
R&S®ZNL
Vector Network Analyzer
Instrument Security Procedures
(;ÜÒK2)
1178682702
Version 03
Instrument Security Procedures

R&S®ZNL
Contents
Contents
1 Overview................................................................................................. 2
2 Instrument Models Covered..................................................................3
3 Security Terms and Definitions............................................................ 3
4 Types of Memory and Information Storage in the R&S ZNL.............. 4
5 Instrument Declassification.................................................................. 7
6 Special Considerations for USB Ports.................................................8
1 Overview
Securing important information is crucial in many applications.
In many cases, it is imperative that the R&S ZNL instruments are used in a secured
environment. Generally, highly secured environments do not allow any test equipment
to leave the area unless it can be proven that no user information leaves with the test
equipment, e.g. to be calibrated.
"Regarding sanitization, the principal concern is ensuring that data is not unintentionally released" [1].
This document provides a statement regarding the volatility of the memory types used
and specifies the steps required to sanitize an instrument.
The procedures in this document follow "NIST Special Publication 800-88: Guidelines
for Media Sanitization" [1].
In addition, recommendations are provided to safeguard information on the R&S ZNL.
References
See the following literature for further information.
[1] Kissel Richard L. [et al.] Guidelines for Media Sanitization = Special Publication (NIST SP) =
NIST SP - 800-88 Rev 1. - Gaithersburg : [s.n.], December 17, 2014.
[2] National Industrial Security Program Authorization Office Defense Security Service (DSS)
Assessment and Authorization Process Manual (DAAPM). - May 6, 2019.
2Instrument Security Procedures 1178.6827.02 ─ 03

R&S®ZNL
Instrument Models Covered
2 Instrument Models Covered
Table 2-1: Vector Network Analyzer models
Vector Network Analyzer
R&S ZNL3 – 2 port 1323.0012.03
R&S ZNL4 – 2 port 1323.0012.04
R&S ZNL6 – 2 port 1323.0012.06
3 Security Terms and Definitions
Clearing
The term "clearing" is defined in Section 8-301a of DoD 5220.22-M, "National Industrial
Security Program Operating Manual (NISPOM)". Clearing is the process of eradicating
the data on media so that the data can no longer be retrieved using the standard interfaces on the instrument. Therefore, clearing is typically used when the instrument is to
remain in an environment with an acceptable level of protection.
Sanitization
The term "sanitization" is defined in Section 8-301b of DoD 5220.22-M, "National
Industrial Security Program Operating Manual (NISPOM)". Sanitization is the process
of removing or eradicating stored data so that the data cannot be recovered using any
known technology. Instrument sanitization is typically required when an instrument is
moved from a secure to a non-secure environment, such as when it is returned for service of calibration.
The memory sanitization procedures described in this document are designed for customers who need to meet the requirements specified by the US Defense Security Service (DSS). These requirements are specified in the "Clearing and Sanitization Matrix"
in Section 14.1.16 of the ISFO "Manual for the Certification and Accreditation of Classified Systems under the NISPOM".
Instrument declassification
The term "instrument declassification" refers to procedures that must be undertaken
before an instrument can be removed from a secure environment, for example when
the instrument is returned for calibration. Declassification procedures include memory
sanitization or memory removal, or both. The declassification procedures described in
this document are designed to meet the requirements specified in DoD 5220.22-M,
"National Industrial Security Program Operating Manual (NISPOM)", Chapter 8.
3Instrument Security Procedures 1178.6827.02 ─ 03