UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 NAVAL COMMUNICATIONS SECURITY MATERIAL SYSTEM 1560 Colorado Avenue Andrews AFB, MD 20762-6108 EKMS-1E SUPP-1 Department of the Navy Policy and Procedures for Key Management Infrastructure Operating Accounts (KOAs) 08 May 2017 UNCLASSIFIED//FOR OFFICIAL USE ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 2250 Ser N5/ 08 May 2017 LETTER OF PROMULGATION 1. PURPOSE. EKMS-1E Supp-1 prescribes the minimum policies for issuing, accounting, handling, safeguarding, destroying and disposing of COMSEC (Communications Security) material. 2. BACKGROUND. In the Key Management Infrastructure System (KMI), COMSEC Accounts will use a KMI Client Node/ Advanced Key Processor (MGC/AKP) to automate the generation, accounting, distribution, destruction, and management of COMSEC material. As key management continues to evolve, policies and procedures will be developed to provide the necessary guidance to ensure the timely support to a global community which will enhance security, minimize costs and further enhance the secure communications capability of forward deployed elements. 3. APPLICABILITY. a. EKMS-1E Supp-1 applies to Department of the Navy activities including U.S. Coast Guard (USCG), Military Sealift Command (MSC), U.S. Marine Corps (USMC), and U.S. Navy (USN) COMSEC Accounts which have transitioned to the Key Management Infrastructure (KMI). These provisions apply to all who require access to or the use of COMSEC material within KMI. All such personnel must be aware that non-compliance or deviation from the prescribed procedures can jeopardize the security of the United States and could result in prosecution of the parties concerned under the espionage laws, Title 18. U.S.C., Sections 793, 794, and 798. b. Commands whose holdings include Two-Person Controlled (TPC) Sealed Authentication System (SAS) keying material must maintain and consult CJCSI 3260.01(series) for guidance related to handling and disposing of SAS/TPC material. Messages promulgated from the Controlling Authority (ConAuth), and not the Status of COMSEC Material (SCMR), is the authoritative source for status information related to SAS/TPC. 4. SCOPE. The policies in this manual have been derived from OPNAV, SECNAV, National-level policies and applicable Operational Security Doctrine (OSD) for KMI-related components. The guidance herein supplements, but in no way alters or amends the provisions of U.S. Navy regulations, SECNAV M5510.30 UNCLASSIFIED//FOR OFFICIAL USE ONLY 01 of 02 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 (series), SECNAV M5510.36 (series), and ICD 705(Series). 5. ACTION. EKMS-1E Supp-1 dated 08 May 2017 is effective upon receipt and supersedes EKMS-1B Supp-1A dated 06 Feb 2015. 6. REPRODUCTION. EKMS-1E Supp-1 is UNCLASSIFIED FOR OFFICIAL USE ONLY (FOUO) and may be reproduced for local use. 7. Should a conflict exist or a more stringent requirement be communicated in a revision to an Operational Security Doctrine for COMSEC equipment addressed herein, the respective doctrine for the equipment will have precedent over this manual. 8. COMMENTS. Submit comments, recommendations, and suggestions for changes to Naval Communications Security Material System (NCMS) via the respective Immediate Superior in Command (ISIC) and Type Commander (TYCOM). Digitally signed by LECOUNTE.JAME LECOUNTE.JAMES.A.106246142 6 S.A.1062461426 Date: 2017.05.16 16:27:07 -04'00' J. A. LeCOUNTE UNCLASSIFIED//FOR OFFICIAL USE ONLY 02 of 02 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 LIST OF EFFECTIVE PAGES Front Cover Letter of Promulgation List of Effective Pages Record of Amendments Record of Page Checks Manual Overview Table of Contents Chapter 1 Chapter 2 Chapter 3 Chapter 4 Chapter 5 Chapter 6 Chapter 7 Chapter 8 Chapter 9 Chapter 10 Annex A Annex B Annex C Annex D Annex E Annex F Annex G Annex H Annex I PAGE NUMBERS EFFECTIVE (Unnumbered) 01 - 02 i ii iii iv v – xii 1-1 – 1-10 2-1 – 2-33 3-1 – 3-18 4-1 – 4-20 5-1 – 5-12 6-1 – 6-7 7-1 – 7-27 8-1 – 8-16 9-1 – 9-6 10-1 – 10-7 A-1 – A-3 B-1 – B-8 C-1 D-1 E-1 – E-4 F-1 - F-2 G-1 – G-13 H-1 – H-2 I-1 – I-4 Original Original Original Original Original Original Original Original Original Original Original Original Original Original Original Original Original Original Original Original Original Original Original Original Original Original UNCLASSIFIED//FOR OFFICIAL USE ONLY i UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 RECORD OF AMENDMENTS AMEND NUMBER/ IDENTIFICATION DATE ENTERED (YYMMDD) ENTERED BY (Signature, Rank/Rate, Command Title) UNCLASSIFIED//FOR OFFICIAL USE ONLY ii UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 RECORD OF PAGE CHECKS DATE CHECKED 05/15/2017 CHECKED BY (SIGNATURE, RANK/RATE, COMMAND TITLE) PHILLIPS.MILLARD.J.III.1114056 Digitally signed by PHILLIPS.MILLARD.J.III.1114056975 975 M. J. PHILLIPS, CIV, NCMS,08:08:52 GG-13 Date: 2017.05.16 -04'00' UNCLASSIFIED//FOR OFFICIAL USE ONLY iii UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 KMI POLICY & PROCEDURES MANUAL (OVERVIEW) Chapter 1 Chapter 2 - Chapter 3 - Chapter 4 - Chapter 5 - Chapter Chapter Chapter Chapter Chapter - 6 7 8 9 10 Key Management Infrastructure (KMI) Management Client (MGC) System Overview, Security Requirements and Equipment Matters Privilege Management: Roles, Exclusions, Registration and Enrollment Account Establishment and Personnel Designation Requirements Duties and Responsibilities of Key Management Operating Account (KOA) Management Personnel Education, Training and Audits Accounting and Accounting Functions COMSEC incidents Practices Dangerous to Security (PDSs) Electronic Storage Devices ANNEXES A B C D E F G H I Abbreviations and Acronyms Definitions COMSEC Library KMI related forms Quick Reference Conducting and Verification of Page Checks and Modifications Helpful Uniform Resource Locators (URLs) Emergency Action and Emergency Destruction of COMSEC Material Sample Waiver Request for KOAM or Alternate Appointment Sample Statement of Responsibilities Information System Privileged Access Agreement and Acknowledgement of Responsibilities (Required for CPAs and CPSOs) UNCLASSIFIED//FOR OFFICIAL USE ONLY iv UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 TABLE OF CONTENTS CHAPTER 1 - KEY MANAGEMENT INFRASTRUCTURE (KMI) 101. INTRODUCTION TO THE KEY MANAGEMENT INFRASTRUCTURE (KMI) 103. KEY MANAGEMENT INFRASTRUCTURE (KMI) ROLES AND SERVICES a. b. c. d. e. f. g. h. i. j. k. l. m. n. o. p. q. r. s. 105. NATIONAL SECURITY AGENCY (NSA) a. b. 107. Central Services Node (CSN) Client Platform Administrator (CPA) Client Platform Security Officer (CPSO) Command Authority (CMD Auth) Controlling Authority (CA or CONAUTH) Device Local Type 1 Registration Authority (DLT1RA) Device Registration Manager (DRM) Eligibility Authority (EA) Eligibility Authority (EA) Proxy Enrollment Manager (EM) HP Service Manager (HPSM) KMI Operating Account Manager (KOAM) KMI Operating Account Registration Manager (KOARM) Personnel Local Type 1 Registration Authority (PLT1RA) Personnel Registration Manager (PRM) Primary Services Node (PRSN) Product Source Node (PSN) Product Requestor (PR) Type 1 Token Security Officer (TSO) United States National Distribution Authority Central Facility (CF) DEPARTMENT OF THE NAVY (DON) ORGANIZATION AND TERMS a. b. c. d. e. f. g. h. i. j. Chief of Naval Operations (CNO) Headquarters Marine Corps (HQMC C4 CY) Commander, Coast Guard C4IT Service Center (COGARD C4ITSC-BOD-IAB) Commanding Officer COMSEC Material Issuing Office (CMIO) Firefly Credentials Manager Firefly Point of Contact Immediate Superior in Command (ISIC) Key Management Entities (KMEs) KMI Operating Account (KOA) UNCLASSIFIED//FOR OFFICIAL USE ONLY v UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 k. l. m. n. o. p. q. r. s. t. KOA Agent (KOAA) COMSEC Clerk KMI Operating Account Manager (KOAM) KOAM (Alternate) COMSEC Witness Local Element (LE), LE Issuing, and LE In-Transit Naval Communications Security Material System (NCMS) Service Authority (SERVAUTH) Staff CMS Responsibility Officer (SCMSRO) Legacy Catalog Manager (LCM) CHAPTER 2 – MANAGEMENT CLIENT (MGC) SYSTEM OVERVIEW, SECURITY REQUIREMENTS (INCLUDES STORAGE AND SHIPMENT OF COMSEC MATERIAL) 201. General a. b. c. d. e. Client Host/Management Client (MGC) Client Host Only (CHO) Delivery Only Client (DOC) Advanced Key Processor (AKP) AKP and REINIT Drive Visual Inspection Log (Figure 21) Type-1 Token (KOV-29) 203. Security Controls 205. KMI Related Certificates 207. MGC/AKP Required Cryptographic Ignition Keys (CIKS) and Keying Material a. b. c. d. e. f. g. h. 209. Operational (AKP) CIKS Firefly (FF) Vector Set FF Credentials Message Signature Key (MSK) Benign Fill (BF) Firefly KG Rules Site Re-initialization AKP Recertification Label Security and Accountability of KMI-related Devices a. b. c. Classification of KMI Related Devices AKPREINIT 1 and AKPREINIT 2 Flash Drives Location of the MGC/AKP UNCLASSIFIED//FOR OFFICIAL USE ONLY vi UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 211. Field Recovery of an AKP 213. Classification and Accountability of KMI-Related Components 215. PINS/Passwords 217. Packaging, Shipping and Transportation of COMSEC Material and Equipment Shipping – Quick Reference Matrix (Figure 2-2) 219. Software Upgrades 221. Equipment Failures 223. Security and Storage of COMSEC Material a. b. c. d. e. COMSEC Facilities Security Containers Residential Storage Segregation of Material Two Person Integrity (TPI) CHAPTER 3 – PRIVILEGE MANAGEMENT: ROLES, EXCLUSIONS, REGISTRATION AND ENROLLMENT 301. Separation of Duties 303. Role Exclusions 305. KMI Role Exclusion Listing 307. KOA Registration (Overview) 309. KMI Operating Account (KOA) Registration Data 311. Human User (Personnel) Registration 313. KMI Personnel Registration Form, KMI Form 001 315. Enrollment Process – KMI Personnel Enrollment Form, KMI Form 002 317. Roles Supporting KOA Registration 319. Account Registration - COMSEC Account Data for KMI UNCLASSIFIED//FOR OFFICIAL USE ONLY vii UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Registration, KMI Form 003 321. Human (Person) User Activation 323. Device Registration Process 325. Device User Initialization 327. Device Endorsement 329. Device Activation 331. KMI Role Management 333. Access Control Managers 335. User Support Manager 337. Type 1 Token Security Officer – (TSO or SO) 339. KOA Agent (KOAA) – A non-management Role 341. Disenrollment 343. Enrollment Reverification 345. Human User Reverification CHAPTER 4 – ACCOUNT ESTABLISHMENT AND PERSONNEL DESIGNATION REQUIREMENTS 401. Requirement for a KMI Account 403. Establishing a KMI Operating Account (KOA) KOA Account Establishment Message Routing (Figure 4-1) Asymmetric (Modern) Key Validation Process (Figure 4-2) Sample KOA Establishment Request (Figure 4-3) 405. Selection of KMI Personnel 407. Manpower Requirements for KMI Operating Account (KOA) a. b. Account Composition Grade Requirements for KOAMs, Alternates, LE Issuing and Clerks UNCLASSIFIED//FOR OFFICIAL USE ONLY viii UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 409. KOA Manager (KOAM) and Alternates 411. Other KMI Related Roles KOAMs may Perform Sample KOAM Appointment Letter Figure 4-4 Sample CPA or CPSO Appointment Letter Figure 4-5 CHAPTER 5 – DUTIES AND RESPONSIBILITIES OF KEY MANAGEMENT OPERATING ACCOUNT (KOA) MANAGEMENT PERSONNEL 501. Duties and Responsibilities of; a. b. c. d. e. f. g. h. i. j. k. l. KOA Managers/Alternates Personnel Local Type 1 Registration Authority (PLT1RA) Device Local Type 1 Registration Authority (DLT1RA) Product Requestors (PR) Client Platform Administrator (CPA) Client Platform Security Officer (CPSO) Controlling Authorities (CONAUTH) Command Authorities (CMDAUTH) KOA Registration Managers (KOARM) Device Registration Manager (DRM) Enrollment Managers (EM) Legacy Catalog Manager (LCM) CHAPTER 6 – EDUCATION, TRAINING AND AUDITS 601. Training Requirements KMI Training Quick Reference Matrix (Figure 6-1) 603. KMI Management Client (MGC) Course of Instruction (COI) 605. KMI Training Locations 609. Additional KOAM/Alternate Training Requirements 611. Personnel Qualification Standards (PQS) 613. CMS COR Audits KMI Training Matrix Figure 6-1 CHAPTER 7 – ACCOUNTING AND ACCOUNT FUNCTIONS 701. Accounting (General) UNCLASSIFIED//FOR OFFICIAL USE ONLY ix UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 703. Overview of MGC Accounting Functions 705. Management of COMSEC Material in an Organization a. b. c. d. e. f. 707. Inventory Requirements a. b. 709. Receipting for COMSEC Material Issuance of COMSEC Material on a Local Custody Basis Issuing Quick Reference Matrix (Figure 7-1) Management of COMSEC Material at the User, Work Center, LE or KOAA level, as applicable (watch and non-watch environment) Loading and Usage of Keying Material Authorization and Transferring COMSEC Material Shipping Quick Reference Matrix (Figure 7-2) Use of Possession and Relief from Accountability Reports and Required Authorization Account Level Inventories Fixed-cycle Inventory Matrix (Figure 7-3) Inventory Requirement Matrix (Figure 7-4) Physically Conducting an Inventory Status Information and Destruction of COMSEC Material a. b. c. d. e. f. g. h. Status of COMSEC Material Other Status Related Terms Status Information and Responsibilities Destruction Guidance Applicable at the Account and LE Level Destruction Time Frames for COMSEC Material at the LE Level Destruction Time Frames for COMSEC Material at the Account Level Destruction Personnel Destruction Methods (Figure 7-5) CHAPTER 8 – COMSEC INCIDENTS 801. General a. b. c. d. Reporting Types of COMSEC Incident Reports Time Frames for Reporting Quick Reference Matrix (Figure 8-1) Classification UNCLASSIFIED//FOR OFFICIAL USE ONLY x UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 e. f. Required Addees for COMSEC Incident Reports PLA Quick Reference Matrix (Figure 8-2) Related Accounting Reports 803. Organizational Responsibilities 805. Types of COMSEC Incidents a. b. c. d. 807. Cryptographic Incidents Personnel Incidents Physical Incidents Sample Initial Report of COMSEC Incident (Figure (Figure (Figure (Figure 8-3) 8-4) 8-5) 8-6) COMSEC Incident Evaluation a. b. c. Assessing Compromise Probability Compromise Probability Examples Additional Information Sample Evaluating Authority (EVALAUTH) Message (Figure 8-7) CHAPTER 9 – PRACTICES DANGEROUS TO SECURITY (PDSs) 901. General a. b. c. 903. Types of PDSs PDS Documentation Reporting Time Frames PDSs by Category a. b. Non-Reportable PDSs Reportable PDSs (Figure 9-1) (Figure 9-2) 905. PDS Reports 907. PDS Documentation (Samples) Non-Reportable PDS Reportable PDS (Figure 9-3) (Figure 9-4) CHAPTER 10 – ELECTRONIC STORAGE DEVICES 1001. General 1003. Software Management UNCLASSIFIED//FOR OFFICIAL USE ONLY xi UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 1005. Classification, Accountability, Safeguarding and Access 1007. Types of Keying Material Related to Electronic Storage Device (ESD) 1009. Loading Keying Material into an ESD 1011. Visual Inspection Requirements 1013. Destruction of Electronic Keying Material 1015. Transportation and Shipment 1017. Audit Trail Review Requirements 1019. ESD Interface Flows 1021. Emergency Protection 1023. Repair and Maintenance ANNEXES ANNEX A Acronyms ANNEX B Definitions ANNEX C COMSEC Library ANNEX D KMI Forms Quick Reference ANNEX E Conducting and Verification of Page Checks and Modifications Helpful URLs ANNEX F ANNEX G Emergency Action and Emergency Destruction of COMSEC Material (recommend deleting due to EKMS 1 redundancy) ANNEX H Sample Waiver Request Message for KOAM or Alternate Appointments ANNEX I Statement of Acceptance of Responsibilities Key Management Infrastructure (KMI) Management Client (MGC), Client Host Only (CHO) or Delivery Only Client (DOC) Information System Privileged Access Agreement and Acknowledgment of Responsibilities UNCLASSIFIED//FOR OFFICIAL USE ONLY xii UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 CHAPTER 1 - KEY MANAGEMENT INFRASTRUCTURE (KMI) 101. INTRODUCTION TO THE KEY MANAGEMENT INFRASTRUCTURE (KMI). a. KMI will represent a substantial change in how keying material is; accessed, accounted for, delivered, and ordered in comparison to previous technologies and mediums used. The flexibility and scalability built into the KMI architecture has been designed to operate in a unified, network-centric approach. KMI will make use of additional and faster communications media to deliver required products to the COMSEC community; this will include the Secret Internet Router Protocol Network (SIPRNET), Non-Classified Internet Router Protocol Network (NIPRNET) and the Joint Worldwide Intelligence System (JWICS). KMI will support web-based ordering and delivery of required keying material to the war fighter; support benign fill techniques; the delivery of key to End Cryptographic Units (ECUs) and support Over the Network Key (OTNK) key delivery. b. In the KMI, certain roles require tokens (KOV-29) personalized to the holder of the role in lieu of user IDs and passwords. Role and rule-based policies will be implemented to restrict functions performed and to ensure compliance with mandated separation of duty requirements referred to herein as role exclusions. c. KMI will also introduce new internal and external roles, which will be performed by and assigned to different individuals and organizations. d. Access to KMI related systems and resources is restricted to properly cleared, trained and authorized personnel whose official duties require access and are consistent with need-toknow principles. Access controls will be in compliance with DoD, DON and National IA regulations. 103. KEY MANAGEMENT INFRASTRUCTURE (KMI) ROLES AND SERVICES. a. Central Services Node (CSN) - The CSN is the KMI core node maintained and managed at NSA and provides long-term system archive. b. Client Platform Administrator (CPA) – An individual designated in writing by the Commanding Officer CO responsible for System Administration functions involving the KMI Management UNCLASSIFIED//FOR OFFICIAL USE ONLY 1-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Client referred to herein as the MGC. Personnel appointed as a CPA with administrative privileges must be registered and enrolled in KMI, but do not require a Type 1 token. The role of the CPA role cannot be concurrently assigned to the holder of the Client Platform Security Officer (CPSO) role. If the role of the CPA is performed by the KOAM, additional training requirements discussed in Chapter 6 of this document must be satisfied. c. Client Platform Security Officer (CPSO) – An individual designated in writing by the CO responsible for security monitoring, including the review of audit data associated with the MGC. This role requires a Type 1 token and cannot be performed by a KOAM or CPA. d. Command Authority (CMD Auth) – Responsible for requesting partition codes, Department/Agency/Organization (DAO) codes and specifying partition and code ordering privileges on behalf of Product Requestors. If a CMD Auth has a requirement to order keying material, they must also be enrolled as a Product Requestor within the KMI. e. Controlling Authority (CA or CONAUTH) In the KMI architecture, the CA validates requirements for symmetric (traditional) keying material and book packaged material. f. Device Local Type 1 Registration Authority (DLT1RA) Responsible for verifying the existence and condition of KMIaware devices, approving the conversion of the device’s infrastructure seed key, and initiating a request for a Type 1 certificate for the device. Within the DON, this role will be performed by either the KOAM or an Alternate KOAM for the account. This role requires a Type 1 token and cannot be held by someone appointed as the CPSO or Device Registration Manager (DRM). g. Device Registration Manager (DRM) – Responsible for both registration and initialization of KMI-aware devices. These devices include and are not limited to; ECUs, Type 1 Tokens, and AKPs. This role requires a Type 1 token. h. Eligibility Authority (EA) – The EA role will be held by the Commanding Officer of the account, unless delegated at his/her discretion to the Command Security Manager (CSM), Assistant Command Security Manager or Special Security Officer (SSO). If other than the CO, the EA must be designated in UNCLASSIFIED//FOR OFFICIAL USE ONLY 1-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 writing by the CO. The EA conducts face-to-face verification of persons to be appointed to a position requiring registration and enrollment in KMI. The EA is also responsible for submitting requests for disenrollment to the EA Proxy when a manager transfers, retires, separates, has their access or clearance suspended or when access is no longer required. i. Eligibility Authority (EA) Proxy – The EA Proxy is responsible for final verification of KMI related forms and documentation received from DON activities prior to submission to NSA for registration and enrollment actions in the KMI. The EA proxy role will be fulfilled by NCMS. j. Enrollment Manager (EM) - A security-sensitive role in which the entity/individual will be responsible for the assignment of KMI User Identities to management roles, rulebased attributes to KMI manager identities, and privileges to a Type 1 identity issued for use in KMI. This role requires a Type 1 token and within the DON will be performed by NCMS. k. Service/Agency Help Desk Manager – A role assigned to personnel providing customer organization-specific help desk services. l. KOA Manager (KOAM) – Formerly referred to as an Electronic Key Management System (EKMS) Manager or COMSEC Custodian. Additional duties and responsibilities of the KOAM are outlined in EKMS-1(series) Art 455. The role of the KOAM requires a Type 1 token and cannot be performed by either a Client Platform Security Officer (CPSO) or a KOA Registration Manager (KOARM). As KMI-aware devices are developed, the KOAM will also be responsible for the proper maintenance of the account’s Device Distribution Profile (DDP), including the timely addition of devices to the appropriate DDP to allow delivery of key to the device. m. KOA Registration Manager (KOARM) - Responsible for maintaining registration information related to KOAs. Within the DON, NCMS will perform KOARM-related functions in KMI. n. Personnel Local Type 1 Registration Authority (PLT1RA) – The PLT1RA is the role assigned to individuals responsible for performing face-to-face verification of the identity of the user receiving the Type 1 token, initiating a certificate request, and performing the download of the Type 1 certificates onto the UNCLASSIFIED//FOR OFFICIAL USE ONLY 1-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 token. With exception to their own token, the PLT1RA is also the Type 1 Token Security Officer (TSO or SO) for tokens issued during their assignment as PLT1RA. Within the DON, this role will be performed by either the KOAM or an Alternate KOAM for the account. This role requires a Type 1 token and cannot be held by the CPSO or Personnel Registration Manager (PRM). o. Personnel Registration Manager (PRM) - Responsible for the validation of authoritative data and the registration of users within the KMI. This role requires a Type 1 token and will be performed at NSA. p. Primary Services Node (PRSN) - The PRSN maintained at NSA is referred to as the KMI Storefront, will operate on all KMI supported networks and serves as the interface between Client Nodes and other Nodal components in KMI. The operating status of the PRSN is available at www.iad.nsa.smil.mil – IA Services – KMI Program Office – Operations Infrastructure Components. q. Product Source Node (PSN) - The PSN maintained at NSA will generate and produce most of the cryptographic keying material currently produced at the Central Facility (Tier 0) and Central Office of Record (Tier 1) based on product or service orders received from the Primary Services Node (PRSN). The PSN will also produce Type 1 certificates and other forms of credentials such as Personal Identification Numbers (PINs). r. Product Requester (PR) – An external manager responsible for requesting products and services. PRs must be enrolled as managers and their privileges defined by the Product Manager, which is typically the CONAUTH or CMDAUTH. PRs who order asymmetric products perform functions previously performed by a User Representative (UR). s. Type 1 Token Security Officer (TSO) (Throughout this document, the acronym TSO or SO both refer to the same role or person occupying such) - A TSO is not a KMI role and therefore does not require registration, enrollment, or a Token for perform required duties. A KOAM can perform the duties of the TSO for another Manager’s token and vice versa; however, a KOAM cannot be the TSO for his or her own token. Any person performing the role of TSO must complete the required TSO CBT; see Annex F for the URL. If the role is fulfilled by UNCLASSIFIED//FOR OFFICIAL USE ONLY 1-4 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 an individual other than KOAM, he or she must be designated as the TSO in writing by the CO. The TSO must validate the Token is personalized to the requesting KOAM through comparison of the name reflected on the certificate information with the identification presented prior to resetting the KOAM’s operational password. See the OSD for the SKEY6500 Token (KOV-29) for TSO/SO specific duties, responsibilities and related periodicities for the execution of such. 105. NATIONAL SECURITY AGENCY (NSA). NSA serves as Tier 0 and is the executive agent for developing and implementing national level policy affecting the control of COMSEC material and manages and maintains the Central Services Node (CSN). NSA is also responsible for the production and distribution of most COMSEC material used to secure communications as well as for the development and production of cryptographic equipment. a. UNITED STATES NATIONAL DISTRIBUTION AUTHORITY (USNDA). USNDA serves as the consolidated COMSEC distribution facility for physical keying material. USNDA processes and automatically ships physical Reserve on Board (ROB) material required by each of the services to the DCS delivery address of record. b. CENTRAL FACILITY (CF). The CF primarily functions as a high volume key generation and distribution center. The CF provides commands with keying material currently produced by NSA that cannot be generated locally or must be generated by Tier 0. The CF will interact with commands through a variety of media, communication devices and networks, allowing for the automated ordering and distribution of asymmetric (modern) keying material. 107. DEPARTMENT OF THE NAVY (DON). For COMSEC purposes, DON encompasses KOAs owned/managed by the Navy, Marine Corps, Coast Guard, and Military Sealift Command (MSC). The DON system implements national policy, publishes procedures, and establishes its own KOAs with NCMS serving as a Service Authority (SERVAUTH) for COMSEC material. a. CHIEF OF NAVAL OPERATIONS (CNO). Overall authority, CNO is responsible for implementation of National COMSEC policy within the DON. The Head, Navy Information Assurance (IA) Branch is the COMSEC resource sponsor and is responsible for UNCLASSIFIED//FOR OFFICIAL USE ONLY 1-5 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 COMSEC programming, planning and implementation of policy and technical improvements. NOTE: Department of Navy Chief Information Officer (DON CIO), as the Executive Agent, is overall responsible for DON COMSEC policy and oversight. The Deputy Under Secretary of the Navy for Plans, Policy, Oversight and Integration (DUSN PPOI) is the DON's Security Executive responsible for DON security policy. b. HEADQUARTERS MARINE CORPS (C4 CY). HQMC C4 CY serves as COMSEC resource sponsor for the Marine Corps. The department functions as the USMC Service Authority and coordinates with CNO, COMNAVIDFOR, and NCMS to establish, promulgate, and oversee COMSEC account management matters unique to the Marine Corps. The C4/CY is the focal point for requirements and administration for all Marine Corps COMSEC accounts. c. COMMANDER, U.S. COAST GUARD C4IT SERVICE CENTER, INFORMATION ASSURANCE BRANCH (C4ITSC-BOD-IAB). C4ITSC serves as the overall authority for USCG KMI/COMSEC matters. C4ITSC serves as the USCG Service Authority, Program Manager and Principal Agent for the USCG COMSEC Program and functions as the USCG’s Evaluating Authority (EVALAUTH), Command Authority (CA) and USCG ISIC. C4ITSC promulgates USCG COMSEC Program policy, exercises service wide management of Coast Guard accounts including hardware and software allowances and acts as principal USCG liaison for KMI/COMSEC matters with the CNO, NCMS and other entities to ensure that all USCG accounts have the necessary resources to operate effectively. d. COMMANDING OFFICER (CO). The CO is overall responsible for proper administration of the command's KOA and ensuring compliance with established policy and procedures. Throughout this manual, responsibilities/duties applicable to Commanding Officers apply equally to Staff CMS Responsibility Officers (SCMSROs) and Officers-In-Charge (OIC) alike. e. COMSEC MATERIAL ISSUING OFFICE (CMIO). CMIO serves as the Physical Material Handling Segment (PMHS) for the DON; receives, stores, and ships Ready for Issue (RFI) equipment to fulfill validated requirements as well as functions jointly with NCMS as the Legacy Catalog Manager (LCM). f. FIREFLY CREDENTIALS MANAGER. A Key Management Entity (KME) responsible for removing outdated credentials from the UNCLASSIFIED//FOR OFFICIAL USE ONLY 1-6 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Directory Service. The duties of the Firefly Credentials Manager are performed by the Central Facility (CF). g. FIREFLY POINT OF CONTACT. NCMS serves as the FIREFLY POC for asymmetric (modern) key privileges with the DON. Accounts requiring replacement Firefly (FF) Vectors and/or Message Signature Key (MSKs) must order such through NCMS. h. IMMEDIATE SUPERIOR IN COMMAND (ISIC). Responsible for the administrative oversight of all KMI/COMSEC matters for their subordinate commands. Additional information related to ISIC duties and responsibilities can be found in EKMS-1(series) Articles 130, 315, and 440. i. KEY MANAGEMENT ENTITIES (KMEs). A KME is an activity, organization, or person(s) performing one or more key management–related function for an activity assigned a KOA ID. j. KEY MANAGEMENT INFRASTRUCTURE (KMI) OPERATING ACCOUNT (KOA). Formerly referred to as a CMS, COMSEC or EKMS account; a KOA is an administrative entity in which custody and control of COMSEC material is maintained. Each KOA account is assigned and identified by a six-digit KOA number. k. KOA AGENT (KOAA). A KOA Agent is not a KMI management role within the KMI; a KOAA and Product Requestor are in essence considered COMSEC users. KOAAs are not registered and enrolled like other KMI users, although any KMI Manager can be designated as a KOAA by a KOA Manager. KOA Managers are always automatically designated as KOAAs for their own KOAs. l. COMSEC CLERK. A COMSEC Clerk assists the KOAM or Alternate(s) with routine administrative account matters. Appointment of a Clerk is not mandatory, but is at the discretion of the CO. If appointed, the individual must be designated in writing by the CO. Contractors as COMSEC Clerks: Contractor personnel may be appointed as account clerks provided they meet the designation requirements of this manual for the position and are supervised by the KOAM or Alternate. Close supervision is a necessary condition of the appointment of contractors as clerks. NOTE: As stipulated in the Security Doctrine for the MGC/AKP, access to the MGC/AKP is restricted to personnel who have received formal training and are assigned as a UNCLASSIFIED//FOR OFFICIAL USE ONLY 1-7 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 KOAM or Alternate. m. KOA MANAGER (KOAM). An individual designated in writing by the CO to manage COMSEC material held by/charged to the unit’s KOA account. The KOAM is the CO's primary advisor on matters concerning the security and handling of COMSEC material and the associated records, reports, and audits. Throughout this manual the term KOAM refers to either a KOAM or Alternate, as applicable. n. KOA MANAGER (KOAM ALTERNATE). The individual(s) designated in writing by the CO responsible for assisting the KOAM in the performance of his/her duties and assuming the duties of the KOAM in his/her absence. The alternate is equally responsible for the proper management and administration of a KOA. o. COMSEC WITNESS. A properly cleared individual (includes contractor personnel) called upon to assist a Manager or Local Element in performing routine administrative tasks related to the handling of COMSEC material. A witness must meet applicable designation and security requirements set forth in this manual and Articles 175, 410, 416 and 505 to EKMS-1(series). A witness will be supervised by a KOAM or other qualified and cleared LE personnel. p. LOCAL ELEMENT, LE ISSUING, AND LE IN-TRANSIT. See EKMS1(series) Articles 165 - 166 for the definition, examples and applicable restrictions. In KMI, such refers to a known person or group, known locally registered in the MGC, who are accountable and responsible for COMSEC material issued to them. q. NAVAL COMMUNICATIONS SECURITY MATERIAL SYSTEM (NCMS). Administers the DON KMI/COMSEC program and fulfills the responsibilities of the SERVAUTH. Additional functions performed by NCMS include: (1) Drafts and publishes KMI/COMSEC policy directives, standards, and procedures pertaining to KMI/COMSEC material security, distribution, training, handling, and accounting within the DON. (2) Operates, maintains, and exercises administrative, operational, and technical control over CMIO for distribution of COMSEC equipment. UNCLASSIFIED//FOR OFFICIAL USE ONLY 1-8 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 (3) Develops procedures for and monitors compliance with proper physical storage and account management of COMSEC material. (4) Monitors compliance with national standards of the Protective Technologies Program for cryptographic keying material. (5) Reviews requests for and authorizes waivers to physical security requirements and the release of DON COMSEC material to contractors. (6) Coordinates fleet requirements for the acquisition of all COMSEC material, publications and equipment for DON activities. (7) Establishes and disestablishes DON COMSEC numbered accounts. (8) Ensures distribution of COMSEC material to Vault Distribution Logistics System (VDLS) components to ensure quantities are sufficient for COMSEC account requirements, exercises, and contingency operations. (9) Provides status information for COMSEC material to KMI accounts and planners. (10) Provides disposition instructions for DON COMSEC material. (11) Evaluates COMSEC incidents and Practices Dangerous to Security (PDSs) to determine the adequacy of existing procedures as well as overall compliance with existing policy. (12) Manages the COR Audit Teams and audit program within the DON, including the training and certification of CMS COR Auditors. (13) Liaisons with the Center for Information Dominance (CID) and acts as the Technical Advisor within the DON training community regarding the KMI course of instruction (COI). (14) Inventory Control Point (ICP) for COMSEC equipment throughout DON and manages cryptographic equipment assets for DON. UNCLASSIFIED//FOR OFFICIAL USE ONLY 1-9 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 (15) As the DON KOA Registration Authority, responsible for the registration and assignment of KMI IDs to commands for ordering required initialization keys for AKPs and for maintaining registration data on its activities/commands. (16) FIREFLY POC for asymmetric (modern) key privileges. (17) Serves as the Legacy Catalog Manager (LCM) with CMIO on KMI matters. (18) Serves as the KOA Registration Manager (KOARM) and Eligibility Authority (EA) Proxy for the DON. r. SERVICE AUTHORITY (SERVAUTH). The role of the Service Authority within each Service may be fulfilled by more than one person or agency within that Service. The Service Authority is responsible for oversight of COMSEC operations, policy, procedures, and training. Additional duties may include: - Cryptographic hardware management and distribution control, including Foreign Military Sales (FMS). - Approving account establishment and disestablishment. - Approving authority for Certification Approval Authorities (CAAs). - Implementing COMSEC Material Control System (CMCS)/Key Management Infrastructure (KMI) policy and procedures. - Direct operational support. - Final adjudication authority for determining when reported COMSEC incidents result in COMSEC insecurities. - Ensuring service compliance with COMSEC access program Requirements. - Standing membership on KMI working groups and the CT1 Joint Configuration Control Board (JCCB) s. STAFF CMS RESPONSIBILITY OFFICER (SCMSRO). A flag or general officer in command status, or the Deputy Commander or Chief of Staff, may either assume personal responsibility for routine COMSEC matters, or may designate the responsibility to a staff officer (O-4/GS-12, Pay Band 2, or above). Officers not meeting the above requirement may not designate a SCMSRO. A SCMSRO may exist at a command with an account or LE. t. LEGACY CATALOG MANAGER (LCM). The LCM is responsible for maintaining the KMI Product Catalog current with the Legacy Electronic Key Management System (EKMS). UNCLASSIFIED//FOR OFFICIAL USE ONLY 1-10 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 CHAPTER 2 – MANAGEMENT CLIENT (MGC) SYSTEM OVERVIEW, SECURITY REQUIREMENTS (INCLUDES STORAGE AND SHIPMENT OF COMSEC MATERIAL) 201. GENERAL: KMI enhances security, improves distribution to the war fighter and alleviates many time-consuming legacy functions historically performed manually. Some processes that will be enhanced through KMI include, but are not limited to: accountability through more automated accounting, delivery of key directly to a forward deployed users End Cryptographic Unit (ECU), and delivery of key to devices which are KMI-aware vice issuing all keying material for manual loading by LE personnel. KMI is comprised of three NSA-managed core nodes and user managed Client Nodes. Core nodes consist of the CSN, PSN and the PRSN. KMI will introduce the use of Type 1 Public Key Infrastructure (PKI) certificates and tokens for human users and user devices requiring access to the KMI. KMI will also provide secure integration of commercial products in tactical environments through the use of PKI certificates to ensure identification, authentication and confidentiality requirements are enforced. In the KMI, the Client Host Platform is referred to as the Management Client, Client Host or simply the “MGC. The MGC suite consists of a fully equipped MGC and related peripherals including an Advanced Key Processor (AKP), Printer, Barcode Scanner, Type 1 Token (KOV-29) a High Assurance Internet Protocol Encryptor (HAIPE) device (KG-250) and other peripheral components reflected in the OSD for the MGC. The MGC itself consists of three separate components, a Client Host, a KOK-32 Advanced Key Processor (AKP) and a KOV-29 (Token). Some of the functions available when disconnected are the local management of a KOA, which include but are not limited to, local symmetric key generation, distribution of electronic and hard copy key stored at the KOA, and all local accounting functions. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 a. Client Host/Management Client (MGC). The Client Host provides the KOAM the ability to order, account for, distribute, and manage keying material, equipment and other COMSEC materials. 1. The Client Host is approved to process and store Unclassified//FOUO encrypted keying material and data up to and including Secret. 2. The Client unencrypted key and Secret data. At no or data from a fill Host shall never process or store is not authorized to process or store Top time will a KOAM upload Top Secret Red Key device to the Client Host. 3. Policy, Procedural, Doctrine or other reference material helpful in the management of the account may be uploaded and stored in InfoCenter folder on the MGC desktop. b. Client Host Only (CHO). The CHO is a NSA approved management platform that operates without an AKP. The CHO will operate on the same Window Operating System (OS) as the Client Host where a full MGC suite is deployed. Although the CHO does not have an AKP, it is able to receive packages and communicate directly with another client node but does not support the protocols for red key fill. A CHO may be the appropriate and more cost effective solution for Controlling Authorities, Command Authorities, Registration Managers and Registration Authorities when personnel performing these roles are not KOAMs for an account where an AKP is required. Many accounting functions not related to key production and generation are available with a CHO. Should an account equipped with a MGC/AKP suite suffer an AKP failure, it is possible to manage the account as a CHO; the Client Host will detect if an AKP is available and provide the corresponding degree of service to the KMI (i.e., “full” MGC with an AKP, CHO without an AKP). An illustration of a CHO is reflected on the following page. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Client Host Only (CHO) Illustration Client Host (High Assurance Platform) Printer Barcode Scanner Type 1 Token HAIPE (KG-250) 6 UNCLASSIFIED // FOR OFFICIAL USE ONLY c. Delivery-Only Client (DOC). The DOC represents the customer end of the client-server interaction and is capable of reach-back and communications with the PRSN’s Delivery-Only interface to receive products and services. The DOC, like the CHO, does not consist of the fully integrated MGC/AKP suite. The DOC interface may use either Transport Layer Service (TLS) UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 or a user-name and password for identification and authentication. Once authenticated, KMI will permit the viewing of the Product Activity List (PAL) reflecting products and services the requestor is authorized to receive. d. Advanced Key Processor (AKP). 1. The AKP is a Type 1 cryptographic device used in KMI. It is assigned the Short Title (KOK-32), classified SECRET and will be accounted for as ALC-1 in the CMCS. 2. Although the AKP can support either Test (TestPAC) or Operational Positive Access Control (OpPAC), to change an AKP from test to operational and vice versa is prohibited; regardless of status (test or operational), the AKP must be registered in KMI. Note 1: Operational KOA – Operational Positive Access Control (OpPAC) AKP with a Type 0 FIREFLY key. Operational KMI Entity – OpPAC AKP without Type 0 FIREFLY key. Test KOA – Test Positive Access Control (TestPAC) AKP with Type 0 FIREFLY key. Test KMI Entity – TestPAC AKP without Type 0 Firefly key. Note 2: Tokens used at test KOAs/KMI Entities are not accountable in the CMCS. 3. The AKP must be recertified 7 years from the date of the last certification as indicated on the devices tag. 4. The KOAM or Alternate must, at a minimum of monthly conduct a visual inspection of the AKP to certify that no signs of damage or tamper are evident. This will be documented in the form of a locally created AKP Visual Inspection Log and will include at a minimum: the Short Title and Serial Number of the AKP, the date inspected, the printed name and signature of the individual who conducted the inspection and whether any damage or tamper was noted. The log will be closed out annually and retained for two years or the next COR Audit, the sooner of the two. A sample log for use in the conducting and documenting visual inspections of the AKP can be found below. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-4 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 COMMAND TITLE: ______________ ACCOUNT NR ______ KOK-32 SN: _____ CY-20XX AKP AND REINIT DRIVE VISUAL INSPECTION Date Inspected Inspected by (1st Person) Printed Name 1st Person Signature Inspected by (2nd Person) Printed Name 2nd Person Signature Anomalies noted Yes/No * NOTE: A visual inspection is required at a minimum of monthly in accordance with Articles 201 and 209 to this manual. Any signs of damage or tamper detected must be reported in accordance with Chapter 8. Figure 2-1 e. Type 1 Token (KOV-29). A (COTS sKey6500) is a small, portable cryptographic hardware module that provides Type 1 security services such as signing, signature verification, encryption, decryption, key establishment, and asymmetric keypair generation in KMI. 1. Certain roles in KMI require the use of a hardware token to perform assigned duties. At the account level, such roles include a KOAM, Alternates and the CPSO. 2. Hardware tokens (KOV-29s) registered in the Operational KMI, (KOV-29) are accountable in the CMCS as an ALC-1 item. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-5 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 3. Tokens registered as discussed above are UNCLASSIFIED when not inserted in the Client Host and SECRET when inserted in the Client Host. 4. Each DON account will be provided with (2) tokens per KOAM and (1) per CPSO. If additional tokens are required, the account must submit a validation request per Article 610 to EKMS-1(series). 5. Each Account Manager(s) must request a one-time pin for their contingency/backup token through submission of a KMI Form 001 to the EA Proxy at NCMS. The token must be personalized to the individual to manage the account should their primary token fail. 6. The KOV-29 is KMI Aware and holds the Type 1 PKI Identification and Authentication and Key Establishment certificates for itself and the individual to which it is personalized to. 7. Tokens are personalized to a specific individual and are not to be shared. 8. A token must not left inserted, unattended in a MGC. 9. Tokens will not be shipped or hand carried with the associated pin or password. 10. The token is unlocked through a combination of userentered Personal Identification Number (PIN) and the secure recovery of a companion value stored in the AKP or the PRSN. 11. The Type 1 Token includes active tamper protection mechanisms to protect private and secret key materials and other sensitive data and algorithm items it holds. 12. If more than one KMI Manager is enrolled with the same role, each Manager must use only his/her own KOV-29 to accomplish tasks associated with the role. 13. In an emergency such as death, emergency leave, loss or inadvertent destruction of a token, etc…, a KOAM may use the contingency/backup token personalized to the KOAM or Alternate KOAM for use in such scenarios. A contingency/backup token is not intended to replace the token personalized to the respective KOAM. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-6 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 14. Accounts must request disposition and replacement of failed tokens in accordance with EKMS-5(series). 15. Additional information for the KOV-29 can be found in the OSD located in the NSA IA Library on the SIPRNET under the doctrine tab. See Annex F for the URL. 203. SECURITY CONTROLS. a. Controlled usage is a property of the KMI that limits user activities to authorized personnel through the implementation of roles, rules and other access control mechanisms and policies. KMI limits user access to system resources based on attributes associated with resources (e.g., classification, ownership), requested function (e.g., authorizations), and association of the user identity (e.g., clearance, roles, domains, and “need-to-know”). b. User accountability refers to a process in which KMI enables the actions of an individual user and system activities to be traced uniquely to the specific user. To establish user accountability, KMI registers users and requires evidence of eligibility to access the system; identifies users uniquely; and enforces stronger forms of identification and authentication across the infrastructure. c. Administrative activities are tracked for auditing through Attack, Sensing, Warning, and Response (ASWR) systems. KMI records information that associates users with activities performed on their behalf and enables authorized managers to access and evaluate the accountability information through secure means, within a reasonable amount of time, and without undue difficulty. 205. KMI RELATED CERTIFICATES. a. Certificates stored on tokens will be used by personnel and devices. Certificates will also be used by other KMI-aware devices such as the AKP (KOK-32). b. Type 1 PKI certificates are controlled by the PSN. The AKP (KOK-32) requires several specific keys and Type 1 PKI certificates to be fully functional. Some keys are locally generated while others must be ordered and received from Tier 0 or the KMI storefront. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-7 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 c. The AKP locally generates a public and private key pair supporting IA(I) Type 1 certificate as a one-time transport key during initialization by the DRM or an operational key during endorsement by the DLT1RA. The public key included in the IA(I) Type 1 certificate received from the KMI storefront is used by the AKP for authentication purposes. d. The AKP also locally generates a public and private key pair supporting the IA(M) Type 1 certificate during the activation of the AKP by the KOAM. The public key included in the IA(M) Type 1 certificate received from the KMI storefront is used by the AKP for authentication and signature purposes. e. Type 1 IA(I) and IA(M) certificates are valid for five (5) and two (2) years respectively. To reduce the potential impact to mission readiness, both the IA(I) and IA(M) certificates will be rekeyed annually or as soon as possible thereafter when operations permit such. Failure to rekey IA(I) and IA(M) certificates as stated herein must be documented in accordance with Chapter 9 of this manual. 207. MGC/AKP REQUIRED CIKS AND KEYING MATERIAL. Procedures for performing a site initialization, reinitialization, changeover and AKP rekey will be in accordance with the MGC/AKP Operator’s Manual. A Type 0 FF Vector Set (FF), Message Signature Key (MSK), and (2) Cryptographic Ignition Keys (CIKs) are required to perform a site initialization or re-initialization of an AKP. a. Operational (AKP) CIKS. Each account with an AKP will receive two operational CIKS; one of which will be operationally affiliated with the account’s AKP by the DRM. Operational CIKS are not for logging on to the AKP. The KOAM or Alternate must create a backup of the operational CIK using the 2nd CIK provided. If additional CIKS are procured, the KOA may create one additional CIK but will not have more than three in the account. 1. Operational CIKS are UNCLASSIFIED except when inserted or in the vicinity of the AKP. When inserted or not secured away from the AKP, operational CIKS will be stored and safeguarded at the SECRET level. 2. CRYPTO. Operational CIKS are not subject to TPI or considered UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-8 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 3. Operational CIKS may be stored either in the account’s vault or a GSA-approved container, with access restricted to the KOAM or Alternates. 4. Must be protected to prevent unauthorized access by anyone except properly cleared and appointed KOAMs and Alternates. 5. present. reported be ruled the loss Must not be left inserted when no account manager is Loss of an operationally affiliated CIK must be in accordance with Chapter 8, if unauthorized use cannot out. If unauthorized access can be ruled out, document as a PDS in accordance with Chapter 9. 6. In the event an operationally affiliated CIK is damaged or lost, the KOAM must delete the corresponding split from the AKP and the damaged CIK(s) must be sent to a Service Depot for destruction. b. FF Vector Set. The FF Vector Set is required and must be loaded to enable the account to generate and exchange account credentials necessary for conducting or receiving services related to keying material. 1. All FF Vector Set key orders must be submitted in accordance with EKMS-1(series) Article 670. Paragraph 1 of the request must state the key is for a KOA. For a KOA, the only delivery option when either a FF Vector Set or MSK is required is electronic delivery. KSD-64A is not an option in delivery of these for a KOA. 2. The FF Vector Set must be stored, safeguarded and accounted for consistent with the assigned classification and ALC which is typically the HCI of the account and ALC-6. 3. For operational accounts, upon completion of loading the FF Vector Set, a backup of the MGC must be performed and the FF Vector Set used destroyed from any fill device storing such or on the MGC through the Human Machine Interface (HMI). This does not apply to test FF Vector Sets used for test AKPs at training facilities or by COR Audit Teams. 4. The loaded FF Vector Set must be recorded as Filled in End Equipment and reflected on the account’s next end-of-month destruction report. Following successful loading of the 1st copy of the FF Vector Set, should a second copy of the Vector UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-9 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Set be received but is not used, the second copy will be zeroized and recorded as destroyed since it was not used or “filled”. 5. Failure to destroy the FF Vector Sets within the time frame discussed above must be documented in accordance with Chapter 9 of this manual. 6. The FF Vector Set must be rekeyed at a minimum of annually. c. FF Credentials. 1. Generated credentials are posted by the KOAM to the EKMS Directory Server. 2. Credentials are not crypto but expire monthly or at the time of the expiration of the associated FF Vector Set. 3. Unless limited by the KOARM, the KOAM can generate and post up to twelve (12) months’ worth of credentials. 4. Failure to conduct an AKP rekey at a minimum of annually will prohibit the account from generating credentials or receiving keying material electronically. 5. Prior to performing a rekey of the FF Vector Set, any pending transactions must be processed. Failure to do so will prohibit the processing of any pending key packages, necessitate the need for resupply impacting mission readiness, and possibly result in accounting discrepancies. 6. It is highly recommended deployable units conduct an AKP rekey prior to deployment and only after ensuring there are no pending Bulk Encrypted Transactions (BETs) in the unit’s mailbox or desktop. d. Message Signature Key (MSK). The MSK is used to digitally sign messages. The MSK is classified at the HCI of the account and is assigned an ALC of 6. 1. MSKs must be requested in accordance with EKMS1(series) Article 670. Paragraph 1 of the request must state that the key is for a KOA. Only electronic delivery is available for a KOA. As stated above for FF Vector Sets, MSKs cannot be shipped to a KOA on a KSD-64A. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-10 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 NOTE: With exception to test AKPs held at training facilities and COR Audit Teams, regardless of the account’s HCI, the loading of MSK and subsequent creation of AKPREINIT 1 and AKPREINIT 2 Flash Drives at operational accounts, must be conducted by the KOAM and an Alternate or properly cleared witness adhering to Two-Person Integrity (TPI) procedures including handling and storage following creation. 2. AKPREINIT 1 and AKPREINIT 2 Flash Drives are created following the loading of the MSK. 3. KOAMs will create AKPREINIT 1 and AKPREINIT 2s on NSAapproved flash drives. As stated in the OSD for the MGC, NSA has obtained the applicable exception to the restrictions on USB flash drive usage set forth in Computer Task Order (CTO) 10-133 for KMI-only purposes. Only NSA approved USB Flash Drives procured for use as AKPREINIT keys shall be inserted into the AKP USB port. 4. For operational accounts, upon completion of loading the MSK and creation of the AKPREINIT 1 and AKPREINIT 2 flash drives, the KOAM must conduct a backup of the MGC and record the MSK loaded as destroyed using the filled in end equipment or similar function in the MGC environment. This does not apply to test MSKs used for test AKPs at training facilities and by COR Audit Teams. 5. The loaded MSK must be recorded as filled in end equipment and reflected on the account’s next end-of-month destruction report. 6. Failure to record the MSK loaded as filled in end equipment within the time frame discussed above must be documented in accordance with Chapter 9 of this manual. If a 2nd copy was requested but not required, it will be zeroized and recorded as destroyed as it was not filled. Destruction of the second copy of the MSK will be on the same end-of-the-month destruction report as the one filled or be documented as described above. 7. The cryptoperiod for the Local Key Encryption Key (KEKL) associated with an AKP is 12 months. 8. A Changeover must be performed at a minimum of annually. Semi-annual changeovers are recommended in order to UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-11 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 reduce system down-time for large accounts and the potential for a COMSEC incident. 9. Due to AKPREINIT media changeover must cleared account the Two Person Integrity (TPI) requirements of in KMI, regardless of the account’s HCI, be conducted in the presence of two properly personnel (KOAM/Alternate). 10. A backup is recommended prior to performing a changeover but must be performed after a changeover is conducted. e. Benign Fill (BF) Firefly. 1. BF Firefly key if used is designed to encrypt key transferred between the AKP and BF-capable end cryptographic unit (ECU). 2. BF Firefly key is created by Tier 0 and must be accounted for, stored and safeguarded based on its assigned classification and ALC. 3. BF Firefly key must be re-keyed annually. 4. The Key Management Identification Number (KMID) of an ECU’s BF firefly key must be registered in the MGC prior to performing Benign Fill functions. f. KG Rules. 1. KG Rules enable the AKP (KOK-32) to locally produce keying material for existing and emerging COMSEC equipment. 2. KG Rules are produced and distributed electronically to KOAs by NSA. 3. KOAMs at operational accounts must load the latest version of KG Rules within 30 days of receipt; this is not applicable for test AKPs used strictly in a training environment. 4. The previous version must be destroyed NLT the 5th working day of the month following the month of loading the new version. 5. Failure to destroy previous versions of KG Rules held UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-12 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 by the account as stated above will be documented in accordance with Chapter 9 of this manual. 6. Procedures for loading the KG Rules can be found in the KMI Operation and Maintenance Manual (OMM). g. Site Re-initialization. Enables the recovery of all protected data stored on the MGC and is also performed as a result of either an AKP failure or recertification. The AKP has a recertification requirement of 7 years from the date on the equipment; not from the date of receipt. The AKPREINIT 1 and AKPREINIT 2 drives are required for use during this process. Step-by-step procedures for performing a Site Re-initialization can be found in KMI MGC Operations and Maintenance Manual (OMM) which can be found at the URL in Annex F. h. AKP Recertification Label. To enhance awareness with regards to the AKP recertification date/status, a label with AKP information (e.g., recertification date, PAC status, etc.) may be applied to the AKP. Only KMI-approved and provided labels are authorized for use. The label is to be applied only to flat surface on the AKP’s top front right-hand corner. 209. SECURITY AND ACCOUNTABILITY OF KMI RELATED DEVICES. a. Classification of KMI related devices and items. All KMI, COMSEC-accountable items, required for management of the account are reflected in the OSD for the MGC. The OSD also reflects the proper Short Titles, Classification, ALC and material type for KMI-related COMSEC material. b. AKPREINIT 1 and AKPREINIT 2 flash drives (throughout this manual the term AKPREINIT and REINIT refer to one in the same). 1. Prior to use, AKPREINIT 1 and AKPREINIT 2 flash drives are UNCLASSIFIED and not COMSEC accountable. Once used in the KMI, they are classified at the SECRET level and must be brought into CMCS accountability through submission of a possession report to the COR. 2. Regardless of classification AKPREINIT drives which have been used at an operational KMI account must be handled, safeguarded and stored under Two-Person Integrity rules in a GSA-approved security container or vault. NOTE: TestPAC AKPREINIT USB Flash Drives used at training UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-13 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 sites are classified SECRET but are not assigned an AL Code or accountable in the CMCS. 3. Only NSA-approved and provided USB flash drives are authorized to be used. 4. Under no circumstances will a single flash drive be used for creating, downloading or storing AKPREINIT 1 or AKPREINIT 2 key splits, data, etc… 5. For accounts with a HCI of Secret, as an alternative to programming the FF-L-2740/2740A locking mechanism with two combinations, which would prevent access to other mission essential keying material not subject to TPI, the account can seal the flash drives in NSA-approved tamper evident bags. 6. If the account has an HCI of Secret and the AKPREINIT flash drives are protected with NSA-approved tamper-evident bags, a daily inspection of the bag must be conducted and documented on days when the container in which they are stored is opened. 7. Additionally, the KOAM and an Alternate will conduct a monthly visual inspection of the tamper evident bag to detect any possible tampering. This visual inspection must be documented in the form of a log and the log will be closed out annually and retained for two years at the account. 8. At a minimum, the visual inspection log mentioned above will reflect the Command Title/Account number, the date of the visual inspection, the printed name of the person(s) conducting the inspection, and a remarks column for any comments, i.e. no tampering or other signs of attempted access noted. The log will be closed out at the end of each calendar year and retained for 2 years. NOTE: Figure 2-1 can be modified to accommodate both daily and/or monthly AKP and AKPREINIT visual inspections. Monthly visual inspections must reflect the signature of both the KOAM and Alternate 9. AKPREINIT flash drives must have a tag affixed to them indicating the Short Title, version number and KOA. The initial set of AKPREINIT will be version 0 and each subsequent version created during future changeovers will be incremented up one number. Following completion of the changeover, the KOAM will UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-14 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 bring the new AKPREINIT flash drives into COMSEC Material Control System accountability through submission of a report the possession to the COR and perform a backup. Prior COR (SERVAUTH) authorization is not required; the possession report be signed by the manager, a witness and the CO. 10. Each KOA will have and account for (2) sets of AKPREINIT flash drives. Each set is different and is associated with specific back up media. The creation of additional sets must be authorized by the SERVAUTH. If authorized, additional sets must be brought into proper CMCS accountability. 11. AKPREINT USB Flash Drives will not be inserted into any device except the associated AKP. Any other use or insertion of AKPREINT USB Flash Drives containing AKPREINIT data in a device other than the associated AKP is a COMSEC Incident and will be reported. 12. Reuse of AKPREINIT USB flash drives is only authorized at the same KOA account when a replacement AKP is received. 13. AKPREINIT drives must be matched with the specific backup performed after initial AKP activation or changeover, as applicable has been completed. 14. In future changeovers, if existing flash drives are overwritten (reused), the oldest set will be used. For consistency purposes, the oldest backup media associated with the overwritten drives should also be used for the backup after the changeover is performed. Ensure the labeling of both is updated and matches. 15. When AKPREINIT devices are no longer required or become corrupted, the KOAM must request disposition instructions from NCMS for the flash drives and the associated backup media. 16. It is imperative that the KOAM establish local procedures to accurately label and identify AKPREINIT drives with the corresponding back-up media to which they pertain. If the media and AKPREINIT drives do not match, any local/field recovery efforts will fail. 17. Except during emergency destruction when directed, AKPREINIT flash drives will not be disposed of or destroyed at the account level without prior authorization from NCMS. Because the drives are associated with specific backup media, UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-15 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 which is also COMSEC accountable, disposition requests for AKPREINIT flash drives must also include the backup media. 18. Destruction, if authorized must be reported to the COR in accordance with EKMS-1(series) Article 540. c. MGC/AKP Locations. 1. Shipboard: a. The location in which the MGC/AKP is installed must be designated as Restricted Area. b. The space must be approved for open storage SECRET or the MGC drives and AKP must be disconnected, removed, and stored in a GSA-approved security container when the space is not occupied by KOAM account personnel. c. The location in which the MGC/AKP is installed must be restricted to KOAMs and Alternates. Written access authorization will be granted by the CO of the account. If located in a vault or adjoining COMSEC office where an access list is required, the authorization can be annotated on the access list for the space. d. Access lists will be updated upon change of command, when personnel change, or annually whichever occurs first. 2. Submarine: a. Onboard a submarine, the MGC/AKP is rack-mounted and installed in the Radio Room where non-account personnel are assigned. b. Non-account personnel who are properly cleared will be reflected on the access list for the restricted space negating the need to remove the drives and disconnect the AKP daily while deployed or in-port and store it in a GSA approved security container. c. Written access authorization will be granted by the CO of the account. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-16 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 d. Access lists will be updated upon change of command, when personnel change, or annually whichever occurs first. 3. Fixed Site: a. The location in which the MGC/AKP is installed must be designated as Restricted Access. b. The space must be approved for open storage SECRET in accordance with SECNAV M5510.36 or the MGC drives and AKP will be disconnected, removed, and stored in a GSA-approved security container when the space is not occupied by KOAM account personnel. c. Unescorted access to the location where the MGC is installed must be limited to personnel holding a minimum SECRET clearance whose official duties require access to the space. If in installed in a COMSEC vault, unescorted access must be restricted to KOAMs and KOAM Alternates. Written access authorization will be granted by the CO of the account. If located in a GSA Secure Vault or adjoining COMSEC office where an access list is required, the authorization can be annotated on the access list for the space. d. Access lists will be updated upon change of command, when personnel change, or annually whichever occurs first. 4. KOAMs and Alternates must take additional security precautions in unique operating environments where a vault or dedicated COMSEC office does not exist such as a radio room onboard a submarine. In such instances, all personnel who access the area where the MGC/AKP is located must possess a valid SECRET or higher security clearance. 5. KOAMs and Alternates must ensure at no time are the MGC and/or AKP left logged on/unattended by account management personnel. 6. Other non-account personnel requiring access to the location of the MGC such as a CPA (if the CPA is not the KOAM or Alternate) or CPSO must be escorted and logged in/out in a visitor’s log if not on the formal access list for the space. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-17 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 7. Installation of a MGC or AKP in a mobile communications environment will be in accordance with the OSD for the MGC. 8. Neither the MGC nor AKP will be left logged on and unattended where an unauthorized or improperly cleared person could gain access or where such could result in a loss of TPI; both instances require reporting as a COMSEC incident. 9. Security reminder: Access to spaces where classified material is used and stored must be protected, restricted and limited to appropriately cleared personnel whose official duties require access, and who also possess a valid need-to-know for material they have access to. If an individual is not on an access list, the person MUST be logged in/out in the visitor’s log. If one’s clearance status is not known and verified, sanitize the space by turning over working papers, cover status boards, and turn off computer displays or other viewable classified information when the personnel are in the space. 211. FIELD RECOVERY OF AN AKP. a. Zeroization of an AKP for other than intentional purposes prior to returning the AKP to a depot-level facility must be reported as a COMSEC Incident. 1. A field-zeroization causes the AKP to zeroize and must be reported as a COMSEC incident in accordance with Chapter 8. The report must include all pertinent details and all facts related to the zeroization including the name, rank, and position of the Commanding Officer, if a field recovery is authorized as discussed below. 2. Except during an operational emergency, approval to perform a field-recovery must first be obtained from the SERVAUTH (NCMS). 3. During an operational emergency which affect real-world operations, a field-recovery may be performed when authorized by the Commanding Officer. NCMS must be notified within 48 hours of the field recovery. 4. Recovery accomplished with database backup media and AKPREINIT drives associated with that particular backup will result in the reappearance of keying material previously destroyed on the inventory requiring that it be re-destroyed. Any key received after the backup was conducted will be lost. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-18 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 The use of database backup media and AKPREINIT drives older than seven calendar days must be reported as a PDS to NCMS in accordance with Chapter 9. 5. Resurrection of key previously destroyed as a result of restoration from backup media may require previously destroyed and reported key be destroyed again. Failure to re-destroy previously destroyed key NLT the 5th day of the month following the resurrection or field-recovery actions, as applicable, must be documented in accordance with Chapter 8 of this manual. 6. NCMS will provide assistance on clearing the KOA of any resurrected or lost key. 213. CLASSIFICATION AND ACCOUNTABILITY OF KMI-RELATED COMPONENTS. a. General. Due to changes in KMI-related OSDs, the previously published listing of components has been removed from this document. A complete listing of KMI related components, including Short Titles, ALCs, classification of each and material types can be found in the Operational Security Doctrine for the MGC available in the NSA IA Library on the SIPRNet. b. AKP USB Flash Drives must be tagged and labeled in accordance with the MGC OSD. c. Device specific guidance for the MGC, the KOV-29 (Token), and the KOK-32 (AKP) can be found in the respective Operational Security Doctrine(OSD) at the URL located in Annex F. NOTE: KAR 5s are only created at a Service Level Depot facility. Any account with KAR 5s created with Spiral 1 software is required to locally destroy the media and report the destruction to the COR. No DON accounts should have a KAR 5 on the Product Inventory. d. Each account will retain a current image of the client host, backup media and one prior version of each. Versions older than the first previous version may be destroyed using approved methods outlined in the NSA Evaluated Products List (EPL). COR authorization is not required to destroy older media; the destruction must be reported to the COR. The discovery of client images or backups older than the first previous set/version will be treated as a non-reportable PDS in accordance with Chapter 9 herein. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-19 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 e. Classified material must be properly labeled, safeguarded, stored, disposed of and be addressed in the command’s Emergency Action and/or Emergency Destruction plans, as applicable. 215. PINS/PASSWORDS: a. The Client Host (MGC) requires (3) passwords; the Data At Rest (DAR) password which protects the MGC Hard Drive; a Windows User Password and the Basic Input/Output System Password (BIOS). b. Access to the DAR administrator username/password is restricted to the CPA. The DAR user password is shared by authorized users (Account Managers) at a specific account. c. Only the CPA/CPSO are authorized to have knowledge of and access to the Client Host Platform BIOS Password. d. See the OSD for the MGC for additional information related to the aforementioned passwords, related requirements and/or restrictions. e. PINS are classified at the privilege level of the holder; passwords are Secret; both will be recorded, safeguarded and stored as indicated below. 1. PINS and/or passwords will be recorded, protected, stored, safeguarded, and inventoried in accordance with EKMS1(series) Article 515.f and 520.j. The exception to the labeling discussed in EKMS-1(series) Article 520.j with regards to KMI is the user name, if different than the employee name, will be reflected in Blocks 5 and 10 of the SF-700. The top of the form will be labeled MGC/AKP Administrator or Operator PIN/Password, as applicable in lieu of LMD/KP in Block 10 of the SF-700. Part 2A will reflect the user name, the AKP PIN, and the Windows password and must be classified commensurate with the privilege afforded the employee registered. NOTE: It is highly recommended that Windows naming conventions be standardized and one adhere to a first name dot last name format, i.e. Willie.Nillie, to correlate directly to a specific and unique account manager. 2. PINS and/or passwords will be changed at a minimum of every 90 days and will always require immediate changing when a UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-20 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 compromise or suspected compromise is discovered. A backup must be performed and new SF-700s filled out in conjunction with MGC/AKP pin or password changes. NOTE: If not operationally feasible (i.e. submarines or accounts which operate with different crews (gold, blue, etc…) for a password to be changed within 90 days, it must be changed at first login thereafter. 3. Passwords required by a single person occupying more than one position/role within an account may be recorded on a single SF-700. Example: A KOAM requires a Windows password, a password for his/her own Token, a password for another token if they are the TSO/SO for other tokens and a password for the CPA account if the incumbent is performing the duties of the CPA. 4. Passwords associated with the KOV-29 may be 8 – 20 characters in length and must include uppercase, lowercase, numbers and special characters. 5. The Token SO is responsible for proper control, management and security of the SO account password for each token they manage. 6. The use of a single password is permitted for KOV-29s managed by the Token SO. 7. When a new Token SO is appointed, a new password must be created and implemented for the tokens managed by the previous Token SO. 8. In the event a KMI Manager, whose role requires a token, forgets his or her password, the Token SO can, in the presence of the KOAM, perform a password reset. The performing of a password reset requires confirmation from the KMI Manager the token has been under proper control at all times and never subjected to possible unauthorized access. 9. Token SOs are required to have a compromise recovery plan (CRP) for KOV-29s associated with the Token SO password. The CRP must include revocation procedures in the event of a lost token. The CRP must be incorporated into the command’s local COMSEC policy and must be verified and exercised annually for accuracy, awareness and feasibility purposes. 10. The MGC is configured to lock-out an account after UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-21 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 three failed logon attempts. Should this occur, contact the CPA to have the account unlocked or password reset. 217. PACKAGING, SHIPPING AND TRANSPORTATION OF COMSEC MATERIAL AND EQUIPMENT. a. Packaging, shipping and transporting of COMSEC material will be in accordance with EKMS-1(series) Articles 525 – 535. For ease in referencing purposes, a quick matrix is located on the following page. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-22 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 SHIPPING QUICK REFERENCE MATRIX Shipping Method Top Secret/ Secret material marked “crypto” or items with classified logic or algorithms Confidential material marked “crypto” Unclas material marked “crypto” TS/Secret Equipment (not designated as CCI) CCI (unclas, not keyed) (See Note 4) DCS YES YES YES YES SDCS Designated and cleared couriers Commercial Carrier (PSS/Ground) Commercial Carrier USPS (Registered Mail) USPS (Express Mail) Navy Supply System, Military Air (AMC, LOGAIR, QUICKTRANS, etc…) YES YES YES YES YES YES YES YES YES (OCONUS, when other approved methods are not available or will not meet mission requirement) YES YES NO YES YES YES YES YES (Note 5) NO NO NO YES YES (See Note 1) YES (See Note 6) NO NO YES (See Note 2) YES NO NO NO NO YES (See Note 3) NO NO NO NO NO YES NO NO Figure 2-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-23 MGC (with drives installed and KMI software on them) or MGC hard drives without the MGC but with KMI software on them; AKP, AKPREINIT Flash Drives YES YES YES NO UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 DCS = Defense Courier Service, SDCS = State Department Courier Service, PSS = Protective Security Services. United States Postal Service = USPS. Registered Mail must not pass through a foreign postal system or be subject to foreign inspection. Material shipped to APO/FPO addresses does not pass through a foreign postal system. NOTES: (1) See EKMS-1(series) Article 535 for additional information, restrictions and notification requirements. (2) See EKMS-1(series) Article 530.a.3 for additional information and restrictions. (3) The shipper must obtain assurance from U.S. Postal Service authorities that the material will receive continuous electronic or manual tracking to the point of delivery and a recipient‘s signature must be obtained. Material must be introduced into the postal system acrossthe-counter at a U.S. Postal Service Facility; the use of postal drop boxes are not authorized. (4) Equipment which makes use of CIKS, PINS, or passwords is considered unclassified when these items are removed and shipped separately from the device. Devices should always be shipped in a zeroized state however, should mission requirements necessitate loading the device prior to shipment, associated CIKS, PINS, or passwords MUST be shipped separately. If any of these items are shipped with the equipment, it must be reported in accordance with Chapter 8. FTRs are classified SECRET and must never be shipped with the associated equipment. (5) CONUS ground transportation only (6) USPS Registered Mail cannot be used to ship CCI containing lithium batteries to/from an APO/FPO address if the size, quantity or lithium content of the batteries exceed the limits in the International Mail Manual or Domestic Mail Manual (IMM/DMM). b. Courier personnel must have current, written authorization in the form of official travel orders or a DD-2501 or DHS 11000-1 from their organization. The authorization must be retained on the person at all times when performing duties of a courier. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-24 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 c. A list of commercial carriers offering PSS services may be requested from the Surface Deployment and Distribution Command (SDDC). 219. SOFTWARE UPGRADES a. Software upgrades will not be performed on COMSEC equipment by any DON accounts until the software is approved by NSA, has been tested and validated by the In-Service Engineering Activity (ISEA) and is approved for installation by NCMS or the Marine Corps Tactical Systems Support Activity (MCTSSA), for USMC accounts. b. When approved via official message from NCMS or MARFORSYSCOM (USMC accounts only), commands must ensure compliance with the upgrade and report such no later than the established compliance date. c. With exception to software distributed by NSA, including Information Assurance Vulnerability Assessment (IAVA) patches posted to the Product Availability Library (PAL), the INFOSEC web site is the only authorized source for software upgrades by DON accounts. d. When warranted due to operational requirements, Program Managers (i.e. ADNS, GCCS-M, ISNS, JWICS, etc…) may request a waiver or extension via official message to MARFORSYSCOM or COMNAVIDFOR, as applicable, with NCMS as an info addee on the request. Neither individual units nor Program Managers will submit waiver requests directly to NSA. e. Procedures which violate other IA regulations will not be used for performing software upgrades (i.e. use of personally owned computers or thumb drives) by DON accounts. f. NCMS approval is NOT required to download and install IAVA patches from the PAL. All units are responsible for compliance and proper reporting of IAVA compliance. 221. EQUIPMENT FAILURES a. Requests for assistance in troubleshooting MGC/AKP related system failures or problems will be directed to SPAWAR Systems Center Atlantic. b. Regardless of warranty status, under no circumstances UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-25 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 will a MGC with the hard drive(s) inserted or a MGC hard drive on which KMI software has been installed be shipped to a vendor or factory. c. Each DON COMSEC Account were provided four hard drives for the MGC. Two of the drives have KMI software pre-installed on them and are COMSEC accountable. The other two hard drives are spares without KMI software installed on them; without the KMI software installed the drives are unclassified and not COMSEC accountable. If required for use, as directed by the Help Desk, if KMI software is installed on a spare hard drive, the drive must be possessed and brought into CMCS accountability. COR (SERVAUTH) approval is not required to possess the hard drives but the possession must be reported to the COR. d. The MGC operates in a Redundant Array of Independent Disks (RAID) 1 configuration in which the (2) hard drives are mirrored. Failure of single hard drive will not prevent the device from operating properly. e. The failed drive should be reported to SPAWAR, NCMS and the unit’s ISIC in the form of a message requesting disposition instructions for the failed drive. The message must include the Help Desk Ticket # and date of the call or email to the Help Desk. f. Upon authorization in writing from NCMS, failed drives will be destroyed locally in accordance with the NSA EPL and Naval Technical Directive (NTD) 03-11, Disposal of Navy Computer Hard Drives or shipped to the NSA Classified Material Conversion (CMC) for destruction. When authorized, destruction of equipment must be carried out within 90 days of the authorization and must be reported to the COR. If the destruction is not carried out and reported within 90 days, document the matter as late destruction in accordance with Chapter 8. g. Defective or inoperable KOV-29s, must be disposed of in accordance with EKMS-5 (series). h. Prior to shipping, the KOV-29 must be zeroized when possible and the associated IA(I) and IA(M) certificates revoked. 223. SECURITY AND STORAGE OF COMSEC MATERIAL UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-26 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 a. COMSEC Facilities. Regardless of the type of facility, whether a fixed COMSEC facility, unattended or contingency fixed secure telecommunications facility, fixed secure subscriber facility, transportable and mobile facility, or DoD Bulk Encryption Facility, each facility must be approved to hold classified material PRIOR to its installation, use, or storage as discussed below. A complete description of each type of facility, applicable security requirements and further guidance may be found in EKMS-1(series) Articles 550 – 575. 1. COMSEC equipment or keying material will only be installed, used or stored in containers or spaces approved up to or higher than the highest classification of material used or stored in the space/container. Such approval must be in writing by the Cognizant Security Official (CSM, Physical Security Officer, and Special Security Officer (SSO)) PRIOR to the installation and/or storage, as applicable. 2. Any facility or container must be re-inspected at a minimum of biennially, or when any modifications or repairs are conducted to the container, locking mechanism or facility, or when reoccupied after being temporarily abandoned. Additional or periodic inspections will be conducted based on geographical location of the facility (CONUS vs. OCONUS), threat, and sensitivity of the facility, materials and operational requirements and past security concerns, discrepancies or potential vulnerabilities. Unattended facilities must be physically inspected every 30 days by U.S. personnel responsible for the facility. 3. Prior to activation, in addition to the required Physical Security Inspection, a general COMSEC inspection is required. The general COMSEC inspection will review facility Standard Operating Procedures (SOPs), to ensure procedures which minimize risk to personnel and ensure the security of materials used are in place and address both routine and emergency destruction procedures. 4. Initial facility approvals for COMSEC vaults used to store keying material or SCIFs will be conducted by an Accrediting Official (AO) in accordance with ICD 705. 5. Shore-based COMSEC vaults used to store keying material that are modified or constructed after the date of promulgation of this manual will be constructed in accordance with Intelligence Community Directive (ICD) 705 adhering to the UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-27 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 criteria and associated checklist in the Intelligence Community Policy Guidance (ICPG) 705.1 or later version. 6. Existing vaults which have not been modified and vaults onboard afloat units may continue to operate under the criteria previously established in EKMS-1(series) Annex N. 7. A daily security checklist (SF-701) is required for spaces where classified material is used, whether manned 24 hours a day or not, and proper securing of materials and security containers will be verified once per watch or at the end of the work day prior to departure and reflected on the SF701 for the space. SF-701s will not be used in lieu of other inventory documents required herein and will be retained for a minimum of 30 days beyond the last date recorded. 8. Access to spaces where classified material is used and/or stored will be restricted to properly cleared personnel, whose official duties require access to the space. Such personnel, including newly reported personnel must be reflected on a formal access list for the space or logged in/out of a visitor’s register. 9. Uncleared personnel who must enter the space for official functions such as space surveys or maintenance must be escorted at all times by authorized personnel. Prior to entrance, the space will be sanitized and classified material covered or properly stored to prevent unauthorized viewing. 10. All visitors’ logs will reflect the date and time of both arrival and departure, the printed name and signature of the visitor, the purpose of the visit and the signature of the official admitting the visitor. Visitor’s logs will be reviewed periodically at the unit level for proper maintenance, and during visits and audits. Logs will be closed out annually and must be retained for one year. A new log will be implemented for each facility/space for each calendar year. b. Security Containers. COMSEC material not required for use and under the direct control of appropriately cleared and authorized personnel will be secured in a GSA-approved container or Class-5 vault door equipped with a FF-L-2740 or higher locking mechanism, which will be locked, verified and documented on a SF-702 when not in use. For TPI containers, a separate SF702 will be used for each combination. SF-702s will be retained for 30 days beyond the last date recorded. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-28 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 1. If the container or vault is protecting Top Secret keying material, the locking mechanism will be programmed with two different combinations. No single person will change or have knowledge of both combinations. Combinations associated with containers or vault doors at the account or LE Issuing level will be restricted to account or LE Issuing personnel, as applicable. 2. Combinations will be changed when a lock is initially put in use or has been taken out of service; when someone with knowledge of the combination is reassigned, transfers or separates; when suspected to have been compromised or biennially if not sooner based on the other criteria addressed herein. 3. Combinations will be stored on SF-700s and will NOT be written down on other forms or documents (wheel books, electronic devices, etc...) 4. A separate SF-700 (Record of Combination) is required for each combination programmed. SF-700s are classified based on the highest classification of material protected by the container and locking mechanism (i.e., if the container is used to store Top Secret, Secret and Confidential material, the SF700 will be classified Top Secret). 5. Completed SF-700s will be sealed in laminating paper or tamper indicating envelopes. 6. Part 1 of the SF-700 is NOT considered or to be marked as classified; it is considered Personally Identifiable Information (PII). Part 1 will still reflect the names, addresses and telephone numbers of authorized holders of the combination to contact them immediately, if discovered unsecured and will be posted inside the door (vault) or safe (as applicable) but must be sealed in an opaque envelope and labeled “Security Container Information” prior to affixing it to vault door or container. If Part 1 is unsealed, it must be resealed no later than the following working day. 7. Part 2 is used to protect Part 2A; both must be labeled with the highest classification of materials protected by the combination and will reflect “Derived from: 32 CFR 2001.80(d)(3)” and declassification instructions “Upon Change of Combination”. Part 2A will be placed inside of aluminum foil prior to storing it in Part 2. The adhesive seam on Part 2 will be signed and dated by the person sealing the envelope and UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-29 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 laminated afterwards. 8. To facilitate timely implementation of emergency action, when directed, SF-700s will be stored in a central location within the command; the container must be GSA approved and approved for storage up to the highest level of the SF700(s) stored in it. SF-700s which are properly laminated and sealed do NOT require TPI handling or storage. 9. An inventory document must be created and used to inspect SF-700s at a minimum of monthly or sooner, if a combination is changed and the SF-700 updated. The inventory will list, the Dept/Division responsible for the container, the container number, the location of the container, date the combination was last changed and the signature of the person inventorying/inspecting the SF-700s. 10. The Commanding Officer or other designated command personnel (Command Duty Officer, Security Manager, etc….) may direct the emergency opening of any container within the command. Such will be conducted in the presence of two properly cleared personnel and the personnel responsible for the materials protected by the container or vault, as applicable MUST conduct an inventory, report any material which may not be accountable, change the combinations and update the SF-700s. 11. An OF-89 must be prepared and posted in any security container used to store classified material. Any repairs to the container MUST be recorded on it. It is a permanent record to be maintained with the container. Commands acquiring new containers must ensure they are GSA-approved, equipped with the FF-L-2740 or higher locking mechanism and that an OF-89 is prepared and posted for the container. c. Residential Storage. Classified material will not be brought to or stored in a private residence without the consent of the Commanding Officer and the following approvals or compliance measures in place prior to installation or storage; 1. Approval by the appropriate level of the unit’s chain of command as set forth in Chapter 10 to SECNAV M5510.36. 2. To satisfy critical operational requirements. UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-30 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 3. The request fully complies with Article 10-10 to SECNAV M5510.36, Naval Technical Directive (NTD 03-09), DOD 5200.01 and local, ISIC or TYCOM directives. 4. A GSA-approved security container is required prior to issuance of any materials and the combination will be restricted to the individual responsible for the materials. CIKS, KSV-21 cards, TALON cards, etc… will be secured in the container when not in use, a SF-702 will be used to document openings and closings, and an OF-89 must be created and affixed inside the container. 5. If approved, keying material issued will be limited to a 30 days’ worth and will be issued to DTD, SKL or other electronic storage device. Any storage device provided is subject to annual re-initialization and monthly audit trail reviews. Failure to have the device reinitialized or make such available for audit trail reviews monthly or more frequently will be reported as a COMSEC incident. 6. Unauthorized personnel will not have access to classified material nor will CIKS, storage devices or KSV-21 cards be left out when not in use. A STE may be used occasionally by uncleared personnel, but only when the card is removed and either under the direct control of the person to whom it is issued or stored in a security container. Any instance of unauthorized access, including to a STE with the card inserted must be reported in accordance with Chapter 8. d. Segregation of Material. COMSEC material will be stored, safeguarded and handled based on the classification of the material. Other classified or unclassified non-COMSEC material will not be stored with COMSEC material. Material will be segregated based on classification and status of the material to facilitate emergency destruction, when directed. NATO material may be stored with other COMSEC material of the same classification. At the account level, in addition to segregation by classification, material will be segregated based on the status of the material, i.e. effective, reserve on board (by effective period, i.e. 1st month, 2nd month, 3rd month) and superseded (typically pending end of the month destruction). e. Two Person Integrity (TPI). UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-31 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 1. TPI handling requires that at least two persons, who are authorized access to COMSEC keying material, be in constant view of each other and the COMSEC material requiring TPI whenever that material is accessed and handled. Each individual must be capable of detecting incorrect or unauthorized security procedures with respect to the task being performed. 2. TPI storage requires the use of two approved combination locks (each with a different combination) with no one person authorized access to both combinations. 3. TPI is required for any of following materials and or scenarios: a. Top Secret keying material or designated “crypto” b. Fill devices (DTD, SKL, TKL, etc…) storing Top Secret keying material (when the associated CIK is also present or accessible) c. Equipment which generates or is loaded with Top Secret keying material which permits extraction of key d. The AKP if the account’s HCI is Top Secret, when (2) personnel with Top Secret accounts on the MGC/AKP are logged on e. AKPREINIT 1 and AKPREINIT 2 Flash Drives f. When picking up material from DCS, if the account’s HCI is Top Secret or when picking up Top Secret material moved via an account to account transfer g. When Top Secret key is passed via OTAD or OTAT h. Legacy fill devices or fill devices with CIKS (DTD, SKL, TKL, etc…) inserted or accessible in spaces where equipment which permits extraction of key is used or installed. 4. TPI is not required for any of the following: a. Handling, storage and access to SECRET COMSEC material regardless of crypto designation (with exception to AKPREINIT 1 and AKPREINIT 2 Flash Drives) b. CCI keyed with Top Secret key or CIKS associated with UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-32 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 equipment which does not permit extraction of key (this does NOT include fill devices, i.e. DTDs, SKLs, etc… storing Top Secret key when the CIK is inserted or accessible) c. Units engaged in tactical exercises, operational field exercises or in a combat environment d. Flag (CINC) communicators operationally deployed away from their primary headquarters e. The loading of CCI equipment onboard an aircraft; TPI is required up to the flight-line boundary when transporting the material. f. CRFs and training facilities (school houses) where operational keying material is not used g. A Top Secret DTD CIK when placed in an Air Crew comm box locked with TPI approved combination locks (While in flight, a Top Secret DTD CIK may be stored in a single-lock container onboard the aircraft) UNCLASSIFIED//FOR OFFICIAL USE ONLY 2-33 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 CHAPTER 3 - PRIVILEGE MANAGEMENT: SEPARATION OF DUTIES, ROLES, EXCLUSIONS, REGISTRATION, ENROLLMENT AND ACTIVATION 301. SEPARATION OF DUTIES. Within the KMI, to ensure access is limited to properly cleared and appointed personnel and in order to prevent the assignment of operators and security auditors to the same positions, role exclusions are used and apply to most, if not all, associated positions. These principles are commonly referred to as “separation of duties.” a. Separation of duties are known as exclusions and are enforced by policy and/or Rule Based Access Control/Role Based Access Control (RuBAC/RoBAC) within the KMI program. Eligibility Authorities (EAs) and Enrollment Managers (EMs) must be careful in reviewing exclusions prior to appointing and enrolling users in multiple roles. (1) RoBAC – In RoBAC, system privileges are associated with operational management roles. (2) RuBAC – The RuBAC processes constrain the actions of role-based privileges in the context of a specific session and specific resource objects. 303. ROLE EXCLUSIONS a. Role Exclusions and Types: Within KMI, there are three types of exclusions: Lifetime, Concurrent, and Limited. (1) Lifetime exclusions prevent a user who has held a specific role from ever occupying an excluded role. This includes instances in which the person is no longer enrolled to perform the previously assigned role. (2) Concurrent exclusions prohibit a user from holding two different roles simultaneously where separation of duty (role exclusion) is required. (3) Limited exclusions prohibit a user from performing functions for a singular identity related to two different roles for a specific process and will prohibit an individual from performing functions related to oneself. 305. KMI ROLE EXCLUSION LISTING UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 a. Some common KMI role exclusions include but are not limited to: 1. A CPA role cannot concurrently hold the CPSO role. 2. A CPSO cannot concurrently hold the role of a CPA, KOAM (or Alternate) and vice versa. 3. The TSO/SO cannot be the TSO/SO for their own token. NOTE: A complete listing of role exclusions can be found in the Process Security Doctrine for the Enrollment of Key Management (KMI) Managers. 307. KOA REGISTRATION (OVERVIEW) KOAs are uniquely identified in order to control their functions through attributes that are requested, approved and assigned by a KOA Registration Manager (KOARM). Account registration requires at least two registered users to provide authorization for the establishment of an account in order to ensure integrity of KMI system. 309. KOA REGISTRATION DATA. a. KOA Registration Data is the set of data values maintained by the KMI for managing a KOA. Each KOA is established through the registration process which records administrative data for the account. b. same. The registration process for a KOA and User are not the c. When a KOA is established, the system performs a replication with the EKMS account information contained in the Common Tier 1 (CT-1) database therefore, accounts must ensure their Common Account Data (CAD) is up-to-date and accurate prior to transitioning to KMI and when account management changes. d. Registration of a new KOA or a Change in Primary KOAM requires the completion, verification and submission of a KMI Form 003. Registration and enrollment of personnel requires completion, verification and submission of KMI Form 001 and 002. e. It is recommended forms requiring submission to the EA Proxy be digitally signed when possible; if not possible physical documents with a wet signature is acceptable. UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 311. HUMAN USER (PERSONNEL) REGISTRATION When a Human User is registered, the KMI must verify the identity’s authenticity in that the person has the right to claim the identity being registered and has been authorized to do so. Their eligibility is qualified and needs to be registered. Human (Personnel) Registration and Enrollment must be completed before the KOA is able to be registered. Applicants may submit KMI Forms 001,002 and, 003 all at once. 313. KMI PERSONNEL REGISTRATION FORM, KMI FORM 001 a. The applicant and EA at the command must complete Part 1 and 2 of KMI Form 001. The EA Proxy at NCMS will complete the EA Eligibility Authority’s Proxy’s Identifying Information and the Eligibility Authority’s Proxy’s Contact Information on the form. b. The KMI Form 001 is in .pdf format and must be viewed and completed online to enable full viewing and selection of options available using the drop down menus. Incomplete forms will not be accepted and will be returned to the EA for review. NOTE: The command level EA will be the Commanding Officer, Officer-in-Charge or other designated security personnel (Security Manager or SSO). They are responsible for verifying security clearance information for assigned personnel and conducting a physical review of the required two forms of identification presented. An applicant requesting registration in KMI cannot be their own EA if such personnel are performing other duties in which they have access to security clearance data. c. In addition to verification of the information filled out by the applicant contained in Part 1 of the KMI Form 001, physical verification of the identification sources presented, the EA is responsible for completing Part 2 of the KMI Form 001. d. The applicant must provide two (2) forms of personal identification documents to the EA as proof of identification and verification. e. Below you will find examples of evidence of authenticity and eligibility. UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Source U.S. Passport Certificate of U.S. Citizenship Form N560/561 Certificate of Naturalization Form N550/N570 U.S. Driver’s License or State ID (*) Military ID card (*) Identity Establishment X X Employment Eligibility X X X X X X FIGURE 3-1 Additional forms of acceptable identification for verification purposes may be found in the Process Security Doctrine [DOC-04312]. f. Contact the EA Proxy at NCMS prior to submission of any completed KMI Form containing PII and request an individual email address to send the form to for review and processing. NOTE: The KMI form contains PII and MUST BE digitally signed AND encrypted. The unencrypted passing of documents, including emails containing PII must be reported as a PII breach per DON CIO guidance. g. The EA proxy will respond within 72 hours and provide an individual email for the unit to send the completed, signed and encrypted KMI Form 001 to. h. Upon verification of the information, NCMS will submit the KMI Form 001 to the PRM at NSA for processing. i. Once the information has been entered into KMI, the PRM will: (1) Verify that the registration request came from a valid EA Proxy. (2) Submit One-Time Pin order to Site 1 for processing. (3) Site 1 will send the One-Time Pin to the users email address reflected on the KMI Form 001. UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-4 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 (4) At the completion of the personnel registration phase, notify the EA Proxy that the registration was completed and a One-Time Pin was ordered for the applicant. j. DON commands are not authorized to submit required KMI forms directly to NSA; doing so will delay registration, enrollment, account establishment or transition, as applicable. NOTE: Additional information related to Human User Registration can be found in the Registration of KMI Operating Accounts and KMI User’s Manual and the Operations and Maintenance Manual (OMM) for the KMI Client Node located at the URL in Annex F. 315. ENROLLMENT PROCESS - KMI PERSONNEL ENROLLMENT FORM, KMI FORM 002 a. The process of assigning a management role(s) to a registered human user is called Enrollment and is carried out by an Enrollment Manager (EM). Each service or agency will be a part of an Enrollment Domain and will have individual(s) enrolled as an Enrollment Manager. They in turn will associate roles and assign attributes to other managers within their domain. The Enrollment Manager function resides at NCMS. b. Human (personnel) registration must be accomplished prior to a user being enrolled in KMI. The human user must complete applicable training set forth in Chapter 6. Training requirements differ and are based on the roles the individual will fulfill. c. New applicants will fill out Part 2 - Candidate Information section of the KMI Personnel Enrollment Form (KMI Form 002) and will select the roles to be assigned. The KMI form 002 is in .pdf format, and must be viewed and completed online to enable full viewing and selection of options available using the drop down menus. d. The Eligibility Authority (EA) must fill out Part 1 – the Eligibility Authority Information section of KMI form 002 and verify the training and certification(s) required for the specific role(s) has been completed through verification of the training certificate. The Enrollment Manager (EM) cannot proceed with the enrollment process without proof of completed training as indicated in Part 2 of the KMI form 002, except as indicated in the preceding section herein; the form will be UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-5 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 returned to Eligibility Authority for review. In the event formal training cannot be accomplished prior to appointment, the EA will follow the guidelines listed below: (1) In extenuating circumstances, such as an unplanned loss, hospitalization, death, or immediate Relief for Cause of Account personnel, the unit may request a waiver from NCMS to the formal training requirement until mission tasking and quota availability permit attendance. With an approved, official waiver, the EA may complete the KMI Form 002 through citing the originator and DTG of the waiver prior to submission of the KMI Form 002. (2) Personnel appointed, registered and enrolled based on a Service Authority waiver must review and understand the TwoPerson Integrity (TPI) section of Lesson 25 "KMI MGC Operator Training Key Distribution". They will not have a Windows useraccount on the MGC and will only be permitted access to the MGC/AKP in the role of a "witness or 2nd person" for functions requiring TPI. e. Contact the Enrollment Manager at NCMS prior to submission of the completed KMI Form and request an individual email address the form may be sent to for review and processing. NOTE: The form contains PII and MUST BE digitally signed AND encrypted. The unencrypted passing of documents, including emails containing PII must be reported as a PII breach per DON CIO guidance. f. The Enrollment Manager will respond within 72 hours and provide an individual email for the unit to send the completed, signed and encrypted form to at NCMS. (1) The Enrollment Manager (EM) must re-verify the accuracy and completeness of the form prior to entering the enrollment information into KMI. (2) Upon completion of the enrollment action, the EM will notify the EA reflected on the KMI Form 002. (3) Upon receipt of the email, the user/applicant will be able to perform the roles requested in KMI (provided they have a personalized token). UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-6 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 NOTE: Users may be required to log in and out more than once or remove the tokens association from the MGC and reintroduce the token to the MGC again before the new roles become effective. g. Each account must identify and designate personnel to perform the following roles: KOAM (Primary and Alternate), Product Requestor (PR), DLT1RA, PLT1RA, DRM, CPA and an assigned CPSO. Role exclusions should be reviewed prior to role assignment. h. The roles below ill only be performed at the PRSN, CSN or PSN, and not at the unit/ Client Node level. (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) 317. ASWR Manager Audit Data Manager Security Configuration Manager Incident Response Manager Platform/Network Manager Archive Manager Backup Manager Database Administrator Accounting Data Manager Tracking Data Manager Help Desk Manager ROLES SUPPORTING KOA REGISTRATION a. To complete KOA registration, KMI supports the following roles: 1. KMI Operating Account (KOA) Sponsor – Any person in the organizational chain-of-command authorized to determine and approve the KMI registration of a KOA. 2. KMI Operating Account Registration Manager (KOARM) – The management role responsible for registration of KOAs. Within the DON, the duties of the KOARM will be performed at NCMS. 3. KOAM – The management role responsible for operating an account. 319. ACCOUNT REGISTRATION- COMSEC ACCOUNT DATA FOR KMI REGISTRATION, KMI FORM 003 UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-7 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 a. Registration of a KOA requires submission of a properly completed KMI Form 003 by the command. (1) KMI Form 003 is in .pdf format and must be viewed and completed online to enable full viewing and selection of options available using the drop down menus. (2) Upon completion and verification of the completed KMI Form 003, contact the EA Proxy at NCMS to obtain an individual email address to submit the KMI Form 003 to. (3) NCMS will respond within 3 business days and provide an individual email address for the unit to send the completed, signed and encrypted form to. The form contains PII and MUST be digitally signed AND encrypted. Failure to do so will be reported as a PII breach per DON CIO PII policy. b. The KOARM will: (1) Verify that the registration request came from a valid KOA Sponsor. (2) Retain the Sponsor-provided KMI Form 003 either electronically or in hardcopy form for a minimum of seven (7) years. (3) At the completion of the KOA registration, notify the KOA Sponsor who submitted the request. c. Accuracy of the registration data cannot be overemphasized as the primary KOAM is assigned to the account during the registration process. d. KOAMs must be registered and enrolled through completion and submission of a KMI Form 001 and KMI Form 002 before they can be assigned to the KOA and activate the Type 1 Token discussed later in this chapter. e. Establishment of an account is not related to validation and acquisition of required equipment, keying material, or manuals. The account manager and ISIC must ensure compliance with other related actions set forth in Chapter 4 of EKMS1(series), including obtaining facility approval prior to the establishment of the account and material being distributed to the account. A matrix can be found in Figure 4-1 and 4-2 illustrating organizations with cognizance in validation and UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-8 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 allowance matters. 321. HUMAN (Person) USER ACTIVATION. Registration of a human user who will authenticate with a U.S. Type 1 PKI is not completed until a Registration Authority (e.g. PLT1RA) completes the activation process. Human User Activation, also known as Token Personalization, requires examination and verification of authenticity and eligibility, based on a face-to-face meeting of the User being registered with the PLT1RA, and the production of an identifier credential loaded as mission material onto a Type 1 Token. The activation phase personalizes the Type 1 Token by cryptographically associating it with a specific Human User. a. Each human identity for which the U.S. Government Type 1 PKI is the authentication method is independently verified in a face to face meeting between the PLT1RA and the user. b. To personalize a token for a Human User, a PLT1RA assigns a KMI-unique identifier for that token user, requests Type 1 PKI authentication material for the identifier, and directs that the material be loaded into the token as IA(M) Type 1 Certificates and keying material. The PLT1RA must enter the Token SO password before requesting the establishment of Type 1 Authentication Material (i.e. Type 1 private key) on a Type 1 Token, and the generation and loading of an associated Type 1 Identifier Credential (i.e. Type 1 public key certificate) for an existing specific User Identifier of a currently registered Human User who is to be the Token Holder. NOTE: A Token Holder is an individual Human User who is accountable for the use of a specific token, including use of the Authentication Material and other security-sensitive material that is carried by the token. c. The Human User must appear in person with the PLT1RA and present the same 2 forms of identification originally presented to the EA as proof of identification as well as present the PLT1RA with a hard copy of the one-time-pin showing issuance of their identity and a completed KMI Users Agreement KMI Form 004 that is maintained at the KOA. d. The PLT1RA must review, compare, and visually inspect the user provided ID documents in the presence of the Human User presenting them to ensure the person is who he/she claims to be UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-9 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 and authenticate the identity documents and sources as genuine and unaltered. The PLT1RA must also: (1) Match the User-provided ID documents against the Evidence Information recorded by the PRM to further ensure that the person is who he/she claims to be. (2) Match the user provided ID documents against the name printed on the one-time PIN document. (3) Save an electronic image of the User-provided ID documents and the KMI Form 004 to the KMI Management Client (MGC) for retention for a minimum of seven (7) years. (4) Only personalize a Token that shows no signs of tamper or damage. (5) Only personalize a Token intended for KMI use and provided through KMI channels. (6) Change the Token SO Password. (7) Report any discrepancies or failures to the EA identified for the Human User. 323. DEVICE REGISTRATION PROCESS During the registration process, the User Identity is initialized in the KMI for a System Entity authorized to access the KMI. The process associates a User Identifier with the identity and provides the User with the required Authentication Material associated with the Identifier Credential. Registration is designed to register and make operational both users and devices in KMI. This is the device portion and involves a three-step process: (a) Initialization – Records identities and identifiers in the system for both humans and devices to establish both the identifier and authentication method. (b) Endorsement – Independently verifies Device Identities and provides devices with certificates and keying material needed to interact with KMI. (c) Activation – Makes devices operationally ready by loading UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-10 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 them with certificates and keying material needed to perform their mission. 325. DEVICE USER INITIALIZATION a. KMI-Aware devices will be registered to have only one global identity. The device initialization can be separated into two logical steps that are performed sequentially. The first step establishes the Device’s Identity and Identifier in the KMI system and the second step loads a Transport IA(I) Type 1 certificate based on the Identity of the Device. b. Roles required to register a Device: (1) (2) (3) (4) EA DRM Device Sponsor DLT1RA NOTES 1: The Device Sponsor must be an active primary KOAM and have submitted a completed Device Sponsor Agreement, KMI Form 007, to the DRM. If the Device Sponsor is performing other roles/functions, additional training and documentation requirements may be required. 2: With a signed KMI Form 007 from another unit’s KOAM and acceptance of the transferred sponsorship, the Primary KOAM can transfer the DRM sponsorship of a device. Pending establishment of an in-band process where electronic acceptance of responsibilities as the DRM for a device in which sponsorship is transferred, the transferring unit may use the KMI Form 007 (Acceptance and Acknowledgement of Responsibilities) form to document sponsorship transfers. c. To establish a Device’s User Identity/Identifier in KMI, the EA must submit a completed KMI Device Registration Form, KMI Form 006, attesting to the Device’s eligibility for KMI registration for review and submission to the DRM. d. The DRM will then perform the following: (1) Verify the authenticity and eligibility of the identity, i.e., the User has the right to claim; the identity being registered; the User has been authorized to be registered; the identity is qualified to be registered; and the identity UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-11 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 needs to be registered. (2) Verify the registration request came from a valid EA. Due to the limited role exclusions set forth in KMI related doctrine, the DRM and EA cannot be the same person for the action requested in the KMI Form 006 submitted. (3) Retain the EA-provided KMI Form 006 electronically or in hardcopy form for a minimum of seven (7) years. (4) Verify the device identity (serial number). (5) Personally examine (i.e. face-to-device) the physical security integrity of the Device. (6) Accurately enter the KMI-required registration information into the KMI system: (a) Device Manufacturer (b) Device Short Title (c) Device Serial Number (d) Information identifying the organization with operational control of the device: 1. 2. 3. Organization Name Organizational Affiliation Controlling Country (e) Evidence (Usually the EA-provided KMI Form 006) 1. 2. Community of Interest Maximum Classification (f) Accurately enter the KMI-required information related to the EA into the KMI system: 1. Organization 2. Title 3. First and Last Name 4. Commercial Phone Number 5. Email address 6. Physical Mailing Address 7. Select the authentication method to be used for the User Identifier. (7) Request and load the Transport IA (I) Type 1 UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-12 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 certificate on the Device. (8) Ensure the Device has a valid established Identity/Identifier in the KMI system. (9) Retain the KMI Form 007 for a minimum of seven (7) years either electronically or in hardcopy form. (10) Ensure the Device Sponsor has been properly identified in the KMI system for the device. (11) Set the Device User’s Identity Registration State and Identifier Registration State to Active. (12) Set the Security Officer (SO) Password for the Type-1 Token (KOV-29). NOTE: Changes to a Device User’s Identity or Identifier Registration State will only be performed if the request is from an authorized EA, EA Proxy or Device Sponsor. The reason for the change, whether routine or for cause must be annotated at the time the action is taken. (13) At the completion of the initialization phase of identity registration, notify the EA or EA Proxy, as applicable who requested the registration. NOTE: Additional information related to Device Registration can be found in the Registration of KMI Operating Accounts and KMI Users and the OMM for the KMI Client Node located at the URL in Annex F. 327. DEVICE ENDORSEMENT a. The Endorsement phase is to provide authentication material to KMI-aware devices. Only devices authenticating with U.S. Type 1 PKI authentication material go through the device endorsement phase as part of registration. During the Endorsement phase, the DLT1RA will direct the conversion of a Transport IA(I) Type 1 certificate and the loading of an Operational IA(I) Type 1 certificate. b. The EA must review all required information is reflected in Part 2 to KMI Form 006, complete Part 1 of the form, sign/date the document, and return it to the DLT1RA. This is done to attest to the Device’s eligibility for endorsement in KMI. UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-13 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 c. The DLT1RA will perform the following: (1) Verify that the endorsement request has been signed and dated by the EA, and the DLT1RA is not performing the duties of the EA for the request being performed. (2) Retain the EA-provided KMI Form 006 for a minimum of seven (7) years either electronically or in hardcopy form. (3) Verify the device identity (Serial Number) (4) Verify that the Device has a properly registered User Identity with an authorized KMI-Unique User Identifier. (5) Verify that the Device has an authorized User Device Sponsor that is currently a Primary KOAM. (6) Set the Device User’s Identity and Identifier Registration state to Active. (7) Only change the Device User’s Identity or Identifier Registration State (i.e., Active to Inactive or Inactive to Active) if the request is from an authorized EA or Device Sponsor. (8) When changing the Device User’s Identity or Identifier state, record the reason for the change and designate the reason as either “routine” or “for cause”. (9) Personally (i.e. face-to-device) examine the physical security integrity of the Device. (10) At the completion of the endorsement phase of the device registration, notify the EA who requested the endorsement. 329. DEVICE ACTIVATION A user device other than a Token is activated upon direction by the KOAM, through the loading of the required mission certificates and keying material. The exact types of material required depends on the type of device and supported key fill methods. 331. KMI ROLE MANAGEMENT. UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-14 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 a. A role is a job title in the KMI system that has a specified set of functional responsibilities within the system, can be granted one or more privileges, and can have one or more Users assigned to it. b. KMI supports two categories of roles, one for operational management and one for administrative functions. Operational management roles directly involve the ordering, management, distribution of products and services or supervision of those functions. Operational managers use U.S. Government Type 1 PKI authentication material and identifier credentials to authenticate their identity to the system, and they obtain authorizations for their actions through KMI’s role-based, rulebased, and approval-based access control mechanisms. c. Administrative management roles do not directly involve products and services, but these roles involve housekeeping tasks that need to be done to support operational managers and other authorized users. Examples of administrative functions are installing and maintaining software, configuring accounts, security auditing, and performing backup and recovery actions. Many administrative functions are common to all computing and communication platforms. d. KMI Operational Management Roles can be categorized as either internal or external. Internal Management Roles are performed by people who are members of the central organization that control the KMI. External management roles are performed by people who are typically members of KMI customer organizations. For operational management roles, KMI implements a procedurally rigorous enrollment process that results in the assignment of a user to one or more KMI roles. The assignment to a role grants the user the system privileges associated with the role. 333. ACCESS CONTROL MANAGERS. Contact the SSC LANT Information Technology Assistance Center (ITAC) for KMI assistance. The ITAC personnel will open an initial ticket and assign it to the Navy KMI Help Desk for assistance/support. It is important that accounts contact the ITAC to ensure that trouble tickets are being tracked accurately. The ITAC point of contact phone numbers are as follows: Commercial: 1-877-477-2927 or 1-800-304-4636, DSN: 312588-5550/5426. You can also send an email to ITAC personnel at: NIPR: itac@infosec.navy.mil, SIPR: UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-15 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 iscservicedesk.fct@navy.smil.mil. ITAC personnel are available 24 hours a day, seven days a week for assistance. 335. USER SUPPORT MANAGER. a. In Capability Increment 2 (CI-2), the only user support manager role is the HP Service Manager/Agency Help Desk Manager. b. Help desk support for KMI users will be provided by both service-specific and KMI-wide help desk personnel. The Service/ Agency Help Desk Manager will provide organization-specific support to customers and can be reached at: (Comm): 1-843-2183430/4662 or (DSN): 312-588-3430/4662 or via email at: SSCLANT_NAVKMI.FCM@NAVY.MIL. 337. TYPE 1 TOKEN SECURITY OFFICER – (TSO or SO) The SO role is used in the Initialization, Endorsement and Personalization processes. SOs are authorized to clear token Audit Logs and change PINS. a. The SO account will be created by the DRM who also will set the SO pin. After initialization, the DRM will provide the initialized token and SO pin to a DLT1RA. b. The DLT1RA will log into the token during the endorsement process as the SO. After endorsement, the DLT1RA transfers the endorsed token and SO PIN to a PLT1RA. c. The PLT1RA will log into the token during personalization as the SO and change the SO PIN. d. The user selects a user-unique PIN during the personalization process. 339. KOA AGENT (KOAA) – A NON-MANAGEMENT ROLE. a. As part of KOAA registration, the KOAMs specify the credential(s) the KOAA will use to authenticate in KMI. The PRSN enforces that the new KOAA credential be unique and authorized for use with KMI. KOAAs can then authenticate to KMI using these credentials, to include username and password, KMI authorized non-Type 1 PKI credentials or Type 1 PKI credentials. b. KOAA registration is done within the Delivery-Only interface at the PRSN to access KMI Products and Services for UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-16 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 the devices they support. c. KOAAs access PRSN PDEs for the purpose of retrieving products. A KOAA is not a KMI management role and are “designated” by KOAMs. This process creates an Access Control List (ACL) for the KOA that the KOAM oversees. The ACL contains a list of all the entities that can retrieve KMI products from the particular KOA. In this regard, KOAAs are not registered or enrolled like other KMI users, although any KMI Manager can be designated as a KOAA by a KOAM. KOAMs are automatically designated as KOAAs for their own KOA. 341. DISENROLLMENT: a. KMI enables an Enrollment Manager (EM) to withdraw an existing assignment of a management role to a User Identity (i.e. “disenrollment” of a manager). The disenrollment action can be taken regardless of which EM originally made the assignment. Reasons for disenrollment fall into but are not limited to two primary areas: (1) Eligibility Authority request (2) Identity re-verification b. An EA shall resubmit a KMI Form 002 to request the disenrollment. Reasons for disenrollment include when: a manager leaves an organization, there is loss or suspension of security clearance or a manager no longer needs the KMI Management privileges. After executing the disenrollment, the EM must notify the EA. 343. ENROLLMENT REVERIFICATION. a. For each existing assignment of a User Identity to a Management Role in an Enrollment Domain, KMI will periodically (typically annually) prompt the EM at the Service Authority level in that Enrollment Domain to review and reconfirm the below items. (1) (2) (3) The need for, and organizational source of authority for the assignment. The associated RuBAC Access Set, if that Role has one. The associated RuBAC Conferral Set, if the Role has one. If not performed within five business days, the user state will UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-17 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 be reflected as “inactive” and the incumbent will not be able to perform functions within the KMI. b. The re-verification process requires the cognizant EA reauthorize assignment of the role. An EM re-verifies each User Identity assigned to a Manager Role on an annual basis. 345. HUMAN USER REVERIFICATION. a. Upon notification by the Personnel Registration Manager (PRM) at NSA, NCMS will notify DON personnel due for reverification if a discrepancy preventing such exists. b. For annual enrollment reverification, the KOAM can contact the EM at NCMS for any enrollment related concerns or discrepancies which cannot be resolved at the unit level. c. If updates are required, an updated KMI form 001 and/or KMI form 002 may be required. UNCLASSIFIED//FOR OFFICIAL USE ONLY 3-18 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 CHAPTER 4 – ACCOUNT ESTABLISHMENT AND PERSONNEL DESIGNATION REQUIREMENTS 401. REQUIREMENT FOR A KMI ACCOUNT. a. An organization that requires COMSEC material must obtain such material through a Key Management Infrastructure (KMI) Operating Account (KOA) managed by a designated KMI Operating Account Manager (KOAM). When it is not possible to draw needed COMSEC material from an existing KOA either within the organization or from an existing KOA located in close proximity, the requirement to establish a new KOA must be submitted by the requiring organization and validated by the organization’s Immediate Supervisor in Command (ISIC). b. For commands with a COMSEC account transitioning from EKMS to KMI, they must: 1. Complete the KMI Form 005 (EKMS to KMI account checklist) 2. Complete and submit the required KMI Forms 001, 002, 003 and 004 to the applicable reviewer/approving official as discussed in Chapter 3 to this manual. 3. The KMI Form 004 can be completed online but must be printed and signed and retained at the command level. 4. Each of the forms mentioned above are available from the Uniform Resource Locator (URL) located in Annex F. 5. Forms submitted as attachments must be digitally signed and encrypted with a Medium Assurance PKI token. The subject of any emails containing KMI registration or enrollment data must state “This email contains information subject to the Privacy Act”. c. A Quick Reference Matrix for KMI related forms can be found in Annex D. 403. a. ESTABLISHING A KMI OPERATING ACCOUNT (KOA). The steps required to establish a KOA are outlined below: 1. The organization requiring a KOA must first have an UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 account established with the COR (NCMS) in Tier 1. This is accomplished through submission of an official message (Figure 4-3) to the ISIC for review and approval in accordance with this manual. 2. The ISIC must validate the requirement for the account and notify the proper approval authorities. 3. The ISIC must certify the requesting command is compliant with applicable physical security safeguards, including space approval for the storage of COMSEC material. NOTE: Shore-based vaults used to store keying material constructed or structurally modified after 01 Jan 2013, must meet the construction requirements set forth in ICD705. 4. The ISIC, working with the KOAM, will determine the required COMSEC material. 5. Controlling Authority approval must be obtained for symmetric (traditional) keying material prior to the account being validated and the account’s KOA ID added to the distribution profile. (See Figure 4-2). 6. To acquire asymmetric (modern) key ordering privileges, i.e. TACLANE, HAIPE, Secure Data Network System (SDNS), Secure Telephone Equipment (STE), the activity must have a Department, Agency, Organization (DAO) code and personnel managing the account must be authorized ordering privileges. 7. The CO will appoint in writing a KOA Manager (KOAM) and a minimum of (1) Alternate KOAM(s), who meet the designation requirements set forth in Articles 405 - 409 herein. If the account HCI is TS, it is recommended a total of (3) alternates be appointed. A sample Letter of Appointment can be found in Figure 4-5. A separate appointment letter is not required for the KOAM or Alternate if he or she is also fulfilling the role of the Client Platform Administrator (CPA). This can be indicated by checking the applicable box or boxes for any additional roles the KOAM or Alternate are performing. CPAs or CPSOs must complete the Statement of Acceptance of Responsibilities form reflected in Annex I. 8. The KOAM must prepare and submit the applicable documentation outlined in the Defense Courier Service (DCS) UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 customer service manual and provide such information to their headquarters and the Registration Authority (RA). The KOAM must also ensure the Common Account Data (CAD) is up-to-date in Tier1. The DCS customer service manual is available from the U.S. Transportation Command (USTRANSCOM) web site at the URL in Annex F. 9. To pick-up or deliver material to/from CMIO, the KOAM must prepare and submit a CMS Form-1. This form must be signed by the current CO, OIC, SCMSRO or other official “Acting” in such capacity. Forms signed “By Direction” will NOT be accepted. Changes in account personnel or change of command require a new form be completed, signed and submitted via official command letterhead or naval message. The CMS Form-1 can be found in EKMS-1(series) and must be updated at a minimum of annually or more frequently, as required. 10. Once the account is registered by the KOARM in Tier 1, the KOARM will send a digitally signed email to the InService Engineering Activity (ISEA). 11. The organization must complete and submit the following Central Facility (CF) forms available from the Key Support portal; CF-1202, CF-1206, and CF-1207. See Annex F for the URL. NOTE: For additional information and guidance related to ordering closed partition modern key and short titles managed by CPF, JCMO, CENTCOM, etc… please see Annex AE to EKMS-1 (series). 12. Upon establishment of the account, SSC LANT will ship the MGC and related peripheral equipment to the KOA address listed in the establishment message. 13. Following establishment of the account, and CNO validation for the AKP, CMIO will ship the AKP via DCS to the KOA. If the KOAM does not have a DCS address, CMIO will not ship either the AKP or required tokens to the account. 14. Upon establishment of the required ordering privileges, submission of key order forms or validation of the request from the unit, as applicable, Tier 0 will send the required certificates and keys (MSK, FF) to the KOA account. 15. Following registration and installation of the UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 MGC/AKP and related peripheral devices by SSC LANT personnel, the KOA account must review and sign the applicable System Operational Verification Test (SOVT) paperwork. Any functions not demonstrated or successfully performed, required by the SOVT must be documented and reflected on the SOVT package. NOTE: See Article 209 for guidance regarding the location of the MGC/AKP installation. UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-4 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 KOA ACCOUNT ESTABLISHMENT MESSAGE ROUTING ACTION/INFO NCMS WASHINGTON DC//N3// CMC WASHINGTON DC//C4/CY// CNO WASHINGTON DC COGARD C4ITSC ALEXANDRIA VA//BOD-IAB// COMLANTAREA COGARD OR COMPACAREA COGARD (AS APPLICABLE) COMMARCORSYSCOM QUANTICO VA//CINS// ISIC COMNAVRESFOR NORFOLK VA//01A2// ADMIN COC COMSPAWARSYSCOM SAN DIEGO CA//PMW161// SPAWARSYSCEN ATLANTIC CHARLESTON SC//80P/526CS/721SR// CMIO NORFOLK VA//N3// CONTROLLING AUTHORITIES DIRNSA FT GEORGE G MEADE MD//IE3/IE31// DIR TIER1 FT HUACHUCA AZ DIR TIER1 SAN ANTONIO TX SERVICING COR AUDIT TEAM USN/MSC A NA A NA USNR A NA I NA USCG A NA I A NA NA I NA NA NA NA I I NA I I I NA I NA I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I I A = Action, I = Info, NA = Not Applicable FIGURE 4-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-5 USMC A I I NA UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 ASYMMETRIC (MODERN) KEY VALIDATION PROCESS (ALL SERVICES) 1. Asymmetric (modern) key is not automatically distributed based on an established profile and must be ordered by the account. Personnel ordering such must be privileged to order the item(s). 2. Privileges are established through the completion, submission and approval by the Command Authority of the User Registration form (CF 1206). 3. The KOAM and a minimum of (1) alternate must have ordering privileges. For redundancy purposes, it is recommended that each alternate have ordering privileges. 4. See EKMS-1(series) Article 672 and Annex U, if required. VALIDATION PROCESS (TRADITIONAL KEYING MATERIAL) MSC USCG USMC USN (Shore) USN (Sea) COMSC ISIC ISIC ISIC CONAUTH COGARD C4ITSC CONAUTH For JCMO Material: (See Note 3) CONAUTH TYCOM (i.e. COMMARFORPAC, COMMARFORLANT, COMMARFORRES) CONAUTH For JCMO Material: (See Note 3) For JCMO Material: (See Note 3) For JCMO Material: (See Note 3) ISIC (See Note 1) TYCOM FLT CDR CONAUTH (See Note 1) For JCMO material (See Note 3) FIGURE 4-2 NOTES (1) The ISIC obtains Controlling Authority validation via the TYCOM and Fleet Commander. (2) USN surface, sub-surface, and USCG surface units do not require CONAUTH validation for COMSEC material contained in the standard fleet allowance instructions such as CLF/CPF/CNE C2282.1 and COMPACAREAINST C2282.1. (3) Requests for Joint Staff ICP Material are validated by the theater Combatant Commander after UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-6 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 validation by the Fleet Commander, MEF, or COGARD C4ITSC. SAMPLE KEY MANAGEMENT INFRASTRUCTURE ACCOUNT (KOA) ESTABLISHMENT REQUEST (EDIT AS REQUIRED) R 101830Z AUG 13 ZYB FM PRECOMUNIT RANGER TO CNO WASHINGTON DC COMPACFLT PEARL HARBOR HI INFO NCMS WASHINGTON DC COMNAVAIRPAC SAN DIEGO CA DIR TIER1 HUACHUCA AZ DIR TIER1 SAN ANTONIO TX CMIO NORFOLK VA DIRNSA FT GEORGE G MEADE MD SPAWARSYSCEN ATLANTIC CHARLESTON SC BT UNCLAS//N02280// MSGID/GENADMIN/PCU RANGER/-/AUG// SUBJ/KEY MANAGEMENT INFRASTRUCTURE OPERATING ACCOUNT (KOA) ACCOUNT ESTABLISHMENT// REF/A/DOC/NCMS/-// REF/B/LTR/COMNAVAIRPAC N321/1MAY09// REF/C/DOC/CLF/CPF/CINCUSNAVEURINST C2282.1/-// REF/D/GENADMIN/DIRNSA/050403ZAUG09// NARR/REF A IS EKMS-1(SERIES) SUPP-1. REF B CERTIFIES STORAGE REQUIREMENTS AND APPROVES ACCOUNT ESTABLISHMENT. REF C IS CLF/CPF/CNE STANDARD SHIPBOARD ALLOWANCE PUBLICATION. REF D IS CONTROLLING AUTHORITY VALIDATION.// POC/SAILOR/CTOC/DSN:123-4567/EMAIL:SAILOR(AT)CVN79.NAVY.MIL// RMKS/1. IAW REF A, REQUEST ESTABLISHMENT OF A KOA ID TO SUPPORT OPERATIONAL REQUIREMENTS. THE FOLLOWING IS PROVIDED, AS REQUIRED: A. COMMAND TITLE: USS RANGER (CVN-79) B. COMMAND UIC: 12345 C. MAILING ADDRESS: USS RANGER (CVN-79) COMM DEPT FPO AP 96631 D. COMMAND PLA: PCU RANGER//OFFICE CODE// E. ISIC AND VALIDATION REF: COMNAVAIRPAC; REF B GERMANE. F. HCI: TOP SECRET. G. COMMAND MEETS STORAGE/PHYSICAL SECURITY REQUIREMENTS FOR STORING TOP SECRET MATERIAL AS VALIDATED BY REF B. H. KEY MANAGEMENT INFRASTRUCTURE OPERATING ACCOUNT MANAGER (KOAM) INFORMATION: FIGURE 4-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-7 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 1. NAME (LAST NAME, FIRST NAME, MI): 2. RANK/GRADE: 3. SECURITY CLEARANCE, BASIS, AND DATE OF INVESTIGATION: 4. PHONE NUMBER COMM/DSN: 5. EMAIL ADDRESS: 6. DATE OF COMPLETION OF FORMAL KMI TRAINING: 7. DATE OF COMPLETION OF THE NSA TOKEN SECURITY OFFICER (TSO) COMPUTER-BASED TRAINING: NOTE: PARAGRAPH H.8 THRU H.10 IS ONLY APPLICABLE IF THE KOAM WILL ALSO SERVE AS THE CLIENT PLATFORM ADMINISTRATOR (CPA) FOR THE ACCOUNTS MANAGEMENT CLIENT (MGC), OTHERWISE INDICATE N/A. 8. DATE OF COMPLETION OF INFORMATION ASSURANCE TECHNICIAN (IAT) LEVEL I CERTIFICATION: 9. DATE OF COMPLETION OF THE NSA CPA COMPUTER-BASED TRAINING (CBT): 10. DATE OF EXECUTION OF THE INFORMATION SYSTEM PRIVILEGED ACCESS AGREEMENT AND ACKNOWLEDGEMENT OF RESPONSIBILITIES: I. KEY MANAGEMENT INFRASTRUCTURE OPERATING ACCOUNT ALTERNATE (ALT. KOAM) INFORMATION: 1. NAME (LAST NAME, FIRST NAME, MI): 2. RANK/GRADE: 3. SECURITY CLEARANCE, BASIS, AND DATE OF INVESTIGATION: 4. PHONE NUMBER COMM/DSN: 5. EMAIL ADDRESS: 6. DATE OF COMPLETION OF FORMAL KMI TRAINING: 7. DATE OF COMPLETION OF THE NSA TOKEN SECURITY OFFICER (TSO) COMPUTER-BASED TRAINING: NOTE: PARAGRAPH I.8 THRU I.10 IS ONLY APPLICABLE IF THE KOAM WILL ALSO SERVE AS THE CPA FOR THE ACCOUNT’S MGC, OTHERWISE INDICATE N/A. 8. DATE OF COMPLETION OF INFORMATION ASSURANCE TECHNICIAN (IAT) LEVEL I CERTIFICATION: 9. DATE OF COMPLETION OF THE NSA CPA COMPUTER-BASED TRAINING (CBT): 10. DATE OF EXECUTION OF THE INFORMATION SYSTEM PRIVILEGED ACCESS AGREEMENT AND ACKNOWLEDGEMENT OF RESPONSIBILITIES: J. CLIENT PLATFORM SECURITY OFFICER (CPSO): FIGURE 4-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-8 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 1. NAME (LAST NAME, FIRST NAME, MI): 2. RANK/GRADE: 3. SECURITY CLEARANCE, BASIS, AND DATE OF INVESTIGATION: 4. PHONE NUMBER COMM/DSN: 5. EMAIL ADDRESS: 6. DATE OF COMPLETION OF INFORMATION ASSURANCE TECHNICIAN (IAT) LEVEL I OR CERTIFICATION (IAM LEVEL I FOR USMC ACCOUNTS): 7. DATE OF COMPLETION OF THE NSA CPSO COMPUTER-BASED TRAINING (CBT): 8. DATE OF EXECUTION OF THE INFORMATION SYSTEM PRIVILEGED ACCESS AGREEMENT AND ACKNOWLEDGEMENT OF RESPONSIBILITIES: K. CLIENT PLATFORM ADMINISTRATOR (CPA): 1. NAME (LAST NAME, FIRST NAME, MI): 2. RANK/GRADE: 3. SECURITY CLEARANCE, BASIS, AND DATE OF INVESTIGATION: 4. PHONE NUMBER COMM/DSN: 5. EMAIL ADDRESS: 6. DATE OF COMPLETION OF INFORMATION ASSURANCE TECHNICIAN (IAT) LEVEL I OR CERTIFICATION (IAM LEVEL I FOR USMC ACCOUNTS): 7. DATE OF COMPLETION OF THE NSA CPSO COMPUTER-BASED TRAINING (CBT): 8. DATE OF EXECUTION OF THE INFORMATION SYSTEM PRIVILEGED ACCESS AGREEMENT AND ACKNOWLEDGEMENT OF RESPONSIBILITIES: 2. REQUIRED MATERIAL: A. KEYING MATERIAL: (1) AFLOAT UNITS SUBMIT REQUESTS FOR MATERIAL IAW REF C. (2) ASHORE UNITS CONTACT ISIC, CONAUTH AND CMDAUTH, AS APPLICABLE. B. MANUALS/EQUIP/RELATED DEVICES: (1) AFLOAT UNITS SUBMIT REQUESTS FOR MATERIAL IAW REF C. (2) ASHORE UNITS CONTACT ISIC AND/OR CONAUTH, AS APPLICABLE. C. VALIDATION AUTHORITY/JUSTIFICATION: REF D GERMANE. 3. DMR: 100424 A. DURATION: PERMANENT OR TEMPORARY (IF TEMPORARY, INCLUDE DURATION) B. SHIPPING INSTRUCTIONS: BT FIGURE 4-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-9 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 405. SELECTION OF KMI PERSONNEL. Individuals selected must: a. Meet the existing requirements of EKMS-1(series) Articles 410, 412 and 505 with exception of completion of the EKMS Manager COI (Art 412.f). b. In addition to the requirements stated above, personnel serving as either a CPA or CPSO must also complete the training requirements and additional documentation set forth in Article 411 herein. c. Contractor personnel will not be appointed as a KOAM or Alternate without prior approval from NCMS. d. For specific positions requiring appointment or designation, i.e. KOAM, Alternate, CPA, CPSO, etc… a sample appointment letter is contained in Figures 4-4 and 4-5. 407. a. MANPOWER REQUIREMENTS FOR KMI OPERATING ACCOUNT (KOA). Account Composition. 1. The CO of each numbered account must appoint in writing a KOA Manager, a minimum of one Alternate, one CPA and one CPSO. It is highly recommended (2) additional alternates be appointed for redundancy during periods of leave, TAD, etc… for accounts with a HCI of TS to ensure compliance with National policy, which mandates a minimum of (2) formally trained personnel be assigned to the account at all times except as discussed in Chapter 6. 2. A KOAM or Alternate who is IAT Level 1 or higher certified per DoDM 8570.01 can fulfill the role of the Client Platform Administrator (CPA). If a KOAM is not fulfilling the CPA role, the DoDM 8570.01 requirement is not applicable to a KOAM or Alternate. 3. To maximize existing personnel and ensure separate oversight of security related functions requiring separation of duties, it is recommended commands leverage use of the ISSM/IAM or ISSO/IAO to fulfill the duties and responsibilities of the CPSO. Personnel appointed as an ISSM or IAM are required to be certified in accordance with DoD 8570.01M and have a SSBI per SECNAV M5510.30. Due to role exclusions set at the National UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-10 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 level, a KOAM, Alternate or CPA cannot occupy the CPSO role. b. Grade Requirements for KOAMs, Alternates, LE Issuing and Clerks. 1. Grade, length of service, and other criteria for appointment to any of the aforementioned positions is outlined in EKMS-1(series) Articles 412 - 416. 2. Appointment letters will be signed by the current CO and will be updated within 60 days following a change of command. The use of By Direction is not authorized for appointing personnel or signing accounting reports requiring the CO’s signature. The only acceptable alternative is for such correspondence to be signed as “Acting” by the person acting in the absence of the CO. 409. KOA MANAGER (KOAM) AND ALTERNATES. a. KMI Operating Account Manager (KOAM) & Alternate KOAM(s). In addition to the requirements of EKMS-1(series) articles 410, 412 and 505, personnel identified to be a KOAM or Alternate must: 1. Successfully complete the KMI COI prior to appointment. Personnel currently appointed who have attended previous COMSEC Manager training must attend and successfully complete the formal KMI training. See Chapter 6 for guidance when training cannot be completed due to extenuating circumstances prior to appointment. 2. Execute a SD Form 572 and maintain such on file at the KOA for a minimum of ninety days from the date relieved. See Annex K of EKMS-1(Series) for form. 3. Execute the required KMI Form 004 and retain it on file with any appointment letter for the same duration as the appointment letter. See Annex F for the URL where KMI-related forms are available from. 4. If a KOAM or Alternate is also performing the duties of the CPA in addition to the above training requirement, such personnel must complete the training and documentation requirements set forth in Article 411 herein. 411. OTHER KMI RELATED ROLES. UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-11 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 a. Personnel Local Type 1 Registration Authority (PLT1RA) The PLT1RA is required to conduct face to face verification of all users requiring registration in the KMI, perform annual reverification of active Human Users and personalize tokens. b. Device Local Type 1 Registration Authority (DLT1RA) The DLT1RA is responsible for the physical viewing and reviewing of all new devices being endorsed in KMI; this includes both the endorsement and provisioning of KMI-aware devices. It is recommended the appointed KOAM or Alternate performs the duties of the PLT1RA and DLT1RA to reduce manpower requirements. In addition to basic access requirements, personnel appointed as the PLT1RA or DLT1RA must possess a security clearance equal to/higher than the Highest Classification Indicator (HCI) of the KOA account. c. Type-1 Token Security Officer (TSO/SO). 1. This role will be performed by the KOAM and each Alternate. An individual cannot be their own TSO; however, a KOAM can be the TSO for an alternate and vice versa. 2. TSO specific duties, responsibilities and periodicities for functions the TSO is responsible for can be found in the SKEY6500 (KOV-29) OSD. d. Product Requester (If other than the KOAM/Alternate). 1. Must have a security clearance equal to/higher than the highest classification of material required or authorized to request. An interim Top Secret clearance may be granted if required provided the incumbent has been granted a final secret clearance that is within scope. 2. Be an E-5/GS-5 or above. 3. Successfully complete the applicable portion(s) of the KMI Management Client (MGC) COI. e. Client Platform Administrator (CPA). The CPA is responsible for administration of computer platforms and client nodes, including the creation of user accounts for platform operators, setting platform operator privileges, and performing system maintenance functions. Personnel appointed as a CPA must: UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-12 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 1. Have a minimum Secret security clearance. If performed by the KOAM or an Alternate, the clearance must be equal to/higher than the HCI of the account. In addition to the training required of a KOAM, such personnel must also complete the required CPA training and attain IAT Level 1 certification in accordance with DoD 8570.01(Series) within 180 days of appointment. 2. If performed by other than the KOAM/Alternate, such personnel may be military, civil service or contractor personnel employed by the U.S. government. Regardless of affiliation i.e. military, civil service, or contractor, personnel with privileged access to a DoD computer or network must be certified in accordance with DoD 8570.01(Series). 3. Waivers related to IA certification requirements are not to be submitted to NCMS and must be handled in accordance with DoD 8570.01(Series) and applicable service-specific guidelines. NCMS will not respond to waivers of this nature. 4. Successfully complete the application portion of the MGC training or CBT, as applicable. 5. Complete, execute and have on file the required Information Systems Privileged Access Agreement and Acknowledgement of Responsibilities form required by DoD 8570.01(Series). A sample can be found in Annex I. f. Eligibility Authority (EA). The EA performs the required face-to-face verification on behalf of either a human or device to ascertain that either is qualified and eligible to be registered in KMI and that personnel requiring registration have an official duty requiring registration for the roles requested. To ensure no disqualifying information exists and the requesting person has an up-to-date security clearance within scope, this role will be performed at the unit level by the Commanding Officer or he/she can designate the Security Manager, Special Security Officer (SSO), or other qualified personnel to perform the role. Minimum requirements for appointment as the EA are: 1. Meet applicable grade and security requirements outlined in SECNAV M5510.30 of Articles 2-3 or 2-9, as applicable. 2. Complete classroom or CBT training, as applicable when UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-13 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 developed. NOTE: Civil Service employees and military personnel fulfilling the positions noted in subparagraph g - j below must have a minimum of six months of government service. This may include time served as enlisted personnel for commissioned officers. g. Controlling Authority (CONAUTH) Designation Requirements. 1. Due to the inherent responsibilities, required decision making abilities and level of maturity expected of someone serving in the role of a Controlling Authority, such personnel must be U.S. government personnel E-7/GS-7 or selectee (as applicable) or a Commissioned Officer. 2. Contractor personnel will not perform Controlling Authority functions without an official waiver from NCMS. If requested and approved by NCMS, the scope of authority would generally be limited to ALC-7 key locally generated by the account being managed. 3. Complete the applicable Controlling Authority training via formal classroom instruction or CBT, as applicable. h. Command Authority (CA) Designation Requirements. 1. Must have a minimum Secret security clearance within scope. If a Command Authority is also serving in any other capacity such as a KOAM, they must meet the security, grade, training and other requirements for that position as well. 2. Must be a U.S. government employee (military or civil service) in the grades E-7/GS-7 or selectee (as applicable) or a Commissioned Officer. 3. Should have experience as a network planner and be knowledgeable in the establishment of DAO and partition codes, asymmetric key supporting crypto nets, monitoring key usage and be able to recommend or direct appropriate actions in the event of a suspected or actual compromise. 4. Successfully complete the required portion of the KMI Management Client (MGC) training or CBT, as applicable. i. Client Platform Security Officer (CPSO). The CPSO is responsible for administering and monitoring the security of UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-14 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 client node platforms and performing audits and/or archives of security logs. Role exclusions prohibit a KOAM or Alternate from serving simultaneously as the CPSO. To reduce manpower requirements, it is recommended the command’s ISSM or ISSO perform the duties of the CPSO since such personnel are already required to be certified in accordance with DoD 8570.01(Series) and have a SSBI within scope per SECNAV M5510.30. 1. Personnel appointed as a CPSO with administrative privileges require a KOV-29 (token) and must possess a security clearance equal to or higher than the Highest Classification Indicator (HCI) of the account. An Interim Top Secret may be granted provided the incumbent has a final Secret clearance within scope. 2. Be in the minimum rank/grade of E-5/GS-5 (or selectee) or a commissioned officer with experience as an ISSM, ISSO, etc…. The incumbent must also be knowledgeable in establishing a crypto net, monitoring the key usage and determining the required actions during a compromise as well as be familiar with other Information Assurance (IA) security related functions and responsibilities. 3. Successfully complete the CPSO CBT, as applicable. 4. Complete and have on file the required Information Systems Privileged Access Agreement and Acknowledgement of Responsibilities form required by DoD 8570.01(Series). A sample can be found in Annex I. 5. Complete, sign and submit the KMI Form 004 (KMI Certificate of Acceptance and Acknowledgement of Responsibilities). 6. If not already attained, personnel appointed must meet DoD 8570.01(Series) requirements within 180 days of appointment. Certifications previously attained must be current with the vendor’s recertification requirements and be registered in the service-specific database use to manage and track IA certifications. Do not submit waiver requests for IA certifications to NCMS. NCMS is not the approval authority for such and will not respond to waivers of this nature. j. KOA Registration Manager (KOARM). UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-15 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 1. A KOARM is responsible for maintaining registration information about KOAs. 2. The KOARM must meet the grade, security and training requirements set forth in the Process Security Doctrine (DOC 042-12). NOTE: The EKMS Registration Authority is located at Tier 1; the person(s) performing that function should be enrolled as KOA Registration Manager and provided with an MGC and manager credentials so they can perform both functions. k. Device Registration Manager (DRM). 1. The DRM is responsible for the ensuring devices have a valid, established identifier in the KMI, physical verification of the device integrity and changing the status of devices from active to inactive and vice versa upon request from an EA or Device Sponsor. Existing role exclusions prohibit a DRM from also concurrently serving as a DLT1RA. 2. Personnel appointed to serve as a DRM must meet grade, security and training requirements set forth in DOC 042-12. UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-16 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 (SAMPLE) KEY MANAGEMENT INFRASTRUCTURE OPERATING ACCOUNT MANAGER (KOAM) APPOINTMENT LETTER ________ (DDMMYY) From: To: Commanding Officer (Rank/Rate/Grade, Name, and DOD ID) Subj: APPOINTMENT AS THE KEY MANAGEMENT INFRASTRUCTURE OPERATING ACCOUNT MANAGER (KOAM) OR ALTERNATE (AS APPLICABLE) Ref: (a) (b) (c) (d) (e) (f) (g) Encl: (1) (2) (3) (4) (5) EKMS 1(series) Supp-1 DoDM 8570.01(series) Management Client (MGC) Operational Security Doctrine (OSD) Enrollment of KMI Managers Doctrine Registration of KOAs and KMI Users Doctrine Operational Security Doctrine (OSD) for the SKey6500 DoDI 1000.30 KMI MGC Course of Instruction Completion Certificate Token Security Officer CBT Certificate CPA CBT Certificate (Note 1) Information Assurance Technician (IAT) Level 1 Certificate (Note 1) Information System Privileged Access Agreement and Acknowledgement of Responsibilities Form (Note 1) 1. In accordance with reference (a), you are hereby appointed as the KOAM or Alternate KOAM for this command. 2. KOA account number: ____________. 3. Date and location of completion of the KMI formal course of instruction or Date-Time-Group (DTG) of the NCMS waiver approval if not previously completed (See Note 2): ____________. 4. Security clearance data: a. Clearance level: ____________. b. SCI eligible and date: (See Note 3) ______. c. Date and type of the most investigation: ____________. 5. Additional KMI roles, not prohibited by policy held by the appointee. (Check each that applies) Figure 4-4 UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-17 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Subj: APPOINTMENT AS THE KEY MANAGEMENT INFRASTRUCTURE OPERATING ACCOUNT MANAGER (KOAM) OR ALTERNATE (AS APPLICABLE) CPA (Notes 1,4) DLT1RA DRM PLT1RA TSO (Note 6) 6. You will familiarize yourself with references (a) – (f) to ensure compliance in your execution of duties for the roles appointed to. _________________________________ (Signature of Commanding Officer) NOTES: (1) Enclosures (3) – (5) are only required if the KOAM or Alternate, as applicable are fulfilling the role of the CPA. (2) Appointment prior to completing formal training requires a waiver from NCMS. See Articles 409, 601 and Annex H of this manual if operational requirements and extenuating circumstances prevent completion prior to appointment. (3) If the account is validated for SCI/SI material, the KOAM/Alternate must be SCI eligible otherwise insert “NA”. (4) See Article 409.a above for additional training and documentation requirements if a KOAM or Alternate is fulfilling the role of the CPA. (5) Role exclusions set forth at the National level prohibit a KOAM, Alternate or CPA from serving concurrently as the CPSO. (6) Each KOAM/Alternate will be a TSO but cannot be the SO/TSO for the token held by/issued to them self. Figure 4-4 UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-18 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 (SAMPLE) KEY MANAGEMENT INFRASTRUCTURE (KMI) OPERATING ACCOUNT (KOA) CLIENT PLATFORM ADMINISTRATOR (CPA) OR CLIENT PLATFORM SECURITY OFFICER (CPSO) APPOINTMENT LETTER ________ (DDMMYY) From: Commanding Officer To: (Rank/Rate/Grade, Name, and DOD ID) Subj: APPOINTMENT AS THE KEY MANAGEMENT INFRASTRUCTURE OPERATING CPA OR CPSO (AS APPLICABLE) Ref: (a) (b) (c) (d) (e) (f) (g) Encl: (1) (2) (3) EKMS 1(series) Supp-1 DoDM 8570.01(series) Management Client (MGC) Operational Security Doctrine Enrollment of KMI Managers Doctrine Registration of KOAs and KMI Users Doctrine Operational Security Doctrine (OSD) for the SKey6500 DoDI 1000.30 CPA or CPSO Computer-Based Training (CBT) Certificate (as applicable) Information Assurance Technician (IAT) Level 1 Certificate Information System Privileged Access Agreement and Acknowledgement of Responsibilities Form 1. In accordance with references (a) and (b) and based on verification of enclosures (1) – (3), you are hereby appointed as the CPA or CPSO, as applicable for this command. 2. KOA account number: ____________. 3. Date and source of training in which IAT Level 1 certification was attained: 4. ____________. Security clearance data: a. Clearance level: ____________. b. Date and type of security investigation: ____________. 5. You will familiarize yourself with references (a) – (f) to ensure compliance in your execution of duties. Figure 4-5 UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-19 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 ________________________________ (Signature of Commanding Officer) Figure 4-5 UNCLASSIFIED//FOR OFFICIAL USE ONLY 4-20 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 CHAPTER 5 - DUTIES AND RESPONSIBILITIES OF THE KEY MANAGEMENT INFRASTRUCTURE OPERATING ACCOUNT (KOA) MANAGEMENT PERSONNEL 501. KOA MANAGEMENT PERSONNEL. a. KOA Managers/Alternates will: 1. Generate, manage and distribute local symmetric products, and maintain KOA administrative information in KMI with exception to centrally managed data elements such as the account’s Highest Classification Indicator (HCI). 2. Request the cognizant KOA Registration Manager add or remove KOA Managers from the list of KOA mangers for the KOA. 3. Add, modify, or remove KOA Agents from the list of authorized KOA Agents (LE) for the KOA. 4. Add, modify, or remove KMI-aware End Cryptographic Units (ECUs) from the KOA’s Device Distribution Profile (DDP). 5. Add, modify, or remove KMI-aware ECUs/fill devices from the locally maintained fill groups. 6. Add, modify, or remove key products to ECUs/fill devices in the locally maintained fill groups. 7. Activate ECUs for seed key conversion. 8. Upload new credentials for seed key conversion. 9. Associate short title(s) with Over-The-Network-Keying (OTNK) ECUs for ECU-initiated key retrievals. 10. Cancel short title/ECU associations, when required. 11. Upload encrypted keying material for fill devices and ECUs to the PRSN for retrieval by authorized KOA Agents. 12. Manage encrypted keying material held at the PRSN for download by KOA Agents and KMI-aware ECUs. 13. Associate short titles with a benign fill/encrypted fill ECU for automated encrypting of routinely superseded key. 14. Download encrypted key into a fill device for an UNCLASSIFIED//FOR OFFICIAL USE ONLY 5-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 authorized KOA Agent. 15. Review reports related to tracked and accountable events associated with the KOA. 16. Review Device Distribution Profiles (DDPs) through comparison of the assignment of ECUs to key products. 17. Conduct periodic reviews of the tailored Product Ordering Catalog, as required. 18. Report any compromise or potential compromise involving KMI products. 19. Perform required accounting transactions to effectively manage the KOA and ensure proper accountability of material. 20. Verify and maintain status information on KMI products held, used or responsible for. 21. Conduct and document a visual inspection of the AKPREINIT Flash Drives (or NSA tamper evident bags), AKP and KVM Switch (if installed) for any signs of damage or tamper as discussed in Chapter 2 herein. 22. Review the account’s Transaction Status Log weekly and report any anomalies or unexplained activity to the CPSO. 23. Backups must be created and offloaded at a minimum of weekly for large accounts and monthly for small accounts. 24. Archive accounting data every six (6) months, or as often as necessary for an active MGC. Retain archived accounting data for 2 years or until the next COR Audit, the sooner of the two. 25. Send, out of band, an exact copy of archived accounting data on a CD or DVD to the CSN within 30 days of the archive. The media must be labeled with a red SF-707 (SECRET) label, shipped via a method approved for SECRET collateral information and include; the KOA ID, beginning and ending dates of the accounting data and the name of the KOAM who archived and offloaded the accounting data. Archived records must not be modified or deleted during the retention period or when duplicated for shipment to the Configuration Manager. The UNCLASSIFIED//FOR OFFICIAL USE ONLY 5-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 inner/outer mailing address for archived accounting data is: DIRNSA Suite 6298 Configuration Manager, Y2D4222 9800 Savage Road Ft. Meade, MD 20755 26. Connect to the KMI Storefront and obtain an updated Certificate Revocation List (CRL) at a minimum of every six (6) months. 27. Ensure the KOAM turnover checklist is completed by the outgoing Manager, witnessed by the incoming manager and retained on file per Annex M to EKMS-1(series). 28. Additional duties and responsibilities can be found in the OSD for the MGC, the KMI Enrollment Policy, and EKMS1(series) Article 455. b. will: 1. Personnel Local Type 1 Registration Authorities (PLT1RA) Perform personalization of Type 1 Tokens. 2. Initiate certificate requests and download Type 1 Certificates onto a token. 3. Record evidence used in the face-to-face verification of the identity of a Type 1 Human Subscriber and perform annual re-verification of Human Users in an active state through examination and verification of current evidence based upon the original evidence resubmitted by the EA in accordance with the Type 1 Certificate Policy (Type 1 CP), the KMI Enrollment Policy, or the Operational Security Doctrine, as required. 4. Review and maintain the Registration Data of Human Identities associated with Type 1 Certificates at a minimum of annually or more frequently, as required. 5. Report any compromise or potential compromise involving KMI products. 6. Perform revocation actions for Type 1 Certificates. 7. Change the Token SO Password. UNCLASSIFIED//FOR OFFICIAL USE ONLY 5-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 8. Verify and maintain status information on KMI products. 9. Be familiar with and adhere to the applicable Operational Security Doctrine for the MGC, the sKey6500 Token (KOV-29), and KMI Enrollment Policies. c. will: Device Local Type 1 Registration Authorities (DLT1RA) 1. Perform endorsement of KMI-aware devices. 2. Authorize conversions of IA(I) and Key Encryption Infrastructure (KE(I)) certificates. 3. Record evidence of verification of the existence and condition of KMI-aware devices. 4. Record and maintain evidence of initial and periodic re-verification of endorsed devices. 5. Report any compromise or potential compromise involving KMI products. 6. Perform revocation actions for Type 1 certificates. 7. Verify and maintain status information on KMI products. 8. Be familiar with and adhere to the applicable Operational Security Doctrine for the MGC, the sKey6500 Token (KOV-29), and KMI Enrollment Policies. d. Product Requesters will: 1. Ensure timely submission of orders for asymmetric products specifying DAO, partition codes and delivery instructions for accounts to meet operational requirements. 2. Specify and modify production and delivery priorities for standing orders. 3. Modify the ADP associated with product orders, when validated. 4. Review, cancel and manage, as applicable product orders, tracking information related to KMI products, tailored product ordering catalog data, and partition or DAO code data UNCLASSIFIED//FOR OFFICIAL USE ONLY 5-4 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 and descriptions. 5. Report any compromise or potential compromise involving KMI products. 6. Request the PRSN and PSN, as applicable; temporarily or permanently cease distribution of products under their cognizance. 7. Review, update and manage status information for KMI products. 8. Perform duties as a Command Authority, Controlling Authority or both, as required as discussed in Articles 103, 501, 709 and Chapters 4, 9 and 10 of this manual. 9. Additional duties and responsibilities may be further defined in both the KMI Enrollment Policy for Managers and the Operational Security Doctrine for the MGC. e. Client Platform Administrators will: 1. Perform software installations and upgrades. 2. Establish and maintain Microsoft Windows user-accounts and configure accounts and privileges on the Client Host. 3. Assign database privileges to the KOAM and Alternates. 4. Configure and maintain the Client Host in accordance with applicable configuration management and security guidelines. 5. Perform required maintenance actions on the Client Host, including offloading of backups to removable media. 6. Properly label, safeguard and store backup media when offloaded from the MGC to prevent loss or unauthorized access. NOTE: Full system backups created locally and stored on media must be brought into CMCS accountability by the KOAM through generation and submission of a possession report. 7. Perform system recovery actions, when required. The use of any database backups and AKPREINIT drives older than 7 UNCLASSIFIED//FOR OFFICIAL USE ONLY 5-5 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 calendar days old must be reported as a Practice Dangerous to Security (PDS) in accordance with Chapter 9. 8. Install, document and report Information Assurance Vulnerability Advisory (IAVA) compliance to the ISSM or CPSO, as applicable. Authorization to install IAVA patches posted by NSA to the Product Availability Library (PAL) does not require NCMS or SSC approval. 9. Install antivirus software and configure the client for virus definition updates in accordance with applicable configuration guidance. 10. Run periodic health tests on the MGC, when required. 11. Be familiar with and adhere to the guidance contained herein and in the Operational Security Doctrine for the MGC. 12. Complete, execute and have on file the required Information Systems Privileged Access Agreement and Acknowledgement of Responsibilities form required by DoD 8570.01M. A sample can be found in Annex I. f. Client Platform Security Officers will: 1. Conduct audit data reviews, archives and retain archived audit data for 2 years or until the next COR Audit, the sooner of the two. 2. Perform security monitoring of the Client Host. 3. Perform security administration of the Client Host to include audit review of the Client Host audit data, the AKP audit data, and Public Key Infrastructure (PKI) audit data. 4. Verify IAVA compliance at a minimum of semi-annually in conjunction with the Client Host audit and report compliance via NIPRNet email which includes the KOA number and IAVA status (Month/Year) to: KMI_Compliance@nsa.gov. 5. Ensure proper labeling, safeguarding and storage of audit data backups to prevent unauthorized access. UNCLASSIFIED//FOR OFFICIAL USE ONLY 5-6 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 6. Offload, label and safeguard optical media storing audit data and deletion of all previously archived audit logs, as required. The logs must be verified to have been successfully written to optical media prior to clearing the logs. 7. Send an exact copy of the archived audit data to the Central Services Node (CSN) within 30 days of archiving via an approved method for SECRET collateral information in accordance with SECNAV M5510.36. The media used must be labeled with a red (SF-707) SECRET label and identify; the MGC KOA ID, the beginning and ending dates of the audit data and the name of the CPSO who archived and offloaded the data. The mailing address for the CSN is: DIRNSA Suite 6298 Configuration Manager, Y2D422 9800 Savage Road Fort George G. Meade, MD 20755 8. Be responsible for verification and continuity of security audit data, 9. Provide oversight regarding the control and configuration of security resources and settings for the Client Host. 10. Export the AKP diagnostic history log (DHL) at a minimum of every six months or when notified by the system the log is 80% full. 11. Review the DHL within 10 working day of exporting the DHL to the Client Host and clearing of the log afterwards. 12. Verify the BIOS password each time an audit archive is performed. 13. Perform health tests on the AKP, as required. UNCLASSIFIED//FOR OFFICIAL USE ONLY 5-7 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 14. Perform additional duties and responsibilities outlined in the Operational Security Doctrine for the MGC and the Type 1 Certificate Policy (CP) as applicable. g. Controlling Authorities will: 1. Request the creation or deletion of short-titles for symmetric key products. 2. Define the intended application or use of keying material under their purview. 3. Promulgate effective and supersession dates for keying material under their purview and disseminate such information to all validated KOAs. 4. Designate short-title orders as either standing or a periodic. 5. Approve, disapprove and maintain a listing of Product Requesters authorized to order a specific product. 6. Verify and maintain KOA registration data and credentials. 7. Perform an annual review of short titles under their cognizance to determine if the material is still required and if accounts validated for the material are accurate and up-to-date. 8. Specify secondary approval for a product, when required. 9. Approve symmetric key orders when submitted by authorized Product Requesters. 10. Evaluate COMSEC Incidents for products under their cognizance. This includes initiating compromise recovery actions, determining when an Emergency Supersession is warranted and notifying all KOAs validated for the material involved. 11. Approve and disapprove product requests to transfer products under their cognizance, as well as cancel orders no longer required. 12. Order future editions of symmetric products (aperiodic orders). UNCLASSIFIED//FOR OFFICIAL USE ONLY 5-8 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 13. Create, modify and manage Account Distribution Profiles (ADPs) for symmetric products. 14. Specify and modify the requested production and delivery priorities for standing orders. 15. Direct the PRSN and PSN, as applicable to temporarily or permanently cease distribution of products under their cognizance. 16. Additional duties and responsibilities of a Controlling Authority may be found in Annex C to EKMS-1(series). h. Command Authorities will: 1. Request assignment and/or removal of Department Agency Organization (DAO) and Partition codes, as applicable. 2. Approve, disapprove and maintain a listing of Product Requesters authorized to order asymmetric products for Partition and DAO codes under their cognizance. 3. Perform an annual review of Product Requestors authorized to place orders for DAO or Partition codes under their cognizance to validate both the requirement and personnel authorized to place orders. 4. Review and maintain partition code data and DAO codes and descriptions. 5. Additional duties and responsibilities can be found in the KMI Enrollment Policy for Managers and Annex U to EKMS1(series). i. KOA Registration Managers (KOARM) will: 1. Ensure the proper and timely registration of the KOA. 2. Ensure the User Sponsor submits a request for a KOA and the equipment required by the KOA. 3. Connect to the PRSN and establish the KOA within the KMI by translating the KOA to the previously established EKMS account number, unless the account is new and did not have an EKMS account previously. UNCLASSIFIED//FOR OFFICIAL USE ONLY 5-9 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 4. Add, modify or maintain accurate KOA registration data. 5. Associate the AKP with a KOA and a respective KOAM with the KOA. 6. Assign KOAMs to a KOA. 7. Add, assign or remove RuBAC access sets to KOAs and RuBAC attribute values in a RuBAC access set. 8. Review/verify KOA registration data and credentials. 9. Replace a KOA’s Primary KOAM with another KOAM. 10. Query and manage status information, as required. 11. Review, be familiar and comply with the KMI Enrollment Policy for Managers. NOTE: Additional duties and responsibilities of the KOARM are outlined in the Operational Security Doctrine for the MGC, the sKey 6500 (Token) and the KMI Registration and Enrollment Policies. j. Device Registration Managers will: 1. Register a User Identity for a respective User Device. 2. Establish new Device User identities in an active or inactive state, as required. 3. Initialize KMI-aware ECUs and User Devices. 4. Request initial seed keying material for KMI-aware ECUs/devices. 5. Request non-KMI Unique User Identifiers. 6. Register a User Identity for a User Set consisting entirely of User Devices. 7. Record and maintain evidence of identity eligibility and authenticity. 8. View, add or modify, as applicable Device User registration data UNCLASSIFIED//FOR OFFICIAL USE ONLY 5-10 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 9. Add, assign or remove RuBAC Access sets to KOAs and RuBAC attribute values in a RuBAC access set. 10. Report any compromise or potential compromise involving KMI products. 11. Verify and maintain status information on KMI products. 12. Review, be familiar and comply with the applicable Operational Security Doctrine for the MGC, the sKey 6500 (KOV29), and KMI Enrollment Policies. k. Enrollment Managers will: 1. Create enrollment sub domains. 2. Enroll and disenroll KOAMs. 3. Assign the singular identity of a human user to a Manager role. 4. Assign either a group or shared identity, as applicable of a user set of human users to a Manager role. 5. Record evidence of identity eligibility and authenticity, as well as reverification, when required. 6. Assign RuBAC access and Conferral sets to KMI Managers (e.g. EM, DRM and KOARM). 7. Add or remove an attribute value in both RuBAC Access and Conferral sets, as required. 8. Review, manage and maintain registration and enrollment data, as applicable. 9. Verify and maintain status information on KMI products. 10. Review, be familiar and comply with the applicable Operational Security Doctrine for the MGC, the sKey 6500 (KOV29), and KMI Registration and Enrollment Policies. l. Legacy Catalog Manager (LCM): The LCM will: UNCLASSIFIED//FOR OFFICIAL USE ONLY 5-11 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 1. Ensure timely updating of the KMI product ordering data based on CONAUTH and CMDAUTH direction. 2. Keep the KMI Product Ordering Catalog current with the legacy Electronic Key Management System (EKMS) for all Traditional (Symmetric) Key Short Titles and Distribution Management. UNCLASSIFIED//FOR OFFICIAL USE ONLY 5-12 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 CHAPTER 6 - EDUCATION, TRAINING, AND CMS COR AUDITS 601. TRAINING REQUIREMENTS. a. Personnel assigned as a KOAM or Alternate must successfully complete formal training prior to appointment and assumption of duties to be enrolled in KMI. The incumbent must be enrolled to obtain the KOV-29 (token) required for the role. The EA completing and submitting the form on behalf of the member is responsible for verifying completion of the training prior to submission of the form. b. When attendance at training is not possible due to extenuating circumstances such as hospitalization, unplanned loss, death, or immediate Relief for Cause of Account personnel, etc., the EA is permitted to still complete the KMI Form 002, if an official waiver to the formal training requirement has been granted by the Service Authority (NCMS). Waivers of this nature must be submitted to NCMS via record message and must include the unit’s ISIC, TYCOM and servicing COR Audit Team. A sample waiver request can be found in Annex H. NCMS may authorize a waiver of up to 90 days for a KOAM and 180 days for an Alternate to complete formal training. If granted, the EA will annotate on the KMI Form 002, the originator and DTG of the Service Authority waiver and will submit a copy with the KMI Form 002. c. The above flexibility set forth at the National level is not intended to accommodate administrative matters such as regular leave, stand downs, etc… when training is otherwise available. Commands must ensure reviews are conducted of manning documents prior to personnel transferring or separating to enable early identification of a replacement and ensure the prospective KOAM or Alternate meets designation requirements for the position including completion of formal training. d. Personnel appointed, registered and enrolled based on a Service Authority waiver will not have a Windows user-account on the MGC and will only be permitted access to the MGC/AKP in the role of a "witness" for TPI purposes. Personnel appointed under a Service Authority granted waiver must also review and understand the Two-Person Integrity (TPI) section of Lesson 25 "KMI MGC Operator Training Key Distribution". e. A KOAM or Alternate performing the duties of the Client Platform Administrator (CPA) must be Level 1 Information UNCLASSIFIED//FOR OFFICIAL USE ONLY 6-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Assurance Technician (IAT) certified within 180 days of assignment to IA duties in accordance with DOD 8570.01M. f. In organizations where the roles and duties of the CPA are performed by other appointed, cleared and certified personnel, the KOAM or Alternate are not required to be Level 1 IAT certified. g. IAT Level 1 certification can be attained through successful passing of the COMPTIA A+, COMPTIA Network+, or the ISC2 System Security Certified Practitioner (SSCP) examination. See Appendix 3 to DoD 8570.01(Series) for additional information. h. The command or service Designated Approval Authority or Authorizing Official (DAA/AO), not NCMS, may grant IA certification waivers consistent with the criteria and time limitations set forth in DoD 8570.01M. NCMS will take no action on IA certification waivers received. i. The KMI-Interactive Courseware (ICW) is a prerequisite for attendance in the formal KMI Manager COI. It is available on the Total Workforce Management System (TWMS), the My Navy portal, the Navy Information Application Product Suite (NIAPS) server for afloat units and the Navy E-Learning (NEL) ashore and afloat. Completion of the COI on the NEL must be on the side (ashore or afloat) the ICW is started on. A minimum score of 80% or better is required to successfully complete the ICW. All COR Auditor personnel are also required to complete the ICW prior to appointment. The course must be successfully completed every 3 years for active COMSEC Account Managers and COR Auditor personnel. The course can be completed via government computer or personal computer with a valid CAC card and reader. Minimum hardware and software requirements: Windows 7 or higher, IE 11, Adobe Flash Player, Adobe PDF Player and Active Card reader for the CAC card reader. j. A quick reference matrix reflecting training requirements can be found in Figure 6-1. 603. KEY MANAGEMENT INFRASTRUCTURE (KMI) MANAGEMENT CLIENT (MGC) COURSE OF INSTRUCTION (COI). UNCLASSIFIED//FOR OFFICIAL USE ONLY 6-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 GENERAL. All automated accounts must have a minimum of two formally trained MGC operators at all times. Should unforeseen circumstances result in the absence of all trained operators, the account must discontinue processing automated transactions immediately and report that fact to NCMS. In such a scenario, the account must revert to back to manual accounting operations until a minimum of two formally trained personnel are available and appointed in writing unless a waiver has been requested from and is granted by NCMS as discussed above. a. KMI Operating Account Manager (KOAM) Course of Instruction (COI). The KOAM COI is 15 days and is intended to train KOAMs, Alternates and COR Auditors on use of the MGC suite to perform basic account management functions including; distribution, destruction, issuance, and transfer of COMSEC material. This training also addresses how to register, initialize, endorse, activate, and enroll both users and KMIAware devices in the KMI system. The target audience for the COI is those whose official duties in the following roles require access and use of the MGC/AKP including: (1) (2) (3) (4) (5) (6) (7) (8) (9) KOA Managers Controlling Authority (CONAUTH) Command Authority (CMDAUTH) Product Requester (PR) Device Registration Manager (DRM) Device Local Type 1 Registration Authority (DLT1RA) Personnel Local Type 1 Registration Authority (PLT1RA) Token Security Officer (TSO) Legacy Catalog Manager (LCM) It is highly recommended that KOAMs scheduled to attend training have prior experience in most, if not all of the following areas prior to attendance: (1) Experience as a COMSEC Account Manager and knowledge of DON COMSEC policy. (2) Proficiency and understanding of Microsoft WindowsBased operating system. (3) Familiarity with the use of ancillary fill devices, i.e. SKLs, TKLs, etc… UNCLASSIFIED//FOR OFFICIAL USE ONLY 6-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 (4) Knowledge, experience and understanding of the use of Public Key Infrastructure tokens/certificates for managing access to DoD systems. (5) Knowledge and experience configuring and/or maintaining a High Assurance Internet Protocol Encryptor (HAIPE) device. NOTE: With exception to unforeseen circumstances, i.e. death, extended TDY, relief for cause, etc... to negate unnecessary expenditure of funding for required training, including attainment of applicable 8570.01 certification and to promote continuity in account management, it is not recommended that individuals with less than six (6) months remaining in their present assignment be appointed as a KOAM. 605. KMI TRAINING LOCATIONS. a. The formal KMI training is available in each of the fleet concentrated areas and Marine Expeditionary Force (MEF) locations reflected in Article 305 to EKMS-1(series). b. Attendance criteria: Attendance at the KOAM COI is restricted to personnel who meet the same grade, security and length of service requirements outlined in EKMS-1(series) Article 305. Additionally, prospective students must be appointed to positions requiring attendance. This training is not for LE personnel, KOA Agents (unless the incumbent is also a KOAM), CPAs or CPSOs. 609. ADDITIONAL KOAM TRAINING REQUIREMENTS. a. If a KOAM or Alternate is also performing the duties of the Client Platform System Administrator (CPA), such personnel must also: 1. Be certified at a minimum as an Information Assurance Technician (IAT) Level 1 in accordance with DOD 8570.01M. 2. Complete the CPA computer-based training. for the URL. See Annex F 3. Complete the required Information System Privileged Access Agreement and Acknowledgement of Responsibilities form required by DoD 8570.01M. A sample can be found in Annex I. UNCLASSIFIED//FOR OFFICIAL USE ONLY 6-4 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 b. In organizations where the roles and duties of the CPA are performed by other appointed and properly trained and cleared personnel, the KOAM or Alternate is not required to be IAT Level 1 certified. c. Personnel appointed as a CPA with administrative privileges are performing those duties within the computer environment and must meet Information Assurance Technical (IAT) Level 1 training or higher. d. Personnel performing IA functions must obtain one of the certifications required for the IAT position assigned to. IAT Level 1 certification baseline requirements can be obtained by successful completion of any one of the following: (1) (2) (3) Comp TIA A+ Comp TIA Network + (ISC) 2 System Security Certified Practitioner (SSCP) e. Personnel performing duties as the TSO must complete the computer-based training reflected in Annex F. 611. PERSONNEL QUALIFICATION STANDARDS (PQS). a. All military personnel except those assigned to USCG and USMC accounts appointed or designated as KOA Managers, Alternates, KOA Agents/LEs Issuing and LE Using, must complete the applicable portions of the latest version of NAVEDTRA 43462 (EKMS or KMI, as applicable) PQS for the position they are fulfilling. The PQS can be obtained from the Navy Knowledge Online (NKO) Portal. b. Although PQS is not required for civil service employees, due to the outsourcing of COMSEC account management duties at many shore commands, Commanding Officers may, at their own discretion require all personnel with access to COMSEC material, including civil service employees and contractors complete PQS for the respective position appointed, i.e. Manager, LE Issuing or LE Using, as applicable. If required for civil service employees, the requirement should be documented in the employees Position Description (PD) and Performance Appraisals and also written into the commands local COMSEC policy and any related LOAs/MOUs for external LEs supported, as applicable. 613. CMS COR AUDITS. UNCLASSIFIED//FOR OFFICIAL USE ONLY 6-5 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 a. CMS COR Audits will be conducted on a biennial basis by the COR Audit Teams or other CMS COR Auditors certified by NCMS. b. CMS COR Auditors must meet the criteria set forth in EKMS-3(series) c. The criteria related to incidents, PDSs and administrative discrepancies found in EKMS-3(series) will remain in place in assessing the health and management of the account. UNCLASSIFIED//FOR OFFICIAL USE ONLY 6-6 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 KMI TRAINING MATRIX ICW Command Authority Controlling Authority Formal Training Required NA CBT for Role PQS Yes No NA NA ** CPA CPSO DLT1RA No No No NA NA Yes KOAA/LE Personnel No NA NA When developed for KMI Yes Yes CPA & TSO CBT if serving as either NA NAVEDTRA 43462-2 (304 section) NA KOAM CPA * CPSO NA NA NA NA DoD 8570.01 (IAT Level 1) Yes, only if also serving as a KOAM serving as a CPA. No, if serving as a KOAM but the CPA role is fulfilled by other cleared and certified personnel Yes Yes Yes, only if also serving as a KOAM serving as a CPA. No, unless performing as a CPA, CPSO or other non-KMI related position with privileged access requiring such. Yes, only if performing as a CPA Remarks The CPA, CPSO and any other non-KMI duty requiring privileged access requires a Privileged Access Agreement be executed by the incumbent (See Annex I) Yes, only if also serving as a KOAM serving as a CPA. TSO No NA TSO NA No, unless performing as a CPA or other non-KMI related position with privileged access requiring such. COR Auditor Yes Yes Yes Yes Yes, only if Personnel performing a role requiring certification “R” indicates recommended; not mandated. Not included herein are external roles performed by CMIO, NCMS and SPAWAR. ** Personnel performing duties as a Controlling Authority must also complete the NSA Controlling Authority CBT. PLT1RA No Yes Figure 6-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY 6-7 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 CHAPTER 7 – ACCOUNTING AND ACCOUNTING FUNCTIONS 701. a. ACCOUNTING (GENERAL). All COMSEC material is accountable. b. COMSEC material is accountable based on its assigned Accountability Legend Code (ALC). c. ALC-1, 2, and 6 material is accountable to the Central Office of Record (COR). ALC-4 and 7 material is locally accountable after initial receipt. Regardless of ALC, all COMSEC accountable material will be accounted for and managed within the MGC. In addition to CHVP products, other non-COMSEC accountable items cannot be accounted for in the MGC Product Inventory and if discovered must be documented in accordance with Chapter 9 of this manual. d. With exception to CIKS or other locally accountable materials that do not possess a CMCS/KMI-wide recognizable Short Title, the movement of all COMSEC material into, within and outside an account, is the responsibility of the KOAM and Alternates and will be documented with appropriate documentation produced from the account’s MGC. e. Manual accounting is only permitted for (a) items that cannot be accounted for in the MGC environment (as discussed above); (b) at the LE Issuing level; or (c) when operationally necessary to issue physical material when the account’s MGC is not operational due to a system casualty or when the account must revert to manual accounting due to non-availability of formally trained account management personnel. f. If during any inventories a classified COMSEC accountable item or Controlled Cryptographic Item (CCI) is discovered that is not being accounted for or an item cannot be found, a COMSEC incident report is required in accordance with Chapter 8. The loss or finding of unclassified material not marked or designated CRYPTO or not CCI must be documented and reported in accordance with Chapter 9. g. Found or missing material MUST be brought into proper accountability or relieved from accountability through the use of a Possession or Relief from Accountability Report, as applicable. These reports will NOT be used without written prior approval to do so from NCMS when related to a COMSEC UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 incident or Reportable PDS. h. All destruction, generation, possession, relief from accountability and transfers involving ALC-1, 2, and 6 material must be reported to the COR, Tier-1 or PRSN, as applicable. i. Transaction logs will be printed, closed out annually and retained for the current and previous (2) years. j. Cryptographic High Value Products (CHVP) products are not COMSEC accountable and cannot be accounted for in the MGC Product Inventory. If acquired, they must be locally accounted for as high-value government property. When keyed, they must be safeguarded based on the level of the key loaded but are unclassified if the CIK is removed and stored separately, if the device makes use of CIKS. See CNSSI 4031 for additional information on CHVP products. 703. OVERVIEW OF MGC ACCOUNTING FUNCTIONS. KMI provides accountability and tracking services compatible to those used to manage and account for COMSEC material in the COMSEC Material Control System (CMCS) using previous automated systems but with additional enhancements. KMI will improve accountability and security as well as reduce manpower requirements associated with inventory requirements by tracking products directly delivered to ECUs and not to an account for issuing to LE personnel. a. The MGC will provide for automated accounting for both physical and electronic COMSEC material, including keying material, authenticators, operating and maintenance manuals (KAOs/KAMs), Controlled Cryptographic Items (CCI) and other COMSEC items requiring accountability within the KMI. Some of the accounting functions, features or processes provided by the MGC include an Accountable Item Summary, Transaction Status Log, Inventory Reports, Reconciliation, Material Issues, Transfers, Destruction, Generation, Tracer Notifications, Conversion Reports, Possession and Relief from Accountability Reports. b. DON entities will continue to operate with Tier 1 performing COR-related functions including the processing of transactions reported. UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 705. a. MANAGEMENT OF COMSEC MATERIAL IN AN ORGANIZATION. Receipting for COMSEC Material. 1. Personnel receipting for COMSEC material must be authorized access to COMSEC material, have a security clearance equal to or higher than the HCI of the account, be SCI eligible (if the account is validated for SCI/SI material), be properly trained, be appointed in writing, complete a SD Form 572, be on the CMS Form-1 or USTC Form-10 for the account, as applicable, and have written authorization (Official command letter or Courier Card). 2. If the account HCI is TS, two personnel will conduct all material pickups from DCS, regardless of whether the account gets little, if any, physical TS material. NCMS will not waive this and if the account has no requirement for TS material, the KOAM should consult with their chain of command and NCMS to consider changing the HCI of the account to Secret. 3. COMSEC material picked up/dropped off must be transported directly to/from the command and be properly safeguarded at all times until properly stored or signed for when material is turned in. Delays or stops except for emergencies are strictly prohibited. 4. Use of a POV is highly discouraged and to the fullest extent possible government vehicles should be used. 5. Physical material including keying material, code books, authenticators, and CCI equipment will be visually inspected upon receipt, page checked (unsealed books and/or amendments) and the accounting information will be verified against the related transfer documentation. See Annex E for page check requirements. 6. Discrepancies with accounting reports must be corrected and reported to the originator or the shipment within 24 hours. Hard copy documentation must be manually corrected by the recipient and the use of the “select exceptions” or similar function in the MGC must be used in processing electronic receipts to prevent receipting for material either not received or not as reflected on the associated accounting reports. 7. Receipts for material or the reporting of corrupt Bulk Encrypted Transactions (BETs) must be reported to the COR and UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 originator of the transfer within 3 business days of receipt of the material or downloading of BET. Non-compliance with the 96 hour time frame must be documented in accordance with Chapter 9. 8. Material received with a damaged outer wrapper will be documented in accordance with Chapter 9. Material received in which the inner wrapper, box or material itself is damaged or could have been tampered with must be reported in accordance with Chapter 8. b. Issuance of COMSEC Material on a Local Custody Basis. 1. All COMSEC material not physically held or reflected as “on hand” at the account level must be documented with a local custody document. When such occurs outside an automated environment, a manual SF-153 will be used. 2. Issuances of material outside the MGC/AKP environment will not be conducted except by a LE-issuing or for physical material issues when the account has experienced a MGC failure. 3. It is the responsibility of the KOAM, Alternate or LE Issuing entity to verify personnel signing local custody documentation meet all of the below requirements PRIOR to issuing material to the personnel. See (Figure 7-1) below. Requirement (Narrative) Be authorized access to COMSEC material either on an access list for the space/work center in which assigned or in the form of an individual appointment or designation letter signed by the current CO/OIC. Have a security clearance within scope and equal to or higher than the material to be issued. Be SCI eligible and indoctrinated (if being issued keying material used to protect SCI/SI information. Remarks Access list must be less than 12 months old. Access lists, appointment or designation letters must be updated and signed by the new CO within 60 days of a Change of Command. Recommend the KOAM consult with the Security Manager to ensure clearance data on access lists and designation letters is consistent with that reflected in the Joint Personnel Adjudication System (JPAS) or other security-related database. This should be verified by the Security Manager and/or Special Security Officer (SSO) at the time of appointment, designation or when access lists for spaces where these personnel are assigned is updated. UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-4 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Be properly trained. Complete a SD Form 572 (only required if access to keying material or equipment which permits extraction of key is require; not for end users of CCI without access to keying material) Letter of Agreement/Memorandum of Understanding (LOA/MOU) If military, with exception to USCG and USMC, PQS is not optional, it is required for KOAMs, Alternates, Clerks, LEs or Users. KOAM must have on file. Required when providing support to personnel of other commands than the one owning the account. If the above has not been verified, consult the appropriate personnel prior to issuing COMSEC material to the individual(s). Figure 7-1 NOTE: For one-time support to embarked personnel including Special Forces, squadron personnel in transit, etc… the KOAM must have written documentation that the recipients are appropriately cleared, authorized access to COMSEC material and authorized to hold the material by the Controlling Authority. If the Controlling Authority cannot be contacted, the Commanding Officer may authorize the issuance but the Controlling Authority must be notified via phone, email or record message within 24 hours and provided the recipients unit information to ensure notifications related to emergency supersession or crypto period changes are sent to the unit. For these unique, often time-sensitive mission critical functions, a LOA/MOU is not required. The written authorization submitted by the requesting unit authorizing their personnel access to COMSEC material infers that the requesting command bears full responsibility for compliance with the other requirements noted above (clearance within scope, PQS, CRYPTO briefing requirement) and not the issuing KOAM or Alternate. Just because a LE draws support in the above scenarios does not imply it is for further issue (as a LE Issuing). When issued in electronic form, the recipient personnel may very well all be Users. 4. Due to differing retention periods, it is highly recommended keying material or code books not be issued on the same local custody SF-153 with CCI equipment. UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-5 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 5. Keying material issued will be limited to that which is required by the work center. Most accounts typically issue material on a monthly basis for supported work centers. NOTE: Policy prohibits issuing red (unencrypted) keying material marked or designated as crypto prior to 30 days before its effective date; however, this refers to the edition not individual segments. Accounts may issue keying material or book-packaged material (in the canister or electronically) up to 30 days before the edition is effective. 6. If the keying material required is only available in physical canister form, up to (3) segments may be issued or the entire canister must be issued. When issued extracted segments, the supporting KOAM will create and provide a local destruction record (CMS-25) for the segments issued and will provide the most recent status information message to the recipient. 7. Up to a maximum of 120 days’ worth of keying material may be issued to a fill device (i.e. electronic storage device; DTD, SKL, TKL) to support real-world operational or contingency missions without a waiver from NCMS. To mitigate or reduce risk, KOAMs must realize the amount permitted for issuance in these scenarios may exceed what is operationally required and should consider the operational location, re-supply methods, risk to the materials and the impact to all holders of the key to limit the amount to that required for the mission. 8. The timeframes and limits discussed above are not applicable to Black Key packages. With the concurrence of the Controlling Authority, both current and future editions may be issued in a black key package without authorization from NCMS provided the KEK is withheld by the KOAM or LE Issuing and not made available to the end user prior to 30 days before the effective period of the keying material with which it is associated. 9. For units in a combat environment, keying material will be issued in electronic form. If the material is only available at the supporting account in physical (canister form), it will be extracted prematurely at the account level and issued in an electronic fill device (DTD, SKL, TKL). The KOAM will create a CMS-25 for the extracted material and annotate the material was prematurely extracted for loading in support of operational requirements (two personnel at the account level will sign and UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-6 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 date the CMS-25 and reseal the segments extracted). This is NOT a PDS; however, if the segments are not resealed and the premature extraction not explained and documented on a CMS-25, it must be reported as a COMSEC incident, in accordance with Chapter 8 herein. 10. One edition of When-Directed (WHENDI) material may be issued to LE personnel operating in areas where resupply is not possible or could impede operational mission requirements. 11. The KOAM will retain the original, signed and dated local custody document for a period of 90 days after the material has either: (a) been superseded and destroyed; or (b) returned and signed for by the KOAM or Alternate. The KOAM must provide a copy to the recipient of the material and will also provide a copy of an up-to-date status message for the material issued. c. Management of COMSEC Material at the User, Work Center, LE or KOAA Level, as applicable (Watch and non-watch environment) 1. In a watch environment, where a shift in responsibility occurs from supervisor to supervisor per shift, or a non-watch environment, all COMSEC material including CIKS for equipment issued will be reflected and accounted for on a watch to watch inventory. 2. The provisions of this section are not applicable to individuals issued only KSV-21 cards for secure voice communications, however, these and other similar COMSEC accountable items will be issued using proper local custody procedures and the immediate reporting of a loss or compromise of a card, or other COMSEC accountable product to the KOAM is the direct responsibility of the holder. NOTE: This change (related to a non-watch inventory) is because policy has and will continue to require an inventory be conducted in a non-watch environment when a security container storing COMSEC material is opened. Use of a LCI document in lieu of a watch to watch inventory created for and previously used to receipt for the material, does not permit for additional signatures when an inventory is required. 3. The inventory will reflect, the Short Title, Edition UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-7 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 and Register/Serial Number for all ALC-1 and ALC-6 material issued. ALC-2, 4 and 7 materials may be listed by Short Title, Edition (if applicable) and Quantity. 4. Equipment, regardless of ALC, may be reflected as a single line item on watch to watch inventories. The quantity must match the quantity of like items held when more than one and must be adjusted if an increase or decrease occurs as result of an additional like item being issued or returned to the custody of the KOAM. 5. All COMSEC material requiring page checks will be page checked during watch-to-watch inventories or when a security container is opened if in a non-watch environment. This includes book packaged (unsealed) material, segmented keying material removed from its protective packaging, maintenance manuals, operating manuals (KAMs/KAOs) and repair (Q-kits), if issued. Any discrepancies will be brought to the attention of the watch supervisor immediately while all watch personnel are present. Unresolved discrepancies will be reported immediately to the KOAM or Alternate. 6. In a space which is not a watch environment but the space is shared or accessible by other cleared personnel, installed or spare equipment not requiring storage in a security container will be inventoried daily when the space is occupied. For this reason, it is highly recommended the inventory be segregated into (2) parts keying material, books, fill devices stored in a safe and installed equipment not stored in a safe. This is not applicable to individuals issued KSV-21 cards. 7. The inventory will be signed by (2) properly cleared, trained and authorized personnel however the responsibility itself remains that of the supervisor or person in charge of the work center. 8. Any adjustments to a watch to watch inventory will be done in black ink, and initialed by the person making the change and verified and initialed by a second person. Example: the inventory reflects AKAC 1553 Edition 34 Reg Number 72. This item is turned in to the vault when the ship pulls in or the material is no longer required. The watch personnel will lineout the remaining calendar days on the watch-to-watch inventory, annotate the line item entry on the inventory to reflect the material as turned in to the KOAM and (2) personnel. Two personnel will date and initial line-outs or additions to UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-8 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 inventory documents. 9. The KOAM or Alternate, as applicable, will return in the MGC any material returned to the account and will prepare and sign for the material(s) returned providing a copy of the custody document to the work center returning the material. 10. At both the work center and account level, local custody documents will be retained for 90 days from the date the material is turned in, destroyed, or upon submission of the next completed LE inventory, as applicable. 11. Local custody files will have (2) sides to them; an active side for custody documents for material still issued and an in-active side for documents related to materials turned in or destroyed. The corresponding local custody issuing document used to issue the material will be annotated as returned or destroyed, destroy on or after (90 days from the date turned-in or destroyed), as applicable and placed on the inactive side of the local custody file. The same can be applied upon receipt of a Manager provided, LE conducted inventory. If other materials were issued using the same local custody document, the material returned or destroyed will be lined-out and initialed by account and LE personnel, as applicable and the local custody document will remain on the active side of the local custody file until the remaining materials reflected are destroyed or turned in to the account. 12. All inactive files will have the authorized date of destruction reflected/annotated on them, which will be 90 days from the material turn-in date. 13. Watch-to-watch inventories will be retained on file for a minimum of 30 days beyond the last date recorded. 14. If during a training visit or CMS COR Audit, it is discovered the LE is accounting for the material on a watch-towatch inventory but the LE does not have the local custody document on file, as required, have the LE report to the KOAM or an Alternate, obtain a copy from the account files and file it in the work center’s local custody file. This is not to be assessed as an incident when the material is being accounted for on a watch-to-watch inventory and the KOAM has the original local custody file. However, training should be conducted on UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-9 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 the spot to educate work center personnel on the purpose, importance and retention period for local custody documents. 15. Failure to adhere to proper local custody procedures (issuing material without such) must be reported in accordance with Chapter 8. d. Loading and Usage of Keying Material. 1. Keying material will be used in accordance with the effective and supersession guidance promulgated by the Controlling Authority of the material. 2. Premature usage (does not require successful establishment of communications) involves the loading of key prior to its effective date when the circuit is either online or an on-the-air attempt to establish communications has occurred. Premature usage requires reporting to the Controlling Authority in accordance with Chapter 8. 3. For Have Quick radios, operational requirements and logistical constraints will dictate whether more than two daily keys (current and future) up to a maximum of 6 segments may be loaded in the Have Quick Radio at the discretion of the Operational Commander or Commanding Officer, as applicable. 4. During normal operations, two segments of weekly key or one segment of annual key may be issued and loaded into the TAMPS. Up to a maximum of six weekly segments may be loaded when operational requirements warrant doing so, but this should be operationally and not convenience driven. 5. With the consent of the Controlling Authority, up to 31 daily segments (single edition) of Link-16 Traffic Encryption Key (TEK) may be loaded by squadron personnel in the Multifunctional Information Distribution System Joint Tactical Radio System (MIDS-JTRS). 6. Keying material used in systems employing off-line encryption such as the KL-51, AN/PYQ-20, etc… may be retained and used for up to 72 hours from the time of supersession. 7. Key Encryption Key (KEK) and Traffic Encryption Key (TEK) usage and destruction for KG-84/KIV-7 point to point applications will be in accordance with NAG-53(series). It should be noted herein that NAG-53(series) continues to strictly UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-10 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 prohibit retention of KEK used in point to point applications and requires that segments used be destroyed within 12 hours of loading. Failure to comply with this is a COMSEC incident in accordance with Chapter 8. NOTE: On a circuit supported via OTAR or during OTAD or OTAT operations, the KEK used must be equal to or higher in classification than the TEK encrypted/decrypted. Except in a communications emergency, use of a KEK classified lower than the TEK is a COMSEC incident and must be reported in accordance with Chapter 8. This includes OTAD operations when the key loaded on the KSV-21 is classified lower than the key passed electronically. 8. The loading of Pre-Placed Key (PPK), Authenticated PrePlaced Key (APPK), FF Vector Sets (FFVS) and Enhanced Firefly Vector Sets (EFFVS) will be in accordance with the Operational Security Doctrine (OSD) for the device. EKMS Managers must review, train on and provide a copy of OSDs to LE personnel. e. Authorization and Transferring COMSEC Material. 1. COMSEC material will not be transferred without prior authorization except as indicated in the matrix on the following page (Figure 7-2). Transfer documentation must reflect the source of the authorization. UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-11 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Proper Authorization Command Authority (CMDAUTH) Commanding Officer Keying CCI Material, Code Books, Authentication Tables NA No Asymmetric (Modern) Key Remarks Yes Yes Yes Yes Controlling Authority (CONAUTH) Yes No NCMS (Service Authority/ COR) TYCOM/FLTCDR No Yes Yes No (Unless they are the CONAUTH of the material) Yes Yes (If they are the CMDAUTH) NA Emergency transfers only. Report to CMDAUTH, CONAUTH and COR via message after the fact. If the material is ALC-6 or ALC-7 and the account conducting the transfer is the CONAUTH, other authorization is not required. If ALC-6 material is involved, it must be reported to the COR. Only for partitions and key managed See EKMS-5A Art. 401, if required. Figure 7-2 2. COMSEC material will not be transferred (permanently or temporarily) to a contractor/vendor account without prior NCMS approval. With exception to device failures in which the equipment is under warranty, these matters are handled on a temp loan basis and NCMS is responsible to issuing temp-loan numbers to ensure that DON funded assets are properly returned to the issuing DON account. 3. COMSEC equipment, including CCI, will NOT be transferred or issued to any foreign government/country. These matters require prior approval from NSA (DP22) and are typically UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-12 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 conducted under the Foreign Military Sales (FMS) program. 4. U.S. only keying material will not be transferred, issued to or loaded by non-U.S. personnel without express permission from the Controlling Authority, except as indicated in National Doctrine. 5. COMSEC equipment transferred or issued requiring shipment to a geographically detached entity will NOT be shipped with any associated CIKS or PINS included in the same shipment. Such will be shipped physically separate and not in one box placed inside the same box as the associated equipment. 6. Electronic transfer documentation may be used but a printed hard copy must be included with the shipment and maintained on file by the originating account pending receipt of an electronic receipt from the recipient. 7. If the recipient used the “select exceptions feature” to indicate the material received did not match the documentation, a local investigation must be conducted to determine if the material reflected on the transfer documentation was reflected but not actually shipped. If the item reflected was not received and cannot be accounted for at the account which originated the transfer, a COMSEC incident must be submitted in accordance with Chapter 8. 8. If no discrepancies exist and the recipient receipts to the COR and originator of the shipment with an electronic receipt, the originator of the shipment may discard the unsigned paper SF-153 used to document the transfer. 9. Recipients of physical shipments may reconcile for the material with an electronic SF-153, if provided by the originator but will complete, sign and retain the SF-153 enclosed with the material in accordance with Annex T to EKMS1(series). 10. Originators of physical shipments are required to notify the intended recipient within 24 hours of entering the material into shipment and provide the recipient with the article number, the method of delivery (DCS, Registered Mail, FEDEX, etc…) and date of the shipment. If a receipt is not received within 30 days, the originator must contact the intended recipient and if not received initiate tracer action. If within five working days of initiating tracer action, the UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-13 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 location of the item(s) cannot be ascertained, the originator will submit a COMSEC incident report in accordance with Chapter 8 based on the potential that the material is lost. 11. CCI equipment will not be installed on foreign ships for exercises or other purposes without properly cleared and authorized personnel being present at all times from the time the equipment is brought onboard until it is removed and returned by the U.S. personnel to the supporting account. These functions require prior submission and approval of a Ship Rider Request (SRR) as discussed in CJSCI 6510.06B which is available in the Information Assurance (IA) Library on NSA’s SIPRNET site. f. Use of Possession and Relief from Accountability Reports and Required Authorization. Possession and Relief from Accountability reports are considered special accounting reports and although not always, are generally related to found or missing material associated with a COMSEC incident. 1. Except under the scenarios outlined in subparagraphs f.2 – f.3 below, prior authorization from NCMS in writing is required to generate, prepare or make use of Possession and Relief from Accountability reports. 2. Prior authorization from NCMS to use a Possession Report is not required to bring items into accountability under the following scenarios: a. Material received via an inter-service transfer conducted with a DD-1149. b. Reproduced copies of book packaged material, when the Handling Instruction for the publication permits such. c. AKPREINIT Flash Drives when an AKP is site initialized or subsequent changeover is conducted. d. New backup media for use in conducting backups or creating images on the MGC. e. To bring into accountability COMSEC material removed from a host system. 3. Prior authorization from NCMS is not required to perform a Relief from Accountability when required to conduct and document an inter-service transfer or when a UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-14 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 separately accountable Lowest Repairable Unit (LRU) is installed in a host which is already accounted for in the CMCS. 4. Possession and Relief from Accountability reports involving ALC-1, 2, and 6 materials must be submitted electronically to NCMS (COR) within 3 business days or when the CO signs the end of the month destruction report for the account, whichever occurs first. 5. Do not submit possession and Relief from Accountability reports to the COR for ALC-4 or 7 materials. 6. All possession reports require three signatures; KOAM, Alternate (or properly cleared witness) and the Commanding Officer. In the absence of the CO, another official may sign as “Acting”. The use of By-Direction is strictly prohibited for COMSEC accounting reports. 7. Both Possession and Relief from Accountability reports require three signatures: the KOAM, Alternate (or properly cleared witness), and the Commanding Officer. 707. INVENTORY REQUIREMENTS a. Account Level Inventories. COMSEC material, including keying material, code books, and authenticators and CCI equipment will be inventoried at a minimum of semi-annually or as indicated in the below matrices (Figures 7-3 or 7-4). Beginning Account Number Ending Account Number 100000 158501 200000 258101 300000 358201 158500 199999 258100 299999 358200 399999 1st semi-annual (fixed-cycle) month Jan Feb Mar Apr May Jun 2nd semi-annual (fixed-cycle) month Jul Aug Sep Oct Nov Dec Figure 7-3 Occasion Fixed-Cycle Inv. When Conducted /Witnessed by Semi-annually (SAIR) based on account number KOAM and Alternate or other properly cleared and authorized person serving Remarks Failure to conduct, and retain inventory documentation must be UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-15 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 as a witness. Change of Command Change of Account Manager or LE Issuing entity Consolidated Inv. Combined Inv Hull Swaps Crew Swaps Change of Account Location (COAL), if available in the MGC Discovery of an unsecured vault or container reported in accordance with Chapter 8. Required by this manual and Chapter 8 to Navy Regulations. In conjunction with Change of Command or Change of OIC at the account or external LE level. When the KOAM or LE Issuing (as applicable) is to be replaced or has been removed. Is intended to be used to document a simultaneous Change of Command and Change of KOAM. Occasionally used to satisfy the both a SAIR and change of command or KOAM requirement together Whenever (2) ships are conducting a hull swap. KOAM and Alternate or other properly cleared and authorized person serving as a witness. The outgoing CO will sign Block 17. The incoming CO can initial, if desired Will be conducted by the outgoing person and witnessed by their relief. When a crew swap is conducted on a submarine or MCM ship. Monthly The off-going crew manager; witnessed by the on-coming crew manager. KOAM or Alternate. Does not require a physical inventory but does require resolution within 30 days of IRST errors. Used to ensure proper submission of documentation to minimize accounting discrepancies. Circumstantial The person responsible for the vault or container and witnessed by a 2nd person. The discovery requires a COMSEC incident report in accordance with Chapter 8. Until the account is reconciled, the outgoing KOAM is responsible. Conducted by the outgoing EKMS Manager, witnessed by the incoming. The Outgoing CO signs Block 17. There is no requirement for the incoming CO to sign when used with a SAIR and Change of Command. Conducted by the outgoing EKMS Manager, witnessed by the incoming. The Outgoing CO signs Block 17. There is no requirement for the incoming CO to sign when used for a SAIR and Change of Command. The Manager from both units as discussed in the remarks column. Requires (2) inventories. One conducted by the Manager on unit “A” and witnessed by the Manager from unit “B” and a second conducted by the Manager on unit “B” and witnessed by the Manager of unit “A”. UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-16 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Emergency opening of a vault or container, when directed by the CO. Circumstantial The person responsible for the vault or container and witnessed by a 2nd person. Any material not accounted for must be reported with a COMSEC incident report in accordance with Chapter 8. Figure 7-4 b. Physically Conducting an Inventory. All physical material must be physically sighted and page-checked during inventories. This includes the use of corresponding CMS-25 (local destruction records) when inventorying segmented material or ALC-1 book-packaged material with daily extractable pages. Electronic keying material is inventoried through verification of the account inventory on the MGC and verification of electronic storage devices storing the key. 1. ALC-1 and ALC-6 material will be accounted for by the Short Title, Edition, Serial Number and Quantity. ALC-2, 4, and 7 material will be accounted for by Short Title, Edition (if applicable) and quantity. On-hand ALC-6/7 material is inventoried electronically by the MGC/AKP which is a trusted and certified component. ALC-6/7 material on the MGC Product Inventory is verified during inventories by a KOAM and like destruction of electronic key in EKMS or KMI does not require a witness to carry out the function. 2. CIKS for equipment in-use or issued must be locally accountable using a manual SF-153 for inventory purposes. 3. It is highly recommended inventories at the account and LE/work center level be conducted by the KOAM and Alternate or one of the two and a properly cleared and authorized person serving as a witness. 4. For work centers located beyond 25 geographical miles from the supporting account or spaces in which account personnel are not permitted access, the KOAM will generate and provide an inventory to the work center. Authorized and cleared personnel at the work center level will conduct, properly document and report completion of the inventory to the supporting KOAM. 5. Material turned in to a CRF, depot or vendor for repair and return for less than 1 year will be accounted for by citing the local custody document used to turn-in the material. UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-17 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 6. Embedded COMSEC, i.e. KGV-68s, KOV-21s, etc… will be accounted for based on proper operations of the device in which it is installed in. Under no circumstance will such equipment be opened by account personnel for inventory verification purposes. 7. Units engaged in combat operations are exempt from inventory requirements but must notify NCMS of the tasking and length of such. A complete inventory is required within 45 days of return to the home base. 8. Inventories must be signed by the two personnel conducting the inventory and the CO or OIC (Block 17). 9. On multi-page accounting reports including inventories, signature requirements reside on the final page. 10. The COR must be notified via record message of the inventory completion within 90 days after the initial request for the inventory has been submitted. 709. STATUS INFORMATION AND DESTRUCTION. a. Status of COMSEC Material. COMSEC material will always be in one of the following statuses: 1. Effective: Presently authorized for use, in accordance with the guidance promulgated by the Controlling Authority. For asymmetric (modern) key, this is from the time the material is produced for a period of one year and may be used until the end of the respective calendar month produced. 2. Superseded: No longer authorized for use based on effective and supersession guidance promulgated by the Controlling Authority with exception to keying material used for off-line encryption systems such as the AN/PYQ-20 for up to 72 hours after supersession. 3. Reserve on Board (ROB): Material presently not effective and intended for future use based on status information promulgated by the Controlling Authority. b. Other Status Related Terms. 1. Contingency Key: Keying material which is typically held to sustain communications as a result of unforeseen UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-18 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 emergencies or requirements. 2. When Directed (WHENDI): Pertains to irregularly superseded material. Such material is only put in effect when directed by the Controlling Authority. c. Status Information and Responsibilities. 1. The Controlling Authority is responsible for promulgating status information for materials under their purview, which includes locally generated ALC-7 material. ALC-6 material will not be locally generated without approval of NCMS and if approved, such must be reported to the COR and local recipients or accounts provided the key via account-to-account transfer must be provided applicable guidance related to the use and status of the material. 2. There is no centralized source of status information simply because of the number of Controlling Authorities within the COMSEC community and across the services. However, if the Controlling Authority is unknown, query the Master Reference Catalog and enter the Short Title, it will display the Controlling Authority. See Annex F for the URL. The Status of COMSEC Material Report (SCMR) is a guide to be used for managing effective and supersession information but status information promulgated by the Controlling Authority is the only authorized source for destruction. 3. Due to the content, intended distribution controls, coupled with status changes promulgated more frequently than the SCMR may reflect, the SCMR will not be: (a) posted online for public access on any SIPR web portal (having a security clearance and access to SIPR does not imply all such personnel have a valid need-to-know for the information contained); (b) Elements; forwarded, reproduced or distributed to Local (c) be used as the authoritative source to carry out destruction of COMSEC material. The SCMR does NOT outline effective and supersession data for individual segments; it lists such information for the respective editions. 4. Many Controlling Authorities disseminate status UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-19 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 information for materials under their purview using a variety of communication mediums; these include but are not limited to: (a) Status messages such as those promulgated by the Joint COMSEC Management Office (JCMO) and COGARD C4ITSC are promulgated with pre-defined Date Time Groups on a quarterly and monthly basis, respectively. (b) General messages, such as ALCOMs, ALCOMLANT Alfa and ALCOMPAC P messages. Status information disseminated via ALCOM messages is generally limited to quotes from other source messages such as Central Facility (CF) notices, ALCOMLANT Alfa or ALCOMPAC P messages or changes to AMSG-600 in an effort to expand the distribution channels and reach the maximum number of recipients requiring the information. (c) Online via the Controlling Authorities SIPRNET web site. Use of a search engine using a string which includes the Short Title and key words such as effective or supersession information will most times, if not all, provide the source URL to the Controlling Authorities portal. NOTE: 5. See Annex F for a listing of helpful URLs. KOAMs or Alternates are responsible for: (1) Applying up-to-date status information to material in conjunction with receipting for the material. This will ensure the material is properly segregated at the account level to carry out Emergency Destruction in the proper order, if directed; (2) Providing copies of status messages and source Uniform Resource Locators (URLs) to material issued to internal and external LEs; (3) Inputting and verification of existing status information in the MGC database PRIOR to destruction of associated material; (4) Notification to the COR (if generation of ALC-6 material has been approved) and providing of status information, the intended application of the material and the KOAs validated for the material; (5) Notification and providing of status information to UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-20 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 holders for ALC-7 material locally generated; (6) Verification keying material issued has been destroyed within the proper time frames through the review of corresponding destruction documents, status messages and audit trail data, as applicable. d. Destruction Guidance Applicable at the Account and LE Level. 1. Destruction must be authorized. This includes routine destruction as well as emergency destruction. 2. For matters involving Sealed Authentication System Two Person Control (SAS/TPC) material, always consult the CJCSI 3260.01 (series). 3. For routine destruction, authorization must come from the Controlling Authority for the material; this includes keying material, code books, authentication tables, etc… 4. For emergency destruction, must be authorized by the CO, XO, OIC or senior person present and authorized to direct such. 5. Destruction of COMSEC equipment will not be conducted without written authorization from NCMS prior to doing so. 6. Always ensure up-do-date status information is available, reviewed and used in carrying out destruction at the account and LE level. 7. Review the working copy of the destruction report for accuracy and ensure the material identified to be destroyed is in fact authorized for destruction. 8. Except in instances when emergency destruction is directed, anyone performing routine destruction and uncertain if the material is authorized for destruction will withhold destruction and contact the KOAM or Controlling Authority, as applicable. 9. When conducting destruction, the first person must read off the information on the material to be destroyed, i.e. Short Title, Edition, and Serial Number to the second person who will verify the information is reflected on the destruction report. UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-21 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 If discrepancies are noted, stop the process and contact the KOAM or Alternate. If no discrepancies exist, a second review will be conducted prior to the destruction being carried out with the second person reading off the information on the destruction report to the first person for a second verification. 10. Both the person carrying out the destruction and the witness are equally responsible for the timeliness, accuracy and thoroughness of the destruction. e. Destruction Time Frames for COMSEC Material at the LE Level. 1. In a watch environment at the LE level, superseded COMSEC material will be destroyed within 12 hours of supersession. 2. In a non-watch environment at the LE level, superseded key will be destroyed within 12 hours of supersession or upon the next opening of the security container protecting such. 3. For physical, canister packaged material in which segments have been superseded but usage of the material is not daily, weekly, etc… the extracted segments will be destroyed in accordance with e.1 or e.2 above. This is a change to previous policy but is intended to prevent possible use of the next segment in the canister, which may be superseded resulting in a COMSEC incident in accordance with Chapter 8. 4. If emergency supersession of a segment of material is required and other earlier segments in the edition have not been superseded and have pre-defined usage in accordance with a callout message or other similar guidance from the Controlling Authority, do not extract all previous segments to carry out the destruction of the superseded segment. Place a copy of the emergency supersession message in a zip-lock bag with the canister and destroy the segment when it requires extraction or the edition supersedes, whichever occurs sooner. If the segment is issued and stored in a DTD, SKL, TKL, etc… it will be destroyed in accordance with e.1 or e.2 above, as applicable. 5. If an edition of COMSEC material is emergency superseded, it must be destroyed within 12 hours of notification of the emergency supersession. UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-22 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 6. For multi-copy keying material, each copy of the particular segment loaded must be destroyed immediately after loading except for the final copy, i.e. 3/3, 5/5, etc… the final copy must be destroyed within 12 hours of supersession. 7. Asymmetric (modern) key is Key Management Identification (KMID) specific and when loaded, the loading must be reported to the KOAM with a manually-created destruction document. The same KMID cannot be used in more than one endcryptographic unit (ECU). 8. For book-packaged material consisting of tables broken down in 6 or 12 hour increments, LE personnel do not have to tear out the individual tables for the corresponding hours in the day. The page associated with the particular day can be destroyed when authorized by the Controlling Authority. 9. Superseded material onboard an aircraft is not subject to the twelve-hour destruction criteria and will be destroyed upon completion of airborne operations if approved destruction devices are not installed on the aircraft or such may impede the mission. 10. Superseded material used for systems or devices may be retained for up to 72 hours following supersession. 11. Destroy physical, irregularly superseded maintenance, test or training keying material when it is unreadable. 12. Destroy on-the-air test key at the end of the testing period as determined by the test director. 13. GPS keying material may be retained and used for up to 12 hours after the regularly scheduled supersession period to comply with the NAVSTAR GPS Selective Availability and AntiSpoofing Host Application Equipment Design Requirements with the Precise Positioning Security Module (SAASM). Additionally, NSAGPSSOPO-0343 authorizes the use of three consecutive GPS keys during the 12-hour period following the first key‘s regular supersession period. 14. Amendment residue must be destroyed within 5 working days of the amendment entry (if issued to the LE with possession of the KAM/KAO for entry). 15. LE personnel must verify that material documented as UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-23 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 destroyed has been properly destroyed and documented as destroyed. Do not pre-sign or sign destruction documents (CMS25, SF-153, etc…) without verification of the device (DTD, SKL, TKL, etc…), the destruction device used and any local destruction documents (CMS-25 for physical keying material and AKAC-1553s). f. Destruction Time Frames for COMSEC Material at the Account Level. 1. End of the month destruction for unissued material must be carried out and documented no later than the 5th day of the month. However, it is highly recommended the actual destruction be carried out the 1st working day of the month and no later than the 3rd day of the month to permit ample time to review and confirm all working copies of destruction reports from LEs. 2. The destruction of electronic key stored on the MGC does not require a witness. Such can be performed by a single KOAM or alternate. 3. Asymmetric (modern) key which has been loaded by LE personnel must be recorded as Filled in End Equipment during the month in which it was loaded. It will appear on the next reportable or local destruction report but the use of this feature does not result in the creation of a working copy of a destruction record. 4. Material issued to LE personnel must be confirmed as destroyed no later than the 5th day of the month. However, it is recommended the confirmation be done in the MGC when the reports have been signed, dated and submitted to the KOAM. This affords time to address any concerns or material which was erroneously flagged and not authorized for destruction or destroyed. (Don’t hold onto all signed and submitted working copies until the 5th w day and then simply start confirming them all together; review them for accuracy, signatures, proper annotation (destroyed/witnessed) and if an item was lined-out “as not destroyed” look into the matter, it may be necessary to adjust the destruction report prior to confirmation.) 5. Material which is emergency superseded and not issued may be destroyed at the end of the month in which the emergency supersession occurs. A copy of the emergency supersession message will be placed with the material (if canister packaged) and stapled to it for book packaged material to prevent possible UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-24 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 use or issuance. However if an edition of issued material is emergency superseded, the KOAM and Alternates must ensure the issued edition is destroyed within 12 hours of supersession and issue the next edition put into effect by the Controlling Authority to the LE/work center. 6. If a segment of unissued material is emergency superseded, place a copy of the message in a zip-lock bag with the canister to prevent possible use or issuance. Destroy the segment upon supersession of the segment or edition, whichever occurs sooner. 7. When authorized by NCMS in writing, destruction of equipment must be carried out and the destruction reported to the COR within 90 days. Failure to carry out and report the destruction is a COMSEC Incident in accordance with Chapter 8. 8. The destruction of KAMs, KAOs must be carried out no later than the account’s end of month destruction following the supersession of the editions held. For KAMs/KAOs held which are no longer required, request disposition instructions and carry out and report the destruction no later than the following end of the month destruction. 9. Amendment residue must be destroyed within 5 days of the amendment entry. g. Destruction Personnel. 1. Destruction of COMSEC materials must be carried out with strict adherence to established policy and procedures. 2. With exception to the destruction of electronic key stored on the MGC, all other destruction evolutions require two properly cleared and authorized personnel. A person who is not authorized access to COMSEC material in writing cannot be a witness to the destruction of such. 3. In carrying out destruction, both the person performing the destruction and the witness are equally responsible for adherence to approved methods of destruction, the destruction itself and the accuracy of destruction documents. 4. Local destruction documents including CMS-25s and SF153s MUST be verified and signed by two cleared and authorized personnel. Never sign a destruction document when you have not UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-25 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 carried out the destruction, witnessed the destruction or verified the accuracy and completeness of the document, including required signature and date information on a destruction document! 5. KOAMs and Alternates, in signing the consolidated reports prior to submission to the CO/OIC, are certifying they either (a) destroyed all material reflected or (b) verified the destruction documents submitted by the work centers who certified the material was properly destroyed. h. Destruction Methods. Only methods and products approved by NSA as reflected in the NSA Evaluated Products list will be used for the destruction of COMSEC materials; see Figure 7- 5 on the following page. For any products or devices not reflected in the matrix, please consult the Operational Security Doctrine (OSD) for the device or CNSS 4004.1 which is available in the NSA IA Library. See Annex F for the URL to the IA Library. UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-26 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Chemical Means NSA approved disintegrator Degauss or Overwrite Pulp Shred Burn Yes Yes Yes No Yes NA NA NA NA NA NA NA Material Paper COMSEC and Classified Material, i.e. (AKAIs, AKACs, AMSHs, USKACs) Canister Packaged Keying Material Microfiche Floppy Disks CD/DVD Classified Hard Drives COMSEC Equipment (CCI) Remarks If local policy permits burning however, it must be reduced to white ash and contained to prevent loss of unburned pieces of material. Ashes must be inspected, broken up or reduced to sludge. Only NSA-approved crosscut shredders may be used. For pulping must be broken down to non-legible fiber residue. Yes No No No Yes NA For burning, see above. Always punch holes in the canister; inspect it for any segments that may have not been completely extracted and destroyed; Remove and shred any barcode labels found to still be applied and inspect the destruction device and bag before disposal to prevent recovery of any undestroyed material. Yes No No Yes Yes NA For burning or disintegration, see above. For chemical usage (bleach, acetone, methylene chloride) immerse for 5 minutes, separate film sheets Yes Yes NA NA Yes Yes Floppy Diskettes must be removed from the casing. If shredded residue must not exceed 5mm in size. Always consult the latest NSA/CSS Optical Media Destruction Guidance. See Annex F for the URL. See the NSA/CSS Storage Device Declassification Manual and Naval Telecommunications Directive (NTD) 03-11. If authorized, must be destroyed in accordance with EKMS-5A and the NSA Equipment Demilitarization Process. Figure 7-5 NOTE: Do not transport burn bags of un-shredded COMSEC material to facilities outside the command unless controlled by the KOAM and Alternate or properly cleared and authorized witness. UNCLASSIFIED//FOR OFFICIAL USE ONLY 7-27 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 CHAPTER 8 – COMSEC INCIDENTS 801. GENERAL. Due to the importance of identification and timely reporting of COMSEC incidents, this chapter incorporates COMSEC incidents which remain applicable under KMI and those which are unique to KMI. KOAMs, Alternates, and LE personnel should familiarize themselves with device specific Operational Security Doctrine (OSD) for COMSEC equipment held by their account. OSDs are available at the URL located in Annex F. a. Reporting. All COMSEC incidents must be reported per DON and National policy. Reporting is not to be delayed for any local or external inquiries to gather additional information or conduct root cause analysis of circumstances resulting in the incident. Any unit detecting an incident is required to report such and may be other than the unit which experienced or caused the incident. b. Types of COMSEC Incident Reports. Remain unchanged from what is reflected in EKMS-1(series) Article 950; Initial, Amplifying, and Final. There are no other types of COMSEC incident reports. The subject line of all COMSEC incident messages will indicate the type of report (Initial, Amplifying, or Final, as applicable)” followed by REPORT OF COMSEC INCIDENT. c. Time Frames for Reporting. As illustrated below. Material involved Effective key, key which becomes effective within 15 days or any incidents involving espionage, subversion, defection, theft, tampering, clandestine exploitation, sabotage, hostile cognizant agent activity, or unauthorized copying, photographing or reproduction Future key (becomes effective beyond 15 days from the date of the incident), superseded key, reserve on board or contingency key Any incident not covered by the above, i.e. loss of CCI equipment, failure to use LCI documentation, etc… Figure 8-1 Report Within 24 hours Message Precedence Immediate 48 hours Priority 72 hours Routine UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 d. Classification. To reduce the possibility of a spillage, all COMSEC incident reports will be sent via approved channels and classified at a minimum of CONFIDENTIAL. See EKMS1(series) Article 930 for additional information. NOTE: It is the responsibility of the originator to ensure compliance with proper classification assignment, paragraph markings (when the entire content may not be classified or differs from that of the message) and downgrading instructions. The receipt of any information via NIPRNET which is marked as classified or has paragraphs marked as such will be reported as a spillage with the originator of such communiqués responsible for cleanup costs. e. Required Addees for COMSEC Incident Reports. Minimum addressees required to be on COMSEC incident reports can be found in the matrix reflected below. Organization DIRNSA FT GEORGE MEADE MD NCMS WASHINGTON DC COMNAVIFOR SUFFOLK VA CNO WASHINGTON DC Action/ Remarks Info A/I Action on; - all CRYPTOGRAPHIC and PERSONNEL incidents - Physical incidents involving tampering, sabotage, covert penetration. - Physical incidents where there are multiple CAs and they are not all DON. (Info on others) A/I Action on; - Physical incidents when a DON CA is the violator - Physical incidents with more than one DON CA and all are DON. (Info on all others) I On all incidents I On all incidents involving the loss of classified material (The initial COMSEC incident report satisfies the mandatory UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY CMC WASHINGTON DC I COMSC WASHINGTON DC I COMNAVRESFOR NORFOLK VA I DIRNAVCRIMINVSERV WASHINGTON DC I The accounts nearest Field Office (afloat with a NCIS Resident aboard) must include NCISRA nearest their homeport) CONTROLLING AUTHORITY NCIS units agent the I A EKMS-1E SUPP-1 Preliminary Inquiry (PI) requirement in SECNAV M5510.36 (12-8) when the CNO N09N2, DIRNSA and the local NCIS field office are included in the report. All USMC units will ensure CMC Washington is an info addee on all incident reports. For incidents involving keying material controlled by COMSC, address as an action addee. For other incidents, all MSC activities will ensure COMSC Washington is an info addee on all related message. All reserve force units and activities will include as an info addee. On all incidents involving the loss of classified material(The initial COMSEC incident report satisfies the mandatory Preliminary Inquiry(PI) requirement in SECNAV M5510.36 (12-8) when the CNO N09N2, DIRNSA and the local NCIS field office are included in the report. On all incidents involving the loss of classified material (The initial COMSEC incident report satisfies the mandatory Preliminary Inquiry (PI) requirement in SECNAV M5510.36 (12-8) when the CNO N09N2, DIRNSA and the local NCIS field office are included in the report. When keying material is involved or for physical UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY COMPACFLT PEARL HARBOR //N633// (CPF) or COMUSFLTFORCOM NORFOLK VA //N62EKMS// (USFF) A/I COGARD C4ITSC ALEXANDRIA VA//BOD-IAB// A/I HQ USPACOM J6 A/I The units Immediate Superior in Command (ISIC) I The units Operational Chain of Command Evaluating Authority (EVALAUTH) I Respective COR Audit Team I I EKMS-1E SUPP-1 incidents involving CCI loaded with key managed by the respective CA. Action for - incidents involving material controlled by CPF or USFF, as applicable. For all other incidents, PACFLT and LANTFLT surface ships will include either CPF or USFF as an info addee on incident reports. If COGARD C4ITSC is the CA and the incident involves keying material send as action. For other incidents, USCG units will include COGARD C4ITSC as an info addee. Action for incidents involving HQ USPACOM controlled material. For incidents not involving PACOM controlled material, theater policy requires all PACOM units include HQ USPACOM an info addee. If keying material is involved and the ISIC is the CA, address it “Action” to the ISIC, info the other addees. CAAS: USCG: C4ITSC; USMC: CMC; MSC: COMSC; USN (FLEET): CPF/USFF; USN (SHORE) NCMS (N5) Info addee on all FIGURE 8-2 The format for incident reporting outlined in EKMS-1(series) Article 970 is reflected herein in Figure 8-5. Do not use templates held at the account which may differ in format or UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-4 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 content. f. Related Accounting Reports. Both the loss and finding of classified COMSEC material or CCI require additional actions beyond the reporting of the matter. These scenarios will require the submission of a SF-153 Possession Report or Relief from Accountability Report to bring into accountability or remove the items which were found or are missing, respectively. KOAs will NOT originate Possession or Relief from Accountability report related to COMSEC incidents until such is authorized in the final evaluation/close-out message from NCMS. 803. ORGANIZATIONAL RESPONSIBILITIES. All COMSEC incidents are assigned case numbers and tracked in the National COMSEC Incident Reporting and Evaluation System (NCIRES). To support the NCIRES system and ensure timely reporting and evaluation of COMSEC incidents, each service has their own COMSEC Incident Monitoring Activity (CIMA). NCMS serves as the CIMA for the DON. KOAMs are responsible for submission of COMSEC incident reports within the timeframes reflected above. Controlling Authorities evaluate physical incidents for COMSEC material under their purview. The Evaluating Authority (EVALAUTH), formerly known as the Closing Action Authority (CAA), reviews the details of incidents or insecurities reported and determine if additional reporting is required. NCMS will close out incident case files following submission of required reports or supplemental data or no later than 30 days from the date of the initial or amplifying report (if directed by the EVALAUTH or other organization). 805. TYPES OF COMSEC INCIDENTS. A listing of cryptographic, personnel and physical incidents is reflected in subparagraphs a – c below. a. Cryptographic incidents. Cryptographic Incidents Use of an AKP, KP or other Key Variable Generator (KVG) beyond the recertification date Failure to perform an AKP changeover annually or more frequently Use of keying material that is compromised, expired, superseded, UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-5 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 defective, previously used (and not authorized for reuse), or incorrect application of keying material Premature or out-of-sequence use of keying material before its effective date without approval of the CONAUTH. Use, without NSA authorization, of any keying material for other than its intended purpose Unauthorized extension of NOTE: The Commanding Officer can a crypto period; this authorize the delay in change of includes use of superseded keying material for up to 2 hours key, failure to perform without Controlling Authority an AKP changeover, failure authorization when operational to reinitialize DTDs, requirements necessitate such SKLs (initialized, issued, without any external reporting or storing key) requirement. Controlling Authorities may extend crypto periods for up to 7 days for point to point circuits (KG-84, KIV-7) supported by material under their purview. In a tactical environment crypto periods may be extended for up to 30 days. Longer extensions require NSA approval. Use of COMSEC equipment or devices not approved by NSA or with defective cryptographic logic Unauthorized connection to the MGC, AKP, HAIPE, USB Flash drives or peripherals associated with the KMI client host Plain text transmission resulting from a COMSEC equipment failure or malfunction Any transmission during a failure or after an uncorrected failure that may cause improper operation of COMSEC equipment Operational use of equipment without completion of required alarm check test or after failure of required alarm check test Discussion via non-secure telecommunications of the details of a COMSEC equipment failure or malfunction Detection of malicious code, viruses, spyware or any software not approved by NSA on the MGC, CWMS or other COMSEC management device Use of a Key Encryption Key (KEK) classified lower than the Traffic Encryption Key (TEK) passed during OTAD/OTAT operations, except during a COMSEC emergency Operational use of an In-Line Network Encryptor (INE) found to not be compliant with a mandatory software upgrade by the compliance date without a waiver from NCF or DIRNSA. Over the Air Distribution (OTAD) of red (unencrypted key) via SKL with using other than a NSA-approved cable The loading of key on the SKL’s host side by means of a data/program load; key should only be loaded on the host side using “command request” Downloading classified data exceeding the highest classification of data permitted for the device in accordance with the OSD for the device. Example: Downloading TS data to the SKL UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-6 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 which is limited to Secret-high data The introduction of unencrypted (red) keymat in the CMWS/DMD PS, whether intentional or accidental The connection of the CMWS/DMD PS to an unauthorized external or internal communications device (modem or network card) or any device not specifically authorized Any other occurrence that may jeopardize the crypto security of a COMSEC system Figure 8-3 b. Personnel incidents. Personnel Incidents Known or suspected defection and/or espionage Capture by an enemy of persons who have detailed knowledge of cryptographic logic or access to keying material Unauthorized disclosure of Personal Identification Numbers (PINs) and/or or passwords used on systems, which allow access to COMSEC material/information Attempts by unauthorized persons to effect disclosure of information concerning COMSEC material or unauthorized disclosure of information related to COMSEC material Non-compliance with separation of duty/role exclusions which may compromise security or prevent timely detection of such Deliberate falsification of COMSEC records Figure 8-4 c. Physical incidents. Physical Incidents Loss or Compromise of: KMI-specific software an AKP or KP AKP keys (FF, MSK, Type 1 Private Keys) AKPREINIT 1 or 2 flash drives an AKP affiliated CIK when unauthorized use cannot be ruled out Loss of an AKP operator CIK is a locally reportable PDS when it is reported immediately to the KOAM and CPSO and a review by the CPSO of the AKP Diagnostic History Log does not reveal usage of the CIK after the loss was discovered. If no usage occurred, the KOAM must immediately delete the associated CIK split from the AKP. If detected or a determination cannot be made report as an incident. Guidance must be requested and received from NCMS prior to UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-7 UNCLASSIFIED//FOR OFFICIAL USE ONLY a KOV-29 (token) a KG-250 or FTR an operational CIK associated with a lost KG-250 EKMS-1E SUPP-1 continued use of the AKP. Requires (a) submission of a revocation request for the associated IA(I) and IA(M) certificates to the PRSN and the downloading and updating of the Certificate Revocation List (CRL) on the MGC to invalidate the certificates associated with the KOV-29 Report it to the SA and EKMS Manager to re-provision the KG-250; document locally as a PDS when re-provisioned and the CIK and KG-250 were not both lost. Classified hard drives, removable media storing classified keying material or cryptographic information (includes CDs, DVDs, floppy diskettes, flash drives, or external hard drives) PINS or passwords Change immediately, update SF-700s and associated with the address these actions in the initial MGC, AKP or tokens COMSEC incident report. Use of any KMI related tokens must be suspended pending a local investigation. If the unauthorized access or modification is detected, the IA(I) and IA(M) tokens must be deemed compromised and reported to the PRSN for the Certificate Revocation List (CRL) to be updated. Keying material, pages For KSV-21 cards: Report as an incident from classified COMSEC only if it; involves the loss of fill publications (KAMs, card or is a user card and was lost with AKACs, AKAI, etc…), the associated carry card or terminal. CCI equipment, KSV-21 If it involves a user card or TPA card cards and the terminal is not lost also, delete the card association with the NOTE: Lost includes terminal and report the loss as a individual segments, reportable PDS to obtain Authorization pages or cards (Q-kits). to generate a Relief from Accountability If charged to the to remove the item from charge to the account, the account account. For loss or compromise must have one of the involving pre-placed key (PPK), reports following; the material, must also include the applicable KMID a destruction report, a and state whether any compromised End transfer report or a User or CPSO passwords were involved, as relief from applicable. accountability report. Loss of a valid (associated) CIK when the associated equipment has not been properly stored or under the direct control of properly cleared and authorized personnel. If the device was not subject to unauthorized access document the loss as a PDS in accordance with Chapter 9. (The KOAM, SA, TA, etc… as applicable UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-8 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 must delete the CIK association from the related equipment) Other Physical Incidents Unauthorized access or This includes non-establishment of SCI access by improperly eligibility in JPAS for KOA Managers, cleared personnel Alternates and LE Issuing if the account is validated for keying material used to protect SCI/SI material. Failure to properly log off a COMSEC-related system (i.e. MGC, DMD PS) when not in use The physical loss a classified hard drive or backup media associated with a COMSEC management system (i.e. MGC, CMWS/DMD PS) The sharing of passwords or PINS associated with the MGC, CMWS/ DMD/PS, KOV-29s, etc… (except where permitted by policy) Known or suspected (1) for a KOV-29, if the cause of damage tampering or damage in is known (witnessed by 2 people), the which the cause is casing is not penetrated and the device unknown did not go into a tamper mode zeroize, document the matter as a PDS in See Note (1)for a accordance with Chapter 9 and report the KOV-29 matter locally to the CPSO; continued See Note (2)for an AKP use of the device is authorized. (2) when the cause is known and penetration did not occur and the device is not in a tampered condition, continued use must be authorized by the Commanding Officer of the KOA or NCMS. Tamper of an AKP does require submission of an incident report (See the OSD for the MGC paragraph 10.2.1.10.2 – 10.2.1.11 for additional information). unexplained zeroization For the AKP, if the cause of the of an AKP or KOV-29 zeroization is known although an incident report is still required, a field recovery of the AKP may be performed if authorized by NCMS, NSA or the Commanding Officer when immediate operational mission requirements supporting real world operations warrant such. A field recovery may not be performed when the AKP has been found zeroized and such is unexplainable. A KSV-21 (fill card) or user card if lost with its associated carry card or terminal. (For TPA cards or user cards not lost with its carry card or terminal, see the Reportable PDS section in Chapter 9). Unauthorized access or use of the AKP, HAIPE, MGC, AKPREINIT Flash Drives, Operator CIKS or AKP Diagnostic History Log (DHL) AKP or KOV-29 Audit Log When such indicates suspicious or UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-9 UNCLASSIFIED//FOR OFFICIAL USE ONLY anomalies EKMS-1E SUPP-1 unauthorized access or use to the MGC, KOV-29 or AKP. Applicable to devices which have been/are Initialized or storing key, per the requirements of the specific OSD. (See Chapter 10 herein for any stated exceptions. Where reflected, such would apply to SDSs, TKLs, etc…. Failure to conduct, document and retain proof of compliance with monthly audit trail reviews for audit capable devices such as but not limited to DTDs, To minimize auditing and annual SKLs, TKLs, re-initialization requirements, it is Talon cards, etc… highly recommended devices not required for use be returned to the account level, have the audit trail data reviewed, the device zeroized and the batteries removed. Material left unsecured This includes a GSA-approved container, vault door or door to a facility with COMSEC material stored or installed when appropriately cleared and authorized personnel are not present. Loss of TPI for; (1) This includes; physical material as well Top Secret keying as storage devices protecting such when material except as the CIK is not stored separately; leaving indicated in EKMS-1 an AKP logged; or single person access (series)Article 510.f to AKPREINIT 1 & 2 Flash Drives or where a waiver has regardless of the accounts HCI. been granted from NCMS in writing or (2) AKPREINIT 1 & 2 Flash Drives) Failure to utilize or missing Local Custody documents Improperly packaged or shipped COMSEC material, including, the shipment of CIKS/PINS/Passwords with the associated equipment. Receipt of COMSEC material in which the inner wrapper is damaged or reveals possible tampering Receipt of COMSEC Ensure prior to reporting that the material with signs of applied tamper labels are visually tamper or equipment inspected. If missing or damaged, received in an communicate this in the initial COMSEC unexplained tampered incident report. state. Material documented as This includes material erroneously destroyed and found to flagged and confirmed as destroyed still exist although not destroyed ONLY if material was not lined-out and initialed on the destruction report to indicate the material was not destroyed. Destruction of COMSEC material; by unauthorized means; improperly cleared or personnel not authorized access to COMSEC UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-10 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 material or COMSEC material not completely destroyed and left unattended or found to still exist. Undocumented removal of For physical keying material, create a COMSEC material from CMS-25 and annotate a statement to its protective explain the removal. The statement must packaging, i.e. be signed and dated by the person and a physical keying witness. Report it, when documented material or sealed properly as a reportable PDS to the CA, book packaged material. NCMS, your COR Audit Team and the Unit’s COC. If done for loading of a fill device or to issue individual segments to a LE, do not report it as a PDS (EKMS-1 (series) Article 769.g note 1 permits this) but the CMS-25 must be created and documented as described. Actual or attempted This includes both full or limited unauthorized maintenance by personnel not meeting maintenance, EKMS-5(series) Article 111 training and maintenance by documentation requirements, i.e. not unauthorized personnel trained, no DD-1435 on file with the or non-adherence to KOAM. prescribed procedures. Opening or tampering with the KOV 21 cryptographic card (embedded in the SKL) housing by other than the depot or manufacturer Loss of TEMPEST integrity as a result of not visually inspecting devices requiring such; AKP, DTD, SDS, SKL, etc… Failure to delete a lost CIK from the device it is associated with i.e. DTD, SDS, SKL The discovery of a clandestine electronic surveillance or recording device in or near a COMSEC facility Unauthorized copying, reproduction or photographing of COMSEC material Late destruction of physical COMSEC material and electronic versions of NATO keying material. Late destruction of other electronic material will be documented per Article 903.a herein. Premature or inadvertent destruction of NATO material (physical or electronic format). Premature/inadvertent destruction of nonNATO material will be documented per Article 903.a; if resupply is required, report the matter per Article 903.b and 905. Any other incident that may jeopardize the physical security of COMSEC material Figure 8-5 UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-11 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 O 301929Z JAN 17 FROM: USS SHELLBACK TO: CONAUTH INFO: DIRNSA FT GEORGE G MEADE MD (OMIT IF DIRNSA IS THE CA) CLOSING ACTION AUTHORITY ADMINISTRATIVE CHAIN OF COMMAND COMNAVIFOR VIRGINIA BEACH VA NCMS WASHINGTON DC SERVICING COR AUDIT TEAM BT C O N F I D E N T I A L MSGID/GENADMIN/USS SHELLBACK/-/JAN// SUBJ/INITIAL REPORT OF COMSEC INCIDENT// REF/A/NCMS WASH DC/-/05APR2017// AMPN/REF A IS EKMS-1(SERIES)// POC/UNDERWAY, I B/LTJG/USS SHELLBACK/TEL:315-243-2247/EMAIL: IBUNDERWAY(AT)DDG91.NAVY.SMIL.MIL// RMKS/IAW REF A, THE FOLLOWING IS PROVIDED: 1. 427856/TS 2. USKAT 4389 EDITION F REG 1, SECRET, COMUSFLTFORCOM 3. RADIO WATCH SUPERVISOR, TS RADIO WATCH STANDER, TS 4. DURING A ROUTINE SPOT CHECK OF THE LE, IT WAS DISCOVERED THAT ONE OF THE TWO PERSONNEL IDENTIFIED IN PARA (3) HAD DEPARTED THE SPACE HOWEVER, IT WAS DISCOVERED THAT THE SECURITY CONTAINER IN WHICH THE MATERIAL IS STORED WAS SHUT BUT NOT PROPERLY LOCKED (BY SPINNING THE DIAL) AND VERIFIED PRIOR TO SIGNING THE SF-702 AND DEPARTING THE SPACE. ACCORDING TO THE SF-702 AND STATEMENTS OBTAINED FROM BOTH PERSONNEL, A SINGLE PERSON HAD ACCESS TO THE CONTAINER AND STORED MATERIAL FOR APPROXIMATELY 10 MINUTES. THE CONTAINER IS LOCATED IN A RESTRICTED AREA WHERE ACCESS IS CONTROLLED THROUGH A CIPHER LOCK (WHEN MANNED), AN ACCESS LIST AND VISITORS LOG. A COMPLETE INVENTORY WAS TAKEN AND ALL MATERIAL ACCOUNTED FOR AND IN-TACT. ONLY THE CURRENTLY EFFECTIVE SEGMENT OF THE ITEMS DESCRIBED IN PARA (2) ABOVE HAVE BEEN REMOVED FROM THEIR PROTECTIVE PACKAGING (CANISTER) FOR ROUTINE USE. 5. PHYSICAL INCIDENT (MATERIAL DISCOVERED OUTSIDE REQUIRED ACCOUNTABILITY OR PHYSICAL CONTROL) 6. COMPLETE INVENTORY TAKEN WITH NO DISCREPANCIES. 7. LOCAL COMMAND INQUIRY IN PROGRESS AND TRAINING WILL BE PROVIDED TO ALL LE PERSONNEL TO REITERATE THE NEED TO ENSURE PROPER SECURITY PROCEDURES NOT ONLY EXIST BUT ARE FOLLOWED AT ALL TIMES. FIGURE 8-6 THIS PAGE IS UNCLASSIFIED BUT MARKED “CONFIDENTIAL” FOR TRAINING PURPOSES ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-12 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 8. N/A 9. NO SF-153 (RELIEF FROM ACCOUNTABILITY OR POSSESSION REPORT) REQUIRED. 10. SAME AS POC ABOVE 11. A. 07 JUL 2013 B. 13 SEP 2013 DERIVED FROM: NSTISSI 4002// DECL/3 YEARS FROM THE DTG OF THE MESSAGE// NOTE: See EKMS-1(series) Article 970 for additional information, if necessary. FIGURE 8-6 THIS PAGE IS UNCLASSIFIED BUT MARKED “CONFIDENTIAL” FOR TRAINING PURPOSES ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-13 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 807. COMSEC INCIDENT EVALUATION. The Evaluating Authority (EVALAUTH) formerly known as the Closing Action Authority (CAA) reviews details of incidents or insecurities reported by the commands and activities for which he/she is responsible and determines the need for further actions and reporting. a. Assessing Compromise Probability: COMSEC incidents are evaluated using one of the following terms: (1) COMPROMISE: The material was irretrievably lost or available information clearly proves that the material was made available to an unauthorized person. (2) NO COMPROMISE: Available information clearly proves that the material was not made available to an unauthorized person. b. Compromise Probability Examples. Compromise probability assessment is often a subjective process, even for experienced evaluators who possess all pertinent facts concerning a COMSEC incident. To assist in assessing compromise probability, the following guidance is provided for the most commonly encountered or reported incidents: (1) Lost keying material, including keying material believed to have been destroyed without documentation, and material that is temporarily out of control (i.e. believed lost but later recovered under circumstances where continuous secure handling cannot be assured or was found in an unauthorized location): Assess as COMPROMISE. (2) Unauthorized access: If the person had the capability and opportunity to gain detailed knowledge of, or to alter information or material: Assess as COMPROMISE. If the person was under escort or under the observation of a person authorized access, or if physical controls were sufficient to prevent the person from obtaining detailed knowledge of information or material, or from altering it: Assess as NO COMPROMISE. (3) Unauthorized absence: For personnel who have access to keying material: Assess as NO COMPROMISE, unless there is evidence of theft, loss of keying material, or defection. UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-14 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 NOTE: When a person having access to keying material is reported as unauthorized absence, all material he/she could have accessed must be inventoried. If there is evidence of theft or loss of keying material, or defection of personnel, the must be considered COMPROMISED. Ensure combinations to any containers the person had knowledge of are changed. c. Additional information. – 980, if necessary. See EKMS-1(series) articles 970 UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-15 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 SAMPLE EVALUATING AUTHORITY MESSAGE FROM: (EVALAUTH) TO: (VIOLATING COMMAND) BT UNCLASSIFIED FOUO MSGID/GENADMIN/NCMS WASHINGTON DC/-// SUBJ/CLOSE-OUT OF COMSEC INCIDENT CA358156 - N302-13// REF/A/GENADMIN/USS SHELLBACK/141829ZZAPR13// REF/B/GENADMIN/DIRNSA/071157ZMAY13// REF/C/DOC/NCMS WASH DC/05APR2010/-// NARR/REF A IS USS SHELLBACK INITIAL REPORT OF COMSEC INCIDENT. REF B IS DIRNSA FINAL EVALUATION OF REF A. REF C IS EKMS1(SERIES).// POC/U.B. UNDERWAY/IA03/N5/NCMS WASHINGTON DC/TEL:240-857-7704 /EMAIL:ULYSSES.UNDERWAY@NAVY.MIL// POC/C.U. LATER/IA03/N5/NCMS WASHINGTON DC/TEL:240-857-7708 /EMAIL:CLARENCE.LATER@NAVY.MIL// RMKS/1. CONCUR WITH FINAL EVALUATION OF NO COMPROMISE. (REF B GERMANE) 2. ENSURE MEASURES ARE PUT IN PLACE TO MINIMIZE THE POTENTIAL FOR A REOCCURRENCE. 3. UNLESS ADDITIONAL INFORMATION BECOMES AVAILABLE WHICH COULD CHANGE THIS ASSESSMENT, THIS CASE IS NOW CLOSED. 4. RETAIN THIS MESSAGE AND RELATED REFERENCE DOCUMENTS IN YOUR CORRESPONDENCE FILE IAW REF C.// BT Figure 8-7 UNCLASSIFIED//FOR OFFICIAL USE ONLY 8-16 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 CHAPTER 9 – PRACTICES DANGEROUS TO SECURITY (PDSs) 901. GENERAL. Practices Dangerous to Security (PDSs) are practices that although not reportable at the National level indicate deviation from prescribed policy and could indicate a need for assistance, a review of internal practices or additional training to reduce the potential or prevent COMSEC incidents. a. Types of PDSs. PDSs are broken down into two categoriesNon-Reportable and Reportable; however, all PDSs are reportable at a minimum to the Commanding Officer of the account. b. PDS Documentation. 1. Non-reportable PDSs will be documented via official memorandum or communicated via official, digitally signed email. 2. Reportable PDSs will be submitted via official message and must be classified at a minimum of Confidential to promote consistency with COMSEC Incident reports and prevent potential spillage. Regardless of method communicated, records of both nonreportable and reportable PDSs will be maintained on file at the account level in accordance with EKMS-1(series) Annex T. Any PDS discovered during an audit not documented and reported as required, will be documented in the results and the respective CO will be briefed on the findings. c. Reporting Time Frames. Reportable PDSs will be reported as indicated in accordance with Article 905 below. 903. a. PDSs BY CATEGORY. Non-reportable PDSs Improperly completed accounting reports; unauthorized or missing signatures, incomplete short title information Physical material transferred with status markings applied to the material Mailing, faxing (via non-secure fax) or emailing as attachments SF-153s which contains status information or used/completed CMS-25s. NOTE: If sent via email, a report of spillage and Preliminary Inquiry (PI) is mandatory in accordance with SECNAV UNCLASSIFIED//FOR OFFICIAL USE ONLY 9-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 M5510.36 Art 12-4 and Naval Technical Directive (NTD) 11-08. COMSEC material not listed on local element (LE) or user inventory when documentation exists at the account level to indicate the material is issued to the LE or user, as applicable. Issuance of red (unencrypted) keying material in hardcopy form marked/designated CRYPTO, without authorization, more than 30 days before its effective period Removal of keying material from its protective packaging prior to issue for use or removing the protective packaging without authorization, as long as the removal was documented on the CMS25 and there was no reason to suspect espionage. NOTE: See EKMS-1(series) Article 769.g note 1 for exceptions where premature extraction is not deemed a PDS. If NATO material is involved and the extraction was not conducted and documented per Article 769.g.1 to EKMS-1(series), report as an incident per SDIP-293. Receipt of a package with a damaged outer wrapper, but an intact inner wrapper Late destruction of non-NATO electronic key Premature/inadvertent destruction of non-NATO key [if resupply is required report the matter per 903.b below; the destruction report must also be submitted to the COR for resupply to occur] Activation of the anti-tamper mechanism on or unexplained zeroization of COMSEC equipment as long as no other indications of unauthorized access or penetration was present Failure to maintain OTAD/OTAR/OTAT logs Failure to perform an AKP Rekey at a minimum of annually Failure to change passwords or PINS every 90 days or update corresponding SF-700s [or at first login thereafter for KOV-29 used at accounts with different crews (gold, blue, etc.. submarine community) Failure of the KOAM or Alternate to review and document the review of the MGC Transaction Status Log (TSL) weekly Failure to download, review and record KOV-29 audit log reviews at a minimum of every 90 days. Failure to perform MGC backups at a minimum of weekly, when the transaction status changes or more frequently, as required. Failure to archive KOA accounting data, every six months, retain a copy of the archive media for (4) years or submit a copy of the archived data to the CSN within 30 days or archiving The discovery of non-COMSEC accountable material in the Product Inventory The discovery of client images or backups older than the latest set/version UNCLASSIFIED//FOR OFFICIAL USE ONLY 9-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Loss of a valid (associated) user CIK when the associated device was not subject to unauthorized access. Document as a PDS in accordance with this chapter. NOTE: The KOAM, SA, TA, etc… as applicable must delete the CIK association from the device. The loss or finding of unclassified material not marked or designated crypto or CCI Discovery of a damaged KOV-29 when the cause is known (witnessed by 2 people) and the casing has not been penetrated. Failure to report receipt of COMSEC material or corrupt Bulk Encrypted Transactions (BETs) within 3 business days of receipt or download, as applicable Failure to conduct, document and retain semi-annual selfassessments or spot checks Non-submission by the CPSO of an exact copy of archived audit data to the Central Service Node within 30 days of the archive Failure to create and retain two (2) AKP operationally affiliated CIKs (One primary, one backup) Personnel performing the role of the CPA or CPSO who are not IAT Level 1 or higher certified within 180 days of appointment; if the DAA/AO has granted a waiver, it must be not be older than 6 months from the time of appointment Failure of the TSO to regularly inspect and document inspections of active tokens Failure of the KOAM to inspect tamper-evident bags if used in lieu of a TPI container daily or upon next opening of the security. Failure of the CPSO to verify the MGC BIOS password in conjunction with audit data archives Failure of the CPSO to export the AKP Diagnostic History Log to the MGC every six (6) months Failure to inventory affiliated DTD, SKL, and TKL CIKs during account inventories Discovery of a software design device in a benign tampered condition due to battery depletion. If received in a tampered condition or signs of tamper exists, report per Article 805. CIK failure (example KIV-7M, KG-250, etc…) if discovered, the host device must be reinitialized and loaded with new keying material. Loss of User CIKS for INEs or devices which make use of CIKS. The CIK or card association, as applicable must be deleted promptly from the device. If the associated device is lost or was possibly accessible to unauthorized/improperly cleared personnel report the matter as a COMSEC incident. Figure 9-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY 9-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY b. EKMS-1E SUPP-1 Reportable PDSs Restoration of the MGC database using backup media and AKPREINIT drives older than 7 calendar days old Failure to rekey IA(I) and IA(M) certificates NOTE: Newly appointed KOAMs should perform a rekey upon assumption of account management duties. Should a rekey not be performed, the AKP will be non-operational and may adversely affect mission readiness. Inadvertent destruction of non-NATO material when resupply is required. Loss of a KSV-21 TPA or user card (when the terminal or carry card is not also lost and the association with the terminal has been deleted by the KOAM or TPA, as applicable). For TPA cards, the KOAM or TPA must re-establish a new TPA card for the affected STEs at the earliest possible opportunity. Discovery of a MGC which has been tampered, damaged, accessed by unauthorized personnel or if the case intrusion alarm is displayed during boot up. (See Note below) The inadvertent introduction of Top Secret data in the MGC. Unauthorized adjustment or modification to MGC security settings. NOTE: See of the MGC OSD for additional guidance. The OSD can be found in the NSA IA Library at the URL in Annex F. Figure 9-2 905. PDS REPORTING. PDSs will be documented (locally) or reported externally, as applicable no later than 72 hours from the time of discovery. 907. PDS DOCUMENTATION (SAMPLE). A template for both a non-reportable and reportable PDS can be found in Figures 9-3 and 9-4, as applicable. UNCLASSIFIED//FOR OFFICIAL USE ONLY 9-4 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 SAMPLE NON-REPORTABLE PDS MEMORANDUM 03 Apr 2016 MEMORANDUM From: To: Via: KOA Manager (or Alternate) USS Blue Horse Commanding Officer, USS Blue Horse (as applicable with command administrative procedures) Ref: (a) (b) EKMS-1(series) Supp-1 dated XXXXXXX JCMO quarterly status message DTG XXXXXXXXXXXXX Encl: (1) SF-702 for XXXXXXXXXXX security container Subj: DOCUMENTATION OF THE DISCOVERY OF A NON-REPORTABLE PDS 1. On 02 April 2016 during the conduct of required monthly audit trail reviews, it was discovered that XXXXXXXXXXXXXX (name of LE) failed to destroy superseded keying material within the time frame set forth in reference (a). 2. The late destruction was confirmed through a review of the audit trail data, reference (b) and enclosure (1). Specifically the material destroyed late has a daily crypto period and enclosure (1) reveals the container was opened on 23 Mar 2016, but segment 22 was not destroyed until the next documented opening on 25 Mar 20162. 3. Training was conducted with work center personnel to emphasize that in a non-watch environment if the container is opened that both and inventory and destruction of superseded material is required and to address the proper time frames for carrying out destruction of superseded material to prevent potential use and reporting of such as a cryptographic incident. Very Respectfully I. B. INTROUBLE Copy to: Account XXXXXX PDS/Incident File XXXXXXXXXXX (LE/work center) UNCLASSIFIED//FOR OFFICIAL USE ONLY 9-5 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 FIGURE 9-3 THIS PAGE IS UNCLASSIFIED BUT MARKED “CONFIDENTIAL” FOR TRAINING PURPOSES ONLY SAMPLE REPORTABLE PDS MESSAGE P FROM: TO: INFO: XXXXXXZ XXX XX (DATE TIME GROUP) XXXXXXX (PLA OF THE UNIT REPORTING THE PDS) NCMS OR THE CONTROLLING AUTHORITY (AS APPLICABLE) NCMS (ONLY IF KEYING MATERIAL IS INVOLVED AND THE MESSAGE IS SENT ACTION TO THE CA) UNITS ISIC SERVICING COR AUDIT TEAM BT C O N F I D E N T I A L //N02280// MSGID/GENADMIN/UNIT NAME/-/MON// SUBJ/REPORTABLE PRACTICE DANGEROUS TO SECURITY (PDS) (U)// REF/A/DOC/NCMS/-/XXXXXXX (THE DATE OF THIS MANUAL) REF/B/GENADMIN/CPF/031429ZMAR13// REF/C/PHONECON/USS BLUE FISH/CPF/01APR13// NARR/REF A IS EKMS-1B SUPP-1. REF B IS ALCOMPAC P XXX/XX. REF C IS PHONECON TO CPF.// POC/NILLIE, W. R./LTJG/USS BLUE FISH/TEL:240-857-4118/EMAIL: WILLIE.NILLIE@BLUE-FISH.NAVY.SMIL.MIL// RMKS/1. (C) FOLLOWING ROUTINE TROUBLESHOOTING OF A CIRCUIT OUTAGE, IT WAS DISCOVERED THAT ON 01 APR 2012, LE PERSONNEL HAD PREMATURELY LOADED SEGMENT 6 OF USKAT XXXXXX EDITION G. 2. (C) IAW REF B, SEGMENT 6 IS NOT EFFECTIVE UNTIL 080001Z APR 12. FURTHER REVIEW INDICATED THAT LE PERSONNEL DID NOT CONSULT THE COPY OF REF (B) PROVIDED TO THE WORKCENTER AND PREMATURELY DESTROYED SEGMENT 5 LEADING TO THE PREMATURE USAGE OF SEGMENT 6 FOLLOWING A CIRCUIT OUTAGE. 3. (C) FOR CPF, AS DISCUSSED ORIGINATOR HAS CONTACTED USS GREY TUNA TO OBTAIN SEGMENT 5 OF USKAT XXXXXXX EDITION G VIA OTAT TO RESTORE CIRCUIT OUTAGE. 4. (U) PERSONNEL INVOLVED WILL BE COUNSELED IN WRITING AND RETRAINED ON PROPER USE OF STATUS INFORMATION IN HANDLING COMSEC MATERIAL. DERIVED FROM/EKMS-1(SERIES) SUPP-1// DECL/02 APRIL 2015// Figure 9-4 THIS PAGE IS UNCLASSIFIED BUT MARKED “CONFIDENTIAL” FOR TRAINING PURPOSES ONLY UNCLASSIFIED//FOR OFFICIAL USE ONLY 9-6 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 CHAPTER 10 - ELECTRONIC STORAGE DEVICES 1001. GENERAL. This annex provides basic guidance related to some electronic storage devices (ESD) used within the DON. Where used herein, the term ESD primarily pertains to the AN/PYQ-10 Simple Key Loader (SKL) and the KIK-11/Tactical Key Loader (TKL). Users of Controlled Cryptographic Items (CCI) should always consult the Cryptographic Operating Manual (KAO) or Operational Security Doctrine (OSD) for the device. When a conflict exists, KAOs and OSDs have precedent over general policy manuals at the service or National level. 1003. SOFTWARE MANAGEMENT. a. Only software tested and validated by the ISEA, authorized via message from NCMS, and obtained from the INFOSEC web site is authorized for installation on COMSEC equipment within the DON. b. Records must be maintained to reflect the User Application Software (UAS) on each ESD held by the account and will reflect at a minimum the device nomenclature, serial number and the UAS installed. A single spread sheet can be used for this purpose but must be updated upon receipt of a new device or replacement of a failed unit. c. When disposition replaced by comply with the device. 1005. a device is turned in to the CRF for repair/return or instructions are received for a failed unit which is another device, the software must be verified to any mandatory software-upgrades directed relevant to CLASSIFICATION, ACCOUNTABILITY, SAFEGUARDING AND ACCESS. a. Electronic Storage Devices are unclassified CCI when the CIK has been removed; the device and CIK are not stored together and the host side of the device does not contain classified data. b. When the CIK inserted or stored together, the device both must be safeguarded based on the highest classification of unencrypted key or data, the higher of the two that can be accessed or output. c. ESDs are generally ALC-1, CMCS accountable; associated CIKS UNCLASSIFIED//FOR OFFICIAL USE ONLY 10-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 are locally accountable at the unit level (not in the MGC). d. Unrestricted access to a SKL, TKL or CIK associated with either containing keying material requires a clearance equal to or higher than the keying material or data, the higher of the two and written authorization for access to COMSEC material. e. Unrestricted access to the SSO password must be restricted to authorized personnel designating in writing and authorized privileged access to the device by the CO, if personnel other than the COMSEC Account Manager, Alternate or LE Issuing require such access. This authorization may be in the form of an individual designation letter or be reflected on the access list for the space in which the individual is assigned to. f. Loss of a CIK or device must be reported in accordance with Chapters 8 or 9 herein. 1007. TYPES OF KEYING MATERIAL RELATED TO ELECTRONIC STORAGE DEVICES. a. Storage Key Encryption Key (SKEK) and LKEK/HDPK both have a one-year crypto period from the date the device was initialized or the splits filled, as applicable from the MGC/AKP. b. Devices which are initialized must be reinitialized annually. c. Failure to reinitialize devices which have been initialized and not zeroized and removed from service must be reported as a COMSEC incident in accordance with Chapter 8. This does not apply to devices issued to school houses or COR Audit Teams as no operational key is issued to or held by these entities. d. Transfer Key Encryption Key (TrKEK). TrKEK is used to encrypt and decrypt key filled in the device and must be equal to or higher in classification than the key it protects. 1. TrKEK is restricted to a maximum of one year crypto period which should be the exception and not used simply for convenience purposes. The typical prescribed crypto period for TrKEK is one-year. 2. TrKEK may not be distributed via DTD or SKL to STE UNCLASSIFIED//FOR OFFICIAL USE ONLY 10-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 OTAD, except in an emergency. TrKeK must be preplaced in a receiving DTD or SKL and up to one year’s worth may be preplaced. e. SKEK, LKEK/HDPK or TrKEK are classified based on the highest classification of key or data stored in the device, the higher of the two. f. There is no ALC or accountability requirement for SKEK or LKEK/HDPK created manually when an ESD is initialized. g. When produced using the MGC/AKP, SKEK, LKEK/HDPK or TrKEK will be restricted to ALC-7 material and accounted for locally. 1009. LOADING KEYING MATERIAL INTO AN ELECTRONIC STORAGE DEVICE. a. The amount of key must always be limited to that required to support mission requirements consistent with limitations imposed by the respective CONAUTH and/or OSD. b. Unless operationally required to output key in unencrypted (red) form, all key output from the AKP will be in encrypted (black) form. c. Resupply to LEs operating away from the parent account may be facilitated through the use of a STE and OTAD, provided the STE’s security classification is equal to or higher in classification than the key being passed. d. The use of a STE with either a DTD or SKL for OTAD purposes requires the use of an NSA-approved adaptor/connector to connect the device to the STE data port for the purpose of distributing keying material via OTAD. Use of any other cable not approved by NSA must be reported as a COMSEC incident. e. All electronic key held at the account level will be issued from the MGC/AKP adhering to local custody procedures. f. For keying material held at the account or LE Issuing level that is not held in electronic form, the following guidance will be adhered to: 1. Premature extraction of key is permitted for loading and issuance in support of operational requirements and is not considered a PDS in these situations. UNCLASSIFIED//FOR OFFICIAL USE ONLY 10-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 2. Extracted segments of keying material not available in electronic form will be resealed in accordance with EKMS1(series) Article 772. 3. The extraction will be documented on a CMS-25 with a separate CMS-25 used, if more than one Short Title/Edition is extracted from. The discovery of extracted keying material not resealed and documented on the corresponding CMS-25 is a COMSEC incident and must be reported in accordance with Chapter 8. 4. Premature extraction done inadvertently not to support an operational requirement as discussed above is a nonreportable PDS in accordance with Chapter 9 if documented on the CMS-25 as discussed below. If discovered and such was not documented as discussed above, it must be reported in accordance with Chapter 8. 5. A manual SF-153 will be used to return the device (if previously issued from the MGC) and will reflect; the Short Title, Edition, Serial Number and ALC of the material issued and will be signed and witnessed by appropriately cleared and authorized personnel. 1011. VISUAL INSPECTION REQUIREMENTS. a. ESDs are TEMPEST certified and must be visually inspected per the OSD at the account or LE level when keying material is stored in the device. b. In a non-watch environment, a security container does not have to be opened for the sole purpose of conducting a visual inspection of a DTD or SKL. If the container is opened, an inventory of material held will be conducted, destruction of superseded key carried out and the device(s) will be visually inspected. The SF-702 for the container will be compared to the visual inspection log to ensure compliance with the policy. c. Any device cracked or damaged will be turned in to the supporting KOAM and will not be further used. The KOAM will issue a replacement device and request disposition instructions from NCMS for the damaged device. 1013. DESTRUCTION OF ELECTRONIC KEYING MATERIAL. a. Will occur within the same time frame set forth in Article 709 herein. UNCLASSIFIED//FOR OFFICIAL USE ONLY 10-4 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 b. Destruction will be witnessed and verified by a properly cleared and trained person who is authorized access in writing to COMSEC material. c. With exception to when an edition of keying material supersedes and such material is reflected on a working copy of a destruction report provided by the KOAM for verification, signature and return to the KOAM, there is no requirement to document destruction of key in an electronic storage device with auditing capability (DTD, SKL, TKL); the audit trail provides for verification the superseded key was destroyed. d. Because multiple personnel have access to electronic storage devices at the work center level coupled with the fact that in a work center where shift-work is conducted password sharing for the SKL is permitted, it is recommended that commands consider requiring the use of CMS-25s for the destruction of electronic key. This promotes accountability to the individuals responsible for the destruction if discovered to have been conducted late or the material found to still exist and was reflected on the LE’s end of the month destruction report which is a COMSEC incident in accordance with Chapter 8. 1015. TRANSPORTATION AND SHIPMENT. Will be in accordance with EKMS-1(series) Articles 525 – 535 for additional information. 1017. AUDIT TRAIL REVIEW REQUIREMENTS. a. KOAMs, Alternates or other personnel designated in writing by the unit’s CO/OIC as a Supervisory User or SSO, as applicable are required to conduct audit trail reviews at a minimum of semiannually or more frequently per the OSD for the device if it has auditing capability. b. Audit trail reviews will not be conducted by a primary user of the device nor will such person be designated as a Supervisory User or SSO, as applicable. c. Audit trail reviews are NOT required for devices that are not initialized or in use. To exempt devices from auditing and annual reinitialization requirements, when turned in or no longer required, zeroize the device, upload and review the audit trail data, log the review and remove the batteries from the device. UNCLASSIFIED//FOR OFFICIAL USE ONLY 10-5 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 d. Audit trail reviews are not required for devices issued to COR Audit Teams, School Houses or other similar environments where no classified or operational keying material is used. e. It is HIGHLY recommended audit trail reviews be conducted NLT the 5th day of the month following the month in which the material was issued to ensure it is: (a) destroyed within the proper time frame; (b) not found to still exist after documenting it as destroyed. The latter requires submission of a COMSEC incident report. f. Each account must create, maintain and retain Audit Trail review logs for a minimum of two years. Minimum auditable events can be found in the OSD for the device. 1019. ELECTRONIC STORAGE DEVICE INTERFACE FLOWS Applicable security precautions, restrictions and guidance related to USB port usage or approved connections to electronic storage devices can be found in the OSD for the device. . 1021. EMERGENCY DESTRUCTION a. Follow the provisions of Annex G for emergency action or emergency destruction. Should emergency destruction be implemented, zeroize the device and smash it with fire ax, hammer, or other heavy object. b. To reduce risk or more stringent security requirements commands must remember to issue the minimum amount of key required to carry out assigned missions and never in amounts greater than authorized by this publication or the Operational Security Doctrine for the device, the more stringent of the two. 1023. REPAIR & MAINTENANCE a. Users or other authorized personnel may perform only limited maintenance and such is restricted to keypad and battery replacement. Personnel replacing these parts are not required to be Qualified Maintenance Technicians. b. Apply silicone gel to the SKL fill ports to minimize damage to the fill ports. The gel is available via supply channels under the National Stock Number (NSN) 6850-00-177-5094. Ensure compliance with applicable safety procedures including the Material Safety Data Sheet (MSDS) in handling, using or UNCLASSIFIED//FOR OFFICIAL USE ONLY 10-6 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 storing the product. c. Local maintenance of ESDs is not authorized at the unit level. d. Ensure failed devices are zeroized. If they cannot be zeroized, protect the device based upon the highest level of keying material or data stored at time of failure. e. Do not report devices which are become broken during normal use in which the source of the damage is not suspicious and the device has not accessible to unauthorized personnel. Remove the device from use, and report the matter to the supporting COMSEC Account Manager. f. Failed devices or devices received which are defective must be retained, accounted for and safeguarding pending disposition instructions from NCMS which the unit is responsible for requesting. UNCLASSIFIED//FOR OFFICIAL USE ONLY 10-7 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Annex A ACRONYMS The following acronyms are used within this document: AKP ALC AO ASWR BF CONAUTH CBT CCI CD CF CHO CID CIK CMCS CMD Auth CMIO CNO CNSSI COMSEC COI COR COTS CPA CPSO CRF CRL CSN CTO DCS DIRNSA DLT1RA DN DOC DON DRM DTD DVD EA ECU Advanced Key Processor Accountability Legend Code Authorizing Official Attack, Sensing, Warning and Response Benign Fill Controlling Authority Computer Based Training Controlled Cryptographic Item Compact Disc Central Facility Client Host Only Center for Information Dominance Crypto-Ignition Key COMSEC Material Control System Command Authority COMSEC Material Issuing Office Chief of Naval Operations Committee on National Security Systems Instruction Communications Security Course of Instruction Central Office of Record Commercial Off-the-Shelf Client Platform Administrator Client Platform Security Officer Central Repair Facility Certificate Revocation List Central Service Node Computer Task Order Defense Courier Service Director, National Security Agency Device Local Type 1 Registration Authority Distinguished Name Delivery Only Client Department of the Navy Device Registration Manager Data Transfer Device Digital Video Disc Eligibility Authority End Cryptographic Unit UNCLASSIFIED//FOR OFFICIAL USE ONLY A-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS EM EPL FF FMS HCI HMI FOUO HCI IA IA(I) IA(M) IAM IAO IAW ISSM ISSO ICP ICD INFOSEC ISIC JCCB JWICS KEK KEKL KME KMI KMID KOAA KOAM KOARM KVM LCM LE MGC MSK NCMS NSA NSTISSI OMM OOB OpPAC OS OSD OTNK EKMS-1E SUPP-1 Electronic Key Management System Enrollment Manager Evaluated Products List FIREFLY Foreign Military Sales Highest Classification Indicator Human Machine Interface For Official Use Only Highest Classification Indicator Information Assurance Identification & Authentication (Infrastructure) Identification & Authentication (Mission) Information Assurance Manger Information Assurance Officer In Accordance With Information System Security Manager Information System Security Officer Inventory Control Point Intelligence Community Directive Information Systems Security Immediate Superior in Command Joint Configuration Control Board Joint Worldwide Intelligence System Key Encryption Key Local Key Encryption Key Key Management Entities Key Management Infrastructure Key Management Identification Number KMI Operating Account Agent KOA Manager KMI Operating Account Registration Manager Keyboard/Video/Mouse Legacy Catalog Manager Local Element Management Client Message Signature Key Naval Communications Security Material System National Security Agency National Security Telecommunications and Information Systems Security Operations and Maintenance Manual Out Of Band Operational Positive Access Control Operating System Operational Security Doctrine Over the Network Key UNCLASSIFIED//FOR OFFICIAL USE ONLY A-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY PAL PCMCIA PDE PDS PIN PKI PLT1RA PR PRM PRSN PSN RM ROB SCMSRO SDDC SERVAUTH SKL SO SOVT SSO TEK TestPAC TKL TLS TPI TrKEK TSO USB USNDA VDLS EKMS-1E SUPP-1 Product Activity List Personal Computer Memory Card International Assoc Product Delivery Enclave Practice Dangerous to Security Personal Identification Number Public Key Infrastructure Personnel Local Type 1 Registration Authority Product Requester Personnel Registration Manager Primary Service Node Product Source Node Registration Manager Reserve-on-board Staff CMS Responsibility Officer Surface Deployment and Distribution Command Service Authority Simple Key Loader Security Officer System Operational Verification Test Special Security Officer Transmission Encryption Key Test Positive Access Control Tactical Key Loader Transport Layer Service Two-Person Integrity Transfer Key Encryption Key Token Security Officer Universal Serial Bus United States National Distribution Authority Vault Distribution Logistics System UNCLASSIFIED//FOR OFFICIAL USE ONLY A-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Annex B DEFINITIONS This glossary lists the terms for which this volume has definition statements. Access. The ability and means to communicate with or otherwise interact with a system’s resources in order to either handle data held by the system or control system components and their functions. Access Control. A service that protects against unauthorized access to system resources including protecting against use of a system resource in an unauthorized manner. Advanced Key Processor (AKP). A Type-1 cryptographic device that performs all cryptographic functions for a Management Client Node and provides the interfaces necessary to exchange information with a Client Platform, interact with fill devices, and connect a Client Platform securely to the PRSN. Attribute Certificate. A digital certificate that binds a set of descriptive data items other than a public key such as authorizations for an Access Control process either directly to a subject name or to the identifier of another public-key certificate. Authentication Material. A unit of information that a registered user employs to prove a claimed User Identity when accessing the system. Client Node. A type of node that enables Human Users to perform KMI functions by accessing KMI products and services offered by a PRSN across a communication network, invoking functions performed locally by the Client Node, or both. Central Services Node (CSN). The CSN is the Key Management Infrastructure core node that provides centralized Security and Data Management services. Component. A set of system resources that (1) forms a physical or logical part of the system, (2) has specified functions and interfaces, and (3) is treated, by policies or requirement statements, as existing independently of other parts. UNCLASSIFIED//FOR OFFICIAL USE ONLY B-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Computer Host. A combination of computer hardware and an operating system (consisting of software, firmware, or both) for that hardware which supports automated KMI functions. Controlling Authority (CONAUTH). Official responsible for directing the operation of a cryptonet and for managing the operational use and control of keying material assigned to the cryptonet. Controlled Cryptographic Item (CCI). A secure telecommunications or information handling equipment, or associated cryptographic component that is unclassified but governed by a special set of control requirements. Such items are marked "CONTROLLED CRYPTOGRAPHIC ITEM" or, where space is limited, "CCI". Credential. Information passed from one entity to another to establish the sending entity’s access rights. Crypto-Ignition Key (CIK). Device or electronic key used enable secure operations of crypto-equipment. Device Local Type 1 Registration Authority. The Management Role responsible for endorsing user devices and for requesting infrastructure Identification and Authentication credentials for the user devices. Device Registration Manager. The Management Role responsible for performing activities related to registering users that are devices. End Cryptographic Unit (ECU). A device that performs cryptographic functions, may be part of a larger system for which the device provides security services and from a security perspective, is the lowest identifiable component with which a management transaction can be conducted. Enrollment. The KMI process that assigns a User Identity to a Management Role. Evaluating Authority. The official responsible for evaluating a reported COMSEC incident for the possibility of compromise. Formerly known as the Closing Action Authority. Fill Device. A COMSEC device used to transfer, store or load key into crypto-equipment. UNCLASSIFIED//FOR OFFICIAL USE ONLY B-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY Fill Group. EKMS-1E SUPP-1 A named set of User Devices owned by a single KOA. FIREFLY. Key management protocol based on public key cryptography. Global Identity. A User Identity for which the Identity Registration Data is maintained in a database at the PRSN level for recognition across the KMI. Group Identity. A User Identity that is registered for a User Set for which the KMI does not maintain a record of the members of the set. Hardware Token. A type of ECU that serves as a Human User’s individual cryptographic device to carry that person’s authentication material and any associated Identifier Credentials or other keying material. Highest Classification Indicator (HCI). Used to determine the highest classification of COMSEC material that an account may hold. Human User. A human being that is registered to be a user. Identifier Credential. A data object that is a portable, secure representation of the association between a User Identifier and some Authentication Material which can be presented for use in proving a claimed identity to which that User Identifier has been assigned. Identifier Registration Data. A subset of the User Registration Data that describes a specific User Identifier. Identifier Registration State. A KMI-Unique User Identifier that has been registered and is authorized for accessing the KMI. The difference between an Active State and Inactive State is simply that to be Active, the registered entity must be authorized. Identity Registration Data. A subset of the User Registration Data that describes a specific User Identity. Identity Registration State. A User Identity that has been registered and authorized for accessing the KMI. The difference between an Active State and Inactive State is simply that to be Active, the registered entity must be authorized. UNCLASSIFIED//FOR OFFICIAL USE ONLY B-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Key-Encryption-Key (KEK). Key that encrypts or decrypts other key for transmission or storage. Key Management Infrastructure (KMI). All parts—computer hardware, firmware, software, and other equipment and its documentation; facilities that house the equipment and related functions; and companion standards, policies, procedures, and doctrine—that form the system that manages and supports the ordering and delivery of cryptographic material and related information products and services to users. KMI-Aware Device. A User Device that can receive and use products that are wrapped for it for which a Global Device Identity has been registered so that a product can be generated and wrapped by a PSN for distribution to that specific User Device for use in that identity. KMI Operating Account (KOA). A KMI business relationship established to manage the set User Devices that are under the control of a specific KMI customer organization and to control the distribution of KMI products to those devices. This was previously referred to as either an EKMS or COMSEC account. KMI-Unique User Identifier. A User Identifier that can be used to access the KMI, takes a form specified in the KMI Policy for Registration of Users, and is unique among all current and past User Identities. KOA Agent (KOAA). The User Identity of a Human User is one which has been designated by a KOAM to access KMI for the purpose of retrieving products for User Devices assigned to that KOA. A KOA Agent is not considered a role; it is a designation for the registered identity of a human user which has been associated with one or more KOAs. KOA Manager. The management role responsible for the operation of one of more KOAs (i.e., manages distribution of KMI to the ECUs, fill devices, and AKPs that are assigned to the manager’s KOA). KMI User Number (KU#). A KMI-unique value assigned by the KMI to a Registered User. It is used by the system’s internal database as an index, label, or abbreviated name for associating data elements pertaining to that user. UNCLASSIFIED//FOR OFFICIAL USE ONLY B-4 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Limited Device. A User Device for which a Local Device Identity has been registered at an MGC, through which products are distributed to that User for use in that identity. Local (Device) Identity. A User Device’s User Identity for which the Identity Registration Data is maintained in a database at a single MGC. The device is only recognized at the accounts MGC and not globally. Management Client (MGC). A configuration consisting of a Client Node that enables an external Operational Manager to manage KMI products and services through accessing a PRSN or exercising locally-provided capabilities. An MGC consists of a Client Platform and an AKP. Node. A collection of related components located on one or more computer platforms at a single Site. Non-KMI User Identifier. A User Identifier that cannot be used to access the KMI as a user and either takes the same form as a KMI-Unique User Identifier or some other form. Over-The-Air Key Distribution (OTAD). Providing electronic key via over-the-air rekeying, over-the-air key transfer, or cooperative key generation. Over-The-Air Key Transfer (OTAT). Electronically distributing key without changing traffic encryption key used on the secured communications path over which the transfer is accomplished. Over-The-Air Rekeying (OTAR). Changing traffic encryption key or transmission security key in remote cryptographic equipment by sending new key directly to the remote cryptographic equipment over the communications path it secures. PDE-Enabled Device. A KMI-Aware Device that also equipped to be able to establish network connectivity to a PRSN PDE to obtain KMI products and services. Personnel Local Type 1 Registration Authority. The Management Role responsible for personalizing a user to a device and for requesting Infrastructure Identification and Authentication credentials for human users. Personnel Registration Manager. The Management Role responsible for registering Human Users, i.e., Users that are people. UNCLASSIFIED//FOR OFFICIAL USE ONLY B-5 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Principle of Separation of Duties (Exclusions). The separation of functions, management and security-related oversight of a system among different entities or roles, to prevent a single entity from subverting the process. Primary Service Node (PRSN). The PRSN is a Key Management Infrastructure core that provides the user’s central point of access to KMI products, services and information. Product Source Node (PSN). The PSN is the Key Management Infrastructure core node that provides central generation of cryptographic key material and Type 1 PKI certificates. Registered User (abbreviated as User). A System Entity authorized to receive KMI’s products and services or otherwise access System Resources. Set Identity. A User Identity registered for a User Set composed of entirely of Human Users or User Devices. Shared Identity. A User Identity registered for a User Set in which each member of the set is authorized to assume that identity individually and for which the KMI maintains membership records for the set. Singular Identity. A User Identity registered for exactly one Human User or User Device. Tactical Key Loader (TKL). A small, lightweight key loader replacement for legacy key fill devices (KYK-13, CYZ-10, etc.). Token Holder. The individual Human User who is accountable for the use of a specific Hardware Token, including use of the Authentication Material and other security-sensitive material carried by the Token. Token Holder Identity. A User Identity which belongs to the Token Holder of a Hardware Token and to which that Token is assigned for accountability purposes by the KMI. Token Mission Identity. The User Identity of a Human User (or of a User Set consisting of Human Users) for which cryptographic material is loaded into a Hardware Token to enable the Token to support the authentication of that Identity. Token SO Account. An account established on the token for use UNCLASSIFIED//FOR OFFICIAL USE ONLY B-6 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 by the Token SO to perform maintenance functions. These functions include initialization, endorsement, personalization, and general lifecycle maintenance. Two-Person Integrity (TPI). System of storage and handling designed to prohibit individual access by requiring the presence of at least two authorized individuals, each capable of detecting incorrect or unauthorized security procedures with respect to the task being performed. User. See Registered User. User Authentication. A security service that verifies a User Identity claimed by or for a System Entity that attempts to access the KMI. User Core Data. A subset of the User Registration Data, that distinguishes a Registered User from all other Registered Users, has the same values for all User Identities of the User and includes some attributes that have values that remain constant over the life of the User. User with as a that Device. A cryptographic device—a specific hardware unit specific software running on it—that is registered to act User, either a User that accesses the KMI directly or one is receives KMI products and services indirectly. User Device Sponsor. The Primary KOA Manager of the KOA that is currently accountable for use of a User Device; i.e., the KOA to which a User Device is currently assigned. User Identifier. A name that can be unambiguously represented by a printable, non-blank character string. User Identity. The collective aspect of a set of attribute values in which the specific individuality of a Registered User is recognized or known by the KMI and which are sufficient to distinguish the identity from any other. User Number. See “KMI-Unique User Identifier”. User Registration. The process that; initializes an identity in the KMI for a System Entity authorized to access the KMI. The process also associates an identifier with the identity, may associate authentication material with the identifier and UNCLASSIFIED//FOR OFFICIAL USE ONLY B-7 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 dependent upon the authentication mechanism used, may also issue or associate with an identifier credential. User Registration Data. The set of attribute values acquired by, stored in and maintained in the KMI to establish and describe a Registered User. User Set. A set consisting of entirely Human Users or User Devices that is registered to act as a single User. User Set Sponsor. A Human User represented in the KMI by a User Identity who requests that a new User Identity be registered for a User Set and who continues to officially represent the KMI customer organization accountable for use of the new identity. User Sponsor. A Human User, represented in the KMI by a User Identity, who requests that a new User Identity be registered for a User Device or a User Set or who officially represents the KMI customer organization accountable for the use of a registered User Identity associated with a particular User Device or User Set. UNCLASSIFIED//FOR OFFICIAL USE ONLY B-8 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Annex C COMSEC LIBRARY All KOAs must maintain a COMSEC Library, which in addition to the library requirements set forth in Article 721 of EKMS1(series) must consist of the below documents. Accounts which have transitioned are not required to hold EKMS-704. Document KMI 101 - Computer Based Training (CBT) KMI 201 – Computer Based Training (CBT) Token Security Officer - Computer Based Training (CBT) EKMS-1(series) DON EKMS Policy & Procedures Manual EKMS-1(series) Supp-1 – DON KMI Policy and Procedures Manual Operational Security Doctrine for Key Management Infrastructure (KMI) KOV-29 (sKey6500) Operational Security Doctrine for the Key Management Infrastructure (KMI) Management Client (MGC) Node Operational Security Doctrine for KG-250X – High Assurance Internet Protocol Encryptor (HAIPE) Process Security doctrine for the Enrollment of KMI Managers Process Security Doctrine for the Registration of KMI Operating Accounts and KMI Users Type 1 Certificate Policy (CP) MGC Operations and Maintenance Manual for the KMI Client Node NAG-53(series) [Shore-based accounts only] Each of the items reflected above can be obtained from the NSA URLs located in Annex F. UNCLASSIFIED//FOR OFFICIAL USE ONLY C-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Annex D KMI FORMS QUICK REFERENCE Form Name KMI Form 001 KMI Form 002 KMI Form 003 KMI Form 004 KMI Form 005 KMI Form 006 KMI Form 007 Purpose KMI Personnel Registration Form (Any person whose official duties require registration in the KMI) KMI Enrollment Eligibility Form (Any person fulfilling one or more roles reflected in the Conferral Roles section of the form) COMSEC Account Data for KMI Registration (New and Transitioning Accounts Must Submit) KMI Certificate of Acceptance and Acknowledgement of Responsibilities (All roles requiring a token) Checklist for EKMS to KMI account transition KMI Device Registration Form (EA Only) KMI Certificate of Acceptance and Acknowledgement of Responsibilities (Device Sponsors Only) Each of the above forms, as well as CPA, CPSO, and TSO training is available online at the NSA KMI portal. See Annex F for the URL. UNCLASSIFIED//FOR OFFICIAL USE ONLY D-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Annex E CONDUCTING AND VERIFICATION OF PAGE CHECKS AND MODIFICATIONS a. Purpose of Page checks: Page checks are conducted to ensure the completeness of COMSEC material. Material that is protectively packaged is intended to remain intact until the material must be removed for issue or use and must NOT be opened solely for page check purposes. b. Verify Before Installation/Use: COMSEC equipment, related devices, and components must be verified for completeness prior to installation or use to afford ample time to obtain replacement equipment or parts, if required. c. Establish Internal Procedures: The Manager must establish internal procedures to ensure that all COMSEC material received by an account is page checked and/or verified for completeness. d. Certify Completed Page checks: Certification of completed page checks for COMSEC accountable publications, keying material or repair (Q-kits) must be recorded on the Record of Page checks (ROPs) page for the material, the front cover (for material having no ROPs page) or the locally created inventory which is to be maintained inside Q-kits held by the command. e. Page check Requirements: Minimum page check requirements for all COMSEC material are reflected in the matrix (Figure E-1) in this annex. Key points reiterated herein are: (1) Do not open sealed crates containing COMSEC equipment or sealed/resealed packages of keying material for the sole purpose of complying with the page check requirements upon receipt. (2) Page check unsealed COMSEC keying material upon initial receipt, prior to transfer, during all account inventories, watch-to-watch inventories or when a container protecting such is opened in a non-watch environment and prior to destruction. (3) Unsealed daily changing call signs or code books Communication Electronic Operating Instructions (CEOI) (e.g., UNCLASSIFIED//FOR OFFICIAL USE ONLY D-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 AKAI, AKAU, AMSH) are exempt from the requirement to page check each copy upon initial receipt. Recipients need only check one or two copies of each new edition upon receipt to ensure page and print continuity. (4) To reduce the possibility of a COMSEC incident as a result of a missing page to a classified COMSEC publication, all classified COMSEC-related publications issued to LEs including but not limited to KAMs, KAOs, AKACs, AKAIs, AMSH, etc. will be page checked during watch to watch inventories or when a container is opened if held by a non-watch environment. These items will be indicated by an asterisk (*) on watch-to-watch inventories to reflect that a page check is required. Due to space limitations on the cover or ROP page, the signing of the inventories at the LE level will certify the page check was properly conducted with no discrepancies. f. Procedures: Each item of printed COMSEC material contains a List of Effective Pages (LOEP), either on a separate page or on the front cover of the material. This list indicates which pages should be in the publication and identifies the status of each page (i.e., an original page or a specific amendment number page). NOTE: EKMS 5 (series) contains a list of components contained as part of Repair (Q Kits) and will be consulted to create local inventory documents and verification purposes when conducting page checks, as required. (1) To conduct a page check of printed COMSEC material, compare each page in the publication being checked against its LOEP. (2) Each page listed on the LOEP must be in the publication and each page must reflect the correct status. For example, pages identified on the LOEP as "ORIGINAL", must be ORIGINAL pages. Pages identified on the LOEP as being a specific amendment page (e.g., 1 or AMEND 1), must be that specific amendment page. g. Verify Mandatory Modifications: Verify the installation of DON and NSA mandatory equipment modifications in accordance with EKMS 5 (series) and/or the NSA Mandatory Modification Verification Guide (MMVG) as follows: (1) Should an examination of the equipment indicate a UNCLASSIFIED//FOR OFFICIAL USE ONLY E-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 requirement to install a mandatory modification, the KOAM will ensure that the mandatory modification is installed by an appropriately qualified maintenance technician as specified in the instructions accompanying the modification. (2) Before transferring equipment, the KOAM will also ensure that the modification record (plate) on the COMSEC equipment accurately reflects all installed modifications. h. Report Page Check or Other Discrepancies: If a discrepancy is noted during the page check and verification of any COMSEC accountable material, it must be reported in accordance with Chapter 8 if the material is classified, marked or designated crypto or designated CCI. For unclassified material not marked or designated crypto or CCI, document and report the matter in accordance with Chapter 9. UNCLASSIFIED//FOR OFFICIAL USE ONLY E-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 PAGE CHECK QUICK REFERENCE MATRIX TYPE OF MATERIAL UPON INITIAL RECEIPT AFTER ENTRY OF AMENDMENT WHICH CHANGES PAGES UPON INSTALLATION/MODIFICATION DURING EKMS ACCOUNT INVENTORIES DURING WATCH INVENTORIES PRIOR TO TRANSFER TO NEW ACCT UPON DEST INVENTORIES THESE PAGE CHECK REQUIREMENTS DO NOT APPLY TO KEYING MATERIAL PACKAGED IN CANISTERS UNSEALED KEYING MATERIAL RESEALED KEYING MATERIAL CLASSIFIED COMSEC ACCOUNTABLE PUBLICATIONS (I.E. AKAA, AKAC, AKAI, KTCs,USKAC, USKTC) UNSEALED MAINTENANCE AND OPERATING MANUALS YES N/A N/A YES YES YES YES N/A N/A N/A YES N/A YES YES YES EXCEPT AS INDICATED IN ART 757.E.3 YES N/A YES EXCEPT AS INDICATED IN ART 757.E.3 YES YES YES YES YES N/A N/A YES YES ALL UNSEALED AMENDMENTS YES BY PERSON ENTERING & BY PERSON VERIFYING ENTRY YES YES EXCEPT AS INDICATED IN ART 757.E.3 N/A YES YES YES UNSEALED AMENDMENT RESIDUE N/A BY PERSON ENTERING & BY PERSON VERIFYING ENTRY YES YES EXCEPT AS INDICATED IN ART 757.E.3 N/A N/A N/A N/A YES MAINTENANCE AND REPAIR (PWB OR Q) KITS YES BY PERSON ENTERING & BY PERSON VERIFYING ENTRY N/A YES N/A YES YES YES YES YES N/A YES N/A EQUIPMENT MANDATORY MODIFICATION ON NSA/NAVY YES N/A N/A YES EXCEPT AS INDICATED IN ART 757.E.3 (CLASSIFIED COMPONENTS ONLY) YES UPON UNCRATING YES N/A YES YES ALL COMPONENTS SEE NOTE 1 CLASSIFIED COMPONENTS ONLY ALL COMPONENTS MOD PLATE ONLY FIGURE E-1 NOTE: Maintenance personnel must inventory all components upon initial local custody issue and return of repair kits. Resealing keying material, including ROB and WHENDI material to UNCLASSIFIED//FOR OFFICIAL USE ONLY E-4 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 negate page check requirements is authorized. Annex F HELPFUL URLs The URLs contained herein are intended to assist KOAM personnel in obtaining: status information; information related to KMI including Computer Based Training (CBT) material; KMI related forms; modernization information related to CCI equipment and related algorithms; and other information which, if consulted may enhance the management of the account. NCMS has no administrative privileges or operational responsibility for the availability or content hosted on the sites reflected herein other than the NCMS portal(s). Status Information NCMS has published a listing of many Controlling Authorities and the URLs to where their status information is posted on the SIPRNET. The file titled “Helpful URLs for COMSEC Account Managers” also contains hyperlinks to various OPTASKs, OPORDS and Communication Information Advisories and Bulletins (CIAs/CIBs). The file can be found on the NCMS (SIPR) Collaboration at Sea (CAS) Portal; the URL is reflected below. Hyperlinks for SIPR URLs below have been removed to properly display the correct path. General & Other Information NCMS CAS Portal (SIPR): http://www.uar.cas.navy.smil.mil/secret/navy/39/site.nsf Controlling Authority Computer-Based Training (CBT): www.ia.nsa.smil.mil/iaservices/cawg/training/index.cfm Defense Courier Service (DCS) Customer Service Manual and USTC Form-10: http://www.ustranscom.mil/cmd/associated/dcd/ KMI CPA, CPSO AND TSO Computer-Based Training (CBTs) and other information: http://www.ia.nsa.smil.mil/iaservices/programs/km/kmi_program_of fice/programdocs/suitabilitydocs.cfm MGC Operators Manual: http://www.ia.nsa.smil.mil/programs/km/kmi_program_office/progra mdocs/suitabilitydocs.cfm UNCLASSIFIED//FOR OFFICIAL USE ONLY E-5 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 NSA Classified Material Conversion (CMC): http://www.nsa.gov/cmc/ NSA KMI (SIPR) Portal: http://www.iad.nsa.smil.mil/iaservices/km/kmi_program_office/pro gramdocs/suitabilityDocs.cfm NSA Master Reference Catalog http://secure.ia.nsa.smil.mil/iaservices/cawg/mrc/index.cfm NSA Media Destruction Guidance (including the Evaluated Products List (EPL)) http://www.nsa.gov/ia/mitigation_guidance/media_destruction_guid ance/index.shtml Operational Security Doctrine (OSD) for CCI equipment: www.iad.nsa.smil.mil – IA Library – Doctrine UNCLASSIFIED//FOR OFFICIAL USE ONLY F-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Annex G EMERGENCY ACTION AND EMERGENCY DESTRUCTION OF COMSEC MATERIAL 1. Purpose. This Annex prescribes policy and procedures for planning, protecting, and destroying COMSEC material during emergency conditions. The KOAM is responsible for the COMSEC portion of the Command Emergency Action Plan. 2. Emergency Protection Planning. a. Every command that holds classified COMSEC or CCI material must prepare and maintain a current, written emergency plan for safeguarding such material in the event of an emergency. b. For commands located within the U.S. and its territories planning must consider natural disasters (e.g., fire, flood, tornado, and earthquake) and hostile actions (terrorist attack, rioting, or civil uprising). c. For commands located outside the U.S. and its territories and deployable commands, planning must include both an Emergency Action Plan (EAP) for natural disasters and an Emergency Destruction Procedures (EDP) for hostile action. d. All activities located within the U.S and its territories that hold classified COMSEC or CCI material will maintain an upto-date, written Emergency Action Plan for the protection of COMSEC material appropriate for natural disasters likely to occur in their region of the country (e.g., hurricanes in the South, tornados and floods in the mid-West, wild fires in the West, etc…). e. All activities located within the U.S and its territories will have conducted an initial written risk assessment and must maintain an up-to-date copy of the risk determination document that assesses the potential for hostile actions against their facilities (such as terrorist attack, rioting, or civil uprising). Based on the sensitivity of the operations, or the facility, the cognizant security official will either certify that the review has determined no need for the Emergency Plan to consider hostile actions, or, if it is determined that a UNCLASSIFIED//FOR OFFICIAL USE ONLY F-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 potential risk exists, develop EDPs for inclusion in their Emergency Plan. f. The head of any department or agency may, at their discretion, direct any facility to create an Emergency Plan that considers hostile action, regardless of local risk. Government Contracting Officers may also direct that the Emergency Plan for contractor facilities consider hostile action. g. Planning for hostile actions must concentrate on necessary procedures to safely evacuate or securely destroy the COMSEC material, to include providing for the proper type and a sufficient number of destruction devices to carry out emergency destruction. Planning for hostile action shall also include the necessary training for all individuals who might perform emergency destruction. By contrast, planning for natural disasters should be directed toward maintaining security control over the material until the situation stabilizes, taking into account the possible loss of normal physical security protection that might occur during and after a natural disaster. The operating routines for COMSEC facilities should be structured so as to minimize the number and complexity of actions that must be taken during emergencies to protect COMSEC material. For example: (1) Only the minimum amount of COMSEC material should be held at any one time; i.e., routine destruction should be conducted frequently and excess COMSEC material disposed of in accordance with department or agency directives. COMSEC requirements should be reviewed at least annually to validate need for material on hand. (2) COMSEC material should be stored and inventoried in ways that will facilitate emergency evacuation or destruction. Emergency protection of classified COMSEC and CCI material applies to U.S. Government contractor facilities, other U.S. non-governmental entities who produce or hold COMSEC material, and any other facilities that are designed to provide a backup COMSEC capability (whether U.S. Government or contractor owned). h. Planning for acts of terrorism is much more difficult but must concentrate on maintaining security control over the material, evacuation of the material, and/or secure destruction. UNCLASSIFIED//FOR OFFICIAL USE ONLY G-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 i. These plans will be incorporated into the overall Emergency Action Plan (EAP)/Emergency Destruction Plan (EDP) of the command. j. All Emergency Plans will be reviewed annually and updated as necessary, or whenever changes in the local environment dictate an update to the plan. k. Efficient planning and training, which involving every individual who uses COMSEC material, increases the probability of preventing its loss or compromise during an emergency. l. The command EAP/EDP, if not specific to LE operations, must be modified or annexed to include specific actions to be taken by LEs. m. Any detachment that operates independently (i.e. aircraft and communications/special purpose vans) from their parent command should have their own unique EAP/EDP specifically tailored for those times of independent operation. In all cases, they should be included in the command's EAP/EDP. 3. Guidelines For Minimizing Actions. a. Hold only the minimum amount of COMSEC material at any time (i.e., routine destruction should be conducted frequently and excess COMSEC material disposed of as directed by appropriate authorities). b. Store COMSEC material to facilitate emergency removal or destruction (e.g., separate COMSEC material from other classified material, and segregate COMSEC keying material by status, type and classification). NATO material may be stored with other COMSEC material of the same classification. c. Should an emergency situation develop, initiate precautionary destruction or evacuation of all material not immediately needed for continued operational effectiveness. After destroying material, notify appropriate authorities so they may begin re-supply planning. 4. Preparedness Planning For Disasters. must provide for: Planning for disasters a. Fire reporting and initial firefighting by assigned personnel. UNCLASSIFIED//FOR OFFICIAL USE ONLY G-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 b. Assignment of on-the-scene responsibility for ensuring protection of the COMSEC material held. c. Security or removing classified COMSEC material and evacuating the area(s). d. Protection of material when admission of outside emergency personnel into the secure area(s) is necessary. e. Assessment and reporting of probable exposure of classified COMSEC material to unauthorized persons during the emergency. f. Post-emergency inventory of classified COMSEC and CCI material and reporting any losses or unauthorized exposure to appropriate authorities. 5. Preparedness Planning for Hostile Actions. Planning for hostile actions must take into account the possible types of situations that may occur (e.g., an ordered withdrawal over a specified period of time, a hostile environment situation where destruction must be carried out in a discrete manner to avoid triggering hostile actions, or fully hostile imminent overrun situations). Ensure that the plan provides for the following: a. Assessing the threat of occurrence of the various types of hostile emergencies at the particular activity and of the threat that these potential emergencies pose to the COMSEC material held. b. The availability and adequacy of physical security protection capabilities (e.g., perimeter controls, guard forces, and physical defenses) at the individual buildings and other locations when COMSEC material is held. c. Facilities for effecting emergency evacuation of COMSEC material under emergency conditions, including an assessment of the probable risks associated with evacuation. Except under extraordinary conditions (e.g., an urgent need to restore secure communications after relocation), COMSEC keying material should be destroyed rather than evacuated. d. Facilities and procedures for effecting secure emergency destruction of COMSEC material must address: (1) (2) Adequate number of destruction devices Availability of electrical power UNCLASSIFIED//FOR OFFICIAL USE ONLY G-4 UNCLASSIFIED//FOR OFFICIAL USE ONLY (3) (4) (5) (6) emergency EKMS-1E SUPP-1 Secure storage facilities nearby Adequately protected destruction areas Personnel assignments Clear delineation of responsibilities for implementing destruction e. Precautionary destruction of COMSEC material, particularly maintenance manuals (KAMs) and keying material not operationally required to ensure continuity of operations during the emergency. (1) In a deteriorating situation all "full" maintenance manuals (i.e., contains cryptographic logic information) which are not absolutely essential for continued mission accomplishment must be destroyed. (2) When there is insufficient time under emergency conditions to completely destroy such manuals, every reasonable effort must be made to remove and destroy their sensitive pages (i.e., those containing cryptographic logic/classified schematics). NOTES: 1. Sensitive pages in U.S. produced KAMs are listed on fold-out Lists of Effective Pages at the rear of other textual portions. 2. Some KAMs further identify their sensitive pages pages by means of gray or black diagonal or rectangular markings at the upper portion of the binding edge. f. To prepare for possible emergency destruction of sensitive pages from KAMs in areas or situations where capture by hostile forces is possible, comply with the following guidance: (1) Apply distinctive markings (e.g., red stripes) to the binder edge and covers of all KAMs containing identified sensitive pages. (2) Remove the screw posts or binders rings, or open the multi-ring binder, whichever is applicable. (3) Remove each sensitive page from the KAM and cut off the upper left-hand corner of the page so that the first binder hole is removed. Care must be taken not to delete any text or diagram. UNCLASSIFIED//FOR OFFICIAL USE ONLY G-5 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 g. Should it become necessary to implement emergency destruction, the sensitive KAM pages may be removed as follows: (1) Remove the screw posts or binders rings, or open the multi-ring binder and remove all pages from the KAM. (2) Insert a thin metal rod (e.g., wire or screwdriver) through the remaining top left-hand hole of the document. (3) Grasp the rod in both hands and shake the document vigorously; the sensitive pages should fall out freely. h. Establishment of emergency communications procedures. (1) External communications during emergency situations should be limited to contact with a single remote point. (2) This point will act as a distribution center for outgoing message traffic and a filter for incoming queries and guidance. (3) When there is warning of hostile intent and physical security protection is inadequate to prevent overrun of the facility, secure communications should be discontinued in time to allow for thorough destruction of all classified COMSEC and CCI material, including classified and CCI elements of COMSEC equipment. 6. Preparing the Emergency Plan: a. The person who is most aware of the extent and significance of the COMSEC material on hand should prepare the emergency plan. b. The Commanding Officer or other responsible official must be aware of and approve the emergency plan. c. If the plan calls for destroying COMSEC material, all destruction material, devices, and facilities must be readily available and in good working order. d. The plan must be realistic, workable, and accomplish the goals for which it is prepared. Factors that will contribute to this are: UNCLASSIFIED//FOR OFFICIAL USE ONLY G-6 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 (1) All duties under the plan must be clearly and concisely described. (2) All authorized personnel at the command should be aware of the existence of the plan. (a) Each individual assigned duties under the plan must receive detailed instructions on how to carry out those duties when the plan is implemented. (b) All personnel should be familiar with all duties so that changes in assignment may be made, if necessary. This may be accomplished by periodically rotating the emergency duties of all personnel. (3) Training exercises will be conducted at a minimum of annually or more frequently to ensure that everyone, especially newly assigned personnel, will be able to carry out their duties. If necessary, the plan should be modified based on based on the training exercise results. (4) The three options available in an emergency are: securing the material, removing it from the scene of the emergency, or destroying it. Planners must consider which of these options may be applicable to their command. (5) For example, if it appears that a civil uprising is to be short lived, and the COMSEC facility is to be only temporarily abandoned, the actions to take could be: (a) Ensure that all superseded keying material has been destroyed. (b) Gather up the current and future keying material and take it along. (c) Remove classified and CCI elements from cryptoequipment and lock them, along with other classified COMSEC material, in approved storage containers. (d) Secure the facility door(s), and leave. (e) Upon return, conduct a complete inventory. NOTE: If it appears that the facility is likely to be overrun, the emergency destruction plan should be put into UNCLASSIFIED//FOR OFFICIAL USE ONLY G-7 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 effect. 7. Emergency Destruction Planning: Three categories of COMSEC material that may require destruction in hostile emergencies are: COMSEC keying material, COMSEC-related material (e.g., maintenance manuals, operating instructions, and general doctrinal publications), and equipment. a. Precautionary Destruction (Priority List A & B): When precautionary destruction is necessary, destroy keying material and non-essential manuals in accordance with this Annex and the EAP/EDP. b. Complete Destruction Priority List (C): When sufficient personnel and facilities are available, assign different persons to destroy the material in each category by means of separate destruction facilities and follow the priorities listed herein as incorporated into your EAP/EDP. c. When personnel and/or destruction facilities are limited, join the three categories and destroy the material following the priorities listed in Priority List C. 8. Emergency Destruction Priorities: a. Precautionary Destruction Priority List A: (1) (a) Superseded keying material and secondary variables. TOP SECRET primary keying material. (b) SECRET, CONFIDENTIAL, and UNCLASSIFIED primary keying material. (2) Future (reserve on board) keying material for use one or two months in the future. (3) Non-essential classified manuals: (a) Maintenance manuals. (b) Operating manuals. (c) Administrative manuals. UNCLASSIFIED//FOR OFFICIAL USE ONLY G-8 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 b. Complete Destruction Priority List B: When sufficient personnel and facilities are available, destroy COMSEC material in the following order: (1) Keying Material: (a) All superseded keying material designated CRYPTO, except tactical operations and authentication codes classified below SECRET. (b) Currently effective keying material designated CRYPTO including key stored electrically in crypto equipment and FDs (see paragraph c. below regarding STE or KSV-21 material), except unused two-holder keying material and unused one-time pads. (c) Zeroize all STE keying material held by the account in the following order: 1. Operational Keying Material designated TOP SECRET, SECRET, CONFIDENTIAL, UNCLASSIFIED. 2. Seed Keying Material – TOP SECRET, SECRET, CONFIDENTIAL, UNCLASSIFIED. (d) TOP SECRET multi-holder (i.e., more than two holders) keying material marked CRYPTO which will become effective within the next 30 days. (e) Superseded tactical operations codes classified below SECRET. (f) SECRET and CONFIDENTIAL multi-holder keying material marked CRYPTO which will become effective within the next 30 days. (g) All remaining classified keying material, authentication systems, maintenance, and unused one-time pads. (2) COMSEC Aids: (a) Complete COMSEC equipment maintenance manuals or their sensitive pages. When there is insufficient time to completely destroy these manuals, every reasonable effort must be made to destroy their sensitive pages. UNCLASSIFIED//FOR OFFICIAL USE ONLY G-9 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 (b) National, department, agency, and service general doctrinal guidance publications. (c) Status documents showing the effective dates for COMSEC keying material. (d) Keying material holder lists and directories. (e) Remaining classified pages of maintenance manuals. (f) Classified cryptographic and non-cryptographic operational general publications (e.g., AMSGs, NAGs and SDIPs). (g) Cryptographic Operating Instructions (KAOs). (h) Remaining classified COMSEC documents. (3) Equipment: Make a reasonable effort to evacuate equipment, but the immediate goal is to render them unusable and un-repairable. Although it is desirable to destroy jeopardized crypto-equipment so thoroughly that logic reconstruction is impossible, this cannot be guaranteed in most field environments. (a) Zeroize the equipment if the keying element cannot be physically withdrawn. (b) Remove and destroy readily removable classified elements (e.g., printed-circuit boards). (c) Destroy remaining classified elements. NOTE: Unclassified chassis and unclassified elements need not be destroyed. (d) Zeroize all loaded STEs held by the account in the following order based on the level of keying material loaded into the terminal: TOP SECRET, SECRET, CONFIDENTIAL, UNCLASSIFIED. If a lack of power prohibits keying material stored in equipment from being zeroized, ensure that all keying material and CIKs are physically removed from the area. In extreme emergencies, an attempt to physically destroy fill devices and CIKs is allowed. Material can be burned or broken as much as possible to prevent unauthorized use. It should be noted that the effectiveness of these methods has not been documented. UNCLASSIFIED//FOR OFFICIAL USE ONLY G-10 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 c. Complete Destruction Priority List C: In cases where personnel and/or facilities are limited, follow the destruction priority list below: (1) All superseded and currently effective keying material marked CRYPTO (including key stored electrically in cryptoequipment and fill devices), except tactical operations codes and authentication systems classified below SECRET, unused twoholder keying material, and unused one-time pads. (2) SECRET. Superseded tactical operations codes classified below (3) Complete COMSEC equipment maintenance manuals or their sensitive pages. (4) Classified general COMSEC doctrinal guidance publications. (5) Classified elements of COMSEC equipment. (6) Remaining COMSEC equipment maintenance manuals and classified operating instructions. (7) Remaining classified COMSEC material. (8) Future editions of multi-holder (i.e., more than two holders) keying material and current but unused copies of twoholder keying material. 9. Conducting Emergency Destruction: Any of the methods approved for routine destruction of classified COMSEC material may be used for emergency destruction. a. Printed Matter: (1) Destroy keying material and other classified COMSEC publications beyond reconstruction. (2) Destroy all "full" maintenance manuals (i.e., those containing cryptographic logic information/classified schematics). When time does not permit, every reasonable effort must be made to remove and destroy their sensitive pages in accordance with paragraph 5.e. b. Classified Crypto-Equipment UNCLASSIFIED//FOR OFFICIAL USE ONLY G-11 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 (1) Render classified crypto-equipment inoperable (i.e., beyond reuse). (2) If time permits, destroy the cryptographic logic of the equipment beyond reconstruction by removing and destroying the classified portions of the equipment, which include certain printed circuit boards and multi-layer boards and keyed permuting devices. (3) If these classified elements are destroyed, it is not necessary to destroy the remainder of the equipment. c. Emergency Destruction in Aircraft: When time or facility limitations preclude complete destruction of COMSEC material aboard aircraft, make all reasonable efforts to prevent the material from falling into unauthorized hands. (1) When the aircraft is operating over water and an emergency or forced landing is imminent, zeroize the COMSEC equipment, shred or tear up the keying material, and disperse it. If feasible, remove the classified elements from the equipment and smash and disperse them. (2) If an aircraft is in danger of making an emergency landing in friendly territory, zeroize the equipment and keep all the COMSEC materials in the aircraft. (3) If the aircraft is being forced or shot down over hostile territory, zeroize the equipment, then shred or tear up and disperse the keying material, and make all reasonable efforts to remove, smash, and disperse the classified equipment components. d. Emergency Destruction Aboard Ship: (1) If the ship is in imminent danger of sinking in a U.S. controlled area, zeroize the equipment, destroy all COMSEC material as completely as possible in the time available, lock it in security containers and permit it to sink with the ship. (2) If the ship is in imminent danger of capture or of sinking in an area where foreign elements would have salvage opportunities, destroy all COMSEC equipment and all keying material. UNCLASSIFIED//FOR OFFICIAL USE ONLY G-12 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 (a) Destroy all COMSEC equipment as completely as time permits, and jettison the undestroyed or partially destroyed COMSEC material overboard. (b) Place paper items and other material that could float in weighted canvas bags before jettisoning. e. Emergency Destruction in Mobile Communication Vehicles: When time or facility limitations preclude complete destruction of COMSEC material located in the vehicle, make all reasonable efforts to prevent the material from falling into unauthorized hands. 10. Reporting Emergency Destruction: a. Accurate information relative to the extent of an emergency is absolutely essential to the effective evaluation of the COMSEC impact of the occurrence, and is second in importance only to the completeness of the destruction. b. The Commanding Officer/OIC or official responsible for safeguarding COMSEC material, which has been subjected to emergency destruction, is responsible for reporting the attendant facts to the appropriate seniors in the chain of command by the most expeditious means available. (1) Reporting Instructions: The senior official shall report the facts surrounding the destruction to the CNO//N614//, NCMS//N5//, DIRNSA//I3// and the unit’s operational and administrative command echelons as soon as possible; if feasible, use a secure means of reporting. (2) Required Information: Identify the following in the report; the material destroyed, the method and extent of destruction, and any classified COMSEC material items presumed compromised (e.g., items either not destroyed or not completely destroyed). NOTE: Follow the reporting procedures for COMSEC Incidents as outlined in Chapter 8. Ensure the EAP/EDP includes guidance for providing the required information. UNCLASSIFIED//FOR OFFICIAL USE ONLY G-13 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Annex H SAMPLE WAIVER REQUEST MESSAGE FOR KOAM OR ALTERNATE APPOINTMENTS From: To: Info: Unit PLA NCMS Washington DC TYCOM ISIC Servicing COR Audit Team PLA BT CLASSIFICATION (DETERMINED BY ORIGINATOR, BASED ON CONTENT. IF CLASSIFIED, ENSURE COMPLIANCE WITH SECNAV M5510.36 REGARDING SUBJECT AND PARAGRAPH MARKINGS AND DECLASSIFICATION MARKINGS) MSGID/GENADMIN/UNIT NAME/-/MONTH// SUBJ/WAIVER REQUEST// REF/A/DOC/NCMS WASH DC/XXXXXXXX(MO/DD/YEAR OF THIS MANUAL) AMPN/REF A IS EKMS-1B SUPP-1// POC/IAM UNDERWAY/GRADE/UNIT NAME/TEL:XXX-XX-XXXX/EMAIL: IAM.UNDERWAY(AT)NAVY.MIL (OR .SMIL.MIL, AS APPLICABLE) RMKS/1. IAW REF A, THE FOLLOWING IS SUBMITTED: A. IAW ARTICLES 409 AND 601 TO REF A, THE FOLLOWING IS SUBMITTED: B. REASON FOR THE WAIVER: XXXXXXXXXX C. FULL NAME, GRADE AND PROJECTED ROTATION DATE (PRD) OF THE INDIVIDUAL IN WHICH THE WAIVER PERTAINS: (OMIT PRD FOR CIVILIAN EMPLOYEES) XXXXXXXXXXX D. SECURITY CLEARANCE DATA: INCLUDE THE MEMBER’S: CLEARANCE, TYPE AND DATE OF MOST RECENT SECURITY INVESTIGATION AND GRANTING AGENCY: XXXXXXXXXXX E. DURATION THE WAIVER IS REQUESTED FOR: XXXXXXXXXXX The notes below are for informational purposes; do not include them in the message. NOTES: (1) IF RELATED TO THE INABILITY TO COMPLETE FORMAL TRAINING REQUIREMENTS PRIOR TO APPOINTMENT, THIS WILL BE LIMITED TO A MAXIMUM OF 90 DAYS FOR A KOAM OR 180 DAYS FOR AN ALTERNATE BY NCMS. ALL OTHER WAIVERS SUCH AS GRADE WAIVERS ARE LIMITED TO A MAXIMUM OF ONE YEAR AND ARE NOT AUTO-RENEWED. (2) APPROVED WAIVERS MUST BE ON FILE WITH THE ACCOUNT AND ARE SUBJECT TO REVIEW DURING VISITS OR AUDITS. IF IT’S NOT ON FILE AND VERIFIABLE, IT UNCLASSIFIED//FOR OFFICIAL USE ONLY H-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 DOESN’T EXIST. (3) WAIVERS WILL NOT BE GRANTED TO PERSONNEL WITH EXPIRED BACKGROUND INVESTIGATIONS. UNCLASSIFIED//FOR OFFICIAL USE ONLY H-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 Annex I STATEMENT OF ACCEPTANCE OF RESPONSIBILITIES KEY MANAGEMENT INFRASTRUCTURE (KMI) MANAGEMENT CLIENT (MGC), CLIENT HOST ONLY (CHO) OR DELIVERY ONLY CLIENT (DOC) INFORMATION SYSTEM PRIVILEGED ACCESS AGREEMENT AND ACKNOWLEDGMENT OF RESPONSIBILITIES Date: __________ 1. I understand there are two DoD Information Systems (IS); classified (SIPRNET) and unclassified (NIPRNET), and that I have the necessary clearance for privileged access to the KMI Management Client (MGC) for Key Management Operating Account (KOA) #________. I will not introduce or process data or software for the IS that I have not been specifically authorized to handle. 2. I understand the need to protect all passwords and other authenticators at the highest level of data they secure. I will not share any password(s), account(s), or other authenticators with other coworkers or other personnel not authorized to access the KMI MGC. As a privileged user, I understand the need to protect the root password and/or authenticators at the highest level of data it secures. I will NOT share the root password and/or authenticators with coworkers who are not authorized KMI MGC. 3. I understand that I am responsible for all actions taken under my account(s), root, or otherwise. I will not attempt to “hack” the network or any connected information systems, or gain access to data to which I do not have authorized access. 4. I understand my responsibility to appropriately protect and label all output generated under my account (including printed materials, magnetic tapes, floppy disks, and downloaded hard disk files). 5. I will immediately report any indication of computer network intrusion, unexplained degradation or interruption of network services, or the actual or possible compromise of data or file access controls to the appropriate KMI MGC Information Assurance Management (IAM) or senior Information Assurance Technical (IAT) Level representatives. I will NOT install, modify, or remove any hardware or software (i.e. e.g., freeware/shareware and security tools) without written UNCLASSIFIED//FOR OFFICIAL USE ONLY I-1 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 permission and approval from the KMI MGC Information Assurance Manager (IAM) or senior IAT Level representatives. 6. I will not install any unauthorized software (e.g., games, entertainment software) or hardware (e.g., sniffers). 7. I will not add/remove any users’ names to the Domain Administrators, Local Administrator, or Power Users group without the prior approval and direction of the KMI MGC IAM/or senior IAT Level representatives. 8. I will not introduce any unauthorized code, Trojan horse programs, malicious code, or viruses into the KMI MGC local area networks. 9. I understand that I am prohibited from the following while using the DoD IS: a. Introducing Classified and/or Controlled Unclassified Information (CUI) into a NIPRNET environment. b. Accessing, storing, processing, displaying, distributing, transmitting, or viewing material that is abusive, harassing, defamatory, vulgar, pornographic, profane, or racist; that promotes hate crimes, or is subversive or objectionable by nature, including material encouraging criminal activity, or violation of local, state, federal, national, or international law. c. Storing, accessing, processing, or distributing Classified, Proprietary, CUI, For Official Use Only (FOUO), or Privacy Act protected information in violation of established security and information release policies. d. Obtaining, installing, copying, pasting, transferring, or using software or other materials obtained in violation of the appropriate vendor’s patent, copyright, trade secret, or license agreement. e. Knowingly writing, coding, compiling, storing, transmitting, or transferring malicious software code, to include viruses, logic bombs, worms, and macro viruses. f. Engaging in prohibited political activity. g. Using the system for personal financial gain such as UNCLASSIFIED//FOR OFFICIAL USE ONLY I-2 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 advertising or solicitation of services or sale of personal property (e.g., eBay), or stock trading (i.e., issuing buy, hold, and/or sell directions to an online broker). h. Fundraising activities, either for profit or non-profit, unless the activity is specifically approved by the organization (e.g., organization social event fund raisers and charitable fund raisers, without approval). i. Gambling, wagering, or placing of any bets. j. Writing, forwarding, or participating in chain letters. k. Posting personal home pages. l. Any other actions prohibited by DoD 5500.7-R (Reference (y)) or any other DoD issuances. 10. Personal encryption of electronic communications is strictly prohibited and can result in the immediate termination of access. 11. I understand that if I am in doubt as to any of my roles or responsibilities I will contact the KMI MGC IAT Level III Supervisor for clarification. 12. I understand that all information processed on the KMI MGC is subject to monitoring. This includes email and browsing the web. 13. I will not allow any user who is not cleared access to the network or any other connected system without prior approval or specific guidance from the KMI MGC IAM. 14. I will use the special access or privileges granted to me ONLY to perform authorized tasks or mission related functions. 15. I will not use any <DOD/Components> owned information system to violate software copyright by making illegal copies of software. 16. I will ONLY use my PRIVILEGED USER account for official administrative actions. This account will NOT be used for day to day network communications. 17. I understand that failure to comply with the above UNCLASSIFIED//FOR OFFICIAL USE ONLY I-3 UNCLASSIFIED//FOR OFFICIAL USE ONLY EKMS-1E SUPP-1 requirements will be reported and may result in the following actions: a. Revocation of IS privileged access. b. Counseling. c. Adverse actions pursuant to the Uniform Code of Military Justice and/or criminal prosecution. d. Disciplinary action, discharge or loss of employment. e. Revocation of Security Clearance. 18. I will obtain and maintain required certification(s), according to DoD 8570.01-M and the certification provider, to retain privileged system access. Your IAT Level III Supervisor is _______________________ Information System Name _______________________ IAT/IASAE/CND’s Name _______________________ IAT/IASAE/CND’s Signature _______________________ Date _______________________ IAM Manager Level I Name _______________________ IAM Manager Level I Signature _______________________ Date _______________________ (Level I or II Managers with privileged access will have signatures of the IAM Level II or III responsible for their IS functions). UNCLASSIFIED//FOR OFFICIAL USE ONLY I-4