Strategic Security Intelligence

NSTSSI Security Education Standards


Top - Help

Copyright(c), 1995 - Management Analytics and Others - All Rights Reserved


            a. Access Control Policies

                  1)    explain the access control policies as implemented in the current system to
the DAA;
                  2)    define who in the current system has access to information views, who
grants the access authorization, and the parameters which will be used to validate access
                  3)    identify the adequacy of the implemented access control mechanisms
identified in the access control policy and comment on this in the report;
                  4)    evaluate the access control mechanisms implemented in accordance with
the policy, and include the results of this evaluation in the report; and
                  5)    recommend changes to the implemented access control mechanisms in the
report as needed to meet requirements identified in the access control policies.

            b. Administrative Security Policies and Procedures

                  1)    address all pertinent security policies and procedures not covered under the
laws, agency-specific procedures, etc. (NOTE: this review examines these procedures and
policies in respect to applicable national laws and governing regulations consistent with security
requirements); and
                  2)    recommend administrative security policies and procedures to limit the
impact of system technical security deficiencies.

            c.    Certification

                  1)    recommend the conditions upon which an accreditation decision is to be
made, including the technical evaluation of security features, as well as other safeguards;
                  2)    identify the deficiency and alternative safeguards and procedures that could
be employed to limit the impact of system deficiency;
                  3)    recommend the adoption of requirements which were previously
unspecified, but which may be crucial to secure deployment and operation of the system; and
                  4)    report on the comprehensive evaluation of the technical and non-technical
security features of the IS and other safeguards, to meet the security and accreditation 

            d. Roles and Responsibilities
                  1)    outline current roles and responsibilities of personnel assigned access to the
systems being certified; and
                  2)    recommend changes to include additions for improving the roles and
responsibilities and accountability for personnel with various levels of access to the information
systems being certified.

            e.    Brief and Defend ST&E Results

                  1)    describe the ST&E results; and
                      2)    explain and defend the specific findings, including risk analysis/mitigation.

                f.    Communicate Results of ST&E

                      1)    render the technical findings into comprehensible language for non-
technical managers; and
                      2)    communicate the results/findings to technical personnel who would be
responsible for correcting the findings.

                g. Identify Potential Corrective Approaches
                      1)    identify potential avenues of corrective action;
                      2)    provide corrective approaches to the DAA as potential mitigating factors, if
adopted; and
                      3)    address the technical aspects of the system to meet the technical security
requirements for its intended use and to identify those areas where non-technical means such
as procedures; or
                      4)    restrictions are needed to reduce the risk of operating the system to an
acceptable level.

                h. Determine Residual Risk

                      1)    report the findings and the overall level of residual risk in the current
system; and
                      2)    compare and contrast the non-technical and technical test/evaluation
results, the impact of any countermeasures, and determine the residual risk.