16.10.2014 Views

DoD Instruction 8500.2 - Common Access Card (CAC)

DoD Instruction 8500.2 - Common Access Card (CAC)

DoD Instruction 8500.2 - Common Access Card (CAC)

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

DODI <strong>8500.2</strong>, February 6, 2003<br />

Subject<br />

Area<br />

Control Number, Name and Text<br />

Physical and Environmental<br />

PESL-1<br />

Screen Lock<br />

Unless there is an overriding technical or operational problem, a workstation screen-lock<br />

functionality is associated with each workstation. When activated, the screen-lock function<br />

places an unclassified pattern onto the entire screen of the workstation, totally hiding what<br />

was previously visible on the screen. Such a capability is enabled either by explicit user<br />

action or a specified period of workstation inactivity (e.g., 15 minutes). Once the<br />

workstation screen-lock software is activated, access to the workstation requires<br />

knowledge of a unique authenticator. A screen lock function is not considered a<br />

substitute for logging out (unless a mechanism actually logs out the user when the user<br />

idle time is exceeded).<br />

Physical and Environmental<br />

PETC-2<br />

Temperature Controls<br />

Automatic temperature controls are installed to prevent temperature fluctuations potentially<br />

harmful to personnel or equipment operation.<br />

Physical and Environmental<br />

PETN-1<br />

Environmental Control Training<br />

Employees receive initial and periodic training in the operation of environmental controls.<br />

Physical and Environmental<br />

Personnel<br />

Continuity<br />

Continuity<br />

Continuity<br />

PEVR-1<br />

Voltage Regulators<br />

Automatic voltage control is implemented for key IT assets.<br />

PRRB-1<br />

Security Rules of Behavior or Acceptable Use Policy<br />

A set of rules that describe the IA operations of the <strong>DoD</strong> information system and clearly<br />

delineate IA responsibilities and expected behavior of all personnel is in place. The rules<br />

include the consequences of inconsistent behavior or non-compliance. Signed<br />

acknowledgement of the rules is a condition of access.<br />

COAS-2<br />

Alternate Site Designation<br />

An alternate site is identified that permits the restoration of all mission or business<br />

essential functions.<br />

COBR-1<br />

Protection of Backup and Restoration Assets<br />

Procedures are in place assure the appropriate physical and technical protection of the<br />

backup and restoration hardware, firmware, and software, such as router tables,<br />

compilers, and other security-related system software.<br />

CODB-3<br />

Data Backup Procedures<br />

Data backup is accomplished by maintaining a redundant secondary system, not<br />

collocated, that can be activated without loss of data or disruption to the operation.<br />

IA Service<br />

Integrity<br />

Availability<br />

Availability<br />

Availability<br />

Availability<br />

Availability<br />

Availability<br />

Availability<br />

62 ENCLOSURE 4, ATTACHMENT 1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!