COE EC 25-1-246-1996 ENTERPRISE NETWORK OPERATING SECURITY PROCEDURES《企业网络运行安全性程序》.pdf
《COE EC 25-1-246-1996 ENTERPRISE NETWORK OPERATING SECURITY PROCEDURES《企业网络运行安全性程序》.pdf》由会员分享,可在线阅读,更多相关《COE EC 25-1-246-1996 ENTERPRISE NETWORK OPERATING SECURITY PROCEDURES《企业网络运行安全性程序》.pdf(14页珍藏版)》请在麦多课文档分享上搜索。
1、CEIM-P CEIM-S Circular No. 25-1-246 DEPARTMENT OF THE ARMY U.S. Army Corps of Engineers Washington, DC 20314-1000 EC 25-1-246 30 November 1996 Expires 31 December 1998 Information Management ENTERPRISE NETWORK OPERATING SECURITY PROCEDURES 1. Pumose. a. This circular establishes Command policy for n
2、etwork operating security in the U.S. Amy Corps of Engineers for all computing and communications assets directly or indirectly connected to the Corps of Engineers Automation Plan (CEAP-IA) (COE) Network provided through the CEAP-IA program. b. This circular promulgates minimum security standards an
3、d procedures necessary to safeguard corporate information assets - hardware, software, data, and capacity (processing, storage, and transmission/bandwidth). c. For purposes of this document, network security compromise is divided into the following three general categories: (1) Breach of Confidentia
4、lity - involves unauthorized access to corporate information assets, (2) Denial of service - involves the unauthorized use of corporate information assets, or the prevention of authorized use of corporate information assets, and (3) Data compromise - involves unauthorized access to corporate informa
5、tion assets, with possible corruption of corporate data. d. These policies, standards, and procedures are necessary to ensure that: (1) Corporate information assets are not compromised, (2) Corporate information asset usage is not illegally converted, and that (3) Corporate information assets are no
6、t used as a vehicle for compromising the security of the Department of the Army, the Department of Defense, or any federal, state, or local agency using the Corps of Engineers as an information resource. Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-
7、,-EC 25-1-246 30 Nov 96 e. These policies and procedures will ensure that the Corps is able to: (1) present a defense in depth against any potential intruder by means of “firewalls, I “bastion hosts, I “proxying“ of selected network services, and “packet fil tering routers, I (2) identify any penetr
8、ation of corporate information assets with maximum accuracy in minimum time, and (3) minimize the damage to corporate information assets which any potential intruder can cause. 2. Atmlicabilitv. This circular is applicable to: a. All HQUSACE/OCE staff elements, USACE Major Subordinate Commands (MSC)
9、 and their Districts, Laboratories, Centers, and Field Operating Activities (FOA) . b. Use of any electronic medium for transmission, storage, or processing of data or information and the creation of records for which the US Army Corps of Engineers or its representatives have stewardship and which m
10、akes use of Corps automation or telecommunications resources in a networked environment. c. All government employees, contractor employees, or other personnel having operational access, either directly or indirectly to, and use of, Corps of Engineers Automation Plan (CEAP-IA) automation and telecomm
11、unications assets. 3. References. Related references are listed in Appendix A. Definitions and Acronyms are in Appendix B. 4. Policv. It is the policy of the Corps that: a. Network Access Will Be Strictly Controlled. (1) All dial-in access to Corps of Engineers (COE) information assets at any organi
12、zational level will be strictly controlled by USERID/PASSWORD in accordance with AR 380-19. (2) All INTERNET access will be accomplished through CEAP-IA Program Office designated ingress and egress points. (3) Access to the INTERNET by non-CEAP-IA provided and controlled dual- homed devices, i.e. de
13、vices (modems, routers, etc.) which are simultaneously connected physically and/or logically to both the internal network(s) and to the INTERNET is strictlv prohibited, unless waived in accordance with Para. 5. 2 Provided by IHSNot for ResaleNo reproduction or networking permitted without license fr
14、om IHS-,-,-COE EC 25-1-246 m 3515789 0822bYY 231 rn EC 25-1-246 30 Nov 96 b. Inbound Internet Network Services Will Be Strictly Controlled. (1) The following communications services/capabilities will be provided by the CEAP-IA Network Control Center and controlled via packet filtering and these serv
15、ices will be restricted to “INTERNET Accessible“ corporate information assets: (a) File-Transfer Protocol (FTP), (b) Hypertext-Transfer-Protocol (HTTP), (c) Telnet, (d) X-Windows, and (e) Domain Name Server (DNS) host lookups. (2) Select communications services/capabilities will be provided only thr
16、ough designated servers: (a) Network News Transfer Protocol (NNTP), (b) X-Windows (proxy server), and (c) Simple Mail Transfer Protocol (SMTP) . (3) Domain Name Server (DNS) host lookups will be permitted through the INTERNET firewall gateways. (4) All services not specifically authorized are prohib
17、ited. (5) It will be possible for INTERNET inbound users to access a single designated Corps ORACLE WebServer for the purpose of retrieving selected data imported from a “Corps Trusted“ ORACLE database. c. Data Will Be Partitioned Into “INTERNET Accessible“ and “Corps Trusted“ Data Sets, and Segrega
18、ted By Network Segment. (1) All data and data presentations (including “web pages“ , which are to be made available to the public will be partitioned into two data sets - an “INTERNET Accessible“ data set and a “Corps Trusted“ data set. (2) No “Corps Trusted“ data set or data presentation will be ac
19、cessible via the INTERNET, except in accordance with AR 380-19. 3 Provided by IHSNot for ResaleNo reproduction or networking permitted without license from IHS-,-,-COE EC 25-3-246 D 3515789 0822b4.5 178 I EC 25-1-246 30 Nov 96 (3) “INTERNET Accessible“ data sets and data presentations will be period
20、ically refreshed from the appropriate “Corps Trusted“ data sets in accordance with procedures established by the Functional Proponent as data security cannot be assumed. (4) All data on “INTERNET Accessible“ servers will be monitored for data quality (accuracy and completeness). (5) All data on “INT
21、ERNET Accessible“ servers will be backed up in accordance with standard operating procedures. (6) Outbound initiated connections from “INTERNET accessible“ network segments to Corps Trusted“network segments will be denied - with the exception of mail and DNS server access. d. All Commuaications Sess
22、ions Will Be Subject To Monitoring. (1) All communications sessions are subject to automatic and/or random session monitoring. (2) All monitored sessions will be subject to extensive “logging“ of “session profile“ data. (3) Any communications session that shows evidence of having been compromised ca
23、n and will be traced, and/or terminated at the discretion of CEAP-IA Network Control Center/Alternate Network Control Center security personnel. Any such deliberate interruption of services may result in the complete termination of data communications to/from a particular platform, component, or net
24、work segment. All such incidents will be reported to the local and enterprise Information Systems Security Manager (ISSM) or Information Systems Security Officer (ISSO) . e. All Corporate Network Security Controls Will Be Implemented, Managed, and Controlle By the CW-IA Program Office. (1) All packe
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- COEEC2512461996ENTERPRISENETWORKOPERATINGSECURITYPROCEDURES 企业 网络 运行 安全性 程序 PDF

链接地址:http://www.mydoc123.com/p-620647.html