a GSS include a local area network LAN including smart terminals that support a branch office a Department-wide backbone a communications network or a Departmental data processing center including its operating system and utilities Note Security for GSS in use at DHS Headquarters shall be under the oversight of the DHS Office of the Chief Information Officer OCIO with support from the DHS Enterprise Operations Center EOC All other GSS shall be under the direct oversight of the respective Component CISOs with support from the appropriate Component Security Operations Center SOC All GSS must have an Information Systems Security Officers ISSO assigned 1 4 8 2 Major Application A major application MA is an automated information system AIS that “requires special attention to security due to the risk and magnitude of harm resulting from the loss misuse or unauthorized access to or modification of the information in the application 1” Note All Federal applications require some level of protection Certain applications because of the information in them however require special management oversight and should be treated as major An MA is distinguishable from a GSS by the fact that it is a discrete application whereas a GSS may support multiple applications Each MA must be under the direct oversight of a Component CISO Information System Security Manager ISSM and must have anISSO assigned 1 4 9 Component A DHS Component is any of the entities within DHS including all DHS offices and independent agencies 1 4 10 Trust Zone A Trust Zone consists of a group of people information resources data systems and or networks subject to a shared security policy set of rules governing access to data and services For example a Trust Zone may be set up between different network segments that require specific usage policies based on information processed such as law enforcement information 1 4 11 Continuity of Operations Internal organizational efforts to ensure that a viable capability exists to continue essential functions across a wide range of potential emergencies through plans and procedures that • Delineate essential functions and supporting information systems • Specify succession to office and the emergency delegation of authority • Provide for the safekeeping of vital records and databases • Identify alternate operating facilities • Provide for interoperable communications • Validate the capability through tests training and exercises 1 OMB Circular A-130 4 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 1 4 12 Continuity of Operations Plan A plan that provides for the continuity of essential functions of an organization in the event that an emergency prevents occupancy of its primary facility It provides the organization with an operational framework for continuing its essential functions when normal operations are disrupted or otherwise cannot be conducted from its primary facility 1 4 13 Essential Functions Functions that enable Federal Executive Branch agencies to provide vital services exercise civil authority maintain the safety and well being of the general populace and sustain the industrial economic base during an emergency 1 4 14 Vital Records Electronic and hardcopy documents references records databases and information systems needed to support essential functions under the full spectrum of emergencies Categories of these types of records may include • Emergency operating records – emergency plans and directive s orders of succession delegations of authority staffing assignments selected program records needed to continue the most critical agency operations as well as related policy or procedural records • Legal and financial rights records – protect the legal and financial rights of the Government and of the individuals directly affected by its activities Examples include accounts receivable records social security records payroll records retirement records and insurance records These records were formerly defined as “rights-and-interests” records • Records used to perform national security preparedness functions and activities Executive Order E O 12656 1 4 15 Operational Data Operational data is information used in the execution of any DHS mission 1 4 16 Federal Information Security Management Act FISMA requires each agency to develop document and implement an agency-wide information security program to provide a high-level of security for the information and information systems that support the operations and assets of the agency including those provided or managed by another agency contractor or other source Statutory requirements include 1 Periodic assessments of the risk and magnitude of the harm that could result from the unauthorized access use disclosure disruption modification or destruction of information and information systems that support the operations and assets of the agency 2 Policies and procedures that a Are based on the risk assessments required by paragraph 1 above b Cost-effectively reduce information security risks to an acceptable level c Ensure that information security is addressed throughout the life cycle of each agency information system d Ensure compliance with 5 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A i Other Federal policies and procedures as may be prescribed by OMB and NIST or other agencies when appropriate ii Minimally acceptable system configuration requirements as determined by the agency iii Any other applicable requirements including standards and guidelines for national security systems issued in accordance with law and as directed by the President 3 Subordinate plans for providing adequate information security for networks facilities and systems or groups of information systems as appropriate 4 Security awareness to inform personnel including contractors others working on behalf of DHS and other users of information systems that support operations and assets of the Department of a Information security risks associated with their activities b Their responsibilities in complying with agency policies and procedures designed to reduce these risks 5 Periodic testing and evaluation of the effectiveness of information security policies procedures and practices to be performed with a frequency depending on risk but no less than annually This testing a Shall include testing of management operational and technical controls of every information system identified in the Department’s inventory b May include testing relied on by the Office of Inspector General 6 A process for planning implementing evaluating and documenting remedial actions to address any deficiencies in the information security policies procedures and practices of the Department 7 Procedures for detecting reporting and responding to security incidents consistent with standards and guidelines promulgated by the United States Computer Emergency Readiness Team US-CERT a Mitigating risks associated with incidents before substantial damage is done b Notifying and consulting with the US-CERT c Notifying and consulting with i Law enforcement agencies and relevant Offices of Inspector General ii An office designated by the President for any incident involving a national security system iii Other agency or offices as required 8 Plans and procedures to ensure continuity of operations for information systems that support the operations and assets of the Department 6 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A FISMA requires the Chief Information Officer CIO to designate a senior agency information security official who shall develop and maintain a Department-wide information security program as required by the statute Responsibilities include • Developing and maintaining information security policies procedures and control techniques to address all applicable requirements • Training and overseeing personnel with significant responsibilities for information security with respect to such responsibilities • Assisting senior Department officials concerning their responsibilities under the statute • Ensuring that the Department has trained personnel sufficient to assist the Department in complying with the requirements of this subchapter and related policies procedures standards and guidelines and • Ensuring that the Department CIO in coordination with other senior Department officials reports annually to the Department head on the effectiveness of the Department information security program including progress of remedial actions 1 4 17 Personally Identifiable Information Personally Identifiable Information PII is any information that permits the identity of an individual to be directly or indirectly inferred including any information which is linked or linkable to that individual regardless of whether the individual is a U S Citizen lawful permanent resident a visitor to the U S or employee or contractor to the Department 1 4 18 Sensitive Personally Identifiable Information Sensitive PII is PII which if lost compromised or disclosed without authorization could result in substantial harm embarrassment inconvenience or unfairness to an individual Examples of Sensitive PII include Social Security numbers alien number A-number criminal history information and medical information Sensitive PII requires stricter handling guidelines due to the sensitivity of the information 1 4 19 Privacy Sensitive System A Privacy Sensitive System is any system that collects uses disseminates or maintains PII or Sensitive PII 1 4 20 Strong Authentication Strong authentication is a layered authentication approach relying on two or more authenticators to establish the identity of an originator or receiver of information 1 4 21 Two-Factor Authentication Authentication can involve something the user knows e g a password something the user has e g a smart card or something the user “is” e g a fingerprint or voice pattern Single-factor authentication uses only one of the three forms of authentication while two-factor authentication uses any two of the three forms Three-factor authentication uses all three forms 7 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 1 5 Waivers and Exceptions 1 5 1 Waivers Components may request waivers to or exceptions from any portion of this policy for up to six 6 months any time they are unable to fully comply with policy requirements Requests are made through the Component’s ISSO for the system to the Component’s CISO ISSM and then to the DHS CISO All submitters shall coordinate with the AO prior to submission If a material weakness is reported in an audit report and the control weakness is not scheduled to be remediated within twelve 12 months the Component must submit a waiver request to the DHS CISO If the material weakness is against a financial system the Component Chief Financial Officer CFO must also approve the waiver request before sending to the DHS CISO In all cases waivers shall be requested for an appropriate period based on a reasonable remediation strategy 1 5 2 Exceptions Components may request an exception whenever they are unable to bring a system control weakness into compliance or when it requires a permanent exception to DHS policy Exceptions are generally limited to systems that are unable to comply due to detrimental impact to mission excessive costs and or clearly documented end of platform life for non-essential systems within eighteen 18 months commercial-off-the-shelf COTS products that cannot be configured to support the control requirement This request is made through the Component CISO ISSM to the DHS CISO All submitters shall coordinate with the AO prior to submission The resulting risk also must be approved and accepted by the Authorizing Official AO and by the Component CFO if the system is a financial or mixed financial system 1 5 3 Waiver or Exception Requests The Waivers and Exceptions Request Form located in Attachment B of the DHS 4300A Sensitive Systems Handbook shall be used Component ISSOs audit liaisons and others may develop the waiver or exception request but the System Owner shall submit the request through the Component’s CISO ISSM Waiver requests shall include the operational justification document mission impact risk acceptance risk mitigation measures and a POA M for bringing the system procedures or control weakness into compliance Exception requests shall include the operational justification document mission impact as well as efforts to mitigate the risk based to include descriptions of counter measures or compensating controls currently in place Any waiver or exception requests for CFO Designated Systems must be submitted to and approved by the Component’s CFO prior to the DHS CFO’s submission to the DHS CISO Any waiver or exception requests for Privacy Sensitive Systems must be submitted to and approved by the Component’s Privacy Officer or Senior Privacy Point of Contact PPOC prior to being submitted to the DHS CISO All approved waiver and exception requests must be directed through the Component’s CISO ISSM who will in turn direct it to the DHS CISO 8 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 1 5 3 a Systems without an Authorization to Operate ATO when this policy is issued shall comply with all of its policy statements or obtain appropriate waivers and or exceptions PL-1 1 5 3 b Systems with an ATO when this policy is issued shall comply with all of its policy statements within ninety 90 days or obtain appropriate waivers and or exceptions A new ATO is only required for significant changes PL-1 1 5 3 c Each waiver or exception request shall include the system name and system TrustedAgent FISMA TAF Inventory ID operational justification and risk mitigation CM-3 1 5 3 d Components shall request a waiver whenever they are temporarily unable to comply fully with any portion of this policy CA-2 1 5 3 e All waiver requests shall identify the POA M for bringing the system or program into compliance CA-5 PM-4 1 5 3 f The Component CISO ISSM shall approve all waiver requests prior to submitting them to the DHS CISO CA-6 1 5 3 g Requests submitted without sufficient information shall be returned for clarification prior to making a decision CA-6 1 5 3 h A waiver shall be issued for six 6 months or less The DHS CISO reserves the right to issue waivers for longer than six 6 months in exceptional situations Waivers may be renewed by following the same process as in the initial request CA-2 1 5 3 i The Head of the Component shall approve any waiver request that results in a total waiver time exceeding twelve 12 months before sending it to the DHS CISO The waiver shall also be reported as a material weakness in the Component’s FISMA report 1 5 3 j Components shall request an exception whenever they are permanently unable to comply fully with any portion of this policy CA-2 1 5 3 k All approved waivers shall be reported in the Component’s FISMA report CA-6 1 5 3 l The DHS CFO shall approve all requests for waivers and exceptions for financial systems prior to their submission to the DHS CISO CA-6 1 5 3 m The Component’s Privacy Officer or Senior PPOC shall approve all requests for waivers and exceptions for Privacy Sensitive Systems prior to their submission to the DHS CISO 9 v8 0 March 14 2011 --- DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 1 5 4 U S Citizen Exception Requests Special procedures apply for exception to the requirement that persons accessing DHS systems be U S Citizens Under normal circumstances only U S Citizens are allowed access to DHS systems and networks however at times there is a need to grant access to foreign nationals Access for foreign nationals is normally a long-term commitment and exceptions to appropriate policies are treated separately from standard exceptions and waivers The approval chain for an exception to the U S Citizenship requirement flows through the Component Head the Office of Security and the CIO An electronic form for requesting exceptions to the U S Citizenship requirement is published in Attachment J of the DHS 4300A Sensitive Systems Handbook Policy ID DHS Policy Statements Relevant Controls 1 5 4 a Persons of dual citizenship where one of the citizenships includes U S Citizenship shall be treated as U S Citizens for the purposes of this directive --- 1 5 4 b The System Owner shall submit each request for exception to the U S Citizenship policy to the Component Head The Component Head shall obtain concurrence from the DHS Chief Security Officer CSO and CIO prior to the approval becoming effective PS-3 1 5 4 c Additional compensating controls shall be maintained for foreign nationals based on nations lists maintained by the DHS CSO PS-3 1 6 Information Sharing and Electronic Signature The DHS Enterprise Operations Center EOC exchanges information with Component SOCs Network Operations Centers NOCs the Homeland Secure Data Network HSDN SOC the Intelligence Community and with external organizations in order to facilitate the security and operation of the DHS network This exchange enhances situational awareness and provides a common operating picture to network managers The operating picture is developed from information obtained from “raw” fault configuration management accounting performance and security data This data is monitored collected analyzed processed and reported by the NOCs and SOCs The DHS EOC is responsible for communicating other information such as incident reports notifications vulnerability alerts and operational statuses to the Component SOCs Component CISOs ISSMs or other identified Component points of contact The DHS EOC portal implements role-based user profiles that allow Components to use the website’s incident database capabilities Users assigned to Component groups shall be able to perform actions such as • Entering incident information into the DHS EOC incident database • Generating preformatted incident reports • Initiating queries of the incident database • Viewing FISMA incident reporting numbers 10 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A • Automating portions of the Information Security Vulnerability Management ISVM program • Automating portions of the vulnerability assessment program Policy ID 1 7 DHS Policy Statements Relevant Controls 1 6 a For DHS purposes electronic signatures are preferred to pen and ink or facsimile signatures in all cases except where pen and ink signatures are required by public law Executive Order or other agency requirements --- 1 6 b Components are encouraged to use electronic signatures whenever possible --- 1 6 c Components shall accept electronic signatures whenever the signature’s digital certificate is current electronically verifiable and issued by a medium or high assurance DHS Certification Authority CA or other medium or high CA under the Federal Bridge Certification Authority FBCA or Common Authority --- 1 6 d DHS and Component systems shall be able to verify PIV credentials issued by other Federal agencies Changes to Policy Procedures and guidance for implementing this policy are outlined in a companion publication DHS 4300A Sensitive Systems Handbook with attachments The handbook serves as a foundation for Components to use in developing and implementing their information security programs For interpretation or clarification of DHS information security policies found in this policy document and of the procedures and guidance found in the DHS 4300A Sensitive Systems Handbook contact the DHS CISO at infosec@dhs gov Changes to this policy and to the handbook may be requested by submitting the form included in DHS 4300A Sensitive Systems Handbook Attachment P – Document Change Requests to the respective ISSM CISO Policy ID DHS Policy Statements Relevant Controls 1 7 a The DHS CISO shall be the authority for interpretation clarification and modification of the DHS Sensitive Systems Policy Directive 4300A and the DHS 4300A Sensitive Systems Handbook inclusive of all appendices and attachments PL-1 1 7 b The DHS CISO shall update the DHS Sensitive Systems Policy Directive 4300A and the DHS 4300A Sensitive Systems Handbook at least annually PL-1 11 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 2 0 ROLES AND RESPONSIBILITIES Security is an inherently Governmental responsibility contractors others working on behalf of DHS and other sources may assist in the performance of security functions but a DHS employee must always be designated as the responsible agent for all security requirements and functions This section outlines the roles and responsibilities for implementing these requirements 2 1 Information Security Program Roles Designated personnel play a major role in the planning and implementation of information security requirements Roles directly responsible for information system security are described in the following subsections 2 1 1 DHS Senior Agency Information Security Officer Policy ID 2 1 1 a DHS Policy Statements Relevant Controls The DHS CISO shall perform the duties and responsibilities of the DHS Senior Agency Information Security Officer SAISO PL-1 PM-2 2 1 2 DHS Chief Information Security Officer The DHS CISO shall implement and manage the DHS Information Security Program to ensure compliance with applicable Federal laws Executive Orders directives policies and regulations The DHS CISO reports directly to the DHS CIO and is the principal advisor for information security matters Policy ID DHS Policy Statements 2 1 2 a The DHS CISO shall implement and manage the DHS-wide Information Security Program 2 1 2 b The DHS CISO will serve as the CIO’s primary liaison with the organization’s authorizing officials information system owners and ISSOs Relevant Controls PL-1 PM-2 --- The DHS CISO Implements and manages the Department-wide Information Security Program and ensures compliance with FISMA OMB and other Federal requirements • Issues Department-wide information security policy guidance and architecture requirements for all DHS systems and networks These policies shall incorporate NIST guidance as well as all applicable OMB memoranda and circulars • Facilitates development of subordinate plans for providing adequate information security for networks facilities and systems or groups of information systems 12 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A • Serves as the principal Departmental liaison with organizations outside the DHS for matters relating to information security • Reviews and approves the tools techniques and methodologies planned for use in certifying and accrediting DHS systems and for reporting and managing systems-level FISMA data This includes Security Assessment plans Contingency Plans and security risk assessments • Consults with the DHS CSO on matters pertaining to physical security personnel security information security investigations and Sensitive Compartmented Information SCI systems as they relate to information security and infrastructure • Develops and implements procedures for detecting reporting and responding to information security incidents • Ensures preparation and maintenance of plans and procedures to provide continuity of operations for information systems • Ensures that Department personnel contractors and others working on behalf of DHS receive appropriate information security awareness • Chairs the CISO Council This Council is comprised of all Component CISOs and is the Department’s sole coordination body for any issues associated with information security policy management and operations Component ISSMs will be invited to CISO Council meetings as required • Maintains a comprehensive inventory of all GSS and MA in use within the Department o Security management for every GSS shall be under the direct oversight of either the DHS CISO for enterprise systems or a Component CISO ISSM for Component-specific general support systems o MAs must be under the direct control of either a Component CISO or Component ISSM • Maintains a repository for all Information Assurance IA Security Authorization process documentation and modifications • Performs security reviews for all planned information systems acquisitions over $2 5 million and additional selected cases • Provides oversight of all security operations functions within the Department • Maintains classified threat assessment capability in support of security operations • Performs annual program assessments for each of the Components • Performs periodic compliance reviews for selected systems and applications • Publishes monthly compliance scorecards • Delegates specific authorities and responsibilities for maintaining a high degree of compliance to Component CISOs and ISSMs as appropriate • Reports annually to the Secretary on the effectiveness of the Department information security program including progress of remedial actions This report provides the primary basis for the Secretary’s annual FISMA report to both OMB and to the United States Congress 13 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A • Assists senior Department officials concerning their responsibilities under FISMA • Heads an office with the mission and resources to assist in ensuring Department compliance with information security requirements • Appoints a DHS employee to serve as the Headquarters CISO • Appoints a DHS employee to serve as the Office of Intelligence and Analysis I A CISO • Provide operational direction to the DHS SOC 2 1 3 Component Chief Information Security Officer The Component CISO implements and manages all aspects of the Component Information Security Program to ensure compliance with DHS policy and guidance that implement FISMA other laws and Executive Orders Policy ID DHS Policy Statements Relevant Controls 2 1 3 a Component CISOs shall develop and maintain a Component-wide information security program in accordance with the DHS security program PL-1 PM-2 2 1 3 b All Components shall be accountable to the appropriate CISO Components without a fulltime CISO shall be responsible to the HQ CISO The following Components shall have a fulltime CISO • Customs and Border Protection • Immigration and Customs Enforcement • Transportation Security Administration • United States Secret Service • United States Coast Guard • Federal Emergency Management Agency • United States Citizenship and Immigration Services • Federal Law Enforcement Training Center • Headquarters Department of Homeland Security • Intelligence and Analysis Component CISOs • Oversee the Component information security program • Ensure that the Component CIO is kept apprised of all pertinent matters involving the security of information systems 14 v8 0 March 14 2011 --- DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A • Ensure that information security-related decisions and information including updates to the 4300 series of information security publications are distributed to the ISSOs and other appropriate persons within their Component • Approve and or validate all Component information system security reporting • Consult with the Component Privacy Officer or PPOC for reporting and handling of privacy incidents • Manage information security resources including oversight and review of security requirements in funding documents • Review and approve the security of hardware and software prior to implementation into the Component SOC • Provide operational direction to the Component SOC • Periodically test the security of implemented systems • Implement and manage a POA M process for remediation by creating a POA M for each known vulnerability • Ensure that ISSOs are appointed for each information system managed at the Component level Review and approve ISSO appointments • Ensure that weekly incident reports are submitted to the DHS EOC • Acknowledge receipt of ISVM messages report compliance with requirements or notify the granting of waivers • Manage Component firewall rule sets • Ensure that Interconnection Security Agreements ISAs are maintained for all connections between systems that do not have the same security policy • Ensure execution of the DHS Logging Strategy detailed in the DHS 4300A Sensitive Systems Handbook • Ensure adherence to the DHS Secure Baseline Configuration Guides DHS 4300A Sensitive Systems Handbook Enclosure 1 • Ensure reporting of vulnerability scanning activities to the DHS EOC as detailed in Attachment O Vulnerability Management Program of DHS 4300A Sensitive Systems Handbook • Develop and maintain a Component-wide information security program in accordance with Department policies and guidance • Implement Department information security policies procedures and control techniques to address all applicable requirements • Ensure training and oversight for personnel with significant responsibilities for information security • Oversee the Security Authorization process for GSSs and MAs in use within the Component o Maintain an independent Component-wide Assessment program to ensure a consistent approach to testing of effectiveness of controls 15 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A o Ensure that an appropriate SOC performs an independent network assessment as part of the assessment process for each application that is accredited o Ensure that enterprise security tools are utilized • Exercise oversight over all Component security operations functions including the Component SOCs Ensure that eternal providers who operate information systems on behalf of the Component meet the same security requirements as the Component with an acceptable level of trust in the external service or else use compensating controls to constrain the nature of information or the process flow accept a greater degree of risk or decline the service and reduce functionality Component CISO qualifications include • Possess professional qualifications including training and experience required to administer the functions described including maintaining a Top Secret Sensitive Compartmented Information TS SCI clearance • Have information security duties as that official’s primary duty • Participate in the DHS CISO Council chaired by the DHS CISO • Head an office with the mission and resources to assist in ensuring Component compliance with this directive and to coordinate develop implement and maintain an organization-wide information security program • Serve as the Component Risk Executive 2 1 4 Component Information Systems Security Manager Components that are not required to have a fulltime CISO shall have a fulltime Information Systems Security Manager ISSM The ISSM is designated in writing by the Component CIO with the concurrence of the HQ CISO Policy ID DHS Policy Statements Relevant Controls 2 1 4 a Component ISSMs shall serve as the principal interface between the HQ CISO Component ISSOs and other security practitioners --- 2 1 4 b The Component ISSM shall work directly with the HQ CISO --- The ISSM plays a critical role in ensuring that the DHS Information Security Program is implemented and maintained throughout the Component Component ISSMs • Oversee the Component information security program • Ensure that the Component CIO and HQ CISO are kept apprised of all pertinent matters involving the security of information systems 16 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A • Ensure that information security-related decisions and information including updates to the 4300 series of information security publications are distributed to the ISSOs and other appropriate persons within their Component • Validate all Component information system security reporting • Consult with the Component Privacy Officer or PPOC for reporting and handling of privacy incidents • Manage information security resources including oversight and review of security requirements in funding documents • Periodically test the security of implemented systems • Implement and manage a POA M process for remediation by creating a POA M for each known vulnerability • Ensure that ISSOs are appointed for each information system managed at the Component level • Ensure that weekly incident reports are forwarded to the HQ CISO • Acknowledge receipt of Information Security Vulnerability Management ISVM messages report compliance with requirements or notify the granting of waivers • Ensure adherence to the DHS Secure Baseline Configuration Guides DHS 4300A Sensitive Systems Handbook Enclosure 1 • Develop and publish procedures necessary to implement the requirements of DHS information security policy within the appropriate Component • Implement Department information security policies procedures and control techniques to address all applicable requirements • Ensure training and oversight for personnel with significant responsibilities for information security • Oversee the Security Authorization process for MAs in use within the Component o Maintain an independent Component-wide ST E Program to ensure a consistent approach to testing of effectiveness of controls o Ensure that an appropriate SOC performs an independent network assessment as part of the ST E process for each application that is accredited o Ensure that enterprise security tools are utilized 2 1 5 Risk Executive A Risk Executive ensures that risks are managed consistently across the organization In keeping with its organizational structure DHS has two levels of Risk Executives – Departmental and Component The risk executive provides a holistic view of risk beyond that associated with the operation and use of individual information systems Risk Executive inputs are documented and become part of the security authorization decision All DHS Risk Executives 17 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A • Ensure that managing information system-related security risks is consistent across the organization reflects organizational risk tolerance and is performed as part of an organization-wide process that considers other organizational risks affecting mission business success • Ensure that information security considerations for individual information systems including the specific authorization decisions for those systems are viewed from an organization-wide perspective with regard to the overall strategic goals and objectives of the organization • Provide visibility into the decisions of authorizing officials and a holistic view of risk to the organization beyond the risk associated with the operation and use of individual information systems • Facilitate the sharing of security-related and risk-related information among authorizing officials and other senior leaders within the organization in order to help these officials consider all types of risks that may affect mission and business success and the overall interests of the organization at large The DHS Risk Executive develops information security policy establishes the standards for system security risk oversees risk management and monitoring and approves all waivers and exceptions to DHS policy The Component Risk Executives may establish standards for system security risk more stringent than the DHS standard They implement the system security risk management and monitoring program and submit requests for higher-risk deviations from the enterprise standard Policy ID DHS Policy Statements Relevant Controls 2 1 5 a The DHS CIO shall be the DHS Risk Executive The DHS CISO has been designated by the DHS CIO as the Risk Executive PL-1 PM-9 2 1 5 b Each Component CISO shall be the Risk Executive within his or her Component PL-1 PM-9 2 1 5 c The Risk Executive shall perform their duty in accordance with NIST SP 80037 2 1 6 Authorizing Official The Authorizing Official AO formally assumes responsibility for operating an information system at an acceptable level of risk He or she shall be a senior management official and a Federal employee or military member The Authorizing Official will also assign the Security Control Assessor for the system Policy ID 2 1 6 a DHS Policy Statements The DHS CIO shall act as the AO for enterprise information systems or shall designate one in writing 18 v8 0 March 14 2011 Relevant Controls CA-6 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 2 1 6 b The Component CIO shall act as the AO for Component information systems or shall designate one in writing CA-6 2 1 6 c Every system shall have a designated AO An AO may be responsible for more than one system CA-6 2 1 6 d The AO shall review and approve any individual requiring administrator privileges The AO may delegate this duty to the appropriate system owner or Program Manager AC-2 2 1 6 e The AO shall be responsible for acceptance of resulting risk to organizational operations and assets individuals other organizations and the Nation CA-6 2 1 6 f The AO shall periodically review security status to determine if risk remains acceptable CA-6 2 1 6 g The AO shall perform additional duties in accordance with NIST SP 800-37 CA-6 2 1 7 Security Control Assessor The Security Control Assessor is a senior management official who certifies the results of the security assessment A Certifying Official is assigned in writing to each information system by an appropriate Component official typically the Component Head or Component CIO He or she shall be a Federal employee The Security Control Assessor and the team conducting a certification must be impartial that is free from any perceived or actual conflicts of interest with respect to the developmental operational and or management chain of command associated with the information system or to the determination of security control effectiveness For systems with low impact a Security Control Assessor and or certifying team do not need to be independent so long as assessment results are carefully reviewed and analyzed by an independent team of experts to validate their completeness consistency and veracity The AO decides the required level of certifier independence based on the criticality and sensitivity of the information system and the ultimate risk to organizational operations organizational assets and individuals The AO determines if the level of certifier independence is sufficient to provide confidence that the assessment results produced are sound and can be used to make credible risk-based decisions Policy ID DHS Policy Statements Relevant Controls 2 1 7 a The Component CISO shall serve as Security Control Assessor when no other person has been officially designated CA-2 2 1 7 b A Security Control Assessor may be responsible for more than one system CA-2 19 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 2 1 7 c The Security Control Assessor may take the lead for any or all remedial actions CA-7 2 1 7d The Security Control Assessor provides an assessment of the severity of weaknesses or deficiencies in the information systems and clarifies they prepare the final security assessment report containing the results and findings from the assessment but not making a risk determination CA-7 2 1 8 Information Systems Security Officer An ISSO performs security actions for an information system There is only one ISSO designated to a system but multiple Alternate ISSOs may be designated to assist the ISSO While the ISSO performs security functions the System Owner is always responsible for information system security See DHS 4300A Sensitive Systems Handbook Attachment C – Information Systems Security Officer ISSO Designation Letter Policy ID DHS Policy Statements Relevant Controls 2 1 8 a An ISSO shall be designated for every information system and serve as the point of contact POC for all security matters related to that system PL-1 2 1 8 b An ISSO shall ensure the implementation and maintenance of security controls in accordance with the Security Plan SP and DHS policies PL-1 2 1 8 c An ISSO may be a DHS employee or a contractor PL-1 2 1 8 d An ISSO may be assigned to more than one system PL-1 2 1 8 e ISSO duties shall not be assigned as collateral duties unless approved by the Component CISO PL-1 2 1 8 f The ISSO shall have a clearance greater than or equal to the highest level of information contained on the system The minimum clearance for an ISSO shall be Secret 2 2 Other Roles Roles related to but not directly responsible for information system security are described in the following subsections 2 2 1 Secretary of Homeland Security The Secretary of Homeland Security is responsible for fulfilling the Department’s mission which includes ensuring that DHS information systems and their data are protected in 20 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A accordance with Congressional and Presidential directives The Secretary’s role with respect to information system security is to allocate adequate resources To that end the Secretary • Ensures that DHS implements its Information Security Program throughout the life cycle of each DHS system • Submits 1 the DHS CIO’s assessment of the adequacy and effectiveness of the Department’s information security procedures practices and FISMA compliance 2 the results of an annual independent information security program evaluation performed by the DHS Office of the Inspector General OIG and 3 the Senior Agency Official for Privacy’s SAOP annual assessment of the Department’s privacy policies procedures and practices to the Director of OMB • Provides information security protections commensurate with the risk and magnitude of the harm resulting from unauthorized access use disclosure disruption modification or destruction of information collected or maintained by or on behalf of the Department and on information systems used or operated by the Department or by a contractor or other organization on behalf of the Department • Ensures that an information security program is developed documented and implemented to provide security for all systems networks and data that support the Department’s operations • Ensures that information security processes are integrated with strategic and operational planning processes to secure the Department’s mission • Ensures that senior agency officials within the Department are given the necessary authority to secure the operations and assets under their control • Delegates authority to the CIO to ensure compliance with applicable information security requirements 2 2 2 Under Secretaries and Heads of DHS Components The Under Secretaries and the heads of DHS Components are responsible for oversight of the Component information security program including appointing CIOs Persons filling this role allocate adequate resources to information systems for information system security Policy ID 2 2 2 a DHS Policy Statements The Under Secretaries of Homeland Security and Heads of Components shall ensure that information systems and their data are sufficiently protected Relevant Controls PL-1 Under Secretaries and the Heads of DHS Components • Appoint CIOs • Ensure that an Information Security Program is established and managed in accordance with DHS policy and implementation directives 21 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A • Ensure that the security of information systems is an integral part of the life cycle management process for all information systems developed and maintained within their Components • Ensure that adequate funding for information security is provided for Component information systems and that adequate funding requirements are included for all information systems budgets • Ensure that information system data are entered into the appropriate DHS Security Management Tools to support DHS information security oversight and FISMA reporting requirements • Ensure that the requirements for an information security performance metrics program are implemented and the resulting data maintained and reported 2 2 3 DHS Chief Information Officer The DHS CIO is the senior agency executive responsible for all DHS information systems and their security as well as for ensuring FISMA compliance Policy ID DHS Policy Statements Relevant Controls 2 2 3 a The DHS CIO shall develop and maintain the DHS Information Security Program PL-1 2 2 3 b The DHS CIO designates the DHS CISO PL-1 The DHS CIO • Oversees the development and maintenance of a Department-wide information security program • Appoints a DHS employee in writing to serve as the DHS CISO • Serves as the AO for DHS enterprise information systems This responsibility may be delegated in writing as appropriate • Participates in developing DHS performance plans including descriptions of the time periods and budget staffing and training resources required to implement the Department-wide security program • Ensures that all information systems acquisition documents including existing contracts include appropriate information security requirements and comply with DHS information security policies • Ensures that DHS security programs integrate fully into the DHS enterprise architecture and capital planning and investment control processes • Ensures that System Owners understand and appropriately address risks including interconnectivity with other programs and systems outside their control • Reviews and evaluates the DHS Information Security Program annually 22 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A • Ensures that an information security performance metrics program is developed implemented and funded • Reports to the DHS Under Secretary for Management on matters relating to the security of DHS systems • Ensures compliance with applicable information security requirements • Heads an office with the mission and resources to assist in ensuring Component compliance with the DHS Information Security Program • Coordinates and advocates resources for enterprise security solutions • Leads the DHS Contingency Planning program 2 2 4 Component Chief Information Officer The Component CIO is responsible for Component information systems and their security as well as for ensuring FISMA compliance within the Component Policy ID 2 2 4 a DHS Policy Statements Relevant Controls The Component CIO shall develop and maintain the Component Information Security Program PL-1 PM-1 Component CIOs • Establish and oversee their Component information security programs • Ensure that an AO has been appointed for all Component information systems and serve as the AO for any information system where an AO has not been appointed or where a vacancy exists • Ensure that information security concerns are addressed by Component Configuration Control Boards Enterprise Architecture Board EAB and Acquisition Review Board ARB Investment Review Board IRB • Ensure that an accurate information systems inventory is established and maintained • Ensure that all information systems acquisition documents including existing contracts include appropriate information security requirements and comply with DHS information security policies • Ensure that System Owners understand and appropriately address risks including interconnectivity with other programs and systems outside their control • Ensure that an information security performance metrics program is developed implemented and funded • Advise the DHS CIO of any issues regarding infrastructure protection vulnerabilities or issues that may cause public concern or loss of credibility • Ensure that incidents are reported to the DHS EOC within reporting time requirements as defined in Attachment F Incident Response of the DHS Sensitive Systems Handbook 23 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A • Work with the DHS CIO and Public Affairs Office in preparation for public release of security incident information The DHS CIO or designated representative has sole responsibility for public release of security incident information • Ensure compliance with DHS information systems security policy • Coordinate and advocate resources for information security enterprise solutions The following Component CIOs shall appoint a CISO and ensure that the CISO has resources to assist with Component compliance with policy CISOs shall be DHS employees • Customs and Border Protection • Immigration and Customs Enforcement • Transportation Security Administration • United States Secret Service • United States Coast Guard • Federal Emergency Management Agency • United States Citizenship and Immigration Services • Federal Law Enforcement Training Center All other Component CIOs • Ensure that Component ISSMs have been appointed and provide the resources and qualified personnel to ensure Component compliance with DHS security policy 2 2 5 DHS Chief Security Officer The DHS Chief Security Officer CSO implements and manages the DHS Security Program for DHS facilities and personnel The CSO is a senior agency official who reports directly to the Deputy Secretary on all matters pertaining to facility and personnel security within the DHS Policy ID DHS Policy Statements Relevant Controls 2 2 5 a DHS information systems that control physical access shall be approved to operate in accordance with this policy document whether they connect to other DHS information systems or not CA-1 2 2 5 b The DHS CSO shall be the AO for all systems automating or supporting physical access controls or shall appoint an AO for each of those systems CA-6 2 2 6 DHS Chief Privacy Officer The DHS Chief Privacy Officer is the head of the DHS Privacy Office and oversees privacy activities throughout DHS including creating and ensuring compliance with privacy policy The DHS Chief Privacy Officer assists the Component Privacy Officers and Privacy Points of Contact PPOC with privacy policy compliance at the Component level 24 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A The DHS Chief Privacy Officer implements and manages the DHS Privacy Program including creating DHS privacy policy and ensuring compliance with privacy policy The DHS Chief Privacy Officer is responsible for DHS privacy policy and its compliance The DHS Chief Privacy Officer assists the Component Privacy Officers and PPOC with policy compliance at the Component level Policy ID 2 2 6 a DHS Policy Statements Relevant Controls The Chief Privacy Officer shall review program and system Privacy Threshold Analyses PTA Privacy Impact Assessments PIA and System of Records Notices SORN providing approval as appropriate PL-1 PL-5 The Chief Privacy Officer as the senior official • Oversees privacy incident management • Responds to suspected or confirmed privacy incidents or incidents involving PII • Coordinates with the DHS CIO DHS CISO the DHS EOC and senior management regarding privacy incidents • Convenes and chairs incident response teams such as the Privacy Incident Response Team PIRT and the Core Management Group CMG • Approves program and system PTAs PIAs and SORNs • Designates Privacy Sensitive Systems based on validated PTAs Privacy Sensitive Systems are those that maintain PII • Provides Department-wide annual and refresher privacy training 2 2 7 DHS Chief Financial Officer The DHS CFO implements and manages the DHS Financial Program including oversight of DHS financial systems The DHS CFO designates financial systems and oversees security control definitions for financial systems Policy ID DHS Policy Statements Relevant Controls 2 2 7 a The DHS CFO shall be the AO for all financial systems managed at the DHS level CA-6 2 2 7 b The Component CFO shall be the AO for all financial systems managed by the Component CA-6 2 2 7 c The DHS CFO shall designate the financial systems that fall under the DHS CFO mandated policy statements CA-6 25 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID 2 2 7 d DHS Policy Statements The DHS CFO shall publish a comprehensive list of designated financial systems during the fourth quarter of every fiscal year This list shall be referred to as the CFO Designated Systems List Relevant Controls CA-6 All systems on the CFO Designated Systems List are required to conform with the policies defined in Sections 3 5 1 and 3 15 2 2 8 Program Managers Program Managers ensure compliance with applicable Federal laws and DHS policy directives governing the security operation maintenance and privacy protection of information systems information projects and programs under their control Program Managers are responsible for program-level POA Ms that may impact one or more systems Policy ID DHS Policy Statements Relevant Controls 2 2 8 a Program Managers shall ensure that program POA Ms are prepared and maintained CA-5 PM-4 2 2 8 b Program Managers shall prioritize security weaknesses for mitigation CA-5 2 2 8 c Program Managers shall provide copies of program POA Ms to affected System Owners CA-5 PM-4 2 2 8 d Program Managers shall ensure that POA Ms address the following known vulnerabilities in the information system the security categorization of the information system the specific weaknesses or deficiencies in the information system security controls the importance of the identified security control weakness or deficiencies the Component’s proposed risk mitigation approach to address the identified weaknesses or deficiencies in the security controls CA-5 the Component’s rationale for accepting certain weaknesses or deficiencies in the security controls 2 2 9 System Owners System Owners use information technology to help achieve the mission needs within their program area of responsibility They are responsible for the successful operation of the information systems and programs within their program area and are ultimately accountable for their security All systems require a System Owner designated in writing for proper administration of security 26 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 2 2 9 a System Owners shall ensure that each of their systems is deployed and operated in accordance with this policy document PL-1 2 2 9 b System Owners shall ensure that an ISSO is designated in writing for each information system under their purview PL-1 2 2 9 c There shall be only one System Owner designated for each DHS system PL-1 2 2 9 d The Information System Owner shall information security compliance development and maintenance of security plans user security training notifying officials of the need for security authorization and need to resource CA-2 2 2 9 e System Owners shall ensure development of a POA M to address weaknesses and deficiencies in the information system and its environment of operation which remain after Security Authorization CA-2 2 2 10 Common Control Provider The Common Control Provider is an organizational official responsible for the planning development implementation assessment authorization and maintenance of common controls 2 2 10 a The Common Control Provider shall document all common controls and PM-1 submit them to the AO and DHS CISO 2 2 10 b The Common Control Provider ensures that required assessments of common controls are carried out by qualified assessors with the appropriate level of independence PM-1 2 2 10 c The Common Control Provider documents assessment findings in a security assessment report PM-1 2 2 10 d The Common Control Provider ensures that POA Ms are developed for PM-4 all controls having weaknesses or deficiencies 2 2 10 e The Common Control Provider shall make available security plans Security Assessment Reports SARs and POA Ms for common controls to information system owners inheriting those controls after the information is reviewed and approved by a senior official 27 v8 0 March 14 2011 PM-1 PM-4 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 2 2 11 DHS Employees Contractors and Others Working on Behalf of DHS DHS employees contractors and others working on behalf of the DHS or its agencies shall follow the appropriate set s of rules of behavior Policy ID 2 2 11 a DHS Policy Statements DHS users shall follow prescribed rules of behavior 28 v8 0 March 14 2011 Relevant Controls PL-4 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 3 0 MANAGEMENT POLICIES 3 1 Basic Requirements Basic security management principles must be followed in order to ensure the security of DHS information resources These principles are applicable throughout the Department and form the cornerstone of the DHS Information Security Program Component CISOs ISSMs shall submit all security reports concerning DHS systems to the Component senior official or designated representative Component CISOs ISSMs shall interpret and manage DHS security policies and procedures to meet Federal Departmental and Component requirements They shall also answer data queries from the DHS CISO and develop and manage information security guidance and procedures unique to Component requirements ISSOs are the primary points of contact for the information systems assigned to them They develop and maintain Security Plans SP and are responsible for overall system security Policy ID DHS Policy Statements Relevant Controls 3 1 a Every DHS computing resource e g desktops laptops servers portable electronic devices shall be individually accounted for as part of a recognized information system CM-8 3 1 b The Component CIO in cooperation with each Component senior official shall be responsible for ensuring that every DHS computing resource is identified as an information system or as a part of an information system major application or general support system CM-8 3 1 c The System Owner or designee shall develop and maintain an SP for each information system Component AOs shall review and approve SPs PL-2 3 1 d An ISSO shall be designated for every information system and serve as the point of contact POC for all security matters related to that system PL-1 3 1 e Component Information Security Programs shall be structured to support DHS and applicable FISMA OMB and other Federal requirements PL-1 3 1 f Information security reports regarding DHS systems shall be submitted to the Component senior official or designated representative --- 3 1 g Component CISOs ISSMs shall ensure that their information systems comply with the DHS Enterprise Architecture EA Technical Reference model TRM and Security Architecture SA or maintain a waiver approved by the DHS CIO CISO 3 1 h The DHS CISO shall issue Department-wide information security policy guidance and architecture requirements for all DHS systems CM-2 CM-6 Component CISOs shall implement DHS information security policies procedures and control techniques to address all applicable requirements PL-1 3 1 i 29 v8 0 March 14 2011 PL-1 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID 3 1 j 3 2 DHS Policy Statements Component CISOs shall develop and manage information security guidance and procedures unique to Component requirements Relevant Controls PL-1 Capital Planning and Investment Control Information security is a business driver and any risks found through security testing are ultimately business risks Information security personnel should be involved to the maximum extent possible in all aspects of the acquisition process including drafting contracts and procurement documents Directive 102-01 Acquisition Management Directive and MD 4200 1 IT Capital Planning and Investment Control CPIC and Portfolio Management provide additional information on these requirements Policy ID DHS Policy Statements Relevant Controls 3 2 a System Owners shall include information security requirements in their CPIC business cases for the current budget year and for the Future Years Homeland Security Program FYHSP for each DHS system PM-3 PM-11 SA-1 3 2 b System Owners or AOs shall ensure that information security requirements and POA Ms are adequately funded resourced and documented in accordance with current OMB budgetary guidance PM-3 PM-4 SA-2 3 2 c Component IRBs ARBs shall not approve any capital investment in which the information security requirements are not adequately defined and funded PM-3 SA-2 3 2 d The DHS CISO shall perform security reviews for planned information system acquisitions over $2 5 million and additional selected cases SA-1 3 2 e Components shall ensure that information security requirements as described within this policy document are included in the acquisition of all DHS systems and services used to input process store display or transmit sensitive information SA-4 3 2 f Procurement authorities throughout the Department shall ensure that Homeland Security Acquisition Regulation HSAR provisions are fully enforced SA-1 SA-4 3 2 g Procurements for services and products involving facility or system access control shall be in accordance with the DHS guidance regarding HSPD-12 implementation 30 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 3 3 Contractors and Outsourced Operations Policy ID 3 4 DHS Policy Statements Relevant Controls 3 3 a All statements of work and contract vehicles shall identify and document the specific security requirements for information system services and operations required of the contractor SA-4 3 3 b Contractor information system services and operations shall adhere to all applicable DHS information security policies SA-9 3 3 c Requirements shall address how sensitive information is to be handled and protected at contractor sites including any information stored processed or transmitted using contractor information systems Requirements shall also include requirements for personnel background investigations and clearances and facility security SA-9 3 3 d Statements of work and contracts shall include a provision stating that upon the end of the contract the contractor shall return all information and information resources provided during the life of the contract and certify that all DHS information has been purged from any contractor-owned system used to process DHS information SA-4 3 3 e Components shall conduct reviews to ensure that the information security requirements are included within the contract language and are implemented and enforced SA-1 3 3 f Security deficiencies in any outsourced operation shall require creation of a program-level POA M SA-9 PM-4 Performance Measures and Metrics Policy ID DHS Policy Statements Relevant Controls 3 4 a The DHS CISO shall define performance measures to evaluate the effectiveness of the DHS information security program --- 3 4 b Components shall provide OMB FISMA data at least monthly to the DHS Compliance Officer --- 3 4 c The DHS CISO shall report annually to the Secretary on the effectiveness of the DHS information security program including the progress of remedial actions --- 3 4 d Components shall utilize the automated tool directed for use by the DHS CISO for Performance Plan reporting --- 31 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID 3 4 e 3 5 DHS Policy Statements The DHS CISO shall collect OMB FISMA data from Components at least quarterly and provide FISMA reports to OMB Relevant Controls --- Continuity Planning for Critical DHS Assets The Continuity Planning for Critical DHS Assets Program is vital to the success of the DHS Information Security Program The Business Impact Assessment BIA which is part of the Contingency is essential in the identification of critical DHS assets Once critical systems are identified continuity planning shall address the following two complementary but different elements • Continuity of Operations Planning COOP • Contingency Planning CP 3 5 1 Continuity of Operations Planning Policy ID DHS Policy Statements Relevant Controls 3 5 1 a When available a DHS-wide process for continuity planning shall be used in order to ensure continuity of operations under all circumstances CP-2 3 5 1 b Components shall develop test implement and maintain comprehensive Continuity of Operations Plans COOP to ensure the continuity and recovery of essential DHS functionality CP-2 CP-4 3 5 1 c All CISOs ISSMs shall ensure that all COOPs under their purview are tested and exercised annually CP-4 3 5 1 d All CFO Designated Systems requiring high availability shall be identified in COOP plans and exercises CP-1 3 5 1 e All personnel involved in COOP efforts shall be identified and trained in the procedures and logistics of COOP development and implementation AT-3 CP-3 3 5 1 f To ensure that accounts can be created in the absence of the usual account approval authority systems that are part of the Critical DHS Assets Program shall have provisions to allow a Component CISO ISSM or Component CIO to approve new user accounts as part of a COOP scenario AC-2 3 5 1 g Each Component shall compile and maintain a list of mission-critical information systems in support of COOP CM-8 CP-1 3 5 1 h The DHS and Component CISOs ISSMs shall ensure preparation and maintenance of plans and procedures to provide continuity of operations for information systems 32 v8 0 March 14 2011 CP-1 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID 3 5 1 i DHS Policy Statements DHS information systems that are part of the DHS Continuity Planning for Critical DHS Assets Program shall be provided requirements for system-level contingency planning by a Component Contingency Planning Program Office or by a DHS Contingency Planning Program Office Relevant Controls --- 3 5 2 Contingency Planning Policy ID DHS Policy Statements Relevant Controls 3 5 2 a The DHS CIO shall provide guidance direction and authority for a standard DHS-wide process for contingency planning for all DHS Components CP-1 3 5 2 b System Owners shall develop and document information system Contingency Plans CPs for their programs manage plan changes and distribute copies of the plan to key contingency personnel Component CIOs shall review and approve Component-level information system CPs CP-1 CP-2 3 5 2 c Components shall ensure implementation of backup policy and procedures for every Component information system CP-9 3 5 2 d The DHS CIO shall ensure that each system has contingency capabilities commensurate with the availability security objective The minimum contingency capabilities for each impact level follow High – System functions and information have a high priority for recovery after a short period of loss Moderate – System functions and information have a moderate priority for recovery after a moderate period of loss Low – System functions and information have a low priority for recovery after prolonged loss CP-1 3 5 2 e CPs shall be developed and maintained by all DHS Components in accordance with the requirements for the FIPS 199 potential impact level for the availability security objective These plans shall be based on three essential phases Activation Notification Recovery and Reconstitution Components shall review the CP for the information system at least annually and revise the plan to address system organizational changes or problems encountered during plan implementation execution or testing CP-1 CP-2 3 5 2 f The DHS CIO shall ensure that CP testing is performed in accordance with the availability security objective The minimum contingency testing for each impact level follows High – System recovery roles responsibilities procedures and logistics in the CP shall be used to recover from a simulated contingency event at the alternate processing site within a year prior to accreditation The system recovery procedures in the CP shall be used to simulate system recovery in a test facility at least annually CP-4 CP-7 33 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls Moderate – The CP shall be tested at least annually by reviewing and coordinating with organizational elements responsible for plans within the CP This is achieved by performing a walk-through tabletop exercise Low – CP contact information shall be verified at least annually 3 5 2 g The DHS CIO shall ensure that contingency training is performed in accordance with the availability security objective The minimum contingency planning for each impact level follows High – All personnel involved in contingency planning efforts shall be identified and trained in their contingency planning and implementation roles responsibilities procedures and logistics This training shall incorporate simulated events Refresher training shall be provided at least annually Moderate – All system personnel involved in contingency planning efforts shall be trained Refresher training shall be provided at least annually Low – There is no training requirement CP-3 3 5 2 h Components shall coordinate as appropriate CP testing and or exercises with COOP related plans for systems with moderate and high availability FIPS-199 categorization CP-4 3 6 System Engineering Life Cycle Directive 102-01 Acquisition Management Directive Appendix B contains the DHS Systems Engineering Life Cycle SELC Policy ID 3 7 DHS Policy Statements Relevant Controls 3 6 a Components shall ensure that system security is integrated into all phases of the Systems Engineering Life Cycle SELC SA-3 3 6 b Components shall ensure that security requirements for sensitive information systems are incorporated into life-cycle documentation SA-3 3 6 c The Program Manager shall review approve and sign all custom-developed code prior to deployment into production environments The Program Manager may delegate this authority to another DHS employee in writing This authority shall not be delegated to contractor personnel RA-5 Configuration Management Configuration management CM relates to managing the configuration of all hardware and software elements within information systems and networks CM within DHS consists of a multilayered structure – policy procedures processes and compliance monitoring Each Component shall utilize appropriate levels of configuration management CM applies to all systems subsystems and components of the DHS infrastructure thereby ensuing implementation and continuing life-cycle maintenance CM begins with baselining of 34 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A requirements documentation and ends with decommissioning of items no longer used for production or support The CM discipline applies to hardware including power systems software firmware documentation test and support equipment and spares A Change Management Process ensures that documentation associated with an approved change to a DHS system is updated to reflect the appropriate baseline including an analysis of any potential security implications The initial configuration must be documented in detail and all subsequent changes must be controlled through a complete and robust CM process Configuration management has security implications in three areas • Ensuring that the configuration of subordinate information system elements are consistent with the Security Authorization Process requirements of the parent system • Ensuring that any subsequent changes including an analysis of any potential security implications are approved • Ensuring that all recommended and approved security patches are properly installed DHS Sensitive Systems Handbook Enclosure 1 includes the DHS Secure Baseline Configuration Guides Policy ID DHS Policy Statements Relevant Controls 3 7 a Components shall develop and maintain a configuration management plan CMP for each information system as part of its SP All DHS systems shall be under the oversight of a Configuration Management responsible officer CM-1 CM-9 3 7 b Components shall establish implement and enforce configuration management controls on all information systems and networks and address significant deficiencies as part of a POA M CA-5 CM-3 PM-4 3 7 c Information security patches shall be installed in accordance with configuration management plans and within the timeframe or direction stated within the Information Security Vulnerability Management ISVM message published by the DHS EOC SI-2 3 7 d System Owners shall document the initial system configuration in detail and control all subsequent changes in accordance with the configuration management process CM-2 CM-3 CM-9 3 7 e Workstations shall be configured in accordance with DHS guidance on the U S Government Configuration Baseline USGCB formerly known as the Federal Desktop Core Configuration FDCC Configuration shall include installation of the DHS Common Policy Object identifier OID Common Policy Framework Root CA certificate and the DHS Principal CA certificate CM-2 CM-6 CM-9 3 7 f Components shall monitor USGCB or DHS-approved USGCB variant compliance using a NIST-validated Security Content Automation Protocol SCAP tool 35 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID 3 8 DHS Policy Statements Relevant Controls 3 7 g The System Owner shall request an exception for information systems that use operating systems or applications that are not hardened or do not follow configuration guidance identified in DHS Sensitive Systems Handbook Enclosure 1 DHS Secure Baseline Configuration Guides Requests shall include a proposed alternative secure configuration CM-2 CM-6 3 7 h Components shall ensure that CM processes under their purview include and consider the results of a security impact analysis when considering proposed changes CM-4 Risk Management Risk management is a process that allows System Owners to balance the operational and economic costs of protective measures to achieve gains in mission capability by protecting the information systems and data that support their organization’s missions Policy ID 3 9 DHS Policy Statements Relevant Controls 3 8 a Components shall establish a risk management program in accordance with NIST SP 800-30 Risk Management Guide for Information Technology Systems and other applicable Federal guidelines RA-1 3 8 b Component CISOs ISSMs shall ensure that a risk assessment is conducted whenever high impact weaknesses are identified or every three 3 years or whenever modifications are made to sensitive information systems or to their physical environments interfaces or user community The risk assessment shall consider the effects of the modifications on the operational risk profile of the information system SPs shall be updated and re-certification conducted if warranted by the results of the risk assessment RA-3 3 8 c Component CISOs ISSMs shall establish an independent Component-wide Security Authorization program to ensure a consistent approach to testing the effectiveness of controls RA-1 3 8 d Risk Executives shall review recommendations for risk determinations and risk acceptability and may recommend changes to the AO and appropriate CIO RA-3 3 8 e Component SOCs shall deploy a Component-wide network scanning program RA-5 3 8 f Special rules apply to CFO Designated Systems See Section 3 15 for additional information Security Authoziation and Security Assessments DHS periodically assesses the selection of security controls to determine their continued effectiveness in providing an appropriate level of protection 36 v8 0 March 14 2011 --- DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A The DHS Security Authorization Process Guide describes detailed processes governing Security Authorization Process and system risk assessment Detailed information for creating and managing POA Ms is published in DHS 4300A Sensitive Systems Handbook Attachment H – Plan of Action and Milestones POA M Process Guide Policy ID DHS Policy Statements Relevant Controls PM-10 RA-2 3 9 a Components shall assign an impact level high moderate low to each security objective confidentiality integrity and availability for each DHS information system Components shall apply NIST SP 800-53 controls as tailored in the DHS 4300A Sensitive Systems Handbook Attachment M specific to the security objective at the determined impact level 3 9 b Components shall implement NIST SP 800-53 security controls using the FIPS Pub 200 Minimum Security Requirements for Federal Information and Information Systems methodology based on the FIPS 199 impact level established for each separate security objective confidentiality integrity availability --- 3 9 c Recommend that Components pursue type Security Authorization Process for information resources that are under the same direct management control have the same function or mission objective operating characteristics security needs and that reside in the same general operating environment or in the case of a distributed system reside in various locations with similar operating environments Type Security Authorization Process shall consist of a master Security Authorization Process package describing the common controls implemented across sites and site-specific controls and unique requirements that have been implemented at the individual sites --- 3 9 d The AO for a system shall be identified in TrustedAgent FISMA The Component CIO shall serve as the AO whenever the System Owner or an appropriate program official has not been named as the AO --- 3 9 e Component CISOs shall ensure that all information systems are formally assessed through a comprehensive evaluation of their management operational and technical security controls CA-2 PM-10 3 9 f The assessment made as part of and in support of the accreditation process shall determine the extent to which a particular design and implementation plan meets the DHS required set of security controls PM-10 3 9 g Component CISOs ISSMs shall ensure that a risk assessment is conducted whenever any modifications are made to sensitive information systems networks or to their physical environments interfaces or user community SPs shall be updated and re-authorized conducted if warranted PM-9 RA-3 37 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 3 9 h Components shall accredit systems at initial operating capability and every three 3 years thereafter or whenever a major change occurs whichever occurs first An ATO of six 6 months or less shall receive an ATO accreditation period waiver from the DHS CISO before submission to the AO for a final accreditation decision CA-6 PM-10 3 9 i AOs may grant an Interim Authorization to Operate IATO for systems that are undergoing development testing or are in a prototype phase of development A system shall be assessed and authorized in an ATO letter prior to passing the Key Decision Point 3 milestone in the SELC IATOs shall not be used for operational systems The AO may grant an IATO for a maximum period of 6 six months and may grant 1 one 6 six month extension Systems under an IATO shall not process sensitive information but may attach to system networks for testing PL-1 PM-10 3 9 j If the system is not fully accredited and has not received a full ATO by the end of the second and final IATO the system shall not be deployed as an operational system PL-1 PM-10 3 9 k As a result of Office of Inspector General OIG auditing experience Components shall request concurrence from the DHS CISO for all accreditations for 6 six months or less 3 9 l The DHS CISO shall specify tools techniques and methodologies used to certify and accredit DHS information systems report and manage FISMA data and document and maintain POA Ms CA-1 PM-4 3 9 m Currently all DHS systems shall be accredited using the automated tools TAF and RMS which have been approved by the DHS CISO CA-1 CA-2 PM-10 3 9 n The DHS CISO shall maintain a repository for all Security Authorization Process documentation and modifications CA-1 3 9 o Component CISOs shall establish processes to ensure consistent Security Authorization Process processing across all Component systems CA-1 PM-10 3 9 p System Owners shall use the POA M process to manage vulnerabilities correct deficiencies in security controls and remediate weaknesses in SPs CA-5 PM-4 3 9 q The AO shall formally assume responsibility for operating an information system at an acceptable level of risk System operation with sensitive information is prohibited without an ATO CA-6 PM-10 3 9 r ATOs shall only be provided for systems that fully comply with policy or have been granted appropriate exceptions or waivers CA-6 PM-10 38 v8 0 March 14 2011 --- DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 3 9 s Artifacts in support of new ATOs shall not be older than 13 months Older artifacts remain valid during the life of a current ATO 3 9 t The DHS CIO may revoke any ATO of any DHS information system CA-6 3 9 u The Component CIO may revoke the ATO of any Component-level information system CA-6 3 9 v Components shall assign a common control provider to share controls between systems e g at hosting centers The authorization package of those common controls must be shared with those operating under them 3 10 --- Information Security Review and Assistance Policy ID DHS Policy Statements Relevant Controls 3 10 a Components shall submit their information security policies to the DHS CISO for review PL-1 3 10 b Components shall establish an information system security review and assistance program within their respective security organization in order to provide System Owners with expert review of programs assist in identifying deficiencies and provide recommendations for bringing systems into compliance CA-7 PL-1 PM-10 3 10 c Components shall conduct their reviews in accordance with FIPS 200 NIST SP 800-53 for specification of security controls NIST SP 800-53A shall be used for assessing the effectiveness of security controls and for quarterly and annual FISMA reporting CA-7 PL-1 3 10 d The DHS CISO shall conduct information security review and assistance visits across the Department in order to monitor the effectiveness of Component security programs CA-2 3 11 Security Working Groups and Forums Working groups and other forums representing various functional areas convene on a regular basis 3 11 1 CISO Council The CISO Council is the management team responsible for developing and implementing the DHS Information Security Program The Council is responsible for implementing a security program that meets DHS mission requirements and reviewing specific topic areas assigned by the DHS CIO or the DHS CISO 39 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A The CISO Council is also responsible for establishing and implementing significant security responsibilities promoting communications between security programs implementing information systems security acquisition requirements and developing security best practices within all enterprise and Component information security programs Policy ID DHS Policy Statements Relevant Controls 3 11 1 a Component CISOs shall actively participate in the CISO Council PL-1 PM-11 3 11 1 b Members shall ensure that the DHS CISO is kept apprised of all pertinent matters involving the security of information systems PL-1 PM-11 3 11 1 c Members shall ensure that security-related decisions and information including updates to the 4300 series of security publications are distributed to the ISSOs and other appropriate persons PL-1 PM-11 Note Periodically the CISO Council shall be convened to include Component ISSMs 3 11 2 DHS Information Security Training Working Group The DHS Information Security Training Working Group is established to promote collaboration on information security training efforts throughout the Department and to share information on Component-developed training activities methods and tools thereby reducing costs and avoiding duplication of effort The Information Security Training Working Group is chaired by the DHS Program Director for Information Security Training Policy ID DHS Policy Statements Relevant Controls 3 11 2 a Components shall appoint a representative to the DHS Information Security Training Working Group --- 3 11 2 b Members shall actively participate in the DHS Information Security Training Working Group --- 3 11 2 c Components shall abide by the security training requirements listed in the Information Security Awareness Training and Education section of this policy --- 3 12 Information Security Policy Violation and Disciplinary Action Individual accountability is a cornerstone of an effective security policy Component Heads are responsible for taking corrective actions whenever security incidents and violations occur and for holding personnel accountable for intentional transgressions Each Component must determine how to best address each individual case 40 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 3 12 a Information security-related violations are addressed in the Standards of Ethical Conduct for Employees of the Executive Branch and DHS employees may be subject to disciplinary action for failure to comply with DHS security policy whether or not the failure results in criminal prosecution PS-8 3 12 b Non-DHS Federal employees contractors or others working on behalf of DHS who fail to comply with Department security policies are subject to having their access to DHS systems and facilities terminated whether or not the failure results in criminal prosecution PS-8 3 12 c Any person who improperly discloses sensitive information is subject to criminal and civil penalties and sanctions PS-8 3 13 Required Reporting FISMA requires that the status of the DHS Information Security Program be reported to the OMB on a recurring basis Policy ID DHS Policy Statements Relevant Controls 3 13 a Components shall collect and submit quarterly and annual information security program status data as required by FISMA CA-2 3 13 b Components shall utilize the automated tool approved for use by the DHS CISO CA-2 3 14 Privacy and Data Security The DHS Privacy Office is responsible for privacy compliance across the Department including assuring that technologies used by the Department sustain and do not erode privacy protections relating to the use of personal and Department information The DHS Chief Privacy Officer has exclusive jurisdiction over the development of policy relating to personally identifiable information PII Questions concerning privacy-related policy should be directed to the Component Privacy Office or PPOC If the Component does not have a Privacy Office or PPOC then please contact the DHS Privacy Office privacy@dhs gov 703-235-0780 or refer to the DHS Chief Privacy Officer web page for additional information 3 14 1 Personally Identifiable Information Various regulations place restrictions on the Government’s collection use maintenance and release of information about individuals Regulations require agencies to protect PII which is any information that permits the identity of an individual to be directly or indirectly inferred including any information which is linked or linkable to that individual regardless of whether or not the individual is a U S citizen lawful permanent resident visitor to the U S or employee or contractor to the Department 41 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Sensitive PII is PII which if lost compromised or disclosed without authorization could result in substantial harm embarrassment inconvenience or unfairness to an individual Examples of Sensitive PII include Social Security numbers alien numbers A-number medical information and criminal history The sensitivity of this data requires that stricter handling guidelines be applied For more information on handling Sensitive PII see Handbook for Safeguarding Sensitive Personally Identifiable Information at the Department of Homeland Security Additional PII and Sensitive PII-related policies are included in the following sections of the DHS 4300A Sensitive Systems Handbook • Section 3 9 Security Authorization Process and Security Assessments – For Privacy Sensitive Systems the confidentiality security objective shall be assigned an impact level of at least moderate • Section 4 8 2 Laptop Computers and Other Mobile Computing Devices – All information stored on any laptop computer or other mobile computing device is to be encrypted using mechanisms that comply with Section 5 5 Encryption of this policy • Section 5 2 2 Automatic Session Termination – Sessions on workstations and on laptop computers and other mobile computing devices are to be terminated after twenty 20 minutes of inactivity • Section 5 3 Auditing – DHS defines computer-readable data extracts as data removed from any accredited system where the process is not covered by the SP and computer-readable data extracts are stored on hard drives including desk top and laptop computers floppy disks compact discs CDs digital video disks DVDs USB drives memory cards and any other media that may be read or copied electronically • Section 5 4 1 Remote Access and Dial-in – Remote access of PII must be approved by the AO Strong authentication via virtual private network VPN or equivalent encryption e g https and two-factor authentication is required DHS has an immediate goal that remote access should only be allowed with two-factor authentication where one of the factors is provided by a device separate from the computer gaining access Restrictions are placed on the downloading and remote storage of PII accessed remotely as noted below in the DHS Policy The DHS Privacy Office works with Component Privacy Officers PPOCs Program Managers System Owners and information systems security personnel to ensure that sound privacy practices and controls are integrated into the Department’s operations The DHS Privacy Office implements three types of documents for managing privacy practices and controls for information systems • A PTA provides a high level description of an information system including the information it contains and how it is used The PTA is used to determine and document whether or not a PIA and or SORN are required • A PIA is a publicly released assessment of the privacy impact of an information system and includes an analysis of the PII that is collected stored and shared • A SORN describes the categories of records within a system of records and describes the routine uses of the data and how individuals can gain access to records and correct errors 42 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A To promote privacy compliance within the Department the Office has published official Department guidance regarding the requirements and content for PTAs PIAs and SORNs Privacy Compliance Guidance can be found on the DHS Privacy Office website at www dhs gov privacy 3 14 2 Privacy Threshold Analyses The PTA provides a high-level description of the system including the information it contains and how it is used PTAs are required whenever a new information system is being developed or an existing system is significantly modified System Owners and Program Managers are responsible for writing the PTA as part of the system development lifecycle process The Component Privacy Officer or PPOC reviews the PTA and forwards it to the DHS Privacy Office who determines whether a PIA and or SORN are required PTA artifacts expire after three 3 years DHS MD 0470 2 defines the PTA requirements Policy ID DHS Policy Statements Relevant Controls PL-5 3 14 2 a A PTA shall be conducted as part of new information system development or whenever an existing system is significantly modified PTA artifacts expire after three 3 years and a new PTA must be submitted 3 14 2 b A PTA shall be conducted whenever an information system undergoes security authorization --- 3 14 2 c The DHS Chief Privacy Officer shall evaluate the PTA and determine if it is a Privacy Sensitive System and if the system requires a PIA and SORN PL-5 3 14 2 d Information systems shall not be designated operational until the DHS Privacy Office approves the PTA PL-5 3 14 2 e For Privacy Sensitive Systems the confidentiality security objective shall be assigned an impact level of moderate or higher RA-2 3 14 3 Privacy Impact Assessments A PIA is a publicly released assessment of the privacy impact of an information system and includes an analysis of the PII that is collected stored and shared PIAs are required as determined by the PTA whenever a new information system is being developed or an existing system is significantly modified PIAs are the responsibility of the System Owner and the Program Manager as part of the SELC process OMB Memorandum M-03-22 DHS MD 0470 1 and the Official DHS Privacy Impact Assessment Guidance discuss the requirements for conducting PIAs at DHS 43 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 3 14 3 a PIAs are required as determined by the PTA as part of new information system development or whenever an existing system is significantly modified PL-5 3 14 3 b Information systems that the DHS Privacy Office has determined require a PIA as determined by the PTA shall not be designated operational until the DHS Privacy Office approves the PIA for that system PL-5 3 14 4 System of Records Notices The Privacy Act of 1974 requires a SORN when PII is maintained by a Federal agency in a system of records and the PII is retrieved by a personal identifier A system of records is “a group of any records under the control of any agency from which information is retrieved by the name of the individual or by some identifying number symbol or other identifying particular assigned to the individual” 5 U S C §552a a 5 The SORN describes the categories of records and individuals in the system of record the routine uses of the data how individuals can gain access to records pertaining to them and correct errors The term “system of records” is not synonymous with an information system and can include paper as well as electronic records SORNs can be written to cover the records in a single group of records or a single information system or they can be written to cover multiple groups of records or multiple information systems Information systems that are considered a system of record may not be designated operational until a SORN has been published in the Federal Register for thirty days The Office of Management and Budget specifically Privacy Act Implementation Guidelines and Responsibilities July 9 1975 and Circular A-130 including Appendix I DHS MD 0470 2 and Official DHS Guidance on System of Records and System of Records Notices are the benchmark references when developing SORNs OMB requires each SORN to be reviewed every two 2 years to ensure that it accurately describes the system of records This process is called the Biennial SORN Review Process The DHS Privacy Office works with Components to ensure that SORN reviews are conducted every two 2 years following publication in the Federal Register Policy ID DHS Policy Statements 3 14 4 a A SORN is required when PII is maintained by a Federal agency in a system of records where information about an individual is retrieved by a unique personal identifier 3 14 4 b Information systems containing PII shall not be designated operational until a SORN has been published in the Federal Register for thirty 30 days 3 14 4 c Components shall review and republish SORNs every two 2 years as required by OMB A-130 44 v8 0 March 14 2011 Relevant Controls --- CA-6 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 3 14 5 Protecting Privacy Sensitive Systems OMB M-06-16 Protection of Sensitive Agency Information requires that agencies protect PII that is physically removed from Department locations or is accessed remotely Physical removal includes both removable media as well as media within mobile devices i e laptop hard drive Please refer to the following documents for additional information and policies on protecting PII and Sensitive PII at DHS • Handbook for Safeguarding Sensitive Personally Identifiable Information at the Department of Homeland Security • DHS 4300 A Sensitive System Handbook Attachment S Compliance Framework for Privacy Sensitive Systems and • DHS Policy and Procedures for Managing Computer-Readable Extracts Containing Sensitive PII In addition see Section 5 3 for PII auditing requirements and Section 5 4 1 for remote access requirements Policy ID 3 14 5 a DHS Policy Statements PII and Sensitive PII removed from a DHS facility on removable media such as CDs DVDs laptops PDAs shall be encrypted unless the information is being sent to the individual as part of a Privacy Act or Freedom of Information Act FOIA request Relevant Controls MP-5 SC-13 3 14 5 b If PII and Sensitive PII can be physically removed from an information system e g printouts CDs the Security Plan SP shall document the specific procedures training and accountability measures in place to ensure remote use of the data does not bypass the protections provided by the encryption MP-5 3 14 5 c Systems that as part of routine business remove Sensitive PII in the form of a Computer-Readable Extract CRE e g routine system-to-system transmissions of data routine CREs shall address associated risks in the SP MP-5 3 14 5 d Sensitive PII contained within a non-routine or ad hoc CRE e g CREs not included within the boundaries of a source system’s security plan shall not be removed physically or otherwise from a DHS facility without written authorization from the Data Owner responsible for ensuring that the disclosure of the CRE data is lawful and in compliance with this and applicable DHS privacy and security policies --- 3 14 5 e All ad hoc CREs must be documented tracked and validated every ninety 90 days after their creation to ensure that their continued authorized use is still required or that they have been appropriately destroyed or erased --- 45 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID 3 14 5 f DHS Policy Statements Ad hoc CREs shall be destroyed or erased within ninety 90 days unless the information included in the extracts is required beyond that period Permanent erasure of the extracts or the need for continued use of the data shall be documented by the Data Owner and audited periodically by the Component Privacy Officer or PPOC Relevant Controls --- 3 14 6 Privacy Incident Reporting The DHS Privacy Office is responsible for implementing the Department’s privacy incident response program based on requirements outlined in OMB Memorandum 07-16 Safeguarding Against and Responding to the Breach of Personally Identifiable Information May 22 2007 M07-16 Through close collaboration the DHS Chief Privacy Officer the DHS CIO the DHS CISO the DHS EOC and Components must ensure that all DHS privacy and computer security incidents are identified reported and appropriately responded to in order to mitigate harm to DHS-maintained assets information and personnel Incidents involving or that may involve PII are subject to strict reporting standards and timelines Policy ID DHS Policy Statements Relevant Controls 3 14 6 a Any Component discovering a suspected or confirmed privacy incident shall coordinate with the Component Privacy Officer or PPOC and Component CISO ISSM to evaluate and subsequently report the incident to the DHS EOC immediately upon discovery The DHS EOC will then transmit the report to the US-CERT within one 1 hour IR-4 3 14 6 b The Component Privacy Officer or PPOC in cooperation with the Component CISO ISSM shall jointly evaluate the incident but the Component CISO ISSM is responsible for reporting the incident to the Component SOC Computer Security Incident Response Capability CSIRC or directly to the DHS EOC CSIRC if the Component does not have its own SOC CSIRC IR-4 3 14 6 c For Components without Privacy Officers or PPOCs the Component CISO ISSM shall report all types of privacy incidents whether or not they involve information resources This unitary reporting process shall remain in effect until each Component has a Privacy Officer or PPOC who can fulfill the reporting duties IR-6 3 14 6 d DHS personnel shall also report suspected or confirmed privacy incidents or incidents involving PII to their Program Manager immediately upon discovery detection regardless of the manner in which it might have occurred IR-6 3 14 6 e Components shall follow the DHS Privacy Incident Handling Guide 46 v8 0 March 14 2011 --- DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 3 14 7 E-Authentication Identity verification or authentication e-authentication is needed to ensure that online Government services are secure and that individual privacy is protected Each DHS system must be evaluated to determine whether e-authentication requirements apply Only federated identity providers approved through the Federal CIO Council’s Identity Credentialing and Access Management’s ICAM Trust Framework Provider Adoption Process TFPAP should be used Components should see www IDmanagement gov for details regarding the Federal Identity Credentialing and Access Management FICAM initiative E-authentication guidance is provided in the following • OMB M-0404 E-Authentication Guidance for Federal Agencies • NIST SP 800-63 Electronic Authentication Guideline Policy ID DHS Policy Statements Relevant Controls 3 14 7 a For systems that allow online transactions Components shall determine whether e-authentication requirements apply IA-2 3 14 7 b Components shall determine the appropriate assurance level for eauthentication by following the steps described in OMB M-04-04 EAuthentication Guidance for Federal Agencies IA-2 3 14 7 c Components shall implement the technical requirements described in NIST SP 800-63 Electronic Authentication Guideline at the appropriate assurance level for those systems with e-authentication requirements IA-2 3 14 7 d Components shall ensure that each SP reflects the e-authentication status of the respective system IA-2 PL-2 3 14 7 e Programs considering the use of e-authentication are required to conduct a PTA to initiate the review of privacy risks and how they will be mitigated PL-5 3 14 7 f Existing physical and logical access control systems shall be upgraded to use PIV credentials in accordance with NIST and DHS guidelines 3 14 7 g All new systems under development shall be enabled to use PIV credentials in accordance with NIST and DHS guidelines prior to being made operational 3 15 DHS CFO Designated Systems DHS CFO Designated Systems are systems that require additional management accountability to ensure effective internal control exists over financial reporting The DHS CFO publishes the approved list of CFO Designated Systems annually This section provides additional requirements for these systems based on OMB Circular A-123 Management’s Responsibility for Internal Control A-123 Appendix A The requirements contained in OMB Circular A-123 have been mapped to the NIST SP 800-53 controls and documented in DHS 4300A Attachment R These requirements are in addition to the other security requirements established in this document and other CFO developed financial system Line of Business requirements Wherever 47 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A there is a conflict between this and other sections of this policy regarding requirements for CFO Designated Systems this section takes precedence These additional requirements provide a strengthened assessment process and form the basis for management’s assurance on the internal control over financial reporting The strengthened process requires management to document the design and test the operating effectiveness of controls for CFO Designated Systems The system owner is responsible for ensuring that all requirements including security requirements are implemented on DHS systems Component CISOs ISSMs must coordinate with their CFO organization to ensure that these requirements are implemented Policy ID DHS Policy Statements Relevant Controls 3 15 a System owners are responsible for ensuring that security assessments of key security controls i e Security Assessment and Security Assessment Report SAR for CFO Designated Systems are completed annually in TAF This includes updating the ST E SAR annually CA-2 CA-7 3 15 b The DHS CFO shall designate the systems that must comply with additional internal controls and the Office of the CFO shall review and publish this list annually CA-2 3 15 c Component CISOs ISSMs shall ensure that vulnerability assessments and verification of critical patch installations are conducted on all CFO Designated Systems Vulnerability assessment shall be performed at least annually RA-5 3 15 d All CFO Designated Systems shall be assigned a minimum impact level of “moderate” for confidentiality integrity and availability If warranted by a risk based assessment the integrity objective shall be elevated to “high ” RA-2 3 15 e All Component security accreditations for CFO Designated Systems shall be approved and signed by the Component CFO CA-6 3 15 f System Owners shall ensure that Contingency plans are created for all CFO Designated Systems requiring moderate availability and Disaster Recovery plans are created for all CFO Designated Systems requiring high availability and that each plan is tested annually CP-2 CP-4 3 15 g Component CISOs ISSMs shall ensure that weekly incident response tracking is performed for all of their respective CFO Designated Systems IR-5 3 15 h Component CISOs ISSMs shall ensure that incidents related to their respective CFO Designated Systems are reported to the Component CFO IR-4 IR-6 3 15 i The SP shall be updated for CFO Designated Systems at least annually Key controls prescribed in Attachment R Compliance Framework for CFO Designated Systems shall be identified in the SP PL-2 48 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls CA-5 CA-7 3 15 j Component CISOs ISSMs must request a waiver or exception from the DHS CISO if a key control weakness is identified for a CFO Designated System and not remediated within twelve 12 months 3 15 k Component CFOs shall ensure that a fulltime dedicated ISSO is assigned to each CFO Designated System CFO Designated System ISSOs may be assigned to more than one CFO Designated System 3 15 l CFO Designated System ATOs shall be rescinded if Components fail to comply with testing and reporting requirements established within this policy CA-1 CA-6 3 15 m Component CFOs shall work with their Component CISOs ISSMs to approve any major system changes to CFO Designated Systems identified in the DHS inventory CA-1 CM-8 3 16 --- Social Media Social Media hosts are public content sharing Web sites that allow individual users to upload view and share content such as video clips press releases opinions and other information The DHS Office of Public Affairs OPA will publish Terms of Service TOS and guidelines for posting to these sites In some cases the Department will develop its own and in other cases will endorse those of other Federal agencies such as the General Services Administration GSA or Office of Personnel Management OPM Due to the high threat of malware Social Media host sites have been blocked at the TIC Policy ID DHS Policy Statements Relevant Controls 3 16 a Only OPA designated content managers Department level and Component level may post content and only those individuals designated by OPA for this purpose shall be granted access on a continuing basis SA-6 3 16 b Posted content shall be in keeping with the Department’s Terms of Service TOS and guidelines for a given social media host e g YouTube Twitter This condition is also met if the Department endorses another appropriate Federal agency’s guidance or TOS e g GSA OPM Under no circumstances shall sensitive information be posted to social media sites --- 3 16 c Content shall not be posted to any social media site for which the Department has not approved and published final posting guidelines and TOS SA-6 3 16 d Content managers shall review and understand the appropriate Departmentlevel TOS for the appropriate social media host 49 v8 0 March 14 2011 --- DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID 3 16 e DHS Policy Statements Relevant Controls --- Content managers shall make a risk decision prior to posting any information and shall recognize that social medial hosts are not DHS information systems and therefore subject only to the DHS TOS and not to DHS policy Once released information is no longer under DHS control There are a number of security technologies that are especially important to consider when dealing with social media issues These include • Trusted Internet Connections TIC – Section 5 4 4 • Host Configuration and Hardening – Section 4 8 4 • Enterprise Operations Center EOC and Network Operations Center NOC – Section 4 9 • Two-Factor Authentication – Section 5 4 1 • Domain Name System Security Extensions DNSSEC Capabilities – Section 5 4 3 • Trust Zones – Section 5 4 3 • Signed Code – Section 5 4 5 • Patching and Anti-Virus – Section 5 6 3 17 Health Insurance Portability and Accountability Act The Health Insurance Portability and Accountability Act of 1996 HIPAA addresses the privacy of individuals’ health information by establishing a Federal privacy standard for health information and how it can be used and disclosed HIPAA prohibits the use or disclosure of Protected Health Information PHI electronic and otherwise for any purpose other than treatment payment or health care operations without the authorization of the individual or as part of an exception within HIPAA Because of the diverse mission of DHS it may be necessary for some Components to collect PHI as part of a larger mission requirement e g detainee processing disaster relief This section applies to all Components and personnel who collect process or store PHI refer to NIST SP 800-66 for further information Policy ID DHS Policy Statements Relevant Controls 3 17 a For those Components whose systems collect process or store Protected Health Information PHI they shall ensure that the stored information is appropriately protected in compliance with HIPAA and that access or disclosure is limited to the minimum required --- 3 17 b Covered Components shall work with the DHS Privacy Office Component Privacy Office or PPOC to ensure that privacy and disclosure policies comply with HIPAA requirements --- 50 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 3 17 c Covered Components shall ensure that employees with access to DHS systems that collect process or store PHI are trained on HIPAA requirements --- 3 17 d Covered Components shall establish administrative processes that can --- respond to complaints requests for corrections of health information and track disclosures of PHI 3 17 e When collecting PHI Components shall issue a privacy notice to individuals concerning the use and disclosure of their PHI 51 v8 0 March 14 2011 --- DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 4 0 OPERATIONAL POLICIES 4 1 Personnel DHS systems face threats from a myriad of sources The intentional and unintentional actions of system users can potentially harm or disrupt DHS systems and facilities and could result in the destruction or modification of the data being processed denial of service and unauthorized disclosure of data It is thus highly important that stringent safeguards be taken to reduce the risk associated with these types of threats 4 1 1 Citizenship Personnel Screening and Position Categorization Policy ID DHS Policy Statements Relevant Controls 4 1 1 a Components shall designate the position sensitivity level for all Government and contractor positions that use develop operate or maintain information systems and shall determine risk levels for each contractor position Position sensitivity levels shall be reviewed annually and revised as appropriate PS-2 PS-3 PS-7 4 1 1 b Components shall ensure the incumbents of these positions have favorably adjudicated background investigations commensurate with the defined position sensitivity levels PS-2 PS-3 PS-7 4 1 1 c Components shall ensure that no Federal employee is granted access to DHS systems without having a favorably adjudicated Minimum Background Investigation MBI as defined in DHS Instruction 121-01-007 Personnel Suitability and Security Program Active duty United States Coast Guard and other personnel subject to the Uniform Code of Military Justice shall be exempted from this requirement PS-3 4 1 1 d Components shall ensure that no contractor personnel shall be granted access to DHS systems without having a favorably adjudicated Background Investigation BI as defined in DHS Instruction 121-01-007 Suitability Screening Requirements for Contractor Employees and the Department of Homeland Security Acquisition Regulation HSAR PS-3 4 1 1 e Components shall ensure that only U S Citizens are granted access to DHS systems and networks Exceptions to the U S Citizenship requirement may be granted by the Component Head or designee with the concurrence of the Office of Security and the DHS CIO in accordance with Section 1 5 4 U S Citizen Exception Requests of this policy PS-3 52 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 4 1 2 Rules of Behavior Policy ID DHS Policy Statements Relevant Controls 4 1 2 a Components shall ensure that rules of behavior contain acknowledgement that the user has no expectation of privacy a “Consent to Monitor” provision and that disciplinary actions may result from violations PL-4 4 1 2 b Components shall ensure that DHS users are trained regarding rules of behavior and that each user signs a copy prior to being granted user accounts or access to information systems or data AT-1 AT-2 PL-4 4 1 3 Access to Sensitive Information Policy ID 4 1 3 a DHS Policy Statements System Owners shall ensure that users of the information systems supporting their programs have a valid requirement to access these systems Relevant Controls AC-2 4 1 4 Separation of Duties Separation of duties is intended to prevent a single individual from being able to disrupt or corrupt a critical security process Policy ID DHS Policy Statements Relevant Controls 4 1 4 a Components shall divide and separate duties and responsibilities of critical information system functions among different individuals to minimize the possibility that any one individual would have the necessary authority or system access to be able to engage in fraudulent or criminal activity AC-2 4 1 4 b All individuals requiring administrator privileges shall be reviewed and approved by the appropriate AO The AO may delegate this duty to the appropriate system owner or Program Manager AC-2 4 1 4 c Individuals requiring administrator privileges shall be assigned administrator accounts separate from their normal user accounts AC-6 4 1 4 d Administrator accounts shall be used only for performing required administrator duties Individuals shall use their regular user accounts to perform all other functions not directly tied to administrator duties checking email accessing the Internet AC-6 53 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 4 1 5 Information Security Awareness Training and Education Policy ID DHS Policy Statements Relevant Controls 4 1 5 a Components shall establish an information security training program for users of DHS information systems AT-1 4 1 5 b DHS personnel contractors or others working on behalf of DHS accessing DHS systems shall receive initial training and annual refresher training in security awareness and accepted security practices Personnel shall complete security awareness within twenty-four 24 hours of being granted a user account If the user fails to comply user access shall be suspended AT-1 AT-4 4 1 5 c DHS personnel contractors or others working on behalf of DHS with significant security responsibilities e g ISSOs system administrators shall receive initial specialized training and annual refresher training thereafter specific to their security responsibilities AT-3 4 1 5 d Components shall maintain training records to include name and position type of training received and costs of training AT-4 4 1 5 e User accounts and access privileges including access to email shall be disabled for those DHS employees who have not received annual refresher training unless a waiver is granted by the Component CISO ISSM AT-1 4 1 5 f Components shall prepare and submit an annual security awareness training plan as specified by the DHS Information Security Training Program Office AT-1 4 1 5 g Components shall prepare and submit information security awareness reports with content frequency format and distribution as specified by the DHS CISO AT-1 4 1 5 h Components shall provide evidence of training by submitting copies of training schedules training rosters and training reports upon request of the DHS Information Security Training Program Office AT-4 4 1 5 i The DHS CISO shall review Component information security awareness programs annually AT-1 4 1 6 Separation From Duty Policy ID 4 1 6 a DHS Policy Statements Components shall implement procedures to ensure that system accesses are revoked for DHS employees contractors or others working on behalf of DHS who leave the Component are reassigned to other duties or no longer require access 54 v8 0 March 14 2011 Relevant Controls AC-2 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 4 1 6 b Components shall establish procedures to ensure that all DHS information system-related property and assets are recovered from the departing individual and that sensitive information stored on any media is transferred to an authorized individual PS-4 4 1 6 c Accounts for personnel on extended absences shall be temporarily suspended AC-2 4 1 6 d System Owners shall review information system accounts supporting their programs at least annually AC-2 4 2 Physical Security 4 2 1 General Physical Access Policy ID DHS Policy Statements Relevant Controls 4 2 1 a Access to DHS buildings rooms work areas spaces and structures housing information systems equipment and data shall be limited to authorized personnel PE-2 4 2 1 b Controls for deterring detecting restricting and regulating access to sensitive areas shall be in place and shall be sufficient to safeguard against possible loss theft destruction damage hazardous conditions fire malicious actions and natural disasters PE-3 4 2 1 c Controls shall be based on the level of classification and risk determined in accordance with Departmental security policy as reflected in this and other relevant documents PE-1 PM-9 4 2 1 d Visitors shall sign in upon entering DHS facilities that house information systems equipment and data be escorted during their stay and sign out upon leaving Non-DHS contractor or vendor access shall be limited to those work areas requiring their presence Visitor logs shall be maintained and available for review for one 1 year PE-7 4 2 1 e These requirements shall extend to DHS assets located at non-DHS facilities or non-DHS assets and equipment hosting DHS data --- 55 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 4 2 2 Sensitive Facility Policy ID 4 2 2 a 4 3 DHS Policy Statements Facilities processing transmitting or storing sensitive information shall incorporate physical protection measures based on the level of risk The risk shall be determined in accordance with Departmental security policy as reflected in this and other relevant documents Relevant Controls PE-1 PM-9 Media Controls 4 3 1 Media Protection Policy ID DHS Policy Statements Relevant Controls 4 3 1 a Components shall ensure that all media containing sensitive information including hard copy media backup media and removable media such as USB drives are stored in a secure location e g a locked office room desk bookcase file cabinet locked tape device or other storage prohibiting access by unauthorized persons when not in use MP-2 MP-4 PE-1 4 3 1 b Components shall ensure that all offsite backup media are protected as per guidance in this section CP-6 4 3 1 c DHS personnel contractors and others working on behalf of DHS are prohibited from using any non-Government issued removable media USB drives in particular or connecting them to DHS equipment or networks or to store DHS sensitive information MP-2 4 3 1 d Systems requiring encryption shall comply with Section 5 5 1 Encryption of this policy DHS-owned USB drives shall use encryption IA-7 SC-13 4 3 1 e DHS-owned removable media shall not be connected to any non-DHS information system unless the AO has determined the acceptable level of risk based on compensating controls published acceptable use guidance and the guidance has been approved by the respective CISO ISSM The respective CISO is the CISO with that system in his or her inventory AC-20 MP-2 PM-9 4 3 1 f DHS-owned USB removable media shall not be connected to any non-DHS information system AC-20 MP-2 4 3 1 g Components shall follow established procedures to ensure that paper and electronic outputs from systems containing sensitive information are protected MP-1 4 3 1 h Users shall ensure proper protection of printed output Printing of sensitive documents shall occur only when a trusted person is attending the printer SI-12 56 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID 4 3 1 i DHS Policy Statements Components shall follow the procedures established by DHS MD 11042 1 Safeguarding Sensitive But Unclassified For Official Use Only Information for the transportation or mailing of sensitive media Relevant Controls MP-5 4 3 2 Media Marking and Transport Policy ID DHS Policy Statements Relevant Controls 4 3 2 a Media determined by the information owner to contain sensitive information shall be appropriately marked in accordance with DHS MD 11042 1 Safeguarding Sensitive But Unclassified For Official Use Only Information MP-3 4 3 2 b Components shall control the transport of information system media containing sensitive data outside of controlled areas and restrict the pickup receipt transfer and delivery to authorized personnel MP-5 4 3 3 Media Sanitization and Disposal Policy ID DHS Policy Statements Relevant Controls 4 3 3 a Components shall ensure that any information systems storage medium containing sensitive information is sanitized using approved sanitization methods before it is disposed of reused recycled or returned to the owner or manufacturer MP-6 4 3 3 b Components shall maintain records of the sanitization and disposition of information systems storage media MP-6 4 3 3 c Components shall periodically test degaussing equipment to verify that the equipment is functioning properly MP-6 4 3 4 Production Input Output Controls Policy ID DHS Policy Statements Relevant Controls 4 3 4 a Components shall follow established procedures to ensure that sensitive information cannot be accessed or stolen by unauthorized individuals SI-12 4 3 4 b These procedures shall address not only the paper and electronic outputs from systems but also the transportation or mailing of sensitive media SI-12 57 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 4 4 Voice Communications Security 4 4 1 Private Branch Exchange Policy ID 4 4 1 a DHS Policy Statements Components shall provide adequate physical and information security for all DHS-owned Private Branch Exchanges PBX Refer to NIST SP 800-24 PBX Vulnerability Analysis for guidance on detecting and fixing vulnerabilities in PBX systems Relevant Controls CM-2 4 4 2 Telephone Communications Policy ID 4 4 2 a DHS Policy Statements Components shall develop guidance for discussing sensitive information over the telephone Guidance shall be approved by a senior Component official and is subject to review and approval by the DHS CISO Under no circumstances shall classified national security information be discussed over unsecured telephones Relevant Controls PL-4 4 4 3 Voice Mail Policy ID DHS Policy Statements Relevant Controls 4 4 3 a Sensitive information shall not be communicated over nor stored in voice mail PL-4 4 5 Data Communications 4 5 1 Telecommunications Protection Techniques Policy ID 4 5 1 a DHS Policy Statements Components shall carefully select the telecommunications protection techniques that meet their information security needs in the most costeffective manner consistent with Departmental and Component information system security policies Approved protected network services PNS may be used as cost-effective alternatives to the use of encryption for sensitive information requiring telecommunications protection 58 v8 0 March 14 2011 Relevant Controls CM-2 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 4 5 2 Facsimiles Policy ID DHS Policy Statements Relevant Controls 4 5 2 a Components shall implement and enforce technical controls for fax technology and systems including fax machines servers gateways software and protocols that transmit and receive sensitive information SC-1 SC-7 SC-8 SC-9 4 5 2 b Components shall configure fax servers to ensure that incoming lines cannot be used to access the network or any data on the fax server AC-4 4 5 3 Video Teleconferencing Policy ID DHS Policy Statements Relevant Controls 4 5 3 a Components shall implement controls to ensure that only authorized individuals are able to participate in each videoconference AC-3 PE-3 4 5 3 b Components shall ensure that appropriate transmission protections commensurate with the highest sensitivity of information to be discussed are in place throughout any video teleconference SC-8 SC-9 4 5 3 c Video teleconferencing equipment and software shall be disabled when not in use AC-3 PE-3 4 5 4 Voice Over Data Networks Voice over Internet Protocol VoIP and similar technologies move voice over digital networks These technologies use protocols originally designed for data networking Such technologies include Voice over Frame Relay Voice over Asynchronous Transfer Mode and Voice over Digital Subscriber Line refer to NIST SP 800-58 for further information Policy ID DHS Policy Statements Relevant Controls 4 5 4 a Prior to implementing voice over data network technology Components shall conduct rigorous risk assessments and security testing and provide a business justification for their use Any systems that employ this technology shall be accredited for this purpose with residual risks clearly identified SC-19 PM-9 4 5 4 b Voice over data network implementations shall have sufficient redundancy to ensure network outages do not result in the loss of both voice and data communications SC-19 4 5 4 c Components shall ensure appropriate identification and authentication controls audit logging and integrity controls are implemented on every element of their voice over data networks SC-19 59 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID 4 5 4 d 4 6 DHS Policy Statements Relevant Controls Components shall ensure that physical access to voice over data network elements is restricted to authorized personnel SC-19 Wireless Network Communications Wireless network communications technologies include the following • Wireless systems e g wireless local area networks WLAN wireless wide area networks WWAN wireless personal area networks WPAN peer-to-peer wireless networks information systems that leverage commercial wireless services Wireless systems include the transmission medium stationary integrated devices firmware supporting services and protocols • Wireless portable electronic devices PED capable of storing processing or transmitting sensitive information e g personal digital assistants PDA smart telephones two-way pagers handheld radios cellular telephones personal communications services PCS devices multifunctional wireless devices portable audio video recording devices with wireless capability scanning devices messaging devices • Wireless tactical systems including mission-critical communication systems and devices e g include Land Mobile Radio LMR subscriber devices and infrastructure equipment remote sensors technical investigative communications systems • Radio Frequency Identification RFID Policy ID DHS Policy Statements Relevant Controls 4 6 a Wireless network communications technologies are prohibited from use within DHS unless the appropriate AO specifically approves a technology and application AC-18 4 6 b Components using Public Key Infrastructure PKI -based encryption on wireless systems wireless PEDs and wireless tactical systems shall implement and maintain a key management plan approved by the DHS PKI Policy Authority IA-5 SC-12 4 6 1 Wireless Systems Wireless system policy and procedures are described more completely in Attachment Q1 Wireless Systems to the DHS 4300A Sensitive Systems Handbook 60 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 4 6 1 a Annual information security assessments shall be conducted on all approved wireless systems Wireless information security assessments shall enumerate vulnerabilities risk statements risk levels and corrective actions CA-2 PM-9 4 6 1 b A POA M shall be developed to address wireless information security vulnerabilities These plans shall prioritize corrective actions and implementation milestones in accordance with defined risk levels CA-5 PM-4 PM-9 4 6 1 c Components shall identify countermeasures to denial-of-service attacks and complete a risk based evaluation prior to approving the use of a wireless PED AC-19 PM-9 SC-5 4 6 1 d SPs shall adopt a defense-in-depth strategy that integrates firewalls screening routers wireless intrusion detection systems antivirus software encryption strong authentication and cryptographic key management to ensure information security solutions and secure connections to external interfaces are consistently enforced SI-3 4 6 1 e Legacy wireless systems that are not compliant with DHS information security policy shall implement a migration plan to outline the provisions procedures and restrictions for transitioning these systems to DHS-compliant security architectures Operation of these noncompliant systems requires an approved waiver or exception to policy from the DHS CISO CA-5 4 6 1 f Component CISOs shall review all system applications for wireless usage maintain an inventory of systems and provide that inventory to the DHS CISO annually AC-18 PM-5 4 6 1 g Component CISOs shall i establish usage restrictions and implementation guidance for wireless technologies and ii authorize monitor and control wireless access to DHS information systems AC-18 4 6 2 Wireless Portable Electronic Devices Wireless PEDs include PDAs smart telephones two-way pagers handheld radios cellular telephones PCS devices multifunctional wireless devices portable audio video recording devices with wireless capability scanning devices messaging devices and any other wireless clients capable of storing processing or transmitting sensitive information Wireless PED policy and procedures are described more completely in Attachment Q2 Wireless Portable Electronic Devices to the DHS 4300A Sensitive Systems Handbook 61 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 4 6 2 a The use of wireless PEDs and accessory devices in areas where sensitive or classified information is discussed maintained or distributed is prohibited unless specifically authorized by the AO in writing AC-19 PL-4 4 6 2 b Wireless PEDs shall not be tethered or otherwise physically or wirelessly connected to the DHS-wired core network without written consent from the AO AC-18 AC-19 4 6 2 c Wireless PEDs shall not be used to store process or transmit combinations personal identification numbers PIN or sensitive information in unencrypted formats AC-19 IA-5 IA-7 4 6 2 d Wireless PEDs such as BlackBerry devices and smart phones shall implement strong authentication data encryption and transmission encryption technologies Portable electronic devices such as BlackBerry devices and smart phones shall be password-protected with a security timeout period established For BlackBerry devices the security timeout shall be set to ten 10 minutes AC-19 IA-7 SC-8 SC-9 SC-13 4 6 2 e SPs shall promulgate the provisions procedures and restrictions for using wireless PEDs to download mobile code in an approved manner SC-18 4 6 2 f Wireless PEDs shall be operated only when current DHS TRM-approved versions of antivirus software and software patches are installed SI-3 4 6 2 g Cost-effective countermeasures to denial-of-service attacks shall be identified and established prior to a wireless PED being approved for use SC-5 4 6 2 h Components shall maintain a current inventory of all approved wireless PEDs in operation PM-5 4 6 2 i Wireless PEDs shall be cleared of all information before being reused by another individual office or Component within DHS or before they are surplused wireless PEDs that are being disposed of recycled or returned to the owner or manufacturer shall first be sanitized using approved procedures MP-6 4 6 2 j Legacy wireless PEDs that are not compliant with DHS information security policy shall implement a migration plan that outlines the provisions procedures and restrictions for transitioning these wireless PEDs to DHScompliant security architectures Operation of these noncompliant systems requires an approved waiver or exception from the DHS CISO CA-5 4 6 2 k Components shall ensure that personally owned PEDs and Government-owned PEDs not authorized to process classified information are not permitted in conference rooms or secure facilities where classified information is discussed 62 v8 0 March 14 2011 SC-7 CA-6 AC-19 PE-18 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 4 6 2 l The AO shall approve the use of Government-owned PEDs to process store or transmit sensitive information CA-6 4 6 2 m The use of add-on devices such as cameras and recorders is not authorized unless approved by the AO Functions that can record or transmit sensitive information via video Infrared IR or Radio Frequency RF shall be disabled in areas where sensitive information is discussed AC-19 CM-7 PE-18 SC-7 4 6 2 1 Cellular Phones Policy ID 4 6 2 1 a 4 6 2 2 DHS Policy Statements Components shall develop guidance for discussing sensitive information on cellular phones Guidance shall be approved by a senior Component official and is subject to review by the DHS CISO Under no circumstances shall classified information be discussed on cellular phones 4 6 2 3 PL-4 Pagers Policy ID 4 6 2 2 a Relevant Controls DHS Policy Statements Pagers shall not be used to transmit sensitive information Relevant Controls PL-4 Multifunctional Wireless Devices Wireless devices have evolved to be multifunctional cell phones pagers and radios can surf the Internet retrieve email take and transmit pictures Most of these functions do not have sufficient security Policy ID DHS Policy Statements Relevant Controls 4 6 2 3 a Functions that cannot be encrypted using approved cryptographic modules shall not be used to process store or transmit sensitive information AC-19 SC-8 SC-9 SC-12 4 6 2 3 b Functions that transmit or receive video IR or radio frequency RF signals shall be disabled in areas where sensitive information is discussed AC-19 PE-18 4 6 2 3 c Short Message Service SMS and Multimedia Messaging Service MMS shall not be used to process store or transmit sensitive information and shall be disabled whenever possible 63 v8 0 March 14 2011 --- DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 4 6 3 Wireless Tactical Systems Wireless tactical systems include LMR subscriber devices infrastructure equipment remote sensors and technical investigative communications systems Because they are often deployed under circumstances in which officer safety and mission success are at stake wireless tactical systems require even greater security measures To ensure secure tactical communications Components must implement strong identification authentication and encryption protocols designed specifically for each wireless tactical system Wireless tactical system policy and procedures are described more completely in Attachment Q3 Wireless Tactical Systems to the DHS 4300A Sensitive Systems Handbook Policy ID DHS Policy Statements Relevant Controls 4 6 3 a AOs shall be immediately notified when any security features are disabled in response to time-sensitive mission-critical incidents CM-3 4 6 3 b Wireless tactical systems shall implement strong identification authentication and encryption IA-2 IA-7 SC-8 SC-9 4 6 3 c Cost-effective countermeasures to denial-of-service attacks shall be identified and established prior to a wireless tactical system being approved for use SC-5 4 6 3 d Components shall maintain a current inventory of all approved wireless tactical systems in operation PM-5 4 6 3 e Legacy tactical wireless systems that are not compliant with DHS information security policy shall implement a migration plan to outline the provisions procedures and restrictions for transitioning these systems to DHS-compliant security architectures Operation of these noncompliant systems requires an approved waiver or exception from the DHS CISO as appropriate --- 4 6 3 f The security configuration of LMR subscriber units shall be validated via overthe-air-rekeying OTAR or hard rekey using a crypto-period no longer than 180 days SC-12 4 6 3 g All LMR systems shall comply with Project 25 P25 EIA TIA-102 security standards where applicable CM-2 4 6 4 Radio Frequency Identification Radio Frequency Identification RFID enables wireless identification of objects over significant distances Because of the computing limitations of RFID tags it often is not feasible to implement many of the security mechanisms such as cryptography and strong authentication that are commonly supported on personal workstations servers and network infrastructure devices RFID security controls can support Departmental and Component privacy objectives mitigate risks to business processes and prevent the disclosure of sensitive data 64 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A RFID policy and procedures are described more completely in Attachment Q4 Sensitive RFID Systems to the DHS 4300A Sensitive Systems Handbook Policy ID DHS Policy Statements Relevant Controls 4 6 4 a Components implementing RFID systems shall assess hazards of electromagnetic radiation to fuel ordinance and personnel before deployment of the RFID technology PE-18 4 6 4 b Components shall limit data stored on RFID tags to the greatest extent possible recording information beyond an identifier only when required for the application mission When data beyond an identifier is stored on a tag the tag’s memory shall be protected by access control AC-6 PL-5 4 6 4 c Components shall develop a contingency plan such as the use of a fallback identification technology to implement in case of an RFID security breach or system failure --- 4 6 4 d Components shall identify and implement appropriate operational and technical controls to limit unauthorized tracking or targeting of RFID-tagged items when these items are expected to travel outside the Component’s physical perimeter AC-14 4 6 4 e When the RFID system is connected to a DHS data network Components shall implement network security controls to segregate RFID network elements such as RFID readers middleware and databases from other non-RFID network hosts CM-6 4 6 4 f Components implementing RFID technology shall determine whether or not tag cloning is a significant business risk If such a significant risk exists then tag transactions shall be cryptographically authenticated IA-7 PM-9 RA-3 4 7 Overseas Communications Policy ID 4 7 a DHS Policy Statements Where required or appropriate all communications outside of the United States and its territories shall be in accordance with the Department of State Foreign Affairs Manual FAM 12 FAM 600 Information Security Technology 65 v8 0 March 14 2011 Relevant Controls --- DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 4 8 Equipment 4 8 1 Workstations Policy ID DHS Policy Statements Relevant Controls AC-11 CM-6 4 8 1 a Components shall configure workstations to either log off or activate a password-protected lock or password-protected screensaver within fifteen 15 minutes of user inactivity 4 8 1 b Components shall ensure that workstations are protected from theft PE-3 4 8 1 c Users shall either log off or lock their workstations when unattended --- 4 8 2 Laptop Computers and Other Mobile Computing Devices Policy ID DHS Policy Statements Relevant Controls 4 8 2 a Information stored on any laptop computer or other mobile computing device that may be used in a residence or on travel shall use encryption in accordance with Section 5 5 1 Encryption for data at rest and in motion Passwords tokens and Smart Cards shall not be stored on or with the laptop or other mobile computing device AC-19 IA-2 SC-12 4 8 2 b Laptop computers shall be powered down when not in use due to volatile memory vulnerabilities AC-19 PL-4 4 8 2 c Laptop computers and other mobile computing devices in offices shall be secured when unattended via a locking cable locked office or locked cabinet or desk AC-19 PE-3 PL-4 4 8 2 d Users shall obtain the written approval of the office director before taking a laptop computer or other mobile computing device outside of the United States or its territories AC-19 PL-4 4 8 3 Personally Owned Equipment and Software Policy ID DHS Policy Statements Relevant Controls 4 8 3 a Personally owned equipment and software shall not be used to process access or store sensitive information without the written prior approval of the AO SA-6 4 8 3 b Equipment that is not owned or leased by the Federal Government or operated by a contractor on behalf of the Federal Government shall not be connected to DHS equipment or networks without the written prior approval of the Component CISO ISSM SA-9 66 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID 4 8 3 c DHS Policy Statements Any device that has been obtained through civil or criminal asset forfeiture shall not be used as part of a DHS information system nor used to process DHS data Relevant Controls AC-20 4 8 4 Hardware and Software Policy ID DHS Policy Statements Relevant Controls 4 8 4 a Components shall ensure that DHS information systems follow the hardening guides for operating systems and the configuration guides for applications promulgated by the DHS CISO DHS Sensitive Systems Handbook Enclosure 1 includes the DHS Secure Baseline Configuration Guides CM-2 CM-6 4 8 4 b Components shall limit access to system software and hardware to authorized personnel AC-3 CM-5 4 8 4 c Components shall test authorize and approve all new and revised software and hardware prior to implementation in accordance with their Configuration Management Plan CM-2 CM-3 4 8 4 d Components shall manage systems to reduce vulnerabilities through vulnerability testing and management promptly installing patches and eliminating or disabling unnecessary services CM-3 RA-5 4 8 4 e Components shall ensure that maintenance ports are disabled during normal system operation and enabled only during approved maintenance activities MA-1 4 8 4 f System libraries shall be managed and maintained to protect privileged programs and to prevent or minimize the introduction of unauthorized code SI-7 4 8 4 g Components shall develop maintenance policy and procedures MA-1 4 8 4 h If cleared maintenance personnel are not available a trusted DHS employee with sufficient technical knowledge to detect and prevent unauthorized modification to the information system or its network shall monitor and escort the maintenance personnel during maintenance activities This situation shall only occur in exceptional cases Components shall take all possible steps to ensure that trusted maintenance personnel are available MA-5 4 8 4 i Maintenance using a different user’s identity may be performed only when the user is present The user shall log in and observe the maintenance actions at all times Users shall not share their authentication information with maintenance personnel MA-5 67 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 4 8 5 Personal Use of Government Office Equipment and DHS Systems Computers Policy ID DHS Policy Statements Relevant Controls 4 8 5 a DHS employees may use Government office equipment and DHS systems computers for authorized purposes only “Authorized use” includes limited personal use as described in DHS MD 4600 1 Personal Use of Government Office Equipment and DHS MD 4900 Individual Use and Operation of DHS Information Systems Computers --- 4 8 5 b Limited personal use of DHS email and Internet services is authorized for DHS employees as long as this use does not interfere with official duties inhibit the security of information and information systems or cause degradation of network services Specifically prohibited activities include streaming of audio or video social networking peer-to-peer networking software or music sharing piracy online gaming webmail Instant Messaging IM hacking and the viewing of pornography or other offensive content DHS users shall comply with the provisions of DHS MD 4500 1 DHS E-mail Usage and DHS MD 4400 1 DHS Web and Information Systems --- 4 8 5 c Anyone granted user account access to any DHS information system including DHS employees contractors and others working on behalf of DHS shall have no expectations of privacy associated with its use By completing the authentication process the user acknowledges his or her consent to monitoring AC-8 4 8 5 d The use of Government office equipment and DHS systems computers constitutes consent to monitoring and auditing of the equipment systems at all times Monitoring includes the tracking of internal transactions and external transactions such as Internet access It also includes auditing of stored data on local and network storage devices as well as removable media AC-8 4 8 5 e DHS users are required to sign rules of behavior prior to being granted system accounts or access to DHS systems or data The rules of behavior shall contain a “Consent to Monitor” provision and an acknowledgement that the user has no expectation of privacy PL-4 4 8 5 f Contractors others working on behalf of DHS or other non-DHS employees are not authorized to use Government office equipment or information systems computers for personal use unless limited personal use is specifically permitted by the contract or memorandum of agreement When so authorized the limited personal use policies of this section and the provisions of DHS MD 4600 1 DHS MD 4900 DHS MD 4400 1 and DHS MD 4500 1 shall apply --- 4 8 6 Wireless Settings for Peripheral Equipment Peripheral equipment printers scanners fax machines often includes capabilities intended to allow wireless access to these devices Although convenient wireless access comes with additional risks In general wireless access is not allowed on DHS networks 68 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 4 8 6 a Components shall ensure that wireless capabilities for peripheral equipment are disabled This applies all to peripherals connected to any DHS network or to systems processing or hosting DHS sensitive data CM-7 4 8 6 b In cases where valid mission requirements or equipment limitations prevent disabling wireless capabilities Components shall comply with all requirements outlined in Section 4 6 Wireless Communication and obtain a waiver or exception in accordance with this policy CM-7 4 9 Department Information Security Operations The DHS EOC is the central coordinating and reporting authority for all Sensitive and National Security computer security incidents throughout the Department The HSDN SOC shall report incidents to the DHS EOC through appropriate channels to protect data classification The HSDN SOC is subordinate to the DHS EOC acting as the central coordinating and reporting authority for all SECRET computer security incidents throughout the Department Policy ID DHS Policy Statements Relevant Controls 4 9 a It is the policy of DHS that employees contractors or others working on behalf of DHS have no privacy expectations associated with the use of any DHS network system or application This policy is further extended to anyone who is granted account access to any network system or application in use in the Department By completing the account log in process the account owner acknowledges their consent to monitoring 4 9 b Component SOCs and the HSDN SOC shall be operationally subordinate to the DHS EOC The DHS EOC shall provide operational oversight and guidance IR-1 4 9 c The DHS EOC or Component SOCs shall lead the coordination and administration of Department and Component policy enforcement points such as firewalls SC-7 4 9 d The DHS EOC shall implement the Department logging strategy coordinated with Component SOCs to enable endpoint visibility and Departmental situational awareness --- 4 9 e All SOCs shall have the capability to process intelligence information at the collateral level or above The DHS EOC and Component SOCs shall have the ability to process SECRET level information continuously and shall have the capability to receive TS SCI information IR-4 4 9 f SOCs shall ensure that personnel are appropriately cleared to access Joint Worldwide Intelligence Communications System JWICS SOC managers are free to determine the number and type of personnel to be cleared but at least IR-4 69 v8 0 March 14 2011 AC-8 PL-4 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls one cleared person shall be available per shift This person may be on call A Government officer shall be available continuously for incident response and management 4 9 g All Department SOCs shall establish and maintain a forensic capability as outlined in the DHS Enterprise Operations Concept of Operations EOC CONOPS IR-7 4 9 h Department information security operations shall provide a vulnerability management capability DHS EOC provides Information Security Vulnerability Management ISVM messages and vulnerability assessment capabilities Component SOCs shall develop a robust vulnerability management capability to compliment the DHS EOC SI-5 4 9 i Component CISOs shall ensure that the DHS CISO is kept apprised of all pertinent matters involving the security of information systems and that security-related decisions and information are distributed to the ISSOs and other appropriate persons SI-5 4 9 j Component SOCs shall report operationally to the respective Component CISO Each CISO shall exercise oversight over their Components’ information security operations functions including the Component SOCs IR-1 4 9 k The DHS EOC shall report operationally to the DHS CISO 4 10 Security Incidents and Incident Response and Reporting Policy ID DHS Policy Statements Relevant Controls 4 10 a Components shall establish and maintain a continuous incident response capability IR-1 4 10 b Components shall report significant incidents to the DHS EOC by calling 703 921-6505 as soon as possible but not later than one 1 hour from validation” e g a security event being confirmed as a security incident Other means such as the EOC ONLINE portal https eoconline dhs gov are acceptable but the Component shall positively verify that the notification is received and acknowledged by the DHS EOC IR-6 4 10 c Significant HSDN incidents shall be documented with a preliminary report that shall be provided to the HSDN Government Watch Officer or DHS EOC within one hour An initial detailed report shall be provided to the DHS EOC as soon as possible but not later than one hour from validation” via secure communications Subsequent updates and status reports shall be provided to the DHS EOC every twenty-four 24 hours via HSDN SOC ONLINE until incident resolution or when new information is discovered Significant IR-6 70 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls incidents are reported individually on a per incident basis and shall not be reported in the monthly summary report Additional guidance is located in DHS 4300A Attachment F Incident Response and Reporting Section 3 0 4 10 d Components shall report minor incidents on systems in the weekly incident report SBU systems may report via the DHS EOC portal https eoconline dhs gov Components with no portal access shall report minor incidents via email to dhs soc@dhs gov HSDN incidents or incidents involving SECRET information shall be documented in a summary report via the HSDN DHS EOC portal IR-6 4 10 e DHS personnel shall follow DHS CISO procedures for detecting reporting and responding to information security incidents in accordance with the DHS EOC CONOPS Reports shall be classified at the highest classification level of the information contained in the document Unsanitized reports shall be marked and handled appropriately IR-1 4 10 f If a DHS Component has no incidents to report for a given week a weekly “No Incidents” report shall be sent to the EOC IR-6 4 10 g The DHS EOC shall report incidents to US-CERT in accordance with the DHS EOC CONOPS Components shall not send incident reports directly to US-CERT IR-6 4 10 h The DHS EOC shall receive classified spillage incident reports and support the DHS CSO for containment and cleanup All classified spillages are significant incidents IR-6 4 10 i The DHS EOC shall maintain information security “playbooks ” that is checklists that implement procedures and provide guidance on how to respond rapidly to developing incidents IR-1 4 10 j The DHS EOC shall respond to detected faults attacks events or incidents and communicate incident reports to external organizations that may be affected IR-1 4 10 k Components shall maintain a full SOC and CSIRC capability or outsource this capability to the DHS EOC The DHS EOC shall provide SOC and CSIRC services to Components in accordance with formal agreements Information regarding incident response capability is available in Attachment F of the DHS 4300A Sensitive Systems Handbook IR-7 4 10 l Components shall develop and publish internal computer security incident response plans and incident handling procedures and provide copies to the DHS CSIRC These procedures shall include a detailed CM process for modification of security device configurations IR-1 71 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 4 10 m Component Heads shall take corrective actions when security incidents and violations occur and shall hold personnel accountable for intentional transgressions IR-1 4 10 n The DHS EOC shall monitor and report incident investigation and incident remediation activities to the DHS CIO and CISO in accordance with the DHS EOC CONOPS until the incident is closed IR-5 4 10 o The DHS CISO shall determine the frequency and content of security incident reports IR-6 4 10 p The Component CSIRC shall report incidents only to the DHS EOC and to no other external agency or organization IR-6 4 10 q The DHS CISO shall publish Incident Response Testing and Exercise scenarios as required IR-1 4 10 r The Component CISO for each Component providing an incident response capability shall ensure Incident Response Testing and Exercises are conducted annually in coordination with the DHS CISO IR-3 4 10 1 Law Enforcement Incident Response The DHS EOC shall notify the DHS Chief Internal Security and Investigations Division Office of Security CISID-OIS whenever an incident requires law enforcement involvement Law enforcement shall coordinate with the DHS EOC the CISID-OIS the Component and other appropriate parties whenever a crime is committed or suspected Policy ID DHS Policy Statements Relevant Controls 4 10 1 a Components shall coordinate all external law enforcement involvements through the DHS EOC and obtain guidance from the DHS EOC before contacting local law enforcement Exceptions are only made during emergencies where there is risk to life limb or destruction of property In cases of emergency notification the Component shall notify the DHS EOC as soon as possible by the most expedient means available IR-6 4 10 1 b Security Incidents may include law enforcement LE or counter intelligence CI elements such as maintaining a chain of custody All incidents containing a LE CI aspect shall be coordinated with the DHS CSO through the DHS EOC IR-6 72 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 4 11 Documentation Policy ID DHS Policy Statements Relevant Controls 4 11 a Components shall ensure that information systems and networks are appropriately documented in such a way as to allow others to understand system operation and configuration CM-8 4 11 b System Owners shall update system documentation annually or whenever system changes occur Such changes include • A vulnerability scan of the information system • New threat information • Weaknesses or deficiencies discovered in currently deployed security controls after an information system breach • A redefinition of mission priorities or business objectives resulting in a change to the security category of the information system and CM-3 CM-8 SA-5 A change in the information system e g adding new hardware software or firmware establishing new connections or the system’s environment of operation 4 11 c Documentation shall be kept on hand and be accessible to authorized personnel including auditors at all times CM-3 4 11 d System documentation may be categorized as Sensitive if deemed appropriate by the Component CISO ISSM This category shall not be used as a means to restrict access to auditors or other authorized personnel CM-3 4 12 Information and Data Backup Policy ID DHS Policy Statements Relevant Controls 4 12 a The policies in this document including Security Authorization Process requirements apply to any devices that process or host DHS data --- 4 12 b Component CISOs ISSMs shall determine whether or not automated process devices shall be included as part of an information system’s Security Authorization Process requirements --- 4 12 c This policy directive and the DHS 4300A Sensitive Systems Handbook apply to all DHS employees contractors detailees others working on behalf of DHS and users of DHS information systems that collect generate process store display transmit or receive DHS data This includes prototypes telecommunications systems and all systems in all phases of the System Engineering Life Cycle --- 73 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 4 13 Converging Technologies Advances in technology have resulted in the availability of devices that offer multiple functions Many devices such as multifunctional desktop computers copiers facsimile machines and heating ventilation and air conditioning HVAC systems may contain sensitive data and may also be connected to data communications networks Policy ID DHS Policy Statements Relevant Controls 4 13 a The policies in this document apply to any networked devices that contain information technology including copiers facsimile machines and alarm control systems --- 4 13 b Components shall ensure that network printers and facsimile machines are updated to the latest version of their firmware software at least annually CM-2 4 13 c Components shall ensure that network printers copiers and facsimile machines shall be configured for least required functionality CM-7 4 13 d Components shall ensure that each network printer copier and facsimile machine is within the system definition of a DHS information system that has a current ATO CM-8 4 13 e Components shall ensure that remote maintenance of network printers copiers and facsimile machines is conducted only from within DHS networks If maintenance planning does not include performing remote maintenance Components shall ensure that remote maintenance capabilities are disabled MA-4 4 13 f Components shall ensure that network printers copiers and facsimile machines are configured to restrict administrator access to authorized individuals or groups MA-5 4 13 g Components shall ensure that maintenance or disposal of network printers copiers or facsimile machines approved for sensitive reproduction is performed only while escorted by a properly cleared person with knowledge to detect any inappropriate action MA-5 4 13 h Components shall ensure that memory and hard drives do not leave the facility they are to be replaced and the old part destroyed as sensitive media MP-6 4 13 i Components shall locate network printers copiers and facsimile machines approved to process sensitive information in areas where access can be controlled when paper output is being created PE-18 4 13 j Any multifunction device connected to a DHS network or other information system containing sensitive data shall have the inbound dial in capabilities disabled AC-17 74 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 5 0 TECHNICAL POLICIES The design of information systems that process store or transmit sensitive information shall include the automated security features discussed in this section Security safeguards shall be in place to ensure that each person having access to sensitive information systems is individually accountable for his or her actions while utilizing the system 5 1 Identification and Authentication Policy ID DHS Policy Statements Relevant Controls 5 1 a Components shall ensure that user access is controlled and limited based on positive user identification and authentication mechanisms that support the minimum requirements of access control least privilege and system integrity IA-1 IA-2 5 1 b For information systems requiring authentication controls Components shall ensure that the information system is configured to require that each user be authenticated before information system access occurs IA-1 IA-2 5 1 c For systems with low impact for the confidentiality security objective Components shall disable user identifiers after ninety 90 days of inactivity for systems with moderate and high impacts for the confidentiality security objective Components shall disable user identifiers after forty-five 45 days of inactivity IA-4 5 1 d DHS users shall not share identification or authentication materials of any kind nor shall any DHS user allow any other person to operate any DHS system by employing the user’s identity IA-5 5 1 e All user authentication materials shall be treated as sensitive material and shall carry a classification as high as the most sensitive data to which that user is granted access using that authenticator IA-7 5 1 f Components shall implement strong authentication on servers for system administrators and personnel with significant security responsibilities within six 6 months of the Component’s implementation of Homeland Security Presidential Directive HSPD HSPD-12 IA-2 5 1 1 Passwords The least expensive method for authenticating users is a password system in which authentication is performed each time a password is used More sophisticated authentication techniques such as Smart Cards and biological recognition systems e g retina scanner handprint voice recognition shall be cost-justified through the risk assessment process 75 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 5 1 1 a In those systems where user identity is authenticated by password the system ISSO shall determine and enforce appropriate measures to ensure that strong passwords are used IA-5 5 1 1 b The ISSO shall determine and enforce the appropriate frequency for changing passwords in accordance with appropriate guidance documentation if published In the absence of specific guidance documentation passwords shall not remain in effect longer than ninety 90 days IA-5 5 1 1 c DHS users shall not share personal passwords IA-5 5 1 1 d Use of group passwords is limited to situations dictated by operational necessity or critical for mission accomplishment Use of a group User ID and password shall be approved by the appropriate AO IA-4 5 1 1 e Components shall prohibit passwords from being embedded in scripts or source code IA-5 5 1 1 f Components shall ensure that all passwords are stored in encrypted form IA-5 The use of a personal password by more than one individual is prohibited throughout the DHS However it is recognized that in certain circumstances such as the operation of crisis management or operations centers watch team and other duty personnel may require the use of group User IDs and passwords 5 2 Access Control Policy ID DHS Policy Statements Relevant Controls 5 2 a Components shall implement access control policy and procedures that provide protection from unauthorized alteration loss unavailability or disclosure of information AC-1 5 2 b Access control shall follow the principles of least privilege and separation of duties and shall require users to use unique identifiers Social Security Numbers shall not be used as login IDs AC-2 IA-1 5 2 c Users shall not provide their passwords to anyone including system administrators IA-5 5 2 d Emergency and temporary access authorization shall be strictly controlled and shall be approved by the Component CISO ISSM or his her designee prior to being granted AC-2 76 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 5 2 e System Owners shall ensure that users are assigned unique account identifiers AC-2 IA-4 5 2 f DHS systems with a FIPS 199 confidentiality categorization of high shall limit the number of concurrent sessions for any user to one 1 AC-10 5 2 1 Automatic Account Lockout Components shall configure each information system to lock a user’s account for a specified period following a specified number of consecutive failed logon attempts Users shall be locked from their account for a period of twenty 20 minutes after three consecutive failed logon attempts during a twenty-four 24 hour time period All failed logon attempts must be recorded in an audit log and periodically reviewed Policy ID DHS Policy Statements Relevant Controls 5 2 1 a Components shall configure accounts to automatically lock a user’s account after three consecutive failed logon attempts during a twenty-four 24 hour time period AC-7 5 2 1 b The automatic lockout period for accounts locked due to failed login attempts shall be set for twenty 20 minutes AC-7 5 2 1 c Components shall establish a process for manually unlocking accounts prior to the expiration of the twenty 20 minute period after sufficient user identification is established This may be accomplished through the help desk AC-7 5 2 2 Automatic Session Termination A session refers to a connection between a terminal device workstation laptop PED and a networked application or system This does not include a direct connection to a DHS network such as authenticating from a device that is directly connected to a DHS network A session also refers to accessing an application or system through the DHS network such as a database or networked application When a session is locked the user may resume activity by reauthenticating When a session is terminated the user is disconnected and all unsaved work is lost Policy ID 5 2 2 a DHS Policy Statements Components shall configure networked applications or systems to automatically lock any user session in accordance with the appropriate configuration guide In the absence of configuration guidance the session shall lock following twenty 20 minutes of inactivity 77 v8 0 March 14 2011 Relevant Controls AC-11 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 5 2 2 b Locked sessions shall remain locked until the user re-authenticates AC-11 5 2 2 c Sessions shall automatically be terminated after sixty 60 minutes of inactivity SC-10 5 2 3 Warning Banner The DHS CISO stipulates that a warning banner statement be displayed on all DHS systems during logon The most current language can be found on the DHS CISO web page Please note that the current warning banner was developed specifically for use on DHS workstations Due to differing function purpose and situation as well as length requirements warning banners for other environments such as routers switches and public-facing websites will be developed and included in a future version of the DHS 4300A Sensitive Systems Handbook The use of the warning banner serves as a reminder to all users that the computers they are accessing are Government computers Policy ID DHS Policy Statements Relevant Controls 5 2 3 a Systems internal to the DHS network shall display a warning banner stipulated by the DHS CISO AC-8 5 2 3 b Systems accessible to the public shall provide both a security and privacy statement at every entry point AC-8 78 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 5 3 Auditing Policy ID 5 3 a 5 4 DHS Policy Statements Audit records shall be sufficient in detail to facilitate the reconstruction of events if compromise or malfunction occurs or is suspected Audit records shall be reviewed as specified in the SP The audit record shall contain at least the following information - Identity of each user and device accessing or attempting to access the system - Time and date of the access and the logoff - Activities that might modify bypass or negate information security safeguards - Security-relevant actions associated with processing - All activities performed using an administrator’s identity Relevant Controls AU-3 5 3 b Audit records for financial systems or for systems hosting or processing PII shall be reviewed each month Unusual activity or unexplained access attempts shall be reported to the System Owner and Component CISO ISSM AU-6 5 3 c Components shall ensure that their audit records and audit logs are protected from unauthorized modification access or destruction AU-9 5 3 d Components shall ensure that audit logs are recorded and retained in accordance with the Component’s Record Schedule or the DHS Records Schedule At a minimum audit trail records shall be maintained online for at least ninety 90 days Audit trail records shall be preserved for a period of seven 7 years as part of managing records for each system to allow audit information to be placed online for analysis with reasonable ease AU-11 5 3 e Components shall evaluate the system risks associated with extracts of PII from databases If the risk is determined to be sufficiently high a procedure shall be developed for logging computer-readable data extracts If logging these extracts is not possible this determination shall be documented and compensating controls identified in the SP AU-1 AU-2 AU-3 PM-9 5 3 f Component SOCs shall implement both general and threat-specific logging AU-1 Network and Communications Security 5 4 1 Remote Access and Dial-In Remote access technology allows trusted employees to access DHS networks by dialing in via modem or accessing the DHS network via the Internet This allows mobile employees to stay in touch with the home office while traveling away from their normal work locations However there are significant security risks associated with remote access and dial-in capabilities Proper procedures can help mitigate these risks 79 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 5 4 1 a Data communication connections via modems shall be limited and shall be tightly controlled as such connections can be used to circumvent security controls intended to protect DHS networks Data communication connections are not allowed unless they have been authorized by the Component CISO ISSM Approved remote access to DHS networks shall only be accomplished through equipment specifically approved for that purpose Tethering through wireless PEDs is prohibited unless approved by the appropriate AO AC-4 AC-17 AU-2 SC-7 SC-8 SC-9 5 4 1 b Components shall centrally manage all remote access and dial-in connections to their systems and shall ensure that remote access and approved dial-in capabilities provide strong authentication two-factor authentication audit capabilities and protection for sensitive information throughout transmission DHS has an immediate goal that remote access shall only be allowed with twofactor authentication where one of the factors is provided by a device separate from the computer gaining access Any two-factor authentication shall be based on Department-controlled certificates or hardware tokens issued directly to each authorized user Remote access solutions shall comply with the encryption requirements of FIPS 140-2 Security Requirements for Cryptographic Modules See Privacy Controls Section Section 3 14 for additional requirements involving remote access of PII AC-4 AC-17 AU-2 SC-7 SC-8 SC-9 5 4 1 c Remote access of PII shall comply with all DHS requirements for sensitive systems including strong authentication Strong authentication shall be accomplished via virtual private network VPN or equivalent encryption and two-factor authentication The Risk Assessment and SP shall document any remote access of PII and the remote access shall be approved by the AO prior to implementation AC-4 AC-17 AU-2 SC-7 SC-8 SC-9 5 4 1 d Remote access of PII shall not permit the download and remote storage of information unless the requirements for the use of removable media with sensitive information have been addressed All downloads shall follow the concept of least privilege and shall be documented with the SP --- 5 4 2 Network Security Monitoring Security Monitoring Detection and Analysis are key functions and are critical to maintaining the security of DHS information systems Monitoring and analysis is limited to observing network activity for anomalies malicious activities and threat profiles Content analysis is not within the scope of network monitoring 80 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 5 4 2 a Components shall provide continuous monitoring of their networks for security events or outsource this requirement to the DHS EOC Monitoring includes interception and disclosure as required for the rendition of service or to protect the Department’s or Component’s rights or property Service observing or random monitoring shall not be used except for mechanical or service quality control checks As per the Electronic Communications Privacy Act In this instance “rights” refers to ownership or entitlements or property or information as in intellectual property SI-4 5 4 2 b The DHS EOC shall administer and monitor DHS intrusion detection system IDS sensors and security devices SI-4 5 4 2 c Component SOCs shall administer and monitor Component IDS sensors and security devices SI-4 5 4 3 Network Connectivity A system interconnection is the direct connection of two or more information systems for the purpose of sharing data and other information resources This applies to systems that pass data between each other via a direct system-to-system interface without human intervention Any physical connection that allows other systems to share data pass thru also constitutes an interconnection even if the two systems connected do not share data between them It does not include instances of a user logging on to add or retrieve data nor users accessing web-enabled applications through a browser Policy ID DHS Policy Statements Relevant Controls 5 4 3 a Components shall ensure that appropriate identification and authentication controls audit logging and access controls are implemented on every network element AC-1 AC-2 AU-1 AU-2 IA-1 IA-2 5 4 3 b Interconnections between DHS and non-DHS systems shall be established only through controlled interfaces and via approved service providers The controlled interfaces shall be accredited at the highest security level of information on the network Connections with other Federal agencies shall be documented based on interagency agreements memoranda of understanding service level agreements or interconnection security agreements CA-3 5 4 3 c Components shall document all interconnections to the DHS OneNet with an ISA signed by the OneNet AO and by each applicable AO Additional information regarding ISAs is published in Attachment N Preparation of Interconnection Security Agreements to the DHS 4300A Sensitive Systems CA-3 81 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls Handbook 5 4 3 d ISAs shall be reissued every three 3 years or whenever any significant changes have been made to any of the interconnected systems CA-3 5 4 3 e ISAs shall be reviewed and updated as needed as a part of the annual FISMA self-assessment CA-3 5 4 3 f Components may complete a master ISA which includes all transitioning systems as part of their initial OneNet transition After transition each additional system or GSS shall be required to have a separate ISA Interconnections between DHS Components not including DHS OneNet shall require an ISA whenever there is a difference in the security categorizations for confidentiality integrity and availability between the systems or when the systems do not share the same security policies In this context ‘security policies’ refers to the set of rules that controls a system’s working environment and not to DHS information security policy ISAs shall be signed by each applicable AO --- 5 4 3 g Components shall document interconnections between their own and external Non-DHS networks with an ISA for each connection CA-3 5 4 3 h The DHS CIO shall approve all interconnections between DHS enterpriselevel information systems and non-DHS information systems The DHS CIO shall ensure that connections with other Federal Government Agencies are properly documented A single ISA may be used for multiple connections provided that the security accreditation is the same for all connections covered by that ISA CA-3 5 4 3 i The Department and Components shall implement Trust Zones through Policy Enforcement Points PEP as defined in the DHS Security Architecture SC-7 5 4 3 j DHS OneNet shall provide secure Name Address resolution service Domain Name System Security Extensions DNSSEC has been designated as the DHS service solution SC-20 SC-21 SC-22 5 4 3 k All DHS systems connected to OneNet and operating at moderate or high level shall utilize secure Name Address resolution service provided by DHS OneNet SC-20 SC-21 SC-22 5 4 3 l The appropriate CCB shall ensure that documentation associated with an approved change to an information system is updated to reflect the appropriate baseline DHS systems that interface with OneNet shall also be subject to the OneNet CCB CM-3 82 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements 5 4 3 m Interconnections between two accredited DHS systems do not require an ISA if the interface characteristics security requirements nature of information communicated and monitoring procedures for verifying enforcement of security requirements are accounted for in the SPs or are described in another formal document such as a Service Level Agreement SLA or contract and the risks have been assessed and accepted by all involved AOs 5 4 3 n Granting the ability to log into one DHS system through another DHS system such as through OneNet trust does not require an ISA when the requirements from Section 5 4 3 m are met Relevant Controls CA-3 --- 5 4 4 Firewalls and Policy Enforcement Points Policy Enforcement Points PEP separate Trust Zones as defined in the DHS Security Architecture Boundary protection between DHS and external networks is implemented by firewalls at the TICs and other approved direct system inter-connections DHS TICs are provided by OneNet and monitored by the DHS EOC Component SOCs may protect DHS-internal boundaries across Trust Zones Policy ID DHS Policy Statements Relevant Controls 5 4 4 a Components shall restrict physical access to firewalls and PEP to authorized personnel AC-4 SC-7 5 4 4 b Components shall implement identification and strong authentication for administration of the firewalls and PEPs AC-4 SC-7 5 4 4 c Components shall encrypt remote maintenance paths to the firewalls and PEPs MA-4 SC-7 5 4 4 d Components shall conduct quarterly firewall and PEP testing to ensure that the most recent policy changes have been implemented and that all applied policies and controls are operating as intended SC-7 5 4 4 e Component SOCs shall ensure that reports on information security operations status and incident reporting are provided to the DHS CISO as required IR-6 5 4 4 f All Department and Component firewalls and PEPs shall be administered in coordination with DHS security operation capabilities through the DHS EOC or Component SOCs SC-7 5 4 4 g All DHS PEPs shall provide protection against denial-of-service attacks SC-5 83 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 5 4 4 h Components shall determine protocols and services permitted through their Component-level PEPs Components may restrict traffic sources and destinations at their Component-level PEPs SC-7 5 4 4 i The DHS CISO shall establish policy to block or allow traffic sources and destinations at the DHS TIC PEPs The DHS CISO policy shall prevent traffic as directed by the DHS CIO SC-7 5 4 4 j The DHS EOC shall oversee all enterprise PEPs --- 5 4 5 Internet Security Policy ID DHS Policy Statements Relevant Controls 5 4 5 a Any direct connection of OneNet DHS networks or DHS mission systems to the Internet or to extranets shall occur through DHS TIC PEPs The PSTN shall not be connected to OneNet at any time SC-7 5 4 5 b Firewalls and PEPs shall be configured to prohibit any protocol or service that is not explicitly permitted CM-7 SC-7 SC-8 SC-9 5 4 5 c Components shall ensure that all executable code including mobile code e g ActiveX JavaScript is reviewed and approved by the Program Manager prior to the code being allowed to execute within the DHS environment Note When the technology becomes available and code can be vetted for security the policy will be “Ensure that all approved code including mobile code e g ActiveX JavaScript is digitally signed by the designated DHS authority and that only signed code is allowed to execute on DHS systems ” SC-18 5 4 5 d Telnet shall not be used to connect to any DHS computer A connection protocol such as Secure Shell SSH that employs secure authentication two factor encrypted key exchange and is approved by the Component shall be used instead CM-7 SC-7 SC-8 SC-9 5 4 5 e File Transfer Protocol FTP shall not be used to connect to or from any DHS computer A connection protocol that employs secure authentication two factor encrypted key exchange and is approved by the Component shall be used instead CM-7 SC-7 SC-8 SC-9 5 4 5 f Remote Desktop connections such as Microsoft’s Remote Desktop Protocol RDP shall not be used to connect to or from any DHS computer without the use of an authentication method that employs secure authentication twofactor encrypted key exchange AC-17 IA-2 84 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID 5 4 5 g DHS Policy Statements In order to ensure the security and availability of DHS information and information systems the DHS CIO or DHS CISO may direct that specific Internet websites or categories be blocked at the DHS TICs on advice from US-CERT the DHS EOC or other reputable sources Relevant Controls --- 5 4 6 Email Security The DHS email gateway Steward provides email monitoring for spam and virus activity at the gateway DHS EOC personnel shall be trained to respond to incidents pertaining to email security and shall assist the email Steward as necessary Components shall provide appropriate security for their email systems Policy ID DHS Policy Statements Relevant Controls 5 4 6 a Components shall correctly secure install and configure the underlying email operating system --- 5 4 6 b Components shall correctly secure install and configure mail server software --- 5 4 6 c Components shall secure and filter email content --- 5 4 6 d Components shall deploy appropriate network protection mechanisms such as --- - Firewalls - Routers - Switches - Intrusion detection systems 5 4 6 e Components shall secure mail clients --- 5 4 6 f Components shall conduct mail server administration in a secure manner This includes --- - Performing regular backups - Performing periodic security testing - Updating and patching software - Reviewing audit logs at least weekly 5 4 6 g The DHS email gateway Steward shall provide email monitoring for malware activity at the gateway SI-3 5 4 6 h The DHS email gateway Steward shall provide email monitoring for spam at the gateway SI-8 85 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 5 4 6 i Auto-forwarding or redirecting of DHS email to address outside of the gov or mil domain is prohibited and shall not be used Users may manually forward individual messages after determining that the risk or consequences are low --- 5 4 6 j All DHS email systems are required to use the common naming convention with distinguishing identifiers for military officers contractors foreign nationals and U S Government personnel from other Departments and agencies --- Note Due to the significant risk associated with HTML email DHS is considering following the lead of the Department of Defense DoD and moving to text based email 5 4 7 Personal Email Accounts Policy ID DHS Policy Statements Relevant Controls 5 4 7 a The use of Internet webmail Gmail Yahoo AOL or other personal email accounts is not authorized over DHS furnished equipment or network connections --- 5 4 7 b When sending email to an address outside of the gov or mil domain users shall ensure that any sensitive information particularly PII is attached as an encrypted file --- 5 4 8 Testing and Vulnerability Management The DHS EOC takes a proactive approach to vulnerability management including detecting vulnerabilities through testing reporting through ISVM messages and conducting Vulnerability Assessments VA Vulnerability management is a combination of detection assessment and mitigation of weaknesses within a system Vulnerabilities may be identified from a number of sources including reviews of previous risk assessments audit reports vulnerability lists security advisories and system security testing such as automated vulnerability scanning or security assessments Core elements of vulnerability management include continuous monitoring and mitigating the discovered vulnerabilities based on a risk management strategy This strategy accounts for vulnerability severity threats and assets at risk Policy ID 5 4 8 a DHS Policy Statements Components shall conduct vulnerability assessments and or testing to identify security vulnerabilities on information systems containing sensitive information annually or whenever significant changes are made to the information systems This shall include scanning for unauthorized wireless 86 v8 0 March 14 2011 Relevant Controls --- DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls devices Evidence that annual assessments have been conducted shall be included in SARs and with annual security control assessments 5 4 8 b Component CISOs ISSMs shall approve and manage all activities relating to requests for Vulnerability Assessment Team VAT assistance in support of incidents internal and external assessments and on-going SLC support --- 5 4 8 c Component CISOs ISSMs or their designated representatives shall acknowledge receipt of ISVM messages SI-5 5 4 8 d Components shall report compliance with the ISVM message within the specified timeframe Components unable to meet the designated compliance timeframe shall submit documentation of a waiver request via the DHS EOC Online Portal https eoconline dhs gov SI-5 5 4 8 e When vulnerability assessment responsibilities encompass more than one Component Component CISOs ISSMs shall coordinate with the relevant Component SOC and the DHS EOC RA-3 5 4 8 f The DHS EOC shall be notified before any ISVM scans are run RA-5 5 4 8 g System Owners shall report the security alert and advisory status of the information system to the AO Component CISO ISSM and DHS CISO upon request and on a periodic basis SI-5 5 4 9 Peer-to-Peer Technology Policy ID 5 4 9 a 5 5 DHS Policy Statements Peer to peer software technology is prohibited on any DHS information system Relevant Controls CM-7 SA-6 Cryptography Cryptography is a branch of mathematics that deals with the transformation of data Transformation converts ordinary text plaintext into coded form ciphertext by encryption and ciphertext into plaintext by decryption 5 5 1 Encryption Encryption is the process of changing plaintext into ciphertext for the purpose of security or privacy 87 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID 5 5 1 a DHS Policy Statements Systems requiring encryption shall comply with the following methods Products using FIPS 197 Advanced Encryption Standard AES algorithms with at least 256 bit encryption that has been validated under FIPS 140-2 National Security Agency NSA Type 2 or Type 1 encryption Note The use of triple Data Encryption Standard 3DES and FIPS 140-1 is no longer permitted Relevant Controls IA-7 SC-13 5 5 1 b Components shall develop and maintain encryption plans for sensitive information systems IA-7 SC-13 5 5 1 c Components shall use only cryptographic modules that are FIPS 197 AES256 compliant and have received FIPS 140-2 validation at the level appropriate to their use IA-7 SC-13 5 5 2 Public Key Infrastructure A PKI is an architected set of systems and services that provide a foundation for enabling the use of public key cryptography This is necessary in order to implement strong security services and to allow the use of digital signatures The principal components of a PKI are the public key certificates registration authorities RA certification authorities CA directory certificate revocation lists CRL and a governing certificate policy CP Policy ID DHS Policy Statements Relevant Controls 5 5 2 a The DHS CISO shall be the DHS PKI Policy Authority PKI PA to provide PKI policy oversight A detailed description of DHS PKI PA roles and responsibilities are provided in the DHS PKI Policy SC-17 5 5 2 b The DHS CISO shall represent DHS on the Federal PKI Policy Authority FPKI PA SC-17 5 5 2 c The DHS PKI PA shall appoint a PKI Management Authority PKI MA to provide management and operational oversight of the DHS PKI A detailed description of DHS PKI MA roles and responsibilities are provided in the DHS PKI Policy SC-17 5 5 2 d The DHS PKI shall be governed by the U S Common Policy Framework certificate policy approved by the FPKI PA and the DHS PKI Policy approved by the DHS PKI PA SC-17 5 5 2 e DHS shall have a single DHS Principal CA that is subordinate to the U S Common Policy Root CA The DHS Principal CA shall be operated for DHS by the Department of Treasury DoT under the Federal Shared Service Provider SSP program SC-17 88 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 5 5 2 f All additional CAs within DHS must be subordinate to the DHS Principal CA The requirements and process for becoming a subordinate CA to the DHS Principal CA shall be specified in the DHS PKI Policy SC-17 5 5 2 g Components that implement a CA shall ensure that the CA is subordinate to the DHS Principal CA SC-13 5 5 2 h All DHS CAs shall have a trust path resolving to the U S Common Policy Root CA The U S Common Policy Root CA is cross-certified with the Federal Bridge CA at the high medium hardware and medium assurance levels SC-17 5 5 2 i The DHS Principal CA shall operate under an X 509 Certification Practices Statement CPS The CPS shall comply with the U S Common Policy Framework DoT as the SSP for DHS approves the CPS for the DHS Principal CA SC-17 5 5 2 j All DHS CAs subordinate to the DHS Principal CA shall operate under an X 509 CPS The CPS shall comply with the U S Common Policy Framework and the DHS PKI Policy The DHS PKI PA must approve the CPS SC-17 5 5 2 k The DHS PKI PA shall ensure that the CPS for each subordinate DHS CA complies with the U S Common Policy Framework and DHS PKI Policy prior to approval SC-17 5 5 2 l The DHS PKI MA shall ensure that every subordinate DHS CA operates in compliance with its approved CPS SC-17 5 5 2 m All DHS CAs shall undergo regular PKI compliance audits as required by the U S Common Policy Framework and the DHS PKI Policy The DHS PKI PA shall approve the auditor The audit findings report and POA Ms to address deficiencies found shall be provided to the DHS PKI PA and DHS PKI MA SC-17 5 5 2 n All DHS CAs shall archive records as required by the U S Common Policy Framework and their CPS SC-17 5 5 2 o All operational PKI facilities shall be established in accordance with U S Common Policy Framework physical security requirements based on the CA’s assurance level and its intended use Location protection of the CA shall be determined by its level of assurance Measures taken to ensure the continuity of PKI operations shall at least provide the same level of availability of PKI Services as the individual and composite availability requirements of the systems and data protected by the certificates SC-17 89 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls 5 5 2 p The DHS Principal CA and DHS subordinate CAs shall only issue certificates to internal DHS entities e g employees contractors roles groups applications code signers and devices External entities who require certificates to securely interact with DHS shall acquire certificates from a nonDHS PKI that is cross-certified with the FBCA at medium assurance or above SC-17 5 5 2 q Only the DHS Principal CA shall issue certificates to DHS employees contractors roles code signers and other human entities including certificates for DHS HSPD-12 Personal Identify Verification PIV Cards The DHS Principal CA may also issue all other types of certificates allowed under the U S Common Policy to internal DHS entities SC-17 5 5 2 r DHS Subordinate CAs shall only issue certificates to internal non-human entities Any additional restrictions on the types of certificates that may be issued by a specific subordinate DHS CA shall be determined during the subordination process and approved by the DHS PKI PA SC-17 5 5 2 s The use by DHS of any non-DHS service provider for CA or PKI services is prohibited unless approved by the DHS CISO SC-13 5 5 2 t Only certificates that are issued by the DHS Principal CA or a subordinate DHS CA under the U S Common Policy Framework at medium assurance or above shall be used to protect sensitive DHS data or to authenticate to operational systems containing sensitive data Certificates issued by DHS CAs that are not established as subordinate to the DHS Principal CA certificates issued by test pilot third party self-signed or other CAs shall not be used to protect sensitive data or to authenticate to DHS operational systems containing sensitive data SC-17 5 5 3 Public Key Private Key A public key certificate is used to obtain subscribers’ public keys in a trusted manner Once obtained the public key is then used • To encrypt data for that subscriber so that only that subscriber can decrypt it • To verify that digitally signed data was signed by that subscriber thereby authenticating the identity of the signing subscriber and the integrity of the signed data Policy ID DHS Policy Statements Relevant Controls 5 5 3 a Separate public private key pairs must be used for encryption and digital signature by human subscribers organization subscribers application subscribers and code-signing subscribers SC-12 5 5 3 b Separate public private key pairs must be used for encryption and digital signature by device subscribers whenever supported by the protocols native to SC-12 90 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements Relevant Controls the type of device 5 5 3 c A human sponsor shall represent each application role code-signing and device subscriber when it applies for one or more certificates from a DHS CA SC-12 5 5 3 d An authorized DHS employee shall sponsor DHS contractors and other affiliates when they apply for one or more certificates from a DHS CA SC-12 5 5 3 e A mechanism shall be provided for each DHS CA to enable PKI registrars to determine the eligibility of each proposed human role application code signer or device to receive one or more certificates SC-12 5 5 3 f A mechanism shall be provided for each DHS CA to enable PKI registrars to determine and verify the identity of the authorized human sponsor for each DHS contractor affiliate role application code signer or device SC-12 5 5 3 g Human subscribers shall not share private keys and shall be responsible for their security and use If a human subscriber discloses or shares his or her private key the subscriber shall be accountable for all transactions signed with the subscriber’s private key 5 5 3 h Sponsors for non-human subscribers role application code-signing or device shall be responsible for the security of and use of the subscriber’s private keys Every sponsor shall read understand and sign a “DHS PKI Device Sponsor Agreement” as a pre-condition for sponsoring non-human subscribers SC-17 5 5 3 i Subscriber private keys shall not be used by more than one entity with the following exception Multiple devices in a high availability configuration may use a single Secure Socket Layer SSL Subject Alternative Name SAN certificate and thus use the same key pair SC-12 5 5 3 j Every human subscriber shall read understand and sign a “DHS PKI Human Subscriber Agreement” as a pre-condition for receiving certificates from a DHS CA These signed agreements shall be maintained by the DHS PKI MA SC-17 5 6 --- Malware Protection Policy ID DHS Policy Statements Relevant Controls 5 6 a Component CISOs ISSMs shall establish and enforce Component-level malware protection control policies SI-3 5 6 b Components shall implement a defense-in-depth strategy that SI-3 - Installs antivirus software on desktops and servers 91 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID 5 6 c 5 7 DHS Policy Statements - Configures antivirus software on desktops and servers to check all files downloads and email - Installs updates to antivirus software and signature files on desktops and servers in a timely and expeditious manner without requiring the end user to specifically request the update - Installs security patches to desktops and servers in a timely and expeditious manner System Owners shall develop and enforce procedures to ensure proper malware scanning of media prior to installation of primary hard drives software with associated files and other purchased products Relevant Controls AC-20 SI-3 Product Assurance Policy ID DHS Policy Statements Relevant Controls 5 7 a Information Assurance IA shall be considered a requirement for all systems used to input process store display or transmit sensitive or national security information IA shall be achieved through the acquisition and appropriate implementation of evaluated or validated COTS IA and IA-enabled IT products These products shall provide for the availability of systems The products also shall ensure the integrity and confidentiality of information and the authentication and nonrepudiation of parties in electronic transactions --- 5 7 b Strong preference shall be given to the acquisition of COTS IA and IAenabled IT products to be used on systems entering processing storing displaying or transmitting sensitive information that have been evaluated and validated as appropriate in accordance with the following --- - The NIST FIPS validation program - The NSA NIST National Information Assurance Partnership NIAP Evaluation and Validation Program - The International Common Criteria for Information Security Technology Evaluation Mutual Recognition Agreement 5 7 c The evaluation and validation of COTS IA and IA-enabled products shall be conducted by accredited commercial laboratories or by NIST --- 5 7 d Components shall use only cryptographic modules that meet the requirements set forth in Section 5 5 Cryptography --- 5 7 e Transaction-based systems e g database management systems transaction processing systems shall implement transaction rollback and transaction --- 92 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Policy ID DHS Policy Statements journaling or technical equivalents 93 v8 0 March 14 2011 Relevant Controls DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A 6 0 DOCUMENT CHANGE REQUESTS Changes to DHS Sensitive Systems Policy Directive 4300A and to the DHS 4300A Sensitive Systems Handbook may be requested in accordance with Section 1 7 Changes to Policy 7 0 QUESTIONS AND COMMENTS For clarification of DHS information security policies or procedures contact the DHS Director for Information Systems Security Policy at INFOSEC@dhs gov 94 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A APPENDIX A ACRONYMS AC Access Control AES Advanced Encryption Standards AO Authorizing Official ARB Acquisition Review Board AT Awareness and Training ATO Authority to Operate AU Audit and Accountability BI Background Investigation BIA Business Impact Assessment BLSR Baseline Security Requirements CA Certificate Authority Certification Accreditation and Security Assessments CCB Change Control Board CFO Chief Financial Officer CI Counter-Intelligence C-I-A Confidentiality Integrity and Availability CIO Chief Information Officer CISID Chief Internal Security and Investigations Division CISO Chief Information Security Officer CM Configuration Management CMG Core Management Group CMP Configuration Management Plan CO Certifying Official CONOPS Concept of Operations COOP Continuity of Operations Plan Continuity of Operations Planning COTS Commercial off the Shelf CP Contingency Plan Contingency Planning Certificate Policy 95 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A CPIC Capital Planning and Investment Control CPS Certificate Practices Statement CRE Computer-Readable Extract CRL Certificate Revocation List CSIRC Computer Security Incident Response Center CSO Chief Security Officer CUI Control Unclassified Information DES Digital Encryption Standards DHS Department of Homeland Security DNSSEC Domain Name System Security Extensions DoD Department of Defense DoS Department of State DoT Department of Treasury EA Enterprise Architecture EAB Enterprise Architecture Board EO Executive Order EOC Enterprise Operations Center FBCA Federal Bridge Certification Authority FDCC Federal Desktop Core Configuration FICAM Federal Identity Credentialing and Access Management FIPS Federal Information Processing Standard FISMA Federal Information Security Management Act FOUO For Official Use Only FPKI PA Federal PKI Policy Authority FTP File Transfer Protocol FYHSP Future Years Homeland Security Program GSA General Services Administration GSS General Support System HIPAA Health Insurance Portability and Accountability Act HSAR Homeland Security Acquisition Regulations 96 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A HSDN Homeland Secure Data Network HSPD Homeland Security Presidential Directive HVAC Heating Ventilation and Air Conditioning IA Identification and Authentication Information Assurance IATO Interim Authority to Operate ICAM Identity Credentialing and Access Management IDS Intrusion Detection System IR Incident Response Infrared IRB Investment Review Board ISA Interconnection Security Agreement ISO Information Security Office ISSO Information System Security Officer ISVM Information System Vulnerability Management JWICS Joint Worldwide Intelligence Communications System IT Information Technology LAN Local Area Network LE Law Enforcement LMR Land Mobile Radio MA Maintenance Major Application MBI Minimum Background Investigation MD Management Directive MMS Multimedia Messaging Service MP Media Protection NIAP National Information Assurance Partnership NIST National Institute of Standards and Technology NOC Network Operations Center NSA National Security Agency OCIO Office of the Chief Information Officer 97 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A OID Object identifier OIG Office of Inspector General OIS Office of Information Security OMB Office of Management and Budget OPA Office of Public Affairs OPM Office of Personnel Management OTAR Over-The-Air-Rekeying PA Policy Authority PBX Private Branch Exchange PCS Personal Communications Services PDA Personal Digital Assistant PE Physical and Environmental Protection PED Portable Electronic Device PEP Policy Enforcement Point PHI Protected Health Information PIRT Privacy Incident Response Team PIA Privacy Impact Assessment PII Personally Identifiable Information PIN Personal Identity Number PIV Personal Identity Verification PKI Public Key Infrastructure PKI PA PKI Policy Authority PKI PM PKI Management Authority PL Planning PM Program Manager Program Management PNS Protected Network Services POA M Plan of Action and Milestones POC Point of Contact PPOC Privacy Point of Contact PS Personnel Security 98 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A PSTN Public Switched Telephone Network PTA Privacy Threshold Analysis RA Risk Assessment Registration Authority RDP Remote Desktop Protocol RF Radio Frequency RFID Radio Frequency Identification RMS Risk Management System SA Security Architecture System and Services Acquisition SAN Subject Alternative Name SAR Security Assessment Report SAISO Senior Agency Information Security Officer SAOP Senior Agency Official for Privacy SC System and Communications Protection SCI Sensitive Compartmented Information SELC Systems Engineering Life Cycle SI System and Information Integrity SLA Service Level Agreement SMS Short Message Service SOC Security Operations Center SOP Standard Operating Procedure SORN System of Records Notice SP Special Publication Security Plan SSH Secure Shell SSL Secure Socket Layer SSP Shared Service Provider TAF TrustedAgent FISMA TFPAP Trust Framework Provider Adoption Process TIC Trusted Internet Connections 99 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A TOS Terms of Service TRM Technical Reference Model TS Top Secret US-CERT United States Computer Emergency Readiness Team VA Vulnerability Assessment VAT Vulnerability Assessment Team USGBC U S Government Configuration Baseline VoIP Voice over Internet Protocol VPN Virtual Private Network WLAN Wireless Local Area Network WPAN Wireless Personal Area Network WWAN Wireless Wide Area Network 100 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A APPENDIX B GLOSSARY The following definitions apply to the policies and procedures outlined in this document Other definitions may be found in NIST IR 7298 Glossary of Key Information Security Terms and the National Information Assurance IA Glossary Acceptable Risk Mission organizational or program-level risk deemed tolerable by the RE after adequate security has been provided Accreditation Package The documents submitted to the AO for the Accreditation Decision An Accreditation Package consists of Accreditation Decision Letter Security Plan - criteria provided on when the plan should be updated Security Assessment Report - updated on an ongoing basis whenever changes are made to either the security controls in the information system or the common controls inherited by those systems Plan of Action and Milestones Adequate Security Security commensurate with the risk and the magnitude of harm resulting from the loss misuse or unauthorized access to or modification of information OMB Circular A-130 Appendix III Annual Assessment DHS activity for meeting the annual FISMA self-assessment requirement Authorizing Official AO An official within a Federal Government agency who can grant approval for a system to operate Cellular phone A mobile device used for voice communication irrespective of the communications technology employed Certification Certifying Agent A contractor that performs certification tasks as designated by the CO Certifying Authority CA Obsolete term see Security Control Assessor Security Control Assessor A senior management official who certifies the results of the security assessment He or she must be a Federal Government employee Chief Information Officer CIO The executive within a Federal Government agency responsible for its information systems 101 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Compensating Control An internal control intended to reduce the risk of an existing or potential control weakness Component A DHS Component is any of the entities within DHS including all DHS offices and independent agencies Computer Security Incident Response Center DHS organization that responds to computer security incidents Designated Approval Authority DAA Obsolete term see Authorizing Official AO Information System Any information technology that is 1 owned leased or operated by any DHS Component 2 operated by a contractor on behalf of DHS or 3 operated by another Federal state or local Government agency on behalf of DHS Information systems include general support systems and major applications Enterprise Operations Center EOC The DHS organization that coordinates security operations for the DHS Enterprise Exception Acceptance to permanently operate a system that does not comply with policy For Official Use Only The marking instruction or caveat “For Official Use Only” will be used to identify sensitive but unclassifed information within the DHS community that is not otherwise specifically described and governed by statute or regulation General Support System GSS An interconnected set of information resources under the same direct management control and sharing common functionality A GSS normally includes hardware software information applications communications data and users Information Security Vulnerability Management ISVM DHS system that provides notification of newly discovered vulnerabilities and tracks the status of vulnerability resolution Information System Security Officer ISSO Someone who implements and or monitors security for a particular system Information Technology Any equipment or interconnected system or subsystem of equipment that is used in the automatic acquisition storage manipulation management movement control display switching interchange transmission or reception of data or information 102 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Major Application MA An automated information system AIS that “requires special attention to security due to the risk and magnitude of harm resulting from the loss misuse or unauthorized access to or modification of the information in the application” in accordance with OMB Circular A-130 An MA is a discrete application whereas a GSS may support multiple applications Management Controls The security controls for an information system that focus on the management of risk and the management of information system security Operational Controls The security controls for an information system that are primarily implemented and executed by people as opposed to systems Operational Risk The risk contained in a system under operational status It is the risk that an AO accepts when granting an ATO Personally Identifiable Information PII Any information that permits the identity of an individual to be directly or indirectly inferred including any other information that is linked or linkable to an individual regardless of whether the individual is a U S Citizen legal permanent resident or a visitor to the U S Pilot A test system in the production environment that may contain operational data and may be used to support DHS operations typically in a limited way Policy Statement A high-level rule for guiding actions intended to achieve security objectives Policy Enforcement Point PEP A firewall or similar device that can be used to restrict information flow Portable Electronic Device PED A device that has a battery and is meant to process information without being plugged into an electric socket it is often handheld but can be a laptop computer Privacy Sensitive System Any system that collects uses disseminates or maintains PII or sensitive PII Production Operational as in “production system” or “production environment ” Prototype A test system in a test environment that must not contain operational data and must not be used to support DHS operations Remote Access Access to a DHS information system by a user or an information system communicating through an external non-DHS-controlled network e g the Internet Residual Risk The risk remaining after security controls have been applied 103 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Risk Executive RE An individual who ensures that risks are managed consistently across the organization An RE can be at the Departmental or Component level Security Control A particular safeguard or countermeasure to protect the confidentiality integrity and availability of a system and its information Security Incident An occurrence that actually or potentially jeopardizes the confidentiality integrity or availability of an information system or the information the system processes stores or transmits or that constitutes a violation or imminent threat of violation of security policies security procedures or acceptable use policies Security Operations Center SOC The DHS Component organization that coordinates security operations within its Component Security Requirement A formal statement of action or process applied to an information system and its environment in order to provide protection and attain security objectives Security requirements for any given system are contained in its Security Plan Senior Agency Information Security Official SAISO The point of contact within a Federal Government agency responsible for its information system security Sensitive But Unclassified Obsolete designation see Sensitive Information Sensitive Information Information not otherwise categorized by statute or regulation that if disclosed could have an adverse impact on the welfare or privacy of individuals or on the welfare or conduct of Federal Government programs or other programs or operations essential to the national interest Sensitive Personally Identifiable Information Sensitive PII PII that requires stricter handling guidelines because of the nature of the data and the increased risk to an individual if compromised and if lost compromised or disclosed without authorization could result in substantial harm embarrassment inconvenience or unfairness to an individual Examples of sensitive PII include Social Security numbers or alien number A-number Significant Incident A computer security-related incident that represents a meaningful threat to the DHS mission and requires immediate leadership notification Spam E-mails containing unwanted commercial solicitation fraudulent schemes and possibly malicious logic Strong Authentication Layered authentication approach relying on two or more authenticators to establish the identity of an originator or receiver of information System A discrete set of information system assets contained within the accreditation boundary 104 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A System Owner Technical Controls The security controls for an information system that are primarily implemented and executed by the information system through mechanisms contained in the hardware software or firmware elements of the system Two-Factor Authentication Authentication can involve something the user knows e g a password something the user has e g a smart card or something the user “is” e g a fingerprint or voice pattern Single-factor authentication uses only one of the three forms of authentication while two-factor authentication uses any two of the three forms Three-factor authentication uses all three forms Unclassified Information Information that has not been determined to be classified pursuant to Executive Order 13526 as amended USB Device A device that can be connected to a computer by its USB plug USB Drive A memory device small enough to fit into a pocket and that connects to a computer by its USB plug Vulnerability Scanning An automated scan for potential security vulnerabilities Waiver Acceptance to temporarily operate a system that does not comply with policy while working towards compliance 105 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A APPENDIX C REFERENCES The DHS information security program and organization are based upon public laws executive orders national policy external guidance and internal DHS guidance Public Laws and U S Code • Privacy Act of 1974 As Amended 5 United States Code U S C 552a Public Law 93579 Washington DC July 14 1987 • Public Law 107-347 E-Government Act of 2002 including Title III Federal Information Security Management Act FISMA • Public Law 104-106 Clinger-Cohen Act of 1996 formerly Information Technology Management Reform Act ITMRA • 5 Code of Federal Regulations CFR §2635 Office of Government Ethics Standards of Ethical Conduct for Employees of the Executive Branch • Public Law 100-235 Computer Security Act of 1987 as amended • Public Law 93-579 Freedom of Information Act of 2002 as amended Executive Orders • Executive Order 13526 Classified National Security Information December 29 2009 • Homeland Security Presidential Directive 12 Policy for a Common Identification Standard for Federal Employees and Contractors August 27 2004 Office of Management and Budget Directives • Office of Management and Budget OMB Circular A-130 Management of Federal Information Resources • OMB Bulletin 06-03 Audit Requirements for Federal Financial Statements • OMB Memorandum M-04-04 E-Authentication Guidance for Federal Agencies December 16 2003 • OMB Memorandum M-06-15 Safeguarding Personally Identifiable Information May 22 2006 • OMB Memorandum M-06-16 Protection of Sensitive Agency Information June 23 2006 • OMB Memorandum M-07-16 Safeguarding Against and Responding to the Breach of Personally Identifiable Information May 22 2007 • OMB Memorandum M-09-02 Information Technology Management Structure and Governance Framework October 21 2008 • OMB Memorandum 10-15 FY 2010 Reporting Instructions for the Federal Information Security Management Act and Agency Privacy Management April 21 2010 106 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A • OMB Memorandum 10-28 Clarifying Cybersecurity Responsibilities and Activities of the Executive Office of the President and the Department of Homeland Security DHS July 6 2010 • OMB Memorandum 11-06 WikiLeaks - Mishandling of Classified Information November 28 2010 Other External Guidance • Intelligence Community Directive Number 508 Intelligence Community Information Technology Systems Security Risk Management Certification and Accreditation September 15 2008 • National Institute of Standards and Technology NIST Federal Information Processing Standards FIPS including o NIST FIPS 200 Minimum Security Requirements for Federal Information and Information Systems o NIST FIPS 199 Standards for Security Categorization of Federal Information and Information Systems • NIST Information Technology Security Special Publications SP 800 series including o NIST SP 800-16 Rev 1 Information Technology Security Training Requirements A Role- and Performance-Based Model Draft o NIST SP 800-34 Rev 1 Contingency Planning Guide for Information Technology Systems o NIST SP 800-37 Rev 1 Guide for Applying the Risk Management Framework to Federal Information Systems A Security Life Cycle Approach o NIST SP 800-39 Integrated Enterprise-Wide Risk Management Organization Mission and Information System View Draft o NIST SP 800-50 Building an Information Technology Security Awareness and Training Program o NIST SP 800-52 Guidelines for the Selection and Use of Transport Layer Security TLS Implementations o NIST SP 800-53 Rev 3 Recommended Security Controls for Federal Information Systems and Organizations o NIST SP 800-53A Rev 1 Guide for Assessing the Security Controls in Federal Information Systems o NIST SP 800-60 Guide for Mapping Types of Information and Information Systems to Security Categories 2 Volumes - Volume 1 Guide Volume 2 Appendices o NIST SP 800-63 Rev 1 Electronic Authentication Guideline Draft o NIST SP 800- 65 Rev 1 Recommendations for Integrating Information Security into the Capital Planning and Investment Control Process CPIC Draft 107 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A o NIST SP 800-88 Guidelines for Media Sanitization o NIST SP 800-92 Guide to Computer Security Log Management o NIST SP 800-94 Guide to Intrusion Detection and Prevention Systems IDPS o NIST SP 800-95 Guide to Secure Web Services o NIST SP 800-100 Information Security Handbook A Guide for Manager o NIST SP 800-115 Technical Guide to Information Security Testing and Assessment o NIST SP 800-118 Guide to Enterprise Password Management Draft o NIST SP 800-122 Guide to Protecting the Confidentiality of Personally Identifiable Information PII o NIST SP 800-123 Guide to General Server Security o NIST SP 800-124 Guidelines on Cell Phone and PDA Security o NIST SP 800-128 Guide for Security Configuration Management of Information Systems Draft o NIST SP 800-137 Information Security Continuous Monitoring for Federal Information Systems and Organizations Draft • NIST IR 7298 Glossary of Key Information Security Terms • CNSS Instruction No 4009 National Information Assurance Glossary • CNSS Instruction No 1001 National Instruction on Classified Information Spillage Internal Guidance • Department of Homeland Security Acquisition Regulation HSAR • DHS Management Directives MD especially o MD 140-01 Information Technology Systems Security o MD 11042 1 Safeguarding Sensitive but Unclassified For Official Use Only Information o MD 102-01 Acquisition Management o MD 1030 Corrective Action Plans o MD 4400 1 DHS Web and Information Systems o MD 4500 1 DHS Email Usage o MD 4600 1 Personal Use of Government Office Equipment o MD 4900 Individual Use and Operation of DHS Information Systems Computers o MD 11055 Suitability Screening Requirements for Contractor Employees 108 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A APPENDIX D Version DOCUMENT CHANGE HISTORY Date Description 0 1 December 13 2002 Draft Baseline Release 0 2 December 30 2002 Revised Draft 0 5 January 27 2003 Day One Interim Policy 1 0 June 1 2003 Department Policy 1 1 December 3 2003 Updated Department Policy 2 0 March 31 2004 Content Update 2 1 July 26 2004 Content Update 2 2 February 28 2005 Content Update 2 3 March 7 2005 Content Update 3 0 March 31 2005 Includes updates to PKI Wireless Communications and Media Sanitization now Media Reuse and Disposition sections 3 1 July 29 2005 New policies 3 1b e f 3 1g 4 1 5b 4 8 4a Modified policies 3 7b c 3 9b g 3 10a 4 3 1b 4 8 2a 4 8 5e 5 1 1b 5 2 2a 5 3a c 5 4 1a 5 4 5d 5 4 8c 5 5 1a 5 7d Policies relating to media disposal incorporated into policies within Media Reuse and Disposition section Deleted policy regarding use of automated DHS tool for conducting vulnerability assessments 3 2 October 1 2005 Modified policies 3 8b 4 8 1a 5 2 1a b 5 2 2a and 5 4 3c combined with modifications policies 4 1e and 4 1f modified Section 1 5 3 3 December 30 2005 New policies policies 3 9a–d 3 11 1b 4 3 1a 4 6c 5 4 3d e Modified policies policies 3 9i j 4 3 2a 4 6a b 4 6 1e 4 6 2j 4 6 2 1a 4 6 3e 5 4 3c 5 5 2k Modified sections 2 5 2 7 2 9 2 11 3 9 5 5 2 4 0 June 1 2006 New policies 3 5 3 c g 4 6 2 3 c 5 1 c 5 2 c 5 4 1 a Modified policies 3 5 1 c 3 5 3 d–f 3 7 a b 3 9 a b d 4 1 4 b c 4 2 1 a 4 3 1 a 4 6 c 4 6 1 a 4 6 2 f 4 10 3 a 5 2 1 b 5 3 a b 5 4 1 b 5 4 3 c 5 4 5 d Modified section Section 2 9 4 1 September 8 2006 New policies 3 14 1 a–c 3 14 3 a–c 4 10 1 c 5 3 d e 5 4 1 c–e Modified policies 3 9 b 4 6 2 d 4 8 2 a–c 4 10 1 b 5 1 c 5 3 c 5 4 1 b New sections 3 14 3 14 1 3 14 3 Modified sections 2 9 4 8 2 4 2 September 29 2006 New policies 4 6 4 a–f Modified policies 4 3 3 a–c New section 4 6 4 5 0 March 1 2007 New policies 4 1 5 h Modified policies 3 10 c 4 1 1 d 4 1 5 a b f g 4 6 2 d 4 6 3 f 5 2 c 5 4 8 a 5 6 b New sections 4 1 1 Modified 109 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description sections 1 2 1 4 2 1 4 3 2 9 3 12 4 1 and subsections 4 6 1–4 6 4 4 9 5 2 1 Renumbered sections 4 1 2–4 1 6 4 9 4 10 4 11 4 12 5 1 April 18 2007 Update based on SOC CONOPS Final Version 1 4 1 April 6 2007 Adds DHS Chief Financial Officer – Designated Financial Systems Updates the term Sensitive But Unclassified to For Official Use Only 5 2 June 1 2007 Updates Sections 2 7 2 9 2 12 3 3 3 5 1 3 5 3 3 6 3 8 3 9 3 10 3 14 3 15 4 1 5 4 1 6 4 10 4 12 5 1 1 5 2 5 3 5 4 1 5 4 3 5 4 4 5 4 8 5 5 1 5 7 5 3 August 3 2007 Revised policy in Sections 3 5 1 and 5 5 1 and removed Section 3 5 2 Removed Sections 3 11 2 and 3 11 4 5 4 October 1 2007 Content update incorporation of change requests 5 5 September 30 2007 Section 1 0 1 1 – Added text regarding policy implementation and DHS security compliance tool updates 1 2 – Removed two references from list deleted various from citation of standards Section 2 0 2 0 – Insert the following after the first sentence in the second paragraph “Security is an inherently governmental responsibility Contractors and other sources may assist in the performance of security functions but a government individual must always be designated as the responsible agent for all security requirements and functions ” 2 3 – Removed parentheses from in writing Section 3 0 3 9 – Inserted new policy element “l” regarding CISO concurrence for accreditation 3 15 – Added text regarding Component CFOs and ISSMs Section 4 0 4 1 1 – Capitalized “Background ” and added BI 4 3 1 – Two new elements were added to the policy table 4 7 – Inserted where required or appropriate before the sentence 4 8 3 – Title changed to “Personally Owned Equipment and Software not owned by or contracted for by the Government ” 4 8 6 – Included new section regarding wireless settings for peripheral equipment Section 5 0 5 1c – Changed inactive accounts to “disable user identifiers after forty-five 45 days of inactivity ” 5 1 1 – First sentence of the second paragraph was rewritten to prohibit use of personal passwords by multiple individuals 5 2 2 – Title changed to “Automatic Session Termination ” 6 0 May 14 2008 Global change “Shoulds” changed to “shalls” throughout the document Replaced certain instances of “will” with “shall” throughout document to indicate compliance is required Various changes were made throughout the document to ensure that the 4300A Policy and Handbook align with the 4300B Policy and Handbook “ISSM” changed to “CISO ISSM” throughout the document CPO changed to Chief Privacy Officer throughout the document “IT Security Program” changed to “Information Security Program” 110 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description throughout the document ” “System Development Life Cycle” changed to “System Life Cycle” and “SDLC” changed to “SLC” throughout the document Title Page Title page of 4300A Policy - Language on the Title Page was reworded “This is the implementation of DHS Management Directive 4300 1 ” Section 1 0 1 1 – Updated to clarify 90 day period in which to implement new policy elements 1 2 – Added OMB NIST and CNSS references 1 4 – Added reference and link to Privacy Incident Handling Guidance and the Privacy Compliance documentation 1 4 2 – Added definition of National Intelligence Information 1 4 3 – Inserted definition of National Security Information to align with 4300B Policy 1 4 8 1 – Definition of General Support System was updated 1 4 8 2 – Definition of Major Application was updated 1 4 10 – Section was renamed “Trust Zone ” 1 4 16 – Inserted new definition for FISMA 1 5 – Language was updated to increase clarity for financial system owners for waivers and exceptions Section 2 0 2 3 – Added a new responsibility for DHS CIO 2 4 – Added a new responsibility for Component CIOs 2 5 - Chief Information Security Officer CISO renamed DHS Chief Information Security Officer CISO Updated to include privacy-related responsibilities 2 6 – Added a new section in Roles and Responsibilities called “Component CISO ” 2 7 – Updated Component ISSM Role and Responsibilities 2 8 – Changed name of the section from Office of the Chief Privacy Officer CPO to The Chief Privacy Officer Updated to include privacy-related responsibilities 2 9 – Added a new role for DHS CSO 2 10 – Updated to include privacy-related responsibilities 2 11 - Added privacy-related responsibilities 2 12 – Added a new section “OneNet Steward ” 2 13 – Added a new section “DHS Security Operations Center DHS SOC and Computer Security Incident Response Center CSIRC ” 111 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description 2 14 – Added a new section “Homeland Secure Data Network HSDN Security Operations Center SOC ” 2 16 – Added a new section “Component-level SOC ” 2 18 – Updated to include privacy-related responsibilities 2 19 – Last sentence of first paragraph has been updated to say “ISSO Duties shall not be assigned as a collateral duty Any collateral duties shall not interfere with their ISSO duties ” 2 20 – Updated to include privacy-related responsibilities Section 3 0 3 9 – Added C A information for unclassified collateral classified and SCI systems Also prior to DHS Policy table included sentence regarding C A 3 9 b – Language updated to clarify that a minimum impact level of moderate is required for confidentiality for CFO designated financial systems 3 9 h – New guidance is provided to clarify short term ATO authority 3 11 1 – Added new section discussing the CISO Board 3 11 3 – Removed DHS Wireless Security Working Group 3 14 1 – Added new text defining PII and sensitive PII At the end of bullet #4 added definition of computer-readable data extracts Updated 3 14 1 a and 3 14 1 b based on input from the Privacy Office Added sentence “DHS has an immediate goal that remote access should only be allowed with twofactor authentication where one of the factors is provided by a device separate from the computer gaining access 3 14 2 - Added new section called Privacy Threshold Analyses 3 14 3 - Updated Privacy Impact Assessment Responsibilities table 3 14 4 - Added new section called System of Record Notices Section 4 0 4 1 5 c – Updated to address training requirements 4 1 5 g – Deleted “Training plans shall include awareness of internal threats and basic IT security practices ” 4 1 5 h now 4 1 5 g – Updated to include the following sentence “Components shall account for Contingency Plan Training and Incident Response Training conducted for Moderate and High IT Systems ” 4 3 1 d – FIPS 140-2 compliance language was updated 4 8 1 a and 4 8 1 c – Language has been updated to provide clarification of timeout values 4 8 2 a – FIPS 140-2 compliance language was updated 4 8 2 b – Added a new policy element regarding powering down laptops when not in use 4 9 – Section was renamed “Department Information Security Operations ” 4 9 4 9 1 4 9 2 – Updated policy elements to support Department security 112 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description operations capabilities based on the SOC CONOPS 4 9 2 b – Updated to say “Components shall obtain guidance from the DHS SOC before contacting local law enforcement except where there is risk to life limb or destruction of property ” 4 12 a – Added policy element to align with Handbook Section 5 0 5 2 1 a 5 2 1 b and 5 2 1 c – Language has been updated to provide clarification of timeout values 5 2 2 Introductory language 5 2 2 a 5 2 2 b and 5 2 2 c – Language and policy updated to clarify the meaning of a session termination 5 3 f - Updated to clarify responsibilities of the System Owner regarding computer-readable data extracts 5 4 1 d – Added sentence “DHS has an immediate goal that remote access should only be allowed with two-factor authentication where one of the factors is provided by a device separate from the computer gaining access ” 5 4 3 a through i – New guidance is provided regarding the preparation of ISAs for interconnections to the DHS OneNetwork 5 4 3 g – Replaced “interconnect service agreements” with “interconnection security agreements ” 5 4 4 f - New guidance is provided regarding internal firewalls 5 4 5 f – New guidance is provided regarding the use of the RDP protocol 5 4 6 – Added text “NOTE Due to many attacks that are HTML-based please note that DHS will be following the lead of the DoD and moving to text based email ” 5 4 8 a – Language updated to reflect that annual vulnerability assessments should be conducted 5 4 8 f – Policy updated to clarify automated system scanning 5 5 1 c – Updated element to specify usage of cryptographic modules that “are FIPS 197 compliant and have received FIPS 140-2 validation ” 5 5 2 f – Policy updated to clarify hosting of DHS Root CA 6 1 September 23 2008 Global Changes Replaced all instances of “CISO ISSM” with “Component CISO ISSM ” Replaced all DHS-related instances of “agency agency-wide” with “Department Department-wide ” Replaced all instances of “24x7” with “continuous” or “continuously ” as appropriate Replaced all instances of “IT security” with “information security ” Various minor editorial and grammatical changes were made throughout the document Section 1 0 1 2 – Added reference to E-Government Act of 2002 January 7 2003 113 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description 1 4 – Replaced “National InfoSec Glossary” with “National Information Assurance IA Glossary ” 1 4 5 – Replaced third sentence with “System vulnerability information about a financial system shall be considered Sensitive Financial Information ” 1 5 2 – Added text regarding acceptance of resulting risk by the Component CFO for financial systems 1 5 3 – Corrected the title and location of Attachment B Added text regarding PTA requirements Section 2 0 2 1 – Updated to clarify Secretary of Homeland Security responsibilities 2 2 – Updated to clarify Undersecretaries and Heads of DHS Components responsibilities 2 3 – Updated to clarify DHS CIO responsibilities 2 4 – Updated to clarify Component CIO responsibilities 2 5 – Updated to clarify DHS CISO responsibilities 2 6 – Updated to clarify Component CISO responsibilities 2 8 – Moved “The Chief Privacy Officer” section to 2 9 2 11 – Updated to clarify Program Managers’ responsibilities 2 14 – Updated to clarify HSDN SOC responsibilities Updated HSDN SOC unclassified email address 2 19 – Updated to clarify ISSO responsibilities and the assignment of ISSO duties as a collateral duty 2 20 – Updated to clarify System Owners’ responsibilities 2 23 2 – Updated to clarify DHS CIO responsibilities for financial systems Section 3 0 3 1 e – Replaced “FISMA and OMB requirements” with “FISMA OMB and other Federal requirements ” 3 1 h – Replaced “maintain a waiver” with “maintain a waiver or exception ” 3 14 1 – Included text regarding the type of encryption needed for laptops 3 14 3 – Included text stating that the PTA determines whether a PIA is conducted 3 14 4 – Moved first sentence of second paragraph to be the first sentence of the first paragraph Included “that are a system of record” after “IT Systems” in the second sentence of the first paragraph Section 4 0 4 3 1 a – Included “locked tape device” in media protection 4 3 1 d – Updated to clarify that AES 256-bit encryption is mandatory 4 8 2 a – Updated to clarify that AES 256-bit encryption is mandatory 114 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description 4 8 3 c – Included new policy element regarding use of seized IT equipment 4 8 4 f – Included new policy element regarding management and maintenance of system libraries 4 8 5 b – Policy updated to clarify limited personal use of DHS email and Internet resources 4 9 – First paragraph updated to clarify DHS SOC and HSDN SOC responsibilities 4 9 b – Updated to specify that the HSDN SOC is subordinate to the DHS SOC 4 9 1 – First two paragraphs updated to clarify relationship between the DHS SOC and the HSDN SOC 4 9 1 a – Removed the words “Component SOC ” 4 9 1 b – Updated to clarify means of communication for reporting significant incidents 4 9 1 c – Updated to clarify the length of time by which significant HSDN incidents must be reported 4 9 1 d – Updated to clarify reporting for HSDN incidents Section 5 0 5 2 d – Replaced “Component CISO ISSM” with “Component CISO ISSM or his her designee ” 5 2 1 – Changed “48 hour time period” to “24 hour time period ” 5 4 5 g – Included new policy element regarding blocking of specific Internet websites or categories 5 4 7 – Updated the policy element to prohibit use of webmail and other personal email accounts 5 5 1 c – Updated to clarify that AES 256-bit encryption is mandatory 5 7 d – Included new policy element regarding use of cryptographic modules in order to align with 4300A Handbook 5 7 e – Included new policy element regarding rollback and journaling for transaction-based systems 6 1 1 7 0 October 31 2008 5 2 3 – Included new language and a link to the DHS computer login warning banner text on DHS Online July 31 2009 General Updates Added section and reference numbers to policy elements Added NIST 800-53 reference controls to policy elements Added hyperlinks to most DHS references Introduced new terminology Senior Agency Information Security Officer Risk Executive and Authorizing Official AO – replaces DAA as per NIST 800-37 and 800-53 Added Appendix A – Acronyms 115 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description Added Appendix B – Glossary Added Appendix C – References list has been updated and moved to Appendix C these are detailed references an abbreviated list is still found at the beginning of the document Added Appendix D – Change History This was moved from the front of the document Specific Updates Section 1 1 – Information Security Program Policy – Added the statement “Policy elements are designed to be broad in scope Specific implementation information can often be found in specific National Institute for Standards and Technology NIST publications such as NIST Special Publication SP 800-53 Recommended Security Controls for Federal Systems ” Section 1 4 17-19 – Privacy – Added definitions for PII SPII and Privacy Sensitive Systems Section 1 5 – Exceptions and Waivers – Updated this section clarified policy elements and consolidated all exceptions and waivers requirements Section 1 5 4 – U S Citizen Exception Requests – Updated section to include policy elements 1 5 4 a – Persons of dual citizenship where one of the citizenships includes U S Citizenship shall be treated as U S Citizens for the purposes of this directive 1 5 4 b – Additional compensating controls shall be maintained for foreign nationals based on nations lists maintained by the DHS CSO Section 1 6 – Information Sharing and Communication Strategy – Added policy element 1 6 a - For DHS purposes electronic signatures are preferred to pen and ink or facsimile signatures in all cases except where pen ink signatures are required by public law Executive Order or other agency requirements Section 1 7 – Changes to Policy – Updated entire section Section 2 0 – Roles and Responsibilities – Reformats entire section Places emphasis on DHS CISO and Component-level Information Security Roles Secretary and senior management roles are moved to the end of the section Some specific areas to note include Section 2 1 1 – DHS Senior Agency Information Security Officer – Introduces this term and assigns duties to DHS CISO Section 2 1 2 – Chief Information Security Officer – Adds the following responsibilities - Appoint a DHS employee to serve as the Headquarters CISO - Appoint a DHS employee to serve as the National Security Systems NSS CISO Section 2 1 3 – Component Chief Information Security Officer – Adds policy element 116 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description 2 1 3 b - All Components shall be responsible to the appropriate CISO Components without a fulltime CISO shall be responsible to the HQ CISO Adds 4 additional CISOs to the list of Component CISOs Federal Law Enforcement Training Center Office of the Inspector General Headquarters Department of Homeland Security The DHS CISO shall also appoint an NSS CISO Section 2 1 4 – Component Information Systems Security Manager – Component CISO now works directly with the HQ CISO rather than with the DHS CISO Section 2 1 5 – Risk Executive – Introduces this term as per NIST Assigns responsibilities to CISOs already performing these functions Section 2 1 6 – Authorizing Official – Introduces this term as per NIST Replaces the term Designated Approval Authority DAA Section 2 2 10 – DHS Employees Contractors and Vendors – Adds the requirement for vendors to follow DHS Information Security Policy Section 3 2 – Capital Planning and Investment Control – Adds policy element 3 2 f – Procurement authorities throughout DHS shall ensure that Homeland Security Acquisition Regulation HSAR provisions are fully enforced Section 3 3 – Contractors and Outsourced Operations – Adds policy element 3 3 g – Procurement authorities throughout DHS shall ensure that Homeland Security Acquisition Regulation HSAR provisions are fully enforced Section 3 5 2 – Contingency Planning – Updates and expands entire section Section 3 7 – Configuration Management – Adds policy elements Section 3 7 f – If the information system uses operating systems or applications that do not have hardening or do not follow configuration guidance from the DHS CISO the System Owner shall request an exception including a proposed alternative secure configuration Section 3 7 g – Components shall ensure that CM processes under their purview include and consider the results of a security impact analysis when considering proposed changes Section 3 9 – Certification Accreditation and Security Assessments – Updates entire section Section 3 11 1 – CISO Council – Updates the term from CISO Board Section 3 14-3 14 6 – Privacy Sections – Updates all sections pertaining to privacy and privacy information adds section 3 14 5 – Protecting Privacy Sensitive Systems Section 3 14 7 – E-Authentication – Renumbers this section from 3 14 6 due to adding of privacy section 3 14 5 117 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description Section 3 15 – DHS Chief Financial Officer Designated Systems – Section renamed from DHS Chief Financial Officer Designated Financial Systems Section 3 16 – Social Media – Added Social Media section to provide guidelines and address the Federal Government’s including DHS use of social media sites You Tube Twitter Section 4 1 2 – Rules of Behavior – Added policy element 4 1 2 b – Components shall ensure that DHS users are trained regarding rules of behavior and that each user signs a copy prior to being granted user accounts or access to information systems or data Section 4 1 5 – IT Security Awareness Training and Education – Updates entire section Section 4 1 6 – Separation from Duty – Updates policy element to require that all assets and data are recovered from departing individuals 4 1 6 b – Components shall establish procedures to ensure that all DHS information system-related property and assets are recovered from the departing individual and that sensitive information stored on any media is transferred to an authorized individual Adds policy elements 4 1 6 c - Accounts for personnel on extended absences shall be temporarily suspended 4 1 6 d – System Owners shall review information system accounts supporting their programs at least annually Section 4 3 2 – Media Marking and Transport – Adds “Transport” to section title and adds policy element 4 3 2 b – Components shall control the transport of information system media containing sensitive data outside of controlled areas and restrict the pickup receipt transfer and delivery to authorized personnel Section 4 6 – Wireless Network Communications – Updated section title from “Wireless Communication” and specifies “network communication” technologies in policy rather than the more general “Wireless ” Removes references to the defunct “WMO ” Section 4 6 1 – Wireless Systems – Adds policy elements 4 6 1 f – Component CISOs shall review all system applications for wireless usage maintain an inventory of systems and provide that inventory to the DHS CISO at least annually 4 6 1 g – Component CISOs shall i establish usage restrictions and implementation guidance for wireless technologies and ii authorize monitor and control wireless access to DHS information systems 4 9 1 – Security Incidents and Incident Response and Reporting – Adds requirement for Components to maintain full SOC and CSIRC capability May outsource to DHS SOC Adds policy elements 4 9 1 k – Components shall maintain a full SOC and CSIRC capability or outsource this capability to the DHS SOC The DHS SOC shall provide 118 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description SOC and CSIRC services to Components in accordance with formal agreements Information regarding incident response capability is available in Attachment F of the DHS 4300A Sensitive Systems Handbook 4 9 1 q – The DHS CISO shall publish Incident Response Testing and Exercise scenarios as required 4 9 1 r – The Component CISO for each Component providing an incident response capability shall ensure Incident Response Testing and Exercises are conducted annually in coordination with the DHS CISO Section 5 1 – Identification and Authentication – Adds requirement for strong authentication following HSPD-12 implementation 5 1 f – Components shall implement strong authentication on servers for system administrators and significant security personnel within six 6 months of the Component’s implementation of HSPD-12 Section 5 4 1 – Remote Access and Dial-In – Updates section and adds policy element 5 4 1 f – The Public Switched Telephone Network PSTN shall not be connected to OneNet at any time 5 4 3 – Network Connectivity – Requires DHS CIO approval for all network connections outside of DHS Also specifies requirement for CCB 5 4 3 g – The DHS CIO shall approve all interconnections between DHS information systems and non-DHS information systems Components shall document interconnections with an ISA for each connection The DHS CIO shall ensure that connections with other Federal Government Agencies are properly documented A single ISA may be used for multiple connections provided that the security accreditation is the same for all connections covered by that ISA 5 4 3 l - The appropriate CCB shall ensure that documentation associated with an approved change to an information system is updated to reflect the appropriate baseline DHS systems that interface with OneNet shall also be subject to the OneNet CCB Section 5 4 4 – Firewalls and Policy Enforcement Points – Updates language to include Policy Enforcement Points Adds policy elements 5 4 4 i – The DHS CISO shall establish policy to block or allow traffic sources and destinations at the DHS TIC PEPs The DHS CISO policy will prevent traffic as directed by the DHS CIO 5 4 j – The DHS SOC shall oversee all enterprise PEPs Section 5 4 5 – Internet Security – Prohibits Public Switched Telephone Network PSTN connection to OneNet 5 4 5 a – Any direct connection of OneNet DHS networks or DHS mission systems to the Internet or to extranets shall occur through DHS Trusted Internet Connection TIC PEPSs The PSTN shall not be connected to OneNet at any time Section 5 5 3 – Public Key Private Key – Assigns responsibility for nonhuman use of PKI to sponsors 5 5 3 g – Sponsors for non-human subscribers organization application 119 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description code-signing or device shall be responsible for the security of and use of the subscriber’s private keys Every sponsor shall read understand and sign a “DHS PKI Subscriber Agreement for Sponsors” as a pre-condition for receiving certificates from a DHS CA for the non-human subscriber Section 5 4 6 – Email Security – Prohibits auto-forwarding of DHS email to other than gov or mil addresses 5 4 6 i - Auto-forwarding or redirecting of DHS email to address outside of the gov or mil domain is prohibited and shall not be used Users may manually forward individual messages after determining that the risk or consequences are low Section 5 4 7 – Personal Email Accounts – Requires use of encryption when sending sensitive information to email addresses other than gov or mil addresses 5 4 7 b - When sending email to an address outside of the gov or mil domain users shall ensure that any sensitive information particularly privacy data is attached as an encrypted file Section 5 6 – Malware Protection – Updates term from “Virus ” 7 1 September 30 2009 General Updates Standardized the term “IT system” to “information system” Standardized the term “DHS IT system” to “DHS information system” Updated the term “DHS Security Operations Center” to “DHS Enterprise Operations Center” and added definition in glossary Replaced “must” with “shall” in all policy statements Replaced “vendors” with “others working on behalf of DHS” Specific Updates Section 1 4 20 – Strong Authentication – Added definition for Strong Authentication Section 1 4 21 – Two-Factor Authentication – Added definition for TwoFactor Authentication Section 2 2 4 – Component Chief Information Officer – Alleviated confusion regarding Component CIO responsibilities Section 2 2 5 – Chief Security Office – Removed erroneous CSO responsibilities which belong to Component CIOs Section 2 2 7 – DHS Chief Financial Officer – Updated policy elements to clarify applicable policies Section 3 1 – Basic Requirements 3 1 d 3 1 g-j – Updated policy elements to CISO ISSM ISSO responsibilities Section 3 7 f – Clarified Operating system exception requirements Section 3 9 l-m – Clarified requirements regarding TAF RMS Section 3 15 – CFO Designated Systems – Major revisions to this section Section 4 6 2 and 5 4 1 a – Prohibits tethering to DHS devices 120 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description Section 5 4 3 g-h – Clarifies interconnection and ISA approval Section 5 5 – Cryptography – Removed unnecessary elements from introductions and updated entire section with input from DHS PKI Steward 7 2 May 17 2010 General Updates No general updates with this revision Specific updates are listed below Specific Updates Section 1 4 8 – Added FISMA language transmits stores or processes data or information to definition of DHS System Section 1 5 3 k – Removed requirement for Component Head to make recommendation regarding waivers removed requirement to report exceptions on FISMA report Section 2 1 6 – Adds requirement for AO to be a Federal employee Section 2 1 7 – Clarifies that CO is a senior management official stipulates that CO must be a Federal employee Section 2 2 5 – Updated CSO role Section 3 2 – Added intro to CPIC section and link to CPIC Guide Section 3 5 2 h – Added requirement to coordinate CP and COOP testing moderate and high FIPS categorizations Section 3 15 a – Added requirement for CFO Designated Systems security assessments for key controls be tracked in TAF and adds requirement for tracking ST E and SAR annually Section 3 15 c – Remaps control from RA-4 to RA-5 Section 3 15 h – Adds mapping to IR-6 Section 3 15 i – Remaps control from PL-3 to PL-2 Section 3 17 – Added requirement to protect HIPAA information Section 4 1 l a – Added requirement for annual reviews of position sensitivity levels Section 4 1 1 c – Exempts active duty USCG and other personnel subject to UCMJ from background check requirements Section 4 1 4 c-d – Adds additional separation of duties requirements and restricts the use of administrator accounts Section 5 2 f – Limits the number of concurrent connections for FIPS-199 high systems Section 5 4 2 a – Limits network monitoring as per the Electronic Communications Act Section 5 4 3 – Added introduction to clarify ISA requirements Section 5 4 3 f – Clarifies the term “security policy” in context Section 5 4 3 m – Clarifies that both AOs must accept risk for interconnected systems that do not require ISAs Section 5 4 3 m-n – Adds stipulations to ISA requirements 121 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description Section 5 5 – Updates language in entire section Section 5 5 3 j – Assigns the DHS PKI MA responsibility for maintaining Human Subscriber agreements 7 2 1 August 9 2010 General Updates No general updates with this revision Specific updates are listed below Specific Updates Section 1 1 – Removes reference to 4300C Section 1 4 1 3 – Updates Executive Order reference from 12958 to 13526 Section 1 4 17 – Updates the PII section Section 1 4 18 – Updates SPII section Section 1 5 3 – Adds requirement for Privacy Officer PPOC approval for exceptions and waivers pertaining to Privacy Designated Systems Section 1 6 b c – Requires installation and use of digital signatures and certificates Section 2 1 6 d – Allows delegation of AO duty to review and approve administrators Section 2 2 6 – Updates DHS Chief Privacy Officer description Section 3 7 e – Adds requirement to include DHS certificate as part of FDCC Section 3 14 – Updates Privacy and Data Security section Section 3 14 1 – Updates PII section Section 3 14 2 – Updates PTA section Section 3 14 2 e – Updates impact level requirements for Privacy Sensitive Systems Section 3 14 3 – Updates PIA section Section 3 1 4 4 – Updates SORN section Section 3 14 4 a – Exempts SORN requirements Section 3 14 5 – Updates Privacy Sensitive Systems protection requirements Section 3 14 6 a – Updates privacy incident reporting requirements Section 3 14 7 – Updates privacy requirements for e-Auth Section 3 14 7 e – Adds PIA requirements for eAuth Section 4 1 1 e – Expands U S citizenship requirement for access to all DHS systems and networks Section 4 1 4 b – Allows delegation of AO duty to review and approve administrators Section 4 6 2 3 c – Clarifies prohibited use of SMS Section 4 8 4 h – Updates the term “trusted” to “cleared” maintenance 122 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description personnel Section 4 12 i – Updates escort requirements for maintenance or disposal Section 4 12 j – Requires disabling of dial up on multifunction devices Section 5 4 3 – Clarifies definition of Network Connectivity Section 5 4 3 m n – Clarifies requirement for ISA Section 5 4 6 j – Requires DHS email systems to use a common naming convention Section 5 5 3 g – Prohibits sharing of personal private keys 7 2 1 1 January 19 2011 General Updates No general updates with this revision Specific updates are listed below Specific Updates 8 0 March 14 2011 Section 4 8 1 a – Changes requirement for screensaver activation from five 5 to fifteen 15 minutes of inactivity General Updates Update date and version number Replace “certification and accreditation” and “C A” with “security authorization process” Replace “Certifying Official” with “Security Control Assessor” Replace “ST E Plan” with “security assessment plan” Replace “system security plan” with “security plan” and “SSP” with “SP” Specific Updates Section 1 4 8 1 Change definition to specify that a GSS has only one ISSO Section 1 4 8 2 Change definition to specify that an MA has only one ISSO Section 1 5 1 Include language requiring waiver submissions to be coordinated with the AO Section 1 5 2 Include language requiring waiver submissions to be coordinated with the AO Section 1 5 3 Clarify language regarding submission of waivers and exceptions for CFO designated systems Section 1 6 d Added new policy element “DHS and Component systems shall be able to verify PIV credentials issued by other Federal agencies ” Section 2 1 2 Add DHS CISO role as primary liaison to Component officials and to perform periodic compliance reviews for selected systems Section 2 13 Update Component CISO duties and add to implement POA M process and ensure that eternal providers who operate information systems meet the same security requirements as the Component Section 2 1 4 Update list of Component ISSM duties and create a POA M 123 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description for each known vulnerability Section 2 1 5 Add significantly expanded Risk Executive duties Section 2 1 6 Add significantly expanded Authorizing Official duties Section 2 2 8 Add Program Manager responsibility for POA M content Section 2 2 9 Add expanded System Owner duties Section 2 2 11 Renumber 2 2 10 as 2 2 11 Section 2 2 10 Add a new 2 2 10 to introduce and describe duties of Common Control Provider Section 3 2 g Added new policy element “Procurements for services and products involving facility or system access control shall be in accordance with the DHS guidance regarding HSPD-12 implementation ” Section 3 5 2 c Updated language to clarify requirements for backup policy and procedures Section 3 5 2 f Updated language to require table-top exercises for testing the CP for moderate availability systems Section 3 7 f Added new policy element “Components shall monitor USGCB or DHS-approved USGCB variant compliance using a NISTvalidated Security Content Automation Protocol SCAP tool ” Section 3 9 Add requirement for Components to designate a Common Control Provider Section 3 10 b Policy element language was updated to clarify the function of information system security review and assistance programs Section 3 14 Language updated for readability Section 3 14 c Added new policy element “Components shall review and republish SORNs every two 2 years as required by OMB A-130 ” Section 3 14 7 f Added new policy element “Existing physical and logical access control systems shall be upgraded to use PIV credentials in accordance with NIST and DHS guidelines ” Section 3 14 7 g Added new policy element “All new systems under development shall be enabled to use PIV credentials in accordance with NIST and DHS guidelines prior to being made operational ” Section 3 17 Added reference to NIST SP 800-66 for more information on HIPAA Section 4 1 4 d Language updated to clarify usage of administrator accounts Section 4 1 5 f Language updated to clarify requirements for security awareness training plan Section 4 3 1 b Language updated to clarify protection of offsite backup media Section 4 5 4 Added reference to NIST SP 800-58 for more information on VoIP 124 v8 0 March 14 2011 DHS SENSITIVE SYSTEMS POLICY DIRECTIVE 4300A Version Date Description Section 4 9 j Language updated to require that Component SOCs report operationally to the respective Component CISO Section 4 9 k New policy element added “The DHS EOC shall report operationally to the DHS CISO ” Section 4 10 Revise list of annual system documentation updates Section 4 12 c Policy element replaced with new one stating that the policy applies “to all DHS employees contractors detailees others working on behalf of DHS and users of DHS information systems that collect generate process store display transmit or receive DHS data ” Section 5 4 1 e Policy element removed Section 5 4 1 f Policy element removed Appendix A Include new acronyms Appendix B Revise definition of Accreditation Package to reflect new list of documentation Appendix C Update references 125 v8 0 March 14 2011
OCR of the Document
View the Document >>