Sie sind auf Seite 1von 2

40984 Federal Register / Vol. 70, No.

135 / Friday, July 15, 2005 / Notices

the security controls necessary to satisfy security objectives of confidentiality, and information systems, and include:
the minimum requirements. integrity, and availability. access control; audit and accountability;
Prior to the submission of this Draft FIPS Publication 200, the awareness and training; certification,
proposed standard to the Secretary of second standard that was specified by accreditation, and security assessments;
Commerce for review and approval, it is the FISMA, is an integral part of the risk configuration management; contingency
essential that consideration be given to management framework that NIST has planning; identification and
the needs and views of the general developed to assist federal agencies in authentication; incident response;
public, the information technology providing appropriate levels of maintenance; media protection;
industry, and federal, state, and local information security. FIPS Publication personnel security; physical and
government organizations. The purpose 200 specifies minimum security environmental protection; planning; risk
of this notice is to solicit such views. requirements for federal information assessment; systems and services
and information systems and a risk- acquisition; system and
DATES: Comments must be received on
based process for selecting the security communications protection; and system
or before 5 p.m., September 13, 2005.
controls necessary to satisfy the and information integrity.
ADDRESSES: Written comments may be minimum requirements. In applying the Authority: Federal Information
sent to: Chief, Computer Security provisions of FIPS Publication 200, Processing Standards (FIPS) are issued
Division, Information Technology agencies will categorize their by the National Institute of Standards
Laboratory, Attention: Comments on information systems as required by FIPS and Technology after approval by the
Draft FIPS Publication 200, 100 Bureau Publication 199, and subsequently Secretary of Commerce pursuant to
Drive (Stop 8930), National Institute of select an appropriate set of security Section 5131 of the Information
Standards and Technology, controls from NIST Special Publication Technology Management Reform Act of
Gaithersburg, MD 20899–8930. 800–53, Recommended Security 1996 and the Federal Information
Comments may also be sent via Controls for Federal Information Security Management Act of 2002
electronic mail to: Systems, to satisfy the minimum (Public Law 107–347).
draftfips200@nist.gov. security requirements. Issued in E.O. 12866: This notice has been
A copy of draft FIPS Publication 200 February 2005, NIST Special determined not to be significant for the
is available from the NIST Web site at: Publication 800–53 defines minimum purposes of E.O. 12866.
http://csrc.nist.gov/publications/fips/ security controls needed to provide
index.html. cost-effective protection for low-impact, Dated: July 7, 2005.
Comments received in response to moderate-impact, and high-impact Hratch G. Semerjian,
this notice will be published at http:// information systems and the Acting Director, NIST.
csrc.nist.gov. information processed, stored, and [FR Doc. 05–13994 Filed 7–14–05; 8:45 am]
FOR FURTHER INFORMATION CONTACT: Dr. transmitted by those systems. BILLING CODE 3510–CN–P
Ron Ross, Computer Security Division, The proposed standard will be
National Institute of Standards and applicable to: (i) all information within
Technology, Gaithersburg, MD 20899– the federal government other than that DEPARTMENT OF COMMERCE
8930, telephone (301) 975–5390, e-mail: information that has been determined
pursuant to Executive Order 12958, as National Institute of Standards and
ron.ross@nist.gov. Technology
amended by Executive Order 13292, or
SUPPLEMENTARY INFORMATION: The any predecessor order, or by the Atomic
Federal Information Security [Docket No. 050329087–5087–01]
Energy Act of 1954, as amended, to
Management Act (FISMA) requires all require protection against unauthorized Proposed Withdrawal of Ten (10)
federal agencies to develop, document, disclosure and is marked to indicate its Federal Information Processing
and implement agency-wide classified status; and (ii) all federal Standards (FIPS)
information security programs and to information systems other than those
provide information security for the information systems designated as AGENCY: National Institute of Standards
information and information systems national security systems as defined in and Technology (NIST), Commerce.
that support the operations and assets of 44 United States Code Section ACTION: Notice; request for comments.
the agency, including those systems 3542(b)(2). The standard has been
provided or managed by another agency, broadly developed from a technical SUMMARY: The National Institute of
contractor, or other source. perspective to complement similar Standards and Technology (NIST)
To support agencies in conducting standards for national security systems. proposes to withdraw ten (10) Federal
their information security programs, the In addition to the agencies of the federal Information Processing Standards (FIPS)
FISMA called for NIST to develop government, state, local, and tribal from the FIPS series. The standards
federal standards for the security governments, and private sector proposed for withdrawal include FIPS
categorization of federal information organizations that compose the critical 161–2, FIPS 183, FIPS 184, FIPS 192
and information systems according to infrastructure of the United States are and 192–1, which adopt voluntary
risk levels, and for minimum security encouraged to consider the use of this industry standards for Federal
requirements for information and standard, as appropriate. government use. These FIPS are
information systems in each security Proposed FIPS Publication 200 obsolete because they have not been
category. FIPS Publication 199, specifies minimum security updated to reference current or revised
Standards for Security Categorization of requirements for federal information voluntary industry standards. In
Federal Information and Information and information systems in seventeen addition, FIPS 4–2, FIPS 5–2, FIPS 6–4,
Systems, issued in February 2004, is the security-related areas that represent a and FIPS 10–4, adopt specifications or
first standard that was specified by the broad-based, balanced information data standards that are developed and
FISMA. FIPS Publication 199 requires security program. The seventeen maintained by other Federal
agencies to categorize their information security-related areas encompass the government agencies or by voluntary
and information systems as low-impact, management, operational, and technical industry standards organizations. These
moderate-impact, or high-impact for the aspects of protecting federal information FIPS have not been updated to reflect

VerDate jul<14>2003 17:47 Jul 14, 2005 Jkt 205001 PO 00000 Frm 00010 Fmt 4703 Sfmt 4703 E:\FR\FM\15JYN1.SGM 15JYN1
Federal Register / Vol. 70, No. 135 / Friday, July 15, 2005 / Notices 40985

the changes and modifications that have FIPS 10–4, Countries, Dependencies, issue policies requiring agencies use
been made by the organizations that Areas of Special Sovereignty, and Their standards, which are open to the
develop and maintain the specifications Principal Administrative Divisions. maximum extent feasible and
and data representations. FIPS 113, FIPS 113, Computer Data interoperable across agencies, to enable
Computer Data Authentication, specifies Authentication. effective categorization and organization
an algorithm for generating and FIPS 161–2, Electronic Data of Government information in a way
verifying a Message Authentication Interchange (EDI). that is searchable electronically,
Code (MAC). Since the algorithm is FIPS 183, Integration Definition for
including by searchable identifiers.
based on the Data Encryption Standard, Function Modeling (IDEF0).
which has been recommended for FIPS 184, Integration Definition for The policy will define categories of
withdrawal, NIST plans to recommend Information Modeling (IDEFIX). Government information which shall be
the use of newer techniques for data FIPS 192, Application Profile for the required under the standards so
authentication based on more secure Government Information Locator agencies can continue to use aids,
algorithms. Service (GILS). including Federal or nonfederal sources,
FIPS 192–1 (a)&(b), Application for locating agency information
Prior to the submission of this Profile for the Government Information
proposed withdrawal of FIPS to the dissemination products to reasonably
Locator Service (GILS). achieve agency information
Secretary of Commerce for review and These FIPS are being proposed for
approval, NIST invites comments from dissemination objectives.
withdrawal because they are obsolete, or
the public, users, the information have not been updated to adopt current FIPS 4–2, FIPS 5–2, FIPS 6–4, and
technology industry, and Federal, State voluntary industry standards, federal FIPS 10–4 are Federal data standards
and local governments government specifications, or federal data standards. and specifications that have been and
organizations concerning the Federal agencies are responsible for will continue to be developed and
withdrawal of the FIPS. using current voluntary industry maintained by Federal government
DATES: Comments on the proposed standards and current federal agencies other than NIST. Current
withdrawal of the FIPS must be received specifications and data standards in versions of these data standards and
no later than 5 p.m. on October 13, their acquisition and management specifications are available through the
2005. activities. developing Federal agencies’ web pages.
The Information Technology NIST will keep references to these
ADDRESSES: Written comments Management Reform Act of 1996
concerning the withdrawal of the FIPS withdrawn FIPS on its FIPS web pages,
(Division E of Pub. L. 104–106) and and will link to current versions of these
should be sent to: Information Executive Order 13011 emphasize
Technology Laboratory, ATTN: standards and specifications where
agency management of information appropriate.
Proposed Withdrawal of 10 FIPS, Mail technology and Government-wide
Stop 8930, National Institute of interagency support activities to Withdrawal means that these FIPS
Standards and Technology, 100 Bureau improve productivity, security, would no longer be part of a
Drive, Gaithersburg, MD 20899. interoperability, and coordination of subscription service that is provided by
Electronic comments should be sent to: Government resources. Under the the National Technical Information
fips.comments@nist.gov. National Technology Transfer and Service. NIST will continue to provide
Information about the FIPS is Advancement Act of 1995 (Pub. L. 104– relevant information on standards and
available on the NIST Web pages: 113) Federal agencies and departments guidelines by means of electronic
http://www.itl.nist.gov/fipspubs/ are directed to use technical standards dissemination methods.
index.htm. that are developed in voluntary Authority: Federal Information Processing
Comments received in response to consensus standards bodies. Voluntary Standards Publications (FIPS PUBS) are
this notice will be published industry standards are the preferred issued by the National Institute of Standards
electronically at http://csrc.nist.gov/ source of standards to be used by the and Technology after approval by the
publications/fips/index.html. Federal government. The use of Secretary of Commerce, pursuant to Section
FOR FURTHER INFORMATION CONTACT: Ms. voluntary industry standards eliminates 5131 of the Information Technology
Shirley M. Radack, telephone (301) 975– the cost to the government of Management Reform Act of 1996 (Pub. L.
2833, MS 8930, National Institute of developing its own standards, and 104–106), and the Federal Information
Standards and Technology, furthers the policy of reliance upon the Security Management Act of 2002 (Pub. L.
Gaithersburg, MD 20899 or via e-mail at private sector to supply goods and 107–347).
shirley.radack@nist.gov. services to the government. Federal
Classification: Executive Order 12866:
SUPPLEMENTARY INFORMATION: The
Information Processing Standards (FIPS)
This notice has been determined not to
following Federal Information are developed only when
interoperability of different systems, for be significant for the purposes of
Processing Standards (FIPS) Executive Order 12866.
Publications are proposed for the portability of data and software, and
withdrawal from the FIPS series: for computer security. Dated: July 11, 2005.
FIPS 161–2, FIPS 183, and FIPS 184 Hratch G. Semerjian,
FIPS 4–2, Representation of Calendar are voluntary consensus standards, and
Date to Facilitate Interchange of Data Acting Director, NIST.
current versions of these specifications
Among Information Systems. [FR Doc. 05–13992 Filed 7–14–05; 8:45 am]
are available from voluntary standards
FIPS 5–2, Codes for the Identification organizations. BILLING CODE 3510–CN–P
of the States, the District of Columbia FIPS 192 and 192–1 are being
and the Outlying Areas of the United withdrawn because agencies use
States, and Associated Areas. commercial sources to aid citizens in
FIPS 6–4, Counties and Equivalent locating government information.
Entities of the U.S., Its Possessions, and Per Section 207(d) of the E-
Associated Areas. Government Act of 2002, OMB will

VerDate jul<14>2003 17:47 Jul 14, 2005 Jkt 205001 PO 00000 Frm 00011 Fmt 4703 Sfmt 4703 E:\FR\FM\15JYN1.SGM 15JYN1

Das könnte Ihnen auch gefallen