Intelligence and Security SECNAVINST Archive




                                              SECNAVINST 5239.3
                                                NISMC
                                                14 JULY 1995
            
SECNAV INSTRUCTION 5239.3

From:  Secretary of the Navy

Subj:  DEPARTMENT OF THE NAVY INFORMATION SYSTEMS SECURITY        
       (INFOSEC) PROGRAM

Ref:   (a)  DODD TS3600.1 of 21 Dec 92, Information Warfare       
            (NOTAL)
       (b)  P.L. 100-235 of 8 Jan 88, Computer Security Act of    
            1987
       (c)  OMB Circular A-130 of 15 Jul 94, Management of        
            Federal Information Resources (NOTAL)
       (d)  NSTISSID No. 500 of 25 Feb 93, Telecommunications and 
            Automated Systems Security Education, Training and    
            Awareness
       (e)  NSTISSD No. 501 of 16 Nov 92, National Training       
            Program for Information System Security (INFOSEC)     
            Professionals
       (f)  NSTISSD No. 502 of 5 Feb 93, National Security        
            Telecommunications and Automated Information Security 
       (g)  NSTISSP No. 6 of 8 Apr 94, National Policy on         
            Certification and Accreditation of National Security  
            Telecommunications and Information Systems, (NOTAL)
       (h)  DODD 5200.28 of 21 Mar 88, Security Requirements for  
            Automated Information Systems (AISs) (NOTAL)
       (i)  DODD C-5200.5 of 21 Apr 90, Communication Security    
            (COMSEC) (NOTAL)
       (j)  DODD C-5200.19 of 23 Feb 90, Control of Compromising  
            Emanations (NOTAL)
       (k)  DODD 5000.2 of 23 Feb 91, Defense Acquisition         
            Policies and Procedure (NOTAL)
       (l)  CJCSI 6510.01 of 1 Sep 93, Chairman of the Joint      
            Chiefs of Staff Instruction, Joint and Combined       
            Communications Security (NOTAL)
       (m)  NSTISSI 4009 of 5 Jun 92, National Information        
            Systems Security (INFOSEC) Glossary (NOTAL) 
       (n)  SECNAVINST 5000.2A of 9 Dec 92, Implementation of     
            Defense Acquisition Management Policies, Procedures,  
            Documentation, and Reports (NOTAL)
       (o)  SECNAVINST 5231.1C of 10 Jul 93, Life Cycle           
            Management Policy and Approval Requirements for       
            Information System Projects
       (p)  SECNAVINST 5200.32A of 3 May 93, Acquisition          
            Management Policies and Procedures for Computer       
            Resources
  
Encl:  (1)  List of Acronyms
       (2)  Glossary of Terms

  

                                                SECNAVINST 5239.3
1.  Purpose.  Emerging as an overarching strategy, the discipline
of Information Warfare (IW), as promulgated by reference (a),
encompasses not only actions that may be taken to potentially
affect an adversary's information or information systems but also
addresses those defensive aspects necessary to ensure that U.S.
information or information systems are protected against attack. 
Under this defensive portion of IW, Information Systems Security
(INFOSEC) is a subset of information assurance which addresses
actions taken to protect U.S. information and information
systems. The Department of the Navy (DON) INFOSEC policy and
procedures, when properly applied, will be a major component of
the efforts necessary to ensure the defense of DON information
and information systems.  The purpose of this instruction is:

  a.  To establish DON policy for the INFOSEC Program within the
IW discipline and to define the organizational responsibilities
for implementation of the security disciplines of Communications
Security (COMSEC), Computer Security (COMPUSEC), and Emanations
Security (TEMPEST) per references (a) through (l).

  b.  To provide the basic policy and guidelines necessary for
consistent and effective application of resources in ensuring the
security of national security systems as well as the security and
privacy of DON systems/information under the Computer Security
Act of 1987 (reference (b)).

2.  Cancellation.   SECNAVINST 5239.2.

3.  Definitions.  Reference (m) contains the official glossary of
INFOSEC terms.  Additional terms and acronyms relevant to this
instruction are contained in enclosures (1) and (2).

4.  Objectives
  
  a.  To establish a DON INFOSEC program that addresses the
defensive aspects of IW as promulgated by reference (a).

  b.  To ensure that information processed, stored or transmitted
by DON information systems is adequately protected with respect
to confidentiality, integrity, availability and privacy.

  c.  To integrate the technical and management processes of the
various security disciplines (COMSEC, COMPUSEC, and TEMPEST) into
a cohesive INFOSEC program.

  d.  To establish and implement programs that mandate the
certification and accreditation of information systems under DON
control.

  e.  To require a life cycle management approach to implementing
INFOSEC requirements.

  f.  To establish standardized INFOSEC training within the DON. 

                                2
                                              SECNAVINST 5239.3
5.  Scope

  a.  This instruction applies to:

    (1) All DON activities.

    (2) All DON-sponsored contractors who own, procure, use,
operate, or maintain information systems at government or
contractor facilities.

    (3) All information systems and other system resources
designed, developed, procured, or managed by DON activities; and
by their contractors.

    (4) Information systems operated, but not owned, by DON
(e.g., Joint Staff, Department of Defense (DoD)).  

  b.  This instruction applies to the protection of all elements
of the information systems.  Of all the elements, COMSEC,
COMPUSEC, and TEMPEST are managed per this instruction.   The
other Information Security activities, such as protection of
information against accidents, disasters, human error, physical,
personnel, and operational security are managed under separate
instructions.

6.  Background.  The DON has recognized the urgent need to
integrate all available security capabilities into an unified
system-oriented engineering approach to provide responsive, cost
effective security measures for our information systems.  The DON
also recognizes that a thorough and consistent approach to
INFOSEC for the protection of our information systems is key to
the accomplishment of our defense mission and to the protection
of lives, property and technology.  Mission and organizational
realignments have occurred at multiple levels to ensure an
unified approach to DON INFOSEC requirements:

  a.  INFOSEC Program Implementation:  The Chief of Naval
Operation (CNO) and the Commandant of the Marine Corps (CMC) have
established centralized program development and implementation of
the DON INFOSEC Program at their levels.

  b.  INFOSEC Program Execution:  Commander, Space and Naval
Warfare Systems Command (COMSPAWARSYSCOM) has created a Program
Management organization with DON-wide responsibilities for
establishing and executing of an unified system-oriented
engineering approach to INFOSEC.

7.  Policy  

  a.  Precedence.  Policy and requirements set forth by higher    
authority take precedence over the policy established in this 
 instruction. 


                                3
                                          SECNAVINST 5239.3   
  b.  Fundamental INFOSEC Policy

    (1) Data processed, stored and transmitted by information
systems shall be adequately protected with respect to
requirements for confidentiality, integrity, availability and
privacy.

    (2) The nature of the DON mission, accompanied by
connectivity and data aggregation issues, has led to the
determination that all unclassified information processed by DON
information systems is sensitive.  Therefore, all DON information
systems shall be protected by the continuous employment of
appropriate safeguards.

    (3) Classified information processed or stored by DON
information systems shall be safeguarded as required by that
level of classification.

  c.  Certification and Accreditation.  The appropriate
Designated Approving Authority (DAA) shall accredit every DON
information system before operation.  The accreditation statement
shall identify the required confidentiality, integrity, and
availability services and constraints under which the system can
operate including data sensitivity, user authorization, physical
and system configuration.  For those information systems
supporting cryptologic functions, Sensitive Compartmented
Information (SCI)/Intelligence data, or Single Integrated
Operations Plan (SIOP) data, accreditation requests shall be
forwarded to the appropriate authority.

    (1) Certification of DON information systems shall be
performed and documented by competent personnel in accordance
with specified criteria, standards and guidelines.  

    (2) Accreditation of DON information systems shall be
performed by competent management personnel in a position to
balance operational mission requirements and the residual risk of
system operation.  All accreditation decisions shall be
documented and contain a statement of residual risk.

    (3) Accreditation of DON information systems shall be
performed when information systems are interconnected to other
previously accredited information systems and networks.  The DAA
shall ensure that operation of the resultant system does not
incur any additional unacceptable risk.  
  
  d.  Life Cycle Management.  This instruction shall be reviewed
for applicability to all DON information systems being acquired
in accordance with references (b), (n), (o), and (p).  The
INFOSEC policy and requirements are applicable throughout the
life cycles of all DON systems.



                                4
                                                SECNAVINST 5239.3
    (1) A System Security Plan (SSP) should be developed and
maintained for all computer systems (reference (b)).  This plan
includes the protection strategy planned, including the
certification and accreditation processes.

    (2) At each milestone decision point, INFOSEC requirements
shall be discussed in sufficient detail and tailored to the
milestone under review and the complexity of the project.  The
discussion shall specifically address the issues of
confidentiality, integrity and availability.

  e.  Training.  The ability to provide comprehensive assurance
that DON information is adequately protected is directly related
to the qualifications of the individuals operating DON
information systems.  In accordance with references (b), (d) and
(e) all individuals operating DON information systems will be
afforded appropriate training and awareness information
commensurate with their duties, responsibilities and the level of
information protection required.

8.  Responsibilities

  a.  The Assistant Secretary of the Navy (ASN) for Research,
Development, and Acquisition (RD&A) shall:  

    (1) Issue the appropriate DON policies and guidance providing
implementation details and procedures for the INFOSEC program.

    (2) Oversee the DON acquisition process as it relates to the
INFOSEC program.

  b.  The Deputy Assistant Secretary of the Navy (DASN) for
Command and Control, Communications, Computers, and
Intelligence/Electronic Warfare/Space (C4I/EW/Space) shall review
resource requirements necessary to implement and execute the DON
INFOSEC program.

  c.  The Commander, Naval Information Systems Management Center
(NISMC)  shall:  

    (1) Serve as the coordinator for DON INFOSEC Policy.

    (2) Ensure that INFOSEC activities, with respect to the scope
of programs covered by reference (p), are integrated into the
overall DON major system acquisition process.

    (3) Ensure that INFOSEC is integrated into the DON Life Cycle
Management process.
    
    (4) Monitor the implementation of this instruction.




                                5
                                                SECNAVINST 5239.3
  d.  The Chief of Naval Operations (CNO) shall:

    (1) Serve as the Program/Resource Sponsor for the DON INFOSEC
Program.

    (2) Manage the Navy INFOSEC Program including DON program
development, implementation, planning, programming, and
budgeting.

    (3) Establish and validate Navy INFOSEC requirements;
coordinate INFOSEC   requirements of joint military department
concern with the Joint Staff in accordance with  reference (k).

    (4) Establish senior INFOSEC advisory boards with CMC
representation to advise on DON INFOSEC policy and guidance as
required.

    (5) Coordinate the development and implementation of
appropriate guidance documents.  
      
    (6) Provide Navy representative to the National Security
Telecommunications and Information System Security Committee
(NSTISSC), Subcommittee for Telecommunications Security (STS),
and Subcommittee for Information System Security (SISS).

    (7) Serve as the DAA for Navy-wide and joint service
information systems (where Navy is the assigned lead) and ensure
that DAAs are identified for other Navy information systems.

    (8) Advise NISMC of  INFOSEC issues that may have a DON or
DoD-wide impact.
  
    (9) Develop a DON INFOSEC training program.

    (10) Develop and maintain the DON INFOSEC Master Plan in
coordination with CMC and Systems Commands.
  
    (11) Coordinate DON INFOSEC requirements for the DON Service
Cryptologic Element (SCE) security program with  the National
Security Agency (NSA). 

    (12) Coordinate DON INFOSEC requirements for the DON
Sensitive Compartmented Information (SCI)/Intelligence program,
and the DON portion of the DoD Intelligence Information System
(DODIIS) with the Defense Intelligence Agency (DIA).

    (13) Provide recommendations to NISMC for the revision of
other DoD and DON documents to standardize DON INFOSEC across all
activities.    





                                6
                                                SECNAVINST 5239.3
e.  The Commandant of the Marine Corps (CMC) shall:

    (1) Advise NISMC of Marine Corps INFOSEC issues that may have
a DON or DoD-wide impact.

    (2) Ensure that DAAs are identified and security services
provided for Marine Corps information systems.

    (3) Endorse and forward Marine Corps validated INFOSEC
software and equipment procurement requirements to CNO for equal
consideration during the development of the DON Program Objective
Memorandum (POM).

    (4) Submit validated Marine Corps INFOSEC requirements to CNO
for inclusion in the DON INFOSEC Master Plan.

    (5) Establish senior INFOSEC advisory boards with CNO to
advise on DON INFOSEC policy and guidance as required.

    (6) Provide recommendations to NISMC for the revision of
other DoD and DON documents to institutionalize INFOSEC.

    (7) Provide CMC representation to the NSTISSC, STS, and SISS.

  f.  The Chief of Naval Research (CNR) shall:

    (1) Manage the DON INFOSEC Program within the Office of Naval
Research (ONR).

    (2) Advise NISMC of ONR INFOSEC issues that may have a DON or
DoD-wide impact.

    (3) Provide appropriate representation to INFOSEC advisory
boards.

    (4) Ensure that a DAA and security support are provided for
each ONR information system.

    (5) Consolidate and forward the ONR COMSEC equipment
requirements to CNO for validation and consideration during 
development of the POM.
  
    (6) Provide the technical base for the DON INFOSEC Research
and Development (R&D) Program within ONR.

    (7) Designate a DON Center for Computer High Assurance
Systems (CCHAS).  As part of the DON INFOSEC Program, the CCHAS
shall:

       (a) Maintain liaison with NSA regarding INFOSEC R&D.

       (b) Conduct R&D in evaluation methodologies for
application systems.

                                7
                                                SECNAVINST 5239.3
       (c) Provide INFOSEC research support to other DON
activities.

  g.  The Commanders, Naval Systems Commands (SYSCOMs) shall:

    (1) Submit INFOSEC POM recommendations to CNO for validation
and consolidation in the DON INFOSEC Master Plan.  Marine Corps
recommendations shall be submitted via CMC.

    (2) Coordinate INFOSEC integration into information systems
with COMSPAWARSYSCOM.

    (3) Ensure that each information system acquisition or
deployment under the command's purview adheres to the DON life
cycle management policy.

  h.  Commander, Space and Naval Warfare Systems Command
(COMSPAWARSYSCOM).  In addition to the responsibilities set forth
for SYSCOMs, COMSPAWARSYSCOM shall:
    
    (1) As the technical lead for DON INFOSEC, provide systems
engineering and integration support to the systems commands for
all DON information systems with INFOSEC requirements.

    (2) Budget for DON INFOSEC programs as defined in the INFOSEC
Master Plan.

    (3) Integrate INFOSEC engineering and integration into the
Warfare Systems Engineering Process.

    (4) Develop and manage the DON INFOSEC R&D Program.

    (5) Develop and acquire DON standard and specified INFOSEC
products in accordance with the DON INFOSEC Master Plan, ensuring
that a Certification Authority and an In-Service Engineering
Activity (ISEA) and/or Software Support Activity (SSA) are
assigned.

    (6) Budget for operations and maintenance funding for fielded
DON centrally procured INFOSEC products and systems throughout
their life-cycle.
    
    (7) Establish Memorandum of Agreement (MOA) with NSA, as
necessary, to facilitate the embedding and/or development of
INFOSEC equipment/models.

    (8) Provide direct liaison with NISMC on INFOSEC acquisition
issues.

  i.  The Director, Naval Criminal Investigative Service (NCIS)
shall:



                                8
                                                SECNAVINST 5239.3
    (1) Investigate fraud, waste, abuse and other criminal
violations involving DON information systems.

    (2) Maintain a staff skilled in the investigation of computer
crime.  This staff may be augmented, when necessary, by personnel
provided by other DON activities.

    (3) Collect threat information and disseminate as
appropriate.
  

9.  Action.  All action addressees shall implement this guidance
within their organizations.  All developing and operating
activities shall budget for, fund and execute the actions
necessary to comply with this instruction and the implementing
documents that support it.
  



                  

                      W. C. Bowes
                     Principal Deputy Assistant
                    Secretary of the Navy (Research,
                   Development and Acquisition)

Distribution:
SNDL  A1  (Immediate Office of the Secretary)
          (AAUSN, ASN(RDA) and DASN (C4I/EW/Space) only)
    A2A   (Department of the Navy Staff Offices) (CNR and         
           NAVCOMPT only)     
    A3    (Chief of Naval Operations) (N6 and N09 only) (25)    
    A6    (CMC) (75)    
    D30   (NAVINFOSYSMGTCEN) (50)
    FKA1  (Syscoms Commands)
    MARCORPS PCN 71000000000 and 71000000100


Copy to:
SNDL  22A (Fleet Commanders)
      24  (Type Commanders) (less 24E)
      26H (Fleet Training Group and Detachment)
      A2A (Department of the Navy Staff Offices) (less CNR and    
           NAVCOMPT)
    B1B   (Offices of the Secretary of Defense)
    B3    (College and University)
    B5    (U. S. Coast Guard)
    C25A  (OPNAV Support Activity Detachment (Ft. Ritchie, only)) 
    C4L   (Navy Laboratories    




                                9
                                                SECNAVINST 5239.3
Copy To: (Continued)
SNDL C4EE (Center for Naval Analyses)
    FKP14 (FCDSSA)
    FKP16 (NAVSSES)     
    FKP18 (NAVSEAADSA)
    FKP20 (AEGIS TRACEN)  
    FL4   (Regional Data Automation Center, Data Automation       
           Facitity
    FT74  (NROTCU)
    W     (Department of the Navy Echelon 2 Activities) (less     
           Syscoms) (5) 





SECNAV/OPNAV Directives Control Office
Washington Navy Yard Building 200
901 M Street SE
Washington DC 20374-5074 (20 copies)

Order from:
Naval Inventory Control Point
Cog "I" Material
700 Robbins Avenue
Philadelphia, PA 19111-5098

Stocked:  50 copies
                                10
                                                SECNAVINST 5239.3 
                         LIST OF ACRONYMS

AIS           Automated Information Systems
ASN           Assistant Secretary of the Navy
CCHAS         Center for Computer High Assurance Systems
CMC           Commandant of the Marine Corps
COMPUSEC      Computer Security
COMSEC        Communications Security
CNO           Chief of Naval Operations
CNR           Chief of Naval Research
DAA           Designated Approving Authority
DASN          Deputy Assistant Secretary of the Navy (Command,    
              Control, (C4I/EW/Space) Communications, Computers   
              and Intelligence/Electronic Warfare/Space)
DIA           Defense Intelligence Agency
DoD           Department of Defense
DODIIS        Department of Defense Intelligence Information      
              System
DON           Department of the Navy
INFOSEC       Information Systems Security 
IS            Information System
ISEA          In-Service Engineering Activity
IW            Information Warfare
LCM           Life Cycle Management
MARCORSYSCOM  Marine Corps Systems Command
MOA           Memorandum of Agreement
NCIS          Naval Criminal Investigative Service
NISMC         Naval Information Systems Management Center
NSA           National Security Agency
NSTISSC       National Security Telecommunications and            
              Information System Security Committee
ONR           Office of Naval Research
POM           Program Objective Memorandum
RD&A          Research, Development and Acquisition
R&D           Research and Development
SCI           Sensitive Compartmented Information
SECNAV        Secretary of the Navy
SIOP          Single Integrated Operations Plan
SISS          Subcommittee on Information Systems Security
SPAWAR        Space and Naval Warfare Systems Command
SSA           Software Support Activity
SSP           System Security Plan
STS           Subcommittee on Telecommunications Security
SYSCOM        Systems Command



                                1                   Enclosure (1)