preview

Identifying Security Controls For Information Systems Supporting The Department Of Defense

Better Essays

DOD Specific Security Controls
The purpose of this document is to provide guidelines for selecting and identifying security controls for information systems supporting the Department of Defense (DoD). These guidelines have been established to help complete a secure system within the agency. Guidelines provided in the NIST Special Publication 800-53 are relevant to all federal information systems and have been mostly established from a technical view to supplement related guidelines for national security systems.
The security controls in Special Publication 800-53 have been established using sources from DoD Policy 8500, Director of Central Intelligence Directive (DCID) 6/3, ISO/IEC Standard 17799, General Accounting Office (GAO) Federal …show more content…

The information provided in this report has been gathered and compiled from the National Institute of Standards and Technology (NIST) Special Publication 800-53a, Guide for Assessing the Security Controls in Federal Information Systems and Organizations. Publication 800-53a is a comprehensive manual which provides in depth information on the requirements of IT security in the interest of maintaining the security triad or CIA (confidentiality, integrity, and availability).
Some of the more critical controls defined in Publication 800-53a include Access Control Policy and Procedures AC-1.1, Information Flow Enforcement AC-4.1, Unsuccessful Login Attempts AC-7.1, Remote Access AC-17, Security Awareness and Training Policy and Procedures AT-1.
• AC-1.1, Access Control Policy and Procedures determines the level of access, the responsible parties who grant and manage this access, and defines the procedures and requirements of access.
• AC-4.1 Information Flow Enforcement determines the methods by which information is transmitted. This would include policies and procedures which outline the methods the organization uses to transmit and receive data, i.e. encryption, packet filtering, the use of firewalls.
• AC-7.1 Unsuccessful Login Attempts, this is determined by the individual organization and is a highly recommended security control. A maximum number of consecutive login attempts before the

Get Access