National Industrial Security Program
The National Industrial Security Program, or NISP, is the nominal authority (in the United States) for managing the needs of private industry to access classified information.
The NISP was established in 1993 by Executive Order 12829.[1] The National Security Council nominally sets policy for the NISP, while the Director of the Information Security Oversight Office is nominally the authority for implementation. Under the ISOO, the Secretary of Defense is nominally the Executive Agent, but the NISP recognizes four different Cognizant Security Agencies, all of which have equal authority: the Department of Defense, the Department of Energy, the Central Intelligence Agency, and the Nuclear Regulatory Commission.[2]
NISP Operating Manual (DoD 5220.22-M)
A major component of the NISP is the NISP Operating Manual, also called NISPOM, or DoD 5220.22-M.[3] The NISPOM establishes the standard procedures and requirements for all government contractors, with regards to classified information. As of 2010[update], the current NISPOM edition is dated 28 Feb 2006. Chapters and selected sections of this edition are:
- Chapter 1 - General Provisions and Requirements
- Chapter 2 - Security Clearances
- Section 1 - Facility Clearances
- Section 2 - Personnel Security Clearances
- Section 3 - Foreign Ownership, Control, or Influence (FOCI)
- Chapter 3 - Security Training and Briefings
- Chapter 4 - Classification and Marking
- Chapter 5 - Safeguarding Classified Information
- Chapter 6 - Visits and Meetings
- Chapter 7 - Subcontracting
- Chapter 8 - Information System Security
- Chapter 9 - Special Requirements
- Chapter 10 - International Security Requirements
- Chapter 11 - Miscellaneous Information
- Appendices
Data sanitization
DoD 5220.22-M is sometimes cited as a standard for sanitization to counter data remanence. The NISPOM actually covers the entire field of government-industrial security, of which data sanitization is a very small part (about two paragraphs in a 141 page document).[4] Furthermore, the NISPOM does not actually specify any particular method. Standards for sanitization are left up to the Cognizant Security Authority. The Defense Security Service provides a Clearing and Sanitization Matrix (C&SM) which does specify methods.[5] As of the June 2007 edition of the DSS C&SM, overwriting is no longer acceptable for sanitization of magnetic media; only degaussing or physical destruction is acceptable.
Unrelated to NISP or NISPOM, NIST also publishes a Data Sanitization standard, including methods to do so.[6]
References
- ^ "Executive Order 12829". FAS website. http://www.fas.org/irp/offdocs/eo12829.htm. Retrieved 2007-04-01.
- ^ "NISP Brochure" (PDF). DSS. Archived from the original on 2006-04-20. http://web.archive.org/web/20060420050102/http://www.dss.mil/isec/nispbrochure.pdf. Retrieved 2007-04-01. (59 KB)
- ^ "Download NISPOM". DSS. http://www.dss.mil/isp/fac_clear/download_nispom.html. Retrieved 2010-11-10.
- ^ DoD (2006-02-28). "National Industrial Security Program Operating Manual (NISPOM)" (PDF). DSS. pp. 8–3-1. https://www.dss.mil/GW/ShowBinary/DSS/isp/odaa/documents/nispom2006-5220.pdf#page=75. Retrieved 2008-11-13. (1.92 MB)
- ^ "DSS Clearing & Sanitization Matrix" (PDF). DSS. 2007-06-28. http://www.oregon.gov/DAS/OP/docs/policy/state/107-009-005_Exhibit_B.pdf. Retrieved 2011-04-26. (98 KB)
- ^ "Special Publication 800-88: Guidelines for Media Sanitization" (PDF). NIST. September 2006. http://csrc.nist.gov/publications/nistpubs/800-88/NISTSP800-88_rev1.pdf. Retrieved 2007-12-08. (542 KB)
|
|
Methods |
|
|
Schemes |
|
|
Utilities |
|
|
Developers |
Apple · Blancco · CBL Data Recovery Technologies · CEZEO Software · Codyssey · Convar · CyberScrub · Dirk Jagdmann · Disk Doctors · DTI Data · Eraser Team · GNU Project · InterCrypto · Jetico · Josh Larios · LSoft Technologies · "Nester" · "Null Pointer" · Object Meida · PortableApps.com · "Roadkil" · Salvatore "antirez" Sanfilippo · Spectrum Research · USCD Center for Magnetic Recording Research · White Canyon Software · Winternals · WipeSoft or Pow Tools
|
|
Legal |
|
|