Appendix B

CS Legal and Regulatory References

 

Federal Laws

·        Privacy Act of 1974, as amended, (5 U.S.C. 552a), [http://www.usdoj.gov/04foia/privstat.htm]

·        Paperwork Reduction Act of 1995, Title 44 Chapter 35 [http://www.archives.gov/federal_register/public_laws]

·        Chief Financial Officers Act of 1990, (31 U.S.C. 2512 et seq.) [http://www.gao.gov/policy/12_19_4.pdf]  and

[http://wwwoirm.nih.gov/itmra/cfoact.html]

·        Clinger-Cohen Act, P.L. 104-106, Division E, Information Technology Management Reform Act of 1996 [http://www.cio.gov/documents]

·        Computer Security Enhancement Act of 1997, H.R. 1903 [http://www.fas.org/irp/congress/1997_rpt/h105_243.htm]

·        Government Paperwork Elimination Act of 1998, P.L. 105-277, Title XVII [http://www.cdt.org/legislations/105th/digsig/govnopaper.html]

·        FY 2001 Defense Authorization Act (P.L. 106-398) – Title X, subtitle G “Government Information Security Reform” (The Security Act) [http://www.access.gpo.gov/nara/publaw/106publ.htm]

·        Federal Information Security Management Act (FISMA), P.L. 107-347, Title III, December 2002  [http://www.fedcirc.gov/library/legislation/FISMA.html]

·         Freedom of Information Act, P.L. 89-487  [http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=browse_usc&docid=Cite:+5USC552]

·         Computer Fraud and Abuse Act, P.L. 99-474, [http://www.alw.nih.gov/Security/FIRST/papers/legal/cfa.txt]

·         Electronic Signature in Global and National Commerce Act, P.L. 106-229, [http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=106_cong_public_laws&docid=f:publ229.106.pdf]

·        Government Information Security Reform Act, P.L. 106-398, [http://frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=106_cong_public_laws&docid=f:publ398.106]

·        Children’s Online Privacy Protection Act of 1998, [http://www.ftc.gov/ogc/coppa1.htm]

 

 

 

Executive Orders/
Presidential Decision Directives

·        Executive Order No. 12046 of March 27, 1978 [no electronic version available]

·        Executive Order No. 12472 of April 3, 1984 [no electronic version available]

·        Executive Order No. 13011 of July 16, 1996 [http://www.nara.gov/fedreg/eo_clint.html]

·        Homeland Security Directive HSPD-7, Critical Infrastructure Identification, Prioritization and Protection [http://www.usda.gov/da/physicalsecurity/hspd.pdf]

·        Homeland Security Directive HSPD-12, Policy for a Common Identification Standard for Federal Employees and Contractors

 Continued on next page


CS Legal and Regulatory References, Continued

 

Office of Management & Budget (OMB) Circulars, Bulletins and Memoranda)

 

[http://www.

whitehouse.gov/omb]

 

·        OMB Circular No. A-11 Preparation and Submission of Budget Estimates (05/03)

·        OMB Circular No. A-123 Management Accountability and Control (06/95)

·        OMB Circular No. A-127 Policies and Standards for Financial Management Systems (07/93)

·        OMB Circular No. A-130 Security of Federal Automated Information Resources (Appendix III) (11/00)

·        OMB Bulletin No. 90-08 (Appendix A) [Security Plans]

·        M-97-16 Information Technology Architectures (06/18/97)

·        M-99-05 Instructions on Complying with President’s Memorandum of May 14, 1998 “Privacy and Personal Information in Federal Records” (01/07/99)

·        M-99-18 Privacy Policies on Federal Web Sites (06/02/99)

·        M-99-00 Security of Federal Automated Information Resources (06/23/99)

·        M-00-07 Incorporating and Funding Security in Information Systems Investments (02/28/00)

·        M-00-10 OMB Procedures and Guidance on Implementing the Government Paperwork Elimination Act (04/25/00)

·        M-00-13 Privacy Policies and Data Collection on Federal Web Sites (06/22/01)

·        M-00-15 OMB Guidance on Implementing the Electronic Signatures in Global and National Commerce Act (09/25/00)

·        M-01-05 Guidance on Inter-agency Sharing of Personal Data – Protecting Personal data (12/20/00)

·        M-03-19 Reporting Instructions for the Federal Information Security Management Act and Updated Guidance on Quarterly IT Security Reporting (08/06/03)

Continued on next page


CS Legal and Regulatory References, Continued

 

National Institute of Standards & Technology (NIST) Federal Information Processing Standards Publications (FIPS)
 
[http://csrc.nist.
gov/publications/fips/index.html]

 

·        FIPS PUB 31 Guidelines for Automatic Data Processing Physical Security and Risk Management (06/74)

·        FIPS PUB 46-3 Data Encryption Standard (DES); specifies the use of Triple DES (10/99)

·        FIPS PUB 48 Guidelines on Evaluation of Techniques for Automated Personal Identification (04/77)

·        FIPS PUB 73 Guidelines for Security of Computer Applications (06/80)

·        FIPS PUB 74 Guidelines for Implementing and Using the NBS Data Encryption Standard (04/81)

·        FIPS PUB 81 DES Modes of Operation (12/80)

·        FIPS PUB 83 Guideline on User Authentication Techniques for Computer Network Access Control (09/80)

·        FIPS PUB 87 Guidelines for ADP Contingency Planning (03/81)

·        FIPS PUB 102 Guideline for Computer Security Certification and Accreditation (09/83)

·        FIPS PUB 112 Password Usage (05/85)

·        FIPS PUB 113 Computer Data Authentication (05/85)

·        FIPS PUB 140-1 Security Requirements for Cryptographic Modules (01/94)

·        FIPS PUB 140-2 Security Requirements for Cryptographic Modules (06/01)

·        FIPS PUB 171 Key Management Using ANSI X9.71 (04/92)

·        FIPS PUB 180-2 Secure Hash Standard (04/95)

·        FIPS PUB 181 Automated Password Generator (10/93)

·        FIPS PUB 185 Escrowed Encryption Standard (02/94)

·        FIPS PUB 186-2 Digital Signature Standard (DSS) (01/00)

·        FIPS PUB 188 Standard Security Labels for Information Transfer (09/94)

·        FIPS PUB 190 Guideline for the Use of Advanced Authentication Technology Alternatives (09/94)

·        FIPS PUB 191 Guideline for the Analysis of Local Area Network Security (11/94)

·        FIPS PUB 196 Entity Authentication Using Public Key Cryptography (02/97)

·        FIPS PUB 199 Standards for Security Categorization of Federal Information and Information Systems (12/03)

·        FIPS PUB 201 Personal Identification Verification for Federal Employees and Contractors

Continued on next page


CS Legal and Regulatory References, Continued

 

NIST Special Publications

 

[http://csrc.nist.

gov/publications/nistpubs/index.

html]

 

 Drafts:

[http://csrc.nist. gov/publications/drafts.html]

 

800 Series

·        NIST Special Publication 800-2, Public-Key Cryptography

·        NIST Special Publication 800-3, Establishing a Computer Security Incident Response Capability (CSIRC)

·        NIST Special Publication 800-4, Computer Security Considerations in Federal Procurements:  A Guide for Procurement Initiators, Contracting Officers, and Computer Security Officials

·        NIST Special Publication 800-4A, Security Considerations in Federal Information Technology Procurements

·        NIST Special Publication 800-5, A Guide to the Selection of Anti-Virus Tools and Techniques

·        NIST Special Publication 800-6, Automated Tools for Testing Computer System Vulnerability)

·        NIST Special Publication 800-7, Security in Open Systems

·        NIST Special Publication 800-8, Security Issues in the Database Language SQL

·        NIST Special Publication 800-9, Good Security Practices for Electronic Commerce, Including Electronic Data Interchange

·        NIST Special Publication 800-10, Keeping Your Site Comfortably Secure:  An Introduction to Internet Firewalls

·        NIST Special Publication 800-11, The Impact of the FCC’s Open Network Architecture on NS/EP Telecommunications Security

·        NIST Special Publication 800-12, An Introduction to Computer Security:  The NIST Handbook

·        NIST Special Publication 800-13, Telecommunications Security Guidelines for Telecommunications Management Network

·        NIST Special Publication 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems

·        NIST Special Publication 800-15, Minimum Interoperability Specification for PKI components (MISPC), Version 1

·        NIST Special Publication 800-16, Information Technology Security Training Requirements: A Role- and Performance-Base Model (supersedes NIST Spec Pub. 500-172)

·        NIST Special Publication 800-17, Modes of Operation Validation System (MOVS):  Requirements and Procedures

·        NIST Special Publication 800-18, Guide for Developing Security Plans for Information Technology Systems

·        NIST Special Publication 800-19, Mobile Agent Security

Continued on next page


CS Legal and Regulatory References, Continued

 

NIST Special Publications (continued)

·        NIST Special Publication 800-20, Modes of Operation Validation System for the Triple Data Encryption Algorithm (TMOVS):  Requirements and Procedures

·        NIST Special Publication 800-21, Guideline for Implementing Cryptography in the Federal Government

·        NIST Special Publication 800-22, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications

·        NIST Special Publication 800-23,Guideline to Federal Organizations on Security Assurance and Acquisition/Use of Tested/Evaluated Products

·        NIST Special Publication 800-24, PBX Vulnerability Analysis:  Finding Holes in Your PBX Before Someone Else Does

·        NIST Special Publication 800-25, Federal Agency Use of Public Key Technology for Digital Signatures and Authentication

·        NIST Special Publication 800-26, Security Self Assessment Guide for Information Technology Systems

·        NIST Special Publication 800-27, Engineering Principles for IT Security

·        NIST Special Publication 800-28, Guidelines on Active Content and Mobile Code

·        NIST Special Publication 800-29, A Comparison of the Security Requirements of Cryptographic Modules in FIPS 140-1 and 140-2

·        NIST Special Publication 800-30, Risk Management Guide for Information Technology Systems

·        NIST Special Publication 800-31, Intrusion Detection Systems (IDS)

·        NIST Special Publication 800-32, Introduction to Public Key Technology and the Federal PKI Infrastructure

·        NIST Special Publication 800-33, Underlying Technical Models for Information Technology Security

·        NIST Special Publication 800-34, Contingency Planning Guide for Information Technology Systems

·        NIST Special Publication 800-35, Guide to IT Security Services (Draft)

·        NIST Special Publication 800-36, Guide to Selecting IT Security Products

·        NIST Special Publication 800-37, Guide for the Security Certification and Accreditation of Federal Information Systems

·        NIST Special Publication 800-38A, Recommendation for Block Cipher Modes of Operation - Methods and Techniques

·        NIST Special Publication, 800-38B, Recommendation for Block Cipher Modes of Operation: the RMAC Authentication Mode

Continued on next page


CS Legal and Regulatory References, Continued

 

NIST Special Publications (continued)

·        NIST Special Publication, 800-38C, Recommendation for Block Cipher Modes of Operation: the CCM Mode for Authentication and Confidentiality

·        NIST Special Publication 800-40, Procedures for Handling Security Patches

·        NIST Special Publication 800-41, Guidelines on Firewalls and Firewall Policy

·        NIST Special Publication 800-42, Guideline on Network Security Testing

·        NIST Special Publication 800-43, System Administration Guidance for Windows 2000 Professional

·        NIST Special Publication 800-44, Guidelines on Securing Public Web Servers

·        NIST Special Publication 800-45, Guidelines on Electronic Mail Security

·        NIST Special Publication 800-46, Security for Telecommuting and Broadband Communications

·        NIST Special Publication 800-47, Security Guide for Interconnecting Information Technology Systems

·        NIST Special Publication 800-48, Wireless Network Security: 802.11, Bluetooth, and Handheld Devices

·        NIST Special Publication 800-50, Building an Information Technology Security Awareness and Training Program

·        NIST Special Publication 800-51, Use of the Common Vulnerabilities and Exposures (CVE) Vulnerability Naming Scheme

·       NIST Special Publication 800-53, Security Controls for Federal Information Systems

·       NIST Special Publication 800-53A, Techniques and Procedures for Verifying the Effectiveness of Security Controls in Federal Information Systems

·        NIST Special Publication 800-55, Security Metrics Guide for Information Technology Systems

·       NIST Special Publication 800-60, Guide for Mapping Information and Information Types to Security Objectives and Risk Levels

·        NIST Special Publication 800-61, Computer Security Incident Handling Guide

·        NIST Special Publication 800-63, Recommendation for Electronic Authentication

Continued on next page


CS Legal and Regulatory References, Continued

USDA Policies & Regulations

 

[http://www.

ocionet.usda.

gov/ocio/cyber_sec/index.html]

·       DR 3140-2, USDA Internet Security Policy

·       DR 3300-1, Telecommunications & Internet Services & Use

·       DR 3410-1, Information Collection Activity

·       DR 3080-1, Records Disposition

·       DM 3200-2, Management:  A Project Managers Guide to Applications Systems Life Cycle Management

·       DM 3500, USDA Cyber Security Manual

·       OCIO Web Farm Physical Security Standards, Policies & Procedures

·       Director Central Intelligence Directive (DCID) 1/21; DCID 6/3, Secure Compartmented Information Facility Construction Specifications

·       Office of Operations, USDA Physical Security Handbook, Chapter 3, Exterior and Interior Protection (Draft)

·       Interagency Security Committee (ISC) Security Design Criteria for Federal Facilities (Classified Document)

 

Miscellaneous

·        DOD Directive 8500.1 Information Assurance (10/02) [http://www.dtic.mil/whs/directives/]

·        GAO Federal Information System Control Audit Manual (Exposure Draft) (FISCAM) (08/97) [http://www.gao.gov/policy/12_19_6.pdf]

·        Common Criteria for Information Technology Security Evaluation (Ver. 2.1) (08/99) [http://csrc.nist.gov/cc/ccv20/ccv2list.htm]

·        Federal CIO Council, Securing Electronic Government (01/01) [http://www.cio.gov]