DCID 6/3 Confidentiality Reqs Protection Level 2 report
This report analyzes the results of the web application scan to detect possible violations of the confidentiality requirements for systems operating in protection level 2 as outlined in Chapter 4 of the "Protecting Sensitive Compartmented Information Within Information Systems" Manual. It will help you detect possible violations of the requirements presented in steps 3, 4, 5 and 8 of the accreditation process.
Why it matters
This directive establishes the security policy and procedures for storing, processing and communicating classified intelligence information in information systems (ISs). An information system is any software, firmware or hardware that is used in the acquisition, storage, manipulation, management, movement, control, display, switching, interchange, transmission, or reception of voice and data (digital or analog).
This policy applies to all United States government organizations, their commercial contractors, and Allied governments' ISs that process, store, or communicate intelligence information.
Accreditation process
The "Protecting Sensitive Compartmented Information Within Information Systems" Manual issued by the DCI provides 11 steps required for accreditation of an Information System. These steps are:
- Determine Level of Concern
- Determine Protection Level
- Determine Interconnected System Requirements
- Identify Technical Security and Assurance Requirements
- Determine Required Documentation and Testing Activities
- Write the System Security Plan
- Validate Security in Place
- Testing against Security Requirements
- Prepare Certification Package
- Forward Certification Package
- Accreditation Decision by the DAA