Rohde&Schwarz ZNB4, ZNB8, ZNB20, ZNB40, ZNBT8 Instrument Security

...
R&S®ZNB/ZNBT/ZNC/ZND Vector Network Analyzer
Instrument Security Procedures
(;ÙÎ32)
Version 07
Instrument Security Procedures
R&S®ZNB/ZNBT/ZNC/ZND

Contents

1 Overview................................................................................................. 2
2 Instrument Models Covered..................................................................2
3 Security Terms and Definitions............................................................ 3
4 Types of Memory and Information Storage......................................... 4
5 Instrument Declassification.................................................................. 6
6 Special Considerations for USB Ports.................................................8
Contents

1 Overview

It is often imperative that R&S ZNB/ZNBT/ZNC/ZND Vector Network Analyzers are used in a secured environment. Generally these highly secured environments do not allow any test equipment to leave the area unless it can be proven that no user infor­mation leaves with the test equipment. Security concerns can arise when devices need to leave a secured area, e.g. to be calibrated or serviced.
This document describes the types of memory and their usage in the R&S ZNB/ ZNBT/ZNC/ZND. It provides a statement regarding the volatility of all memory types and specifies the steps required to declassify an instrument through memory clearing or sanitization procedures. These sanitization procedures are designed for customers who need to meet the requirements specified by the US Defense Security Service (DSS).

2 Instrument Models Covered

Table 2-1: Vector Network Analyzer models
Vector Network Analyzer
R&S ZNB4 - 2 port 1311.6010.22
R&S ZNB4 - 4 port 1311.6010.24
R&S ZNB8 - 2 port 1311.6010.42
R&S ZNB8 - 4 port 1311.6010.44
R&S ZNB20 - 2 port 1311.6010.62
R&S ZNB20 - 4 port 1311.6010.64
2Instrument Security Procedures 1175.6403.02 ─ 07
R&S®ZNB/ZNBT/ZNC/ZND
Vector Network Analyzer
R&S ZNB40 - 2 port 1311.6010.72
R&S ZNB40 - 2 port 1311.6010.82
R&S ZNB40 - 4 port 1311.6010.84
R&S ZNBT8 - up to 24 ports 1318.7006.24
R&S ZNBT20 - up to 24 ports 1332.9002.24
R&S ZNBT26 - up to 24 ports 1332.9002.34
R&S ZNBT40 - up to 24 ports 1332.9002.44
R&S ZNC3 1311.6004.12
R&S ZND 1328.5170.92
Security Terms and Definitions

3 Security Terms and Definitions

Clearing
The term "clearing" is defined in Section 8-301a of DoD 5220.22-M, "National Industrial Security Program Operating Manual (NISPOM)". Clearing is the process of eradicating the data on media so that the data can no longer be retrieved using the standard inter­faces on the instrument. Therefore, clearing is typically used when the instrument is to remain in an environment with an acceptable level of protection.
Sanitization
The term "sanitization" is defined in Section 8-301b of DoD 5220.22-M, "National Industrial Security Program Operating Manual (NISPOM)". Sanitization is the process of removing or eradicating stored data so that the data cannot be recovered using any known technology. Instrument sanitization is typically required when an instrument is moved from a secure to a non-secure environment, such as when it is returned for ser­vice of calibration.
The memory sanitization procedures described in this document are designed for cus­tomers who need to meet the requirements specified by the US Defense Security Ser­vice (DSS). These requirements are specified in the "Clearing and Sanitization Matrix" in Section 14.1.16 of the ISFO "Manual for the Certification and Accreditation of Classi­fied Systems under the NISPOM".
Instrument declassification
The term "instrument declassification" refers to procedures that must be undertaken before an instrument can be removed from a secure environment, for example when the instrument is returned for calibration. Declassification procedures include memory sanitization or memory removal, or both. The declassification procedures described in this document are designed to meet the requirements specified in DoD 5220.22-M, "National Industrial Security Program Operating Manual (NISPOM)", Chapter 8.
3Instrument Security Procedures 1175.6403.02 ─ 07
Loading...
+ 5 hidden pages