AR 380-28 DEPARTMENT OF THE ARMY SPECIAL SECURITY SYSTEM
MilReg AR 380-28 Frequently Asked Questions

What is Army regulation AR 380-28?
Army regulation AR 380-28 is a Department of the Army Special Security System that establishes the policies and responsibilities for managing, safeguarding, and controlling special security systems.

Who does AR 380-28 apply to?
AR 380-28 applies to all Department of the Army activities and personnel involved with the management, operation, and maintenance of special security systems.

What is a special security system?
A special security system refers to any computer system or network that stores, processes or transmits classified information for the Department of the Army. It includes hardware, software, firmware, and communication components.

What are the key responsibilities of personnel under AR 380-28?
Personnel are responsible for identifying, reporting, and mitigating potential threats to special security systems, maintaining the physical and technical security of these systems, and ensuring compliance with all applicable security regulations.

How should special security system operators be trained?
Special security system operators should receive appropriate training on the operation, maintenance, and security requirements of the systems they are responsible for. This training should be provided by qualified instructors and periodically updated.

Are there any specific physical security requirements mentioned in AR 380-28?
Yes, AR 380-28 contains detailed physical security requirements for special security systems, including restrictions on access, protection of equipment and media, and measures to prevent unauthorized tampering or removal.

What are the reporting requirements for incidents involving special security systems?
Any incidents, breaches, or suspected compromise of special security systems must be reported immediately in accordance with the procedures outlined in AR 380-28. The appropriate security office and law enforcement authorities should be notified promptly.

What are the limitations on connecting special security systems to external networks?
Connecting special security systems to external networks must be done in accordance with established procedures and require proper authorization. Such connections must not compromise the security or integrity of the system.

Can special security system documentation be released to the public?
No, special security system documentation must be marked and handled in accordance with appropriate classified information handling procedures. Unauthorized release of this documentation can jeopardize national security.

MilReg Top Army Regulations