Doe Handbook Operations Security (Opsec)

Doe Handbook Operations Security (Opsec)

DOE‐HDBK‐1233‐2019 June 2019 DOE HANDBOOK OPERATIONS SECURITY (OPSEC) U.S. Department of Energy AREA SANS Washington, DC 20585 DISTRIBUTION STATEMENT A: Approved for public release; distribution is unlimited. This page intentionally left blank. DOE-HDBK-1233-2019 FOREWORD The protection of classified information, projects, and missions is of paramount importance in fulfilling security responsibilities in connection with the Department of Energy (DOE). Operations Security (OPSEC) involves a process of determining unclassified or controlled critical information that may be an indicator or pathway to classified or sensitive activities requiring protection, whether for a limited or prolonged time. To ensure protection, employees should know and follow the applicable procedures and processes outlined in national and departmental policies. This handbook does not establish new requirements and any existing requirements are explicitly referenced from national policy or a DOE Order using the terms “must” or “shall.” It is not intended to replace DOE Order 471.6, Information Security, other departmental rules, or national directives. This handbook describes one way to fulfill requirements for OPSEC within DOE. Section 1 identifies the purpose, history and basic understanding of OPSEC. Section 2 describes the general OPSEC Program and the specific OPSEC Program Plan and its components. Section 3 discusses the OPSEC five-step process. It provides methods to identify critical information, the potential threat, vulnerabilities, and types of countermeasures that may be used. Section 4 describes the on-going activities that keep the critical information and related information and threats up to date. Trainings, briefing and awareness activities are provided. Appendix A is a copy of National Security Decision Directive 298, National Operations Security Program. Appendix B contains a sample OPSEC plan. Appendix C provides a sample OPSEC assessment report. Appendix D provides a sample threat statement. Appendix E contains a sample website review template. Appendix F provides the IOSS OPSEC program implementation tiers. In addition to the sample plans, reports and posters described above, additional resources and information may be found under Security Policy Guidance Documents on DOE Powerpedia at https://powerpedia.energy.gov/wiki/Office_of_Security_Policy. Samples may also be submitted for consideration and inclusion, as appropriate. Beneficial comments (recommendations, additions, and deletions), as well as any pertinent data that may be of use in improving this document, should be emailed to [email protected] or addressed to: Office of Security Policy (AU-51) Office of Environment, Health, Safety and Security (AU) U.S. Department of Energy 1000 Independence Avenue, SW Washington, DC 20585 i DOE-HDBK-1233-2019 TABLE OF CONTENTS FOREWORD .......................................................................................................................... i ACRONYMS ........................................................................................................................ vi 1.0 INTRODUCTION .......................................................................................................... 7 1.1 Purpose ............................................................................................................................... 7 1.2 Understanding OPSEC ....................................................................................................... 8 1.2.1 History ..................................................................................................................... 8 1.2.2 Current Application ................................................................................................. 8 2.0 ESTABLISH AN OPSEC PROGRAM ......................................................................... 9 2.1 OPSEC Program Plan......................................................................................................... 9 2.2 Identification of Roles and Responsibilities ..................................................................... 10 2.2.1 Site – Federal, Contractor, and Tenant Organizations .......................................... 10 2.3 Establish an OPSEC Working Group ............................................................................... 11 2.4 Coordination and Communication ................................................................................... 12 2.4.1 Office of Intelligence/Counterintelligence ............................................................ 12 2.4.2 Internal and External Organizations ...................................................................... 12 2.4.3 Foreign Visits and Assignments ............................................................................ 13 3.0 APPLY THE OPSEC FIVE-STEP PROCESS ............................................................ 14 3.1 Step 1 – Identification of Critical Information ................................................................. 15 3.1.1 Development and Prioritization of Critical Information List ................................ 15 3.1.2 Elements of Critical Information ........................................................................... 16 3.1.3 Indicators and Pathways ........................................................................................ 16 3.1.4 OPSEC Reviews .................................................................................................... 18 3.1.5 Public Release Review .......................................................................................... 18 3.2 Step 2 – Analysis of Threats ............................................................................................ 21 3.2.1 Intelligence Cycle .................................................................................................. 22 3.2.2 National Threats .................................................................................................... 24 3.2.3 Site-Specific Threats ............................................................................................. 26 3.2.4 Collection Techniques ........................................................................................... 27 3.3 Step 3 – Analysis of Vulnerabilities ................................................................................. 32 3.3.1 OPSEC Assessments ............................................................................................. 33 3.3.2 Phase 1 – Planning and Preparation ...................................................................... 36 3.3.3 Phase 2 – Team Orientation .................................................................................. 37 3.3.4 Phase 3 – Introductory Briefing ............................................................................ 37 3.3.5 Phase 4 – Field Data Collection ............................................................................ 37 3.3.6 Phase 5 – Data Analysis ........................................................................................ 47 iii DOE-HDBK-1233-2019 3.3.7 Phase 6 – Draft Report .......................................................................................... 47 3.3.8 Phase 7 – Exit Briefing .......................................................................................... 48 3.3.9 Phase 8 – Final Report .......................................................................................... 48 3.3.10 Phase 9 – Follow-on Tasks .................................................................................... 48 3.3.11 Summary ............................................................................................................... 48 3.4 Step 4 – Assessment of Risks ........................................................................................... 49 3.4.1 NSDD 298 ............................................................................................................. 49 3.4.2 Risk Determination ............................................................................................... 49 3.5 Step 5 - Application of Countermeasures......................................................................... 50 4.0 MAINTAIN THE PROGRAM .................................................................................... 52 4.1 Management Updates ....................................................................................................... 52 4.2 Recordkeeping .................................................................................................................. 53 4.3 Annual Review/Verification of Critical Information Lists .............................................. 53 4.4 OPSEC Awareness ........................................................................................................... 53 4.4.1 Briefings ................................................................................................................ 54 4.4.2 Learning Styles ...................................................................................................... 54 4.4.3 Activities ............................................................................................................... 55 4.4.4 Concerns ................................................................................................................ 55 4.4.5 Delivering the OPSEC Message............................................................................ 56 4.5 OPSEC Training ..............................................................................................................

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    94 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us