Appendix A
References
Section 1
Required Publications
-
AR 380-5
-
Department of Army Information Security Program. (Cited in paras 1-le(1),
1-6d(2)(h), 1-6d(3)(g), 2-3a(5), 2-10f, 2-12e, 2-13c(1), 2-19b, 2-19c,
2-20c, 2-20d, 2-21f, 2-22a(1), 2-27a, 2-27b, and 2-28a.)
-
AR 380-67
-
The Department of the Army Personnel Security Program (Cited in paras
2-17a-c, 2-17e, 2-17f, and 2-18b-d.)
-
(C) DIAM 50-4
-
Security of Compartmented Computer Operations. (U) (Cited in paras 3-9a and
3-9d.) (This publication may be obtained from Director, DIA, ATTN: RTS-2D,
WASH DC 20340-3081.)
-
(C) DIAM 505-
-
Sensitive Compartmented Information (SCI) Contractor Administrative Security
VOL I and VOL II(U). Cited in paras 3-9a and 3-9d.)
-
(C) DOD Pub C-5030.58-M
-
Security Criteria and Telecommunications Guidance. (Cited in para 1-1c(4).)
-
DOD 5200.28-STD
-
Department of Defense Trusted Computer System Evaluation Criteria. (Cited
in paras 2-1e, 2-3a(5), 2-3b, 2-3b(3), 2-23c(2), 3-2c(3), 3-2d(5) and
3-9e(3).)
-
Information Systems Security Products and Services Catalogue.
-
(Cited in paras 4-3e(1) and 4-3e(3).) This publication may be obtained from
the Superintendent of Documents, U.S. Government Printing Office, WASH, DC
20402-9329.)
-
JCS 6-03.7
-
Security Policy for the WWMCCS Intercomputer Network (Cited in para
1-1c(2).) (This publication may be obtained from U.S. Army AG Publication
Center, 2800 Eastern Blvd., Baltimore, MD 21220-2896.)
-
NCSC-TG-005
-
Trusted Network Interpretation (Cited in para 2-23b(7) and 2-23c(2).) (This
publication may be obtained from the Superintendent of Documents, U.S.
Government Printing Office, WASH, DC 20402-9329.)
Section II
Related Publications
A related publication is merely a source of additional information. The user
does not have to read it to understand this regulation.
-
AR 15-6
-
Procedures for Investigating Officers and Boards of Officers.
-
AR 25-1
-
The Army Information Resources Management Program.
-
AR 70-1
-
Systems Acquisition Policy and Procedures.
-
AR 105-64
-
U.S. Army Communications-Electronics Operation Instructions Program (CEOI).
-
AR 190-13
-
The Army Physical *WORD*
-
AR 190-51
-
Security of Army *WORD*
-
AR 310-25
-
Dictionary of *WORD*
-
AR 340-*WORD*
-
Release
-
AR 340-*WORD*
-
The Army *WORD*
-
AR 380-40
-
Policy for Safeguarding *WORD*
-
AR 380-53
-
Communications Security *WORD*
-
(C) AR 380-381
-
Special Access Program (SAPs).
-
AR 381-10
-
U.S. Army Intelligence Activities
-
AR 381-14
-
Technical Surveillance Countermeasures(TSCM)(U).
-
AR 381-20
-
U.S. Army Counterintelligence Activities.
-
AR 530-1
-
Operations Security (OPSEC).
-
AR 640-15
-
Criteria for Insuring the Competency of Personnel to Install, Maintain, and
Repair Communications Security Equipment.
-
CSC-STD-003-85
-
Computer Security Requirements
-
CSC-STD-004-85
-
Technical Rationale Behind CSC-STD-003-85: Computer Security Requirements.
-
CSC-STD-005-85
-
DOD Magnetic Remanence Security Guideline.
-
(S) DCID 1/16
-
Security Policy for Uniform Protection of Intelligence Processed in
Automated Information Systems and Networks (U).
-
DIAM 50-3
-
Physical Security Standards for Construction of Sensitive Compartmented
Information Facilities.
-
DOD Instructions 5215.2
-
Physical Security Technical Vulnerability Reporting Program (CSTVRP).
-
DOD 5220.22-M
-
Industrial Security Manual for Safeguarding Classified Information.
-
DOD 5220.22-R
-
Industrial Security Regulation.
-
Federal Standard 1027
-
General Security Requirements for Equipment Using the Data Encryption
Standard.
-
FIPS Pub 31
-
Guidelines for Automatic Data Processing Physical Security and Risk
Management.
-
FIPS Pub 65
-
Guidelines for Automatic Data Processing Risk Analysis.
-
(S) MJCS 75-87
-
Safeguarding the Single Integrated Operational Plan (U).
-
NCSC-TG-001
-
A Guide to Understanding Audit in Trusted Systems.
-
NCSC-TG-003
-
A Guide to Understanding Discretionary Access Control in Trusted Systems.
-
NCSC-TG-006
-
A Guide to Understanding Configuration Management in Trusted Systems.
-
NCSC-TG-007
-
A Guide to Understanding Design Documentation in Trusted Systems.
Section III
Prescribed Forms
-
SF 706
- Top Secret Label for ADP Media (Prescribed in para 2-20a.)
-
SF 707
- Secret Label for ADP Media (Prescribed in para 2-20a.)
-
SF 708
- Confidential Label for ADP Media (Prescribed in para 2-20a.)
-
SF 710
- Unclassified Label for ADP Media (Prescribed in para 2-20b.)
-
SF 711
- Data Descriptor Label for ADP Media (Prescribed in para 2-20a.)
-
SF 712
- Classified SCI Label for ADP Media (Prescribed in para 2-20a.)