How do we know if a Data Spill has occurred?
Determination needs to be made by SMEs and customer.
Contaminated assets must be secured here when not being worked on.
ISSM Safe
To properly check a mobile device for contamination, it must first be placed in:
Airplane
SSDs must be turned in to this section for destruction
CSMM
Data Spill Response Guide
Classified information is governed by:
Security Classification Guides (SCGs)
______ must be reviewed and sanitized first, before moving on to check the local drive.
BCWipe can only be used on this type of drive.
HDD
Temporary use can be allowed with these types of drives:
SSD and HHD
When communicating the details of a Data Spill, the details are no longer considered: _______
classified
The initial report to DCSA must be sent by who?
The name of the team who removes offending emails from the server.
Rmail clean team
Temporary use is denied if:
the scope of the spill is not yet defined (ie, issues and emails are still being identified)
The transfer of data off of an SSD with DXC must be done in the presence of:
the affected user/a cleared individual
The newly appointed Lead Data Spill Responder for RMD
A common root cause of spills, when two pieces of unclassified information become classified together.
Data Aggregation
Identifying all impacted _____ is critical to proper containment.
Users
Upon sanitizing the user's Outlook, their email database must be:
compacted
A full report to DCSA must be provided within how many days of the spill conclusion?
14
What version of the DSRG are we approved to use?
v.6
DCSA must be notified within how many hours of the spill's occurence?
72
The first two steps in physically/logically containing a spill are:
Disconnection and Controlled Custody
BCWIPE wiping scheme must be set to how many passes?
3
What kind of entry must be submit immediatly after the return of the assets?
Perspective
The two related controls for classified spills.
IR-9 Information Spillage Response
IR-9(1) ISR / Responsible Personnel