Traditional Security Checklist

Overview

VersionDateFinding Count (145)Downloads
22024-08-09CAT I (High): 39CAT II (Medium): 66CAT III (Low): 40
STIG Description
These requirements are derived from the National Institute of Standards and Technology (NIST) 800-53 and related documents. Comments or proposed revisions to this document should be sent via email to the following address: disa.stig_spt@mail.mil.
ClassifiedPublicSensitive
I - Mission Critical ClassifiedI - Mission Critical PublicI - Mission Critical Sensitive
II - Mission Support ClassifiedII - Mission Support PublicII - Mission Support Sensitive
III - Administrative ClassifiedIII - Administrative PublicIII - Administrative Sensitive

Findings - MAC I - Mission Critical Classified

Finding IDSeverityTitleDescription
V-245725
LOWMEDIUMHIGH
COMSEC Training - COMSEC Custodian or Hand Receipt HolderLack of appropriate training for managers of COMSEC accounts could result in the mismanagement of COMSEC records and inadequate physical protection an...
V-245726
LOWMEDIUMHIGH
COMSEC Training - COMSEC UserFailure to properly brief COMSEC users could result in the loss of cryptologic devices or key, or the compromise of classified information. REFERENCE...
V-245736
LOWMEDIUMHIGH
Protected Distribution System (PDS) Construction - Visible for Inspection and MarkedA PDS that is not completely visible for inspection and easily identified cannot be properly inspected and monitored as required, which could result i...
V-245737
LOWMEDIUMHIGH
Protected Distribution System (PDS) Construction - Sealed JointsA PDS that is not constructed and sealed as required could result in the undetected interception of classified information. Sealing of joints is nece...
V-245740
LOWMEDIUMHIGH
Protected Distribution System (PDS) Monitoring - Daily (Visual) ChecksA PDS that is not inspected, monitored and maintained as required could result in undetected access, sabotage or tampering of the unencrypted transmis...
V-245741
LOWMEDIUMHIGH
Protected Distribution System (PDS) Monitoring - Reporting IncidentsA PDS that is not inspected, monitored and maintained as required could result in undetected access, sabotage or tampering of the unencrypted transmis...
V-245744
LOWMEDIUMHIGH
Environmental IA Controls - Emergency Power Shut-Off (EPO)A lack of an emergency shut-off switch or a master power switch for electricity to IT equipment could cause damage to the equipment or injury to perso...
V-245745
LOWMEDIUMHIGH
Environmental IA Controls - Emergency Lighting and Exits - Properly InstalledLack of automatic emergency lighting and exits can cause injury and/or death to employees and emergency responders. Lack of automatic emergency lighti...
V-245748
LOWMEDIUMHIGH
Environmental IA Controls - Emergency PowerFailure to have alternative power sources available can result in significant impact to mission accomplishment and information technology systems incl...
V-245754
LOWMEDIUMHIGH
TEMPEST CountermeasuresFailure to implement required TEMPEST countermeasures could leave the system(s) vulnerable to a TEMPEST attack. REFERENCES: ...
V-245755
LOWMEDIUMHIGH
TEMPEST - Red/Black separation (Processors)Failure to maintain proper separation could result in detectable emanations of classified information. REFERENCES: ...
V-245756
LOWMEDIUMHIGH
TEMPEST - Red/Black Separation (Cables)Failure to maintain proper separation could result in detectable emanations of classified information. REFERENCES: ...
V-245757
LOWMEDIUMHIGH
Foreign National System Access - Identification as FN in E-mail AddressUnauthorized access by foreign nationals to Information Systems can result in, among other things, security incidents, compromise of the system, or th...
V-245761
LOWMEDIUMHIGH
Foreign National (FN) Systems Access - Local Nationals Overseas System Access - (NIPRNet User)Failure to subject foreign nationals to background checks could result in the loss or compromise of classified or sensitive information by foreign sou...
V-245762
LOWMEDIUMHIGH
Foreign National (FN) Systems Access - Delegation of Disclosure Authority Letter (DDL)Unauthorized access by foreign nationals to Information Systems can result in, among other things, security incidents, compromise of the system, or th...
V-245768
LOWMEDIUMHIGH
Foreign National (FN) Administrative Controls - Written Procedures and Employee TrainingFailure to limit access for Foreign Nationals to classified information can result in the loss or compromise of NOFORN information. Documented local p...
V-245769
LOWMEDIUMHIGH
Foreign National (FN) Administrative Controls - Procedures for Requests to Provide Foreign Nationals System AccessUnauthorized access by foreign nationals to Information Systems can result in, among other things, security incidents, compromise of the system, or th...
V-245772
LOWMEDIUMHIGH
Information Assurance - COOP Plan and Testing (Not in Place for Information Technology Systems or Not Considered in the organizational Holistic Risk Assessment)Failure to develop a COOP and test it periodically can result in the partial or total loss of operations and INFOSEC. A contingency plan is necessary ...
V-245774
LOWMEDIUMHIGH
Information Assurance - System Security Incidents (Identifying, Reporting, and Handling)Failure to recognize, investigate and report information systems security incidents could result in the loss of confidentiality, integrity, and availa...
V-245775
LOWMEDIUMHIGH
Information Assurance - System Access Control Records (DD Form 2875 or equivalent)If accurate records of authorized users are not maintained, then unauthorized personnel could have access to the system. Failure to have user sign an ...
V-245776
LOWMEDIUMHIGH
Information Assurance - System Training and Certification/ IA PersonnelImproperly trained personnel can cause serious system-wide/network-wide problems that render a system/network unstable. REFERENCES: CJCSI 6510.01F, ...
V-245777
LOWMEDIUMHIGH
Information Assurance/Cybersecurity Training for System UsersImproperly trained personnel can cause serious system-wide/network-wide problems that render a system/network unstable. REFERENCES: CJCSI 6510.01F, ...
V-245778
LOWMEDIUMHIGH
Information Assurance - Accreditation DocumentationFailure to provide the proper documentation can lead to a system connecting without all proper safeguards in place, creating a threat to the networks....
V-245781
LOWMEDIUMHIGH
Information Assurance - KVM or A/B Switch not listed on the NIAP U.S. Government Approved Protection Products Compliance List (PCL) for Peripheral Sharing SwitchesFailure to use tested and approved switch boxes can result in the loss or compromise of classified information. REFERENCES: NIST Special Publication...
V-245782
LOWMEDIUMHIGH
Information Assurance - KVM Switch (Port Separation) on CYBEX/Avocent 4 or 8 portThe back plate of some 4 or 8 port CYBEX/AVOCENT KVM devices provides a physical connection between adjacent ports. Therefore failure to provide for p...
V-245783
LOWMEDIUMHIGH
Information Assurance - KVM Switch Use of Hot-Keys on SIPRNet Connected DevicesUse of "Hot Keys" for switching between devices relies on use of software to separate and switch between the devices. Unless software use involves an...
V-245786
LOWMEDIUMHIGH
Information Assurance - Unauthorized Wireless Devices - Portable Electronic Devices (PEDs) Used in Classified Processing Areas without Certified TEMPEST Technical Authority (CTTA) Review and Authorizing Official (AO) Approval.Allowing wireless devices in the vicinity of classified processing or discussion could directly result in the loss or compromise of classified or sens...
V-245790
LOWMEDIUMHIGH
Information Assurance - Network Connections - Physical Protection of Unclassified (NIPRNet) Network Devices such as Routers, Switches and HubsUnclassified (NIPRNet) network connections that are not properly protected in their physical environment are highly vulnerable to unauthorized access,...
V-245791
LOWMEDIUMHIGH
Industrial Security - DD Form 254Failure to complete a DD Form 254 (Contract Security Classification Specification) or to specify security clearance and/or IT requirements for all con...
V-245793
LOWMEDIUMHIGH
Industrial Security - Contract Guard VettingFailure to screen guards could result in employment of unsuitable personnel who are responsible for the safety and security of DOD personnel and facil...
V-245794
LOWMEDIUMHIGH
Information Security (INFOSEC) - Safe/Vault/Secure Room ManagementLack of adequate or Improper procedures for management of safes/vaults and secure rooms could result in the loss or compromise of classified material....
V-245810
LOWMEDIUMHIGH
Information Security (INFOSEC) - Secure Room Storage Standards - Structural Integrity ChecksFailure to ensure that there is structural integrity of the physical perimeter surrounding a secure room (AKA: collateral classified open storage area...
V-245811
LOWMEDIUMHIGH
Vault/Secure Room Storage Standards - IDS Performance VerificationFailure to test IDS functionality on a periodic basis could result in undetected alarm sensor or other system failure. This in-turn could result in a...
V-245812
LOWMEDIUMHIGH
Vault/Secure Room Storage Standards - Masking of IDS Sensors Displayed at the Intrusion Detection System (IDS) Monitoring StationFailure to meet standards for the display of masked alarm sensors at the IDS monitoring station could result in the location with masked or inactive s...
V-245813
LOWMEDIUMHIGH
Vault/Secure Room Storage Standards - IDS Alarm Monitoring Indicators, both audible and visual (Alarm Status) must be displayed for each sensor or alarmed zone at the monitoring station.Failure to meet standards for the display of audible and visual alarm indicators at the IDS monitoring station could result in an a sensor going into ...
V-245814
LOWMEDIUMHIGH
Vault/Secure Room Storage Standards - Intrusion Detection System (IDS) / Automated Entry Control System (AECS) Primary and Emergency Power SupplyFailure to meet standards for ensuring that there is an adequate commercial and back-up power sources for IDS/AECS with uninterrupted failover to emer...
V-245815
LOWMEDIUMHIGH
Vault/Secure Room Storage Standards - Intrusion Detection System and Automated Entry Control System (IDS/AECS) Component Tamper ProtectionFailure to tamper protect IDS/AECS component enclosures and access points external to protected vaults/secure rooms space could result in the undetect...
V-245816
LOWMEDIUMHIGH
Vault/Secure Room Storage Standards - Primary IDS Monitoring Location Outside the Monitored SpaceFailure to locate the alarm monitoring station at an external location; at a safe distance from the space being monitored, to ensure that it is not in...
V-245817
LOWMEDIUMHIGH
Vault/Secure Room Storage Standards - Automated Entry Control System (AECS) Records Maintenance, which includes documented procedures for granting and removal of access.Failure to document procedures for removal of access and inadequate maintenance of access records for both active and removed persons could result in ...
V-245818
LOWMEDIUMHIGH
Vault/Secure Room Storage Standards - Automated Entry Control System (AECS) Transmission Line Security: AECS Transmission lines traversing an uncontrolled area (not within at least a Secret Controlled Access Area (CAA) ) shall use line supervision OR Electrical, mechanical, or electromechanical access control devices, which do not constitute an AECS that are used to control access during duty hours must have all electrical components, that traverse outside minimally a Secret Controlled Access Area (CAA), secured within conduit.Persons not vetted to at least the same level of classification residing on the information systems being protected by the AECS or other access contro...
V-245819
LOWMEDIUMHIGH
Vault/Secure Room Storage Standards - Automated Entry Control System (AECS) Door Locks: Electric Strikes and/or Magnetic Locking devices used in access control systems shall be heavy duty, industrial grade and be configured to fail secure in the event of a total loss of power (primary and backup).There are a variety of locking mechanisms that may be used to secure both primary and secondary doors for vaults and classified open storage areas (se...
V-245820
LOWMEDIUMHIGH
Information Security (INFOSEC) - Secure Room Storage Standards - Perimeter Construction using Proper Permanent Construction Materials for True Ceiling, Walls and Floors.Failure to meet standards for ensuring that there is structural integrity of the physical Perimeter surrounding a secure room (AKA: collateral classif...
V-245822
LOWMEDIUMHIGH
Marking Classified - Equipment, Documents or Media: In a classified operating environment, all unclassified items must be marked in addition to all classified items.Failure to properly mark classified material could result in the loss or compromise of classified information. REFERENCES: The Information Security ...
V-245832
LOWMEDIUMHIGH
End-of-Day Checks - Organizations that process or store classified information must establish a system of security checks at the close of each duty and/or business day to ensure that any area where classified information is used or stored is secure. SF 701, Activity Security Checklist, shall be used to record such checks.Failure to have written guidance to provide guidance for end-of-day (EOD) checks could lead to such checks not being properly conducted. If EOD chec...
V-245834
LOWMEDIUMHIGH
Classified Reproduction - Following guidance for System to Media Transfer of Data from systems connected specifically to the SIPRNet In-Accordance-With (IAW) US CYBERCOM CTO 10-133A.Failure to follow guidance for disabling removable media drives on devices connected to the SIPRNet or, if approved by the local AO, failure to follow...
V-245838
LOWMEDIUMHIGH
Classified Destruction - Hard Drive and Storage Media Sanitization Devices and Plans are not Available for disposal of Automated Information System (AIS) Equipment On-HandFailure to properly destroy classified material can lead to the loss or compromise of classified or sensitive information. REFERENCES: CJCSI 6510.01...
V-245840
LOWMEDIUMHIGH
Classified Emergency Destruction Plans - Develop and Make AvailableFailure to develop emergency procedures can lead to the loss or compromise of classified or sensitive information during emergency situations. REFERE...
V-245841
LOWMEDIUMHIGH
Security Incident/Spillage - Lack of Procedures or Training for Handling and ReportingFailure to report possible security compromise can result in the impact of the loss or compromise of classified information not to be evaluated, respo...
V-245842
LOWMEDIUMHIGH
Classification Guides Must be Available for Programs and Systems for an Organization or SiteFailure to have proper classification guidance available for Information Systems and/or associated programs run on them can result in the misclassific...
V-245843
LOWMEDIUMHIGH
Controlled Unclassified Information (CUI) - Employee Education and TrainingFailure to handle CUI in an approved manner can result in the loss or compromise of sensitive information. REFERENCES: Executive Order 13556, Contro...
V-245844
LOWMEDIUMHIGH
Controlled Unclassified Information - Document, Hard Drive and Media DisposalFailure to handle CUI in an approved manner can result in the loss or compromise of sensitive information. REFERENCES: Assistant Secretary of Defens...
V-245845
LOWMEDIUMHIGH
Controlled Unclassified Information - Handling, Storage and Controlling Access to Areas where CUI is Processed or MaintainedFailure to handle CUI in an approved manner can result in the loss or compromise of sensitive information. REFERENCES: Executive Order 13556, Contro...
V-245846
LOWMEDIUMHIGH
Controlled Unclassified Information - Encryption of Data at RestFailure to handle CUI in an approved manner can result in the loss or compromise of sensitive information. REFERENCES: Executive Order 13556, Contro...
V-245847
LOWMEDIUMHIGH
Controlled Unclassified Information - Transmission by either Physical or Electronic MeansFailure to handle/transmit CUI in an approved manner can result in the loss or compromise of sensitive information. REFERENCES: Executive Order 1355...
V-245848
LOWMEDIUMHIGH
Controlled Unclassified Information - Posting Only on Web-Sites with Appropriate Encryption; not on Publicly Accessible Web-Sites.Failure to handle CUI in an approved manner can result in the loss or compromise of sensitive information. REFERENCES: Executive Order 13556, Contro...
V-245856
LOWMEDIUMHIGH
Validation Procedures for Security Clearance Issuance (Classified Systems and/or Physical Access Granted)Failure to properly verify security clearance status could result in an unauthorized person having access to a classified information system or an aut...
V-245861
LOWMEDIUMHIGH
Intrusion Detection System (IDS) Monitoring Station Personnel - Suitability ChecksFailure to subject personnel who monitor the IDS alarms to a trustworthiness determination can result in the inadvertent or deliberate unauthorized ac...
V-245862
LOWMEDIUMHIGH
Intrusion Detection System (IDS) Installation and Maintenance Personnel - Suitability ChecksFailure to subject personnel who install and maintain the IDS alarms to a trustworthiness determination can result in the inadvertent or deliberate un...
V-245864
LOWMEDIUMHIGH
Risk Assessment -Holistic Review (site/environment/information systems)Failure to conduct a risk analysis could result in not implementing an effective countermeasure to a vulnerability or wasting resources on ineffective...
V-245865
LOWMEDIUMHIGH
Physical Protection of Unclassified Key System Devices/Computer Rooms in Large Processing FacilitiesAllowing access to systems processing sensitive information by personnel without the need-to-know could permit loss, destruction of data or equipment ...
V-245866
LOWMEDIUMHIGH
Restricted Area and Controlled Area Designation of Areas Housing Critical Information System Components or Classified /Sensitive Technology or DataFailure to designate the areas housing the critical information technology systems as a restricted or controlled access area may result in inadequate ...
V-245867
LOWMEDIUMHIGH
Security-in-Depth (AKA: Defense-in-Depth) - Minimum Physical Barriers and Access Control Measures for Facilities or Buildings Containing DoDIN (SIPRNet/NIPRNet) Connected Assets.Failure to use security-in-depth can result in a facility being vulnerable to an undetected intrusion or an intrusion that cannot be responded to in a...
V-245868
LOWMEDIUMHIGH
Visitor Control - To Facility or Organization with Information System Assets Connected to the DISNFailure to identify and control visitors could result in unauthorized personnel gaining access to the facility with the intent to compromise classifie...
V-245869
LOWMEDIUMHIGH
Sensitive Item Control - Keys, Locks and Access Cards Controlling Access to Information Systems (IS) or IS Assets Connected to the DISNLack of an adequate key/credential/access device control could result in unauthorized personnel gaining access to the facility or systems with the int...
V-245871
LOWMEDIUMHIGH
Security and Cybersecurity Staff Appointment, Training/Certification and SuitabilityFailure to formally appoint security personnel and detail responsibilities, training and other requirements in the appointment notices could result in...
V-245872
LOWMEDIUMHIGH
Security Training - Information Security (INFOSEC) for ALL Employees; Military, Government Civilian and ContractorFailure to provide security training to ALL employees results in a weak security program and could lead to the loss or compromise of classified or sen...
V-245723
LOWMEDIUMHIGH
COMSEC Account Management - Appointment of Responsible PersonLack of formal designation of an individual to be responsible for COMSEC items could result in mismanagement, loss or even compromise of COMSEC materi...
V-245724
LOWMEDIUMHIGH
COMSEC Account Management - Program Management and Standards ComplianceRecipients of NSA or Service COMSEC accounts are responsible to properly maintain the accounts. Procedures covering security, transport, handling, etc...
V-245738
LOWMEDIUMHIGH
Protected Distribution System (PDS) Documentation - Signed ApprovalA PDS that is not approved could cause an Information System Security Manager (ISSM), Authorizing Official (AO) and other concerned managerial personn...
V-245739
LOWMEDIUMHIGH
Protected Distribution System (PDS) Documentation - Request for Approval DocumentationA PDS that is not approved could cause an Information System Security Manager (ISSM), Authorizing Official (AO) and other concerned managerial personn...
V-245742
LOWMEDIUMHIGH
Protected Distribution System (PDS) Monitoring - Technical InspectionsA PDS that is not inspected, monitored and maintained as required could result in undetected access, sabotage or tampering of the unencrypted transmis...
V-245743
LOWMEDIUMHIGH
Protected Distribution System (PDS) Monitoring - Initial InspectionA PDS that is not inspected, monitored and maintained as required could result in undetected access, sabotage or tampering of the unencrypted transmis...
V-245746
LOWMEDIUMHIGH
Environmental IA Controls - Emergency Lighting and Exits - Documentation and TestingLack of automatic emergency lighting can cause injury and/or death to employees and emergency responders. Lack of automatic emergency lighting can cau...
V-245747
LOWMEDIUMHIGH
Environmental IA Controls - Voltage Control (power)Failure to use automatic voltage control can result in damage to the IT equipment creating a service outage. REFERENCES: DoD 5220.22-M (NISPOM), Inc...
V-245749
LOWMEDIUMHIGH
Environmental IA Controls - TrainingIf employees have not received training on the environmental controls they will not be able to respond to a fluctuation of environmental conditions, w...
V-245750
LOWMEDIUMHIGH
Environmental IA Controls - TemperatureLack of temperature controls can lead to fluctuations in temperature which could be potentially harmful to personnel or equipment operation. REFERENC...
V-245751
LOWMEDIUMHIGH
Environmental IA Controls - HumidityFluctuations in humidity can be potentially harmful to personnel or equipment causing the loss of services or productivity. REFERENCES: DoD 5220.22-...
V-245752
LOWMEDIUMHIGH
Environmental IA Controls - Fire Inspections/ DiscrepanciesFailure to conduct fire inspections and correct any discrepancies could result in hazardous situations leading to a possible fire and loss of service....
V-245753
LOWMEDIUMHIGH
Environmental IA Controls - Fire Detection and SuppressionFailure to provide adequate fire detection and suppression could result in the loss of or damage to data, equipment, facilities, or personnel. REFERE...
V-245758
LOWMEDIUMHIGH
Foreign National System Access - Local Access Control ProceduresUnauthorized access by foreign nationals to Information Systems can result in, among other things, security incidents, compromise of the system, or th...
V-245766
LOWMEDIUMHIGH
Foreign National (FN) Physical Access Control - (Identification Badges)Failure to limit access to information visible on system monitor screens in mixed US/FN environments can result in FN personnel having unauthorized ac...
V-245770
LOWMEDIUMHIGH
Foreign National (FN) Administrative Controls - Contact Officer AppointmentFailure to provide proper oversight of Foreign National partners or employees and limit access to classified and sensitive information can result in t...
V-245771
LOWMEDIUMHIGH
Information Assurance - System Security Operating Procedures (SOPs)Failure to have documented procedures in an SOP could result in a security incident due to lack of knowledge by personnel assigned to the organization...
V-245773
LOWMEDIUMHIGH
Information Assurance - COOP Plan or Testing (Incomplete)Failure to develop a COOP and test it periodically can result in the partial or total loss of operations and INFOSEC. A contingency plan is necessary ...
V-245784
LOWMEDIUMHIGH
Information Assurance - Authorizing Official (AO) and DoDIN Connection Approval Office (CAO) Approval Documentation for use of KVM and A/B switches for Sharing of Classified and Unclassified Peripheral DevicesFailure to request approval for connection of existing or additional KVM or A/B devices (switch boxes) for use in switching between classified (e.g., ...
V-245787
LOWMEDIUMHIGH
Information Assurance - Unauthorized Wireless Devices - No Formal Policy and/or Warning SignsNot having a wireless policy and/or warning signs at entrances could result in the unauthorized introduction of wireless devices into classified proce...
V-245792
LOWMEDIUMHIGH
Industrial Security - Contractor Visit Authorization Letters (VALs)Failure to require Visit Authorization Letters (VALs) for contractor visits could result in sensitive or classified materials being released to unauth...
V-245821
LOWMEDIUMHIGH
Vault/Secure Room Storage Standards - Automated Entry Control System (AECS) Keypad Device Protection: Keypad devices designed or installed in a manner that an unauthorized person in the immediate vicinity cannot observe the selection of input numbers.If someone were to successfully observe an authorized user's selection of numbers for their PIN at an entrance to a classified storage area or unclass...
V-245823
LOWMEDIUMHIGH
Marking Classified - Local or Enclave Classified Marking Procedures must be developed to ensure employees are familiar with appropriate organization Security Classification Guides (SCG), how to obtain guidance for marking classified documents, media and equipment, and where associated forms, classified cover sheets, labels, stamps, wrapping material for classified shipment, etc. can be obtained.Failure to properly mark classified material could result in the loss or compromise of classified information. REFERENCES: The Information Security ...
V-245824
LOWMEDIUMHIGH
Classified Working Papers are properly marked, destroyed when no longer needed, or treated as a finished document after 180 days.Failure to properly mark or handle classified documents can lead to the loss or compromise of classified or sensitive information. REFERENCES: The I...
V-245826
LOWMEDIUMHIGH
Non-Disclosure Agreement - Standard Form 312: no person may have access to classified information unless that person has a security clearance in accordance with DODM 5200.02 and has signed a Standard Form (SF) 312, Classified Information Non-Disclosure Agreement (NDA), and access is essential to the accomplishment of a lawful and authorized Government function (i.e., has a need to know).Failure to verify clearance and need-to-know and execute a nondisclosure agreement (NDA) before granting access to classified can result in unauthoriz...
V-245827
LOWMEDIUMHIGH
Handling of Classified Documents, Media, Equipment - Written Procedures and Training for when classified material/equipment is removed from a security container and/or secure room.Failure to develop procedures and to train employees on protection of classified when removed from storage could lead to the loss or compromise of cla...
V-245828
LOWMEDIUMHIGH
Handling of Classified - Use of Cover Sheets on Documents Removed from Secure StorageFailure to protect readable classified information printed from classified systems such as SIPRNet when removed from secure storage can lead to the lo...
V-245831
LOWMEDIUMHIGH
Classified Monitors/Displays (Procedures for Obscuration of Classified Monitors) - protection from uncleared persons or those without a need-to-know.Failure to develop procedures and training for employees to cover responsibilities and methods for limiting the access of unauthorized personnel to cl...
V-245835
LOWMEDIUMHIGH
Classified Reproduction - Written Procedures for SIPRNet Connected Classified Multi-Functional Devices (MFD) located in Space Not Approved for Collateral Classified Open Storage. NOTE: This vulnerability concerns only PROCEDURES for the reproduction (printing, copying, scanning, faxing) of classified documents on Multi-Functional Devices (MFD) connected to the DoDIN.Lack of or improper reproduction procedures for classified material could result in the loss or compromise of classified information. REFERENCES: CJ...
V-245839
LOWMEDIUMHIGH
Destruction of Classified and Unclassified Documents, Equipment and Media - Availability of Local Policy and ProceduresLack of plans and procedures to properly destroy classified and/or sensitive material can lead to the loss or compromise of classified or sensitive in...
V-245849
LOWMEDIUMHIGH
Controlled Unclassified Information (CUI) - Local Policy and ProcedureFailure to handle CUI in an approved manner can result in the loss or compromise of sensitive information. REFERENCES: Executive Order 13556, Contro...
V-245850
LOWMEDIUMHIGH
Controlled Unclassified Information - Marking/Labeling Media within Unclassified Environments (Not Mixed with Classified)Failure to mark CUI in an approved manner can result in the loss or compromise of sensitive information. REFERENCES: Executive Order 13556, Controll...
V-245851
LOWMEDIUMHIGH
Classified Annual ReviewFailure to conduct the annual review and clean out day can result in an excessive amount of classified (including IS storage media) being on hand and ...
V-245852
LOWMEDIUMHIGH
Position of Trust - Knowledge of Responsibility to Self Report Derogatory InformationFailure to inform personnel of the expected standards of conduct while holding a position of trust and their responsibility to self-report derogatory ...
V-245853
LOWMEDIUMHIGH
Position of Trust - Local Policy Covering Employee Personal Standards of Conduct and ResponsibilitiesFailure to inform personnel of the expected standards of conduct while holding a position of trust can result in conduct by the individual that will r...
V-245854
LOWMEDIUMHIGH
Position of Trust - Training Covering Employee Standards of Conduct and Personal ResponsibilitiesFailure to inform personnel of the expected standards of conduct while holding a position of trust can result in conduct by the individual that will r...
V-245860
LOWMEDIUMHIGH
Out-processing Procedures for Departing or Terminated Employees (Military, Government Civilian and Contractor)Failure to properly out-process through the security section allows the possibility of continued (unauthorized) access to the facility and/or the syst...
V-245863
LOWMEDIUMHIGH
Physical Security Program - Physical Security Plan (PSP) and/or Systems Security Plan (SSP) Development and Implementation with Consideration/Focus on Protection of Information System Assets in the Physical EnvironmentFailure to have a well-documented Physical Security/Systems Security program will result in an increased risk to DoD Information Systems; including pe...
V-245870
LOWMEDIUMHIGH
Physical Penetration Testing - of Facilities or Buildings Containing Information Systems (IS) Connected to the DISNFailure to periodically test facility/building security where Information Systems (IS) connected to the DISN are present could lead to the unauthorize...
V-245873
LOWMEDIUMHIGH
Counter-Intelligence Program - Training, Procedures and Incident ReportingFailure to establish a good working relationship with the supporting/local CI agency and lack of proper CI training for site/organization employees co...
V-245722
LOWMEDIUMHIGH
COMSEC Account Management - Equipment and Key StorageImproper handling and storage of COMSEC material can result in the loss or compromise of classified cryptologic devices or classified key or unclassif...
V-245727
LOWMEDIUMHIGH
Classified Transmission - Electronic Means using Cryptographic System Authorized by the Director, NSAFailure to properly encrypt classified data in transit can lead to the loss or compromise of classified or sensitive information. REFERENCES: DoD 52...
V-245728
LOWMEDIUMHIGH
Protected Distribution System (PDS) Construction - Point of Presence (PoP) and Terminal Equipment Protection. This requirement concerns security of both the starting and ending points for PDS within proper physically protected and access controlled environments.A PDS that is not constructed and physically protected as required could result in the covert or undetected interception of classified information. R...
V-245729
LOWMEDIUMHIGH
Protected Distribution System (PDS) Construction - Hardened CarrierA PDS that is not constructed and configured as required could result in the undetected interception of classified information. REFERENCES: CJCSI 65...
V-245730
LOWMEDIUMHIGH
Protected Distribution System (PDS) Construction - Pull Box SecurityA PDS that is not constructed and configured as required could result in the undetected interception of classified information. REFERENCES: ...
V-245731
LOWMEDIUMHIGH
Protected Distribution System (PDS) Construction - Buried PDS CarrierBuried carriers are normally used to extend a PDS between CAAs that are located in different buildings. As with other Category 2 PDS the unencrypted d...
V-245732
LOWMEDIUMHIGH
Protected Distribution System (PDS) Construction - External Suspended PDSSuspended carriers (Exterior PDS) are a Category 2 PDS option used to extend a PDS between Controlled Access Areas (CAAs) that are located in differen...
V-245733
LOWMEDIUMHIGH
Protected Distribution System (PDS) Construction - Continuously Viewed CarrierA PDS that is not constructed and configured as required could result in the undetected interception of classified information. A continuously viewed...
V-245734
LOWMEDIUMHIGH
Protected Distribution System (PDS) Construction - Tactical Environment ApplicationA PDS that is not constructed and configured as required could result in the undetected interception of classified information. Within mobile tactical...
V-245735
LOWMEDIUMHIGH
Protected Distribution System (PDS) Construction - Alarmed CarrierA PDS that is not constructed and configured as required could result in the covert or undetected interception of classified information. An Alarmed ...
V-245759
LOWMEDIUMHIGH
Foreign National (FN) Systems Access - Local Nationals Overseas System Access - (SIPRNet or Other Classified System or Classified Network being Reviewed)Failure to subject foreign nationals to background checks could result in the loss or compromise of classified or sensitive information by foreign sou...
V-245763
LOWMEDIUMHIGH
Foreign National System Access - FN or Immigrant Aliens (not representing a foreign government or entity) System Access - Limited Access Authorization (LAA)Failure to verify citizenship and proper authorization for access to either sensitive or classified information could enable personnel to have access ...
V-245764
LOWMEDIUMHIGH
Foreign National (FN) System Access - FN or Immigrant Aliens (not representing a foreign government or entity) with LAA Granted Uncontrolled AccessFailure to verify citizenship and proper authorization for access to either sensitive or classified information could enable personnel to have access ...
V-245765
LOWMEDIUMHIGH
Foreign National (FN) Physical Access Control - Areas Containing US Only Information Systems Workstations/Monitor Screens, Equipment, Media or DocumentsPhysically co-locating REL Partners or other FN - who have limited or no access to the SIPRNet or other US Classified systems - near US personnel in a...
V-245767
LOWMEDIUMHIGH
Foreign National (FN) Administrative Controls - Proper Investigation and Clearance for Access to Classified Systems and/or Information Assurance (IA) Positions of TrustFailure to validate that FN partners or employees have the required security clearance levels for access to classified systems and/or the proper level...
V-245785
LOWMEDIUMHIGH
Information Assurance - Classified Portable Electronic Devices (PEDs) Connected to the SIPRNet must be Authorized, Compliant with NSA Guidelines, and be Configured for Data at Rest (DAR) ProtectionFinding unauthorized and/or improperly configured wireless devices (PEDs) connected to and/or operating on the SIPRNet is a security incident and coul...
V-245788
LOWMEDIUMHIGH
Information Assurance - Network Connections - Physical Protection of Network Devices such as Routers, Switches and Hubs (Connected to SIPRNet or Other Classified Networks or Systems Being Inspected)SIPRNet or other classified network connections that are not properly protected in their physical environment are highly vulnerable to unauthorized ac...
V-245789
LOWMEDIUMHIGH
Information Assurance - Network Connections - Wall Jack Security on Classified Networks (SIPRNet or other Inspected Classified Network or System) Where Port Authentication Using IEEE 802.1X IS NOT ImplementedFollowing is a summary of the primary requirement to use the IEEE 802.1X authentication protocol to secure SIPRNet ports (AKA: wall jacks) , which is ...
V-245795
LOWMEDIUMHIGH
Information Security (INFOSEC) - Vault/Secure Room Storage Standards - Door Combination Lock Meeting Federal Specification FF-L-2740Failure to meet Physical Security storage standards could result in the undetected loss or compromise of classified material. REFERENCES: CJCSI 6510...
V-245796
LOWMEDIUMHIGH
Information Security (INFOSEC) - Secure Room Storage Standards - Door ConstructionFailure to meet construction standards could result in the undetected loss or compromise of classified material. REFERENCES: CJCSI 6510.01F, INFORMA...
V-245797
LOWMEDIUMHIGH
Information Security (INFOSEC) - Secure Room Storage Standards Wall and Ceiling Structural Integrity (AKA: True Floor to True Ceiling Connection)Failure to meet standards for ensuring that there is structural integrity of the physical perimeter surrounding a secure room (AKA: collateral classif...
V-245798
LOWMEDIUMHIGH
Information Security (INFOSEC) - Vault/Secure Room Storage Standards - Openings in Perimeter Exceeding 96 Square InchesFailure to meet standards for ensuring that there is structural integrity of the physical perimeter surrounding a vault or secure room (AKA: collatera...
V-245799
LOWMEDIUMHIGH
Information Security (INFOSEC) - Secure Room Storage Standards Windows - Accessible from the Ground Hardened Against Forced Entry and Shielded from Exterior Viewing of Classified Materials Contained within the Area.Failure to meet standards for ensuring that there is structural integrity of the physical perimeter surrounding a secure room (AKA: collateral classif...
V-245800
LOWMEDIUMHIGH
Information Security (INFOSEC) - Vault Storage/Construction StandardsFailure to meet standards IAW the DOD Manual 5200.01, Volume 3, Appendix to Enclosure 3, for ensuring that there is required structural integrity of t...
V-245801
LOWMEDIUMHIGH
Information Security (INFOSEC) - Secure Room Storage Standards - Intrusion Detection System (IDS)Failure to meet standards for maintenance and validation of structural integrity of the physical perimeter surrounding a secure room (AKA: collateral ...
V-245802
LOWMEDIUMHIGH
Information Security (INFOSEC) - Secure Room Storage Standards - Balanced Magnetic Switch (BMS) on Perimeter DoorsFailure to meet standards for ensuring that there is structural integrity of the physical perimeter surrounding a secure room (AKA: collateral classif...
V-245803
LOWMEDIUMHIGH
Information Security (INFOSEC) - Secure Room Storage Standards - Interior Motion DetectionFailure to meet standards for ensuring that there is structural integrity of the physical perimeter surrounding a secure room (AKA: collateral classif...
V-245804
LOWMEDIUMHIGH
Information Security (INFOSEC) - Secure Room Storage Standards - Four (4) Hour Random Checks in Lieu of Using Intrusion Detection System (IDS)Failure to meet standards for ensuring that there is structural integrity of the physical perimeter surrounding a secure room (AKA: collateral classif...
V-245805
LOWMEDIUMHIGH
Vault/Secure Room Storage Standards - IDS Transmission Line SecurityFailure to meet standards for ensuring integrity of the intrusion detection system signal transmission supporting a secure room (AKA: collateral class...
V-245806
LOWMEDIUMHIGH
Vault/Secure Room Storage Standards - IDS Access/Secure Control Units Must be Located within the Secure Room SpaceFailure to ensure that IDS Access and Secure Control Units used to activate and deactivate alarms (primarily motion detectors) within vaults or secure...
V-245807
LOWMEDIUMHIGH
Information Security (IS) - Continuous Operations Facility: Access Control Monitoring MethodsFailure to control door access to a Continuous Operations Facility containing classified SIPRNET assets may result in immediate and potentially undete...
V-245808
LOWMEDIUMHIGH
Vault/Secure Room Storage Standards - Access Control During Working Hours Using Visual Control OR Automated Entry Control System (AECS) with PIN / BiometricsFailure to properly monitor and control collateral classified open storage area access doors during working hours (while the FF-L-2740 combination loc...
V-245809
LOWMEDIUMHIGH
Vault/Secure Room Storage Standards - Automated Entry Control System (AECS) and Intrusion Detection System (IDS) Head-End Equipment Protection: The physical location (room or area) containing AECS and IDS head-end equipment (server and/or work station/monitoring equipment) where authorization, personal identification or verification data is input, stored, or recorded and/or where system status/alarms are monitored must be physically protected.Inadequate physical protection of Intrusion Detection System or Automated Entry Control System servers, data base storage drives, or monitoring work s...
V-245825
LOWMEDIUMHIGH
Storage/Handling of Classified Documents, Media, Equipment - must be under continuous personal protection and control of an authorized (cleared) individual OR guarded or stored in an approved locked security container (safe), vault, secure room, collateral classified open storage area or SCIF.Failure to store classified in an approved container OR to properly protect classified when removed from storage can lead to the loss or compromise of...
V-245829
LOWMEDIUMHIGH
Classified Monitors/Displays (Physical Control of Classified Monitors From Unauthorized Viewing)Failure to limit access to unauthorized personnel to information displayed on classified monitors/displays can result in the loss or compromise of cla...
V-245830
LOWMEDIUMHIGH
Monitor Screens - Disable Access by CAC or Token Removal, or Lock Computer via Ctrl/Alt/DelThe DoD Common Access Cards (CAC) a "smart" card, is the standard identification for active-duty military personnel, Selected Reserve, DoD civilian em...
V-245833
LOWMEDIUMHIGH
Classified Reproduction - SIPRNet Connected Classified Multi-Functional Devices (MFD) located in Space Not Approved for Collateral Classified Open Storage.Classified Multi-Functional Devices (MFD) include printers, copiers, scanners and facsimile capabilities and contain hard drives that maintain classif...
V-245836
LOWMEDIUMHIGH
Destruction of Classified Documents Printed from the SIPRNet Using Approved Devices on NSA Evaluated Products Lists (EPL).Failure to properly destroy classified material can lead to the loss or compromise of classified or sensitive information. REFERENCES: CJCSI 6510.01...
V-245837
LOWMEDIUMHIGH
Classified Material Destruction - Improper Disposal of Automated Information System (AIS) Hard Drives and Storage MediaFailure to properly destroy classified material can lead to the loss or compromise of classified or sensitive information. REFERENCES: CJCSI 6510.01...