NSTSSI Security Education Standards
4. Ensure users and system support personnel have the required security clearances, authorization, and need-to-know, are indoctrinated, and are familiar with internal security practices before access to the IS is granted a. Personnel (1) Position Sensitivity E - identify sensitive positions; and I - justify sensitive positions. (2) Disgruntled Employees E - identify characteristics of disgruntled employees; and I - monitor access of identified disgruntled employees. (3) Separation of Duties A - direct the separation of duties of personnel in accordance with established policies and procedures. (4) Security Staffing Requirement E - monitor staffing requirements; and A - direct security staffing. (5) Background Investigations A - monitor background investigations of personnel assigned. (6) Termination Process I - identify the requirement for termination of an employee's access to a system; and A - comply with established policies and procedures when terminating the employee's access to an IS. b. Policy & Procedures (1) Emergency Destruction A - develop policies and procedures for the destruction of hardware, software, and firmware under emergency conditions. (2) Access Control Policy (ACP) I - report non-compliance with ACP; and A - develop access control policies. (3) Organizational Placement of IS/Information Technology (IT) Security Functions I - monitor and report IS/IT security functions and report on effectiveness. (4) Disposition of Classified Information I - dispose of classified hardware and software in accordance with written instructions; and A - develop procedures for disposing of classified hardware, software and firmware. c. Education, Training, & Awareness (1) Security Awareness I - use and present security awareness materials; and A - develop security awareness materials for IS users. (2) Security Training I - present security training to IS users; I - monitor security training of all IS user; and A - develop security training materials. (3) Security Education I - present security education to IS users/managers; I - monitor security education of all IS users; and A - develop/design IS education programs. d. General Information (1) Organization Culture I - monitor the organization's culture and it's affect on the security of an IS. (2) Basic/Generic Management Issues I - identify basic management issues and their impact on an IS security program. e. Operations (1) Account Administration E - establish user accounts in accordance with policy; I - develop security policy for account administration; and A - conduct oversight for account administration. (2) Intrusion Detection E - test operability of physical intrusion detection systems. (3) Backups E - outline security policy for backup procedures; I - review backup policy; and A - enforce compliance with backup policy. (4) Password Management E - issue passwords; I - enforce control and use of passwords in accordance with policy, procedures and requirements; and A - develop password management policy.