For Official Use Only DIRECTOR OF CENTRAL INTELLIGENCE DIRECTIVE 6 3 PROTECTING SENSITIVE COMPARTMENTED INFORMATION WITHIN INFORMATION SYSTEMS POLICY Effective 05 June 1999 This directive is promulgated pursuant to authorities andresponsibilities assigned to the Director of Central Intelligence DCI for the protectionof intelligence sources and methods These DCI authorities and responsibilities may befound in the National Security Act of 1947 as amended in Executive Orders 12333 and12958 in National Security Directive 42 and in other applicable law These authoritiesare reflected in DCID 1 1 The Authorities and Responsibilities of the Director ofCentral Intelligence as Head of the U S Intelligence Community A Purpose 1 This directive establishes the security policy and procedures for storing processing and communicating classified intelligence information in information systems ISs For purposes of this Directive intelligence information refers to Sensitive Compartmented Information and special access programs for intelligence under the purview of the DCI An information system is any telecommunications and or computer related equipment or interconnected system or subsystems of equipment that is used in the acquisition storage manipulation management movement control display switching interchange transmission or reception of voice and or data digital or analog it includes software firmware and hardware 2 Intelligence information constitutes an asset vital to the effective performance of our national security roles It is essential that this information be properly managed and that its confidentiality integrity and availability be ensured Therefore this policy and its implementation manual a Provide policy and procedures for the security and protection of systems that create process store and transmit intelligence information b Provide administrative and system security requirements including those for interconnected systems c Define and mandate the use of a risk management process d Define and mandate the use of a certification and accreditation process For Official Use Only e Promote the use of efficient procedures and cost-effective computer-based security features and assurances f Describe the roles and responsibilities of the individuals who constitute the decision-making segment of the IS security community and its system users g Require a life-cycle management approach to implementing system security requirements h Introduce the concepts Levels-of-Concern and Protection Level of information B Policy 1 Intelligence information shall be appropriately safeguarded at all times including when used in information systems The information systems shall be protected Safeguards shall be applied such that 1 individuals are held accountable for their actions 2 information is accessed only by authorized individuals and processes 3 information is used only for its authorized purpose s 4 information retains its content integrity 5 information is available to satisfy mission requirements and 6 information is appropriately marked and labeled Authorized individuals are those with the appropriate clearance formal access approvals and need-to-know 2 Appropriate security measures shall be implemented to ensure the confidentiality integrity and availability of that information The mix of security safeguards selected for systems that process intelligence information shall ensure that the system meets the policy requirements set forth in this policy and its implementation manual a Information systems security shall be an integral part of all system life-cycle phases for all systems b The security of systems shall be reviewed whenever changes occur to missions information systems security requirements or threat and whenever there are significant adverse changes to system vulnerabilities c Appropriate authorities as defined in the Manual shall be immediately notified of any threats or vulnerabilities impacting systems that process their data d All ISs are subject to monitoring consistent with applicable laws and regulations and as provided for by agency policies procedures and practices As a minimum monitoring will assess the adequacy of the confidentiality integrity and availability controls 3 All systems shall be certified and accredited in compliance with the requirements stated in the associated implementation manual and following the direction and guidance provided in the Designated Accrediting Authority DAA -approved certification and accreditation C A process C A is a comprehensive process to ensure implementation of security measures that effectively counter relevant threats and vulnerabilities C A consists of several iterative For Official Use Only interdependent phases and steps whose scope and specific activities vary with the IS being certified and accredited a A risk assessment shall be performed for each IS to identify specific areas that require safeguards against deliberate or inadvertent unauthorized disclosure modification or destruction of information denial of service and unauthorized use of the IS Countermeasures shall be applied in those areas to eliminate or adequately reduce the identified risk The risk assessment shall be based on the accompanying manual input from the organization’s counterintelligence CI component the organization's mission requirements the classification and sensitivity of the information and a balanced cost-effective application of security disciplines and technologies These security disciplines include but are not limited to information systems security operations and administrative security personnel security physical security and communications security b Systems shall be reviewed for compliance with the policy and its implementation manual and the security documents derived from the manual c In support of the C A process the DCI shall establish and maintain a formal information security education awareness and training program The agencies departments and components covered by this policy including those to which accrediting authority is delegated will establish similar programs as well as accreditation programs 4 Each of the Principal Accrediting Authorities PAAs for the intelligence community may provide one annex to the implementation manual for their respective communities The annex may be used only to provide clarification Annexes are due not later than six months after the effective date of the manual The Community Management Staff will review and coordinate the proposed annexes The affected PAAs will submit any challenges or objections to the content of specific intelligence community annexes that they cannot resolve to the Community Management Staff for final resolution C Responsibilities 1 In furtherance of the responsibilities of the DCI to ensure the protection of intelligence sources and methods the Deputy Director of Central Intelligence for Community Management DDCI CM shall ensure that the security requirements of this policy are implemented and that the associated manual is developed 2 The DDCI CM shall ensure that this Policy is reviewed biennially and that its associated Manual is reviewed as required to determine whether the threat environment changes in technology or any other factors require changes to one or both documents To support these reviews PAAs DAAs will provide comments to the Community Management Staff for coordination Individuals wishing to make comments may do so by sending them to the appropriate PAA DAA for review and possible forwarding a The DDCI CM shall require the PAAs to plan budget allocate and spend adequate resources to meet the security requirements specified by this directive For Official Use Only b The DDCI CM shall review any unresolved conflicts related to this policy and the associated manual and will either attain agreed-to resolution of them by all affected parties or forward them with recommendations for resolution to the DCI 3 For intelligence data the designated Principal Accrediting Authorities with responsibility for all intelligence systems that are within their respective purviews arethe DCI EXDIR CIA AS DOS Intelligence Research DIRNSA DIRDIA ADIC FBI National Security Div D Office of Intelligence DOE SAS Treasury National Security D NIMA and the D NRO a Systems processing intelligence information that operate at Protection Levels 4 or 5 and all components of such systems shall be accredited only by the Director of the National Security Agency DIRNSA the Director of the Defense Intelligence Agency DIRDIA the Director of the National Reconnaissance Office D NRO or the Executive Director of the Central Intelligence Agency EXDIR CIA Only the DCI may further delegate the authority to accredit these systems b NFIB members may delegate to the extent they consider appropriate their authority to accredit systems processing intelligence information or components of such systems that operate at Protection Levels 1 2 or 3 But they retain ultimate responsibility for the security of the information processed in those systems 4 The PAA shall ensure the establishment of an information systems security incident response and reporting capability that detects incidents establishes a trained response element maintains statistics initiates an investigation and recovers operational capability for the information D Applicability 1 This policy and its associated implementation manual apply to all United States government organizations’ their commercial contractors’ and Allied governments’ ISs that process store or communicate intelligence information See the definition of intelligence information in sec E below 2 Nothing in this policy or the associated manual supersedes the requirements of the Atomic Energy Act of 1954 as amended Chapter II Public Law 585 for the control use and dissemination of Restricted Data or Formerly Restricted Data 3 Nothing in this policy or the associated manual supersedes any statutory or Presidential requirement for the handling of cryptologic data or Communications Security COMSEC related material 4 This policy supersedes the policy in Directive of Central Intelligence Directive 1 16 July 1988 5 This directive is effective for five years from the date of implementation At that time it shall be reviewed for continued applicability For Official Use Only E Definitions This listing defines key terms relative to information systems securitypolicy Accreditation The official management decision to permit operation of an IS in a specified environment at an acceptable level of risk based on the implementation of an approved set of technical managerial and procedural safeguards Availability Timely reliable access to data and information services for authorized users Certification The comprehensive evaluation of the technical and non-technical security features of an IS and other safeguards made as part of and in support of the accreditation process to establish the extent to which a particular design and implementation meet a specified set of security requirements Clearance Formal certification of authorization to have access to classified information other than that protected in a special access program including SCI Clearances are of three types confidential secret and top secret A top secret clearance permits access to top secret secret and confidential material a secret clearance to secret and confidential material and a confidential clearance to confidential material Confidentiality Assurance that information is not disclosed to unauthorized entities or processes Cryptanalysis Operations performed in converting encrypted messages to plain text without initial knowledge of the cryptoalgorithm and or key employed in the encryption Cryptography Art or science concerning the principles means and methods for rendering plain information unintelligible and for restoring encrypted information to intelligible form Cryptologic Data Information relating to cryptography and cryptanalysis For Official Use Only Designated Accreditation Authority DAA The official with the authority to formally assume responsibility for operating a system at an acceptable level of risk Formal Access Approval Documented approval by a Data Owner to allow access to a particular category of information Such access generally requires signing of an appropriate non-disclosure agreement and entry of the individual's name on an access roster For intelligence information formal access approval is indicated by the requirement for signing an Intelligence Non-Disclosure Agreement Information The intelligence derived from the data on or about a system or the intelligence obtained from the structure or organization of that data Information System IS Any telecommunications and or computer related equipment or interconnected system or subsystems of equipment that is used in the acquisition storage manipulation management movement control display switching interchange transmission or reception of voice and or data digital or analog includes software firmware and hardware Integrity Protection against unauthorized modification or destruction of information Intelligence Information For purposes of this Directive intelligence information refers to Sensitive Compartmented Information and special access programs for intelligence under the purview of the DCI Level-of-Concern A rating assigned to an IS by the DAA A separate Level-of-Concern is assigned to each IS for confidentiality integrity and availability The Level-of-Concern for confidentiality integrity and availability can be Basic Medium or High The Level-of-Concern assigned to an IS for confidentiality is based on the sensitivity of the information it maintains processes and transmits The Level-of-Concern assigned to an IS for integrity is based on the degree of resistance to unauthorized modifications The Level-of-Concern assigned to an IS for availability is based on the needed availability of the information maintained processed and transmitted by the system for mission accomplishment and how much tolerance for delay is allowed Need-to-Know For Official Use Only A determination made by an authorized holder of classified information that a prospective recipient of information requires access to specific classified information in order to perform or assist in a lawful and authorized governmental function Principal Accrediting Authority PAA The senior official having the authority and responsibility for all intelligence systems within an agency Within the Intelligence Community the PAAs are the DCI EXDIR CIA AS DOS Intelligence Research DIRNSA DIRDIA ADIC FBI National Security Div D Office of Intelligence DOE SAS Treasury National Security D NIMA and the D NRO Processing The state that exists when information is being accessed or acted-upon by one or more steps proceeding in a predetermined sequence or method Protection Level An indication of the implicit level of trust that is placed in a system’s technical capabilities A Protection Level is based on the classification and sensitivity of information processed on the system relative to the clearance s formal access approval s and need-to-know of all direct and indirect users that receive information from the IS without manual intervention and reliable human review Protection Levels replace modes of operation defined in the 1988 DCID 1 16 Restricted Data RD All data concerning the following but not including data declassified or removed from the RD category pursuant to section 142 of the Atomic Energy Act 1 Design manufacture or utilization of atomic weapons 2 Production of special nuclear material or 3 Use of special nuclear material in the production of energy Risk The expected loss from a given attack or incident For an attack defense scenario risk is assessed as a combination of threat expressed as the probability that a given action attack or incident will occur but may also be expressed as frequency of occurrence vulnerability expressed as the probability that the given action attack or incident will succeed given that the action attack or incident occurs and consequence expressed as some measure of loss such as dollar cost resources cost programmatic impact etc The total risk of operating a system is assessed as a combination of the risks associated with all possible threat scenarios Risk is reduced by countermeasures Security Incident For Official Use Only An act or circumstance in which there is a deviation from the requirements of the governing security regulations Compromise inadvertent disclosure need-to-know violation and administrative deviation are examples of security incidents Sensitive Compartmented Information Classified information concerning or derived from intelligence sources methods or analytical processes which is required to be handled within formal access control systems established by the Director of Central Intelligence DCID 1 19 Special Access Program SAP A program established for a specific class of classified information that imposes safeguarding and access requirements that exceed those normally required for information at the same classification level EO 12958 System An Information System IS Threat Any circumstance or event with the potential to cause harm to an information system in the form of destruction disclosure adverse modification of data and or denial of service Vulnerability A weakness in an IS or cryptographic system or component e g system security procedures hardware design internal controls that could be exploited This policy is complemented by Protecting Sensitive CompartmentedInformation within Information Systems DCID 6 3 —Manual ______________________________________ DIRECTOR OF CENTRAL INTELLIGENCE For Official Use Only 5 June 1999 DATE
OCR of the Document
View the Document >>