Compliance Reports: National Industrial Security Program Operating Manual (NISPOM)
The National Industrial Security Program Operating Manual (NISPOM) developed by the Department of Defense, sets comprehensive standards for protecting classified data. All government agencies and commercial contractors who have access to classified data are required to implement system protection processes to ensure continued availability and integrity of this data, and prevent its unauthorized disclosure. These regulations apply to systems used in the capture, creation, storage, processing, or distribution of restricted information.
Dependencies
The NISPOM compliance reports have the following dependencies.
- SA Rules:
Accounts Deleted
Password Changes
Password Changes Summary
Admin Access to Compliance Systems Details
Admin Access to Compliance Systems Summary
User Access to Compliance Systems Details
User Access to Compliance Systems Summary
Logon Failures Details
Logon Failures Summary
Firewall Configuration Changes
Router Configuration Changes
Encryption Failures
Encryption Key Generation and Changes
- App Rules:
account:deleted
account:password-change
account:logon-failure
encryption:failures
encryption:key-gen-and-changes
config:fw-config-changes
config:router-change
account:logon-success
Citations
The NISPOM reports have the following Citations.
- Report Rule: Accounts Deleted
- Citation Number: NISPOM 8-303f
- Citation Description: User ID Removal
- Report Rule: Password Changes - Detail
Password Changes - Top 25 - Citation Number: NISPOM 8-303i(2)
- Citation Description: Protection of Individual Passwords
- Report Rule: Firewall Configuration Changes
- Citation Number: NISPOM 8-311
- Citation Description: Configuration Management
- Report Rule: Router Configuration Changes
- Citation Number: NISPOM 8-311
- Citation Description: Configuration Management
- Report Rule: User Access to Compliance Systems - Detail
- Citation Number: NISPOM 8-806a(1b)
- Citation Description: Audit 1 Requirements; Successful and unsuccessful logons and logoffs
- Report Rule: User Access to Compliance Systems - Top 25
- Citation Number: NISPOM 8-806a(1b)
- Citation Description: Audit 1 Requirements; Successful and unsuccessful logons and logoffs
- Report Rule: Logon Failures - Detail
- Citation Number: NISPOM 8-806a(1b)
- Citation Description: Audit 1 Requirements; Successful and unsuccessful logons and logoffs
- Report Rule: Logon Failures - Top 25
- Citation Number: NISPOM 8-806a(1b)
- Citation Description: Audit 1 Requirements; Successful and unsuccessful logons and logoffs
- Report Rule: Admin Access to Compliance Systems - Detail
- Citation Number: NISPOM 8-806a(1b)
- Citation Description: Audit 1 Requirements; Successful and unsuccessful logons and logoffs
- Report Rule: Admin Access to Compliance Systems - Top 25
- Citation Number: NISPOM 8-806a(1b)
- Citation Description: Audit 1 Requirements; Successful and unsuccessful logons and logoffs
- Report Rule: Encryption Failures
- Citation Number: NISPOM 8-605
- Citation Description: Data Transmission (Trans)
- Report Rule: Key Generation and Changes
- Citation Number: NISPOM 8-605
- Citation Description: Data Transmission (Trans)
