ISM-0669

When manually exporting data from SECRET and TOP SECRET systems, digital signatures are validated and keyword checks are performed within all textual data.

Topic
Manual export of data
Applicable to
Secret, Top Secret

History

Priority
must
Dec 2022
When manually exporting data from SECRET and TOP SECRET systems, digital signatures are validated and keyword checks are performed within all textual data.
The existing control on security checks before manual export of data from systems was amended to remove the requirement for data format checks.
Mar 2022
When manually exporting data from SECRET and TOP SECRET systems, the data undergoes data formatting checks, data type and size checks, signature checks, and keyword checks within all textual data.
Miscellaneous changes were made to rationale and recommendations throughout the publication to clarify content without changing intent. This included a review from the Guidelines for System Hardening chapter through to the Guidelines for Data Transfers chapter.
Dec 2021
When exporting data from a SECRET or TOP SECRET system, the following activities are undertaken: • data format checks and logging • monitoring to detect overuse/unusual usage patterns • limitations on data types and sizes • keyword searches on all textual data.
Miscellaneous changes were made to rationale and security controls throughout the publication. This included:
• A review from the Using the Information Security Manual chapter through to the Guidelines for Media chapter.
• Security controls suitable for all audiences have been identified with the ‘All’ applicability marking while additional security controls suitable for just government audiences have been identified with the O, P, S and TS applicability markings.
• Security controls suitable for specific classifications have been amended to include their classification(s) in the wording of the security controls to reduce the reliance on applicability markings to confer suitability.
• Tables in security controls have been converted into prose to allow for inclusion in the SSP annex template and the XML list of security controls.
• The use of ‘official’ and ‘highly classified’ terminology has been replaced with specific classifications to remove ambiguity.
• Security controls relating to high assurance ICT equipment have had their applicability narrowed to ‘S, TS’ reflecting that they are intended for the protection of SECRET and TOP SECRET systems and data.
2015
When exporting formatted textual data with no free–text fields and all fields have apredefined set of permitted values, the following activities must be undertaken:• protective marking checks• logging of each event• monitoring to detect overuse/unusual usage patterns• data format checks• limitations on data types• keyword searches• size limits.
2010
When exporting formatted textual data with no free-text fields and all fields have a predefined set ofpermitted values, agencies must implement the following controls:• protective marking checks• log of each event• monitoring to detect overuse/unusual usage patterns.