forked from rahuldeve/Diversification-Dataset
-
Notifications
You must be signed in to change notification settings - Fork 0
/
800-14.txt
2640 lines (1620 loc) · 109 KB
/
800-14.txt
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
NIST Special Publication 800-14
U.S. DEPARTMENT OF
COMMERCE
Technology Administration
National Institute of Standards
and Technology
Generally Accepted Principles and
Practices for Securing Information
Technology Systems
Marianne Swanson and Barbara Guttman
COMPUTER SECURITY
,
I
,.,.,he National Institute of Standards and Technology was established in 1988 by Congress
.l. ~o "assist industry in the development of technology ... needed to improve product quality,
to modernize manufacturing processes, to ensure product reliability . . . and to facilitate rapid
commercialization ... of products based on new scientific discoveries."
NIST, originally founded as the National Bureau of Standards in 1901, works to strengthen
U.S. industry's competitiveness; advance science and engineering; and improve public health,
safety, and the environment. One of the agency's basic functions is to develop, maintain, and retain
custody of the national standards of measurement, and provide the means and methods for
comparing standards used in science, engineering, manufacturing, commerce, industry, and
education with the standards adopted or recognized by the Federal Government.
As an agency of the U.S. Commerce Department's Technology Administration, NIST
conducts basic and applied research in the physical sciences and engineering, and develops
measurement techniques, test methods, standards, and related services. The Institute does generic
and precompetitive work on new and advanced technologies. NIST's research facilities are located
at Gaithersburg, MD 20899, and at Boulder, CO 80303. For more information contact the Public
Inquiries Desk, 301-975-3058.
NIST Special Publication 800-14 Generally Accepted Principles and
Practices for Securing Information
Technology Systems
Marianne Swanson and Barbara Guttman
COMPUTER SECURITY
Computer Systems Laboratory
National Institute of Standards
and Thchnology
Gaithersburg, MD 20899-0001
September 1996
U.S. Department of Commerce
Michael Kantor, Secretary
Technology Administration
Mary L. Good, Under Secretary for Technology
National Institute of Standards and Technology
Arati Prabhakar, Director
Reports on Computer Systems Technology
The National Institute of Standards and Technology (NIST) has a unique responsibility for computer
systems technology within the Federal government. NIST's Computer Systems Laboratory (CSL) devel(cid:173)
ops standards and guidelines, provides technical assistance, and conducts research for computers and
related telecommunications systems to achieve more effective utilization of Federal information technol(cid:173)
ogy resources. CSL's responsibilities include development of technical, management, physical, and ad(cid:173)
ministrative standards and guidelines for the cost-effective security and privacy of sensitive unclassified
information processed in Federal computers. CSL assists agencies in developing security plans and in
improving computer security awareness training. This Special Publication 800 series reports CSL re(cid:173)
search and guidelines to Federal agencies as well as to organizations in industry, government, and
academia.
National Institute of Standards and Technology Special Publication 800-14
Natl .. lnst. Stand. Technol. Spec. Publ. 800-14, 61 pages (Sept. 1996)
CODEN:NSPUE2
U.S. GOVERNMENT PRINTING OFFICE
WASHINGTON: 1996
For sale by the Superintendent of Documents, U.S. Government Printing Office, Washington, DC 20402
Principles and Practices
for Securing IT Systems
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.1 Principles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.2 Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
1.3 Relationship of Principles and Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.5 Audience
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.6 Structure of this Document . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.7 Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Generally Accepted System Security Principles
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.1 Computer Security Supports the Mission of the Organization . . . . . . . . . . . . . . . . . 5
2.2 Computer Security is an Integral Element of Sound Management . . . . . . . . . . . . . . 6
2.3 Computer Security Should Be Cost-Effective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.4 Systems Owners Have Security Responsibilities Outside Their Own Organizations
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.5 Computer Security Responsibilities and Accountability Should Be Made Explicit . 8
2.6 Computer Security Requires a Comprehensive and Integrated Approach . . . . . . . . 9
2.7 Computer Security Should Be Periodically Reassessed . . . . . . . . . . . . . . . . . . . . . . 9
2.8 Computer Security is Constrained by Societal Factors . . . . . . . . . . . . . . . . . . . . . 10
3. Common IT Security Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
3.1 Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.1.1 Program Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.1.2 Issue-Specific Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.1.3 System-Specific Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
3.1.4 All Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
3.2 Program Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.2.1 Central Security Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.2.2 System-Level Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.3 Risk Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.3.1 Risk Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.3.2 Risk Mitigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
3.3.3 Uncertainty Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.4 Life Cycle Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.4.1 Security Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.4.2 Initiation Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.4.3 Development/Acquisition Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3.4.4 Implementation Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
iii
Principles and Practices
for Securing IT Systems
3.4.5 Operation/Maintenance Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.4.6 Disposal Phase . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.5 Personnel/User Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.5.1 Staffing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.5.2 User Administration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.6 Preparing for Contingencies and Disasters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.6.1 Business Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.6.2 Identify Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.6.3 Develop Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
3.6.4 Develop Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
3.6.5 Test and Revise Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
3.7 Computer Security Incident Handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.7.1 Uses of a Capability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.7.2 Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
3.8 Awareness and Training . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
3.9 Security Considerations in Computer Support and Operations . . . . . . . . . . . . . . . 39
3.10 Physical and Environmental Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
3.11 Identification and Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.11.1 Identification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
3.11.2 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
3.11.3 Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
3.11.4 Advanced Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
3.12 Logical Access Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.12.1 Access Criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
3.12.2 Access Control Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.13.1 Contents of Audit Trail Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
3.13.2 Audit Trail Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.13.3 Audit Trail Reviews . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
3.13.4 Keystroke Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
3.14 Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
4. References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
3.13 Audit Trails
iv
Principles and Practices
for Securing IT Systems
1. Introduction
As more organizations share information electronically, a common understanding of what is
needed and expected in securing information technology (IT) resources is required. This
document provides a baseline that organizations can use to establish and review their IT security
programs. The document gives a foundation that organizations can reference when conducting
multi-organizational business as well as internal business. Management, internal auditors, users,
system developers, and security practioners can use the guideline to gain an understanding of the
basic security requirements most IT systems should contain. The foundation begins with
generally accepted system security principles and continues with common practices that are used
in securing IT systems.
1.1 Principles
Many approaches and methods can be used to secure IT systems; however, certain intrinsic
expectations must be met whether the system is small or large or owned by a government agency
or by a private corporation. The intrinsic expectations are described in this document as
generally accepted system security principles. The principles address computer security from a
very high-level viewpoint. The principles are to be used when developing computer security
programs and policy and when creating new systems, practices or policies. Principles are
expressed at a high level, encompassing broad areas, e.g., accountability, cost effectiveness, and
integration.
1.2 Practices
The next level in the foundation is the common IT security practices that are in general use
today. The practices guide organizations on the types of controls, objectives and procedures that
comprise an effective IT security program. The practices show what should be done to enhance
or measure an existing computer security program or to aid in the development of a new
program. The practices provide a common ground for determining the security of an
organization and build confidence when conducting multi-organizational business. This
document provides the practices in a checklist format to assist organizations in reviewing their
current policies and procedures against the common practices presented here. Organizations
should use the practices as a starting point in order to develop additional practices based on their
1
Principles and Practices
for Securing IT Systems
own organizational and system requirements. The common practices should be augmented with
additional practices based on each organizations unique needs. The practices described in this
publication come from NIST Special Publication 800-12, An Introduction to Computer
Security: The NIST Handbook. They are not intended to be definitive; as technology changes,
so will the practices.
1.3 Relationship of Principles and Practices
This document describes eight principles and fourteen practices. Each of the principles applies
to each of the practices. The nature of the relationship between the principles and the practices
varies. In some cases, practices are derived from one or more principles; in other cases practices
are constrained by principles. For example, the Risk Management Practice is directly derived
from the Cost-Effectiveness Principle. However, the Comprehensive and Reassessment
Principles place constraints on the Risk Management Practice.
While a mapping could be made to the specific relationships between the principles and the
practices, it is probably not useful. The important point is that the principles provide the
foundation for a sound computer security program.
1.4 Background
The National Performance Review (NPR) recommended as part of the National Information
Infrastructure (NII) that the National Institute of Standards and Technology (NIST) develop
generally accepted system security principles and practices for the federal government. These
security principles and practices are to be applied in the use, protection, and design of
government information and data systems, particularly front-line systems for delivering services
electronically to citizens.
The need for rules, standards, conventions and procedures that define accepted security practices
was outlined in the 1991 National Research Council document Computers At Risk. Their
recommendation called for the development of a comprehensive set of generally accepted system
security principles (GSSP) which would clearly articulate essential security features, assurances,
and practices. Work began on implementing the Computers At Risk recommendation in 1992
2
Principles and Practices
for Securing IT Systems
by several national and international organizations with an interest in computer security. This
document draws upon their on going efforts.
1.5 Audience
This document has two distinct uses. The chapter covering principles is to be used by all levels
of management and by those individuals responsible for computer security at the system level
and organization level. The principles are intended as a guide when creating program policy or
reviewing existing policy. The common practices are intended as a reference document and an
auditing tool. The goal of this document is to provide a common baseline of requirements that
can be used within and outside organizations by internal auditors, managers, users and computer
security officers. The concepts presented are generic and can be applied to organizations in
private and public sectors.
1.6 Structure of this Document
This document is organized as follows: Chapter 2 presents the principles. Chapter 3 contains
the common IT security practices. Chapter 4 provides references used in the development of this
document.
1.7 Terminology
This document uses the terms information technology security and computer security
interchangeably. The terms refer to the entire spectrum of information technology including
application and support systems. Computer security is the protection afforded to an automated
information system in order to attain the applicable objectives of preserving the integrity,
availability, and confidentiality of information system resources (including hardware, software,
firmware, information data, and telecommunications).
3
Principles and Practices
for Securing IT Systems
Accountability - The responsibilities and accountability of owners,
providers and users of information systems and other parties...should
be explicit.
Awareness - Owners, providers, users and other parties should
readily be able, consistent with maintaining security, to gain
appropriate knowledge of and be informed about the existence and
general extent of measures...for the security of information systems.
Ethics - The Information systems and the security of information
systems should be provided and used in such a manner that the rights
and legitimate interest of others are respected.
Multidisciplinary - Measures, practices and procedures for the
security of information systems should take account of and address
all relevant considerations and viewpoints....
OECD's Guidelines for the Security of Information Systems :
2. Generally Accepted System Security Principles
As the name implies, the principles are generally accepted -- that which is most commonly being
used at the present time to secure IT resources. The principles that this document offers are not
new to the security profession. They are based on the premise that (most) everyone applies these
when developing or maintaining a system
and they have become generally accepted.
This document uses the Organization for
Economic Co-operation and Development's
(OECD) Guidelines for the Security of
Information Systems as the base for the
principles. The OECD Guidelines were
developed in 1992 by a group of
international experts to provide a foundation
from which governments and the private
sector, acting singly and in concert, could
construct a framework for securing IT
systems. The OECD Guidelines are the
current international guidelines which have
been endorsed by the United States. A brief
description of the nine OECD principles is
provided in Figure 1. Using the spirit of
the Guidelines, NIST developed principles
which applies to federal systems.1 In
developing this set of principles, NIST drew
upon the OECD Guidelines, added material,
combined some principles, and rewrote
others. Most of the rewriting and
combining was done to provide clarity. The
principles added by NIST are in keeping
Proportionality - Security levels, costs, measures, practices and
procedures should be appropriate and proportionate to the value of
and degree of reliance on the information systems and to the severity,
probability and extent of potential harm....
Integration - Measures, practices and procedures for the security of
information systems should be coordinated and integrated with each
other and other measures, practices and procedures of the
organization so as to create a coherent system of security.
Reassessment - The security of information systems should be
reassessed periodically, as information systems and the requirements
for their security vary over time.
Democracy - The security of information systems should be
compatible with the legitimate use and flow of data and information
in a democratic society.
Timeliness - Public and private parties, at both national and
international levels, should act in a timely coordinated manner to
prevent and to respond to breaches of security of information systems.
Figure 1. OECD Guidelines.
1The eight principles originally appeared as the "Elements of Computer Security" in the NIST Special Publication 800
12, An Introduction to Computer Security: The NIST Handbook.
4
Principles and Practices
for Securing IT Systems
with the OECD principles but not directly stated. For example, NIST added the principle that
Computer Security Support the Mission of the Organization. Prior to developing these
principles, NIST thoroughly reviewed what is currently being accomplished in the IT Security
principles area. With much consideration, a determination was made that the U.S. Government
would benefit from its own set of principles.
The eight principles contained in this document provide an anchor on which the Federal
community should base their IT security programs. These principles are intended to guide
agency personnel when creating new systems, practices, or policies. They are not designed to
produce specific answers. The principles should be applied as a whole, pragmatically and
reasonably. Each principle is expressed as a one-line section heading and explained in the
paragraphs that immediately follow.
2.1 Computer Security Supports the Mission of the Organization
The purpose of computer security is to protect an organization's valuable resources, such as
information, hardware, and software. Through the selection and application of appropriate
safeguards, security helps the organization's mission by protecting its physical and financial
resources, reputation, legal position, employees, and other tangible and intangible assets.
Unfortunately, security is sometimes viewed as thwarting the mission of the organization by
imposing poorly selected, bothersome rules and procedures on users, managers, and systems.
On the contrary, well-chosen security rules and procedures do not exist for their own sake -- they
are put in place to protect important assets and support the overall organizational mission.
Security, therefore, is a means to an end and not an end in itself. For example, in a private-
sector business, having good security is usually secondary to the need to make a profit. Security,
then, ought to increase the firm's ability to make a profit. In a public-sector agency, security is
usually secondary to the agency's providing services to citizens. Security, then, ought to help
improve the service provided to the citizen.
To act on this, managers need to understand both their organizational mission and how each
information system supports that mission. After a system's role has been defined, the security
requirements implicit in that role can be defined. Security can then be explicitly stated in terms
of the organization's mission.
5
Principles and Practices
for Securing IT Systems
The roles and functions of a system may not be restricted to a single organization. In an
interorganizational system, each organization benefits from securing the system. For example,
for electronic commerce to be successful, each participant requires security controls to protect
their resources. However, good security on the buyer's system also benefits the seller; the
buyer's system is less likely to be used for fraud or to be unavailable or otherwise negatively
affect the seller. (The reverse is also true.)
2.2 Computer Security is an Integral Element of Sound Management
Information and IT systems are often critical assets that support the mission of an organization.
Protecting them can be as important as protecting other organizational resources, such as money,
physical assets, or employees.
However, including security considerations in the management of information and computers
does not completely eliminate the possibility that these assets will be harmed. Ultimately,
organization managers have to decide what level of risk they are willing to accept, taking into
account the cost of security controls.
As with other resources, the management of information and computers may transcend
organizational boundaries. When an organization's information and IT systems are linked with
external systems, management's responsibilities extend beyond the organization. This requires
that management (1) know what general level or type of security is employed on the external
system(s) or (2) seek assurance that the external system provides adequate security for their
organization's needs.
2.3 Computer Security Should Be Cost-Effective
The costs and benefits of security should be carefully examined in both monetary and non-
monetary terms to ensure that the cost of controls does not exceed expected benefits. Security
should be appropriate and proportionate to the value of and degree of reliance on the IT systems
and to the severity, probability, and extent of potential harm. Requirements for security vary,
depending upon the particular IT system.
6
Principles and Practices
for Securing IT Systems
In general, security is a smart business practice. By investing in security measures, an
organization can reduce the frequency and severity of computer security-related losses. For
example, an organization may estimate that it is experiencing significant losses per year in
inventory through fraudulent manipulation of its IT system. Security measures, such as an
improved access control system, may significantly reduce the loss.
Moreover, a sound security program can thwart hackers and reduce the frequency of viruses.
Elimination of these kinds of threats can reduce unfavorable publicity as well as increase morale
and productivity.
Security benefits do have both direct and indirect costs. Direct costs include purchasing,
installing, and administering security measures, such as access control software or fire-
suppression systems. Additionally, security measures can sometimes affect system performance,
employee morale, or retraining requirements. All of these have to be considered in addition to
the basic cost of the control itself. In many cases, these additional costs may well exceed the
initial cost of the control (as is often seen, for example, in the costs of administering an access
control package). Solutions to security problems should not be chosen if they cost more, in
monetary or non monetary terms, directly or indirectly, than simply tolerating the problem.
2.4 Systems Owners Have Security Responsibilities Outside Their Own
Organizations
If a system has external users, its owners have a responsibility to share appropriate knowledge
about the existence and general extent of security measures so that other users can be confident
that the system is adequately secure. This does not imply that all systems must meet any
minimum level of security, but does imply that system owners should inform their clients or
users about the nature of the security.
7
In addition to sharing information about security, organization managers "should act in a timely,
coordinated manner to prevent and to respond to breaches of security" to help prevent damage to
others.2 However, taking such action should not jeopardize the security of systems.
Principles and Practices
for Securing IT Systems
4
5
3
2.5 Computer Security Responsibilities and Accountability Should Be Made
Explicit
The responsibility and accountability of owners, providers, and users of IT systems and other
parties concerned with the security of IT systems should be explicit.
responsibilities may be internal to an organization or may extend across organizational
boundaries.
Depending on the size of the organization, the computer security program may be large or small,
even a collateral duty of another management official. However, even small organizations can
prepare a document that states organization policy and makes explicit computer security
responsibilities. This element does not specify that individual accountability must be provided
for on all systems. For example, many information dissemination systems do not require user
identification or use other technical means of user identification and, therefore, cannot hold users
accountable.
The assignment of
2 Organization for Economic Co-operation and Development, Guidelines for the Security of Information Systems,
Paris, 1992.
3 The difference between responsibility and accountability is not always clear. In general, responsibility is a broader
term, defining obligations and expected behavior. The term implies a proactive stance on the part of the responsible
party and a causal relationship between the responsible party and a given outcome. The term accountability generally
refers to the ability to hold people responsible for their actions. Therefore, people could be responsible for their actions
but not held accountable. For example, an anonymous user on a system is responsible for behaving according to
accepted norms but cannot be held accountable if a compromise occurs since the action cannot be traced to an
individual.
4 The term other parties may include but is not limited to: executive management; programmers; maintenance
providers; information system managers (software managers, operations managers, and network managers); software
development managers; managers charged with security of information systems; and internal and external information
system auditors.
5 This principle implicitly states that people and other entities (such as corporations or governments) have
responsibility and accountability related to IT systems which may be shared.
8
Principles and Practices
for Securing IT Systems
2.6 Computer Security Requires a Comprehensive and Integrated Approach
Providing effective computer security requires a comprehensive approach that considers a
variety of areas both within and outside of the computer security field. This comprehensive
approach extends throughout the entire information life cycle.
To work effectively, security controls often depend upon the proper functioning of other
controls. Many such interdependencies exist. If appropriately chosen, managerial, operational,
and technical controls can work together synergistically. On the other hand, without a firm
understanding of the interdependencies of security controls, they can actually undermine one
another. For example, without proper training on how and when to use a virus-detection
package, the user may apply the package incorrectly and, therefore, ineffectively. As a result,
the user may mistakenly believe that if their system has been checked once, that it will always be
virus-free and may inadvertently spread a virus. In reality, these interdependencies are usually
more complicated and difficult to ascertain.
The effectiveness of security controls also depends on such factors as system management, legal
issues, quality assurance, and internal and management controls. Computer security needs to
work with traditional security disciplines including physical and personnel security. Many other
important interdependencies exist that are often unique to the organization or system
environment. Managers should recognize how computer security relates to other areas of
systems and organizational management.
2.7 Computer Security Should Be Periodically Reassessed
Computers and the environments in which they operate are dynamic. System technology and
users, data and information in the systems, risks associated with the system, and security
requirements are ever-changing. Many types of changes affect system security: technological
developments (whether adopted by the system owner or available for use by others); connection
to external networks; a change in the value or use of information; or the emergence of a new
threat.
In addition, security is never perfect when a system is implemented. System users and operators
discover new ways to intentionally or unintentionally bypass or subvert security. Changes in the
9
Principles and Practices
for Securing IT Systems
system or the environment can create new vulnerabilities. Strict adherence to procedures is rare
and procedures become outdated over time. These issues make it necessary to reassess
periodically the security of IT systems.
2.8 Computer Security is Constrained by Societal Factors
The ability of security to support the mission of an organization may be limited by various
factors, such as social issues. For example, security and workplace privacy can conflict.
Commonly, security is implemented on an IT system by identifying users and tracking their
actions. However, expectations of privacy vary and can be violated by some security measures.
(In some cases, privacy may be mandated by law.)
Although privacy is an extremely important societal issue, it is not the only one. The flow of
information, especially between a government and its citizens, is another situation where
security may need to be modified to support a societal goal. In addition, some authentication
measures may be considered invasive in some environments and cultures.
Security measures should be selected and implemented with a recognition of the rights and
legitimate interests of others. This may involve balancing the security needs of information
owners and users with societal goals. However, rules and expectations change with regard to the
appropriate use of security controls. These changes may either increase or decrease security.
The relationship between security and societal norms is not necessarily antagonistic. Security
can enhance the access and flow of data and information by providing more accurate and reliable
information and greater availability of systems. Security can also increase the privacy afforded
to an individual or help achieve other goals set by society.
10
Principles and Practices
for Securing IT Systems
3. Common IT Security Practices
The goal of this chapter is to assist the time-constrained security manager in reviewing their
current policies and procedures against the common practices presented here. The list is not
exhaustive; agencies should consider them as the minimum set. These practices are the ones
currently employed in an effective computer security program. They do not take into account
environmental or technological constraints, nor are they relevant to every situation. This chapter
should be augmented with additional practices based on each agencies' unique requirements.
The practices serve as a companion to the NIST Special Publication, 800-12, An Introduction to
Computer Security: The NIST Handbook. The NIST Handbook contains over 200 pages of
assistance in securing computer-based resources. The document explains important concepts,
cost considerations, and interrelationships of security controls. It provides a broad overview of
computer security and is an excellent primer for anyone interested in computer security. The
NIST Handbook provides the "why to" and served as the template for deriving the practices.
Each chapter of the NIST Handbook was carefully reviewed to determine which sections denoted
a practice and which parts were explanation, detail, or example. The key points of each chapter
along with a short explanation were placed into a practice format. Some disparity exists,
however, in the way the practices are presented. In some sections, it was easy to provide a
checklist of what should be considered when, for example, an agency is developing a
contingency plan. It was much more difficult to design a checklist of practices for types of
technical controls, such as audit trails. In the audit trail section, the reader will find more of a
laundry list of what should be considered. Whether the section is a technical control or an
operational or management control, each section is formatted as a practice.
Each section begins with a brief explanation of the control and a synopsis of the practice. The
controls are then divided into subsections with practices listed below. Each practice appears
with a small box placed to the left of it. In most cases, the practice is followed with a brief
explanation or example. This section provides the "what" should be done, not the "why" or the
"how." Several documents should be referenced for further information. The NIST Handbook
should be used to obtain additional detail on any of the practices listed. The NIST Handbook
will easily map to this chapter since the chapters are placed in the same order as the subsections.
11
Principles and Practices
for Securing IT Systems
The handbook also provides many references for further study. This document and the NIST
Handbook are available electronically as follows:
Anonymous ftp: csrc.nist.gov (129.6.54.11) in the directory nistpubs/800-12
URL: http://csrc.nist.gov/nistpubs/800-12
Dial-up with modem: 301-948-5717
In the early development of this chapter, NIST considered obtaining a copyright release for an
excellent practices document that originated in the United Kingdom. Copyright was not
obtainable; however, the document was referenced while preparing this chapter. The Code of
Practice for Information Security Management is written in a similar style and offers short
concise practices in IT security. It is highly recommended that this document be obtained as an
excellent source for additional information. The document is the British Standard 7799, A Code
of Practice for Information Security Management. For ordering information, contact BSI
Standards at the following:
BSI Standards
389 Cheswick High Road
London W4 4AL
United Kingdom
44-181-996-9000
12
Principles and Practices
for Securing IT Systems
3.1 Policy
The term computer security policy has more than one meaning. Policy is senior management's
directives to create a computer security program, establish its goals, and assign responsibilities.
The term policy is also used to refer to the specific security rules for particular systems.
Additionally, policy may refer to entirely different matters, such as the specific managerial
decisions setting an organization's e-mail privacy policy or fax security policy.
Organizations should have the following three different types of policy: Program, Issue-
Specific, and System Specific. (Some organizations may refer to these types with other names
such as directives, procedures, or plans.)
3.1.1 Program Policy
An organization's program policy should:
Create and Define a Computer Security Program. Program policy should be clear as
to which resources -- including facilities, hardware, and software, information, and
personnel -- the computer security program covers.
Set Organizational Strategic Directions. This may include defining the goals of the
program. For instance, in an organization responsible for maintaining large mission-
critical databases, reduction in errors, data loss, data corruption, and recovery might be
specifically stressed.
Assign Responsibilities. Responsibilities should be assigned to the computer security
organization for direct program implementation and other responsibilities should be
assigned to related offices (such as the Information Resources Management
organization).
Address Compliance Issues. Program policy typically addresses two compliance
issues: 1) meeting the requirements to establish a program and the responsibilities
13
assigned therein to various organizational components, and 2) the use of specified
penalties and disciplinary actions.
Principles and Practices
for Securing IT Systems
3.1.2 Issue-Specific Policy
An organization's issue-specific policies should:
Address Specific Areas. Topics of current relevance and concern to the organization
should be addressed. Management may find it appropriate, for example, to issue a policy
on how the organization will approach e-mail privacy or Internet connectivity.
Be Updated Frequently. More frequent modification is required as changes in
technology and related factors take place. If a policy was issued, for example, on the
appropriate use of a cutting-edge technology (whose security vulnerabilities are still
largely unknown) within the organization, it could require updating.
Contain an Issue Statement. The organization's position statement, applicability, roles
and responsibilities, compliance, and point of contact should be clear.
3.1.3 System-Specific Policy
An organization's system-specific policies should:
Focus on Decisions. The decisions taken by management to protect a particular system,
such as defining the extent to which individuals will be held accountable for their actions
on the system, should be explicitly stated.
Be Made by Management Official. The decisions management makes should be based
on a technical analysis.
Vary From System to System. Variances will occur because each system needs defined
security objectives based on the system's operational requirements, environment, and the
14
Principles and Practices
for Securing IT Systems
manager's acceptance of risk. In addition, policies will vary based on differing needs for
detail.
Be Expressed as Rules. Who (by job category, organization placement, or name) can
do what (e.g., modify, delete) to which specific classes and records of data, and under
what conditions.
3.1.4 All Policies
All three types of policy should be:
Supplemented. Because policy may be written at a broad level, organizations also
develop standards, guidelines, and procedures that offer users, managers, and others a
clearer approach to implementing policy and meeting organizational goals. Standards,
guidelines, and procedures may be disseminated throughout an organization via
handbooks, regulations, or manuals.
Visible. Visibility aids implementation of policy by helping to ensure policy is fully
communicated throughout the organization.
Supported by Management. Without management support, the policy will become an
empty token of management's "commitment" to security.
Consistent. Other directives, laws, organizational culture, guidelines, procedures, and
organizational mission should be considered.
15
Principles and Practices
for Securing IT Systems
3.2 Program Management
Managing computer security at multiple levels brings many benefits. Each level contributes to
the overall computer security program with different types of expertise, authority, and resources.
In general, executive managers (such as those at the headquarters level) better understand the
organization as a whole and have more authority. On the other hand, front-line managers (at the
computer facility and applications levels) are more familiar with the specific requirements, both
technical and procedural, and problems of the systems and the users. The levels of computer
security program management should be complementary; each can help the other be more
effective. Many organizations have at least two levels of computer security management; the
central level and the system level.
3.2.1 Central Security Program
A central security program should provide distinct types of benefits: increased efficiency and
economy of security throughout the organization and the ability to provide centralized
enforcement and oversight. It should have the following:
Stable Program Management Function. The program management function should be
stable and recognized within the organization as a focal point for computer security.
However complex or simple the program management function is, it requires a stable
base, including resources, to perform its activities.
Existence of Policy. A program should be based on organizational policy and should
create policy, standards, and procedures, as appropriate to address the computer
security needs of the organization.
Published Mission and Functions Statement. The statement should clearly establish
the function of the computer security program and define responsibilities for the
computer security program and other related programs and entities. It is often a part of
organizational policy.
16
Principles and Practices
for Securing IT Systems
Long-Term Computer Security Strategies. A program should explore and develop
long-term strategies to incorporate computer security into the next generation of
information technology.
Compliance Program. A central computer security program needs to address
compliance with national policies and requirements, as well as organization-specific
requirements.
Intraorganizational Liaison. Computer security often overlaps with other offices, such
as safety, reliability and quality assurance, internal control, physical security, or the
Office of the Inspector General. An effective program should have established
relationships with these groups in order to integrate computer security into the
organization's management.
Liaison with External Groups. An established program should be knowledgeable of
and take advantage of external sources of information. It should also provide
information, as appropriate, to external groups.
3.2.2 System-Level Program
While the central program addresses the entire spectrum of computer security for an
organization, system-level computer security programs ensure appropriate and cost-effective
security for each system. System-level computer security programs may address, for example,
the computing resources within an operational element, a major application, or a group of
similar systems (either technologically or functionally). They should have the following:
System-Specific Security Policy. The system policy should document the system
security rules for operating or developing the system, such as defining authorized and
unauthorized modifications.
Life Cycle Management. Systems should be managed to ensure appropriate and cost-
effective security. This specifically includes ensuring that security is authorized by
17
Principles and Practices
for Securing IT Systems
appropriate management and that changes to the system are made with attention to
security (also see Section 3.4).
Appropriate Integration with System Operations. The people who run the system
security program should understand the system, its mission, its technology, and its
operating environment. Effective security management needs to be integrated into the
management of the system. However, if a computer security program lacks appropriate
independence, it may have minimal authority, receive little management attention, and
have few resources.
18