Dhs 4300a download




















Truth, The with jokes Al Franken. Citizenship Requirement Plan of Action and Milestones59 3. Attachment U—Media Reuse [removed as of v9. Components must address these BLSRs when developing and maintaining information for their security documents.

The scope and contents of this handbook will be updated as new capabilities are added to DHS systems, as security standards are upgraded, and as user experiences and needs change.

The aspects of information security covered by this Handbook are comprehensive; they pertain to personnel, physical, information, and industrial security; investigations; emergency preparedness; and domestic counterterrorism.

Additional information will be published by the proponents of these programs. This Handbook provides direction to managers and senior executives for managing and protecting sensitive systems. The sections in this Handbook are numbered parallel to the pertinent sections of DHS Sensitive Systems Policy Directive A, where specific requirements and responsibilities are given. Policy elements are effective when issued.

When the Policy Directive is changed, the CISO will ensure that appropriate tool changes are made available to the Department within forty-five 45 days of the changes. Additional references are located in Appendix C of this document. The following are authoritative references for the DHS sensitive information security program. Additional references are located in Appendix C to this Handbook. These controls consist of risk mitigation techniques normally used by management. Operational controls are designed to improve the security of a particular system or group of systems and often rely on management and technical controls.

Technical controls provide automated protection from unauthorized access or misuse; facilitate detection of security violations; and support security requirements for applications and data. The privacy controls focus on information privacy as a value distinct from, but highly interrelated with, information security.

Privacy controls are the administrative, technical, and physical safeguards employed within organizations to protect and ensure the proper handling of Personally Identifiable Information PII.

Other definitions may be found in Handbook Overview? Examples of sensitive information include personal data such as Social Security numbers; trade secrets; system vulnerability information; pre-solicitation procurement documents, such as statements of work; and information pertaining to law enforcement investigative methods; similarly, detailed reports related to computer security deficiencies in internal controls are also sensitive information because of the potential damage that could be caused by the misuse of this information.

System vulnerability information about a financial system is considered Sensitive Financial Information. All sensitive information must be protected from loss, misuse, modification, and unauthorized access.

With the exception of certain types of information protected by statute e. Sensitive Security Information, Critical Infrastructure Information , there are no specific Federal criteria and no standard terminology for designating types of sensitive information. Such designations are left to the discretion of each individual Federal agency. The term information technology includes computers, ancillary equipment, software, firmware, and similar procedures, services including support services , and related resources.

The term information system as used in this policy document, is equivalent to the term IT system. DHS systems include general support systems and major applications. A GSS normally includes hardware, software, information, applications, communications, data and users. Examples of GSS include local area networks LAN , including smart terminals that support a branch office, Department-wide backbones, communications networks, and Departmental data processing centers including their operating systems and utilities.

For example, a Trust Zone may be set up between different network segments that require specific usage policies based on information processed, such as law enforcement information. It provides the organization with an operational framework for continuing its essential functions when normal operations are disrupted or otherwise cannot be conducted from its primary facility. Examples include accounts receivable records, social security records, payroll records, retirement records, and insurance records.

Statutory requirements include: 1 Periodic assessments of the risk and magnitude of the harm that could result from the unauthorized access, use, disclosure, disruption, modification, or destruction of information and information systems that support the operations and assets of the agency. Are based on the risk assessments required by paragraph 1 above b. Cost-effectively reduce information security risks to an acceptable level c. Ensure that information security is addressed throughout the life cycle of each agency information system d.

Ensure compliance with i. Other applicable Federal policies and procedures as may be prescribed by OMB and NIST Minimally acceptable system configuration requirements, as determined by the agency ii. Any other applicable requirements, including standards and guidelines for national security systems issued in accordance with law and as directed by the President 3 Subordinate plans for providing adequate information security for networks, facilities, and information systems, as appropriate; v Such training shall convey knowledge of a.

Information security risks associated with their activities b. Their responsibility to comply with agency policies and procedures designed to reduce these risks 5 Periodic testing and evaluation of the effectiveness of information security policies, procedures, and practices, to be performed with a frequency depending on risk, but no less than annually. This testing: a. Mitigating risks associated with incidents before substantial damage is done b.

Notifying and consulting with: i. Law enforcement agencies and relevant OIG ii. An office designated by the President for any incident involving a national security system iii. Malaria Indicator Surveys. Wealth Index Construction.

Survey Sampling Tools. The DHS Program is authorized to distribute, at no cost, unrestricted survey data files for legitimate academic research. Registration is required for access to data. Guide to Using Datasets. Quick Country Data Ready-to-use data for over 90 countries from over surveys are only a few clicks away. Select Country to View Quickstats Quickstats list the most popular indicators and provide an overview of a country's demographic and health issues.

Publications Full reports provide comprehensive health indicators for a country. Key findings reports highlight key indicators for a country. Comparative and analytic reports provide cross-national analysis of important topics.

Tell us your story Do you have a data use example that you would like to share? Dataset Users Step-by-step guidelines for dataset users from registration to dataset analysis. A step-by-step guide to DHS data analysis. References to DoD reporting removed.

Stylistic editing. The DHS FISMA reporting process relies on timely entry of data by system owners and information security professionals into DHS security management tools and on submittal of monthly scanning tool data feeds.

FNR requires monthly, quarterly, and annual reporting of key metrics through the Cyberscope tool. November The report includes the results of annual IT security reviews of systems.

The responses are aggregated for all systems by Component and then entered into the Cyberscope application. Continuous Monitoring 2. Implementation of Homeland Security Presidential Directive HSPD for logical access control In FY13, these priorities continue to provide emphasis on FISMA metrics that are identified as having the greatest probability of success in mitigating cybersecurity risks to agency information systems.

These quarterly updates are due in January, April and July. A Quarterly report for 4th quarter is not required. OMB uses these quarterly reports to monitor the progress of DHS remediation efforts and to identify progress and problems. IACS utilizes questionnaires and templates to filter a master set of DHS security requirements so as to identify the subset of policies applicable to a specific IT system undergoing security authorization.

This data is then used to tabulate Scorecard totals. Once data enters MAST, it is not removed for any purpose other than to fulfill mandatory reporting requirements. Data is consolidated and normalized for report generation. It is stored on a standalone, air-gapped system. The import process does not determine nor recognize the tool used to provide the data. The application identifies based upon field names and required format.

This means that any tool can be used to provide ISCM required data as long as all data elements are provided. Using direct connections to Oracle, Crystal Reports is able to obtain data from IACS and several other sources to generate daily and monthly reports.

Access to each tool site is controlled by a two-part login procedure. The Customer Service Center is available during normal business hours a. EST to answer questions regarding usage of the tool. The reporting requirements change on an annual basis and generally reflect the latest information security concerns. As discussed earlier, some of the data is generated based on data entered into IACS.

The majority of data is acquired using various tools Nessus, McAfee, Bigfix during monthly scans that are part of the Continuous Monitoring data collection process. The Components have received a template designed by the ISO Continuous Monitoring team which specifies the formatting and type of data required from the data collection tools.



0コメント

  • 1000 / 1000