UCF STIG Viewer Logo
Changes are coming to https://stigviewer.com. Take our survey to help us understand your usage and how we can better serve you in the future.
Take Survey

ECTC-1 Tempest Controls


Overview

Measures to protect against compromising emanations have been implemented according to DoD Directive S-5200.19.

MAC / CONF Impact Subject Area
CLASSIFIED
SENSITIVE
High Enclave Computing Environment

Details

Threat
All electronic and electromechanical information processing equipment can produce unintentional data-related or intelligence-bearing emanations, which if intercepted and analyzed, disclose the information transmitted, received, handled, or otherwise processed.  Properly implementing TEMPEST controls mitigates the risk of compromising emanations.

Guidance
1. DoD Directive S-5200.19 establishes guidelines and procedures that shall be used by departments and agencies to determine the applicable countermeasures to protect against compromising emanations.
2. Some of the factors that shall be evaluated to determine TEMPEST countermeasures are:
  a. Location of systems and proximity of threat
  b. Volume of information processed
  c. Sensitivity of information processed
  d. Physical control of facility and systems
3. A Certified TEMPEST Technical Authority shall conduct or validate a TEMPEST countermeasure review.

References

  • CJCSM 6510.01, Defense-in-Depth: Information Assurance (IA) and Computer Network Defense (CND), 25 March 2003
  • DoDD S-5200.19, Control of Compromising Emanations,
  • NSTISSI No. 7000, TEMPEST Countermeasures for Facilities, 29 November 1993
  • NSTISSAM TEMPEST/2-95, RED/BLACK Installation Guidance, 12 December 1993