ImageVerifierCode 换一换
格式:PDF , 页数:17 ,大小:197.67KB ,
资源ID:427397      下载积分:5000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
注意:如需开发票,请勿充值!
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-427397.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(AIR FORCE FIPS PUB 200-2006 Minimum Security Requirements for Federal Information and Information Systems《联邦信息和信息系统的在最低安全要求》.pdf)为本站会员(wealthynice100)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

AIR FORCE FIPS PUB 200-2006 Minimum Security Requirements for Federal Information and Information Systems《联邦信息和信息系统的在最低安全要求》.pdf

1、FIPS PUB 200 _ FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION Minimum Security Requirements for Federal Information and Information Systems _ Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 March 2006 U.S.

2、DEPARTMENT OF COMMERCE Carlos M. Gutierrez, Secretary NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY William Jeffrey, DirectorProvided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-FIPS Publication 200 Minimum Security Requirements for Federal Information a

3、nd Information Systems _ FOREWORD The Federal Information Processing Standards (FIPS) Publication Series of the National Institute of Standards and Technology (NIST) is the official series of publications relating to standards and guidelines adopted and promulgated under the provisions of the Federa

4、l Information Security Management Act (FISMA) of 2002. Comments concerning FIPS publications are welcomed and should be addressed to the Director, Information Technology Laboratory, National Institute of Standards and Technology, 100 Bureau Drive, Stop 8900, Gaithersburg, MD 20899-8900. - CITA M. FU

5、RLANI, ACTING DIRECTOR INFORMATION TECHNOLOGY LABORATORY ii Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-FIPS Publication 200 Minimum Security Requirements for Federal Information and Information Systems _ AUTHORITY Federal Information Processing

6、Standards Publications (FIPS PUBS) are issued by the National Institute of Standards and Technology after approval by the Secretary of Commerce pursuant to Section 5131 of the Information Technology Management Reform Act of 1996 (Public Law 104-106) and the Federal Information Security Management Ac

7、t of 2002 (Public Law 107-347). iii Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-FIPS Publication 200 Minimum Security Requirements for Federal Information and Information Systems _ Federal Information Processing Standards 200March 9, 2006 Announc

8、ing the Standard for Minimum Security Requirements for Federal Information and Information Systems Federal Information Processing Standards Publications (FIPS PUBS) are issued by the National Institute of Standards and Technology (NIST) after approval by the Secretary of Commerce pursuant to the Fed

9、eral Information Security Management Act (FISMA) of 2002. 1. Name of Standard. FIPS Publication 200: Minimum Security Requirements for Federal Information and Information Systems. 2. Category of Standard. Information Security. 3. Explanation. The E-Government Act (P.L. 107-347), passed by the one hu

10、ndred and seventh Congress and signed into law by the President in December 2002, recognized the importance of information security to the economic and national security interests of the United States. Title III of the E-Government Act, entitled the Federal Information Security Management Act (FISMA

11、), emphasizes the need for each federal agency to develop, document, and implement an enterprise-wide program to provide information security for the information and information systems that support the operations and assets of the agency including those provided or managed by another agency, contra

12、ctor, or other source. FISMA directed the promulgation of federal standards for: (i) the security categorization of federal information and information systems based on the objectives of providing appropriate levels of information security according to a range of risk levels; and (ii) minimum securi

13、ty requirements for information and information systems in each such category. This standard addresses the specification of minimum security requirements for federal information and information systems. 4. Approving Authority. Secretary of Commerce. 5. Maintenance Agency. Department of Commerce, NIS

14、T, Information Technology Laboratory. 6. Applicability. This standard is applicable to: (i) all information within the federal government other than that information that has been determined pursuant to Executive Order 12958, as amended by Executive Order 13292, or any predecessor order, or by the A

15、tomic Energy Act of 1954, as amended, to require protection against unauthorized disclosure and is marked to indicate its classified status; and (ii) all federal information systems other than those information systems designated as national security systems as defined in 44 United States Code Secti

16、on 3542(b)(2). The standard has been broadly developed from a technical perspective to complement similar standards for national security systems. In addition to the agencies of the federal government, state, local, and tribal governments, and private sector organizations that compose the critical i

17、nfrastructure of the United States are encouraged to consider the use of this standard, as appropriate. iv Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-FIPS Publication 200 Minimum Security Requirements for Federal Information and Information Syst

18、ems _ 7. Specifications. FIPS Publication 200, Minimum Security Requirements for Federal Information and Information Systems. 8. Implementations. This standard specifies minimum security requirements for federal information and information systems in seventeen security-related areas. Federal agencie

19、s must meet the minimum security requirements as defined herein through the use of the security controls in accordance with NIST Special Publication 800-53, Recommended Security Controls for Federal Information Systems, as amended. 9. Effective Date. This standard is effective immediately. Federal a

20、gencies must be in compliance with this standard not later than one year from its effective date. 10. Qualifications. The application of the security controls defined in NIST Special Publication 800-53 required by this standard represents the current state-of-the-practice safeguards and countermeasu

21、res for information systems. The security controls will be reviewed by NIST at least annually and, if necessary, revised and extended to reflect: (i) the experience gained from using the controls; (ii) the changing security requirements within federal agencies; and (iii) the new security technologie

22、s that may be available. The minimum security controls defined in the low, moderate, and high security control baselines are also expected to change over time as well, as the level of security and due diligence for mitigating risks within federal agencies increases. The proposed additions, deletions

23、, or modifications to the catalog of security controls and the proposed changes to the security control baselines in NIST Special Publication 800-53 will go through a rigorous, public review process to obtain government and private sector feedback and to build consensus for the changes. Federal agen

24、cies will have up to one year from the date of final publication to fully comply with the changes but are encouraged to initiate compliance activities immediately. 11. Waivers. No provision is provided under FISMA for waivers to FIPS made mandatory by the Secretary of Commerce. 12. Where to Obtain C

25、opies. This publication is available from the NIST Computer Security Division web site by accessing http:/csrc.nist.gov/publications. v Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-FIPS Publication 200 Minimum Security Requirements for Federal Inf

26、ormation and Information Systems _ TABLE OF CONTENTS SECTION 1 PURPOSE1 SECTION 2 INFORMATION SYSTEM IMPACT LEVELS.1 SECTION 3 MINIMUM SECURITY REQUIREMENTS.2 SECTION 4 SECURITY CONTROL SELECTION.4 APPENDIX A TERMS AND DEFINITIONS6 APPENDIX B REFERENCES 10 APPENDIX C ACRONYMS .11 vi Provided by IHSN

27、ot for ResaleNo reproduction or networking permitted without license from IHS-,-,-FIPS Publication 200 Minimum Security Requirements for Federal Information and Information Systems _ 1 PURPOSE The E-Government Act of 2002 (Public Law 107-347), passed by the one hundred and seventh Congress and signe

28、d into law by the President in December 2002, recognized the importance of information security to the economic and national security interests of the United States. Title III of the E-Government Act, entitled the Federal Information Security Management Act (FISMA) of 2002, tasked NIST with the resp

29、onsibility of developing security standards and guidelines for the federal government including the development of: Standards for categorizing information and information systems1collected or maintained by or on behalf of each federal agency based on the objectives of providing appropriate levels of

30、 information security according to a range of risk levels; Guidelines recommending the types of information and information systems to be included in each category; and Minimum information security requirements for information and information systems in each such category. FIPS Publication 199, Stan

31、dards for Security Categorization of Federal Information and Information Systems, approved by the Secretary of Commerce in February 2004, is the first of two mandatory security standards required by the FISMA legislation.2FIPS Publication 200, the second of the mandatory security standards, specifie

32、s minimum security requirements for information and information systems supporting the executive agencies of the federal government and a risk-based process for selecting the security controls necessary to satisfy the minimum security requirements. This standard will promote the development, impleme

33、ntation, and operation of more secure information systems within the federal government by establishing minimum levels of due diligence for information security and facilitating a more consistent, comparable, and repeatable approach for selecting and specifying security controls for information syst

34、ems that meet minimum security requirements. 2 INFORMATION SYSTEM IMPACT LEVELS FIPS Publication 199 requires agencies to categorize their information systems as low-impact, moderate-impact, or high-impact for the security objectives of confidentiality, integrity, and availability. The potential imp

35、act values assigned to the respective security objectives are the highest values (i.e., high water mark3) from among the security categories that have been determined for each type of information resident on those information systems.4The generalized format for expressing the security category (SC)

36、of an information system is: SCinformation system = (confidentiality, impact), (integrity, impact), (availability, impact), where the acceptable values for potential impact are low, moderate, or high. 1An information system is a discrete set of information resources organized for the collection, pro

37、cessing, maintenance, use, sharing, dissemination, or disposition of information. Information resources include information and related resources, such as personnel, equipment, funds, and information technology.2NIST security standards and guidelines referenced in this publication are available at h

38、ttp:/csrc.nist.gov. 3The high water mark concept is employed because there are significant dependencies among the security objectives of confidentiality, integrity, and availability. In most cases, a compromise in one security objective ultimately affects the other security objectives as well. 4NIST

39、 Special Publication 800-60, Guide for Mapping Types of Information and Information Systems to Security Categories, provides implementation guidance on the assignment of security categories to information and information systems. 1 Provided by IHSNot for ResaleNo reproduction or networking permitted

40、 without license from IHS-,-,-FIPS Publication 200 Minimum Security Requirements for Federal Information and Information Systems _ Since the potential impact values for confidentiality, integrity, and availability may not always be the same for a particular information system, the high water mark co

41、ncept must be used to determine the overall impact level of the information system. Thus, a low-impact system is an information system in which all three of the security objectives are low. A moderate-impact system is an information system in which at least one of the security objectives is moderate

42、 and no security objective is greater than moderate. And finally, a high-impact system is an information system in which at least one security objective is high. The determination of information system impact levels must be accomplished prior to the consideration of minimum security requirements and

43、 the selection of appropriate security controls for those information systems. 3 MINIMUM SECURITY REQUIREMENTS The minimum security requirements cover seventeen security-related areas with regard to protecting the confidentiality, integrity, and availability of federal information systems and the in

44、formation processed, stored, and transmitted by those systems. The security-related areas include: (i) access control; (ii) awareness and training; (iii) audit and accountability; (iv) certification, accreditation, and security assessments; (v) configuration management; (vi) contingency planning; (v

45、ii) identification and authentication; (viii) incident response; (ix) maintenance; (x) media protection; (xi) physical and environmental protection; (xii) planning; (xiii) personnel security; (xiv) risk assessment; (xv) systems and services acquisition; (xvi) system and communications protection; an

46、d (xvii) system and information integrity. The seventeen areas represent a broad-based, balanced information security program that addresses the management, operational, and technical aspects of protecting federal information and information systems. Policies and procedures play an important role in the effective implementation of enterprise-wide information security progr

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1