Rohde&Schwarz R&S®ZVB Instrument Security Security

R&S®ZVB Network Analyzer
Instrument Security Procedures
1171.5677.52 ─ 02
Instrument Security Procedures
R&S®ZVB

Contents

Contents
1 Overview................................................................................................. 2
2 Instrument Models Covered..................................................................2
3 Security Terms and Definitions............................................................ 3
4 Types of Memory and Information Storage in the R&S ZVB..............3
5 Instrument Declassification.................................................................. 6
6 Special Considerations for USB Ports.................................................7

1 Overview

In many cases, it is imperative that the R&S ZVB Network Analyzers are used in a secured environment. Generally these highly secured environments do not allow any test equipment to leave the area unless it can be proven that no user information leaves with the test equipment. Security concerns can arise when devices need to leave a secured area e.g. to be calibrated or serviced.
This document describes the types of memory and their usage in the R&S ZVB. It pro­vides a statement regarding the volatility of all memory types and specifies the steps required to declassify an instrument through memory clearing or sanitization proce­dures. These sanitization procedures are designed for customers who need to meet the requirements specified by the US Defense Security Service (DSS).

2 Instrument Models Covered

Table 2-1: Network Analyzer models
Product name Order number
R&S ZVB4 - 2 port 1145.1010.04
R&S ZVB4 - 4 port 1145.1010.06
R&S ZVB8 - 2 port 1145.1010.08
R&S ZVB8 - 4 port 1145.1010.10
R&S ZVB14 - 2 port 1145.1010.14
R&S ZVB14 - 2 port 1145.1010.17
R&S ZVB14 - 4 port 1145.1010.19
2Instrument Security Procedures 1171.5677.52 ─ 02
R&S®ZVB
Security Terms and Definitions
Product name Order number
R&S ZVB20 - 2 port 1145.1010.20
R&S ZVB20 - 2 port 1145.1010.23
R&S ZVB20 - 4 port 1145.1010.25

3 Security Terms and Definitions

Clearing
The term "clearing" is defined in Section 8-301a of DoD 5220.22-M, "National Industrial Security Program Operating Manual (NISPOM)". Clearing is the process of eradicating the data on media so that the data can no longer be retrieved using the standard inter­faces on the instrument. Therefore, clearing is typically used when the instrument is to remain in an environment with an acceptable level of protection.
Sanitization
The term "sanitization" is defined in Section 8-301b of DoD 5220.22-M, "National Industrial Security Program Operating Manual (NISPOM)". Sanitization is the process of removing or eradicating stored data so that the data cannot be recovered using any known technology. Instrument sanitization is typically required when an instrument is moved from a secure to a non-secure environment, such as when it is returned for ser­vice of calibration.
The memory sanitization procedures described in this document are designed for cus­tomers who need to meet the requirements specified by the US Defense Security Ser­vice (DSS). These requirements are specified in the "Clearing and Sanitization Matrix" in Section 14.1.16 of the ISFO "Manual for the Certification and Accreditation of Classi­fied Systems under the NISPOM".
Instrument declassification
The term "instrument declassification" refers to procedures that must be undertaken before an instrument can be removed from a secure environment, for example when the instrument is returned for calibration. Declassification procedures include memory sanitization or memory removal, or both. The declassification procedures described in this document are designed to meet the requirements specified in DoD 5220.22-M, "National Industrial Security Program Operating Manual (NISPOM)", Chapter 8.
4 Types of Memory and Information Storage
in the R&S ZVB
The Network Analyzer contains various memory components.
3Instrument Security Procedures 1171.5677.52 ─ 02
Loading...
+ 4 hidden pages