SPECIAL INSTRUCTIONS

Publication 1

 

 

1                    PURPOSE

 

Cyber Security Manual, DM 3500-000 is being updated and additional chapters are being published.

 

 

2                    EXPLANATION OF CHANGES

 

The DM 3500 is being revised to incorporate a new number scheme and to add Chapters 4 and 5 to the manual.  The Table of Contents for Chapter 1, Part 1 has been revised and Chapter 6, Part 1 has been updated and Parts 2 & 3 have been added.

 

3                    FILING INSTRUCTIONS:

 

Insert or replace the following material

Insert: Cover Page, Cyber Security Classification Numbering Table

and Introduction

Replace:  USDA Computer Incident Response, Chapter 1, Table of Contents with Incident Response Procedures dated October 25, 2001, with DM 3505, Chapter 1, and Table of Contents

                                    Note: The remainder of Chapter 1 is still valid

Insert:  DM 3520-000, Configuration Management, Chapter 4

DM 3520-001, Configuration Management Policy and Responsibilities,

                                    Part 1

                                    DM 3525-000, USDA Internet and E-mail Security, Chapter 5, 

DM 3525-001, USDA Internet Access Security for Private Internet Service Providers, Part 1

                                    DM 3525-002, Internet Use and Copyright Restrictions, Part 2

Replace: Vulnerability Scan Procedures, Chapter 6 dated April 4, 2003,  in its entirety with

                                    DM 3530-000, Security Protection, Chapter 6

                                    DM 3530-001, Vulnerability Scan Procedures, Part 1

Insert:  DM 3530-002, IBM & IBM Compatible Security Standards, Part 2

                                    DM 3530-003, Public Key Infrastructure, Part 3

                                    DM 3500-901, Appendix A, Glossary