Link to contents


Information Technology


HANDBOOK AS-873 REVISION

Telecommunications Services

Effective immediately, Handbook AS-873, Telecommunications Services, is revised to update the policies and requirements related to personal digital assistant (PDA) devices used in the Postal ServiceTM.

We will incorporate these revisions into the next online update of Handbook AS-873 accessible on the Postal Service PolicyNet Web site:

• Go to http://blue.usps.gov.

• Under "Essential Links" in the left-hand column, click on References.

• Under "References" in the right-hand column, under "Policies," click on PolicyNet.

• Then click on HBKs.

(The direct URL for the Postal Service PolicyNet Web site is http://blue.usps.gov/cpim.)

Handbook AS-873, Telecommunications Services

* * * * *

9 Wireless Communications

* * * * *

[Revise title and text to read as follows:]

9-4 Wireless Data Communications

9-4.1 Policy

The Blackberry is the Postal Service standard, and the only personal digital assistant (PDA) device supported by Information Technology (IT). Future technology enhancements may change this standard; however, the policies and procedures provided in this instruction will apply to all replacements and any additional PDA devices that become part of the Postal Service infrastructure.

9-4.2 Applicability

The policy and procedures for provisioning and supporting all personal digital assistant devices apply to all levels of the Postal Service, regardless of the source of funding.

9-4.3 Service Options

Data Services

a. Data services consist of e-mail and PIN-to-PIN (Blackberry to Blackberry) communications and are required for all Blackberry hardware purchases.

b. Responsibility for funding the recurring monthly costs associated with these services is outlined below.

c. Approving PCES managers should carefully consider the responsibilities described below when approving the initial Blackberry device purchase.

Voice Services

a. Voice services will not be activated without the PCES manager's approval.

b. Voice will not be activated unless a calling plan has been selected.

c. All voice services are funded locally.

d. To have this voice service activated, you must turn in your Postal Service-distributed mobile phone and pager (if one was in use) prior to Blackberry activation.

Service Changes

Contact the service provider directly for all subsequent changes in service.

User Information Changes

Update user information changes in the eAccess system.

9-4.4 Funding

General

All managers are expected to exercise fiscal responsibility in approving new Blackberry devices (and all other nonstandard PDAs for authorized Blackberry users), replacing cellular phones, and implementing the above guidelines in their entirety.

For Officers and PCES Managers

a. Information Technology (IT) will fund the initial purchase of PDAs for officers and PCES managers. This funding includes a one-time setup charge and recurring monthly charges for data services. IT will also fund and manage all corporate-wide upgrades.

b. Area and district offices will fund locally initiated upgrades, replacement of damaged devices, and voice- service costs.

For Field IT Staff (District & BMC IS and Area ITPC)

IT will fund devices for the field IT staff and the recurring voice-service costs, as well as all upgrades and replacement costs.

For EAS Positions

PCES managers will fund PDAs for their respective EAS employees.

For Contract Employees

PDAs for contract employees must be approved and funded by their PCES manager. Their job duties must require after-hours communications, availability, or immediate communications capability to support the function of the organization.

9-4.5 Eligibility

General

Managers should consider these guidelines when determining the need to provide PDAs to noncritical positions:

a. An employee's job duties require after-hours communications to support the function of that employee's organization.

b. An employee's job duties require immediate communications to support the function of that employee's organization.

Contract Employees

Contract employee job duties must require after-hours communications, availability, or immediate communications capability to support the function of the organization.

FLSA Non-Exempt and Bargaining Unit Employees

FLSA non-exempt and bargaining unit employees are not eligible to receive PDAs.

9-4.6 Provisioning PDAs/Blackberry

Outlook Account Requirement

Users must have an ACE/Exchange (Outlook) account before a connection will be configured. No hardware or service will be provided for users who do not have an active Outlook account.

For New Service

To establish a new Blackberry device, complete the following steps:

1. Prepare and process an eBuy request, and obtain approval from your PCES manager.

• Cost and plan information is in the Cost&Rates.xls file located at: http://it-blackberry.

• The GL Account number is 54405.

2. Go to eAccess, request access, and choose ACE Blackberry at the "application requested" prompt. Complete all information requested and obtain approval. (The devices will be shipped to the requestor's address specified on the eBuy.)

3. Complete the self-activation instructions detailed at: http://it-blackberry.

Note: If you need help in activating your device, contact the IT Corporate Help Desk at 800-USPS-HELP (800-877-7435). When prompted by the Integrated Voice Response (IVR) system, say "BlackBerry."

9-4.7 Help Desk Support

Account Setup, Transfer, Problem Resolution

Contact the IT Corporate Help Desk at 800-USPS-HELP (800-877-7435). When prompted, say "BlackBerry."

Note: For lost or stolen devices, contact the IT Help Desk immediately for assistance in disabling the device. After the device is disabled and it is reasonably determined that it is not recoverable, a replacement device can be obtained through the standard order process described here.

Repair and Replacement Service

Contact the IT Corporate Help Desk. For a hardware problem and/or broken device, the Blackberry may be replaced through warranty. See the process at: http://it-blackberry.

9-4.8 Inventory Tracking

All PDAs must be inventoried and tracked using the national Asset Information Management System (AIMS).

Headquarters Computing Infrastructure Services (HCIS), IT

HCIS is responsible for entering and tracking (in AIMS) those PDAs assigned to Headquarters-domiciled employees.

Area, District, and BMC IT Managers

Area, district, and BMC managers are responsible for entering and tracking PDAs issued to their field employees.

9-4.10 What To Do When a Position or Job Duty Changes

General

Because devices are assigned according to position, job duties, and/or responsibilities, you must do the following when there is a change:

a. When a position is cancelled, return the device to the address below for reissue or inventory surplus as appropriate.

WIRELESS AND PDA NATIONAL PROGRAM OFFICE
475 L'ENFANT PLAZA SW ROOM 2P659
WASHINGTON DC 20260-0651

b. When an employee leaves a position, return the device to the Wireless and PDA National Program Office for configuring and reissue to the new employee for that position.

eAccess Update

All transfers of Blackberry devices from one person to another must be supported by an update to the eAccess system. For contractors, the contracting officer representative (COR) must revoke access account; for postal employees, the PCES manager is responsible for revoking the account.

* * * * *

— Headquarters Computing Infrastructure Services, Information Technology, 9-29-05


HANDBOOK AS-805 REVISION

Information Security

Effective September 29, 2005, Handbook AS-805, Information Security, is revised as follows to address:

• Gaining access to controlled areas.

• Updating the facility business continuance management planning section.

• Registering applications in eAccess.

• Implementing an acceptance of responsibility letter for documented vulnerabilities that will not be mitigated.

• Implementing patch management of information resources.

• Updating Appendix A.

• Updating Appendix B.

We will incorporate these revisions into the next online update of Handbook AS-805 available on the Postal ServiceTM PolicyNet Web site:

• Go to http://blue.usps.gov.

• Under "Essential Links" in the left-hand column, click on References.

• Under "References" in the right-hand column, under "Policies," click on PolicyNet.

• Then click on HBKs.

(The direct URL for the Postal Service PolicyNet Web site is http://blue.usps.gov/cpim.)

Handbook AS-805, Information Security

* * * * *

7 Physical and Environmental Security

* * * * *

7-2 Roles and Responsibilities

* * * * *

7-2.6 All Personnel

All personnel are responsible for the following:

* * * * *

[Reletter current items b through e as new items d through g. Add new items b and c to read as follows:]

b. Always using their physical and technology electromechanical access control identification badge or device to gain entrance to a controlled area.

c. Ensuring no one tailgates into a controlled area on their badge.

* * * * *

7-3 Facility Security

* * * * *

7-3.1 Physical Access Controls

* * * * *

7-3.1.3 Access to Controlled Areas

[Revise 7-3.1.3 to read as follows:]

Access to controlled areas is restricted to personnel whose duties require access to such facilities and who possess appropriate security clearances. Access to controlled areas must be authorized and tailgating is not allowed.

Access to controlled areas must be controlled by electromechanical means. Personnel authorized access to the controlled areas must always use their physical and technology electromechanical access control identification badge or device to gain entrance to the controlled area. It is their responsibility to ensure no one tailgates on their badge.

Personnel without an authorized physical and technology electromechanical access control identification badge or device must be escorted by authorized personnel while in the controlled area.

* * * * *

[Revise the title and text of 7-3.4 to read as follows:]

7-3.4 Facility Business Continuance Management Planning

Physical security requirements must be included in facility business continuance management (BCM) planning to ensure the appropriate protection of information resources following a catastrophic event (see Chapter 12).

* * * * *

8 System, Applications, and Product Development

* * * * *

8-2 Roles and Responsibilities

* * * * *

8-2.6 Portfolio Managers

Portfolio managers are responsible for the following:

* * * * *

[Reletter current items e through g as new items f through h. Add new item e to read as follows:]

e. If a documented vulnerability will not be mitigated, preparing and signing an acceptance of responsibility letter as part of the ISA process.

* * * * *

Exhibit 8.2 System, Application, and Product Development Responsibilities

[Revise Exhibit 8.2 as follows:]

Activity Executive Sponsors Portfolio Managers Project Managers ISSOs ISSRs Certifier1 Accreditor2
Initiate ISA & conduct BIA. X/F C P P P blank blank
Conduct risk assessment. X/F C P P P blank blank
Identify security controls. X/F C P C P blank blank
Develop security plan & develop/acquire security controls. X/F C P C P blank blank
Develop SOPs, service level & trading partner agreements. X/F C P C P blank blank
Develop security test plan. X/F C P C P blank blank
Conduct security testing & document results. X/F C X C P blank blank
Conduct independent reviews as required. X/F C P C P blank blank
Develop ISA package. X/F C P P X blank blank
Review ISA package & write evaluation report. blank blank blank X blank blank blank
Certify application. F blank blank blank blank X blank
Prepare risk mitigation plan and accept responsibility for documented vulnerabilities F X blank C blank blank blank
Accredit application. F blank blank blank blank blank X
Accept risk & approve for deployment. X X C C blank C C
Develop and test ADRP & FR Plan X/F C P C P blank blank
Follow security-related plans, periodically review, test and audit. X/F C P C P blank blank
Reassess risks & upgrade controls, update security-related documents. X/F C P C P blank blank
Re-initiate ISA. X/F C P X P blank X
Retire application. X/F C P C P blank blank
1 Manager, ISA Process.
2 Manager, Corporate Information Security Office (CISO)
X = Responsible for accomplishment
F = Responsible for funding
P = Participant
C = Consulting support as required

Other organizations and managers responsible for system, application, and product development include: chief inspector; inspector general; chief privacy officer; contracting officers and general counsel; and business partners (see Appendix A, Consolidated Roles and Responsibilities, for details).

* * * * *

8-6 Application Information Security Assurance Phases

* * * * *

8-6.1 Phase 1 - Definition

* * * * *

[Add new 8-6.1.5 and 8-6.1.6 to read as follows:]

8-6.1.5 Document High-Level Architecture

A high-level architectural diagram (e.g., hardware, communications, security devices, and interconnected resources) is developed for all applications. The architectural diagram is submitted to the manager, SIS, for review and determination of the impact on the infrastructure and the need for additional security controls for the application (e.g., enclave).

8-6.1.6 Document Information Resources in the Enterprise Information Repository

All applications are documented in the Enterprise Information Repository (EIR).

8-6.2 Phase 2 - Design and Integration

* * * * *

[Delete 8-6.2.1, Document High-Level Architecture, and 8-6.2.2, Document Information Resources in the Enterprise Information Repository.]

* * * * *

[Delete 8-6.2.11, Conduct Vulnerability Scan.]

* * * * *

[Renumber current 8-6.2.3 through 8-6.2.16 as new 8-6.2.1 through 8-6.2.13. Add new 8-6.2.14 to read as follows:]

8-6.2.14 Register Application in eAccess

The application is registered in eAccess which is the Postal Service application for managing the authorization process for personnel needing to access the application and the associated information. Registration is also required for the use of managed accounts (i.e., machine accounts, etc.).

8-6.3 Phase 3 - Testing

* * * * *

[Renumber current 8-6.3.4 through 8-6.3.9 as new 8-6.3.5 through 8-6.3.10. Add new 8-6.3.4 to read as follows:]

8-6.3.4 Conduct Vulnerability Scan

A vulnerability scan is recommended for all information resources and applications, and is required for some information resources and applications (see Handbook AS-805-A, Application Information Security Assurance [ISA] Process).

* * * * *

10 Hardware and Software Security

* * * * *

10-2 Roles and Responsibilities

* * * * *

10-2.8 Database Administrators

Database administrators (DBAs) are responsible for:

* * * * *

[Revise item d to read as follows:]

d. Tracking hardware and software vulnerabilities, and deploying database security patches.

* * * * *

10-4 Configuration and Change Management

* * * * *

[Renumber current 10-4.5 through 10-4.6 as new 10-4.6 through 10-4.7. Add new 10-4.5 to read as follows:]

10-4.5 Patch Management

An effective patch management process must be implemented to investigate, prioritize, test, track, and control the deployment and maintenance of software releases, and to resolve known security vulnerabilities. The patch management process must be addressed by all information resources installed in the Postal Computing Environment. Personnel involved in the patch management process must be trained to ensure a viable vulnerability mediation process.

Patch management involves acquiring, testing, and installing multiple patches (code changes) to software systems, including operating system software, supporting software and packages, firmware, and application software. Patch management tasks include: maintaining current knowledge of available patches; deciding what patches are appropriate for particular information resources; prioritizing the

patches to be installed; testing patches in a nonproduction environment first in order to check for unwanted or unforeseen side effects; developing a backout plan, which includes backing up the systems about to be patched to be sure that it is possible to return to a known-good working configuration should something go wrong with the patch; ensuring that patches are installed properly; testing information resources after installation; and documenting all associated procedures, such as specific configurations required.

Patch management is critical to ensure the integrity and reliability of information resources. Patch management should be capable of:

a. Highly granular patch update and installation administration (i.e., treating patches and mainframes, servers, desktops, and laptops separately).

b. Tracking machines, and updating and enforcing patches centrally.

c. Verifying successful deployment on each machine.

d. Deploying client settings, service packs, patches, hot fixes, and similar items network-wide in a timely manner in order to address immediate threats.

e. Initiating from a central management console.

f. Providing scheduling, desktop management, and standardization tools to reduce the costs associated with distribution and management.

g. Providing ongoing deployment for both new and legacy systems in mixed hardware and OS environments.

h. Automating the repetitive activity associated with rolling out patches.

i. Analyzing the operating system and applications to identify possible security holes.

j. Scanning the entire network (IP address by IP address) and providing information such as service pack level of the machine, missing security patches, key registry entries, weak passwords, users and groups, and more.

k. Analyzing scan results using filters and reports to proactively secure information resources (e.g., installing service packs and hotfixes, etc.).

* * * * *

Appendix A Consolidated Roles and Responsibilities

* * * * *

11 Portfolio Managers

Portfolio managers are responsible for the following:

* * * * *

[Reletter current items e through i as new items f through j. Add new item e to read as follows:]

e. If a documented vulnerability will not be mitigated, preparing and signing an acceptance of responsibility letter as part of the ISA process.

* * * * *

35 Database Administrators

Database administrators are responsible for the following:

* * * * *

[Revise item l to read as follows:]

l. Tracking hardware and software vulnerabilities, and deploying database security patches.

* * * * *

36 All Personnel

* * * * *

[Reletter current items e through s as new items g through u. Add new items e and f to read as follows:]

e. Always using their physical and technology electromechanical access control identification badge or device to gain entrance to a controlled area.

f. Ensuring no one tailgates into a controlled area on their badge.

* * * * *

Appendix B Information Security and Related Documents

[Revise Appendix B to read as follows:]

Administrative Support Manual (ASM)

Subchapter 27, Security

Subchapter 28, Emergency Preparedness

Chapter 8, Information Resources

Handbooks

AS-805, Information Security

AS-805-A, Application Information Security Assurance (ISA) Process

AS-805-B, Infrastructure Information Security Assurance (ISA) Process

AS-805-C, Information Security for General Users

AS-805-D, Information Security Network Connectivity Process

AS-805-G, Information Security for Mail Processing/Mail Handling Equipment

AS-816, Open VMS Security

AS-353, Guide to Privacy and the Freedom of Information Act

Other Related Documents

Enterprise Information Security Architecture

USPS PKI Certificate Policy (CP)

USPS CA Certificate Practice Statement (CPS)

Boilerplate for Contracts and Agreements

Guidelines for New Development of Web-based Applications

Guide to Coding Secure Software

Information Security Code Review Standards

COTS Software Security Evaluation Process

Pub. 805-A, Information Security Assurance (ISA) Process

Pub. 805-E, What Every Employee Needs to Know About Information

Security

PS Form 1357, Request for Computer Access

PS Form 1360, Information Security Incident Report

MOP IT-03-11-2002, Computer Use

* * * * *

— Corporate Information Security,
Information Technology, 9-29-05


HANDBOOK AS-805-A REVISION

Application Information Security Assurance (ISA) Process

Effective September 29, 2005, we are revising Handbook AS-805-A, Application Information Security Assurance (ISA) Process, to address the registering of applications in eAccess and the acceptance of responsibility letter for documented vulnerabilities that will not be mitigated.

We will incorporate these revisions into the next online version of Handbook AS-805-A accessible on the Postal ServiceTM PolicyNet Web site:

• Go to http://blue.usps.gov.

• Under "Essential Links" in the left-hand column, click on References.

• Under "References" in the right-hand column, under "Policies," click on PolicyNet.

• Then click on HBKs.

(The direct URL for the Postal Service PolicyNet Web site is http://blue.usps.gov/cpim.)

Handbook AS-805-A, Application Information Security Assurance (ISA) Process

* * * * *

2 Roles and Responsibilities

* * * * *

2-6 Portfolio Managers

Portfolio managers are responsible for the following:

* * * * *

[Reletter current e as new h. Add new items e, f, and g to read as follows:]

e. Preparing and signing an acceptance of responsibility letter, if a documented vulnerability will not be mitigated.

f. Ensuring that the application is registered in eAccess.

g. Accepting all risks, liabilities, and responsibilities and assuming personal accountability for any damage to the Postal Service (including direct financial losses and any costs resulting from remedial actions in operating the application) for authorizing an application to enter the production environment prior to completing the application ISA process.

* * * * *

4 The ISA Process

* * * * *

4-1 Phase 1 - Definition

* * * * *

4-1.5 Next Steps

* * * * *

[Swap sections 4-1.5.2 and 4-1.5.3 as follows: 4-1.5.2, Applications Designated as Legacy and 4-1.5.3, All Other Applications.]

* * * * *

4-2 Phase 2 - Design and Integration

* * * * *

4-2.4 Activities

* * * * *

[Renumber current 4-2.4.9 through 4-2.4.10 as new 4-2.4.12 through 4-2.4.13. Add new 4-2.4.9 through 4-2.4.11 to read as follows:]

4-2.4.9 Incorporate Security Requirements in Service Level Agreements and Trading Partner Agreements

Service level agreements (SLAs) are developed for all applications. Trading partner agreements (TPAs) are developed for all externally managed and/or developed applications. Information security requirements are addressed in all SLAs and TPAs.

4-2.4.10 Develop Operational Security Training

Appropriate materials are developed for training users, system administrators, managers, and other personnel on the correct use of the application and its security controls.

4-2.4.11 Register Application in eAccess

The application is registered in eAccess, which is the Postal Service's application for managing the authorization process for personnel needing to access an application and the associated information. Registration is also required for the use of managed accounts (i.e., machine accounts, etc.).

4-3 Phase 3 - Testing

* * * * *

[Delete section 4-3.4.5, Harden Platform.]

* * * * *

4-4 Phase 4 - Evaluation

* * * * *

4-4.3 Roles and Responsibilities

[Change the Portfolio manager and Accreditor (manager, CISO) roles and responsibilities to read as follows:]

Portfolio manager Analyzes ISA and business documentation, makes the decision to escalate security concerns or prepares a risk mitigation plan addressing high and medium risks and recommending whether the risks should be accepted, transferred, or further mitigated. If a documented vulnerability will not be mitigated, prepares and signs an acceptance of responsibility letter and forwards it (the risk mitigation plan and ISA documentation package) to the accreditor.
Accreditor (manager, CISO) Analyzes ISA and business documentation, makes the decision to escalate security concerns, or prepares and signs an accreditation letter. Forwards the accreditation letter and ISA documentation package to the executive sponsor and portfolio manager.

* * * * *

4-4.4 Activities

* * * * *

[Revise title and text of 4-4.4.5 to read as follows:]

4-4.4.5 Escalate Security Concerns or Prepare Risk Mitigation Plan and Acceptance of Responsibility Letter (if Required)

The portfolio manager reviews the certification letter, the supporting ISA, and the business documentation, and escalates security concerns or prepares a risk mitigation plan for any residual risks rated as medium or high. The portfolio manager then recommends whether the risks should be accepted, transferred, or further mitigated. If a documented vulnerability will not be mitigated, the portfolio manager prepares and signs an acceptance of responsibility letter and then forwards it, the risk mitigation plan, and ISA documentation package to the accreditor.

* * * * *

Exhibit 4a ISA Templates

[Add a row to Exhibit 4a after the Risk Mitigation Plan row to read as follows:]

Template Name Applicability Purpose
Acceptance of Responsibility for Documented Vulnerability Letter For a documented vulnerability that will not be mitigated. For the portfolio manager to accept responsibility for a documented vulnerability that will not be mitigated.

Exhibit 2

Relationship of ISA Roles

[Revise Exhibit 2 as follows:]

Relationship of ISA Roles-flowchart

Exhibit 4-4

Phase 4, Evaluation

[Revise Exhibit 4-4 as follows:]

image of exhibit 4-4, phase 4, evaluation

* * * * *

 

Exhibit 4b

Information Security Assurance Requirements for Applications

[Add a row to Exhibit 4b after the Risk Mitigation Plan row to read as follows:]

ISA Phase ISA Deliverable New Applications Legacy* Small Applications Field Application
Nonsensitive & Noncritical Business Controlled Sensitive & Critical
Deliver- ables Respon- sible Deliver- ables Respon- sible Deliver- ables Respon- sible Deliver- ables Respon- sible Deliver- ables Respon- sible Deliver- ables Respon- sible
4 Acceptance of Responsibility for a Documented Vulnerability Letter blank blank YES for documented vulnerability that will not be mitigated Portfolio Mgr YES for documented vulnerability that will not be mitigated Portfolio Mgr blank blank YES for documented vulnerability that will not be mitigated Portfolio Mgr blank blank

* * * * *

Corporate Information Security, Information Technology, 9-29-05