Information Systems Security Checklist
Information Systems Security Checklist
Page 1
NISPOM Checklist
Page 2
NISPOM Checklist
Page 3
NISPOM Checklist
4.102a. 8.402a. Protection Do all users have all required approvals for access to
Level 1 all information on the system?
(all users must have all required clearances, formal
access approvals, and the need-to-know for all
information on the IS, i.e. dedicated mode.)
4.102b. 8.402b. Protection Do all users have all required clearances, and all
Level 2 required formal access approvals,but at least one user
Page 4
NISPOM Checklist
4.102c. 8.402c. Protection Do all users have all required clearances, but at least
Level 3 one user lacks formal access approval for some of the
information on the system?(i.e. compartmented mode.)
4.102. 8.402. Appropriate What is the established Protection Level for the
Protection Level system? (based on the criteria above) ________________
Page 5
NISPOM Checklist
5.104. 8.504. Tactical, Has the CSA determined that this system is sufficiently
Embedded, incapable of alteration, and that the application(s)
Data-Acquisition, running on the system provide an adequate level of
and Special- security? (If so, the system does not have to meet
Purpose additional security requirements specified for
Systems more-general-purpose systems in this section)
5.105. 8.505. Systems with Provided that the systems includes an acceptable level
Group of individual accountability, shall group authenticators
Authenticators be used for broader access after the use of a unique
authenticator for initial authentication and will this be
documented in the SSP? (Group authenticators may
not be shared with anyone outside the group)
Section 6. Protection Requirements
Page 6
NISPOM Checklist
Resource Control Have the ResrcCtrl requirements for each system been
6.108. 8.608. (ResrcCtrl) determined? (None or ResrcCtrl 1)
6.108. 8.608. ResrcCtrl 1 reallocated.
Session Controls Have the SessCtrl requirements for each system been
6.109. 8.609. (SessCtrl) determined? (SessCtrl 1 or SessCtrl 2)
SessCtrl 1
6.109a. 8.609a. Requirements
6.109a1. 8.609a1. User Notification prohibited and subject to criminal and civil penalties?
developed and approved by the CSA used?
Successive Logon Are successive logon attempts controlled as specified in section
6.109a2. 8.609a2. Attempts 8.609a2 ?
6.109a3. 8.609a3. System Entry conditions associated with the authenticated user’s profile?
anonymous file access?
SessCtrl 2
6.109b. 8.609b. Requirements Is the system
account, doescompliant with the
the IS provide SessCtrl capability
a protected 1 requirements?
to control
Multiple Login the number of logon sessions for each user ID, account, or
6.109b1. 8.609b1. Control specific port of entry?
Does the IS default to a single logon session?
6.109b2. 8.609b2. User Inactivity authenticator?
documented
of in the
the user’s last SSP?
logon; the location of the user at last logon;
and the number of unsuccessful logon attempts using this user
6.109b3. 8.609b3. Logon Notification ID since the last successful logon?
from the screen?
Security
Documentation
6.110. 8.610. (Doc)
Doc 1
6.110a. 8.610a. Requirements
6.110a1. 8.610a1. SSP of the responsible system owner, CSA, ISSM, and ISSO?
protocols?
formal access approval and need-to-know of IS users?
availability level of concern?
being met?
documentation shall be attached to the SSP?
vulnerabilities described?
connections to other systems, and an information flow diagram.
with other agencies?
criteria, and security requirements?
including risk assessment?
frequency of such testing?
the ISSM?
package and provide accreditation documentation?
Separation of
Function
Requirements If the system is Protection Level 3, are the functions of ISSO
6.111. 8.611. (Separation) and system manager performed by separate people?
System Recovery
6.112. 8.612. (SR)
SR 1 Are Procedures and IS features implemented to ensure that IS
6.112a. 8.612a. Requirements recovery is done in a controlled manner.
System
Assurance Have the SysAssur requirements for each system been
6.113. 8.613. (SysAssur) determined? (SysAssur1, SysAssur 2 or SysAssur 3)
SysAssur 1
6.113a. 8.613a. Requirements
Access to
Protection Is Access to hardware/software/firmware that perform systems
6.113a1. 8.613a1. Functions or security functions limited to authorized personnel?
SysAssur 2
6.113b. 8.613b. Requirements Is the system compliant with the SysAssur 2 requirements?
Protection Are the protections and provisions of the SysAssur
6.113b1. 8.613b1. Documentation documented?
Periodic Do features and procedures exist to periodically validate the
Validation of correct operation of the hardware, firmware, and software
6.113b2. 8.613b2. SysAssur elements of the SSS and are documented in the SSP?
SysAssur 3
6.113c. 8.613c. Requirements Is the system compliant with the SysAssur 3 requirements?
6.113c1. 8.613c1. SSS Isolation reading or modifying its code and data structures)?
Security Testing Have the test requirements for each system been determined?
6.114. 8.614. (Test) (Test 1, Test with
accordance 2 or Test3)
the approved SSP and that the security
Test 1 features, including access controls and configuration
6.114a. 8.614a. Requirements management, are implemented and operational?
Test 2
6.114b. 8.614b. Requirements Is the system compliant with the Test 1 requirements?
6.114b1. 8.614b1. operational?
Page 7
NISPOM Checklist
Test 3
6.114c. 8.614c. Requirements Is the system compliant with the Test 2 requirements?
6.114c1. 8.614c1. Protection
ISSM Level are
develop functional?
a plan that identifies the facility's mission
essential applications and information, procedures for the
Disaster Recovery backup of all essential information and software on a regular
6.115. 8.615. Planning basis, and testing procedures?
Section 7. Interconnected Systems
Interconnected
Systems
7.100. 8.700. Management
7.100a. 8.700a. connected network requires a higher protection level?
7.100c. 8.700c. unit?
7.100d. 8.700d. requirements defined in section 8.700d1 – 8.700d3?
7.100e. 8.700e. 8.700e1 – 8.700e3?
Controlled
Interface
7.101. 8.701. Functions
Controlled
Interface
7.102. 8.702. Requirements
Adjudicated Does the CI monitor and enforce the protection requirements of
7.102a. 8.702a. Differences the network and adjudicate the differences in security policies?
Does the CI base its routing decisions on information that is
7.102b. 8.702b. Routing Decisions supplied or alterable only by the SSS?
Restrictive
Protection Does the CI support the protection requirements of the most
7.102c. 8.702c. Requirements restrictive of the attached networks or IS?
7.102d. 8.702d. User Code Is user code prohibited from running on the CI?
7.102e. 8.702e. Fail-Secure exposure to loss of integrity or availability?
Communication Does the CI ensure that communication policies and
7.102f. 8.702f. Limits connections that are not explicitly permitted are prohibited?
Only Privileged Do only privileged users, such as systems admins, have access
7.102g. 8.702g. Users to theeach
Has CI? CI been tested and evaluated to ensure that the CI,
Assurances for as implemented, can provide the separation required for the
7.103. 8.703. CI's system’s protection level?
Page 8
NISPOM Checklist
Is this ok as is?
Page 9