Security Requirements for Unclassified Information Technology (IT) Resources, 43408-43410 [E6-12351]

Download as PDF 43408 Federal Register / Vol. 71, No. 147 / Tuesday, August 1, 2006 / Proposed Rules NATIONAL AERONAUTICS AND SPACE ADMINISTRATION 48 CFR Parts 1804 and 1852 RIN: 2700–AD26 Security Requirements for Unclassified Information Technology (IT) Resources National Aeronautics and Space Administration. ACTION: Proposed rule. AGENCY: SUMMARY: NASA is proposing to amend the clause at NASA FAR Supplement (NFS) 1852.204–76, Security Requirements for Unclassified Information Technology Resources, to reflect the updated requirements of NASA Procedural Requirements (NPR) 2810, ‘‘Security of Information Technology’’. The NPR was recently revised to address increasing cyber threats and to ensure consistency with the Federal Information Security Management Act (FISMA), which requires agencies to protect information and information systems in a manner that is commensurate with the sensitivity of the information processed, transmitted, or stored. DATES: Comments should be submitted on or before October 2, 2006. ADDRESSES: Interested parties may submit comments, identified by RIN number 2700–AD26, via the Federal eRulemaking Portal: https:// www.regulations.gov. Follow the instructions for submitting comments. Comments may also be submitted to Ken Stepka, NASA Headquarters, Office of Procurement, Analysis Division, Washington, DC 20546. Comments may also be submitted by e-mail to Ken.stepka@nasa.gov. Ken Stepka, Office of Procurement, Analysis Division, (202) 358–0492, e-mail: ken.stepka@nasa.gov. FOR FURTHER INFORMATION CONTACT: • Change of the physical security requirement from a National Agency Check to a National Agency Check with Inquiries. The revised clause is applicable to all NASA contracts that require contractors to: (1) Have physical or electronic access to NASA’s computer systems, networks, or IT infrastructure; or (2) use information systems to generate, store, or exchange data with NASA or on behalf of NASA, regardless of whether the data resides on a NASA or a contractor’s information system. The text at NFS 1804.470 is also proposed to be revised consistent with the revised clause. This is not a significant regulatory action and, therefore, was not subject to review under Section 6(b) of Executive Order 12866, Regulatory Planning and Review, dated September 30, 1993. This rule is not a major rule under 5 U.S.C. 804. B. Regulatory Flexibility Act This proposed rule is not expected to have a significant economic impact on a substantial number of small entities with the meaning of the Regulatory Flexibility Act, 5 U.S.C. 601 et seq., because the proposed rule summarizes the existing Government-wide IT security requirements mandated by, and related to, FISMA. C. Paperwork Reduction Act The Paperwork Reduction Act (Pub. L. 96–511) does not apply because the Office of Management and Budget (OMB) has determined that the proposed changes to the NFS do not impose information collection requirements that require the approval of OMB under 44 U.S.C. 3501, et seq. List of Subjects in 48 CFR Parts 1804 and 1852 Government procurement. SUPPLEMENTARY INFORMATION: hsrobinson on PROD1PC70 with PROPOSALS A. Background NASA’s current contract requirements for IT Security are defined in the clause at NFS 1852.204–76, Security Requirements for Unclassified Information Technology Resources. In order to comply with the Governmentwide requirements of FISMA, the proposed revision to 1852.204–76 incorporates several new requirements, including— • Expanded requirements for IT Security Plans to include a Risk Assessment and a FIPS 199 Assessment; • Added requirements for a Contingency Plan; and VerDate Aug<31>2005 15:05 Jul 31, 2006 Jkt 208001 Tom Luedtke, Assistant Administrator for Procurement. Accordingly, 48 CFR parts 1804 and 1852 are proposed to be amended as follows: 1. The authority citation for 48 CFR parts 1804 and 1852 continues to read as follows: Authority: 42 U.S.C. 2473(c)(1). PART 1804—ADMINISTRATIVE MATTERS 2. Revise sections 1804.470, 1804.470–1, 1804.470–2, 1804.470–3, and 1804.470–4 to read as follows: PO 00000 Frm 00038 Fmt 4702 Sfmt 4702 § 1804.470 Security requirements for unclassified information technology (IT) resources. § 1804.470–1 Scope. This section implements NASA’s acquisition requirements pertaining to Federal policies for the security of unclassified information and information systems. Federal policies include the Federal Information System Management Act (FISMA) of 2002, Homeland Security Presidential Directive (HSPD) 12, Clinger-Cohen Act of 1996 (40 U.S.C. 1401 et seq.), Public Law 106–398, section 1061, Government Information Security Reform, OMB Circular A–130, Management of Federal Information Resources, and the National Institute of Standards and Technology (NIST) security requirements and standards. These requirements safeguard IT services provided to NASA such as the management, operation, maintenance, development, and administration of hardware, software, firmware, computer systems, networks, and telecommunications systems. § 1804.470–2 Policy. NASA IT security policies and procedures for unclassified information and IT are prescribed in NASA Policy Directive (NPD) 2810, Security of Information Technology; NASA Procedural Requirements (NPR) 2810, Security of Information Technology; and interim policy updates in the form of NASA Information Technology Requirements (NITR). IT services must be performed in accordance with these policies and procedures. § 1804.470–3 IT Security Requirements. These IT security requirements cover all NASA contracts in which IT plays a role in the provisioning of services or products (e.g., research and development, engineering, manufacturing, IT outsourcing, human resources, and finance) that support NASA in meeting its institutional and mission objectives. These requirements are applicable where a contractor or subcontractor must obtain physical or electronic (i.e., authentication level 2 and above as defined in NIST Special Publication 800–63, Electronic Authentication Guideline) access to NASA’s computer systems, networks, or IT infrastructure. These requirements are also applicable in cases where information categorized as low, moderate, or high by the Federal Information Processing Standards (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems, is stored, generated, or exchanged by NASA or on behalf of NASA by a contractor or E:\FR\FM\01AUP1.SGM 01AUP1 Federal Register / Vol. 71, No. 147 / Tuesday, August 1, 2006 / Proposed Rules subcontractor, regardless of whether the information resides on a NASA or a contractor/subcontractor’s information system. § 1804.470–4 Contract clause. (a) Insert the clause at 1852.204–76, Security Requirements for Unclassified Information Technology Resources, in all solicitations and contracts when contract performance requires contractors to: (1) Have physical or electronic access to NASA’s computer systems, networks, or IT infrastructure; or (2) Use information systems to generate, store, or exchange data with NASA or on behalf of NASA, regardless of whether the data resides on a NASA or a contractor’s information system. (b) Paragraph (d) of the clause allows contracting officers to waive the requirements of paragraphs (b) and (c)(1) through (3) of the clause. Contracting officers must obtain the approval of the: (1) Center IT Security Manager before granting any waivers to paragraph (b) of the clause; and (2) The Center Chief of Security before granting any waivers to paragraphs (c)(1) through (3) of the clause. PART 1852—SOLICITATION PROVISIONS AND CONTRACT CLAUSES 3. Revise section 1852.204–76 to read as follows: § 1852.204–76 Security Requirements for Unclassified Information Technology Resources. As prescribed in 1804.470–4(a), insert the following clause: Security Requirements for Unclassified Information Technology Resources hsrobinson on PROD1PC70 with PROPOSALS (XX/XX) (a) The Contractor shall be responsible for information and information technology (IT) security when the Contractor or its subcontractors must obtain physical or electronic (i.e., authentication level 2 and above as defined in National Institute of Standards and Technology (NIST) Special Publication (SP) 800–63, Electronic Authentication Guideline) access to NASA’s computer systems, networks, or IT infrastructure, or where information categorized as low, moderate, or high by the Federal Information Processing Standards (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems, is stored, generated, or exchanged by NASA or on VerDate Aug<31>2005 15:05 Jul 31, 2006 Jkt 208001 behalf of NASA by a contractor or subcontractor, regardless of whether the information resides on a NASA or a contractor/subcontractor’s information system. (b) IT Security Requirements. (1) Within 30 days after contract award, a Contractor shall submit to the Contracting Officer for NASA approval an IT Security Plan, Risk Assessment, and FIPS 199, Standards for Security Categorization of Federal Information and Information Systems, Assessment. These plans and assessments, including annual updates shall be incorporated into the contract as compliance documents. (i) The IT system security plan shall be prepared consistent, in form and content, with NIST SP 800–18, Guide for Developing Security Plans for Federal Information Systems, and any additions/augmentations described in NASA Procedural Requirements (NPR) 2810, Security of Information Technology. The security plan shall identify and document appropriate IT security controls consistent with the sensitivity of the information and the requirements of Federal Information Processing Standards (FIPS) 200, Recommended Security Controls for Federal Information Systems. The plan shall be reviewed and updated in accordance with NIST SP 800–26, Security Self-Assessment Guide for Information Technology Systems, and FIPS 200, on a yearly basis. (ii) The risk assessment shall be prepared consistent, in form and content, with NIST SP 800–30, Risk Management Guide for Information Technology Systems, and any additions/ augmentations described in NPR 2810. The risk assessment shall be updated on a yearly basis. (iii) The FIPS 199 assessment shall identify all information types as well as the ‘‘high water mark,’’ as defined in FIPS 199, of the processed, stored, or transmitted information necessary to fulfill the contractual requirements. (2) The Contractor shall produce contingency plans consistent, in form and content, with NIST SP 800–34, Contingency Planning Guide for Information Technology Systems, and any additions/augmentations described in NPR 2810. The Contractor shall perform yearly ‘‘Classroom Exercises.’’ ‘‘Functional Exercises,’’ shall be coordinated with the Center CIOs and be conducted once every three years, with the first conducted within the first two years of contract award. These exercises are defined and described in NIST SP 800–34. (3) The Contractor shall ensure coordination of its incident response PO 00000 Frm 00039 Fmt 4702 Sfmt 4702 43409 team with the NASA Incident Response Center and the NASA Security Operations Center. (4) The Contractor shall ensure that its employees, in performance of the contract, receive annual IT security training in NASA IT Security policies, procedures, computer ethics, and best practices in accordance with NPR 2810 requirements. The Contractor may use web-based training available from NASA to meet this requirement. (5) The Contractor shall provide NASA, including the NASA Office of Inspector General, access to the Contractor’s and subcontractors’ facilities, installations, operations, documentation, databases, and personnel used in performance of the contract. Access shall be provided to the extent required to carry out IT security inspection, investigation, and/or audits to safeguard against threats and hazards to the integrity, availability, and confidentiality of NASA information or to the function of computer systems operated on behalf of NASA, and to preserve evidence of computer crime. To facilitate mandatory reviews, the Contractor shall ensure appropriate compartmentalization of NASA information, stored and/or processed, either by information systems in direct support of the contract or that are incidental to the contract. (6) The Contractor shall ensure that all individuals who perform tasks as a system administrator, or have authority to perform tasks normally performed by a system administrator, demonstrate knowledge appropriate to those tasks. Knowledge is demonstrated through the NASA System Administrator Security Certification Program. A system administrator is one who provides IT services, network services, files storage, and/or web services, to someone else other than themselves and takes or assumes the responsibility for the security and administrative controls of that service. Within 30 days after contract award, the Contractor shall provide to the Contracting Officer a list of all system administrator positions and personnel filling those positions, along with a schedule that ensures certification of all personnel within 90 days after contract award. Additionally, the Contractor should report all personnel changes which impact system administrator positions within 5 days of the personnel change and ensure these individuals obtain System Administrator certification within 90 days after the change. (7) When the Contractor is located at a NASA Center or installation or is using NASA IP address space, the Contractor shall— E:\FR\FM\01AUP1.SGM 01AUP1 hsrobinson on PROD1PC70 with PROPOSALS 43410 Federal Register / Vol. 71, No. 147 / Tuesday, August 1, 2006 / Proposed Rules (i) Submit requests for non-NASA provided external Internet connections to the Contracting Officer for approval by the Network Security Configuration Control Board (NSCCB); (ii) Comply with the NASA CIO metrics including patch management, operating systems and application configuration guidelines, vulnerability scanning, incident reporting, system administrator certification, and security training; and (iii) Utilize the NASA Public Key Infrastructure (PKI) for all encrypted communication or non-repudiation requirements within NASA when secure e-mail capability is required. (c) Physical and Logical Access Requirements. (1) Contractor personnel requiring access to IT systems operated by the Contractor for NASA or interconnected to a NASA network shall be screened at an appropriate level in accordance with NPR 2810 and Chapter 4, NPR 1600.1, NASA Security Program Procedural Requirements. NASA shall provide screening, appropriate to the highest risk level, of the IT systems and information accessed, using, as a minimum, National Agency Check with Inquiries (NACI). The Contractor shall submit the required forms to the NASA Center Chief of Security (CCS) within fourteen (14) days after contract award or assignment of an individual to a position requiring screening. The forms may be obtained from the CCS. At the option of NASA, interim access may be granted pending completion of the required investigation and final access determination. For Contractors who will reside on a NASA Center or installation, the security screening required for all required access (e.g., installation, facility, IT, information, etc.) is consolidated to ensure only one investigation is conducted based on the highest risk level. Contractors not residing on a NASA installation will be screened based on their IT access risk level determination only. See NPR 1600.1, Chapter 4. (2) Guidance for selecting the appropriate level of screening is based on the risk of adverse impact to NASA missions. NASA defines three levels of risk for which screening is required (IT– 1 has the highest level of risk): (i) IT–1— Individuals having privileged access or limited privileged access to systems whose misuse can cause very serious adverse impact to NASA missions. These systems include, for example, those that can transmit commands directly modifying the behavior of spacecraft, satellites or aircraft. VerDate Aug<31>2005 15:05 Jul 31, 2006 Jkt 208001 (ii) IT–2— Individuals having privileged access or limited privileged access to systems whose misuse can cause serious adverse impact to NASA missions. These systems include, for example, those that can transmit commands directly modifying the behavior of payloads on spacecraft, satellites or aircraft; and those that contain the primary copy of ‘‘level 1’’ information whose cost to replace exceeds one million dollars. (iii) IT–3— Individuals having privileged access or limited privileged access to systems whose misuse can cause significant adverse impact to NASA missions. These systems include, for example, those that interconnect with a NASA network in a way that exceeds access by the general public, such as bypassing firewalls; and systems operated by the Contractor for NASA whose function or information has substantial cost to replace, even if these systems are not interconnected with a NASA network. (3) Screening for individuals shall employ forms appropriate for the level of risk as established in Chapter 4, NPR 1600.1. (4) The Contractor may conduct its own screening of individuals requiring privileged access or limited privileged access provided the Contractor can demonstrate to the Contracting Officer that the procedures used by the Contractor are equivalent to NASA’s personnel screening procedures for the risk level assigned for the IT position. (5) Subject to approval of the Contracting Officer, the Contractor may forgo screening of Contractor personnel for those individuals who have proof of a— (i) Current or recent national security clearances (within last three years); (ii) Screening conducted by NASA within the last three years that meets or exceeds the screening requirements of the IT position; or (iii) Screening conducted by the Contractor, within the last three years, that is equivalent to the NASA personnel screening procedures as approved by the Contracting Officer and concurred on by the CCS. (d) The Contracting Officer may waive the requirements of paragraphs (b) and (c)(1) through (c)(3) upon request of the Contractor. The Contractor shall provide all relevant information requested by the Contracting Officer to support the waiver request. (e) The Contractor shall contact the Contracting Officer for any documents, information, or forms necessary to comply with the requirements of this clause. PO 00000 Frm 00040 Fmt 4702 Sfmt 4702 (f) The Contractor shall insert this clause, including this paragraph (f), in all subcontracts when the subcontractor is required to: (1) Have physical or electronic access to NASA’s computer systems, networks, or IT infrastructure; or (2) Use information systems to generate, store, or exchange data with NASA or on behalf of NASA, regardless of whether the data resides on a NASA or a contractor’s information system. [FR Doc. E6–12351 Filed 7–31–06; 8:45 am] BILLING CODE 7510–01–P DEPARTMENT OF THE INTERIOR Fish and Wildlife Service 50 CFR Part 17 Endangered and Threatened Wildlife and Plants; 12-Month Finding on a Petition To Establish the Northern Rocky Mountain Gray Wolf Population (Canis lupus) as a Distinct Population Segment To Remove the Northern Rocky Mountain Gray Wolf Distinct Population Segment From the List of Endangered and Threatened Species Fish and Wildlife Service, Interior. ACTION: Notice of 12-month petition finding. AGENCY: SUMMARY: We, the U.S. Fish and Wildlife Service (Service), announce a 12-month finding on a petition to establish the northern Rocky Mountain (NRM) gray wolf (Canis lupus) population as a Distinct Population Segment (DPS) and to remove the NRM gray wolf DPS from the Federal List of Endangered and Threatened Wildlife, under the Endangered Species Act of 1973, as amended (ESA). After review of all available scientific and commercial information, we find that the petitioned action is not warranted. We have determined that Wyoming State law and its wolf management plan do not provide the necessary regulatory mechanisms to assure that Wyoming’s numerical and distributional share of a recovered NRM wolf population would be conserved if the protections of the ESA were removed. DATES: The finding announced in this document was made on August 1, 2006. ADDRESSES: Comments and materials received, as well as supporting documentation used in the preparation of this 12-month finding, will be available for public inspection, by appointment, during normal business hours at U.S. Fish and Wildlife Service, E:\FR\FM\01AUP1.SGM 01AUP1

Agencies

[Federal Register Volume 71, Number 147 (Tuesday, August 1, 2006)]
[Proposed Rules]
[Pages 43408-43410]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E6-12351]



[[Page 43408]]

=======================================================================
-----------------------------------------------------------------------

NATIONAL AERONAUTICS AND SPACE ADMINISTRATION

48 CFR Parts 1804 and 1852

RIN: 2700-AD26


Security Requirements for Unclassified Information Technology 
(IT) Resources

AGENCY: National Aeronautics and Space Administration.

ACTION: Proposed rule.

-----------------------------------------------------------------------

SUMMARY: NASA is proposing to amend the clause at NASA FAR Supplement 
(NFS) 1852.204-76, Security Requirements for Unclassified Information 
Technology Resources, to reflect the updated requirements of NASA 
Procedural Requirements (NPR) 2810, ``Security of Information 
Technology''. The NPR was recently revised to address increasing cyber 
threats and to ensure consistency with the Federal Information Security 
Management Act (FISMA), which requires agencies to protect information 
and information systems in a manner that is commensurate with the 
sensitivity of the information processed, transmitted, or stored.

DATES: Comments should be submitted on or before October 2, 2006.

ADDRESSES: Interested parties may submit comments, identified by RIN 
number 2700-AD26, via the Federal eRulemaking Portal: https://
www.regulations.gov. Follow the instructions for submitting comments. 
Comments may also be submitted to Ken Stepka, NASA Headquarters, Office 
of Procurement, Analysis Division, Washington, DC 20546. Comments may 
also be submitted by e-mail to Ken.stepka@nasa.gov.

FOR FURTHER INFORMATION CONTACT: Ken Stepka, Office of Procurement, 
Analysis Division, (202) 358-0492, e-mail: ken.stepka@nasa.gov.

SUPPLEMENTARY INFORMATION:

A. Background

    NASA's current contract requirements for IT Security are defined in 
the clause at NFS 1852.204-76, Security Requirements for Unclassified 
Information Technology Resources. In order to comply with the 
Government-wide requirements of FISMA, the proposed revision to 
1852.204-76 incorporates several new requirements, including--
     Expanded requirements for IT Security Plans to include a 
Risk Assessment and a FIPS 199 Assessment;
     Added requirements for a Contingency Plan; and
     Change of the physical security requirement from a 
National Agency Check to a National Agency Check with Inquiries.
    The revised clause is applicable to all NASA contracts that require 
contractors to: (1) Have physical or electronic access to NASA's 
computer systems, networks, or IT infrastructure; or (2) use 
information systems to generate, store, or exchange data with NASA or 
on behalf of NASA, regardless of whether the data resides on a NASA or 
a contractor's information system.
    The text at NFS 1804.470 is also proposed to be revised consistent 
with the revised clause.
    This is not a significant regulatory action and, therefore, was not 
subject to review under Section 6(b) of Executive Order 12866, 
Regulatory Planning and Review, dated September 30, 1993. This rule is 
not a major rule under 5 U.S.C. 804.

B. Regulatory Flexibility Act

    This proposed rule is not expected to have a significant economic 
impact on a substantial number of small entities with the meaning of 
the Regulatory Flexibility Act, 5 U.S.C. 601 et seq., because the 
proposed rule summarizes the existing Government-wide IT security 
requirements mandated by, and related to, FISMA.

C. Paperwork Reduction Act

    The Paperwork Reduction Act (Pub. L. 96-511) does not apply because 
the Office of Management and Budget (OMB) has determined that the 
proposed changes to the NFS do not impose information collection 
requirements that require the approval of OMB under 44 U.S.C. 3501, et 
seq.

List of Subjects in 48 CFR Parts 1804 and 1852

    Government procurement.

Tom Luedtke,
Assistant Administrator for Procurement.
    Accordingly, 48 CFR parts 1804 and 1852 are proposed to be amended 
as follows:
    1. The authority citation for 48 CFR parts 1804 and 1852 continues 
to read as follows:

    Authority: 42 U.S.C. 2473(c)(1).

PART 1804--ADMINISTRATIVE MATTERS

    2. Revise sections 1804.470, 1804.470-1, 1804.470-2, 1804.470-3, 
and 1804.470-4 to read as follows:


Sec.  1804.470  Security requirements for unclassified information 
technology (IT) resources.


Sec.  1804.470-1  Scope.

    This section implements NASA's acquisition requirements pertaining 
to Federal policies for the security of unclassified information and 
information systems. Federal policies include the Federal Information 
System Management Act (FISMA) of 2002, Homeland Security Presidential 
Directive (HSPD) 12, Clinger-Cohen Act of 1996 (40 U.S.C. 1401 et 
seq.), Public Law 106-398, section 1061, Government Information 
Security Reform, OMB Circular A-130, Management of Federal Information 
Resources, and the National Institute of Standards and Technology 
(NIST) security requirements and standards. These requirements 
safeguard IT services provided to NASA such as the management, 
operation, maintenance, development, and administration of hardware, 
software, firmware, computer systems, networks, and telecommunications 
systems.


Sec.  1804.470-2  Policy.

    NASA IT security policies and procedures for unclassified 
information and IT are prescribed in NASA Policy Directive (NPD) 2810, 
Security of Information Technology; NASA Procedural Requirements (NPR) 
2810, Security of Information Technology; and interim policy updates in 
the form of NASA Information Technology Requirements (NITR). IT 
services must be performed in accordance with these policies and 
procedures.


Sec.  1804.470-3  IT Security Requirements.

    These IT security requirements cover all NASA contracts in which IT 
plays a role in the provisioning of services or products (e.g., 
research and development, engineering, manufacturing, IT outsourcing, 
human resources, and finance) that support NASA in meeting its 
institutional and mission objectives. These requirements are applicable 
where a contractor or subcontractor must obtain physical or electronic 
(i.e., authentication level 2 and above as defined in NIST Special 
Publication 800-63, Electronic Authentication Guideline) access to 
NASA's computer systems, networks, or IT infrastructure. These 
requirements are also applicable in cases where information categorized 
as low, moderate, or high by the Federal Information Processing 
Standards (FIPS) 199, Standards for Security Categorization of Federal 
Information and Information Systems, is stored, generated, or exchanged 
by NASA or on behalf of NASA by a contractor or

[[Page 43409]]

subcontractor, regardless of whether the information resides on a NASA 
or a contractor/subcontractor's information system.


Sec.  1804.470-4  Contract clause.

    (a) Insert the clause at 1852.204-76, Security Requirements for 
Unclassified Information Technology Resources, in all solicitations and 
contracts when contract performance requires contractors to:
    (1) Have physical or electronic access to NASA's computer systems, 
networks, or IT infrastructure; or
    (2) Use information systems to generate, store, or exchange data 
with NASA or on behalf of NASA, regardless of whether the data resides 
on a NASA or a contractor's information system.
    (b) Paragraph (d) of the clause allows contracting officers to 
waive the requirements of paragraphs (b) and (c)(1) through (3) of the 
clause. Contracting officers must obtain the approval of the:
    (1) Center IT Security Manager before granting any waivers to 
paragraph (b) of the clause; and
    (2) The Center Chief of Security before granting any waivers to 
paragraphs (c)(1) through (3) of the clause.

PART 1852--SOLICITATION PROVISIONS AND CONTRACT CLAUSES

    3. Revise section 1852.204-76 to read as follows:


Sec.  1852.204-76  Security Requirements for Unclassified Information 
Technology Resources.

    As prescribed in 1804.470-4(a), insert the following clause:

Security Requirements for Unclassified Information

Technology Resources

(XX/XX)

    (a) The Contractor shall be responsible for information and 
information technology (IT) security when the Contractor or its 
subcontractors must obtain physical or electronic (i.e., authentication 
level 2 and above as defined in National Institute of Standards and 
Technology (NIST) Special Publication (SP) 800-63, Electronic 
Authentication Guideline) access to NASA's computer systems, networks, 
or IT infrastructure, or where information categorized as low, 
moderate, or high by the Federal Information Processing Standards 
(FIPS) 199, Standards for Security Categorization of Federal 
Information and Information Systems, is stored, generated, or exchanged 
by NASA or on behalf of NASA by a contractor or subcontractor, 
regardless of whether the information resides on a NASA or a 
contractor/subcontractor's information system.
    (b) IT Security Requirements.
    (1) Within 30 days after contract award, a Contractor shall submit 
to the Contracting Officer for NASA approval an IT Security Plan, Risk 
Assessment, and FIPS 199, Standards for Security Categorization of 
Federal Information and Information Systems, Assessment. These plans 
and assessments, including annual updates shall be incorporated into 
the contract as compliance documents.
    (i) The IT system security plan shall be prepared consistent, in 
form and content, with NIST SP 800-18, Guide for Developing Security 
Plans for Federal Information Systems, and any additions/augmentations 
described in NASA Procedural Requirements (NPR) 2810, Security of 
Information Technology. The security plan shall identify and document 
appropriate IT security controls consistent with the sensitivity of the 
information and the requirements of Federal Information Processing 
Standards (FIPS) 200, Recommended Security Controls for Federal 
Information Systems. The plan shall be reviewed and updated in 
accordance with NIST SP 800-26, Security Self-Assessment Guide for 
Information Technology Systems, and FIPS 200, on a yearly basis.
    (ii) The risk assessment shall be prepared consistent, in form and 
content, with NIST SP 800-30, Risk Management Guide for Information 
Technology Systems, and any additions/augmentations described in NPR 
2810. The risk assessment shall be updated on a yearly basis.
    (iii) The FIPS 199 assessment shall identify all information types 
as well as the ``high water mark,'' as defined in FIPS 199, of the 
processed, stored, or transmitted information necessary to fulfill the 
contractual requirements.
    (2) The Contractor shall produce contingency plans consistent, in 
form and content, with NIST SP 800-34, Contingency Planning Guide for 
Information Technology Systems, and any additions/augmentations 
described in NPR 2810. The Contractor shall perform yearly ``Classroom 
Exercises.'' ``Functional Exercises,'' shall be coordinated with the 
Center CIOs and be conducted once every three years, with the first 
conducted within the first two years of contract award. These exercises 
are defined and described in NIST SP 800-34.
    (3) The Contractor shall ensure coordination of its incident 
response team with the NASA Incident Response Center and the NASA 
Security Operations Center.
    (4) The Contractor shall ensure that its employees, in performance 
of the contract, receive annual IT security training in NASA IT 
Security policies, procedures, computer ethics, and best practices in 
accordance with NPR 2810 requirements. The Contractor may use web-based 
training available from NASA to meet this requirement.
    (5) The Contractor shall provide NASA, including the NASA Office of 
Inspector General, access to the Contractor's and subcontractors' 
facilities, installations, operations, documentation, databases, and 
personnel used in performance of the contract. Access shall be provided 
to the extent required to carry out IT security inspection, 
investigation, and/or audits to safeguard against threats and hazards 
to the integrity, availability, and confidentiality of NASA information 
or to the function of computer systems operated on behalf of NASA, and 
to preserve evidence of computer crime. To facilitate mandatory 
reviews, the Contractor shall ensure appropriate compartmentalization 
of NASA information, stored and/or processed, either by information 
systems in direct support of the contract or that are incidental to the 
contract.
    (6) The Contractor shall ensure that all individuals who perform 
tasks as a system administrator, or have authority to perform tasks 
normally performed by a system administrator, demonstrate knowledge 
appropriate to those tasks. Knowledge is demonstrated through the NASA 
System Administrator Security Certification Program. A system 
administrator is one who provides IT services, network services, files 
storage, and/or web services, to someone else other than themselves and 
takes or assumes the responsibility for the security and administrative 
controls of that service. Within 30 days after contract award, the 
Contractor shall provide to the Contracting Officer a list of all 
system administrator positions and personnel filling those positions, 
along with a schedule that ensures certification of all personnel 
within 90 days after contract award. Additionally, the Contractor 
should report all personnel changes which impact system administrator 
positions within 5 days of the personnel change and ensure these 
individuals obtain System Administrator certification within 90 days 
after the change.
    (7) When the Contractor is located at a NASA Center or installation 
or is using NASA IP address space, the Contractor shall--

[[Page 43410]]

    (i) Submit requests for non-NASA provided external Internet 
connections to the Contracting Officer for approval by the Network 
Security Configuration Control Board (NSCCB);
    (ii) Comply with the NASA CIO metrics including patch management, 
operating systems and application configuration guidelines, 
vulnerability scanning, incident reporting, system administrator 
certification, and security training; and
    (iii) Utilize the NASA Public Key Infrastructure (PKI) for all 
encrypted communication or non-repudiation requirements within NASA 
when secure e-mail capability is required.
    (c) Physical and Logical Access Requirements.
    (1) Contractor personnel requiring access to IT systems operated by 
the Contractor for NASA or interconnected to a NASA network shall be 
screened at an appropriate level in accordance with NPR 2810 and 
Chapter 4, NPR 1600.1, NASA Security Program Procedural Requirements. 
NASA shall provide screening, appropriate to the highest risk level, of 
the IT systems and information accessed, using, as a minimum, National 
Agency Check with Inquiries (NACI). The Contractor shall submit the 
required forms to the NASA Center Chief of Security (CCS) within 
fourteen (14) days after contract award or assignment of an individual 
to a position requiring screening. The forms may be obtained from the 
CCS. At the option of NASA, interim access may be granted pending 
completion of the required investigation and final access 
determination. For Contractors who will reside on a NASA Center or 
installation, the security screening required for all required access 
(e.g., installation, facility, IT, information, etc.) is consolidated 
to ensure only one investigation is conducted based on the highest risk 
level. Contractors not residing on a NASA installation will be screened 
based on their IT access risk level determination only. See NPR 1600.1, 
Chapter 4.
    (2) Guidance for selecting the appropriate level of screening is 
based on the risk of adverse impact to NASA missions. NASA defines 
three levels of risk for which screening is required (IT-1 has the 
highest level of risk):
    (i) IT-1-- Individuals having privileged access or limited 
privileged access to systems whose misuse can cause very serious 
adverse impact to NASA missions. These systems include, for example, 
those that can transmit commands directly modifying the behavior of 
spacecraft, satellites or aircraft.
    (ii) IT-2-- Individuals having privileged access or limited 
privileged access to systems whose misuse can cause serious adverse 
impact to NASA missions. These systems include, for example, those that 
can transmit commands directly modifying the behavior of payloads on 
spacecraft, satellites or aircraft; and those that contain the primary 
copy of ``level 1'' information whose cost to replace exceeds one 
million dollars.
    (iii) IT-3-- Individuals having privileged access or limited 
privileged access to systems whose misuse can cause significant adverse 
impact to NASA missions. These systems include, for example, those that 
interconnect with a NASA network in a way that exceeds access by the 
general public, such as bypassing firewalls; and systems operated by 
the Contractor for NASA whose function or information has substantial 
cost to replace, even if these systems are not interconnected with a 
NASA network.
    (3) Screening for individuals shall employ forms appropriate for 
the level of risk as established in Chapter 4, NPR 1600.1.
    (4) The Contractor may conduct its own screening of individuals 
requiring privileged access or limited privileged access provided the 
Contractor can demonstrate to the Contracting Officer that the 
procedures used by the Contractor are equivalent to NASA's personnel 
screening procedures for the risk level assigned for the IT position.
    (5) Subject to approval of the Contracting Officer, the Contractor 
may forgo screening of Contractor personnel for those individuals who 
have proof of a--
    (i) Current or recent national security clearances (within last 
three years);
    (ii) Screening conducted by NASA within the last three years that 
meets or exceeds the screening requirements of the IT position; or
    (iii) Screening conducted by the Contractor, within the last three 
years, that is equivalent to the NASA personnel screening procedures as 
approved by the Contracting Officer and concurred on by the CCS.
    (d) The Contracting Officer may waive the requirements of 
paragraphs (b) and (c)(1) through (c)(3) upon request of the 
Contractor. The Contractor shall provide all relevant information 
requested by the Contracting Officer to support the waiver request.
    (e) The Contractor shall contact the Contracting Officer for any 
documents, information, or forms necessary to comply with the 
requirements of this clause.
    (f) The Contractor shall insert this clause, including this 
paragraph (f), in all subcontracts when the subcontractor is required 
to:
    (1) Have physical or electronic access to NASA's computer systems, 
networks, or IT infrastructure; or
    (2) Use information systems to generate, store, or exchange data 
with NASA or on behalf of NASA, regardless of whether the data resides 
on a NASA or a contractor's information system.

 [FR Doc. E6-12351 Filed 7-31-06; 8:45 am]
BILLING CODE 7510-01-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.