RESPONSE TO DIRNSA CONCERNING CAPABILITIES PROGRAMMING AND BUDGETING (CPB) COMPUTER SUPPORT
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP85-00142R000100370002-1
Release Decision:
RIPPUB
Original Classification:
T
Document Page Count:
18
Document Creation Date:
December 23, 2016
Document Release Date:
April 19, 2013
Sequence Number:
2
Case Number:
Publication Date:
January 12, 1983
Content Type:
MEMO
File:
Attachment | Size |
---|---|
CIA-RDP85-00142R000100370002-1.pdf | 837.78 KB |
Body:
Declassified in Part- Sanitized Copy Approved forRelease2013/04/19 : CIA-RDP85-00142R000100370002-1
STAT
STAT
ROUTING AND RECORD SHEET
SUIUKTs (001
II
Response to DIRNSA Concerning Capabilities Programming
and Budgeting (CPB) Computer Support
?DP-Pi-04
F4066
EXTENSION
NO.
DCl/IC 83-3505
Director,
Staff
Intelligence Community
DATE
12 January 1983
TO: (OfRaiies4_ignotion,
building)
a,1.0
room number, and
_ cc,st?
es
DATE
OPFKER'S
INITIALS
COMMENTS (Numb*, teach comment to show from whom
so whom. Draw a lino across column after each tommont.)
REMO
FORWAKIED
L D/ODP
Rm 2D0
HOS 25 JAN
1983
2 5 JAN
(lid'
67,~4.0
tie...44.
Ale:4i-
iN-4--
qrilv/5).
,
2.
i.
?rm ,A2 ?, 7..0,44
)V 64/1;f4t
tr Tcr"-'
?
3.
cleite()
36-
flr
4.
..
5.
tt
k ? .
6.
7.
1
8.
!
9.
1
10.
11.
11
,
13.
14.
15.
FORM 610 USID17741?Uld
1-79
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
STAT
STAT
DCl/IC 83-3505
12 January 1983
MEMORANDUM FOR: Deputy Director of Central Intelligence
FROM:
SUBJECT:
REFERENCES:
Director, Intelligence Community Staff
Response to DIRNSA Concerning Capabilities Programming
and Budgeting (CPB) Computer Support
a. Memo to DIRNSA from ADM Inman dtd 22 Feb. 1982, subj:
Community Data Processing Support for CPB
b. Memo to DDCI from DIRNSA dtd 15 March 1982 same subject
c. Memo to DDCI from DIRNSA dtd 27 Dec. 1982 same subject
1. Action Requested: That you sign the attached memorandum to
Lt. General Faurer.
2. Background:
On 22 February ADM Inman sent reference a to DIRNSA asking for NSA's
assistance in providing improved computer support to a range of budget
activities conducted by the ICS and the Community's program offices. DIRNSA's
initial response, in reference b, suggested that more details were required
before he could commit to the requested support. Since then, additional
discussions between our staffs have occurred; congressional concerns about the
effort have been alleviated by our agreeing not to use a computer solely
dedicated to this function; and after seemingly endless delays within NSA,
they propose to provide the support outlined in DIRNSA's latest memorandum of
27 December (reference c).
3. The attached response accepts their proposal with two mild caveats.
First, because DIRNSA's memorandum is mute on NSA's willingness to provide at
FOC communications to program offices other than those to be connected at IOC,
we have included a reminder of this requirement in paragraph 1. Second, you
will note that NSA's proposal includes a very conservative schedule for system
completion that provides a comfortable hedge against all contingencies. As
alluded to in paragraph 2 of your response, we remain hopeful that the job
will prove less complex than they originally estimated, and at least some of
the requested capabilities will be available late this year. Thus far
cooperation at the working level has been quite good.
Attachment:
As stated
, ?+(ear Aamiral, USN
All Portions of this
Memorandum are UNCLASSIFIED
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
Declassified in Part- Sanitized Copy Approved forRelease2013/04/19 : CIA-RDP85-00142R000100370002-1
ine Deputy Director of Central Intelligence
IWashington. D C.20505
STAT
1s JIVI 1983
MEMORANDUM FOR: Lieutenant General Lincoln D. Faurer, U.S. Air Force
Director, National Security Agency/
Chief, Central Security Service
SUBJECT: Community Data Processing Support
for Capabilities Programming and Budgeting
3? 5
1. I was pleased to receive your memorandum of 27 December agreeing to
help the IC Staff establish improved computer support for Community budget
activities. As you described, the system at IOC will include electrical
connections amona oroaram offices at NSA, the IC Staff, the CIA, the DIA, and
In addition, if the development proceeds as
we anticipate, to achieve FOC we will need NSA's assistance in establishing
electrical connections for at least some of the remaining seven NFIP
members. These additional communications would be required no sooner than
CV 1984, and all software required by these remaining program offices would be
developed by the IC Staff.
2. In all other respects your proposal agrees with our expectations.
Although I am hopeful that the currently projected IOC completion date will
prove conservative, I understand that a more detailed specification of
requirements is necessary before it can be reevaluated and possibly
advanced. In the interim, I am told that the necessary detailed discussions
are under way and proceeding well.
IS '
John N. McMahon
All Portions of this
Memorandum are UNCLASSIFIED
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
-- Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
iv1/4.:11/4._
Mshingt. cm. D C20505
?7r1
25X1
22 February 1982
MEMORANDUM FOR: Lieutenant General Lincoln D. Faurer, USAF
Director, National Security Agency/
Chief, Central Security Service
SUBJECT: Community Data Processing Support for
Capabilities Programming and Budgeting (CPB)
1. As you are aware, the new Capabilities Programming and Budgeting
System (CPB) is being implemented by NFIP component organizations commencing
with the FY 1984 budget cycle. A major element of the CPB system is the .
concurrent development of data processing support that Community program
offices can use to prepare, edit, and communicate with the Intelligence
Community Staff the data and text that comprise their budget submissions and
justification material for the Congress. (U)
2. The concept of operations for the proposed system is straightforward
and can be summarized as follows: NFIP components will have electrical access
to a Community computer, using, wherever possible, existing word processing
stations as terminals. The central computer will serve as a communications
medium between the ICS and all components. In addition, the ICS and some
components will use the Community computer to maintain and manipulate their
detailed budget data. Other components may choose to use their in-house
computers for data base maintenance and provide updates to the Community
computer as required. Data and text will be merged to produce required
displays using word processor stations--first as terminals to generate and
retrieve numeric reports on the mainframes, and then as word processors to add
the narrative descriptions. Combined displays will then be communicated with
the ICS through the Community computer, edited as required during budget
review, and ultimately form the basis for large portions of the Congressional
Budget Justification Books (CBJBs). CBJB material will be communicated from
the Community computer to the Printing and Photography Division at CIA for
photo composition and printing. (U)
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19 : CIA-RDP85-00142R000100370002-1
- Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
SUBJECT: Community Data Processing Support for Capabilities
Programming and Budgeting (CPB)
? 3. My goal is to have an initial capability as outlined above
operational by 1 August 1982 for the larger NFIP components (i.e., CCP, CIAP,
25X1 GDIP, and for the entire Community in 1983. My staff has
discussed the requirements for the system with a number of Community
participants, and it is apparent that to achieve this goal we must take
advantage of efforts already under way that are relevant to the task.
Discussions with NSA personnel indicate that N2 is currently developing an
internal capability analogous to that envisioned for the Community system, and
much of the hardware, software, and data processing expertise being applied to
the NSA system appears to be directly applicable to Community needs. For this
reason, I request that NSA take the lead in providlna the necessary ADP support
25X1 to fully implement the CPB system across the NFIP.
4. As an initial step, I propose that your representatives meet with the
IC Staff to more fully detail the system requirements. An important considera-
tion in formulating the requirements is to size the Community computer to
handle both the CPB task and other Community applications that are candidates
for eventual implementation on the Community machine. Future NSA support,
perhaps in conjunction with other NFIP components, may be required for these
activities as well How v r my near-term priority is clearly CPB
25X1 implementation.
25X1
25X1
25X1
25X1
The IC Staff action officer for this task is (secure
I believe close coordination between all participants is essential
roug out the development process the system meets Community needs
within the short time available.
Admiral, U. S. Navy
2
CONFIDENTIAL
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
Araia411419*
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19 : CIA-RDP85-00142R000100370002-1
?-?c ITRAL SECURITYSERVICE
FORI GEORGE G. MEADE. MARYLAND 20733
a
CONFIDENTIAL
Serial: N0288
15 March 1982
MEMORANDUM FOR THE DEPUTY DIRECTOR OF CENTRAL INTELLIGENCE
SUBJECT: Community Data Processing Support for Capabilities
Programming and Budgeting (CPB) (U)
1. (U) The requirement outlined in your memorandum of 22 February is
a complex problem which I regret cannot be fully resolved in time to meet
your 1 August operational goal. I believe that the first objective of our
staffs should be to develop a more complete and detailed specification,
decide the relative priorities of the various capabilities required, and
evaluate the potential of existing systems and software. Then a system
concept and phased implementation schedule can be developed, along with
alternative approaches that may result in a limited capability for the
FY 1984 budget cycle.
T4, 4779 secure.
?
L NCCLN D. FAURER
Lieutenant General, USAF
Director, NSA/Chief, CSS
CONFIDENTIU
(1)
25X1
CLASSIFIED BY, NSA/CSSNI 123-2
REVIEW ON
neclassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
? Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
NATIONAL SECURITY AGENCY
CENTRAL SECURITY SERVICE
FORT GEORGE G. MEADE, MARYLAND 20755
Serial: N-1505-82
27 December 1982
lai4OrA
ri
MEMORANDUM FOR THE DEPUTY DIRECTOR OF CENTRAL INTELLIGENCE
SUBJECT: Community Data Processing Support for Capabilities
Programming and Budgeting (CPB)
1. Our staffs have completed their specification and
evaluation efforts, as described in my memorandum of 15 March.
They have produced a proposal which is within the congressional
guidance for CPB processing support for the Intelligence Community
(IC) Staff. This proposal is to use our Administrative Computer,
on which we perform our CPB processing, and to use the software
packages on this system to develop CPB support for the IC Staff.
2. Our staffs have defined a minimum set of requirements
that will be met as the initial operating.capability (IOC) of
the system. The attached statement of requirements provides
a detailed description of these requirements. In brief, the
functions to be performed at IOC are:
a. Connect the NSA host system with communications to
STAT the IC Staff, the CIA, the DIA
\C C
b. Provide an electronic mail capability between the
users to support exchanges concerning congressional questions
and their answers, for example.
c. Provide a capability to store and forward files,
such as the Congressional Budget Justification Book narratives.
d. Connect existing word processing terminals to the
system, if practicable.
e. Provide system access and data access security.
f. Provide a demonstration data base.
After IOC, the existing data base support for the IC Staff would
be replaced on the Administrative Computer. The development of
this support would be under the same data base system that we
use for our CPB processing and would have compatibility of the
two systems as a design goal.
I
-
' t
FOR OFFICIAL USE ONLY
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
,
??
Serial: N-1505-82
3. The delivery of the capabilities described above
(items a. through f.) will require some three man years over
a 12-month period, primarily to accomplish the communications
work. NSA will provide the manpower to work communications
for the host computer to the various agencies. Communications
within each agency would be the responsibility of that agency.
The development of the data base capability, to replace the '
existing IC Staff CPB data base system, will require some nine
man years, over a 24-month period. Our computer organization
will provide four man years of effort; our program and budget
organization will provide one man year of effort; and the IC
Staff will provide four man years of effort. Informal discus-
sions with the staff have resulted in the identification of
two persons who will work full time at NSA in the development
of the data base system.
4. After the IOC system and the data base capability
have been delivered, our computer organization will provide an
additional four people full time for operations and software
life-cycle support. The IC Staff will provide the personnel
to do the development of any new applications software or
enhancements to the delivered applications and to provide user
support.
End:
a/s
5. I trust this proposal meets with your agreement.
NCOLN D. FAURER
Lieutenant General, USAF
Director NSA/Chief, CSS
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
Capabilities Programming and Budgeting System
1. Introduction:
The basic requirement for an Intelligence Community Capa-
bilities Programming and Budgeting (CPB) System was stated by
the Deputy Director for Central Intelligence in his memorandum,
to General Faurer, dated 22 February 1982. His statement of
the requirement is as follows:
NFIP components will have electrical access to a Com-
munity computer, using, wherever possible, existing word
processing terminals. The central computer will serve
as a communications medium between the ICS and all
components. In addition, the' ICS and some components
will use the Community computer to maintain and manipulate
their detailed budget data. Other components may choose
to use their in-house computers for data base maintenance
and provide updates to the Community computer as required.
Data and text will be merged to produce required displays
using word processor stations--first as terminals to
generate and retrieve numeric reports on the mainframes,
and then as word processors to add the narrative discrip-
tions. Combined displays will then be communicated with
the ICS through the Community computer, edited as required
during budget review, and ultimately form the basis for
large portions of the Congressional Budget Justification
Books (CBJBs). CBJB material will be communicated from
the Community computer to the printing and Photography
Division at CIA for photo composition and printing.
Discussions with representatives of the Intelligence Community
Staff (ICS) have identified a subset of the overall requirement
which represents the minimum essential requirement (MER) for an
initial operating capability (IOC). The following paragraphs
further define the overall IOC requirement. The MER requirements
are divided into four subsets of requirement: functional require-
ments, security requirements, performance requirements and system
requirements. Functional requirements are the requirements the
user has for specific functions to be performed. Security require-
ments are the user's requirements for access to and protection of
the system, the data on the system, and the functions of the
system. Security requirements also include the physical security
(TEMPEST) requirements for the hardware and terminals. Performance
requirements are the user's requirements for the system's availability
and responsiveness. System requirements are a function necessary to
meet the user requirements defined under the three categories
described above.
ENCLOSURE
-1-
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
STAT
?
? 2. IOC Requirements
The IOC CPB system requirements are as follows:
2.1. Functional Requirements
The functional requirements for the IOC CPB system are: for
a word-processing function, supported by communications linking
existing word-processing capabilities at the ICS, CIA, DIA, NSA,
with the community computer; an
and forward data function; and
a prototype of these requirements follows.
electronic mail function; a store
2.1.1 Word-Processing Function
The fundamental word-processing requirement is to enable
existing word-processing terminals at the NFIP components noted
above to access the community computer. The actual word-processing
function will be performed on the word-processing terminals with
output to be made available to the community computer. The com-
munications requirement to support this access is covered under
system requirements.
While the community computer will not be expected to support
a full word-processing function, it should be able to support the
editing of sequential files.
2.1.2. Electronic Mail Function
The electronic mail function is intended to supply the users
with a means of communicating with each other via the system.
The specific functions to be supported are:
a. Exchange informal correspondence and notes with
other users.
b. Exchange formal correspondence with other users.
c. Exchange congressional questions and answers with
other users.
d. Retrieve mail by subject.
e. Edit mail messages before
users.
f. Retain mail messages for a
receipt.
-2-
releasing them to other
period of time after
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
g.
Submit mail messages prepared on a word-processing
terminal for inclusion in the mail system.
h. Archive congressional questions and answers and
formal correspondence included in the mail system.
2.1.3. Store and Forward Function
The store and forward function provides the ability to
transfer files between the user's word processors or in-house
computers and the community computer. This function will be
used for the following purposes:
a. The transfer to and storage on the community computer
of files generated on the user's word processors.
This will include narrative files supporting budget
submissions and CBJB narrative.
b. The transfer of files stored on the community computer
to the user's word processors. This also will include
narrative files supporting budget submissions and
CBJB narrative.
c. The transfer and storage of individual updates to the
user's word processors. This also will include nar-
rative files supporting budget submissions and CBJB
narrative.
d. The transfer and storage of bulk updates to the ICS
CPB data base. These updates will normally have been
generated on the user's in-house computer.
e. Files transferred and stored on the community computer
must be available in hard or soft copy to the ICS.
2.1.4. Prototype Data Base Function
The prototype data base requirements is, as far as is prac-
ticable, to be able to demonstrate some of the CPB Data Base
features that will be required for the data-base support of the
system. The capabilities to be demonstrated, in relative priority,
are as follows:
a. to retrieve data using predefined queries,
b. to make ad hoc (interactive and batch) retrievals of
data,
c. to apply updates (interactive and batch) against the
data base,
-3-
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
: Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
d. to restrict access to the data base and to restrict
access to specific data within the data base,
e. to protect the data integrity of the data base,
f. to use formatted screens for ease of user data entry
and access to the data base,
g. to use data-base administration tools.
2.2. Security Requirements
The basic security requirements are as follows:
2.2.1. TEMPEST
The hardware and terminals will need to meet the appropriate
TEMPEST criteria.
2.2.2. System Access
The host system on which the CPB system resides must support
control of user access to the system. This will involve a means
of identifying users that are authorized to access the system and
of authenticating them at the time they attempt to gain access.
This access mechanism also must be able to control access to
specific capabilities on the system, such as access to the CPB
system.
2.2.3. Data Access
The system must support control of user access to data. This
includes access to data base files, to sequential files that are
not physically part of the data base, and to mail files. Within
the Capabilities Programming and Budgeting Data Base, access to
the data must also be controlled at the record level.
The file access levels of control are: access not allowed,
read only access allowed, read and write access allowed. The
system must allow the owner of a file to establish the access level
of other users. The data base administrator is considered the
owner of the CPB Data Base and will establish the access level for
all users of the data base. The owner of a sequential file will
establish the access level for other users of that file. The
system default access for all files must be no access allowed, to
ensure that access to a file will be determined by the file owner.
The only access to the data not controlled by the data-base
adminstrator for the CPB Data Base or by the owner of a sequential
file will be that necessary to ensure the integrity of the system;
that is, access to the data will be available to the system
administrator and to the security administrator, as a matter of
necessity.
-4-
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
? Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
,
For those users authorized access to the CPB Data Base,
access control at the record level will determine whether a
user is authorized access to all or only some of the records
in the data base. This level of access control will be based
on an individual's clearance level and need to know.
2.2.4. Security Audit Trail
The system must support the logging of an audit trail
to record attempts to access the system and attempts to access
files. The DBMS which support the CPB Data Base should support
the logging of an audit trail to record accesses to the data
base and its data. Failure to provide the proper authentication
for the attempted level of access, (system access, file access
or data base access) also should be recorded.
2.3. Performance Requirements
The performance requirements establish the criteria for
system availability, system responsiveness, and for the time
to perform various system functions, such as recover/restore
a file. The requirements are:
2.3.1. Availability
a. The system must be available for interactive use
from 0630 to 1830, Monday through Saturday, during
the months of February through August.
b. The system must be available for interactive use
from 0630 through 2130, Sunday through Saturday,
during the months of September through January.
c. Overall availability of the system (hardware and
software) should be 95 percent.
d. The system must be available for overnight batch
updates to the data base.
2.3.2. Response Time
a. The system should respond within 2 seconds to
command-level instructions, edit session instruc-
tions, etc.
b. The system should respond within 10 seconds to
data-base actions.
(Since this system operates on a large multiple use
system, these response times may not always be satisfied.)
-5-
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
STAT
STAT
2.3.3. Throughput
Batch updates to the data base should be accomplished within
1 hour. At IOC there will be no other batch processing with any
specific throughput requirement.
2.3.4. Recover/Restore Files
Recovery/restoration of files, when required, should be accom-
plished with 3 hours from the time the file becomes unavailable.
2.4. System Requirements
2.4.1. Communications Requirements
At IOC the system will need commullications to support both
interactive and RJE access for remote terminals, both CRTs and
printers. The remote terminals will be located at the IC Staff.
NSA, CIA, DIA (Pentagon), and
(Pentagon). For all users but the IC Staff, the interactive
support should be via lines with a 9.6KB speed. The terminals
to be connected are Xerox 860 terminals at NSA, DIA and the
and either NBI or WANG
terminals at the IC Staff and CIA. Both types of terminals
should be interfaced via an emulator to operate in 3270 mode.
Initially there will be no more then 25 terminals to be con-
nected to the system.
2.4.2. Hardware Requirements
The CPB system will reside on the NSA Administrative system,
an IBM 3081. The hardware requirements for the IOC system are as
follows:
a. The terminal requirement is to be met by existing
word-processing terminals, as far as is practicable.
The terminals, therefore, must be capable of inter-
facing to the IBM mainframe.
b. The hardware configuration must be capable of sup-
porting 20-25 terminals at IOC.
c. The system should have at least 5 billion bytes of
real DASD available for user files.
d. The system should be able to support simultaneous
journaling and output on tape drives.
e. The system configuration should be suitable for
ease of switching to a back-up system.
-6-
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
2.4.3. Software Requirements
The CPB system will use software packages that are already
in use on the Administrative system. No requirement for other
software packages exists for the IOC system.
2.4.4. Back-Up Requirements
a. System back-up
The CPB system requires a back-up capability for
any period of system unavailability that is expected
to exceed eight hours. The back up capability must
be able to meet all of the CPB functional and
security requirements. It is recognized that the
back-up capability may not be able to meet all of
the CPB performance requirements.
b. File back-up
Data base files will need to be backed up once a
day, for system back-up purposes. If the DBMS
provides automatic recovery, no further back-up of
the data base files will be necessary. If there
is to be no automatic recovery by the DBMS, the
data base files will need to be backed up twice a
day. Sequential files related to the data base
and all mail files will need to be backed up once
a day.
The daily back-up of files should be done out of
normal operating hours (see Availability Require-
ments, above). If the data base files are to be
backed up twice a day, the second back-up should
be done during the operating day, at a point
approximately midway between the beginning and
ending of the operating day, to ensure that data
base file problems do not affect more than half
a day's work.
2.4.5. File Retention On-line
a. Data base files for budget years that no longer
need to be two budget years immediately preceding
the budget year being built will need to be on-line.
In addition, "snap shots" of the data base will be
taken at various key points in the budget cycle.
These "snap shots" for the budget year and the
preceding two years will also need to be on-line.
Data for the two years preceding the budget year
at IOC will need to be converted from the previous
format to the CPB data base format.
-7-
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
. Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
b. Sequential files which store budget submission and
CBJB narratives should be retained on-line in the
same fashion as the CPB data base. Personnally
owned sequential files should be subject to auto-
matic deletion after a period of time or period
of disuse.
c. Mail files will remain on-line in accordance with
the procedures established by the Data Base
Administrator.
2.4.6. File Retention Off-line
a. Data base files for budget years that no longer
need to be on-line will be archived to tape for
indefinite retention. The data base administrator
will be responsible for invoking the archival
procedure for the CPB data base.
b. Sequential files containing CBJB narrative or the
narrative accompanying program budget submissions
will be archived to tape for indefinite retention.
The data base administrator will be responsible for
invoking the archival procedure for these sequential
files.
c. Congressional questions and answers and formal
correspondence that no longer need to be on-line
will be archived to tape for indefinite retention.
The owner of these mail files will be responsible
for staging them from the mail system. Periodically
mail files so staged will be archived to tape.
2.4.7. Recovery Requirements
In addition to standard system recovery procedures, the
system operators will be required to implement recovery procedures
that will be defined during implementation planning. These pro-
cedures will cover any automatic and/or manual data base recovery
and the recovery of sequential and mail files. AT IOC there
will be no requirement for automatic recovery other than that
identified for the data-base management system.
2.4.3. Support Requirements
a. The CPB system requires that configuration management
procedures be adopted to cover system (hardware and
software) changes, application software changes,
changes to the data base, and the validation and
handling of new requirements. These procedures will
be in accordance with the management plan that will
be defined during the implementation planning.
-8-
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19 : CIA-RDP85-00142R000100370002-1
: Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
-*-. . ?
b. The CPB system requires that system adminis-
tration functions, such as space management
and the providing of systems information to
users, be available.
c. The CPB system requires that a Data Base
Administrator (DBA) be named to control the
CPB Data Base. The DBA will be a member of
the IC Staff data processing staff. He will
be responsible for granting access to the
data base, establishing security levels within
the data base, overseeing the integrity of the
data base, performing various data-base functions,
controlling the data dictionary, and participating
in any change control board governing the CPB
Data Base. The DBA will also be responsible for
determining standards and establishing procedures
for sequential and mail files.
d. The CPB system requires that a system security
administrator be named to control access to the
system, data base and files. The system security
administrator will be responsible for maintaining
all password files and will be the ultimate
authority for security matters concerning the
CPB system.
-9
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
25X1
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1
R
Next 1 Page(s) In Document Denied
Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1