Appendix A
References
Section 1
Required Publications
- 
AR 380-5
 - 
Department of Army Information Security Program. (Cited in paras 1-le(1),
1-6d(2)(h), 1-6d(3)(g), 2-3a(5), 2-10f, 2-12e, 2-13c(1), 2-19b, 2-19c,
2-20c, 2-20d, 2-21f, 2-22a(1), 2-27a, 2-27b, and 2-28a.)
 - 
AR 380-67
 - 
The Department of the Army Personnel Security Program (Cited in paras
2-17a-c, 2-17e, 2-17f, and 2-18b-d.)
 - 
(C) DIAM 50-4
 - 
Security of Compartmented Computer Operations. (U) (Cited in paras 3-9a and
3-9d.) (This publication may be obtained from Director, DIA, ATTN: RTS-2D,
WASH DC 20340-3081.)
 - 
(C) DIAM 505-
 - 
Sensitive Compartmented Information (SCI) Contractor Administrative Security
VOL I and VOL II(U). Cited in paras 3-9a and 3-9d.)
 - 
(C) DOD Pub C-5030.58-M
 - 
Security Criteria and Telecommunications Guidance. (Cited in para 1-1c(4).)
 - 
DOD 5200.28-STD
 - 
Department of Defense Trusted Computer System Evaluation Criteria. (Cited
in paras 2-1e, 2-3a(5), 2-3b, 2-3b(3), 2-23c(2), 3-2c(3), 3-2d(5) and
3-9e(3).)
 - 
Information Systems Security Products and Services Catalogue.
 - 
(Cited in paras 4-3e(1) and 4-3e(3).) This publication may be obtained from
the Superintendent of Documents, U.S. Government Printing Office, WASH, DC
20402-9329.)
 - 
JCS 6-03.7
 - 
Security Policy for the WWMCCS Intercomputer Network (Cited in para
1-1c(2).) (This publication may be obtained from U.S. Army AG Publication
Center, 2800 Eastern Blvd., Baltimore, MD 21220-2896.)
 - 
NCSC-TG-005
 - 
Trusted Network Interpretation (Cited in para 2-23b(7) and 2-23c(2).) (This
publication may be obtained from the Superintendent of Documents, U.S.
Government Printing Office, WASH, DC 20402-9329.)
 
Section II
Related Publications
A related publication is merely a source of additional information. The user
does not have to read it to understand this regulation.
- 
AR 15-6
 - 
Procedures for Investigating Officers and Boards of Officers.
 - 
AR 25-1
 - 
The Army Information Resources Management Program.
 - 
AR 70-1
 - 
Systems Acquisition Policy and Procedures.
 - 
AR 105-64
 - 
U.S. Army Communications-Electronics Operation Instructions Program (CEOI).
 - 
AR 190-13
 - 
The Army Physical *WORD*
 - 
AR 190-51
 - 
Security of Army *WORD*
 - 
AR 310-25
 - 
Dictionary of *WORD*
 - 
AR 340-*WORD*
 - 
Release
 - 
AR 340-*WORD*
 - 
The Army *WORD*
 - 
AR 380-40
 - 
Policy for Safeguarding *WORD*
 - 
AR 380-53
 - 
Communications Security *WORD*
 - 
(C) AR 380-381
 - 
Special Access Program (SAPs).
 - 
AR 381-10
 - 
U.S. Army Intelligence Activities
 - 
AR 381-14
 - 
Technical Surveillance Countermeasures(TSCM)(U).
 - 
AR 381-20
 - 
U.S. Army Counterintelligence Activities.
 - 
AR 530-1
 - 
Operations Security (OPSEC).
 - 
AR 640-15
 - 
Criteria for Insuring the Competency of Personnel to Install, Maintain, and
Repair Communications Security Equipment.
 - 
CSC-STD-003-85
 - 
Computer Security Requirements
 - 
CSC-STD-004-85
 - 
Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements.
 - 
CSC-STD-005-85
 - 
DOD Magnetic Remanence Security Guideline.
 - 
(S) DCID 1/16
 - 
Security Policy for Uniform Protection of Intelligence Processed in
Automated Information Systems and Networks (U).
 - 
DIAM 50-3
 - 
Physical Security Standards for Construction of Sensitive Compartmented
Information Facilities.
 - 
DOD Instructions 5215.2
 - 
Physical Security Technical Vulnerability Reporting Program (CSTVRP).
 - 
DOD 5220.22-M
 - 
Industrial Security Manual for Safeguarding Classified Information.
 - 
DOD 5220.22-R
 - 
Industrial Security Regulation.
 - 
Federal Standard 1027
 - 
General Security Requirements for Equipment Using the Data Encryption
Standard.
 - 
FIPS Pub 31
 - 
Guidelines for Automatic Data Processing Physical Security and Risk
Management.
 - 
FIPS Pub 65
 - 
Guidelines for Automatic Data Processing Risk Analysis.
 - 
(S) MJCS 75-87
 - 
Safeguarding the Single Integrated Operational Plan (U).
 - 
NCSC-TG-001
 - 
A Guide to Understanding Audit in Trusted Systems.
 - 
NCSC-TG-003
 - 
A Guide to Understanding Discretionary Access Control in Trusted Systems.
 - 
NCSC-TG-006
 - 
A Guide to Understanding Configuration Management in Trusted Systems.
 - 
NCSC-TG-007
 - 
A Guide to Understanding Design Documentation in Trusted Systems.
 
Section III
Prescribed Forms
- 
SF 706
 - Top Secret Label for ADP Media (Prescribed in para 2-20a.)
 - 
SF 707
 - Secret Label for ADP Media (Prescribed in para 2-20a.)
 - 
SF 708
 - Confidential Label for ADP Media (Prescribed in para 2-20a.)
 - 
SF 710
 - Unclassified Label for ADP Media (Prescribed in para 2-20b.)
 - 
SF 711
 - Data Descriptor Label for ADP Media (Prescribed in para 2-20a.)
 - 
SF 712
 - Classified SCI Label for ADP Media (Prescribed in para 2-20a.)