Procedures are implemented to ensure the proper handling and storage of information, such as end-of-day security checks, unannounced security checks, and, where appropriate, the imposition of a two-person rule within the computing facility.
MAC / CONF | Impact | Subject Area |
---|---|---|
CLASSIFIED SENSITIVE | Medium | Physical and Environmental |
Threat |
---|
Information not handled and stored properly is at risk of unauthorized access, copying, and distribution. |
Guidance |
---|
1. Procedures shall be implemented to ensure the proper handling and storage of information. 2. End-of-day (EOD) security checks shall take place to verify the handling and storage of information deemed necessary in accordance with agency and facility standard operating procedures. 3. Unannounced security checks shall take place to verify the handling and storage of information deemed necessary in accordance with agency and facility standard operating procedures. 4. Two-person rule shall take place when appropriate to verify the handling and storage of information deemed necessary in accordance with agency and facility standard operating procedures. |