|
|
 |
DoDD 5200.28: Security Requirements for Automated Information Systems (AISs) |
 |  |
| |
E1. ENCLOSURE 1
REFERENCES, continued
| (e) |
National
Communication Security Instruction 5004, "TEMPEST Countermeasures for
Facilities Within the United States," January 1, 1984 |
| (f) |
National
Communication Security Instruction 5005, "TEMPEST Countermeasures for
Facilities Outside the United States," January 1, 1984 |
| (g) |
Director of
Central Intelligence Directive Number 1/16, "Security Policy on
Intelligence Information in Automated Systems and Networks (U),"
January 4, 1983 |
| (h) |
SM-313-83,
"Safeguarding the Single Integrated Operational Plan (U)," May 10,
1983 |
| (i) |
DoD Instruction
5215.2, "Computer Security Technical Vulnerability Reporting Program,"
September 2, 1986 |
| (j) |
Office of
Management and Budget Circular No. A-130, "Management of Federal
Information Resources," December 12, 1985 |
| (k) |
DoD 5200.28-STD,
"Department of Defense Trusted Computer System Evaluation Criteria,"
December 1985, authorized by DoD Directive 5200.28, December 18,
1972 |
| (l) |
DoD Directive
7920.1, "Life Cycle Management of Automated Information Systems (AIS),"
October 17, 1978 |
| (m) |
DoD Instruction
5210.74, "Security of DoD Contractor Telecommunications," June 26,
1985 |
| (n) |
DoD Directive
5220.22, "Industrial Security Program," November 1, 1986 |
| (o) |
DoD Regulation
5220.22-R, "Industrial Security Regulation," December 1985, authorized
by DoD Directive 5220.22, December 8, 1980 |
| (p) |
DoD Directive
5200.2, "DoD Personnel Security Program," December 20, 1979 |
| (q) |
DoD Directive
5010.38, "Internal Management Control Program," July 16, 1984 |
| (r) |
Executive Order
12356, "National Security Information," April 6, 1982 |
| (s) |
DoD Directive
5230.24, "Distribution Statement on Technical Documents," March 18,
1987 |
| (t) |
DoD 5200.28-M,
"ADP Security Manual," January 1973, authorized by DoD Directive
5200.28, December 18, 1972 |
| (u) |
CSC-STD-003-85,
"Computer Security Requirements," June 25, 1985 |
| (v) |
NCSC-TG-005,
Version 1, "Trusted Network Interpretations," July 31,
1987 |
|
 |
|
|
| |
| |