ISM-0658

When manually importing data to SECRET and TOP SECRET systems, the data undergoes data formatting checks.

Topic
Manual import of data
Applicable to
Secret, Top Secret

History

Priority
must
Dec 2022
Removed
The existing control on the use of data formatting checks for manual import of data to systems was rescinded.
Mar 2022
When manually importing data to SECRET and TOP SECRET systems, the data undergoes data formatting checks.
Miscellaneous changes were made to rationale and recommendations throughout the publication to clarify content without changing intent. This included a review from the Guidelines for System Hardening chapter through to the Guidelines for Data Transfers chapter.
Dec 2021
Data imported to a SECRET or TOP SECRET system undergoes data format checks and logging, and is monitored to detect overuse/unusual usage patterns.
Miscellaneous changes were made to rationale and security controls throughout the publication. This included:
• A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.
• Security controls suitable for all audiences have been identified with the ‘All’ applicability marking while additional security controls suitable for just government audiences have been identified with the O, P, S and TS applicability markings.
• Security controls suitable for specific classifications have been amended to include their classification(s) in the wording of the security controls to reduce the reliance on applicability markings to confer suitability.
• Tables in security controls have been converted into prose to allow for inclusion in the SSP annex template and the XML list of security controls.
• The use of ‘official’ and ‘highly classified’ terminology has been replaced with specific classifications to remove ambiguity.
• Security controls relating to high assurance ICT equipment have had their applicability narrowed to ‘S, TS’ reflecting that they are intended for the protection of SECRET and TOP SECRET systems and data.
2015
Data imported to a system must undergo:• scanning for malicious and active content• data format checks• logging of each event• monitoring to detect overuse/unusual usage patterns.
2010
Agencies importing data to a system must implement the following controls:••••scanning for malicious and active contentdata format checkslog of each eventmonitoring to detect overuse/unusual usage patterns.