ISM-0665

Trusted sources for SECRET and TOP SECRET systems are limited to people and services that have been authorised as such by an organisation’s Chief Information Security Officer.

Topic
Data transfer approval
Applicable to
Secret, Top Secret

History

Priority
must
Dec 2021
Trusted sources for SECRET and TOP SECRET systems are limited to people and services that have been authorised as such by an organisation’s Chief Information Security Officer.
Miscellaneous changes were made to rationale and security controls throughout the publication. This included:
• A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.
• Security controls suitable for all audiences have been identified with the ‘All’ applicability marking while additional security controls suitable for just government audiences have been identified with the O, P, S and TS applicability markings.
• Security controls suitable for specific classifications have been amended to include their classification(s) in the wording of the security controls to reduce the reliance on applicability markings to confer suitability.
• Tables in security controls have been converted into prose to allow for inclusion in the SSP annex template and the XML list of security controls.
• The use of ‘official’ and ‘highly classified’ terminology has been replaced with specific classifications to remove ambiguity.
• Security controls relating to high assurance ICT equipment have had their applicability narrowed to ‘S, TS’ reflecting that they are intended for the protection of SECRET and TOP SECRET systems and data.
May 2019
Trusted sources are a strictly limited number of personnel that have been authorised as such by an organisation’s CISO.
Security control 0665 was modified to remove the requirement for a formal risk assessment. This ensures consistency with other circumstances in which a Chief Information Security Officer (CISO) may delegate duties.
Apr 2019
Trusted sources are a strictly limited number of personnel that have been identified using a security risk assessment and have been authorised as such by an organisation’s CISO.
2015
Trusted sources must be:• a strictly limited list derived from business requirements and the result of a securityrisk assessment• approved by the accreditation authority.
2010
Trusted sources must be:• a strictly limited list derived from business requirements and the result of a security risk assessment• approved by the accreditation authority.