Access to all DoD information (classified, sensitive, and public) is determined by both its classification and user need-to-know. Need-to-know is established by the Information Owner and enforced by discretionary or role-based access controls. Access controls are established and enforced for all shared or networked file systems and internal websites, whether classified, sensitive, or unclassified. All internal classified, sensitive, and unclassified websites are organized to provide at least three distinct levels of access: 1. Open access to general information that is made available to all DoD authorized users with network access. Access does not require an audit transaction. 2. Controlled access to information that is made available to all DoD authorized users upon the presentation of an individual authenticator. Access is recorded in an audit transaction.
MAC / CONF | Impact | Subject Area |
---|---|---|
CLASSIFIED SENSITIVE | High | Enclave Computing Environment |
Threat |
---|
Unauthorized access could be made to classified and sensitive information that must be protected from unauthorized disclosure, modification, or destruction. This implementation guide is aimed to help web administrators/network administrators implement proper discretionary or role based access controls, as well as user authenticators and audit trails to prevent and detect unauthorized access to system data effectively. |
Guidance |
---|
1. For the system that provides public information without restrictions, the web administrator shall implement the following for the external web server: a. Implement an external router between the external web server and the Internet to filter the traffic to the external web server. b. Configure the web server in accordance with the DISA Web Server STIG c. Configure the web server operating system in accordance with proper DISA STIGs (e.g., Windows, Unix) d. Provide only Read access to Public e. Disable the public access auditing feature to prevent system crash f. Restrict access to a limited number of people for web content management 2. For the system that provides classified and/or sensitive information to all DOD authorized users with network access, the web administrator shall implement the following for the internal web server: a. Implement internal firewalls, routers, and switches in accordance with DOD SIPRNET and NIPRNET Connection Approval Process b. Configure the internal web server in accordance with DISA Web Server STIG c. Configure the web server operating system (e.g., Windows, Unix) in accordance with proper DISA STIGs, which require DOD approved user ID and authenticators (e.g., password, token) prior to system access d. Configure the database containing classified and sensitive information made available to all DOD users in accordance with DISA Database STIG for role based access controls in the areas of table and column privileges and file permissions e. Configure the web application properly to prevent any direct access of users to the database f. Configure the audit features of the system components (e.g., operating system, database, and application) to capture security related activities (e.g., logon/logoff) g. Maintain and update a list of user accounts regularly to prevent unauthorized access 3. For the system that is available only to an authorized community of interest, the system/network administrator shall implement the following: a. Configure the system server operating system in accordance with proper DISA STIGs (e.g., Windows, Unix) or NSA security guides b. Assign user accounts and authenticators based on need to know in accordance with DOD and organization’s security policies c. Configure the system to request user ID and authenticator prior to system access d. Maintain and update a list of user accounts regularly in accordance with DOD personnel security program and organization’s guidance e. Configure the databases containing classified and/or sensitive information in accordance with the DISA Database STIGs, NSA database security guides, and vendor’s security administration guide to provide role based access controls in the areas of table and column privileges and file permissions f. Configure the auditing features of the operating system, database, and application to record security related events, to include logon/logoff and all failed access attempts) |