Sunteți pe pagina 1din 3

43408 Federal Register / Vol. 71, No.

147 / Tuesday, August 1, 2006 / Proposed Rules

NATIONAL AERONAUTICS AND • Change of the physical security § 1804.470 Security requirements for
SPACE ADMINISTRATION requirement from a National Agency unclassified information technology (IT)
Check to a National Agency Check with resources.
48 CFR Parts 1804 and 1852 Inquiries. § 1804.470–1 Scope.
The revised clause is applicable to all This section implements NASA’s
RIN: 2700–AD26
NASA contracts that require contractors acquisition requirements pertaining to
Security Requirements for Unclassified to: (1) Have physical or electronic access Federal policies for the security of
Information Technology (IT) Resources to NASA’s computer systems, networks, unclassified information and
or IT infrastructure; or (2) use information systems. Federal policies
AGENCY: National Aeronautics and information systems to generate, store, include the Federal Information System
Space Administration. or exchange data with NASA or on Management Act (FISMA) of 2002,
ACTION: Proposed rule. behalf of NASA, regardless of whether Homeland Security Presidential
the data resides on a NASA or a Directive (HSPD) 12, Clinger-Cohen Act
SUMMARY: NASA is proposing to amend contractor’s information system. of 1996 (40 U.S.C. 1401 et seq.), Public
the clause at NASA FAR Supplement Law 106–398, section 1061, Government
The text at NFS 1804.470 is also
(NFS) 1852.204–76, Security Information Security Reform, OMB
proposed to be revised consistent with
Requirements for Unclassified Circular A–130, Management of Federal
the revised clause.
Information Technology Resources, to Information Resources, and the National
reflect the updated requirements of This is not a significant regulatory Institute of Standards and Technology
NASA Procedural Requirements (NPR) action and, therefore, was not subject to (NIST) security requirements and
2810, ‘‘Security of Information review under Section 6(b) of Executive standards. These requirements
Technology’’. The NPR was recently Order 12866, Regulatory Planning and safeguard IT services provided to NASA
revised to address increasing cyber Review, dated September 30, 1993. This such as the management, operation,
threats and to ensure consistency with rule is not a major rule under 5 U.S.C. maintenance, development, and
the Federal Information Security 804. administration of hardware, software,
Management Act (FISMA), which B. Regulatory Flexibility Act firmware, computer systems, networks,
requires agencies to protect information and telecommunications systems.
and information systems in a manner This proposed rule is not expected to
that is commensurate with the § 1804.470–2 Policy.
have a significant economic impact on
sensitivity of the information processed, a substantial number of small entities NASA IT security policies and
transmitted, or stored. with the meaning of the Regulatory procedures for unclassified information
Flexibility Act, 5 U.S.C. 601 et seq., and IT are prescribed in NASA Policy
DATES: Comments should be submitted
because the proposed rule summarizes Directive (NPD) 2810, Security of
on or before October 2, 2006.
the existing Government-wide IT Information Technology; NASA
ADDRESSES: Interested parties may Procedural Requirements (NPR) 2810,
submit comments, identified by RIN security requirements mandated by, and
related to, FISMA. Security of Information Technology; and
number 2700–AD26, via the Federal interim policy updates in the form of
eRulemaking Portal: http:// C. Paperwork Reduction Act NASA Information Technology
www.regulations.gov. Follow the Requirements (NITR). IT services must
instructions for submitting comments. The Paperwork Reduction Act (Pub. be performed in accordance with these
Comments may also be submitted to L. 96–511) does not apply because the policies and procedures.
Ken Stepka, NASA Headquarters, Office Office of Management and Budget
of Procurement, Analysis Division, (OMB) has determined that the § 1804.470–3 IT Security Requirements.
Washington, DC 20546. Comments may proposed changes to the NFS do not These IT security requirements cover
also be submitted by e-mail to impose information collection all NASA contracts in which IT plays a
Ken.stepka@nasa.gov. requirements that require the approval role in the provisioning of services or
of OMB under 44 U.S.C. 3501, et seq. products (e.g., research and
FOR FURTHER INFORMATION CONTACT: Ken
development, engineering,
Stepka, Office of Procurement, Analysis List of Subjects in 48 CFR Parts 1804 manufacturing, IT outsourcing, human
Division, (202) 358–0492, e-mail: and 1852 resources, and finance) that support
ken.stepka@nasa.gov.
Government procurement. NASA in meeting its institutional and
SUPPLEMENTARY INFORMATION: mission objectives. These requirements
Tom Luedtke, are applicable where a contractor or
A. Background
Assistant Administrator for Procurement. subcontractor must obtain physical or
NASA’s current contract requirements electronic (i.e., authentication level 2
for IT Security are defined in the clause Accordingly, 48 CFR parts 1804 and
and above as defined in NIST Special
at NFS 1852.204–76, Security 1852 are proposed to be amended as
Publication 800–63, Electronic
Requirements for Unclassified follows:
Authentication Guideline) access to
Information Technology Resources. In 1. The authority citation for 48 CFR NASA’s computer systems, networks, or
order to comply with the Government- parts 1804 and 1852 continues to read IT infrastructure. These requirements
wide requirements of FISMA, the as follows: are also applicable in cases where
proposed revision to 1852.204–76 Authority: 42 U.S.C. 2473(c)(1). information categorized as low,
hsrobinson on PROD1PC70 with PROPOSALS

incorporates several new requirements, moderate, or high by the Federal


including— PART 1804—ADMINISTRATIVE Information Processing Standards (FIPS)
• Expanded requirements for IT MATTERS 199, Standards for Security
Security Plans to include a Risk Categorization of Federal Information
Assessment and a FIPS 199 Assessment; 2. Revise sections 1804.470, and Information Systems, is stored,
• Added requirements for a 1804.470–1, 1804.470–2, 1804.470–3, generated, or exchanged by NASA or on
Contingency Plan; and and 1804.470–4 to read as follows: behalf of NASA by a contractor or

VerDate Aug<31>2005 15:05 Jul 31, 2006 Jkt 208001 PO 00000 Frm 00038 Fmt 4702 Sfmt 4702 E:\FR\FM\01AUP1.SGM 01AUP1
Federal Register / Vol. 71, No. 147 / Tuesday, August 1, 2006 / Proposed Rules 43409

subcontractor, regardless of whether the behalf of NASA by a contractor or team with the NASA Incident Response
information resides on a NASA or a subcontractor, regardless of whether the Center and the NASA Security
contractor/subcontractor’s information information resides on a NASA or a Operations Center.
system. contractor/subcontractor’s information (4) The Contractor shall ensure that its
system. employees, in performance of the
§ 1804.470–4 Contract clause. (b) IT Security Requirements. contract, receive annual IT security
(a) Insert the clause at 1852.204–76, (1) Within 30 days after contract training in NASA IT Security policies,
Security Requirements for Unclassified award, a Contractor shall submit to the procedures, computer ethics, and best
Information Technology Resources, in Contracting Officer for NASA approval practices in accordance with NPR 2810
all solicitations and contracts when an IT Security Plan, Risk Assessment, requirements. The Contractor may use
contract performance requires and FIPS 199, Standards for Security web-based training available from
contractors to: Categorization of Federal Information NASA to meet this requirement.
(1) Have physical or electronic access and Information Systems, Assessment. (5) The Contractor shall provide
to NASA’s computer systems, networks, These plans and assessments, including NASA, including the NASA Office of
or IT infrastructure; or annual updates shall be incorporated Inspector General, access to the
(2) Use information systems to into the contract as compliance Contractor’s and subcontractors’
generate, store, or exchange data with documents. facilities, installations, operations,
NASA or on behalf of NASA, regardless (i) The IT system security plan shall documentation, databases, and
of whether the data resides on a NASA be prepared consistent, in form and personnel used in performance of the
or a contractor’s information system. content, with NIST SP 800–18, Guide contract. Access shall be provided to the
(b) Paragraph (d) of the clause allows for Developing Security Plans for extent required to carry out IT security
contracting officers to waive the Federal Information Systems, and any inspection, investigation, and/or audits
requirements of paragraphs (b) and additions/augmentations described in to safeguard against threats and hazards
(c)(1) through (3) of the clause. NASA Procedural Requirements (NPR) to the integrity, availability, and
Contracting officers must obtain the 2810, Security of Information confidentiality of NASA information or
approval of the: Technology. The security plan shall to the function of computer systems
(1) Center IT Security Manager before identify and document appropriate IT operated on behalf of NASA, and to
granting any waivers to paragraph (b) of security controls consistent with the preserve evidence of computer crime.
the clause; and sensitivity of the information and the To facilitate mandatory reviews, the
(2) The Center Chief of Security before requirements of Federal Information Contractor shall ensure appropriate
granting any waivers to paragraphs Processing Standards (FIPS) 200, compartmentalization of NASA
(c)(1) through (3) of the clause. Recommended Security Controls for information, stored and/or processed,
Federal Information Systems. The plan either by information systems in direct
PART 1852—SOLICITATION shall be reviewed and updated in support of the contract or that are
PROVISIONS AND CONTRACT accordance with NIST SP 800–26, incidental to the contract.
CLAUSES Security Self-Assessment Guide for (6) The Contractor shall ensure that
Information Technology Systems, and all individuals who perform tasks as a
3. Revise section 1852.204–76 to read
FIPS 200, on a yearly basis. system administrator, or have authority
as follows: to perform tasks normally performed by
(ii) The risk assessment shall be
§ 1852.204–76 Security Requirements for prepared consistent, in form and a system administrator, demonstrate
Unclassified Information Technology content, with NIST SP 800–30, Risk knowledge appropriate to those tasks.
Resources. Management Guide for Information Knowledge is demonstrated through the
As prescribed in 1804.470–4(a), insert Technology Systems, and any additions/ NASA System Administrator Security
the following clause: augmentations described in NPR 2810. Certification Program. A system
The risk assessment shall be updated on administrator is one who provides IT
Security Requirements for Unclassified a yearly basis. services, network services, files storage,
Information (iii) The FIPS 199 assessment shall and/or web services, to someone else
Technology Resources identify all information types as well as other than themselves and takes or
the ‘‘high water mark,’’ as defined in assumes the responsibility for the
(XX/XX)
FIPS 199, of the processed, stored, or security and administrative controls of
(a) The Contractor shall be transmitted information necessary to that service. Within 30 days after
responsible for information and fulfill the contractual requirements. contract award, the Contractor shall
information technology (IT) security (2) The Contractor shall produce provide to the Contracting Officer a list
when the Contractor or its contingency plans consistent, in form of all system administrator positions
subcontractors must obtain physical or and content, with NIST SP 800–34, and personnel filling those positions,
electronic (i.e., authentication level 2 Contingency Planning Guide for along with a schedule that ensures
and above as defined in National Information Technology Systems, and certification of all personnel within 90
Institute of Standards and Technology any additions/augmentations described days after contract award. Additionally,
(NIST) Special Publication (SP) 800–63, in NPR 2810. The Contractor shall the Contractor should report all
Electronic Authentication Guideline) perform yearly ‘‘Classroom Exercises.’’ personnel changes which impact system
access to NASA’s computer systems, ‘‘Functional Exercises,’’ shall be administrator positions within 5 days of
networks, or IT infrastructure, or where coordinated with the Center CIOs and the personnel change and ensure these
hsrobinson on PROD1PC70 with PROPOSALS

information categorized as low, be conducted once every three years, individuals obtain System
moderate, or high by the Federal with the first conducted within the first Administrator certification within 90
Information Processing Standards (FIPS) two years of contract award. These days after the change.
199, Standards for Security exercises are defined and described in (7) When the Contractor is located at
Categorization of Federal Information NIST SP 800–34. a NASA Center or installation or is
and Information Systems, is stored, (3) The Contractor shall ensure using NASA IP address space, the
generated, or exchanged by NASA or on coordination of its incident response Contractor shall—

VerDate Aug<31>2005 15:05 Jul 31, 2006 Jkt 208001 PO 00000 Frm 00039 Fmt 4702 Sfmt 4702 E:\FR\FM\01AUP1.SGM 01AUP1
43410 Federal Register / Vol. 71, No. 147 / Tuesday, August 1, 2006 / Proposed Rules

(i) Submit requests for non-NASA (ii) IT–2— Individuals having (f) The Contractor shall insert this
provided external Internet connections privileged access or limited privileged clause, including this paragraph (f), in
to the Contracting Officer for approval access to systems whose misuse can all subcontracts when the subcontractor
by the Network Security Configuration cause serious adverse impact to NASA is required to:
Control Board (NSCCB); missions. These systems include, for (1) Have physical or electronic access
(ii) Comply with the NASA CIO example, those that can transmit to NASA’s computer systems, networks,
metrics including patch management, commands directly modifying the or IT infrastructure; or
operating systems and application behavior of payloads on spacecraft, (2) Use information systems to
configuration guidelines, vulnerability satellites or aircraft; and those that generate, store, or exchange data with
scanning, incident reporting, system contain the primary copy of ‘‘level 1’’ NASA or on behalf of NASA, regardless
administrator certification, and security information whose cost to replace of whether the data resides on a NASA
training; and exceeds one million dollars. or a contractor’s information system.
(iii) Utilize the NASA Public Key (iii) IT–3— Individuals having [FR Doc. E6–12351 Filed 7–31–06; 8:45 am]
Infrastructure (PKI) for all encrypted privileged access or limited privileged
BILLING CODE 7510–01–P
communication or non-repudiation access to systems whose misuse can
requirements within NASA when secure cause significant adverse impact to
e-mail capability is required. NASA missions. These systems include,
(c) Physical and Logical Access for example, those that interconnect DEPARTMENT OF THE INTERIOR
Requirements. with a NASA network in a way that Fish and Wildlife Service
(1) Contractor personnel requiring exceeds access by the general public,
access to IT systems operated by the such as bypassing firewalls; and systems 50 CFR Part 17
Contractor for NASA or interconnected operated by the Contractor for NASA
to a NASA network shall be screened at whose function or information has Endangered and Threatened Wildlife
an appropriate level in accordance with substantial cost to replace, even if these and Plants; 12-Month Finding on a
NPR 2810 and Chapter 4, NPR 1600.1, systems are not interconnected with a Petition To Establish the Northern
NASA Security Program Procedural NASA network. Rocky Mountain Gray Wolf Population
Requirements. NASA shall provide (3) Screening for individuals shall (Canis lupus) as a Distinct Population
screening, appropriate to the highest employ forms appropriate for the level Segment To Remove the Northern
risk level, of the IT systems and of risk as established in Chapter 4, NPR Rocky Mountain Gray Wolf Distinct
information accessed, using, as a 1600.1. Population Segment From the List of
minimum, National Agency Check with (4) The Contractor may conduct its Endangered and Threatened Species
Inquiries (NACI). The Contractor shall own screening of individuals requiring
submit the required forms to the NASA privileged access or limited privileged AGENCY: Fish and Wildlife Service,
Center Chief of Security (CCS) within access provided the Contractor can Interior.
fourteen (14) days after contract award demonstrate to the Contracting Officer ACTION: Notice of 12-month petition
or assignment of an individual to a that the procedures used by the finding.
position requiring screening. The forms Contractor are equivalent to NASA’s
may be obtained from the CCS. At the personnel screening procedures for the SUMMARY: We, the U.S. Fish and
option of NASA, interim access may be risk level assigned for the IT position. Wildlife Service (Service), announce a
granted pending completion of the (5) Subject to approval of the 12-month finding on a petition to
required investigation and final access Contracting Officer, the Contractor may establish the northern Rocky Mountain
determination. For Contractors who will forgo screening of Contractor personnel (NRM) gray wolf (Canis lupus)
reside on a NASA Center or installation, for those individuals who have proof of population as a Distinct Population
the security screening required for all a— Segment (DPS) and to remove the NRM
required access (e.g., installation, (i) Current or recent national security gray wolf DPS from the Federal List of
facility, IT, information, etc.) is clearances (within last three years); Endangered and Threatened Wildlife,
consolidated to ensure only one (ii) Screening conducted by NASA under the Endangered Species Act of
investigation is conducted based on the within the last three years that meets or 1973, as amended (ESA). After review of
highest risk level. Contractors not exceeds the screening requirements of all available scientific and commercial
residing on a NASA installation will be the IT position; or information, we find that the petitioned
screened based on their IT access risk (iii) Screening conducted by the action is not warranted. We have
level determination only. See NPR Contractor, within the last three years, determined that Wyoming State law and
1600.1, Chapter 4. that is equivalent to the NASA its wolf management plan do not
(2) Guidance for selecting the personnel screening procedures as provide the necessary regulatory
appropriate level of screening is based approved by the Contracting Officer and mechanisms to assure that Wyoming’s
on the risk of adverse impact to NASA concurred on by the CCS. numerical and distributional share of a
missions. NASA defines three levels of (d) The Contracting Officer may waive recovered NRM wolf population would
risk for which screening is required (IT– the requirements of paragraphs (b) and be conserved if the protections of the
1 has the highest level of risk): (c)(1) through (c)(3) upon request of the ESA were removed.
(i) IT–1— Individuals having Contractor. The Contractor shall provide DATES: The finding announced in this
privileged access or limited privileged all relevant information requested by document was made on August 1, 2006.
hsrobinson on PROD1PC70 with PROPOSALS

access to systems whose misuse can the Contracting Officer to support the ADDRESSES: Comments and materials
cause very serious adverse impact to waiver request. received, as well as supporting
NASA missions. These systems include, (e) The Contractor shall contact the documentation used in the preparation
for example, those that can transmit Contracting Officer for any documents, of this 12-month finding, will be
commands directly modifying the information, or forms necessary to available for public inspection, by
behavior of spacecraft, satellites or comply with the requirements of this appointment, during normal business
aircraft. clause. hours at U.S. Fish and Wildlife Service,

VerDate Aug<31>2005 15:05 Jul 31, 2006 Jkt 208001 PO 00000 Frm 00040 Fmt 4702 Sfmt 4702 E:\FR\FM\01AUP1.SGM 01AUP1

S-ar putea să vă placă și