About

NCTC Newsroom

Chief Information Officer

IC Technical Specifications

Rollup Guidance for ISM

Overview

This Roll-up Guidance for ISM (ISM-Rollup.XML) provides information on the Roll-up processes for XML Data Encoding Specification for Information Security Markings (ISM.XML) markings. This implementation uses Extensible Stylesheet Language (XSL) to determine what the roll-up security marking for documents marked with ISM.XML should be.

 

This specification is maintained by the IC Chief Information Officer via the Data Standards Coordination Activity (DSCA) and Common Metadata Standards Tiger Team (CMSTT).

 

Technical Specification Downloads

 

Latest Approved Public Release:

 

Mission Requirements

 

This document provides general and prescriptive guidance on rolling-up ISM.XML markings on a given Extensible Markup Language (XML) document.

Chief Information Officer

IC Technical Specifications

CVE Encoding Specification for Role

Overview

This IC enterprise CVE encoding specification defines XML elements and attributes, associated structures and relationships, cardinality requirements, and permissible values for the role attribute as defined in the IC Enterprise Attribute Exchange Between IC Attribute Services Unified Identity Attribute Set (UIAS) Technical Specification.

 

This specification provides a set of values to characterize the entity’s (person or non-person) authorized position, job, or area of responsibility that ties membership to the function that the entity needs to perform the expected task.

 

This specification supports Executive Order (EO) 13526, Classified National Security Information which “prescribes a uniform system for classifying, safeguarding, and declassifying national security information”, across national security disciplines, networks, services, and data.

 

Compliance with this specification is measured against all aspects of the technical and documentary artifacts contained within the specification release package.

 

This specification is maintained by the IC Chief Information Officer via the Data Standards Coordination Activity (DSCA) and Common Metadata Standards Tiger Team (CMSTT).

 

Technical Specification Downloads

 

Latest Approved Public Release:

 

Mission Requirements

 

This CES defines the Role CVEs and contains the approved namespaces and associated taxonomies for the Role attribute and the valid values for populating the components of a role. It provides a common encoding (e.g. common understanding) and foundation for the UIAS attribute role. It also describes the generic format and lexicon for the role attribute. This format and lexicon is used to create specific taxonomies for a given namespace.

 

Although useful in and of itself, the intended use of this specification is to be incorporated into other specifications, in particular UIAS. For this purpose, role is defined by the use of formal language known as ABNF (Augmented Backus-Naur Form). This specification defines rules that explicitly define the content of ABNF which are used to provide a formal description independent of any particular technology.

Chief Information Officer

IC Technical Specifications

Unified Identity Attribute Set - Attribute Practice Compliance Statements

Overview

This Attribute Practice Compliance Statements for the Unified Identity Attribute Set (UIAS-APCS) provides concise direction to Intelligence Community (IC) elements required by Intelligence Community Standard (ICS) 500-30, Enterprise Authorization Attributes: Assignment, Authoritative Sources, and Use for Attribute-Based Access Control Of Resources, to produce an Attribute Practice Statement (APS) for each Attribute Service (AS) of an IC element.

Compliance with an Attribute Practice Compliance Statement (APCS) document ensures interoperability and consistently applied attributes in dynamic Information Technology (IT) environments including the Intelligence Community Information Technology Enterprise (IC ITE). An APCS alleviates the need for each IC element to produce an APS and ensure compliance with ICS 500-30, and IC Enterprise Attribute Exchange Between IC Attribute Services Unified Identity Attribute Set (UIAS.XML).

This UIAS-APCS has a dependency on UIAS.XML. Citations for the Controlled Vocabulary Enumeration (CVE)s are covered in the UIAS.XML technical specification and should be complied with in accordance with the needs and practices of the responding organization, and that such compliance should also designate the reasoning for compliance approach or its variations. The UIAS.XML MUST be consulted in conjunction with this document.

This specification is maintained by the IC Chief Information Officer via the Data Standards Coordination Activity (DSCA) and Common Metadata Standards Tiger Team (CMSTT).

Technical Specification Downloads

Latest Approved Public Release:

Mission Requirements

As the IC environment evolves, the user base grows with more diverse membership with unique data sources per member entity. The IC's move to a simplified architecture for access control and authorization is predicated on ABAC and an IC Authorization service being trustworthy. This drives an increased need to better understand attribute provisioning and ensure that all IC elements provision and maintain access control and authorization related attributes consistently. This document specifies compliance statements to confirm that enterprise identity attributes are consistent with the attributes defined in the UIAS.XML technical specification and that IC elements maintain attributes consistent with Appendix C of ICS 500-30, Operation of ASs and AAS. Compliance with the ICS 500-30 will ensure that all IC elements provision and maintain attributes for availability, accuracy, consistency, privacy, confidentiality, and integrity across persona lifecycles.

Chief Information Officer

IC Technical Specifications

IC Enterprise Attribute Exchange Between IC Attribute Services Unified Identity Attribute Set

Overview

IC Enterprise Attribute Exchange Between IC Attribute Services Unified Identity Attribute Set (UIAS) codifies the minimum set of enterprise-level authorization attributes that IC elements are expected to provide if they participate in the Intelligence Community Unified Authorization and Attribute Service (UAAS) architecture. It provides a common, consistent way to identify IC enterprise authorization attributes of IC persons produced by, stored within, or shared throughout the IC’s TS/SCI information domain. The name, definition, cardinality, and controlled vocabulary for each attribute are defined in order to promote interoperability between UAAS-compliant attribute services established by participating IC Agencies. The set of authorization attributes described in the specification is designed for implementation within products and servers that are capable of supporting the Encrypted Mode option of the OASIS SAML V2.0 Attribute Sharing Profile for X.509 Authentication-Based Systems, Committee Specification 01.

This specification is maintained by the IC Chief Information Officer via the Data Standards Coordination Activity (DSCA) and Web Services Security Working Group (WSS WG).

Technical Specification Downloads

Latest Approved Public Release:

Mission Requirements

IC Enterprise Attribute Exchange Between IC Attribute Services Unified Identity Attribute Set establishes detailed requirements for enterprise-level authorization attributes that IC elements are expected to provide if they participate in the Intelligence Community Unified Authorization and Attribute Service federation. Its function is to facilitate the availability, accuracy, and standardization of these attributes across the IC TS/SCI enterprise, building a consistent basis for the exchange of this information between IC Elements.

Defining the mandatory minimum set of IC enterprise authorization attributes and values for sharing through the IC UAAS federation supports consistent and assured information sharing across the enterprise. The IC UAAS supports Attribute-Based Access Control (ABAC) to promote on-demand access to information and other resources by IC users and services and reduces authorization vulnerabilities by strengthening the access control decision process.

The primary audience for this document is the implementer and/or administrator who must configure an Attribute Service to meet the requirements for participation in the IC UAAS federation. The audience for this document also includes those responsible for implementing and managing the capabilities that create, provide, modify, store, exchange, search, display, or further process IC enterprise authorization attributes. 

Chief Information Officer

IC Technical Specifications

XML Data Encoding Specification for Intelligence Community Enterprise Data Header

Overview

This XML Data Encoding Specification for Enterprise Data Header (EDH.XML) defines detailed implementation guidance for using Extensible Markup Language (XML) to encode EDH data. This Data Encoding Specification (DES) defines the XML elements and attributes, associated structures and relationships, mandatory and cardinality requirements, and permissible values for representing enterprise data header data concepts using XML.

This specification is applicable to the Intelligence Community (IC) and information produced by, stored, or shared within the IC. This DES may have relevance outside the scope of intelligence; however, prior to applying outside of this defined scope, the DES should be closely scrutinized and differences separately documented and assessed for applicability.

This specification applies to the IC, as defined by the National Security Act of 1947, as amended; and such other elements of any other department or agency as may be designated by the President or designated jointly by the Director of National Intelligence (DNI) and the head of the department or agency concerned, as an element of the IC. Joint and Coalition forces may use this specification, but it is not required.

Compliance with this specification is measured against all aspects of the technical and documentary artifacts contained within the specification release package.

This specification is maintained by the IC Chief Information Officer via the Data Standards Coordination Activity (DSCA) and Common Metadata Standards Tiger Team (CMSTT).

Technical Specification Downloads

Latest Approved Public Release:

Mission Requirements

Information sharing within the national intelligence enterprise will increasingly rely on information assurance metadata (including enterprise data headers) to allow interagency access control, automated exchanges, and appropriate protection of shared intelligence. A structured, verifiable representation of security metadata bound to the intelligence data is required in order for the enterprise to become inherently "smarter" about the information flowing in and around it. Such a representation, when implemented with other data formats, improved user interfaces, and data processing utilities, can provide part of a larger, robust information assurance infrastructure capable of automating some of the management and exchange decisions today being performed by human beings.

The Intelligence Community (IC) has standardized the various classification and control markings established for information sharing within the Information Security Markings (ISM) specification. The IC Enterprise Data Header XML specification further expands on this body of work, adapting and extending it as necessary to meet mission-unique needs. By specifying a data object's header information required for exchange on the IC Enterprise, EDH ensures a secure method of information sharing and discovery, supporting use cases such as the IC Cloud.

Subcategories

National Counterterrorism Center