SCIF Design Best Practices / Lessons Learned Presentation to: September 19, 2016.

Slides:



Advertisements
Similar presentations
Barhale Procedure for Site Establishment
Advertisements

Sensitive Compartmented Information Facilities (SCIF)
Unclassified//FOUO Unclassified//FOUO.
Sensitive Compartmented Information (SCI) Policy Office
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
UNIT PHYSICAL SECURITY PLAN
Department of the Navy Information Security Program
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
SAE AS9100 Quality Systems - Aerospace Model for Quality Assurance
“Who’s In Charge?” “THE COMMAND SECTION”. The Incident/Unified Commander Incident/Unified Commander(s) provides direction and guidance through:  Key.
1 For System Administrators INFORMATION INFORMATION SYSTEM SECURITY INFORMATION INFORMATION SYSTEM SECURITY.
© BT PLC 2005 ‘Risk-based’ Approach to Managing Infrastructure a ‘Commercial Prospective’ Malcolm Page BT UK AFCEA Lisbon 2005.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Information Systems Security Officer
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
1 Performance Management Presentation Access Control Team Members: Major Billy Alford, Team Leader Bill Brosius, Alex Salah, Cassandra Harris ORS National.
Complying With The Federal Information Security Act (FISMA)
Services Tailored Around You® Business Contingency Planning Overview July 2013.
Information Asset Classification
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
1 Preparing a System Security Plan. 2 Overview Define a Security Plan Pitfalls to avoid Required Documents Contents of the SSP The profile Certification.
Old Policy – which no one ever seem to have heard of.
Server Virtualization: Navy Network Operations Centers
Information Systems Security Computer System Life Cycle Security.
Commissioning of Fire Protection and Life Safety Systems Presented by: Charles Kilfoil Bechtel National Waste Treatment Plant Richland WA.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Operations Security (OPSEC) Introduction  Standard  Application  Objectives  Regulations and Guidance  OPSEC Definition  Indicators.
NIST Special Publication Revision 1
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
COMPETITION REQUIREMENTS
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
Dispensary and Administration Site Information Presentation.
Unit 18: CADD in Construction Lesson Objective Be able to explain the use of Building Information Modelling in buildings.
Information Security IBK3IBV01 College 2 Paul J. Cornelisse.
RECOMMENDATIONS OF THE GOVERNOR ’ S TASK FORCE ON CONTRACTING AND PROCUREMENT REVIEW Report Overview PD Customer Forum September 2002.
TOTAL QUALITY MANAGEMENT
U.S. Army Corps of Engineers (USACE) AEC Utility Monitoring And Control Systems and Electronic Security Systems (UMCS)(ESS) Prepared for: Energy Huntsville.
Risk Identification and Risk Assessment
Erman Taşkın. Information security aspects of business continuity management Objective: To counteract interruptions to business activities and to protect.
MARINE CORPS INSTALLATIONS EAST CONTRACTING DIVISION DEFINING REQUIREMENTS.
Gdansk International Air & Space Law Conference November 2013 Authority and Organisation Requirements “effective management systems for authorities and.
M O N T E N E G R O Negotiating Team for the Accession of Montenegro to the European Union Working Group for Chapter 31 - Foreign, security and defence.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Overview of FESHCom Subcommittees Don Cossairt, Radiation Protection Manager, ESH&Q Section October 1, 2013.
Security Architecture and Design Chapter 4 Part 4 Pages 377 to 416.
Pipeline Safety Management Systems
Information Security Policy
Software Project Configuration Management
Chapter 4 – Requirements Engineering
Chapter 5 – Requirements Engineering
Peggy M. Jackson, DPA, CPCU Peg Jackson & Associates
ISO 9001:2015 Auditor / Registration Decision Lessons Learned
Derivative Classification Overview
Standards and Certification Training
Meet your facilitators
NRC Cyber Security Regulatory Overview
UNDERSTANDING FOR STANDARD
Operationalizing Export Certification and Regionalization Programmes
MODULE B - PROCESS SUBMODULES B1. Organizational Structure
Intelligence Oversight U.S. Army Inspector General School 1
Continuity of Operations Planning
HQ Expectations of DOE Site IRBs
DOE Review of the LCLS Project October 2006
Time Scheduling and Project management
Presentation transcript:

SCIF Design Best Practices / Lessons Learned Presentation to: September 19, 2016

Purpose of the Presentation Overview of what a SCIF is & what comprises a SCIF Governing criteria for a SCIF Review of SCIF Stakeholders Best Practices / Lessons Learned in executing a SCIF project

What is a SCIF? Sensitive Compartmented Information Facility Facility which handles Confidential, Secret, Top Secret information Facility must be accredited in order to handle, process, discuss or store Sensitive Compartmented Information (SCI) Provides for operational capabilities that are critical to the supported command’s mission

What is a SCIF? Even though SCIF ultimately is a building (or area within a building) in which sensitive information is handled, the development of a SCIF is a process which requires collaboration between many stakeholders At the conclusion of construction, an accreditation process occurs which classifies the facility as one in which sensitive information can be handled The execution goal is for there to be “No surprises” when the accreditation process takes place.

Pop Quiz! Question: Why is it important that there not be surprises at the end construction?

Pop Quiz! Question: Why is it important that there not be surprises at the end construction? Answer: Because if the accreditation isn’t obtained, then the facility may not be able to be operated as a SCIF, thereby not fulfilling mission requirements.

Relevant Criteria for SCIF UFC’s UFC & 02: DoD Minimum Antiterrorism Standards/Standoff Distances for Buildings UFC : Sensitive Compartmented Information Facilities Planning, Design and Construction Other Governing Criteria ICD/ICS 705: Technical Specifications for Construction and Management of SCIF JAFAN Manual 6/9: Joint Air Force Army Navy Manual for Physical Security Standards for Special Access Program Facilities (SAPF) DCID 6/9: Director of Central Intelligence Directive 6/9 was superseded by ICD/ICS 705 Other DoD Criteria Exists

SCIF Classifications Secure Working Area (SWA) An area where SCI is handled, discussed and/or processed, but not stored Temporary Secure Working Area (TSWA) Secure working area which is used less than 40 hours/month and the accreditation is limited to 12 months or less Temporary SCIF SCIF established for a limited time to meet tactical, emergency or immediate operational requirements

SCIF Classifications (cont’d) Closed Storage SCIF where SCI material is stored in GSA approved storage containers when not in use. This includes documents, computer hard drives and storage media Open Storage SCIF in which SCI may be openly stored or processed Continuous Operation SCIF which is staffed and operated 24/7

SCIF Stakeholders Accrediting Official (AO) Person designated by the Cognizant Security Authority (CSA) who is responsible for all aspects of SCIF management and operations to include security policy implementation and oversight. Site Security Manager (SSM) Person designated by the AO who is responsible for all aspects of SCIF management and operations to include security policy implementation and oversight. Certified TEMPEST Technical Authority (CTTA) US Government appointed employee who has met established certification requirements in regard to TEMPEST

SCIF Stakeholders (cont’d) Mission Users Persons who will work, operate, handle SCI in the facility once the facility becomes operational Architect – Engineer Design of SCIF shall be performed by US Companies utilizing US Citizens or US Persons A-E’s with past experience in SCIF planning and design provides a big benefit to the Government Construction Contractor Construction of SCIF shall be performed by US Companies utilizing US Citizens or US Persons Construction teams with past experience in SCIF construction techniques also provides a benefit to the Government

Purpose of a SCIF To mitigate against a forced entry, covert entry, visual surveillance, acoustic eavesdropping and electronic emanations which could compromise the operation held within the SCIF. Therefore, security requirements to protect against these actions need to be identified and implemented in order to have an accredited SCIF. Security can be a combination of building features or operational procedures.

Elements of a SCIF Security in Depth (SID) Multiple layers of physical security measures, such as: Site features such as a controlled perimeter (fence) Access Control Point (secured gates) Building perimeter SCIF Perimeter (either part of the building perimeter or within the building)

Elements of a SCIF Risk Assessment & Management AO, SSM, Supported Command (Mission), CTTA, Communications, Security Forces, amongst others must determine the minimum or enhanced security requirements based upon the SCIF classification

Elements of a SCIF (cont’d) Physical SCIF Perimeter Wall, floor, ceiling/roof construction Sound transmission coefficient (STC) Rating of 45 or 50 RF Shielding Door and door hardware Vault – concrete or steel construction Penetrations of the SCIF Perimeter Limited number of locations for perimeter penetrations Utilities such as mechanical, electrical, communications, etc. require special details Inspection of perimeter penetrations

SCIF within a SCIF (Compartmented Areas) Clarify if adjacent missions require enhanced security Access Control Systems (ACS) Intrusion Detection Systems (IDS) Communications Systems Comm Data (LAN/WAN) TEMPEST Countermeasures Fire Alarm / Mass Notification Systems HVAC DDC System Communication Protocols Elements of a SCIF (cont’d)

Best Practices / Lessons Learned Design Charrettes – dedicated discussions between the A-E’s design team and Gov’t security personnel on all aspects of the desired security requirements AO and SSM need to be identified for the project AO, SSM and other security stakeholders need to be available to the design team to answer questions throughout the life of the project Devil is in the Details – review of construction details and specifications by the AO and SSM to ensure security requirements have been satisfied

Best Practices / Lessons Learned Communication and understanding of needs is the biggest “lessons learned” that we’ve experienced

Best Practices / Lessons Learned Separation requirements for Compartmented Areas What STC ratings are required? Do penetrations require unique security measures? Can utilities cross one CA to serve another CA? Single Point of Penetration in SCIF Perimeter Determine interpretation of this ICD/ICS 705 requirement Alternative means to allow inspection of penetrations Access Control System (ACS) Identify zones for Compartmented Areas Secured vestibule (man trap) Types of acceptable door hardware, security system, etc. Is a sole source for a particular vendor necessary to tie into existing systems?

Best Practices / Lessons Learned Ceiling Inspection Panels

Best Practices / Lessons Learned Intrusion Detection System Partial design with delegated design responsibility to contractor and manufacturer Construction Documentation Include ICD/ICS 705 or JAFAN 6/9 Manual as part of the Division 01 Specs Highlight specific contractor responsibilities such as: Construction photographs as documentation Manner in which to phase/tie-in to existing systems Inspections prior to concealing construction Greater importance to phasing needs, tie-ins, existing system operability, SCIF functionality during construction A detailed Construction Security Plan (CSP) becomes even more critical for a renovation project.

Best Practices / Lessons Learned Justification & Authorizations (J & A’s) Avoid change orders for sole source situations Examples are for ACS, IDS, Door Hardware Consider Procurement Method Qualified Design-Build Team Traditional Design-Bid-Build Avoid contractors who may not have depth of experience or sophistication to execute a SCIF project Construction Phase Services For large SCIF projects, consider oversight required during construction Full time Resident Engineer/Architect

Best Practices / Lessons Learned AO, SSM, CTTA and Users (Mission) need to collaborate in order to develop the Construction Security Plan (CSP) Starts with well developed understanding of security measures required or contemplated Chapter 2 of UFC has well developed checklist for planning a SCIF project and the required project documentation. For example, What is the SCIF Classification? Are there multiple SCIF’s (Compartmented Areas) needed within a particular building? Has the required security been included in the project budget?

Summary Successful SCIF project execution requires active involvement by project stakeholders who have a vested interest in the security of the facility Classification and development of the required security measures identified by the Government Charrette or other design meetings to collaborate on project security requirements Active review of design documents to ensure needs are met Sufficient oversight during construction to ensure details are constructed in accordance with the design “No Surprises” should be the desired goal when it’s time to obtain the SCIF accreditation

SCIF Facility Design Best Practices / Lessons Learned Thank you for your attention! George Fragulis PE, BEMP, CEM, PMP, LEED AP