Add document metadata and revision history sections to multiple files, standardizing versioning and update information for improved clarity and tracking.
This commit is contained in:
190
00_document_control/Security_Classification_Guide.md
Normal file
190
00_document_control/Security_Classification_Guide.md
Normal file
@@ -0,0 +1,190 @@
|
||||
# DBIS SECURITY CLASSIFICATION GUIDE
|
||||
## Comprehensive Security Classification Framework
|
||||
|
||||
**Document Number:** DBIS-DOC-SEC-001
|
||||
**Version:** 1.0
|
||||
**Date:** [YYYY-MM-DD]
|
||||
**Classification:** CONFIDENTIAL
|
||||
**Authority:** DBIS Security Department
|
||||
**Approved By:** [Signature Block]
|
||||
|
||||
---
|
||||
|
||||
## PREAMBLE
|
||||
|
||||
This guide establishes the security classification system for all DBIS documents, aligned with DoD 5220.22-M (National Industrial Security Program) and NIST standards.
|
||||
|
||||
---
|
||||
|
||||
## PART I: CLASSIFICATION LEVELS
|
||||
|
||||
### Section 1.1: UNCLASSIFIED
|
||||
|
||||
**Definition:**
|
||||
Information that may be released to the public without damage to national security or DBIS operations.
|
||||
|
||||
**Marking:**
|
||||
```
|
||||
UNCLASSIFIED
|
||||
```
|
||||
|
||||
**Examples:**
|
||||
- Public constitutional documents
|
||||
- General operational procedures
|
||||
- Public-facing documentation
|
||||
|
||||
---
|
||||
|
||||
### Section 1.2: CONFIDENTIAL
|
||||
|
||||
**Definition:**
|
||||
Information that, if disclosed, could cause damage to DBIS operations or member state interests.
|
||||
|
||||
**Marking:**
|
||||
```
|
||||
CONFIDENTIAL
|
||||
```
|
||||
|
||||
**Examples:**
|
||||
- Technical specifications
|
||||
- Operational procedures
|
||||
- Member information
|
||||
- Financial details
|
||||
|
||||
**Declassification:**
|
||||
- Automatic declassification after 10 years
|
||||
- Or upon specific declassification event
|
||||
|
||||
---
|
||||
|
||||
### Section 1.3: SECRET
|
||||
|
||||
**Definition:**
|
||||
Information that, if disclosed, could cause serious damage to DBIS operations or national security.
|
||||
|
||||
**Marking:**
|
||||
```
|
||||
SECRET
|
||||
```
|
||||
|
||||
**Examples:**
|
||||
- Security protocols
|
||||
- Intelligence information
|
||||
- Critical infrastructure details
|
||||
- Cryptographic keys
|
||||
|
||||
**Declassification:**
|
||||
- Automatic declassification after 25 years
|
||||
- Or upon specific declassification event
|
||||
|
||||
---
|
||||
|
||||
### Section 1.4: TOP SECRET
|
||||
|
||||
**Definition:**
|
||||
Information that, if disclosed, could cause exceptionally grave damage to DBIS operations or national security.
|
||||
|
||||
**Marking:**
|
||||
```
|
||||
TOP SECRET
|
||||
```
|
||||
|
||||
**Examples:**
|
||||
- Highly sensitive security information
|
||||
- Critical intelligence
|
||||
- Emergency response procedures
|
||||
- Zero-day vulnerabilities
|
||||
|
||||
**Declassification:**
|
||||
- Automatic declassification after 50 years
|
||||
- Or upon specific declassification event
|
||||
|
||||
---
|
||||
|
||||
## PART II: CLASSIFICATION MARKINGS
|
||||
|
||||
### Section 2.1: Document Markings
|
||||
|
||||
**Required Markings:**
|
||||
- Overall classification (top and bottom of each page)
|
||||
- Classification authority
|
||||
- Declassification date/event
|
||||
- Distribution statement
|
||||
|
||||
**Format:**
|
||||
```
|
||||
[CLASSIFICATION]
|
||||
Classification Authority: [Authority]
|
||||
Declassify On: [Date/Event]
|
||||
Distribution: [Distribution Statement]
|
||||
```
|
||||
|
||||
---
|
||||
|
||||
### Section 2.2: Paragraph Markings
|
||||
|
||||
**Paragraph-Level Classification:**
|
||||
- Mark paragraphs with higher classification than document
|
||||
- Use (C), (S), (TS) for paragraph-level markings
|
||||
- Unmarked paragraphs inherit document classification
|
||||
|
||||
---
|
||||
|
||||
## PART III: DISTRIBUTION STATEMENTS
|
||||
|
||||
### Section 3.1: Distribution Categories
|
||||
|
||||
**Distribution Statement A:**
|
||||
"Distribution authorized to the public; release unlimited."
|
||||
|
||||
**Distribution Statement B:**
|
||||
"Distribution authorized to DBIS members and authorized personnel only."
|
||||
|
||||
**Distribution Statement C:**
|
||||
"Distribution authorized to security-cleared personnel only."
|
||||
|
||||
**Distribution Statement D:**
|
||||
"Distribution authorized to Executive Directorate only."
|
||||
|
||||
---
|
||||
|
||||
## PART IV: CLASSIFICATION GUIDANCE
|
||||
|
||||
### Section 4.1: Classification Criteria
|
||||
|
||||
**Factors for Classification:**
|
||||
- Sensitivity of information
|
||||
- Potential damage if disclosed
|
||||
- Source of information
|
||||
- Age of information
|
||||
- Public availability
|
||||
|
||||
---
|
||||
|
||||
### Section 4.2: Declassification Procedures
|
||||
|
||||
**Automatic Declassification:**
|
||||
- Based on date or event
|
||||
- Automatic review process
|
||||
- Public release procedures
|
||||
|
||||
**Manual Declassification:**
|
||||
- Review request process
|
||||
- Authority for declassification
|
||||
- Public release procedures
|
||||
|
||||
---
|
||||
|
||||
## APPENDICES
|
||||
|
||||
### Appendix A: Classification Examples
|
||||
- Examples of classified information
|
||||
- Examples of unclassified information
|
||||
|
||||
### Appendix B: Declassification Schedule
|
||||
- Automatic declassification schedule
|
||||
|
||||
---
|
||||
|
||||
**END OF SECURITY CLASSIFICATION GUIDE**
|
||||
|
||||
Reference in New Issue
Block a user