





Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
This Intelligence Community Standard sets forth the physical and technical security standards that apply to all sensitive compartmented information facilities ( ...
Typology: Lecture notes
1 / 9
This page cannot be seen from the preview
Don't miss anything!
A. AUTHORITY: The National Security Act of 1947, as amended; Executive Order 12333, as amended; Executive Order 13526; Intelligence Community Directive (leD) 705, Sensitive Compartmented Information Facilities; and other app li cable provisions of law.
B_ PURPOSE I. This Intelligence Community Standard sets forth the physical and technical security
existing and new construction, and renovation of SerFs for reciprocal use by all Intelligence Community (Ie) elements and to enalble information sharing to the greatest extent possible.
in consultation with IC elements, develop and establish technical specifications to implement SClF standards that include descriptions of best practices. The ADDNIISEC shall, in consultation with Ie elements, review and update the Technical Specifications/or Construction and Management a/Sensitive Compartme nted Information Facilities (hereinafter "Ie Tech Spec ") on an ongoing basis.
c. ApPLICABILITY
the President, or designated jointly by the Director of National Intelligence and the head of the
most recent accreditation or re-accreditation.
D. RECIPROCAL USE
E. RISK MANAGEMENT
F. SelF PLANNING AND DESIGN
trained, and assigned to a project for the purpose of ensuring the security integrity of a site, building, and/or material/items) may be required when the threat warrants as dctcnnined by the AO. See additional guidance in the Ie Tech Spec for overseas SeIFs built within facilities under COM authority.
guidance in the Ie Tech Spec for ove:rseas SerFs built within fac ilities under COM authority.
c. SCI indoctrinated escorts may not be required when a barrier has been constructed to
f. Access control to the construction site is required and shall be addressed in the CSP.
G. PHYSICAL AND TECHNICAL SECURITY STANDARDS
I. Physical Security for SCIFs a. Perimeter (1) The perimeter of the SCIF includes a ll perimeter walls, windows and doors as well as the ceiling and floor.
(2) The perimeter of the SCIF sha ll provide a physical barrier to forced, covert and surreptitious entry.
(3) Walls, floor and ceiling shall be permanently and solidly constructed and attached to each other. Raised floors and false: ceilings shall not be used to anchor wall support materials. All construction, to include above the: false ceiling and below a raised floor, shall be constructed to provide visual evidence of unauthorized penetration.
(4) When RF shielding is required by Certified TEMPEST Technical Authority (CIT A) evaluation, it should be planned for installation during initial construction as costs are significantly higher to retrofit after construction is complete.
(5) SCIFs that require disl;:ussions of SCI shall provide acoustic protection to prevent conversations from being inadvertently overheard outside ofthe SClF.
(6) Details for the construction of the perimeter to meet standards shall be provided within the Ie Tech Spec for SCIFs.
b. Access Control Systems (1) Access to SerFs is restricted to authorized personnel. Access control methods shall be approved by the AO.
(2) Access control methods may include anyone of the following but are not approved for securing SelF entrances when the SelF is unoccupied:
(a) Automated access control systems using at least two technologies (badge, PIN, biometric, etc.)
(b) Electromechanical, mechanical or personal recognition (in small facilities and/or where there is a single monitored entrance)
c. Intrusion Detection System (1) Intrusion Detection System (IDS) shall detect attempted or actual unauthorized
(2) IDS installation, relat~:d components, and monitoring stations shall comply with Underwriters Laboratories CU L) 2050 Extent 3 standards. Systems developed and used exclusively by the U.S. Government do not require UL certification but shall comply with UL 2050 Extent 3 standards for installation.
(3) Contractor SeIFs shall maintain a current UL certificate of installation and service. Any changes to the IDS after the certificate is issued shall require renewal of the certificate.
(4) SCrFs accredited prior to the effective date ofICD 705 are not required to upgrade to current IDS standards. IC elements shall ensure that upon re-accreditation the SCIF is compliant with current IDS standards, unless a waiver is granted in accordance with ICD 705..
(5) Response times for IDS shall meet 32 CFR Parts 2001 and 2004 for protecting Top Secret information.
(6) For SCIF construction. under COM authority, IDS installations shall be coordinated with the Department of State (DoS), Overseas Building Operations and the Bureau of Diplomatic Security.
d. Unclassified Telecommunkations Systems (I) Any unclassified telecommunications system introduced into the SCrF shall be evaluated by the CITA and AO for tiechnical surveillance countermeasures and TEMPEST concerns.
(2) Unclassified telephone systems introduced within the SelF shall meet National Telephone Security Working Group requirements for security. See Ie Tech Spec for details.
e. Portable Electronic Devices (1) Portable Electronic Devices pose a risk to SCI since they often include capabilities to interact with other information systems and can enable hostile attacks targeting classified infonnation in Se lFs.
(2) The Ie Tech Spec provides details and guidance for PED restrictions within SCIFs.
rcs 705 -
(2) The mitigation techniques considered that are not sufficient to meet the standard (3) Justification for the waiver (4) A statement of residual risk (5) Guidelines, policies andlor procedures that will be implemented to reduce risk
(6) Time expectation when the standard will be met and the waiver will no longer be required. (7) A statement of acceptance of reciprocal use.
following: (I) The standard that will be exceeded (2) A statement of documented risk that justifies the need to exceed standards (3) Time expectation that the waiver will no longer be required (4) A statement of acceptance of reciprocal use
I. OPERATIONS AND MANAGEMENT
Once accredited and operational, the operations and management of a SelF provides a continuous security posture. The Ie Tech Spec provides standards for operational and management efforts that enable continuing security.
e. Develop training to ensure a common understanding of these standards and mitigations.
technical amendments to this Ie Standard, as appropriate.
lCS 705-
security purview.
purview.
project prior to the start of construction. c. Depending on the magnitude of the project, detennine if the SSM perfonns duties on a
d. Accredit SCIFs under their cognizance.
g. Consider S[D on U.S. Government or U. S. Government sponsored contractor facilities to substitute for standards herein. SID shall be documented in the CSP and the Fixed Facility Checklist.
b. In consultation with the AO , develop a CSP regarding implementation of the standards herein. This document shall include actions required to document the project from start to finish. c. Conduct periodic security inspections for the duration of the project to ensure compliance with the CSP. d. Document security violations or deviations from the CSP and notify the AO within 3 business days.
e. Ensure procedures to control site access are implemented.
b. Provide the CSA and AO with documented results of review with recommendations.