
R&S®ZVB
Network Analyzer
Instrument Security Procedures
(;ÕÆÛÂ)
1171.5677.52 ─ 02
Instrument Security Procedures

R&S®ZVB
Contents
Contents
1 Overview................................................................................................. 2
2 Instrument Models Covered..................................................................2
3 Security Terms and Definitions............................................................ 3
4 Types of Memory and Information Storage in the R&S ZVB..............3
5 Instrument Declassification.................................................................. 6
6 Special Considerations for USB Ports.................................................7
1 Overview
In many cases, it is imperative that the R&S ZVB Network Analyzers are used in a
secured environment. Generally these highly secured environments do not allow any
test equipment to leave the area unless it can be proven that no user information
leaves with the test equipment. Security concerns can arise when devices need to
leave a secured area e.g. to be calibrated or serviced.
This document describes the types of memory and their usage in the R&S ZVB. It provides a statement regarding the volatility of all memory types and specifies the steps
required to declassify an instrument through memory clearing or sanitization procedures. These sanitization procedures are designed for customers who need to meet
the requirements specified by the US Defense Security Service (DSS).
2 Instrument Models Covered
Table 2-1: Network Analyzer models
Product name Order number
R&S ZVB4 - 2 port 1145.1010.04
R&S ZVB4 - 4 port 1145.1010.06
R&S ZVB8 - 2 port 1145.1010.08
R&S ZVB8 - 4 port 1145.1010.10
R&S ZVB14 - 2 port 1145.1010.14
R&S ZVB14 - 2 port 1145.1010.17
R&S ZVB14 - 4 port 1145.1010.19
2Instrument Security Procedures 1171.5677.52 ─ 02

R&S®ZVB
Security Terms and Definitions
Product name Order number
R&S ZVB20 - 2 port 1145.1010.20
R&S ZVB20 - 2 port 1145.1010.23
R&S ZVB20 - 4 port 1145.1010.25
3 Security Terms and Definitions
Clearing
The term "clearing" is defined in Section 8-301a of DoD 5220.22-M, "National Industrial
Security Program Operating Manual (NISPOM)". Clearing is the process of eradicating
the data on media so that the data can no longer be retrieved using the standard interfaces on the instrument. Therefore, clearing is typically used when the instrument is to
remain in an environment with an acceptable level of protection.
Sanitization
The term "sanitization" is defined in Section 8-301b of DoD 5220.22-M, "National
Industrial Security Program Operating Manual (NISPOM)". Sanitization is the process
of removing or eradicating stored data so that the data cannot be recovered using any
known technology. Instrument sanitization is typically required when an instrument is
moved from a secure to a non-secure environment, such as when it is returned for service of calibration.
The memory sanitization procedures described in this document are designed for customers who need to meet the requirements specified by the US Defense Security Service (DSS). These requirements are specified in the "Clearing and Sanitization Matrix"
in Section 14.1.16 of the ISFO "Manual for the Certification and Accreditation of Classified Systems under the NISPOM".
Instrument declassification
The term "instrument declassification" refers to procedures that must be undertaken
before an instrument can be removed from a secure environment, for example when
the instrument is returned for calibration. Declassification procedures include memory
sanitization or memory removal, or both. The declassification procedures described in
this document are designed to meet the requirements specified in DoD 5220.22-M,
"National Industrial Security Program Operating Manual (NISPOM)", Chapter 8.
4 Types of Memory and Information Storage
in the R&S ZVB
The Network Analyzer contains various memory components.
3Instrument Security Procedures 1171.5677.52 ─ 02