03.05.2015 Views

ACP 122 (F) - Multilateral Planners Conference

ACP 122 (F) - Multilateral Planners Conference

ACP 122 (F) - Multilateral Planners Conference

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

UNCLASSIFIED<br />

<strong>ACP</strong> <strong>122</strong>(F)<br />

e. Degree of Access. The Sponsor(s)/Owner(s) are to establish a written<br />

understanding of the degree of access that users of the system will have to other<br />

connected systems;<br />

f. Access Control. The Sponsor(s)/Owner(s) are to determine the access controls<br />

that will be used to control users of the system when accessing the other connected<br />

systems;<br />

g. Network Management Disputes. The Sponsor(s)/Owner(s) are to establish a<br />

process by which dispute over network management issues can be resolved or be<br />

taken to a higher authority for resolution; and<br />

h. Information Aggregation. The Sponsor(s)/Owner(s) are to recommend to the<br />

national Defence Security Authority, the information aggregation situations that<br />

may require a security classification higher than that of the individual information<br />

items to which access is allowed on the network.<br />

INTEROPERABILITY CONCERNS<br />

816. The following concerns regarding interoperability should be considered when<br />

implementing a combined CIS:<br />

a. Just as a network needs to be managed from a performance point of view, there<br />

should also be some mechanism (or agency) to cater for the effective management<br />

of NETSEC measures (including configuration management, security<br />

management, key management, and access control);<br />

b. While cryptography can effectively deal with confidentiality and integrity in a<br />

network, other measures are necessary to deal with availability issues (fault<br />

tolerance, recovery procedures and redundancy); and<br />

c. The interconnections of a CIS to other systems (e.g., within a Service, or with<br />

allies) must be identified and it must be confirmed that the implementation of the<br />

interconnections satisfies the needs for adequate protection of sensitive<br />

information on the system. The adequate protection of sensitive information on<br />

the system is affected by the potential sharing of sensitive information with other<br />

members of the organisation and with other governments and organisations.<br />

8-4 Original<br />

UNCLASSIFIED

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!