Link to contents


Information Technology


HANDBOOK AS-805 REVISION

Information Security

Handbook AS-805, Information Security, is revised as follows to:

• Update ISSO-related roles and responsibilities in Chapter 3, Information Designation and Control.

• Clarify the sources of mandatory requirements and discretionary information security requirements.

• Address FIPS Pub 200, Minimum Security Requirements for Federal Information and Information Systems, and applicable industry standards.

• Address application software maintenance.

• Address regular compliance testing of security systems and processes.

• Update Appendix A, Consolidated Roles and Responsibilities.

• Update Appendix B, Information Security and Related Documents.

Handbook AS-805, Information Security

* * * * *

3 Information Designation and Control

* * * * *

3-2 Roles and Responsibilities

* * * * *

3-2.5 Information Systems Security Officers

[Revise 3-2.5 to read as follows:]

Information systems security officers (ISSOs) are responsible for the following:

a. Ensuring a business impact assessment (BIA) is completed for each application system and an infrastructure impact assessment (IIA) is completed for each infrastructure component.

b. Advising and consulting with executive sponsors and portfolio managers during the BIA and IIA processes so they know about (1) security requirements for information resources and (2) mandatory security requirements for information resources when the resources are designated sensitive or critical.

c. Specifying additional mandatory security requirements based on federal legislation (e.g., Children's Online Privacy Protection Act [COPPA]), federal regulation (e.g., requirements for cryptographic modules), federal directive (e.g., land Security Presidential Directive [HSPD] 12, personal identity verification), industry requirement (e.g., payment card industry standards, requirements, and guidelines), the operating environment (e.g., hosted in the de-militarized zone [DMZ]), and the risks associated with the information resource.

d. Recommending discretionary security requirements based on generally accepted industry practices to executive sponsors and portfolio managers during the BIA and IIA processes.

* * * * *

3-4 Security Requirements

* * * * *

3-4.4 Mandatory Security Requirements

[Revise 3-4.4 to read as follows:]

Additional security will be needed to adequately protect sensitive, critical, and business-controlled information resources. Mandatory requirements are based on the following:

a. How sensitive or critical the information resource is (determined during the BIA).

b. Federal legislation (e.g., Health Insurance Portability and Accountability Act, Gramm-Leach-Bliley Act, COPPA).

c. Federal regulations (e.g., requirements for cryptographic modules).

d. Federal directives (e.g., personal identity verification, critical infrastructure).

e. Industry requirements (e.g., payment card industry).

f. Operating environment (e.g., application is hosted in the DMZ, changes in technology, changes in the Postal Service mission).

g. Risks determined during the risk assessment process.

h. Vulnerabilities discovered at any time during the information resource lifecycle.

If any of these additional mandatory requirements conflict with the requirements included in Handbook AS-805, the most restrictive or protective requirement applies.

3-4.5 Discretionary Security Requirements

[Revise 3-4.5 to read as follows:]

ISSOs may recommend additional discretionary security requirements during the BIA and IIA processes to better protect sensitive, critical, and business-controlled information resources. Discretionary security requirements based on generally accepted industry practices are recommended. The executive sponsor assumes the risks associated with not implementing the recommended discretionary security requirements.

3-5 Handling Information and Media

* * * * *

[Renumber current 3-5.2 through 3-5.6.3 as new 3-5.3 through 3-5.7.3. Inset new 3-5.2 to read as follows:]

3-5.2 Controlling Access to Information

Sensitive and business-controlled sensitive information must be protected from unauthorized access and disclosure. Access must be restricted to authorized personnel with a need to know. Metadata must also be protected from unauthorized access and disclosure.

Critical and business-controlled critical information must be protected from unauthorized access and destruction.

* * * * *

3-5.4 Storage of Information

[Revise text of 3-5.4 to read as follows:]

Postal Service information must not be stored on non- Postal Service-owned devices. Postal Service information not available to the public must not be commingled with information that does not belong to the Postal Service.

* * * * *

3-5.5 Encryption of Information

* * * * *

3-5.5.2 Encryption of Information on Removable Devices or Media and in Offsite Storage

[Revise the first sentence of 3-5.5.2 to read as follows:]

Sensitive and business-controlled sensitive information stored or archived on removable devices or media including disks, diskettes, CDs, and USB storage devices must be encrypted.

* * * * *

3-5.6 Removal of Postal Service Information From Postal Service Premises

* * * * *

[Reletter current items b through f as new items c through g. Insert new item b to read as follows:]

b. Only authorized personnel are allowed to pick up, receive, transfer, or deliver Postal Service sensitive and business-controlled sensitive information.

* * * * *

[Renumber current 3-5.8 through 3-5.9.2 as new 3-6 through 3-7.2.]

* * * * *

5 Acceptable Use

* * * * *

5-6 Electronic Mail and Messaging

[Revise 5-6 to read as follows:]

Access to the Postal Service electronic mail (e-mail) system is provided to personnel whose duties require e-mail to conduct Postal Service business. Only Postal Service- provided e-mail services may be accessed from Postal Service information resources. Since e-mail may be monitored, anyone using Postal Service resources to transmit or receive e-mail should not expect privacy.

If you do not comply with the Postal Service e-mail policies defined in this section, your e-mail account may be suspended and you will have to request that your manager apply to the CIO/VP IT for re-instatement of the lost privileges.

Only authorized personnel who need to know may receive restricted information.

* * * * *

6 Personnel Security

* * * * *

6-6 Information Security Awareness and Training

6-6.1 General Security Awareness

[Add a sentence at the end of 6-6.1 to read as follows:]

***The training should explain how anyone failing to comply with security policies and procedures will be disciplined.

* * * * *

6-6.3 Information Resource Operational Security Training

[Add a sentence at the end of 6-6.3 to read as follows:]

***The training should explain how to protect application information throughout the lifecycle.

* * * * *

8 System, Applications, and Product Development

* * * * *

8-3 General Development Concepts

[Add a paragraph to read as follows:]

The following requirements apply to all sensitive, critical, and business-controlled applications:

a. Developers must not have access to production application systems software.

b. Developers' access to production information must be authorized in writing by executive sponsors.

c. Access to production information, if approved, must be temporary.

d. Production data must not be copied.

e. Audit logging must be turned on.

f. Keystroke logging must be implemented.

* * * * *

[Revise the title of 8-3.6 and add two sentences at the end to read as follows:]

8-3.6 Development and Test Environment Restrictions

***These restrictions apply to modules and to applications. Separate approvals are required for each module.

* * * * *

[Revise the title and text of 8-3.6.1 to read as follows:]

8-3.6.1 Separation of Development/Test and Production Environments

Hardware and software must be developed and tested in a test environment - not in a production environment.

* * * * *

8-6 Application Information Security Assurance Phases

* * * * *

8-6.1 Phase 1 - Definition

* * * * *

8-6.1.4 Define Security Requirements

[Revise 8-6.1.4 to read as follows:]

Security requirements are defined for all applications so the applications can be secured commensurate with the risk. Security requirements include the baseline security requirements for all applications and additional mandatory security requirements based upon how sensitive or critical the applications are (as defined by the ISA process); federal legislation, regulation, and directives; industry requirements; operating environment; and risks associated with the information resource. (See Handbook AS-805, Information Security, Chapter 3, Information Designation and Control, 3-4.4, Mandatory Security Requirements, for examples.) As an example, payment card applications must comply with the payment card industry (PCI) requirements. In addition, the ISSO may recommend additional discretionary security requirements based on generally accepted industry practices that the executive sponsor may agree to implement.

* * * * *

8-6.5 Phase 5 - Production

* * * * *

[Renumber current 8-6.5.1 through 8-6.5.7.2 as new 8-6.5.2 through 8-6.5.8.2. Insert new 8-6.5.1 to read as follows:]

8-6.5.1 Application Maintenance

Applications must be maintained in a timely manner. The tools, techniques, and mechanisms used to maintain application systems must be properly controlled.

* * * * *

9 Information Security Services

* * * * *

9-7 Authentication

* * * * *

9-7.1 Passwords

* * * * *

9-7.1.1 Password Selection Requirements

* * * * *

[Change item b from "six characters" to "eight characters".]

* * * * *

[Add item d to read as follows:]

d. Passwords must not be repeated (reused) for at least 5 generations.

* * * * *

9-7.1.6 Password Expiration

[Change item c from "180 days" to "90 days."]

* * * * *

9-7.5 Smart Cards and Tokens

[Add a sentence to the end of 9-7.5 to read as follows:]

***Protect smart cards and tokens from theft and do not allow others to use them.

* * * * *

9-8 Confidentiality

* * * * *

9-8.4 Key Management

* * * * *

9-8.4.2 Recommended Practices

* * * * *

[Revise the lettered list in 9-8.4.2 to read as follows:]

a. Generate strong keys.

b. Use split knowledge keys and establish dual control of keys.

c. Implement secure key distribution and storage.

d. Periodically change keys. Key management should be fully automated and not require manual steps.

e. Replace known or suspected compromised keys.

f. Revoke old or invalid keys.

g. Destroy old keys.

h. Generate and store all keys in hardware.

i. Never remove keys from the hardware and never store them in the host's memory.

j. Gain access to the hardware only through a trusted path.

k. Make sure key custodians sign a form stating they understand and accept their key-custodian responsibilities.

* * * * *

9-12 Audit Logging

* * * * *

9-12.2 Audit Log Events

* * * * *

[Revise item c to read as follows.]

c. Action of individuals with root or elevated privileges (e.g., system and database administrators).

* * * * *

[Reletter current item i as new item j. Add a new item i to read as follows:]

i. Access to audit logs.

* * * * *

[Renumber current 9-12.4 through 9-12.5 as new 9-12.5 through 9-12.6. Add a new 9-12.4 to read as follows:]

9-12.4 Audit Log Protection

Secure audit logs so they cannot be altered, by:

a. Limiting the viewing of logs to those with job-related need.

b. Protecting audit log files from unauthorized modifications.

c. Promptly backing-up audit log files to a centralized server or media that is difficult to alter.

d. Using file integrity monitoring and change detection software on logs to ensure existing log data cannot be changed without generating alerts.

* * * * *

10 Hardware and Software Security

* * * * *

10-3 General Guidelines for Hardware and Software

* * * * *

[Revise title and first sentence of 10-3.4 to read as follows:]

10-3.4 Maintaining Inventory

All personnel are responsible for maintaining an accurate inventory of Postal Service information resources assigned to them including hardware, software, firmware, and documentation.***

* * * * *

10-5 Hardware Security

* * * * *

10-5.3 Servers

[Revise the third sentence of 10-5.3 to read as follows:]

***Implement only one primary function per server or blade (e.g., Web server, database server, and domain name server [DNS] should be implemented on separate servers).***

* * * * *

[Revise the title of 10-5.4 and add two sentences to the end to read as follows:]

10-5.4 Hardening Servers

***Disable unnecessary services and protocols. Remove unnecessary functions such as scripts, drivers, features, subsystems, and file systems.

* * * * *

10-6 Software and Applications Security

* * * * *

10-6.6 Database Management Systems

* * * * *

10-6.6.1 DBMS Activity Logs

[In the last sentence of 10-6.6.1 change "Continuance" to "Continuity."]

* * * * *

10-7 Protection Against Viruses and Malicious Code

[Revise the second sentence of 10-7 to read as follows:]

***Malicious code includes harmful and other unwanted code such as viruses (boot sector, file infector, multipartite, link, stealth, macro, e-mail, blended), worms, keystroke loggers, botnets, Trojans, trap doors, time bombs, activity trackers, remote control agents, snoopware, spyware, and adware.

* * * * *

11 Networks and Communications

* * * * *

11-7 Protecting the Network/Internet Perimeter

* * * * *

11-7.2 Implementing Firewalls

* * * * *

11-7.2.1 Firewall Configurations

[Revise 11-7.2.1 to read as follows:]

Postal Service firewalls must be configured to:

a. Deny all services not expressly permitted (i.e., deny all inbound and outbound traffic not specifically allowed).

b. Restrict inbound Internet traffic to Internet Protocol (IP) address with the DMZ (ingress filters).

c. Prevent internal addresses from going from the Internet into the DMZ.

d. Implement dynamic packet filtering (i.e., only allow "established" connections into the network).

e. Secure and synchronize router configuration files (i.e., running configuration files and start-up configuration files used to re-boot machines must have the same secure configuration).

f. Audit and monitor all services, including those not permitted, to detect intrusions or misuse.

g. Notify the firewall administrator and system administrator in near real time of any item that may need immediate attention.

h. Run on a dedicated computer.

i. Stop passing packets if the logging function becomes disabled.

j. Disable or delete all nonessential firewall-related software, such as compilers, editors, and communications software.

* * * * *

11-12 Remote Access

[Add an introductory paragraph to 11-12 to read as follows:]

Use eAccess to ask your manager for permission to use a workstation or laptop remotely to access the Postal Service Intranet. Protect the remote workstation or laptop so unauthorized personnel cannot gain access to the Intranet. Do not use personal information resources to connect to the Postal Service Intranet.

* * * * *

11-12.6 Remote Management and Maintenance

[Add a new sentence to the beginning of 11-12.6 to read as follows:]

If you are not at your own workstation, your access must be encrypted.***

* * * * *

14 Compliance and Monitoring

* * * * *

14-3 Compliance

* * * * *

[Reletter current items a through d as new items b through e. Add new item a to read as follows:]

a. Regular testing of security systems and processes.

* * * * *

[Renumber current 14-4 through 14-7 as new 14-5 through 14-8. Add a new 14-4 to read as follows:]

14-4 Testing Security Systems and Processes

Systems, processes, and custom software must be tested regularly because hackers and others continually discover vulnerabilities, introduced in new software and inadvertently by employees, contractors, and business partners. Test as follows:

a. Continuously:

• Monitor all network traffic and alert personnel to suspected compromises using network intrusion detection systems, host-based intrusion detection systems, and intrusion prevention systems.

b. Weekly:

• Use file integrity monitoring software to alert personnel when files have been modified without authorization. Configure software so it can compare files.

c. Quarterly:

• Use a wireless analyzer to identify all wireless devices in use.

• Scan for vulnerabilities in internal and external networks (or when system components have been added, network topology has changed, firewall rules have been modified, or products have been updated).

d. Annually:

• Test security controls, limitations, network connections, and restrictions so you know you can identify and stop any attempts at unauthorized access.

• Test for network-layer penetration (or when infrastructure has been upgraded or modified, i.e. the operating system has been upgraded or a sub- network or Web server has been added).

Test for application-layer penetration (or when an application has been modified).

* * * * *

Appendix A Consolidated Roles and Responsibilities

* * * * *

[Revise the title and text of 33 to read as follows:]

33. Information Systems Security Officers

Information systems security officers (ISSOs) are responsible for the following:

a. Chairing the ISA team.

b. Ensuring that a risk analysis and business impact assessment (BIA) are completed for each application system.

c. Ensuring that a risk analysis and infrastructure impact assessment (IIA) are completed for each infrastructure component.

d. Ensuring that the responsible program manager records the sensitivity and criticality designations in the Enterprise Information Repository (EIR).

e. Advising and consulting with executive sponsors and portfolio managers during the BIA and IIA processes so they know about (1) security requirements for information resources and (2) mandatory security requirements for information resources when the resources are designated sensitive or critical.

f. Specifying additional mandatory security requirements based on federal legislation (e.g., HIPAA), federal regulation (e.g., requirements for cryptographic modules), federal directive (e.g., personal identity verification), industry requirement (e.g., payment card industry), the operating environment (e.g., hosted in the DMZ), and the risks associated with the information resource.

g. Recommending discretionary security requirements to executive sponsors and portfolio managers during the BIA and IIA processes, based on generally accepted industry practices.

h. Providing guidance on how information resources are vulnerable to threats, what countermeasures are appropriate, and the ISA process.

i. Conducting site security reviews or helping the Inspection Service conduct them.

j. Reviewing the ISA documentation package.

k. Preparing the ISA evaluation report.

* * * * *

[Replace Appendix B with the following:]

Appendix B Related Information Security Documents

Administrative Support Manual (ASM)

Subchapter 27, Security

Subchapter 28, Emergency Preparedness

Chapter 8, Information Resources

Handbooks

AS-805-C, Information Security for General Users

AS-816, Open VMS Security

AS-353, Guide to Privacy and the Freedom of Information Act

Management Instructions

AS-841-2004-11, Integrated Solutions Methodology/System Development Life Cycle

AS-850-2002-10, Information Technology Change and Configuration Management

AS-860-2003-2, Data Stewardship: Data Sharing Roles and Responsibilities

AS-870-2005-2, Electronic Messaging (e-mail)

EL-660-2004-3, Limited Personal Use of Government Office Equipment Including Information Technology

Other Related Documents

Enterprise Information Security Architecture

USPS Public Key Infrastructure (PKI) X.509 Certificate Policy (CP)

USPS Root Certificate Authority (CA) Certificate Practice Statement (CPS)

USPS Intermediate Certificate Authority (CA) Certificate Practice Statement (CPS)

USPS Subordinate Certificate Authority (CA) Certificate Practice Statement (CPS)

Boilerplate for Contracts and Agreements

Guidelines for New Development of Web-based Applications

Guide to Coding Secure Software

Information Security Code Review Standards

COTS Software Security Evaluation Process

Pub 805-A, Information Security Assurance (ISA)

Pub 805-B, Information Security (bookmark)

Pub 805-E, What Every Employee Needs to Know About Information Security

PS Form 1357, Request for Computer Access

PS Form 1360, Information Security Incident Report

* * * * *

We will incorporate these revisions into the next online update of Handbook AS-805 available on the PolicyNet Web site:

• Go to http://blue.usps.gov.

• Under "Essential Links" in the left-hand column, click on References.

• Under "References" in the right-hand column, under "Policies," click on PolicyNet.

• Then click on HBKs.

(The direct URL for the Postal Service PolicyNet Web site is http://blue.usps.gov/cpim.)

— Corporate Information Security,
Information Technology, 11-23-06