background image

 

Security Terms and Definitions 

Term 

Definition 

Clearing 

As defined in Section 8-301a 

of 

DoD 

5220.22-M

, clearing is the process of eradicating the data 

on media before reusing the media so that the data can no longer be retrieved using the standard 
interfaces on the instrument. Clearing is typically used when the instrument is to remain in an 
environment with an acceptable level of protection. 

Instrument 
Declassification 

A term that refers to procedures that must be undertaken before an instrument can be removed 
from a secure environment, such as is the case when the instrument is returned for calibration. 
Declassification procedures include memory sanitization or memory removal, or both. Keysight 
declassification procedures are designed to meet the requirements specified i

DoD 5220.22-M

Chapter 8. 

Sanitization 

As defined in Section 8-301b of 

DoD 5220.22-M

, sanitization is the process of removing or 

eradicating stored data so that the data cannot be recovered using any known technology. 
Instrument sanitization is typically required when an instrument is moved from a secure to a non-
secure environment, such as when it is returned to the factory for calibration. 
Keysight memory sanitization procedures are designed for customers who need to meet the 
requirements specified by the US Defense Security Service (DSS). These requirements are 

specified in the “Clearing and Sanitization Matrix” in Section 5.2.5.5.5 of the 

Error! Reference 

source not found.

Secure Erase 

Secure Erase is a term that is used to refer to either the clearing or sanitization features of 
Keysight instruments. 

 

Summary of Contents for AC 6803A

Page 1: ...ries Thismanualprovidesthememorydeclassification andsanitationproceduresforthefollowinginstruments KeysightAC6801A AC6802A AC6803A AC6804A KeysightAC6801B AC6802B AC6803B AC6804B Instrument Security I...

Page 2: ...or software described in this document are furnished under a license and may be used or copied only in accordance with the terms of such license Restricted Rights Legend If software is for use in the...

Page 3: ...3 Page intentionally left blank...

Page 4: ...7 Instrument Memory 8 Summary of Memory Declassification Procedures 10 User and Remote Interface Security Measures 11 Administrative Password 11 Remote Access Interfaces 11 Controlling the front pane...

Page 5: ...he Internet at http www keysight com find assist If you do not have access to the Internet please contact your field engineer In any correspondence or telephone conversation refer to the instrument by...

Page 6: ...clearing sanitization or removal For additional information go to http www keysight com find security Be sure that all information stored by the user in the instrument that needs to be saved is prope...

Page 7: ...Keysight declassification procedures are designed to meet the requirements specified in DoD 5220 22 M Chapter 8 Sanitization As defined in Section 8 301b of DoD 5220 22 M sanitization is the process...

Page 8: ...uploads the DSP program which is embedded in the Main Flash memory as a part of instrument firmware data CPU board U29 TMS320VC5502 embedded in the DSP chip Power cycle Flash 1 Mbyte Yes Yes Operating...

Page 9: ...Data Input Method Location in Instrument and Remarks Sanitization Procedure EEPROM 1 Kbyte Yes Yes Recall Panel Info 1st 3rd 256 byte blocks User Preference Info 4th 256 byte block User saved data reg...

Page 10: ...uthorized Keysight Service Center for firmware downloads and recalibration Table 2 User EEPROM 1 Clearing and Sanitization Description and purpose This is the user s partition of internal storage that...

Page 11: ...ing physical access to the I O ports The I O ports must be controlled because they provide access to all user settings user states and the display image The I O ports include USB GPIB and LAN 1 The LA...

Page 12: ...may not be erased not strictly sanitized if the new layout of user s data is different than the old version The instrument may be configured to require a password to allow updating the firmware On the...

Page 13: ...he processor board from the insstrument Refer to the operating and service guide for disassembly instructions Once the processor board is removed 1 Destroy the CPU board and send the instrument to a r...

Page 14: ...22 M National Industrial Security Program Operating Manual NISPOM United States Department of Defense Revised February 28 2006 May be downloaded in Acrobat PDF format from http www dss mil isp fac_cl...

Reviews: