home *** CD-ROM | disk | FTP | other *** search
-
-
-
- U. S. DEPARTMENT OF COMMERCE
-
- ABBREVIATED CERTIFICATION
- METHODOLOGY
- GUIDELINES
-
- FOR SENSITIVE AND CLASSIFIED
- INFORMATION TECHNOLOGY
- SYSTEMS
-
-
-
-
-
-
-
-
-
-
-
-
- December 1, 1992
-
-
- U. S. DEPARTMENT OF COMMERCE
- ABBREVIATED CERTIFICATION METHODOLOGY
- FOR SENSITIVE INFORMATION TECHNOLOGY SYSTEMS
-
-
- A. INTRODUCTION
-
- It is the policy of the Department of Commerce (DOC) to
- comply fully with all federal statutes and directives on
- information technology (IT) security and to provide
- protection commensurate with the sensitivity of the systems
- or data processed.
-
- Protection requirements for each of the individual IT
- systems within the Department will vary according to the
- unique characteristics of the system, environmental
- concerns, data sensitivity and mission related criticality
- of the system or data. Appropriate levels of security must
- be determined by an evaluation of the threats,
- vulnerabilities and risk factors associated with each
- system. Cost-effective controls that are adequate to
- achieve an acceptable level of risk for the individual
- system must then be implemented.
-
- The DOC "Information Technology Accreditation Policy" issued
- on July 6, 1992 established the requirement for
- accreditation of all unclassified sensitive and classified
- national security IT systems. Accreditation is the
- authorization and approval, granted to a sensitive or
- classified IT system to process, as an acceptable risk, in
- an operational environment. Accreditation is made on the
- basis of recommendations from a technical certification
- evaluation that the IT system meets all applicable federal
- and DOC policies, regulations, and standards and that all
- installed security safeguards appear to be adequate and
- appropriate for the sensitivity of the system; that they are
- operating correctly; or, that the system must be operated
- under certain specified conditions or constraints.
-
- The technical certification evaluation results are the basis
- for the system owner's certification statement in the
- accreditation request.
-
- B. PURPOSE
-
- The purpose of this document is to provide guidance on
- appropriate procedures to follow in performing the technical
- certification evaluations of all sensitive and classified
- national security systems within the Department.
-
- The DOC issued a "Methodology for Certifying Sensitive
- Computer Applications" in March 1987. The process described
- in that document was required for any new DOC applications
- or any modification of existing applications that handle
- sensitive information. It is especially suited for large
- complicated applications, for applications which are in-
- house developed or involve extensive modifications to
- customize for Commerce use, applications with very high
- sensitivity such as major financial applications which
- process high dollar amounts or are subject to fraud or
- abuse, or for new applications without existing security
- documentation. This original certification methodology
- should be used for systems meeting the above criteria.
-
- That methodology has proved to be far too complex for many
- of the Department's systems. The methodology described in
- this document is an abbreviated form of this process,
- developed to address existing sensitive systems with
- extensive documentation already available. It is intended
- to handle smaller systems and applications such as those
- associated with personal computers (PCs) or those systems
- with only a few users, and turn-key or commercial systems
- which were procured against a detailed set of security
- specifications. This abbreviated methodology stresses the
- use of existing documentation wherever possible. It can be
- used for completing the technical certification evaluation
- requirements for both application systems and general
- support systems. The term "system" used in this document is
- intended to mean either of the following, as appropriate:
-
- 1. Application Systems - Systems that perform clearly
- defined functions for which there are readily
- identifiable security considerations and needs. Such a
- system might actually comprise many individual
- application programs and hardware, software, and
- telecommunications components. They can be either a
- major software application or a combination of
- hardware/software where the only purpose of the system
- is to support a specific mission related function. The
- system may process multiple individual applications, if
- all are related to a single mission function.
-
- 2. General Support Systems - These consist of hardware and
- software that provide general automated data processing
- or network support for a variety of users and
- applications. Individual applications may be less
- easily distinguishable than in the previous category,
- but such applications may contain sensitive
- information, or be critical to the mission
- accomplishment of the organization. Even if none of
- the individual applications are sensitive, the support
- system itself may be considered sensitive if the
- aggregate of applications and support provided are
- critical to the mission of the operating unit.
-
- C. ABBREVIATED CERTIFICATION METHODOLOGY
-
- Certification is based on a technical evaluation of a
- sensitive system to see how well it meets its security
- requirements, including all applicable federal policies,
- regulations, and standards. The results of tests should
- demonstrate that the installed security safeguards are
- adequate and appropriate for the system. The certification
- process is the final step leading to accreditation of the
- system. Sensitive systems will be recertified and
- reaccredited when substantial changes are made to the
- system, when changes in requirements result in the need to
- process data of a higher sensitivity, after the occurrence
- of a serious security violation which raises questions about
- the validity of an earlier certification, and in all cases
- no less frequently than three years after a previous
- certification.
-
- Certification evaluations are conducted by the organization
- that owns the system. The certification team should get
- input from all who have involvement with the system,
- including:
-
- IT security staff,
-
- system owner staff,
-
- computer program development staff, if the application
- was developed in-house, and
-
- the computer operations staff, if the application is
- run on a computer managed by a separate organization.
-
- users
-
- Representatives from as many of these organizations as
- possible should be included on the Certification Review
- Team.
-
- The certification methodology described in this document
- consists of the following steps, which will be described
- more fully in the rest of this document:
-
- Step 1. Assemble a team
- Step 2. Collect existing documents
- Step 3. Describe the system and its sensitivity
- Step 4. Identify protection requirements and
- vulnerabilities
- Step 5. Identify security features needed
- Step 6. Test the adequacy of controls
- Step 7. Evaluate test results
- Step 8. Certify the system
-
- Worksheet forms to document each step in the certification
- process are provided in Appendix A.
-
-
-
-
- Definitions
-
- Certification is a technical evaluation of a sensitive
- system to see how well it meets necessary security
- requirements, such as appropriate federal policies,
- regulations, and standards.
-
- The Certifying Official is a senior manager in the
- organization which owns the system. The system owner is the
- organization which has functional responsibility for the
- system. The Certifying Official should be a manager who was
- responsible for having the system developed or the
- functional area that the system supports, who has a need for
- the results produced by the system, and can allocate
- resources to correct deficiencies in the security controls
- for the system.
-
- The Certification Review Team will collect the information
- needed for the certification process, identify
- vulnerabilities, develop a list of needed security features,
- develop tests of the adequacy of the features, and evaluate
- the test results.
-
- Security features are controls that protect against the
- identified vulnerabilities, such as fire and water alarms,
- passwords and other access protection, use of removable
- media for data storage, data validation controls, audit
- trails, uninterruptable power sources to protect against
- electrical outages, personnel screening, IT security
- awareness training of users, etc.
-
- A sensitive system is one that requires some degree of
- protection for confidentiality, integrity or availability.
- This includes data whose improper use or disclosure could
- adversely affect the ability of an agency to accomplish its
- mission, proprietary data, records about individuals
- requiring protection under the privacy Act, and data not
- releasable under the Freedom of Information Act. If the
- system is required for accomplishment of an agency mission
- it need not contain any sensitive data.
-
- Test scenarios are descriptions of the tests to be performed
- to check the effectiveness of the security features
- incorporated into the system. They may include validation
- of password constraints such as length and composition of
- the password, entry of erroneous data to check data
- validation controls, review of audit information produced by
- the system, review of contingency plans and risk analyses,
- etc.
-
- Vulnerabilities are ways in which the system may be attacked
- or may fail. They include susceptibility to physical
- dangers such as fire or water, unauthorized access to
- sensitive data, entry of erroneous data, denial of timely
- service, fraud, etc.
-
- Methodology Approach
-
- Step 1 - Assemble a team: The first step in the abbreviated
- process is to assemble a team to gather the information and
- documentation needed to assess and demonstrate the adequacy
- of security measures used. The team should include
- representatives of IT security, application owners, software
- development, computer systems, and users. For very small
- systems the users, software programming staff, and computer
- systems staffs may be the same. The IT security staff
- provides an outside viewpoint to ensure that the best IT
- security practices are used in protecting sensitive systems.
- Where computer system staff, software programmers, and users
- are in separate organizations, it is important that all
- points of view are represented in the process, to ensure
- that user expectations of protection needs are addressed,
- and that software and computer system constraints are
- understood.
-
- Step 2 - Collect existing documents needed for the
- certification evaluation: These documents include, but are
- not limited to:
-
- 1. system specifications and documentation
- 2. system security plan
- 3. risk analysis
- 4. contingency and disaster recovery plans
- 5. staff records on personnel and the IT Security
- Officer identification, training and position
- sensitivity levels
- 6. Internal Control Reviews, security reviews, etc.,
- if existing
-
- Step 3 - Identify and describe the system to be certified
- and describe why it is sensitive: It is necessary to have a
- written description of the purpose of the system, the
- hardware and software environment on which the system is
- operated, and a description of the sensitivity of the
- system, including any special applicable laws and
- regulations. This information is readily available in the
- Sensitive System Security Plan for the system being
- certified. If the certification is for a software
- application system that will be used by others, the hardware
- description should address the hardware needed to operate
- the system, but the certification should focus on the
- software application program. Complete the blank sections
- of Sensitive System Certification Worksheet 1, System
- Description and attach a copy of the approved Sensitive
- System Security Plan for the system being evaluated. The
- Worksheet identifies the section numbers in the security
- plan where detailed information can be obtained for review.
-
- Step 4 - Identify protection requirements and
- vulnerabilities: Review the description of the protection
- requirements for the system under the headings
- confidentiality, integrity, and availability in Section
- II.B. of the Sensitive System
- Security Plan. Enter the levels of protection required
- (high, medium, low) in the blanks provided on Worksheet 1.
-
- Identify vulnerabilities for the system related to these
- protection requirements. Most vulnerabilities will be
- addressed in the existing documents collected in Step 2.
- All sensitive systems should have a completed risk analysis.
- The risk analysis will identify vulnerabilities and their
- consequences, such as unauthorized disclosure of
- information, loss of data or other resources, denial of
- service, decisions based on erroneous information, etc.
- System documentation is another source of information about
- the vulnerabilities. The security plan for the system being
- evaluated contains information about specific
- vulnerabilities and control measures addressed. The team
- should also review any existing Internal Control, Inspector
- General (IG) or security review reports on the system, for
- additional information on system vulnerabilities. In
- addition to the documentation, the team may need to
- interview managers in the user organization to ascertain
- their concerns about the sensitivity of the system and the
- level of protection required.
-
- Complete the Sensitive System Certification Worksheet 2:
- Identified Vulnerabilities by listing the identified
- vulnerabilities.
-
- Step 5 - Identify security features needed: The team next
- needs to review existing documents to identify the controls
- in place to address the vulnerabilities identified above.
- The risk analysis, security plans, and system documentation
- reviewed for vulnerabilities also contain information on
- controls used to reduce those vulnerabilities. System
- specifications, if they still exist, will also provide
- information on the controls designed into the system. The
- team will also need to review the contingency and disaster
- recovery plans for the system. The team should interview
- the IT System Security Officer to review installation IT
- security procedures. Staff training records will show the
- level of IT security training given to application and
- computer installation staff. Staff records should also show
- the sensitivity designation of staff positions and any
- personnel investigations, required and conducted, for staff
- in the affected positions. Complete the Sensitive System
- Certification Worksheet 3: Security Features.
-
- Step 6 - Test adequacy of controls: Once vulnerabilities
- and controls have been identified, the team should
- selectively check the adequacy of the controls. Some live
- tests may be needed to ensure that documented controls
- actually work. Other controls may be reviewed through other
- means. Previous system reviews and system acceptance tests
- may contain records of tests previously performed. It is
- not necessary to repeat these tests, if the system has not
- changed since they were done. The review of vulnerabilities
- and controls should identify any areas not adequately
- addressed. Sensitive System Certification Worksheet 4:
- Security Tests is used to list the tests to be performed.
- Use Sensitive System Certification Worksheet 5: Security
- Test Results to record the results of the tests.
-
- Step 7 - Evaluate the test results: Once all tests are
- completed, a summary of the evaluation of the tests should
- be prepared. The team should then prepare recommendations
- about certification. Sensitive System Certification
- Worksheet 6: Evaluation and Recommendations is used to
- record the evaluation of test results and the team's
- recommendation. The recommendation section should be signed
- by all members of the team and dated.
-
- If the tests results indicate that all protection
- requirements have been met, the team can recommend
- certification with no further action required.
-
- The Certification Review Team may determine from the
- test results that the protection requirements were not
- met for the system. In that case, the evaluation
- discussion of test results should explain the
- inadequacy of the controls in place.
-
- The team may alternatively certify that the basic
- protection requirements have been met, but recommend
- additional features be required. This latter form of
- certification is appropriate for certifying a software
- application system which must have certain operating
- system or hardware features in place for approved
- operation. This may also be used in recommending
- interim accreditation pending installation of some
- additional control not currently available.
-
- Step 8 - Certification: The official Certification document
- is signed by a senior management official in the system
- owning organization. A sample certification document is
- attached as Appendix B.
-
- There may be situations when the need for a system is such
- that it must be put into operation before a full
- certification is possible. In this case, the Certifying
- Official can provisionally certify the system for operation,
- possibly with some restrictions, pending specific actions to
- be completed in a predefined time frame. This interim
- certification cannot exceed one year. These actions should
- also be included as milestones in the security plan for the
- system. The certification process must be flexible enough
- that it accommodates the need for operational efficiency as
- well as adequate protection of the system.
-
- APPENDIX A
-
- SENSITIVE SYSTEM CERTIFICATION WORKSHEETS
-
- This Appendix contains a set of six worksheets to assist with
- documenting the certification evaluation of the system. Each
- worksheet is preceded by a set of instructions and definitions
- which will provide guidance for completing the evaluation and the
- worksheet.
-
- DIRECTIONS FOR COMPLETING WORKSHEET 1:
- SYSTEM DESCRIPTION
-
- Much of the information requested on Worksheet 1 is contained in
- the Security Plan for the system. To avoid having to rewrite
- this information and have a ready reference to the needed
- information, attach a copy of the Security Plan behind Worksheet
- 1. Each worksheet contains blank lines, where information must
- be entered. This step is important to avoid confusion with other
- system certification evaluation documentation.
-
- System Name/Title is the name of the system used in the Security
- Plan for a sensitive system (Section I.B of the Security Plan).
- To avoid confusion with other certification evaluation
- documentation this should be written on all worksheets.
-
- System ID is the unique six digit system identification number
- assigned for each sensitive system in the Department. Again, to
- avoid confusion with other certification evaluation documentation
- this should be written on all worksheets.
-
- System Owner is the name of the contact person in the owning
- organization who is knowledgeable about the system and protection
- requirements. It may be the person listed as Information Contact
- (Section I.G) in the Security Plan. Provide full address and
- phone number, including area code, for the owner.
-
- Developer is the name of the person who is responsible for
- developing the software. If this is a commercial application,
- put the name of the organization in this space. If there is no
- developer or the developer's name is unknown, put "none" in this
- space.
-
- General Description/Purpose is a description of the function and
- purpose of the system. This information is contained in Section
- I.E of the Security Plan.
-
- System Environment and Special Considerations is a description of
- the computer and software environment of the system. This
- information is contained in Section I.F of the Security Plan.
-
- Sensitivity of Information Handled describes why the system is
- sensitive.
-
- Applicable Laws and Regulations lists any laws and
- regulations that specifically apply to this system, such as
- the Privacy Act. This information is contained in Section
- II.A of the Security Plan.
-
- General Description of Information Sensitivity is a
- description of why the system is sensitive and the nature of
- that sensitivity. This information is contained in the
- introduction to Section II.B of the Security Plan.
-
- Description of Protection Requirements describes what makes the
- system sensitive. The descriptions of protection needs for
- confidentiality, integrity, and availability are contained in
- Section II.B of the Security Plan. Write in the designated level
- (high, medium, low) in the blanks provided.
- SENSITIVE SYSTEM CERTIFICATION WORKSHEET 1
- SYSTEM DESCRIPTIONSystem Name/TitleSystem ID:
- System Owner
-
- Address: ______________________________________________________
- _________
- ______________________________________________________
- _________
- Phone: ______________________________________________________
- _________Programmer/Developer:
-
- Address: ______________________________________________________
- _________
- ______________________________________________________
- _________
- Phone: ______________________________________________________
- _________General Description/Purpose
- (See Section I.E. of attached security plan.)
- System Environment and Special Consideration
- (See Section I.F. of attached security plan).
-
- Sensitivity of Information Handled:
- Applicable Laws and Regulations Affecting the System
- (See Section II.A. of attached security plan.)
-
- General Description of Information Sensitivity
- (See Section II.B. of attached security plan.)
- Description of Protection Requirements
- See Section II.B. of attached security plan and fill in the
- designated level (high, medium, low) in the blanks.
-
- Confidentiality ______
-
- Integrity ______
-
- Availability ______
-
-
- DIRECTIONS FOR COMPLETING WORKSHEET 2:
- IDENTIFIED VULNERABILITIES
-
-
- System Name/Title and System ID are the same as on Worksheet 1.
-
- Description of Identified Vulnerabilities should include the
- vulnerabilities that the system may have prior to putting
- controls in place. These should have been identified in the risk
- analysis. They might include physical vulnerabilities such as
- fire or disk crashes, entry of erroneous data, denial of service,
- and unauthorized access to information.
- SENSITIVE SYSTEM CERTIFICATION WORKSHEET 2
- IDENTIFIED VULNERABILITIESSystem Name/TitleSystem ID:
-
- Description of Identified Vulnerabilities
- (From Risk Analysis, Security Plan, system documentation,
- interviews and other review reports - Risks that exist prior
- to putting any controls in place)
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DIRECTIONS FOR COMPLETING WORKSHEET 3:
- SECURITY FEATURES
-
-
- System Name/Title and System ID are the same as on Worksheet 1.
-
- Description of Security Features is a list of the security
- features used to protect this system. They can be taken from
- Sections III.C of the Security Plan and include Management
- Controls, Development/Implementation Controls for application
- systems, Acquisition/Development/Installation Controls for
- general support systems, Operational Controls, Security Awareness
- and Training, Technical Controls and Complementary Controls
- Provided by General Support Systems for application systems or
- Controls Over the Security of Applications for general support
- systems.
-
- Although, it is not necessary to include the level of detail
- contained in the Security Plan, the controls should be listed to
- provide a foundation for selecting tests to be performed to
- verify if the controls are adequate and appropriate and are
- operating as expected.
- SENSITIVE SYSTEM CERTIFICATION WORKSHEET 3
- SECURITY FEATURESSystem Name/TitleSystem ID:
- Description of Security Features:
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DIRECTIONS FOR COMPLETING WORKSHEET 4:
- SECURITY TESTS
-
-
- System Name/Title and System ID are the same as on Worksheet 1.
-
- Test Scenarios should contain a numbered list of the tests to be
- preformed to verify the controls listed on Worksheet 3. For more
- detail about the controls, see Section III.C. of the security
- plan.
-
- If this is an existing system that has been in
- operation for some time, the tests may selectively test
- the most critical controls.
-
- If the system is under, or just completed development,
- or is a turn-key system, all security controls should
- be tested.
-
- If testing has been done for a another recent review,
- or during recent acceptance testing of the system, it
- may not be necessary to repeat the tests. It will be
- necessary to review records of the prior tests, and
- determine if the documentation of the tests and results
- are adequate. If it is determined that it is not
- justified to repeat the tests, a statement should be
- included on Worksheet 4 explaining the reason. Also,
- include enough information about all supporting
- documentation reviewed, to allow it to be located for
- future reference. At a minimum, include a list of
- tests from the documentation, that were performed.
- This list need not contain as much detail for each
- individual test as the referenced documentation.
-
- SENSITIVE SYSTEM CERTIFICATION WORKSHEET 4
- SECURITY TESTSSystem Name/TitleSystem ID:
- Test Scenario:
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DIRECTIONS FOR COMPLETING WORKSHEET 5:
- SECURITY TEST RESULTS
-
-
- System Name/Title and System ID are the same as on Worksheet 1.
-
- Test Results reports the results of each of the tests described
- on Worksheet 4. The numbers on Worksheet 5 for each test result
- should agree with the numbers on Worksheet 4 for the test
- description. Indicate whether the was "Passed" or "Failed".
-
-
- SENSITIVE SYSTEM CERTIFICATION WORKSHEET 5
- SECURITY TEST RESULTSSystem Name/TitleSystem ID:
- Test Results:
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
- DIRECTIONS FOR COMPLETING WORKSHEET 6:
- EVALUATION AND RECOMMENDATIONS
-
-
- System Name/Title and System ID are the same as on Worksheet 1.
-
- Evaluation of Test Results should discuss the results of the
- tests and their relationship to assuring the adequacy of
- controls.
-
- Under Recommendations check one of the three responses.
-
- Check Tests indicate that protection requirements were
- met if all tests resulted in correct results.
-
- Check Tests indicate that protection requirements were
- not met if some tests failed and corrections have not
- been, or cannot be implemented.
-
- Check Tests indicate that protection requirements were
- met; recommend certification with the following
- additional security features required: if there are
- additional security controls needed to meet the
- protection requirements. This category should be used
- when certifying software applications that require
- hardware or operating system features to assure
- adequate protection. It should also be used if an
- interim certification is being recommended, pending
- completion of specific actions.
-
- Certifying Team Signatures should included printed names of the
- certifying team members, a signature, and a date for each team
- member.
-
- SENSITIVE SYSTEM CERTIFICATION WORKSHEET 6
- EVALUATION AND RECOMMENDATIONSSystem Name/TitleSystem
- ID:
- Evaluation of Test Results:
-
-
-
-
-
-
-
- Recommendations:
-
- _____ Tests indicate that protection requirements were
- met.
- RECOMMEND CERTIFICATION OF THIS SYSTEM.
-
- _____ Tests indicate that protection requirements were
- not met. RECOMMEND THAT THIS SYSTEM NOT BE
- CERTIFIED.
-
- _____ Tests indicate that protection requirements were
- met; recommend certification with the following
- additional security features required:
-
-
-
-
- Certifying Team Signatures
-
-
- Name Signature
- Date
-
- _______________________________________________________________
- ____________
-
- _______________________________________________________________
- ____________
-
- _______________________________________________________________
- ____________
-
-
-
- Appendix B
-
- Sample Certification Statement
-
-
- I have carefully examined the certification worksheets for DOC
- Information Technology System Number _________, "Insert system
- name/title", dated ___________________ . Based on the
- information contained in this package and the results of tests
- conducted on the system, it is my judgment that satisfactory
- information technology controls are in place to adequately
- protect the system and that it is operating at an acceptable
- level of risk.
-
- I hereby certify DOC IT System Number ________, "Insert system
- name/title", for a period not to exceed three years. Should
- substantial changes or security incidents occur during that three
- year period, which bring the adequacy of the protection measures
- for this system into question, a reevaluation and recertification
- must be completed earlier.
-
-
-
-
- Certification Official Name/Title:
-
- ______________________________________________
-
- ______________________________________________
-
-
- Signature: _____________________________________________ Date:
- ____________
-
-
-