EKMS-1B ELECTRONIC KEY MANAGEMENT SYSTEM ( · PDF fileEKMS-1B AMD 9 v “SNAPSHOT”...
Transcript of EKMS-1B ELECTRONIC KEY MANAGEMENT SYSTEM ( · PDF fileEKMS-1B AMD 9 v “SNAPSHOT”...
EKMS-1B
AMD 9
NAVAL COMMUNICATIONS SECURITY MATERIAL SYSTEM
1560 Colorado Avenue
Andrews AFB, MD 20762-6108
EKMS-1B
ELECTRONIC KEY MANAGEMENT SYSTEM
(EKMS) POLICY AND PROCEDURES FOR
NAVY EKMS TIERS 2 & 3
EKMS-1B
AMD 9
i
2250
Ser N5/
05 Apr 2010
Article I. LETTER OF PROMULGATION
1. PURPOSE. EKMS-1B prescribes the minimum policies for
issuing, accounting, handling, safeguarding, and disposing of
COMSEC (Communications Security) material. Also included are
policies for cryptographic and physical security involving
COMSEC material and facilities. This document is not designed
to be read from cover-to-cover. It is meant as a ready-
reference for supervisors and managers involved in the
management, use and accounting of COMSEC material. Readers can
find many immediately useful sections: a glossary of EKMS terms,
a section on how to stand up an EKMS account, a section on how
to conduct a semi-annual account inventory, etc.
2. BACKGROUND. The Electronic Key Management System (EKMS)
which operates through the use of a Local Management Device/Key
Processor (LMD/KP) provides the capability for the automated
generation, accounting, distribution, destruction, and
management of electronic keys, as well as management of physical
key and non-key COMSEC related items. Key management continues
to evolve. These technologies are governed by both National and
Navy policy. The goal of this policy is to balance timely
COMSEC support to a global user community while enhancing
security and minimizing costs.
3. APPLICABILITY.
a. EKMS-1B policies apply to COMSEC materials held by U.S.
Navy, U.S. Marine Corps, U.S. Coast Guard, and Military Sealift
Command EKMS-numbered accounts. These provisions apply to all
who require access to or the use of COMSEC material within EKMS.
All such personnel must be aware that non-compliance or
deviation from the prescribed procedures can jeopardize the
security of the United States and could result in prosecution of
the parties concerned under the espionage laws, Title 18.
U.S.C., Sections 793, 794, and 798.
b. Commands whose holdings include Two-Person Controlled
(TPC) Sealed Authentication System (SAS) keying material are
advised of the following: The policies governing the handling,
safeguarding, and use of TPC SAS material are not in this manual
but can be found in CJCSI 3260.01(series), a required directive
EKMS-1B
AMD 9
ii
for all commands with TPC SAS material holdings. See Article 721
for contact information to obtain a copy of the document, if
required. Requests for disposition of SAS/TPC material must be
addressed to the Controlling Authority per CJCSI
3260.01(series), info the COR. The COR is not authorized to
provide disposition instructions for this material.
4. SCOPE. The policies in this manual have been derived from
those set forth in NSA, OPNAV, SECNAV and other National and
Navy-level COMSEC policy manuals. This guidance supplements but
in no way alters or amends the provisions of SECNAV M5510.30
(series), SECNAV M5510.36 (series) or U.S. Navy regulations.
5. ACTION. EKMS-1B is effective upon receipt and supersedes
EKMS-1A (March 2007).
6. REPRODUCTION. EKMS 1B is authorized for reproduction,
distribution and use in any operational environment and is
available via the NCMS SIPRNET Collaboration at-Sea (CAS)
website located at:
http://www.uar.cas.navy.smil.mil/secret/navy/39/site.nsf.
This manual is also available via NIPR on the INFOSEC website
located at: https://infosec.navy.mil
7. COMMENTS. Submit comments, recommendations, and suggestions
for changes to Naval Communications Security Material System
(NCMS).
J. S. CORREIA
mailto:[email protected]?subject=EKMS-1%20(series)%20FEEDBACK
EKMS-1B
Original
iii
RECORD OF AMENDMENTS
AMEND NUMBER/
IDENTIFICATION
DATE ENTERED
(YYMMDD)
ENTERED BY (Signature,
Rank/Rate, Command Title)
AMD 1 (ALCOM 108/10) 2010/07/06 M. J. PHILLIPS, IA-04, NCMS
AMD 2 (ALCOM 161/10) 2010/10/29 M. J. PHILLIPS, IA-04, NCMS
AMD 3 (ALCOM 020/11) 2011/01/29 M. J. PHILLIPS, IA-04, NCMS
AMD 4 (ALCOM 085/11) 2011/04/30 M. J. PHILLIPS, IA-04, NCMS
AMD 5 (ALCOM 213/11) 2011/12/29 M. J. PHILLIPS, IA-04, NCMS
AMD 6 (ALCOM 111/12) 2012/06/29 M. J. PHILLIPS, GG-13, NCMS
AMD 7 (ALCOM 079/13) 2013/04/23 M. J. PHILLIPS, GG-13, NCMS
AMD 8 (ALCOM 152/14) 2014/10/17 C. W. BENKO, LT, NCMS
AMD 9 (ALCOM 030/15) 2015/02/06 C. W. BENKO, LT, NCMS
EKMS 1B
Original
iv
RECORD OF PAGE CHECKS
DATE
CHECKED
CHECKED BY (SIGNATURE,
RANK/RATE, COMMAND
TITLE)
DATE
CHECKED
CHECKED BY (SIGNATURE,
RANK/RATE, COMMAND TITLE)
EKMS-1B
AMD 9
v
SNAPSHOT of EKMS 1B
ELECTRONIC KEY MANAGEMENT SYSTEM (EKMS) POLICY & PROCEDURES MANUAL
i Letter of Promulgation
iii Record of Amendments
iv Record of Page checks
v SNAPSHOT of EKMS 1B
vii Table of Contents
Chapter 1 - Communications Security Material Control System
(CMCS)
Chapter 2 - Introduction to COMSEC Material
Chapter 3 - CMS Education, Training and Audits
Chapter 4 - Establishment and Maintenance of an EKMS Account
and Associated Responsibilities
Chapter 5 - Safeguarding COMSEC Material and Facilities
Chapter 6 - Maintaining COMSEC Material Allowance
Chapter 7 - Control and Documentation Requirements for COMSEC
Material
Chapter 8 - Disestablishment of an EKMS Account
Chapter 9 - COMSEC Incident Reporting
Chapter 10 - Practices Dangerous to Security
Chapter 11 - Management of Electronic Key
ANNEXES
A - Glossary
B - Commonly Used Abbreviations and Acronyms
C - Controlling Authorities for COMSEC Material
D - Helpful Uniform Resource Locators URLs
E - Status of COMSEC Material Report (SCMR)
F - Accountable Items (A/I) Summary
G - EKMS Account Establishment Request
H - CMS Form 1
I - USTRANSCOM Form 10
J - EKMS Manager or LE (Issuing) Appointment Letter/Memorandum
K - SD Form 572
L - Sample Letter /Memorandum of Agreement
M - Emergency Protection of COMSEC Material
N - Construction Specifications for Storage Vaults
O - Construction Specifications for Fixed COMSEC Facilities
P - Special Physical Security Safeguards for DOD Black-Bulk
Facilities
Q - Generating Station OTAR and OTAT Logs
R - Relaying/Receiving Station OTAT Log
S - COMSEC Points of Contact Listing
EKMS-1B
AMD 9
vi
T - Retention Periods for COMSEC Files, Records, and Logs
U - Completing Locally-Prepared SF-153 COMSEC Material
Accounting Reports
V - Reporting Page Check Discrepancies in COMSEC
Material/Related Devices and CCI
W - Minimum Page Check Requirements for COMSEC Material
X - EKMS Suite
Y - Assuming the Duties of EKMS Manager
Z - AN/CYZ-10 or Data Transfer Device (DTD)
AA - Message Advising NCMS of Navy EKMS Accreditation
AB - Checklist for Secure Telemetry Missile Firings
AC - TALON Cryptographic Token (TCT)
AD - Secure Terminal Equipment (STE)/Associated KSV-21 CARD/
Iridium Secure Module (ISM)
AE- Management of Modern Key
AF- AN/PYQ-10 Simple Key Loader (SKL)
AG- LCMS System Failure and Recovery Procedures
AH- COMSEC Management Workstation (CMWS)/Data Management
Device Power Station (DMD/PS)
AI- OMNI Terminals
AJ- Inventory Reconciliation (Processes and Procedures)
EKMS 1B
AMD 9
vii
TABLE OF CONTENTS
CHAPTER 1 -- COMMUNICATIONS SECURITY (COMSEC) MATERIAL_CONTROL
SYSTEM (CMCS)
101. INTRODUCTION TO THE COMSEC MATERIAL CONTROL SYSTEM
(CMCS).................................................1-3
105. INTRODUCTION TO THE ELECTRONIC KEY MANAGEMENT SYSTEM
(EKMS).................................................1-3
a. TIER 0
b. TIER 1, the Common Tier 1 (CT1), and Primary Tier 1
Segment (PT1S)
c. TIER 2
d. TIER 3
110. NATIONAL SECURITY AGENCY (NSA)....