Security Requirements for Unclassified Information Technology (IT) Resources, 26560-26563 [E7-9057]

Download as PDF 26560 Federal Register / Vol. 72, No. 90 / Thursday, May 10, 2007 / Rules and Regulations converter or subscription service, may be unprepared for the digital transition when it arrives, and may be unable to obtain critical information in emergencies after the transition. In such instances, consumers would be financially harmed and deprived of service at a critical time. We are concerned that delay in the effective date of the disclosure requirement will result in additional analog-only equipment being sold to uninformed consumers due to the absence of appropriate disclosure, thereby harming consumers and undermining the goal of the rule. Parties subject to the rule will have a reasonable opportunity to comply with it, particularly in light of the fact that it will not be effective until OMB approval. Because delay can result in such harms to consumers and because affected parties will be afforded a reasonable opportunity to comply with the rule, we find that there is good cause to expedite the effective date of this rule. We are also requesting emergency PRA approval from OMB. 38. It is further ordered that the Commission’s Consumer and Governmental Affairs Bureau, Reference Information Center, shall send a copy of this Second Report and Order, including the Final Regulatory Flexibility Analysis, to the Chief Counsel for Advocacy of the Small Business Administration. 39. It is further ordered that the Commission shall send a copy of this Second Report and Order in a report to be sent to Congress and the Government Accountability Office pursuant to the Congressional Review Act, see 5 U.S.C. 801(a)(1)(A). 2. Section 15.117 is amended by adding paragraph (k) to read as follows: (k) The following requirements apply to all responsible parties, as defined in § 2.909 of this chapter, and any person that displays or offers for sale or rent television receiving equipment that is not capable of receiving, decoding and tuning digital signals. (1) Such parties and persons shall place conspicuously and in close proximity to such television broadcast receivers a sign containing, in clear and conspicuous print, the Consumer Alert disclosure text required by paragraph (k)(3) of this section. The text should be in a size of type large enough to be clear, conspicuous and readily legible, consistent with the dimensions of the equipment and the label. The information may be printed on a transparent material and affixed to the screen, if the receiver includes a display, in a manner that is removable by the consumer and does not obscure the picture, or, if the receiver does not include a display, in a prominent location on the device, such as on the top or front of the device, when displayed for sale, or the information in this format may be displayed separately immediately adjacent to each television broadcast receiver offered for sale and clearly associated with the analog-only model to which it pertains. (2) If such parties and persons display or offer for sale or rent such television broadcast receivers via direct mail, catalog, or electronic means, they shall prominently display in close proximity to the images or descriptions of such television broadcast receivers, in clear and conspicuous print, the Consumer Alert disclosure text required by paragraph (k)(3) of this section. The text should be in a size large enough to be clear, conspicuous, and readily legible, consistent with the dimensions of the advertisement or description. (3) Consumer alert. This television receiver has only an analog broadcast tuner and will require a converter box after February 17, 2009, to receive overthe-air broadcasts with an antenna because of the Nation’s transition to digital broadcasting. Analog-only TVs should continue to work as before with cable and satellite TV services, gaming consoles, VCRs, DVD players, and similar products. For more information, call the Federal Communications Commission at 1–888–225–5322 (TTY: 1–888–835–5322) or visit the Commission’s digital television Web site at: https://www.dtv.gov. § 15.117 [FR Doc. 07–2318 Filed 5–9–07; 8:45 am] List of Subjects in 47 CFR Part 15 Radio frequency devices. Federal Communications Commission. Marlene H. Dortch, Secretary. Rule Changes For the reasons discussed in the preamble, the FCC amends 47 CFR part 15 as follows: I PART 15—RADIO FREQUENCY DEVICES 1. The authority citation for part 15 continues to read as follows: cprice-sewell on PRODPC61 with RULES I Authority: 47 U.S.C. 154, 302, 303, 304, 307, 336, and 544A. I * * TV broadcast receivers. * VerDate Aug<31>2005 * * 15:30 May 09, 2007 BILLING CODE 6712–01–P Jkt 211001 PO 00000 Frm 00028 Fmt 4700 Sfmt 4700 NATIONAL AERONAUTICS AND SPACE ADMINISTRATION 48 CFR Parts 1804 and 1852 RIN 2700–AD26 Security Requirements for Unclassified Information Technology (IT) Resources National Aeronautics and Space Administration. ACTION: Final rule. AGENCY: SUMMARY: NASA is amending the clause at NASA FAR Supplement (NFS) 1852.204–76, Security Requirements for Unclassified Information Technology Resources, to reflect the updated requirements of NASA Procedural Requirements (NPR) 2810, ‘‘Security of Information Technology’’. The NPR was recently revised to address increasing cyber threats and to ensure consistency with the Federal Information Security Management Act (FISMA), which requires agencies to protect information and information systems in a manner that is commensurate with the sensitivity of the information processed, transmitted, or stored. EFFECTIVE DATE: This final rule is effective May 10, 2007. FOR FURTHER INFORMATION CONTACT: Ken Stepka, Office of Procurement, Analysis Division, (202) 358–0492, e-mail: ken.stepka@nasa.gov. SUPPLEMENTARY INFORMATION: A. Background NASA published a proposed rule in the Federal Register (71 FR 43408– 43410) on August 1, 2006. The sixty day comment period expired October 2, 2006. Four comments were received from two respondents. A summary of the comments and NASA responses follows. Comment: The clause is ‘‘* * * not appropriate in situations where university contractors develop data and software to which NASA has access and the right to use, but is owned by the university under normal FAR and NFS provisions for university research contracts’’ and should not ‘‘* * * be included when the contractor will simply be delivering software or data in electronic format to the government, unless the government will be the sole and exclusive owner of such delivered software or data * * *. ’’ NASA Response: FISMA requires agencies to protect their information and information systems used or operated by an agency or by a contractor of an agency or other organization on behalf of an agency. This is a data protection, and not an ownership, issue. E:\FR\FM\10MYR1.SGM 10MYR1 cprice-sewell on PRODPC61 with RULES Federal Register / Vol. 72, No. 90 / Thursday, May 10, 2007 / Rules and Regulations Accordingly, the NASA clause which implements the FISMA requirements applies to contracts that require the contractor to process, store, or transmit NASA data, regardless of whether the contractors owns the underlying systems or software. Ownership of systems or software is not a determining factor for clause applicability. We note that the NASA clause is only inserted in contracts when the conditions specified in 1804.470–4 apply. The clause is not used in contracts that merely require the delivery of contractor-owned software. Comment: The industry screening standard requirement for university personnel is the NACLC (National Agency Check + Local Agency Check) which does not satisfy the new requirement in the clause for an NACI (National Agency Check with Inquiries) and a new clearance will need to be obtained under the latter standard. NASA Response: The screening requirement is established by Homeland Security Presidential Directive (HSPD)– 12 for all Federal agencies, and NASA does not have the discretion to revise this standard. Comment: Paragraph (d) of the proposed clause at 1852.204–76 permits the contracting officer to grant waivers to certain of its requirements, but does not provide approval criteria to assist the contracting officer review of the request. NASA Response: Approval of waiver requests depends on the individual circumstances associated with each contract; therefore, a blanket set of approval criteria is inappropriate. Waiver requests will be reviewed and approved as necessary on a case-by-case basis. Comment: The change of the physical security requirement in the proposed rule from a National Agency Check to a National Agency Check with Inquiries creates a concern in that the security measures cited pertain to personnel, not physical, security controls. NASA Response: The cited requirement does not pertain to physical security controls, but rather physical and logical access of personnel into NASA facilities. NASA believes that the clause is clear on this issue and no further change is necessary. Although NASA has not made changes to the proposed rule as a result of public comments, the following changes have been made to the clause at 1852.204–76. These changes are intended to improve the readability and clarify specific requirements of the clause, and NASA does not believe that these changes require publication for public comment. NASA is also deleting VerDate Aug<31>2005 14:29 May 09, 2007 Jkt 211001 NFS 1804.402 since it contains obsolete references. 1. Paragraph (a) of the clause is restructured into two subparagraphs to improve readability. 2. Paragraph (b)(3) is revised to cite the specific NIST SP 800–61 standard for incident reporting and the U.S. Computer Emergency Readiness Team’s (US–CERT) Concept of Operations for reporting security incidents. 3. Paragraph (b)(6) is clarified to specify which system administrators are subject to the NASA System Administrator Security Certification Program. 4. Paragraph (b)(7) is moved to a new paragraph (b)(8). 5. Paragraph (b)(7) is clarified to specify that sensitive but unclassified information is required to be encrypted. 6. Paragraph (f)(2) is clarified to specify closeout procedures related to IT resources at the completion or expiration of the contract. This is not a significant regulatory action and, therefore, was not subject to review under Section 6(b) of Executive Order 12866, Regulatory Planning and Review, dated September 30, 1993. This rule is not a major rule under 5 U.S.C. 804. B. Regulatory Flexibility Act This final rule is not expected to have a significant economic impact on a substantial number of small entities with the meaning of the Regulatory Flexibility Act, 5 U.S.C. 601 et seq., because the rule merely summarizes existing Government-wide IT security requirements mandated by, and related to, FISMA. C. Paperwork Reduction Act The Paperwork Reduction Act (Pub. L. 96–511) does not apply because the Office of Management and Budget (OMB) has determined that the proposed changes to the NFS do not impose information collection requirements that require the approval of OMB under 44 U.S.C. 3501, et seq. List of Subjects in 48 CFR Parts 1804 and 1852 Government procurement. Sheryl Goddard, Acting Assistant Administrator for Procurement. Accordingly, 48 CFR parts 1804 and 1852 are amended as follows: I 1. The authority citation for 48 CFR parts 1804 and 1852 continues to read as follows: I Authority: 42 U.S.C. 2473(c)(1). PO 00000 Frm 00029 Fmt 4700 Sfmt 4700 26561 PART 1804—ADMINISTRATIVE MATTERS 1804.402 [Removed] 2. Section 1804.402 is removed. I 3. Sections 1804.470, 1804.470–1, 1804.470–2 , 1804.470–3, and 1804.470– 4 are revised to read as follows: I 1804.470 Security requirements for unclassified information technology (IT) resources. 1804.470–1 Scope. This section implements NASA’s acquisition requirements pertaining to Federal policies for the security of unclassified information and information systems. Federal policies include the Federal Information System Management Act (FISMA) of 2002, Homeland Security Presidential Directive (HSPD) 12, Clinger-Cohen Act of 1996 (40 U.S.C. 1401 et seq.), OMB Circular A–130, Management of Federal Information Resources, and the National Institute of Standards and Technology (NIST) security requirements and standards. These requirements safeguard IT services provided to NASA such as the management, operation, maintenance, development, and administration of hardware, software, firmware, computer systems, networks, and telecommunications systems. 1804.470–2 Policy. NASA IT security policies and procedures for unclassified information and IT are prescribed in NASA Policy Directive (NPD) 2810, Security of Information Technology; NASA Procedural Requirements (NPR) 2810, Security of Information Technology; and interim policy updates in the form of NASA Information Technology Requirements (NITR). IT services must be performed in accordance with these policies and procedures. 1804.470–3 IT Security requirements. These IT security requirements cover all NASA contracts in which IT plays a role in the provisioning of services or products (e.g., research and development, engineering, manufacturing, IT outsourcing, human resources, and finance) that support NASA in meeting its institutional and mission objectives. These requirements are applicable where a contractor or subcontractor must obtain physical or electronic (i.e., authentication level 2 and above as defined in NIST Special Publication 800–63, Electronic Authentication Guideline) access to NASA’s computer systems, networks, or IT infrastructure. These requirements are also applicable in cases where information categorized as low, E:\FR\FM\10MYR1.SGM 10MYR1 26562 Federal Register / Vol. 72, No. 90 / Thursday, May 10, 2007 / Rules and Regulations moderate, or high by the Federal Information Processing Standards (FIPS) 199, Standards for Security Categorization of Federal Information and Information Systems, is stored, generated, processed, or exchanged by NASA or on behalf of NASA by a contractor or subcontractor, regardless of whether the information resides on a NASA or a contractor/subcontractor’s information system. 1804.470–4 Contract clause. (a) Insert the clause at 1852.204–76, Security Requirements for Unclassified Information Technology Resources, in all solicitations and contracts when contract performance requires contractors to— (1) Have physical or electronic access to NASA’s computer systems, networks, or IT infrastructure; or (2) Use information systems to generate, store, process, or exchange data with NASA or on behalf of NASA, regardless of whether the data resides on a NASA or a contractor’s information system. (b) Paragraph (d) of the clause allows contracting officers to waive the requirements of paragraphs (b) and (c)(1) through (3) of the clause. Contracting officers must obtain the approval of the— (1) Center IT Security Manager before granting any waivers to paragraph (b) of the clause; and (2) The Center Chief of Security before granting any waivers to paragraphs (c)(1) through (3) of the clause. PART 1852—SOLICITATION PROVISIONS AND CONTRACT CLAUSES 4. Section 1852.204–76 is revised to read as follows: I 1852.204–76 Security Requirements for Unclassified Information Technology Resources. cprice-sewell on PRODPC61 with RULES As prescribed in 1804.470–4(a), insert the following clause: Security Requirements for Unclassified Information Technology Resources (MAY 2007) (a) The Contractor shall be responsible for information and information technology (IT) security when— (1) The Contractor or its subcontractors must obtain physical or electronic (i.e., authentication level 2 and above as defined in National Institute of Standards and Technology (NIST) Special Publication (SP) 800–63, Electronic Authentication Guideline) access to NASA’s computer systems, networks, or IT infrastructure; or (2) Information categorized as low, moderate, or high by the Federal Information Processing Standards (FIPS) 199, Standards for Security Categorization of Federal VerDate Aug<31>2005 14:29 May 09, 2007 Jkt 211001 Information and Information Systems is stored, generated, processed, or exchanged by NASA or on behalf of NASA by a contractor or subcontractor, regardless of whether the information resides on a NASA or a contractor/subcontractor’s information system. (b) IT Security Requirements. (1) Within 30 days after contract award, a Contractor shall submit to the Contracting Officer for NASA approval an IT Security Plan, Risk Assessment, and FIPS 199, Standards for Security Categorization of Federal Information and Information Systems, Assessment. These plans and assessments, including annual updates shall be incorporated into the contract as compliance documents. (i) The IT system security plan shall be prepared consistent, in form and content, with NIST SP 800–18, Guide for Developing Security Plans for Federal Information Systems, and any additions/augmentations described in NASA Procedural Requirements (NPR) 2810, Security of Information Technology. The security plan shall identify and document appropriate IT security controls consistent with the sensitivity of the information and the requirements of Federal Information Processing Standards (FIPS) 200, Recommended Security Controls for Federal Information Systems. The plan shall be reviewed and updated in accordance with NIST SP 800–26, Security Self-Assessment Guide for Information Technology Systems, and FIPS 200, on a yearly basis. (ii) The risk assessment shall be prepared consistent, in form and content, with NIST SP 800–30, Risk Management Guide for Information Technology Systems, and any additions/augmentations described in NPR 2810. The risk assessment shall be updated on a yearly basis. (iii) The FIPS 199 assessment shall identify all information types as well as the ‘‘high water mark,’’ as defined in FIPS 199, of the processed, stored, or transmitted information necessary to fulfill the contractual requirements. (2) The Contractor shall produce contingency plans consistent, in form and content, with NIST SP 800–34, Contingency Planning Guide for Information Technology Systems, and any additions/augmentations described in NPR 2810. The Contractor shall perform yearly ‘‘Classroom Exercises.’’ ‘‘Functional Exercises,’’ shall be coordinated with the Center CIOs and be conducted once every three years, with the first conducted within the first two years of contract award. These exercises are defined and described in NIST SP 800–34. (3) The Contractor shall ensure coordination of its incident response team with the NASA Incident Response Center (NASIRC) and the NASA Security Operations Center, ensuring that incidents are reported consistent with NIST SP 800–61, Computer Security Incident Reporting Guide, and the United States Computer Emergency Readiness Team’s (US–CERT) Concept of Operations for reporting security incidents. Specifically, any confirmed incident of a system containing NASA data or controlling NASA assets shall be reported to NASIRC within one hour that results in unauthorized PO 00000 Frm 00030 Fmt 4700 Sfmt 4700 access, loss or modification of NASA data, or denial of service affecting the availability of NASA data. (4) The Contractor shall ensure that its employees, in performance of the contract, receive annual IT security training in NASA IT Security policies, procedures, computer ethics, and best practices in accordance with NPR 2810 requirements. The Contractor may use Web-based training available from NASA to meet this requirement. (5) The Contractor shall provide NASA, including the NASA Office of Inspector General, access to the Contractor’s and subcontractors’ facilities, installations, operations, documentation, databases, and personnel used in performance of the contract. Access shall be provided to the extent required to carry out IT security inspection, investigation, and/or audits to safeguard against threats and hazards to the integrity, availability, and confidentiality of NASA information or to the function of computer systems operated on behalf of NASA, and to preserve evidence of computer crime. To facilitate mandatory reviews, the Contractor shall ensure appropriate compartmentalization of NASA information, stored and/or processed, either by information systems in direct support of the contract or that are incidental to the contract. (6) The Contractor shall ensure that system administrators who perform tasks that have a material impact on IT security and operations demonstrate knowledge appropriate to those tasks. Knowledge is demonstrated through the NASA System Administrator Security Certification Program. A system administrator is one who provides IT services (including network services, file storage, and/or web services) to someone other than themselves and takes or assumes the responsibility for the security and administrative controls of that service. Within 30 days after contract award, the Contractor shall provide to the Contracting Officer a list of all system administrator positions and personnel filling those positions, along with a schedule that ensures certification of all personnel within 90 days after contract award. Additionally, the Contractor should report all personnel changes which impact system administrator positions within 5 days of the personnel change and ensure these individuals obtain System Administrator certification within 90 days after the change. (7) The Contractor shall ensure that NASA’s Sensitive But Unclassified (SBU) information as defined in NPR 1600.1, NASA Security Program Procedural Requirements, which includes privacy information, is encrypted in storage and transmission. (8) When the Contractor is located at a NASA Center or installation or is using NASA IP address space, the Contractor shall— (i) Submit requests for non-NASA provided external Internet connections to the Contracting Officer for approval by the Network Security Configuration Control Board (NSCCB); (ii) Comply with the NASA CIO metrics including patch management, operating systems and application configuration guidelines, vulnerability scanning, incident E:\FR\FM\10MYR1.SGM 10MYR1 cprice-sewell on PRODPC61 with RULES Federal Register / Vol. 72, No. 90 / Thursday, May 10, 2007 / Rules and Regulations reporting, system administrator certification, and security training; and (iii) Utilize the NASA Public Key Infrastructure (PKI) for all encrypted communication or non-repudiation requirements within NASA when secure email capability is required. (c) Physical and Logical Access Requirements. (1) Contractor personnel requiring access to IT systems operated by the Contractor for NASA or interconnected to a NASA network shall be screened at an appropriate level in accordance with NPR 2810 and Chapter 4, NPR 1600.1, NASA Security Program Procedural Requirements. NASA shall provide screening, appropriate to the highest risk level, of the IT systems and information accessed, using, as a minimum, National Agency Check with Inquiries (NACI). The Contractor shall submit the required forms to the NASA Center Chief of Security (CCS) within fourteen (14) days after contract award or assignment of an individual to a position requiring screening. The forms may be obtained from the CCS. At the option of NASA, interim access may be granted pending completion of the required investigation and final access determination. For Contractors who will reside on a NASA Center or installation, the security screening required for all required access (e.g., installation, facility, IT, information, etc.) is consolidated to ensure only one investigation is conducted based on the highest risk level. Contractors not residing on a NASA installation will be screened based on their IT access risk level determination only. See NPR 1600.1, Chapter 4. (2) Guidance for selecting the appropriate level of screening is based on the risk of adverse impact to NASA missions. NASA defines three levels of risk for which screening is required (IT–1 has the highest level of risk). (i) IT–1—Individuals having privileged access or limited privileged access to systems whose misuse can cause very serious adverse impact to NASA missions. These systems include, for example, those that can transmit commands directly modifying the behavior of spacecraft, satellites or aircraft. (ii) IT–2—Individuals having privileged access or limited privileged access to systems whose misuse can cause serious adverse impact to NASA missions. These systems include, for example, those that can transmit commands directly modifying the behavior of payloads on spacecraft, satellites or aircraft; and those that contain the primary copy of ‘‘level 1’’ information whose cost to replace exceeds one million dollars. (iii) IT–3—Individuals having privileged access or limited privileged access to systems whose misuse can cause significant adverse impact to NASA missions. These systems include, for example, those that interconnect with a NASA network in a way that exceeds access by the general public, such as bypassing firewalls; and systems operated by the Contractor for NASA whose function or information has substantial cost to replace, even if these systems are not interconnected with a NASA network. (3) Screening for individuals shall employ forms appropriate for the level of risk as established in Chapter 4, NPR 1600.1. VerDate Aug<31>2005 15:30 May 09, 2007 Jkt 211001 (4) The Contractor may conduct its own screening of individuals requiring privileged access or limited privileged access provided the Contractor can demonstrate to the Contracting Officer that the procedures used by the Contractor are equivalent to NASA’s personnel screening procedures for the risk level assigned for the IT position. (5) Subject to approval of the Contracting Officer, the Contractor may forgo screening of Contractor personnel for those individuals who have proof of a— (i) Current or recent national security clearances (within last three years); (ii) Screening conducted by NASA within the last three years that meets or exceeds the screening requirements of the IT position; or (iii) Screening conducted by the Contractor, within the last three years, that is equivalent to the NASA personnel screening procedures as approved by the Contracting Officer and concurred on by the CCS. (d) The Contracting Officer may waive the requirements of paragraphs (b) and (c)(1) through (c)(3) upon request of the Contractor. The Contractor shall provide all relevant information requested by the Contracting Officer to support the waiver request. (e) The Contractor shall contact the Contracting Officer for any documents, information, or forms necessary to comply with the requirements of this clause. (f) At the completion of the contract, the contractor shall return all NASA information and IT resources provided to the contractor during the performance of the contract and certify that all NASA information has been purged from contractor-owned systems used in the performance of the contract. (g) The Contractor shall insert this clause, including this paragraph (g), in all subcontracts: (1) Have physical or electronic access to NASA’s computer systems, networks, or IT infrastructure; or (2) Use information systems to generate, store, process, or exchange data with NASA or on behalf of NASA, regardless of whether the data resides on a NASA or a contractor’s information system. (End of clause) [FR Doc. E7–9057 Filed 5–9–07; 8:45 am] BILLING CODE 7510–01–P PO 00000 26563 DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration 50 CFR Part 648 [Docket No. 070321063–7098–02; I.D. 031607E] RIN 0648–AV22 Magnuson-Stevens Fishery Conservation and Management Act Provisions; Fisheries of the Northeastern United States; Northeast Multispecies Fishery; 2007 Georges Bank Cod Fixed Gear Sector Operations Plan and Agreement and Allocation of Georges Bank Cod Total Allowable Catch National Marine Fisheries Service (NMFS), National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Final rule. AGENCY: SUMMARY: NMFS announces approval of an Operations Plan and Sector Contract for the Georges Bank (GB) Cod Fixed Gear Sector (Fixed Gear Sector) entitled: ‘‘GB Cod Fixed Gear Sector Operations Plan and Agreement’’ (together referred to as the Sector Operations Plan), and the associated allocation of GB cod for fishing year (FY) 2007. The intent of this action is to allow regulated harvest of Northeast (NE) multispecies by the Fixed Gear Sector, consistent with the Operations Plan and objectives of the NE Multispecies Fishery Management Plan (FMP). DATES: Effective May 4, 2007, through April 30, 2008. ADDRESSES: Copies of the Fixed Gear Sector Operations Plan and the Environmental Assessment (EA) are available upon request from the NE Regional Office at the following mailing address: George H. Darcy, Assistant Regional Administrator for Sustainable Fisheries, NMFS, Northeast Regional Office, 1 Blackburn Drive, Gloucester, MA 01930. These documents may also be requested by calling (978) 281–9315. FOR FURTHER INFORMATION CONTACT: Mark Grant, Fishery Management Specialist, phone (978) 281–9145, fax (978) 281–9135, e-mail Mark.Grant@NOAA.gov. SUPPLEMENTARY INFORMATION: Framework Adjustment (FW) 42 (71 FR 62156, October 23, 2006) authorized the Fixed Gear Sector and authorized the Regional Administrator to allocate a GB cod total allowable catch (TAC) to the Fixed Gear Sector and exempt members from FMP restrictions on an annual Frm 00031 Fmt 4700 Sfmt 4700 E:\FR\FM\10MYR1.SGM 10MYR1

Agencies

[Federal Register Volume 72, Number 90 (Thursday, May 10, 2007)]
[Rules and Regulations]
[Pages 26560-26563]
From the Federal Register Online via the Government Printing Office [www.gpo.gov]
[FR Doc No: E7-9057]


=======================================================================
-----------------------------------------------------------------------

NATIONAL AERONAUTICS AND SPACE ADMINISTRATION

48 CFR Parts 1804 and 1852

RIN 2700-AD26


Security Requirements for Unclassified Information Technology 
(IT) Resources

AGENCY: National Aeronautics and Space Administration.

ACTION: Final rule.

-----------------------------------------------------------------------

SUMMARY: NASA is amending the clause at NASA FAR Supplement (NFS) 
1852.204-76, Security Requirements for Unclassified Information 
Technology Resources, to reflect the updated requirements of NASA 
Procedural Requirements (NPR) 2810, ``Security of Information 
Technology''. The NPR was recently revised to address increasing cyber 
threats and to ensure consistency with the Federal Information Security 
Management Act (FISMA), which requires agencies to protect information 
and information systems in a manner that is commensurate with the 
sensitivity of the information processed, transmitted, or stored.

EFFECTIVE DATE: This final rule is effective May 10, 2007.

FOR FURTHER INFORMATION CONTACT: Ken Stepka, Office of Procurement, 
Analysis Division, (202) 358-0492, e-mail: ken.stepka@nasa.gov.

SUPPLEMENTARY INFORMATION:

A. Background

    NASA published a proposed rule in the Federal Register (71 FR 
43408-43410) on August 1, 2006. The sixty day comment period expired 
October 2, 2006. Four comments were received from two respondents. A 
summary of the comments and NASA responses follows.
    Comment: The clause is ``* * * not appropriate in situations where 
university contractors develop data and software to which NASA has 
access and the right to use, but is owned by the university under 
normal FAR and NFS provisions for university research contracts'' and 
should not ``* * * be included when the contractor will simply be 
delivering software or data in electronic format to the government, 
unless the government will be the sole and exclusive owner of such 
delivered software or data * * *. ''
    NASA Response: FISMA requires agencies to protect their information 
and information systems used or operated by an agency or by a 
contractor of an agency or other organization on behalf of an agency. 
This is a data protection, and not an ownership, issue.

[[Page 26561]]

Accordingly, the NASA clause which implements the FISMA requirements 
applies to contracts that require the contractor to process, store, or 
transmit NASA data, regardless of whether the contractors owns the 
underlying systems or software. Ownership of systems or software is not 
a determining factor for clause applicability. We note that the NASA 
clause is only inserted in contracts when the conditions specified in 
1804.470-4 apply. The clause is not used in contracts that merely 
require the delivery of contractor-owned software.
    Comment: The industry screening standard requirement for university 
personnel is the NACLC (National Agency Check + Local Agency Check) 
which does not satisfy the new requirement in the clause for an NACI 
(National Agency Check with Inquiries) and a new clearance will need to 
be obtained under the latter standard.
    NASA Response: The screening requirement is established by Homeland 
Security Presidential Directive (HSPD)-12 for all Federal agencies, and 
NASA does not have the discretion to revise this standard.
    Comment: Paragraph (d) of the proposed clause at 1852.204-76 
permits the contracting officer to grant waivers to certain of its 
requirements, but does not provide approval criteria to assist the 
contracting officer review of the request.
    NASA Response: Approval of waiver requests depends on the 
individual circumstances associated with each contract; therefore, a 
blanket set of approval criteria is inappropriate. Waiver requests will 
be reviewed and approved as necessary on a case-by-case basis.
    Comment: The change of the physical security requirement in the 
proposed rule from a National Agency Check to a National Agency Check 
with Inquiries creates a concern in that the security measures cited 
pertain to personnel, not physical, security controls.
    NASA Response: The cited requirement does not pertain to physical 
security controls, but rather physical and logical access of personnel 
into NASA facilities. NASA believes that the clause is clear on this 
issue and no further change is necessary.
    Although NASA has not made changes to the proposed rule as a result 
of public comments, the following changes have been made to the clause 
at 1852.204-76. These changes are intended to improve the readability 
and clarify specific requirements of the clause, and NASA does not 
believe that these changes require publication for public comment. NASA 
is also deleting NFS 1804.402 since it contains obsolete references.
    1. Paragraph (a) of the clause is restructured into two 
subparagraphs to improve readability.
    2. Paragraph (b)(3) is revised to cite the specific NIST SP 800-61 
standard for incident reporting and the U.S. Computer Emergency 
Readiness Team's (US-CERT) Concept of Operations for reporting security 
incidents.
    3. Paragraph (b)(6) is clarified to specify which system 
administrators are subject to the NASA System Administrator Security 
Certification Program.
    4. Paragraph (b)(7) is moved to a new paragraph (b)(8).
    5. Paragraph (b)(7) is clarified to specify that sensitive but 
unclassified information is required to be encrypted.
    6. Paragraph (f)(2) is clarified to specify closeout procedures 
related to IT resources at the completion or expiration of the 
contract.
    This is not a significant regulatory action and, therefore, was not 
subject to review under Section 6(b) of Executive Order 12866, 
Regulatory Planning and Review, dated September 30, 1993. This rule is 
not a major rule under 5 U.S.C. 804.

B. Regulatory Flexibility Act

    This final rule is not expected to have a significant economic 
impact on a substantial number of small entities with the meaning of 
the Regulatory Flexibility Act, 5 U.S.C. 601 et seq., because the rule 
merely summarizes existing Government-wide IT security requirements 
mandated by, and related to, FISMA.

C. Paperwork Reduction Act

    The Paperwork Reduction Act (Pub. L. 96-511) does not apply because 
the Office of Management and Budget (OMB) has determined that the 
proposed changes to the NFS do not impose information collection 
requirements that require the approval of OMB under 44 U.S.C. 3501, et 
seq.

List of Subjects in 48 CFR Parts 1804 and 1852

    Government procurement.

Sheryl Goddard,
Acting Assistant Administrator for Procurement.

0
Accordingly, 48 CFR parts 1804 and 1852 are amended as follows:
0
1. The authority citation for 48 CFR parts 1804 and 1852 continues to 
read as follows:

    Authority: 42 U.S.C. 2473(c)(1).

PART 1804--ADMINISTRATIVE MATTERS


 1804.402  [Removed]

0
2. Section 1804.402 is removed.

0
3. Sections 1804.470, 1804.470-1, 1804.470-2 , 1804.470-3, and 
1804.470-4 are revised to read as follows:


1804.470  Security requirements for unclassified information technology 
(IT) resources.


1804.470-1  Scope.

    This section implements NASA's acquisition requirements pertaining 
to Federal policies for the security of unclassified information and 
information systems. Federal policies include the Federal Information 
System Management Act (FISMA) of 2002, Homeland Security Presidential 
Directive (HSPD) 12, Clinger-Cohen Act of 1996 (40 U.S.C. 1401 et 
seq.), OMB Circular A-130, Management of Federal Information Resources, 
and the National Institute of Standards and Technology (NIST) security 
requirements and standards. These requirements safeguard IT services 
provided to NASA such as the management, operation, maintenance, 
development, and administration of hardware, software, firmware, 
computer systems, networks, and telecommunications systems.


1804.470-2  Policy.

    NASA IT security policies and procedures for unclassified 
information and IT are prescribed in NASA Policy Directive (NPD) 2810, 
Security of Information Technology; NASA Procedural Requirements (NPR) 
2810, Security of Information Technology; and interim policy updates in 
the form of NASA Information Technology Requirements (NITR). IT 
services must be performed in accordance with these policies and 
procedures.


1804.470-3  IT Security requirements.

    These IT security requirements cover all NASA contracts in which IT 
plays a role in the provisioning of services or products (e.g., 
research and development, engineering, manufacturing, IT outsourcing, 
human resources, and finance) that support NASA in meeting its 
institutional and mission objectives. These requirements are applicable 
where a contractor or subcontractor must obtain physical or electronic 
(i.e., authentication level 2 and above as defined in NIST Special 
Publication 800-63, Electronic Authentication Guideline) access to 
NASA's computer systems, networks, or IT infrastructure. These 
requirements are also applicable in cases where information categorized 
as low,

[[Page 26562]]

moderate, or high by the Federal Information Processing Standards 
(FIPS) 199, Standards for Security Categorization of Federal 
Information and Information Systems, is stored, generated, processed, 
or exchanged by NASA or on behalf of NASA by a contractor or 
subcontractor, regardless of whether the information resides on a NASA 
or a contractor/subcontractor's information system.


1804.470-4  Contract clause.

    (a) Insert the clause at 1852.204-76, Security Requirements for 
Unclassified Information Technology Resources, in all solicitations and 
contracts when contract performance requires contractors to--
    (1) Have physical or electronic access to NASA's computer systems, 
networks, or IT infrastructure; or
    (2) Use information systems to generate, store, process, or 
exchange data with NASA or on behalf of NASA, regardless of whether the 
data resides on a NASA or a contractor's information system.
    (b) Paragraph (d) of the clause allows contracting officers to 
waive the requirements of paragraphs (b) and (c)(1) through (3) of the 
clause. Contracting officers must obtain the approval of the--
    (1) Center IT Security Manager before granting any waivers to 
paragraph (b) of the clause; and
    (2) The Center Chief of Security before granting any waivers to 
paragraphs (c)(1) through (3) of the clause.

PART 1852--SOLICITATION PROVISIONS AND CONTRACT CLAUSES

0
4. Section 1852.204-76 is revised to read as follows:


1852.204-76  Security Requirements for Unclassified Information 
Technology Resources.

    As prescribed in 1804.470-4(a), insert the following clause:

Security Requirements for Unclassified Information Technology Resources 
(MAY 2007)

    (a) The Contractor shall be responsible for information and 
information technology (IT) security when--
    (1) The Contractor or its subcontractors must obtain physical or 
electronic (i.e., authentication level 2 and above as defined in 
National Institute of Standards and Technology (NIST) Special 
Publication (SP) 800-63, Electronic Authentication Guideline) access 
to NASA's computer systems, networks, or IT infrastructure; or
    (2) Information categorized as low, moderate, or high by the 
Federal Information Processing Standards (FIPS) 199, Standards for 
Security Categorization of Federal Information and Information 
Systems is stored, generated, processed, or exchanged by NASA or on 
behalf of NASA by a contractor or subcontractor, regardless of 
whether the information resides on a NASA or a contractor/
subcontractor's information system.
    (b) IT Security Requirements.
    (1) Within 30 days after contract award, a Contractor shall 
submit to the Contracting Officer for NASA approval an IT Security 
Plan, Risk Assessment, and FIPS 199, Standards for Security 
Categorization of Federal Information and Information Systems, 
Assessment. These plans and assessments, including annual updates 
shall be incorporated into the contract as compliance documents.
    (i) The IT system security plan shall be prepared consistent, in 
form and content, with NIST SP 800-18, Guide for Developing Security 
Plans for Federal Information Systems, and any additions/
augmentations described in NASA Procedural Requirements (NPR) 2810, 
Security of Information Technology. The security plan shall identify 
and document appropriate IT security controls consistent with the 
sensitivity of the information and the requirements of Federal 
Information Processing Standards (FIPS) 200, Recommended Security 
Controls for Federal Information Systems. The plan shall be reviewed 
and updated in accordance with NIST SP 800-26, Security Self-
Assessment Guide for Information Technology Systems, and FIPS 200, 
on a yearly basis.
    (ii) The risk assessment shall be prepared consistent, in form 
and content, with NIST SP 800-30, Risk Management Guide for 
Information Technology Systems, and any additions/augmentations 
described in NPR 2810. The risk assessment shall be updated on a 
yearly basis.
    (iii) The FIPS 199 assessment shall identify all information 
types as well as the ``high water mark,'' as defined in FIPS 199, of 
the processed, stored, or transmitted information necessary to 
fulfill the contractual requirements.
    (2) The Contractor shall produce contingency plans consistent, 
in form and content, with NIST SP 800-34, Contingency Planning Guide 
for Information Technology Systems, and any additions/augmentations 
described in NPR 2810. The Contractor shall perform yearly 
``Classroom Exercises.'' ``Functional Exercises,'' shall be 
coordinated with the Center CIOs and be conducted once every three 
years, with the first conducted within the first two years of 
contract award. These exercises are defined and described in NIST SP 
800-34.
    (3) The Contractor shall ensure coordination of its incident 
response team with the NASA Incident Response Center (NASIRC) and 
the NASA Security Operations Center, ensuring that incidents are 
reported consistent with NIST SP 800-61, Computer Security Incident 
Reporting Guide, and the United States Computer Emergency Readiness 
Team's (US-CERT) Concept of Operations for reporting security 
incidents. Specifically, any confirmed incident of a system 
containing NASA data or controlling NASA assets shall be reported to 
NASIRC within one hour that results in unauthorized access, loss or 
modification of NASA data, or denial of service affecting the 
availability of NASA data.
    (4) The Contractor shall ensure that its employees, in 
performance of the contract, receive annual IT security training in 
NASA IT Security policies, procedures, computer ethics, and best 
practices in accordance with NPR 2810 requirements. The Contractor 
may use Web-based training available from NASA to meet this 
requirement.
    (5) The Contractor shall provide NASA, including the NASA Office 
of Inspector General, access to the Contractor's and subcontractors' 
facilities, installations, operations, documentation, databases, and 
personnel used in performance of the contract. Access shall be 
provided to the extent required to carry out IT security inspection, 
investigation, and/or audits to safeguard against threats and 
hazards to the integrity, availability, and confidentiality of NASA 
information or to the function of computer systems operated on 
behalf of NASA, and to preserve evidence of computer crime. To 
facilitate mandatory reviews, the Contractor shall ensure 
appropriate compartmentalization of NASA information, stored and/or 
processed, either by information systems in direct support of the 
contract or that are incidental to the contract.
    (6) The Contractor shall ensure that system administrators who 
perform tasks that have a material impact on IT security and 
operations demonstrate knowledge appropriate to those tasks. 
Knowledge is demonstrated through the NASA System Administrator 
Security Certification Program. A system administrator is one who 
provides IT services (including network services, file storage, and/
or web services) to someone other than themselves and takes or 
assumes the responsibility for the security and administrative 
controls of that service. Within 30 days after contract award, the 
Contractor shall provide to the Contracting Officer a list of all 
system administrator positions and personnel filling those 
positions, along with a schedule that ensures certification of all 
personnel within 90 days after contract award. Additionally, the 
Contractor should report all personnel changes which impact system 
administrator positions within 5 days of the personnel change and 
ensure these individuals obtain System Administrator certification 
within 90 days after the change.
    (7) The Contractor shall ensure that NASA's Sensitive But 
Unclassified (SBU) information as defined in NPR 1600.1, NASA 
Security Program Procedural Requirements, which includes privacy 
information, is encrypted in storage and transmission.
    (8) When the Contractor is located at a NASA Center or 
installation or is using NASA IP address space, the Contractor 
shall--
    (i) Submit requests for non-NASA provided external Internet 
connections to the Contracting Officer for approval by the Network 
Security Configuration Control Board (NSCCB);
    (ii) Comply with the NASA CIO metrics including patch 
management, operating systems and application configuration 
guidelines, vulnerability scanning, incident

[[Page 26563]]

reporting, system administrator certification, and security 
training; and
    (iii) Utilize the NASA Public Key Infrastructure (PKI) for all 
encrypted communication or non-repudiation requirements within NASA 
when secure email capability is required.
    (c) Physical and Logical Access Requirements.
    (1) Contractor personnel requiring access to IT systems operated 
by the Contractor for NASA or interconnected to a NASA network shall 
be screened at an appropriate level in accordance with NPR 2810 and 
Chapter 4, NPR 1600.1, NASA Security Program Procedural 
Requirements. NASA shall provide screening, appropriate to the 
highest risk level, of the IT systems and information accessed, 
using, as a minimum, National Agency Check with Inquiries (NACI). 
The Contractor shall submit the required forms to the NASA Center 
Chief of Security (CCS) within fourteen (14) days after contract 
award or assignment of an individual to a position requiring 
screening. The forms may be obtained from the CCS. At the option of 
NASA, interim access may be granted pending completion of the 
required investigation and final access determination. For 
Contractors who will reside on a NASA Center or installation, the 
security screening required for all required access (e.g., 
installation, facility, IT, information, etc.) is consolidated to 
ensure only one investigation is conducted based on the highest risk 
level. Contractors not residing on a NASA installation will be 
screened based on their IT access risk level determination only. See 
NPR 1600.1, Chapter 4.
    (2) Guidance for selecting the appropriate level of screening is 
based on the risk of adverse impact to NASA missions. NASA defines 
three levels of risk for which screening is required (IT-1 has the 
highest level of risk).
    (i) IT-1--Individuals having privileged access or limited 
privileged access to systems whose misuse can cause very serious 
adverse impact to NASA missions. These systems include, for example, 
those that can transmit commands directly modifying the behavior of 
spacecraft, satellites or aircraft.
    (ii) IT-2--Individuals having privileged access or limited 
privileged access to systems whose misuse can cause serious adverse 
impact to NASA missions. These systems include, for example, those 
that can transmit commands directly modifying the behavior of 
payloads on spacecraft, satellites or aircraft; and those that 
contain the primary copy of ``level 1'' information whose cost to 
replace exceeds one million dollars.
    (iii) IT-3--Individuals having privileged access or limited 
privileged access to systems whose misuse can cause significant 
adverse impact to NASA missions. These systems include, for example, 
those that interconnect with a NASA network in a way that exceeds 
access by the general public, such as bypassing firewalls; and 
systems operated by the Contractor for NASA whose function or 
information has substantial cost to replace, even if these systems 
are not interconnected with a NASA network.
    (3) Screening for individuals shall employ forms appropriate for 
the level of risk as established in Chapter 4, NPR 1600.1.
    (4) The Contractor may conduct its own screening of individuals 
requiring privileged access or limited privileged access provided 
the Contractor can demonstrate to the Contracting Officer that the 
procedures used by the Contractor are equivalent to NASA's personnel 
screening procedures for the risk level assigned for the IT 
position.
    (5) Subject to approval of the Contracting Officer, the 
Contractor may forgo screening of Contractor personnel for those 
individuals who have proof of a--
    (i) Current or recent national security clearances (within last 
three years);
    (ii) Screening conducted by NASA within the last three years 
that meets or exceeds the screening requirements of the IT position; 
or
    (iii) Screening conducted by the Contractor, within the last 
three years, that is equivalent to the NASA personnel screening 
procedures as approved by the Contracting Officer and concurred on 
by the CCS.
    (d) The Contracting Officer may waive the requirements of 
paragraphs (b) and (c)(1) through (c)(3) upon request of the 
Contractor. The Contractor shall provide all relevant information 
requested by the Contracting Officer to support the waiver request.
    (e) The Contractor shall contact the Contracting Officer for any 
documents, information, or forms necessary to comply with the 
requirements of this clause.
    (f) At the completion of the contract, the contractor shall 
return all NASA information and IT resources provided to the 
contractor during the performance of the contract and certify that 
all NASA information has been purged from contractor-owned systems 
used in the performance of the contract.
    (g) The Contractor shall insert this clause, including this 
paragraph (g), in all subcontracts:
    (1) Have physical or electronic access to NASA's computer 
systems, networks, or IT infrastructure; or
    (2) Use information systems to generate, store, process, or 
exchange data with NASA or on behalf of NASA, regardless of whether 
the data resides on a NASA or a contractor's information system.

    (End of clause)

[FR Doc. E7-9057 Filed 5-9-07; 8:45 am]
BILLING CODE 7510-01-P
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.