| |
MINIMAL INFOSEC PERFORMANCE STANDARD FOR SYSTEM ADMINISTRATORS
Job functions
The INFOSEC functions of a System Administrator are:
- working closely with the Information Systems Security Officer (ISSO) to
ensure
the Information System
or network is used securely;
participating in the Information Systems Security incident reporting
program;
assisting the ISSO in maintaining configuration control of the systems and
applications software;
advising the ISSO of security anomalies or integrity loopholes; and
administering, when applicable, user identification or authentication
mechanism(s) of the IS or network.
Terminal Objective:
Given various simulated scenarios and typical situations containing
information systems security issues, the System Administrator will be able to
describe and apply the appropriate actions to manage and administer the IS(s) in
a secure manner. To be acceptable, the description must be in accordance with
applicable INFOSEC regulations, policies, and guidelines.
List of performance items under competencies
In each of the competency areas listed below, the System Administrator shall
perform the following functions:
1. GENERAL
a. Security Policy
- define local accountability policies;
- explain accreditation;
- discuss three agency specific security policies;
- define assurance;
- explain certification policies as related to local requirements;
- define local e-mail privacy policies;
- describe local security policies relative to electronic records
management;
- explain security policies relating to ethics;
- describe relevant FAX security policies;
- discuss the concept of information confidentiality;
- identify information ownership of data held under his/her
cognizance;
- identify information resource owner/custodian;
- define local information security policy;
- describe information sensitivity in relation to local policies;
- discuss integrity concepts;
- describe local policies relevant to Internet security;
- explain local area network (LAN) security as related to local policies;
- define policies relating to marking of sensitive information;
- understands fundamental concepts of multilevel security;
- describe policies relevant to network security;
- define the functional requirements for operating system integrity;
- perform operations security (OPSEC) in conformance with local policies;
- explain physical security policies;
- discuss local policies relating to secure systems operations;
- identify appropriate security architecture for use in assigned IS(s);
- describe security domains as applicable to local policies;
- define local policies relating to separation of duties;
- identify systems security standards policies;
- identify DoD 5200.28-STD, Trusted Computer System Evaluation Criteria
(TCSEC), or Orange Book policies;
identify TEMPEST policies;
define TEMPEST policies;
define validation and testing policies;
identify verification and validation process policies;
define verification and validation process policies;
describe wide area network (WAN) security policies;
use/implement WAN security policies;
describe workstation security policies;
use/implement workstation security policies; and
describe zoning and zone of control policies.
b. Procedures
- practice/use facility management procedures;
- describe FAX security procedures;
- practice/use FAX security procedures;
- describe housekeeping procedures;
- perform housekeeping procedures;
- describe information states procedures;
- distinguish among information states procedures;
- explain Internet security procedures;
- use Internet security procedures;
- explain marking of sensitive information procedures (defined in C.F.R. 32
Section 2003, National Security Information - Standard Forms, March 30,
1987);
- perform marking of sensitive information procedures (defined in C.F.R. 32
Section 2003, National Security Information - Standard Forms, March 30,
1987);
- apply multilevel security;
- explain the principles of network security procedures;
- use network security procedures;
- describe operating system integrity procedures;
- perform operating systems security procedures;
- assist in local security procedures;
- describe purpose and contents of National Computer Security Center TG-005,
Trusted Network Interpretation (TNI), or Red Book;
- describes secure systems operations procedures;
- define TEMPEST procedures;
- identify TEMPEST procedures;
- identify certified TEMPEST technical authority (CTTA);
- describe WAN security procedures;
- practice WAN security procedures; and
- explain zoning and zone of control procedures.
c. Education, Training, and Awareness
- discuss the principle elements of security training;
- explain security training procedures;
- explain threat in its application to education, training, and awareness;
- use awareness materials as part of job;
- distinguish between education, training, and awareness;
- give examples of security awareness;
- give examples of security education;
- discuss the objectives of security inspections/reviews; and
- identify different types of vulnerabilities.
d. Countermeasures/Safeguards
- (1) discuss the different levels of countermeasures/safeguards assurance;
- (2) describe e-mail privacy countermeasures/safeguards;
- (3) define Internet security;
- (4) describe what is meant by countermeasures/safeguards;
- (5) describe separation of duties;
- (6) define countermeasures/safeguards used to prevent software piracy;
- (7) define TEMPEST countermeasures/safeguards; and
- (8) explain what is meant by zoning and zone of control.
e. Risk Management
- (1) explain ways to provide protection for Internet connections;
- (2) describe operating system integrity;
- (3) define TEMPEST as it relates to the risk management process;
- (4) identify different types of threat;
- (5) explain WAN security; and
- (6) explain what zoning and zone of control ratings are based on.
2. ACCESS CONTROL
a. Policies/Administration
- (1) use network access controls as designed;
- (2) explain compartmented/partitioned mode;
- (3) describe data access;
- (4) identify the dedicated mode of operation;
- (5) explain electronic records management;
- (6) define information ownership;
- (7) identify information resource owner/custodian;
- (8) describe separation of duties; and
- (9) define the system high mode.
b. Countermeasures
- (1) describe use of caller ID;
- (2) give five examples of countermeasures;
- (3) define internal controls and security;
- (4) identify methods of intrusion detection;
- (5) define network firewalls; and
- (6) describe network security software.
c. Safeguards
- (1) demonstrate the ability to use alarms, signals, and reports;
- (2) identify network security software;
- (3) describe operating system security features;
- (4) define protected distribution systems; and
- (5) describe system security safeguards.
d. Mechanisms
- (1) discuss authentication mechanisms;
- (2) describe discretionary access controls;
- (3) describe mandatory access controls;
- (4) describe one-time passwords;
- (5) discuss privileges; and
- (6) define single sign-on.
3. ADMINISTRATIVE
a. Policies/Procedures
- (1) identify basic/generic management issues;
- (2) define change control policies;
- (3) discuss documentation;
- (4) explain electronic records management;
- (5) describe object reuse;
- (6) define operational procedure review;
- (7) discuss policy enforcement;
- (8) identify procedures;
- (9) discuss security inspections; and
- (10) describe local password management policy.
b. Countermeasures/Safeguards
- (1) give examples of alarms, signals and reports;
- (2) define application development control;
- (3) assist in preparing assessments;
- (4) identify countermeasures;
- (5) describe disaster recovery procedures;
- (6) discuss disposition of classified information;
- (7) practice disposition of media and data;
- (8) practice document labeling;
- (9) discuss proper use of security safeguards;
- (10) define separation of duties;
- (11) identify storage media protection and control; and
- (12) define system software controls.
4. AUDIT
a. Policies/Procedures
- use alarms, signals and reports in accordance with existing policies and
procedures;
- summarize audit-related documentation;
- discuss electronic records management relative to compliance with local
policies and procedures; and
- describe three policies and/or procedures in which separation of duties is
appropriate or mandatory.
b. Countermeasures/Safeguards
- identify two countermeasures applicable to audit trail tampering;
and
- describe three safeguards gained through use of audit trails.
c. Tools
- explain two major benefits of auditing;
- identify three audit tools;
- describe the major benefit gained through use of audit trails and logging
policies;
- define an error log;
- explain two capabilities offered by expert security/audit tools;
- identify two intrusion detection systems; and
- describe the major operating system security features.
5. OPERATIONS
a. Policies/Procedures
- describe disaster recovery policies and procedures;
- use/implement disaster recovery policies and procedures;
- define disaster recovery policies and procedures;
- describe documentation policy and procedures;
- use/implement documentation policy and procedures;
- discuss object reuse policy and procedures;
- describe separation of duties policies and procedures;
- practice/implement separation of duties policies and procedures;
- identify disposition of media and data policies and procedures;
- perform disposition of media and data policies and procedures;
- explain disposition of media and data policies and procedures; and
- identify storage media protection/control policies and procedures.
b. Countermeasures/Safeguard
- use countermeasure/safeguard alarms, signals and reports;
- describe countermeasures;
- use/implement countermeasures/safeguards;
- discuss countermeasure/safeguard corrective actions;
- assist in performing countermeasure/safeguard corrective actions;
- describe safeguards; and
- use/implement safeguards.
c. Management/Oversight
- use/implement management/oversight change controls;
- describe configuration management;
- discuss database integrity;
- describe disaster recovery management/oversight;
- use/implement disaster recovery management/oversight;
- discuss electronic records management/oversight;
- identify the key elements of information integrity;
- discuss information management;
- explain risk management; and
- practice risk management.
6. CONTINGENCY
a. Continuity of Operations
- practice backups;
- describe continuity planning;
- describe disaster recovery;
- describe disaster recovery plan testing; and
- discuss disaster recovery planning.
b. Countermeasures/Safeguards
- use alarms, signals and reports;
- define information availability;
- identify examples of corrective actions;
- select countermeasures;
- identify methods of intrusion detection; and
- select appropriate safeguards.
c. Configuration Management
- practice change controls;
- explain database integrity;
- practice disposition of classified info;
- perform disposition of media and data;
- perform electronic records management;
- practice emergency destruction; and
- identify storage media protection and control procedures.
7. PLATFORM SPECIFIC SECURITY FEATURES/PROCEDURES
To be determined by agency/service/organization ISSO.
|