16.10.2014 Views

DoD Instruction 8500.2 - Common Access Card (CAC)

DoD Instruction 8500.2 - Common Access Card (CAC)

DoD Instruction 8500.2 - Common Access Card (CAC)

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

DODI <strong>8500.2</strong>, February 6, 2003<br />

Subject<br />

Area<br />

Control Number, Name and Text<br />

Physical and Environmental<br />

PESL-1<br />

Screen Lock<br />

Unless there is an overriding technical or operational problem, a workstation screen-lock<br />

functionality is associated with each workstation. When activated, the screen-lock function<br />

places an unclassified pattern onto the entire screen of the workstation, totally hiding what<br />

was previously visible on the screen. Such a capability is enabled either by explicit user<br />

action or a specified period of workstation inactivity (e.g., 15 minutes). Once the<br />

workstation screen-lock software is activated, access to the workstation requires<br />

knowledge of a unique authenticator. A screen lock function is not considered a<br />

substitute for logging out (unless a mechanism actually logs out the user when the user<br />

idle time is exceeded).<br />

Physical and Environmental<br />

PETC-2<br />

Temperature Controls<br />

Automatic temperature controls are installed to prevent temperature fluctuations potentially<br />

harmful to personnel or equipment operation.<br />

Physical and Environmental<br />

PETN-1<br />

Environmental Control Training<br />

Employees receive initial and periodic training in the operation of environmental controls.<br />

Physical and Environmental<br />

Personnel<br />

Continuity<br />

Continuity<br />

Continuity<br />

PEVR-1<br />

Voltage Regulators<br />

Automatic voltage control is implemented for key IT assets.<br />

PRRB-1<br />

Security Rules of Behavior or Acceptable Use Policy<br />

A set of rules that describe the IA operations of the <strong>DoD</strong> information system and clearly<br />

delineate IA responsibilities and expected behavior of all personnel is in place. The rules<br />

include the consequences of inconsistent behavior or non-compliance. Signed<br />

acknowledgement of the rules is a condition of access.<br />

COAS-2<br />

Alternate Site Designation<br />

An alternate site is identified that permits the restoration of all mission or business<br />

essential functions.<br />

COBR-1<br />

Protection of Backup and Restoration Assets<br />

Procedures are in place assure the appropriate physical and technical protection of the<br />

backup and restoration hardware, firmware, and software, such as router tables,<br />

compilers, and other security-related system software.<br />

CODB-2<br />

Data Back-up Procedures<br />

Data backup is performed daily, and recovery media are stored off-site at a location that<br />

affords protection of the data in accordance with its mission assurance category and<br />

confidentiality level.<br />

IA Service<br />

Integrity<br />

Availability<br />

Availability<br />

Availability<br />

Availability<br />

Availability<br />

Availability<br />

Availability<br />

73 ENCLOSURE 4, ATTACHMENT 2

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!