GUIDELINES FOR ADP DISASTER PREVENTION AND CONTINGENCY BACK-UP PLANNING
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP79M00096A000100060007-3
Release Decision:
RIPPUB
Original Classification:
C
Document Page Count:
13
Document Creation Date:
December 15, 2016
Document Release Date:
January 22, 2004
Sequence Number:
7
Case Number:
Publication Date:
February 11, 1972
Content Type:
MF
File:
Attachment | Size |
---|---|
![]() | 487.57 KB |
Body:
Approved For Release 200 FID1 - 79M0009 6A0001 QQ@6-%WAnt 1 to
IHC-MM-296
17 February 1972
IBSEC-CSS-R-9
I1FEB1972
MEMORANDUM FOR: Chairman, Intelligence Information
Handling Committee, United States
Intelligence Board
SUBJECT : Guidelines for ADP Disaster Prevention
and Contingency Back-up Planning
1. The attached "Guidelines for ADP Disaster Prevention
and Contingency Back-up Planning[ were developed by the Computer
Security Subcommittee in coordination with the Support Staff of
the Intelligence Information Handling Committee. The Security
Committee approved these Guidelines at its 25 January 1972
meeting.
2. The Guidelines are intended for the use of USIB member
agencies in ensuring against disruption of the computer processing
and exchange of vital information. Throughout their development
no consideration has been given to making them directive in nature.
3. Subsequent to IHC review and approval, I would propose
their issuance and dissemination as a joint product of the SECOM
and IHC.
25X1
Chairman, Securi ommittee
USIB
Approved For Release 2004102/1 P7 00"1"
N A ML xcng and down redin; and
Approv"lF?rReilev/0~1p :fl/,1-i7M,Q?9QQp060007-3
ANP Cni! T I iiGEiICY BACK-UP PL/,?l?~ I MC IBSEC-CSS-R-9
25 Jan 72
provide basic guidance for the development of a
disaster prevention and contingency back--u1} proram for
insuring, the continuous compute-.r processing and exchange of
vital information. To outline the major areas of concern and
1 i st conditions and procedures necessary to insure the
protection of APP assets. To 11st actions and procedures for
consideration in the formulation of a contingency plan.
Guidance set forth herein is based on the premise that
organizations relying heavily on computer system operations
should develop an into rated APP Disaster Prevention and
Contingency Back-Up Program to minimize the severity and
effects of unforeseen computer system disasters. Such
pl a n n ing should be a specific design factor integrated into
total system. planning for each individual W yster:a and its
unique environnent.
I I I . GEi1EPAL C011S I DEPAT I GP;
Potential causes of disaster vary considerably in their
Approved For Release 2004/02/10 : CIA-RDP79M00096A000100060007-3
OFFICIAL USE ONLY
Approved For Release 2O? I -F 9M00096A000100060007-3
PAGE 2
prohah i l ity of occurrence, degree of criticality and
feas i b i l i ty of preventive and/or hack-up measures. Fires,
explosions, toxic fumes, nuclear weapon detonation and the
effects of natural disasters such as earthquakes, hurricanes
and floods can be immediately disastrous resulting in the
death or serious injury to personnel. The damage caused by
such events to computer equipment, the physical structure
housing the system, and the storage media may be disastrous
for an extended period of t 1r?e depending upon resource
recovery capabilities. Other disruptive events such as
outages of electric power or- air conditioning, the loss of
telecommunications facilities or the erasure of vital
information from r.lagnetic storage media are not 1 ikely to be
as serious because back-up measures can be provided.
Al though positive security actions and procedures can reduce
the effects of riots, theft, sabotage and vandal i srn, these
events can Occur and result in disastrous operating
consequences.
IV. DISASTEP ANALYSIS
A disaster includes any incident or event which results
in a critical disruption of the computer operations.
Peschedul inL of work loads according; to user priority nay be
requi red depending upon the al lowable delay of the most
critical user processing r(?quirements. Processing, priorities
1,my also 1) n r- ~c~rI'ed ee
Approved jor" I elease 1v04/62"M-0 `' 6fP -I bOt9MO(YO%AbOOu100b?OQW;3t i a 1
T1'TrIT T. TT.CtiTV
OFFICIAL USE ONLY
Approved For Release 2004/02/10 : CIA-RDP79M00096AO0010006 ,, E3 3
N..,~ w
ope rab 11 1 ty of the system. The disruption can reach major
proportions rendering the system inoperable for a prolonged
period of time and requiring movement of highest priority
processing to an alternate Computer site.
The emergency or back-up act ions needed to restore the
capabilities of a computer system after a disaster has
occurred should be proportionate to the critical effects of
that disaster. These actions may be identified through
consideration of at least the follm,;ing:
1. The event, cause or condition creating the disruption;
The capab i l ity to restore the system;
3. The total period of time the system is expected to be
nonoperational;
The tolerable t i ne-l i ni is of system inactivity based
on user requirements;
5. The feasibility of a degraded mode of system, operation
whereby critical processing could continue; and
G. The ava i 1 ab 11 i ty of an alternate system capable of
assuming the critical processing requirements for a
specified period of tire.
V . MAJOR ARE;"-,S OF COFICER?i AMC; PREVENT I VE 1417- A"') U ['\I ES
The major areas of concern involve the protection of
assets required for computer operation. The protection of
APP assets requires the implementation of various measures
as part of a disaster prevention pro ram. Security and
Approved For Release 2004/02/10 : CIA-RDP79M00096AO00100060007-3
OFFICIAL USE ONLY
OFFICIAL USE ONLY
Approved For Release 2004/02/10 : CIA-RDP79M000996A00010006(p 3 rr
computer personnel should he alert to the passibility that a
disruption in computer activity may be del ibe rate rather
than accidental and Should invest i cate any situation ti-:here
such evidence exists. Although the configuration of computer
systems and the physical environment of computer centers
vary, the following areas are applicable to all systems:
1. System Ilardware: The mechanical, electromechanical,
electronic, magnetic and electrical components of a computer
system.
a. taintenance: Effective. maintenance planning;
represents the initial preventive measure against a
potentially serious disruption of operations.
b. Engineering Support: Technical support should be
available on a 24 hour on-site basis if the computer center
rewires such support. Rack-up of critical hardware parts
should be maintained on-site or in a readily accessible
location.
c. Hardware Secrrrity: The implementation of measures
such as memory protection and user/executive modes of
operation is recommended to insure protection of user data
sets.
2. System Software: Computer prograr.~s and procedures
including system and user programs.
a. Testing; a flew Installation: Duplicate programs
shoul d be run on both the current and proposed system so
Approved For Release 2004/02/10 : CIA-RDP79M00096A000100060007-3
OFFICIAL USE ONLY
OFFICIAL USE ONLY
Approved For Release 2004/02/10 : CIA-RDP79M00096A000100060p -p 5
that the data can be compared. If duplicate testing is not
feasible, a test deck should be used to check the system's
logic.
b. Program Changes and
Testing: Extensive prog ram
debugging is recommended to reduce the number of disruptions
caused by software errors. Any request for a program change
should he submitted in writing and the action authorized
only by a responsible manager. The number of persons
authorized to make changes in operating programs should be
limited. Program testing should be subject to review by
authorized personnel and not conducted solely by the person
who wrote the program.
c. Software Security: Software security measures such
as user identification and authorization should be used to
reduce the poss i b i l i ty of unauthorized personnel accessing
the system.
3. System Operational Personnel: The individuals whose
primary duties are concerned with the operation of the
computer system. .
a. Selection of Key Personnel: Key personnel
designated to continue the operation of a computer system
should be briefed and provided written guidance as to their
responsibilities and duties in the event of a disaster.
5. Training of Key Personnel: Training programs
should be developed Mich stress the proper handling and
Haintenance of computer system components. Key personnel
Approved For Release 261WHIM U 'A V79M00096A000100060007-3
OFFICIAL USE ONLY
Approved For Release 2004/02/10 :CIA-RDP79M00096A00010006G0O7r3 r.
should be broadly cross-trained in the event that certain
key personnel should be unable to respond to an emergency
situaatiOn c. Personnel Security: Computer personnel, visitors
and users constitute a theft and/or sabotage threat to the
computer center. Restrict ions on the nur,mber of people
al 1 owed unescorted access and on the areas to which they
have access are recommended.
It. System Env i ronrment: The computer facility,
supporting utilities and operational posture.
a. Facility (General): The facility housing a
col-iputer system should be constructed of fire resistant
building r:mater1als and equipped uith appropriate smoke
detection, heat sensing and fire fighting devices. Periodic
safety checks of such devices for their operational
capability is encouraged. The use of the FPMR anti the
flat i onal Fire Code volume 5, section 75 is recommended in
the construction of computer facilities. Consideration
should be given to maximum physical protection against the
potentially catastrophic effects of natural disasters
(hurricanes, earthquakes and 171 oods) as wel l as c iv i l
disorder and conventional and nuclear warfare.
l7. Auxi11ary Power and Air- Conditioning:
Malfunctions and failrre s of electric power and/or air
conditioning are two of the major causes of disaster
affecting a computer- system. Provisions Should he i-.)ade for
Approved For Release 20M D U IA4ROR79M00096AO00100060007-3
OFFICIAL USE ONLY
Approved For R lease 2004/02/10 : CIA-RDP79M00096A000100060
~qw PRhL 7
the use of an independent back-ups power source as wel 1 as
providing for immediate repair or replacement of air
conditioning equipment. Consideration of line monitors
and/or- overvoltage protectors to prevent damage from power
failure and powder surges is recommended. Security control s
should he applied to reduce the possibility of willful or
inadvertent damage to the electrical and air conditioning
equipments.
c. Physical Security and Control: Access to the
facility housing the system by other than author i zeal
personnel should be prohibited. The mechanisms installed to
enhance the security of the computer system area Should be
controlled by personnel designated as responsible for their
maintenance and integrity. All procedures relating' to
facility control should be 1n w,!riting and made available to
ass i;g;ned personnel.
5. Data F i les: Storage areas for magnetic s t o r a storage media
should be located outs i('10 the main computer area, preferably
in a vault or secure area depending upon security
considerations. Proper temperature and humidity should be
maintained and cleanliness restrictions should be observed.
All appra)ri atCe eXeCuIt!V0 programs, system docur;ientation,
operation manuals, etc., r0CjL!i red for the computerize d
Processing of informm tion should ho identified, duel icated,
a nsafely stored. se`c!.jri tV prCocedures should be installed
to prevent unauthorized personnel from reriov i ng f i 1 es Such
Approved For Release 2004/02/10 : CIA-RDP79M00096A000100060007-3
OFFICIAL USE ONLY
OFFICIAL USE ONLY
Approved ForR lease 2004/02/10 : CIA-RDP79M000.99600010006QQQQ7C.3 8
tas !`:lial;net IC tapos f k"C7ia the CC,f;1puter center.
G. Coi.imunicat 1on Lines: Recquirements for protecting
coraar:iun i cation 1 ines tiai 1 l vary depend in? upon the existence
and location of remote to rr:i i nal s . The cor;-inun, i cat i on 1 1 nks
froi.a the central processor to the remote consoles are
vul ne ratl e to crosstalk, el e c t ror,iagnet i c rad i at i on and
w-wiretaps. U nprotected data transmission should he
el irninated by use of cryptographic techniques or by physical
security measures. Back-up coraniun i cat i on facilities should
be available to reduce the effect of failures in the
corrriun i cation area.
7. supplies: Supplies that are essential to computer
operations should he identified and accessibility to
baclkk-up suppl ies should be provided.
VI . CO"iT I MGPIOY PLANN I NO
A manual or handbook data I 1 i n? the computer cc rite r
methods of operation in the event of a disaster should be
prepared. I t shoul d specify the contingency or back-up
actions to be taken, individual responsibilities for these
actions and the fol1o%-on investigative anc:i reporting
ree;uIrer,aents. The degree of impier.ientat1on of the
contingency plan t-i11 depend upon the criticality of the
disaster.
Approved For Release 20D4EMD :tZIi -ROW79M00096A000100060007-3
OFFICIAL USE ONLY
Approved For Release 2004/02/10 : CIA-RDP79M00096A000100060007-3
v PAGE 9
Planning for possible emergencies should consider the
recommendations 1 i sted bel ow for disaster prevention and/or
copping with disasters which have occurred.
. Prior Planning
1. Duplication and storage of vital programs,
documentation and data f i les i n a read i 1 y accessible
location, preferably off-site.
2. A determination that the fire safety equipment and
emergency plans are adequate to minimize damage from sr,moke,
chemicals, water or fire.
3. A determination that adequate electrical power, air
conditioning equ i pment, and heat in- systems are available
for back-up use.
It. Training of computer personnel to insure that they
are aware of proper procedures for operating and protecting
equipment and are aware of their responsibilities in the
event of a disaster.
5. Up-to-date 1 i sts of eme r gency and support
organizations and personnel with whom contact ray be
required. This may include medical centers, fire stations,
security services and equipment maintenance services.
Approved For Release 2004/02/10 : CIA-RDP79M00096A000100060007-3
OFFICIAL USE ONLY
OFFICIAL USE ONLY
Approved For rReelease 2004/02/10 : CIA-RDP79M00096 6A A00010006~~~.3 10
6. JAI data being processed should bear a priority of
processing order. Users should be alert to the need for
manual information processing, in the event computer
processing Is not available for low priority processing.
7. Copies of all disaster planning documentation ShOUld
be provided to each major funct1onal area supporting the
organization. Specific roles and responsibilities of each
supporting, function should he closely coordinated.
8. The contingency plan sihoul d be updated pe r i od i cal 1 y
to reflect changes in equipment, user requirements,
personnel , and back-up computer comp)at 1 11 1 ty and
availal it ity.
B. Major Disaster Planning- Contingency planning for a
r,maj or cl1 saste r trh i ch requ i res movement of compute r
processing activities to an alternate site should also
consider the following recommendations:
1. Prior identification of an alternate cog ;,pu.uter system
compatible with in-house systems that can be available if
needed. Physical surrondings of the alternate system should
conform to requ i red seCi.lri ty and safety standards.
Approved For Release 2004/02/10 : CIA-RDP79M00096A000100060007-3
OFFICIAL USE ONLY
Approved F~iwr or R Iease 2024/02/'10: Cfh-RDP~9M0009966A00010006Qp 3
Y,~~L- 1 ~.
2. Identification and designation of personnel to
manage and operate the alternate system should be documented
and updated as the need arises.
3. The computer operations at the alternate site should
be careful 1 y documented. Among other issues, this document
should address Such items as the transportation of alternate
site computer personnel, their responsibilities during
alternate site operations, the necessary security
considerations for the computer environment and the transfer
of classified data to the alternate site, and the priority
processing order of data.
4. Periodic operation of the alternate cormpute r system,
using the duplicate docurmentat i on, software and data files
by the designated alternate system-,a personnel should be made.
results should be compared with normal operations in order
for changes to be effected if required.
5. Instructions for the destruction of classified data
and/or ecruipmnent under combat-emergency conditions whore
such classified materials may be reasonably expected to fall
into the possession of unauthorized persons.
C. Post Disaster Planning
Approved For Release 2004/02/10 : CIA-RDP79M00096A000100060007-3
OFFICIAL USE ONLY
Approved ForrRRelease 2'/91J: CIA-RDP79M000966A~00010006j0Pj 3 12
1. A determination of the criticality of the disaster
considering anticipated time of system inoperability and
user processing requirements.
2 . Immediate notification to management and system
users of the estimated length of delay in operations to
allow the users to consider alternate operational methods.
3. Notification of the appropriate higher levels of
management if the time delay exceeds initial estimates.
4. Contact with the appropriate emergency and support
organizations depending upon the cause and extent of the
disaster.
5. A determination of the feasibility of continued
computer operation in a degraded mode.
. Initiation of actions to move computer operations to
an alternate site if conditions warrant the move.
7. A determination that the disaster has not degraded
the essential system hardware, software or physical security
features and that procedural security controls remain in
effect.
Approved For Release 2Offl2jty ,99M00096AO00100060007-3