COMPUTER SECURITY REGULATION
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP87B01034R000500150004-1
Release Decision:
RIFPUB
Original Classification:
C
Document Page Count:
14
Document Creation Date:
December 16, 2016
Document Release Date:
August 11, 2005
Sequence Number:
4
Case Number:
Content Type:
REGULATION
File:
Attachment | Size |
---|---|
CIA-RDP87B01034R000500150004-1.pdf | 712.82 KB |
Body:
Approved For Release 2 00 5 /0 8124:CIA-RDP87BO1034R000500150004-1
DIRECTOR OF CENTRAL INTELLIGENCE
COMPUTER SECURITY REGULATION
(Attachment to DCID 1/16, "Security of
Foreign Intelligence in Automated Data
Processing Systems and Networks")
Approved For Release 2069169P TtEA-RDP87B01034R00D500150004-1
Approved For Release 2005/08/24: CIA-RDP87BO1034R000500150004-1
CONFIDENTIAL
COMPUTER SECURITY REGULATION
Page
CHAPTER I
Introduction ..................................................................................
1
CHAPTER II
Modes of Operation and Minimum Security Requirements for
Processing and/or Storing Intelligence Information in ADP
Systems ......................................................................................
3
11.1. General Security Requirements ..........................................
3
11.2. Modes of Operation and Minimum Security Require-
ments ..............................................................................
3
II.2.a. Dedicated Mode ......................................................
3
II.2.b. System High Mode ................................................
4
II.2.c. Compartmented Mode ............................................
5
CHAPTER III
ADP Networks ..............................................................................
9
111. 1. Definition ............................................................................
9
111.2. Responsibilities for ADP Network Security Administra-
tion ..................................................................................
10
111.3. Accreditation Process ..........................................................
12
III.4. Minimum ADP Network Security Requirements .........
12
GLOSSARY ................................................................................................................ 15
VI' NO 153
Approved For Release 200Nb R~~ RDP87BO1034R008500150004-1
Approved For Release 2005/08/24: CIA-RDP87BO1034R000500150004-1
CONFIDENTIAL
CHAPTER I
I.I. Director of Central Intelligence Directive No. 1/16 (DCID 1/16) requires
National Foreign Intelligence Board (NFIB) member agencies and all other United
States Government departments and agencies processing and/or storing intelligence
information in ADP systems and networks to establish and maintain a formal ADP
Security Program to ensure adequate protection of intelligence information. This
Regulation is promulgated to establish the minimum security requirements for the
allowed operating modes of an ADP system or network as defined in Chapters II and
III. ADP security programs shall be based on the provisions of this Regulation and
DCID 1/16.
1.2. All ADP systems and networks, not exempted in DCID 1/16, processing and/or
storing intelligence information must meet the requirements prescribed in Chapters II
and III of this Regulation. Accreditation, as prescribed herein, is required for the
operation of each ADP system and network. The accreditation is contingent upon the
results of a recurring review, testing, and favorable evaluation of employed security
features. These security features shall include hardware/ software features, operating
procedures, accountability procedures, access controls, management constraints, phys-
ical structures, and appropriate Communications Security (COMSEC) measures to
provide minimum security protection for intelligence information processed and/or
stored by the ADP system or network.
1.3. An Information System Security Officer (ISSO) shall be appointed for each
ADP system processing and/or storing intelligence information. An ISSO may serve
for more than one system. Duties and responsibilities of the ISSO are specified in
Chapters II and III.
1.4. The NFIB member or his designee responsible for the management of an ADP
network shall appoint a Network Security Officer (NSO). Duties and responsibilities of
the NSO are specified in Chapter III of this Regulation.
1
Approved For Release 2005 211 ALRDP87BO1034R0~6500150004-1
Approved For Release 20005/0 D/2 I4
CENT
CHAPTER II
Modes of Operation and Minimum Security Requirements for Processing
and/or Storing Intelligence Information in ADP Systems
Three modes of operation of an ADP system are allowed for the processing and/or
storing of intelligence information. They are: (a) Dedicated Mode; (b) System High
Mode; and (c) Compartmented Mode. The minimum security requirements for each
mode of operation are contained in this Chapter. Chapter III identifies the require-
ments for ADP networks which are formed by the interconnection of ADP Systems
operating in any of these allowed modes.
11.1. General security requirements for ADP systems processing and/or storing
intelligence information.
Il.l.a. Information Systems Security Officer. Each NFIB member or his designee
shall provide for the appointment of an Information System Security Officer (ISSO). It
is desirable for an ISSO to be responsible for only one system; however, he may be
responsible for more than one. The ISSO is specifically responsible for ensuring
continued compliance with the requirements set forth in this Regulation, providing
system accreditation statements, reporting major security deficiencies in system
operation to the NFIB member or his designee, and monitoring any changes in system
operation that may affect the security status of the total system.
Il.1.b. Communications Links. The communications links between all components
of the ADP system shall be secured in accordance with appropriate directives for the
highest classification of information designated for transmission.
II.l.c. Emanations Security Aspects. The vulnerability of system operations to
exploitation through compromising emanations shall be determined in the process of
system accreditation. Evaluation of the risks associated with the central computer
facility and the remote terminal areas and application of control measures shall be in
accordance with appropriate directives.
II.l.d. Individual Security Responsibilities. All users of the system shall be briefed
on the need for exercising sound security practices in protecting the information
processed and/or stored in the system, including all input and output. Users shall be
informed of the security mode in which the system is operating and that the receipt of
any information not specifically requested shall be reported immediately to the ISSO,
or his designee.
11.1.e. Administrative Approvals. Administrative approvals (not requiring substan-
tive briefings) may be used to grant persons access to the central computer facility and
remote terminal areas when such persons do not require access to the intelligence
information processed and/or stored in the system.
11.2. Modes of Operation and Minimum Security Requirements
II.2.a. Dedicated Mode
II.2.a(1) Intelligence information may be processed and/or stored in an ADP
system operating in the Dedicated Mode; that is, the system is specifically and
exclusively dedicated to, and controlled for, the processing of that one particular type
3 153
Approved For Release 20054l~tTIRDP87B01034R000100150004-1
Approved For Release 2005/08/24: CIA-RDP87B01034R000500150004-1
CONFIDENTIAL
of intelligence information, either for full-time operation or for a specified period of
time.
I1.2.a(2) Accreditation Process. The NFIB member or his designee can accredit an
ADP system operating in the Dedicated Mode after receiving written assurance from
the computer system manager and the responsible ISSO that the ADP system meets
the minimum security requirements for this mode as outlined below.
II.2.a(3) Personnel Security. All unescorted personnel requiring access to the
central computer facility or any remote terminal shall have a valid security clearance
and formal access approval for the one particular type of intelligence information
contained within the ADP system.
11.2.a(4) Physical Security. The central computer facility and any remote terminals
connected to it shall be secured in a manner commensurate with the classification and
control caveats of the one type of intelligence information contained in the system.
II.2.a(5) System. All peripheral devices not dedicated for use in the processing of
the specific type of intelligence information shall be disconnected from the system in
an approved manner. A controlled copy of the operating system shall be used to
initialize an ADP system for processing TOP SECRET intelligence information or
Sensitive Compartmented Information (SCI).'
II.2.a(6) Termination of Dedicated Mode Operation. On changing from Dedicated
Mode operation, all intelligence information and the media used in its processing
and/or storing shall be secured or sanitized in an approved manner. An ADP system
which has operated in the Dedicated Mode may then be returned to its original or
different mode, as appropriate.
II.2.b. System High Mode
II.2.b(1) Intelligence information may be processed and/or stored in an ADP
system operating in the System High Mode; that is, the system is operating with
security measures commensurate with the highest classification and sensitivity of the
information being processed and/or stored.
II.2.b(2) Accreditation Process. The NFIB member or his designee can accredit an
ADP system operating in the System High Mode after receiving written assurance
from the computer system manager and the responsible ISSO that the ADP system
meets the minimum security requirements for this mode as outlined below.
II.2.b(3) Personnel Security. All unescorted personnel requiring access to the
central computer facility or any remote terminal shall have a valid security clearance
and formal access approvals for all data processed and/or stored in the ADP system.
Unescorted personnel do not automatically have authorization to see or use all of the
data processed and/or stored in the system. Need-to-know criteria shall apply.
II.2.b(4) Physical Security. The central computer and remote terminal facilities
shall be secured in a manner commensurate with the highest classification and
sensitivity of information contained in the system.
II.2.b(5) System.
II.2.b(5)(a) All terminals and peripheral devices not designated for use in the
current System High Mode of operation shall be disconnected from the system in an
approved manner.
4
Approved For Release 94WM)24ALCIA-RDP87B01034R000500150004-1
Approved For Release 20Q N TIZA-RDP87B0l034R000500150004-1
II.2.b(5)(b) Authentication of remote terminals and personnel shall be performed
by the system. System controls shall be in conformity with those required for the
protection of the most sensitive information being processed and/or stored in the
system. System controls shall consist of software, hardware, and/or other appropriate
measures designed to validate the identity and file access authority of the system users.
II.2.b(5)(c) Security classification and other required control caveats shall be
identified with the information and programs in the system, and appropriate labeling
of the output shall be ensured.
II.2.b(6) Audit Trails. Each system shall produce, in a secure manner, an audit trail
containing sufficient information to permit the ISSO to perform a regular security
review of system activity.
II.2.b(7) Termination of System High Mode Operation. On changing from System
High Mode operation, all intelligence information and the media used in its processing
and/or storage shall be secured or sanitized in an approved manner. An ADP system
which has operated in the System High Mode may then be returned to its original or
different mode, as appropriate.
II.2.c. Compartmented Mode
II.2.c(1) SCI may be processed and/or stored in an ADP system operating in the
Compartmented Mode; that is, the system is processing two or more types of SCI, or
any one type of SCI with other than SCI, and system access is secured to at least the
TOP SECRET level, but all system users need not necessarily be formally authorized
access to all types of SCI being processed and/or stored in the system.
II.2.c(2) Accreditation Process
II.2,c(2)(a) Only the NFIB member can accredit an ADP system for operating in
the Compartmented Mode.
II.2.c(2)(b) The accreditation will be based upon the results of a security analysis,
test, and evaluation to assure that the ADP system meets the minimum security
requirements for this mode as outlined below. The ISSO will ensure that the security
analysis, test, and evaluation is carried out and the results reported along with his
recommendations to the NFIB member.
II.2.c(3) Personnel Security
II.2.c(3)(a) All unescorted personnel requiring access to the central computer
facility shall have a valid TOP SECRET clearance 2 and formal access approvals for all
data processed and/or stored in the ADP system. Need-to-know criteria shall apply.
II.2.c(3)(b) All unescorted personnel requiring access to any remote terminal
facility shall have a valid TOP SECRET clearance 8 and formal access approvals for all
data designated for input/output at that terminal facility: Need-to-know criteria shall
apply.
II.2.c(4) Physical Security
II.2.c(4)(a) The central computer facility shall be secured in a manner commensu-
rate with the handling of TOP SECRET material and the most sensitive intelligence
information contained in the facility.
a Such clearance must have been granted based on investigative requirements of DCID 1/14.
8 Ibid.
5
Approved For Release 20 6%Y :IA-RDP87B01034ROII05001N 5'5004-1
Approved For ReleaseCR M 1: CIA-RDP87B0l034R000500150004-1
II.2.c(4)(b) Each remote terminal area will be secured in a manner commensurate
with the handling of TOP SECRET material and the most sensitive intelligence
information, if any, designated for input/output at that terminal facility.
II.2.c(5) System. The ADP system through a combination of hardware and software
capabilities shall provide the requisite protection for intelligence information proc-
essed and/or stored by it. Systems not presently equipped with the required
hardware/software security capabilities prescribed below must compensate for the
lack thereof by the implementation of other security measures or procedures which
afford the same degree of protection.
H.2.c(5)(a) All terminal.and peripheral devices not designated for use in the current
Compartmented Mode of operation shall be disconnected from the system in an
approved manner.
IL2.c(5)(b) Authentication of remote terminals and personnel shall be performed
by the system. System controls shall be in conformity with those required for the
protection of the most sensitive information being processed and/or stored in the
system. System controls shall consist of software, hardware, and/or other appropriate
measures designed to validate the identity and file access authority of the system users.
II.2.c(5)(c) Security classification and other required control caveats shall be
identified with the information and programs in the system, and appropriate labeling
of the output shall be ensured.
II.2.c(5)(d) Memory Access. System hardware/software features shall exercise
control over the memory locations to which a user program has access.
II.2.c(5)(e) Privileged Instructions. The system shall utilize a special class or subset
of instructions to perform and control all input/output operations and changes to
memory boundaries, execution state variables, data elements or tables, and files of the
operating system. The operating system alone shall execute these instructions or
provide access to them.
II.2.c(5)(f) Verified Response. Machine instructions/operation codes, both privi-
leged and user, with all possible tags or modifiers, whether legal or not, shall be
designed and tested to produce results in a predefined set of responses by the
computer hardware/firmware.
II.2.c(5)(g) Read, Write, and Execute Privileges. The system shall enforce the read,
write, and execute privileges of a user with respect to any given file.
II.2.c(5)(h) Separation of User/Privileged Modes of Operation. The user and
privileged modes of system operation shall be separated so that a program operating in
user mode is prevented from unauthorized utilization of privileged functions. Controls
shall be implemented to maintain continued separation of these modes.
II.2.c(5)(i) Residue Clear-out. Measures shall be implemented to ensure that
residue from terminated user programs are cleared before memory and on-line storage
devices' locations are released by the system for use by another user program.
II.2.c(5)(i) Over-the-Counter Access Control. Effective controls shall be imple-
mented to limit over-the-counter (batch) users to authorized access to information and
programs, as well as to control read and/or write access authorizations.
II.2.c(6) Audit Trails. Each system shall produce, in a secure manner, an audit trail
containing sufficient information to permit the ISSO to perform a regular security
review of system activity.
6
Approved For Release ff/4'AtCIA-RDP87B01034R000500150004-1
Approved For Release 2005/9 ERl -~ DP87B01034R000500150004-1
II.2,c(7) Termination of Compartmented Mode Operation. On changing from
Compartmented Mode operation, all intelligence information and the media used in
its processing and/or storing shall be secured or sanitized in an approved manner. An
ADP system which has operated in the Compartmented Mode may then be returned
to its original or different mode, as appropriate.
7 11
Approved For Release 2005/66)V&lDt4JiDP87B01034R0005001500(Y1
Approved For Release 20(5 8jj1 &-RDP87B01034R000500150004-1
CHAPTER III
111. 1. Definition
III.1.a. For the purpose of this regulation and implementation of DCID 1/16, an
ADP network is defined as the interconnection of two or more ADP systems that
operate in any of the modes defined in Chapter II. The ADP network consists of the
components (central computer facility, remote terminals, and interconnecting com-
munications links) of the various ADP systems, front-end processors, and telecom-
munications. This Regulation shall not apply to the individual ADP systems, if any
(e.g., CS in Figure 1), that make up the telecommunications; these are controlled by
pertinent national policies and regulations.
III.1.b. There are numerous ways in which ADP systems operating in any of the
modes defined in Chapter II can be interconnected to form an ADP network.
However, most of these combinations will increase the minimum security require-
ments of the individual ADP systems since their original operating modes cannot be
maintained when they become a part of a network. (For example, when two
Dedicated Mode ADP systems interconnect, they can continue to operate in the
Dedicated Mode only if both ADP systems process the same classification and type of
intelligence information. If this is not the case, their interconnection would require
both systems to meet the requirements of operating in the System High Mode
(Network High) or the Compartmented Mode, depending on the classification and
type of intelligence information to which each ADP system was originally dedicated.)
Therefore, each proposed configuration of ADP systems must be assessed to determine
the appropriate mode of operation (Dedicated, Network High, or Compartmented)
for the resultant network. Each ADP system in the network must be accredited for
operation in the new mode when a change of operating mode is required.
(FIGURE 1 )
(-- P.D.' Sy:;LC -) _ Telc corununic:ation; -- --[ ADP ; y.,;ter --~]
T - RCmOIC TOI' ilnill
CCF - Central Cni t Lcr Facili.ty
1'LP - Front End 1'i nccucor
(-Remote Terminal-]
CS -- Coir nunicrst ions C:oriput(!r or ::.itch (e.g., AUT01)III)
9
No
Approved For Release 20d9 Ii 4NL4')k-RDP87B01034ROOY500158 04-1
Approved For Release C8Ng1[3ENT1'Ai CIA-RDP87B01034R000500150004-1
III.i.c. Some examples of possible configurations of ADP systems and the resulting
ADP network mode of operation are shown in Table 1 below.
111.2, Responsibilities for ADP Network Security Administration
III.2.a. Responsible Authorities. The authority, organization, or manager responsi-
ble for the overall operation and control of the ADP network shall ensure that each
ADP system which is a part of the network adheres to the security required by the
current network configuration (see Ill.1.b. and c. above). The security measures shall
be agreed to in writing by the ADP network authority and the ADP system authority
and implemented before an ADP system is connected to the network, However, each
NFIB member is the responsible security authority for his ADP system participating in
the network.
III.2.b. Remote Station Authority. Security requirements for remote terminals and
peripheral devices of an ADP network shall be prescribed by the authority responsible
for the security of the ADP network. In some cases, this may be a different NFIB
member or designee than the terminal or device user.
III.2.c. Exceptions. When an ADP system becomes a part of an existing ADP
network, approval of any temporary exceptions to the network security requirements
will require the written concurrence of the ADP system authority and the ADP
network authority. The ADP network authority will approve the temporary exception
only with the consensus of all the network participants.
III.2.d. Security Anomalies. Each NFIB member or his designee is responsible for
assuring that he is aware of any known system irregularities occurring within his ADP
system. Any evidence indicating a possible violation of the security integrity or
unexplainable phenomenon of the system shall be made known to the ISSO. The ISSO
ADP System Mode(s) ADP Network Mode
1. All systems are Dedicated to processing and/or storing the same type 1. Dedicated
of intelligence information.
2. All systems are Dedicated a to same classification level but not same 2. Network High b
type of intelligence information, and not SCI.
3. Some systems are Dedicated a to same classification level and same or 3. Network High b
different type(s) of intelligence information and some systems are
System High at classification level of the Dedicated systems, but not
SCI.
4. Some systems are Dedicated a to TOP SECRET level and same or 4. Compartmented
different types of intelligence information and some systems are
Compartmented.
5. All systems are System High to the same classification level .......... 5. Network High b
6. Some systems are System high at TOP SECRET level and some 6. Compartmented
systems are Compartmented.
7. All systems are Compartmented .......................................................... 7. Compartmented
8. Some systems are Dedicated to TOP SECRET level and same or 8. Compartmented
different types of intelligence information, some systems and System
High at TOP SECRET level, and some systems are Compartmented.
a These systems, in effect, adopt the operating mode of the network and, therefore, must meet the
minimum security requirements of that mode as expressed in Chapter II.
b Network High requires that all unescorted personnel having access to any of the ADP systems of the
network must have formal access approvals for all data processed and/or stored by all of the ADP systems in
the network.
10
Approved For Release 20 ! 4"P6iA-RDP87BO1034R000500150004-1
Approved For Release 20050NFIi5 OT All -RDP87B01034R000500150004-1
shall immediately notify the Network Security Officer (NSO) when network security
breaches are suspected or possible; this notification shall be followed by a written
report as appropriate. The NSO shall determine the impact on network security of any
abnormalities of ADP system operation. Each NFIB member or his designee retains
the prerogative of suspending his organization's operational participation in the
network prior to any notification if he believes sufficient threat of compromise exists.
III.2.e. ISSO Network Responsibilities. Each ADP system in an ADP network shall
have a formally designated ISSO whose responsibilities are as follows:
III.2.e(1) Advise and assist his NFIB member or designee on all physical, personnel,
procedural, hardware/software, and communications security matters pertaining to
the network.
III.2.e(2) Coordinate with other ISSO's and the NSO in the administration of
network security-related activities as required by this Regulation.
III.2.f. Responsibilities and Functions of the NSO
III.2.f(1) Coordinate the application of network security hardware/software (secu-
rity labeling, audit trails, dissemination controls, etc.), physical /personnel security
measures, communications security, and administrative/procedural security measures
within the ADP network.
III.2.f(2) Investigate and resolve network security incidents and/or violations
leading to or involving a potential compromise of classified information.
III.2.f(3) Determine that network security requirements are met before an ADP
system is connected to the ADP network.
III.2.f(4) Advise and assist the ADP network manager on studies, projects, tests and
evaluations, and experiments which relate to the security of the ADP network.
III.2.f(5) Assist the network manager in assuring that all ADP network participants
adhere to the security requirements specified in this Regulation.
III.2.g. Reporting. All ADP system security-related incidents shall be reported by
the ISSO to the NSO. The nature and extent of the report shall be based upon the
security urgency of the event.
III.2.g(1) Routine Security Report. A routine security report shall be made of a
system malfunction or security incident which has potential network security
implications. The report shall include the following information:
III.2.g(1)(a) NFIB member or his designee submitting the report.
III.2.g(1)(b) The ADP system in which the abnormality occurred.
III.2.g(l)(c) Narrative description of the event.
III.2.g(1)(d) Date, time, location of event.
III.2.g(1)(e) Results of the ISSO's internal investigation as to the cause of the
abnormality and remedial actions taken.
III.2.g(2) Special Security Reports. The ISSO shall immediately notify the Network
Security Officer of a system abnormality providing reason to suspect a covert violation
of the security integrity of the ADP system or network. An initial written report
covering the basic information provided in a routine security report shall be
forwarded as soon as possible. The nature and extent of the reporting requirement
11 a
Approved For Release 2005 8 40Etj*-LRDP87B01034R0 0500150004-1
Approved For Release * p5l 4A CIA-RDP87B0l034R000500150004-1
following such an event cannot be projected since it would involve extensive internal
organizational counterintelligence investigation.
III.2.g(3) Evaluation and Analysis of Report. The NSO shall review all reports
submitted for purposes of evaluating the security performance aspects of the network.
III.2.g(4) In the event a NFIB member or his designee takes exception to the
content of, or actions required by, a security report, he shall appeal to the network
authority who shall establish an ad hoc committee of network participants to resolve
the issue.
111.3. Accreditation Process
III.3.a. The authority, organization, or manager responsible for the overall opera-
tion and control of the ADP network shall accredit it in cooperation with the NFIB
members participating in the ADP network.
III.3.b. For networks having multiple NFIB members responsible for the overall
operation and control of the ADP network, the accreditation shall be made jointly by
these NFIB members.
III.3.c. The NSO shall provide written assurance to the appropriate network
authority(ies) that the ADP network meets the minimum ADP network security
requirements as outlined below.
III.4. Minimum ADP Network Security Requirements
III.4.a. ADP System Security. Each ADP system must be accredited for operation
in the appropriate network mode before becoming an active participant of the ADP
network. This accreditation shall be based on the requirements outlined in Chapter II.
ADP system accreditation must be provided to the NSO.
III.4.b. Telecommunications. The communications links between all components
(i.e., ADP systems, see Figure 1) of an ADP network shall be secured in accordance
with appropriate directives for the highest classification of information designated for
transmission.
III.4.c. Emanations Security Aspects. The vulnerability of network operations to
exploitation through compromising emanations shall be determined in the process of
network accreditation. Evaluation of the risks associated with the individual ADP
systems and their interconnections shall be accomplished in accordance with appropri-
ate directives.
III.4.d. Network Components. All ADP systems, terminals, and peripheral devices
not designated for use in the current network mode of operation shall be disconnected
from the ADP network in an approved manner.
III.4.e. Security Identification and Labeling. The security level of network users,
remote sites, network programs, and files shall be identifiable. Specific classification
level, common controls, procedures established by DCID 1/7, and SCI markings shall
be identified. This identification shall be a primary factor in the monitoring and
control of data transfers. Security classification and other control caveats shall be
identified with the network information and programs while in the ADP network.
Appropriate labeling of any output from the network shall be ensured.
III.4.f. Access to Network Files. Each data file in the network shall have an Office
of Primary Interest (OPI). The OPI as owner, manager, and controller of the
information in the file is responsible for file maintenance, file classification, and
read/write access authorization of other network users of the file. A current list, by
12
Approved For Release gN#lFtCIA-RDP87B01034R000500150004-1
Approved For Release 2005/08/24: CIA-RDP87B01034R000500150004-1
file, of network users and their access approvals shall be maintained, classified, and
controlled by the OPI. A copy of this list shall be provided to the cognizant ISSO and
NSO.
III.4.g. Network User Access Control. Each ADP system shall assure that a network
user is confined within the bounds of that system's files to which the user has been
authorized access, and that the user can exercise only those privileges for which he has
been authorized, A network user shall not be able to access or alter any of the network
security capabilities.
III.4.h. Network Programs. Network programs, such as log-in programs, file
maintenance programs, and listing programs, shall perform network specific functions
which are prohibited to the ADP systems' and users' programs. However, network
programs shall not have complete freedom and shall be given only the authority that is
needed to accomplish the particular network functions.
III.4.i. Procedures. The security procedures established for the protection, and
operational security, of the network shall be coordinated among all participants by the
Network Security Officer and administered by the ISSO of each ADP system in the
network.
III.4.i. Audit Trails. Security audit trails shall be generated by the ADP systems in
the network. This information shall be made available to the Network Security Officer
to permit a regular security review of the network activity. In some instances a manual
security audit may be warranted.
13
CONFIDENTIAL 1V2 153
Approved For Release 2005/08/24: CIA-RDP87B01034R000500150004-1
Approved For Release 2005/08/24: CIA-RDP87BO1034R000500150004-1
CONFIDENTIAL
GLOSSARY
The following definitions apply to the terms used in the Computer Security
Regulation.
Access. The ability and the means to approach, communicate with (input to or
receive output from), or otherwise make use of any material or component in an ADP
system or network.
Accreditation. A formal declaration by the responsible NFIB member or his
designee, as appropriate, that the ADP system or network provides an acceptable level
of protection for processing and/or storing intelligence information. An accreditation
should state the operating mode and other parameters peculiar to the ADP system or
network being accredited.
ADP System. The central computer facility and any remote processors, terminals,
or other input/output/storage devices connected to it by communications links.
Generally, all of the components of an ADP system will be under the authority of one
NFIB member or his designee.
Authentication. A positive identification, with a degree of certainty sufficient for
permitting certain rights or privileges to the person or thing positively identified.
Central Computer Facility. One or more computers with their peripherals and
storage units, central processing units, and communications equipment in a single
controlled area. This does not include remote computer facilities, peripheral devices,
or terminals which are located outside the single controlled area even though they are
connected to the central computer facility by approved communication links.
Escort. Duly designated personnel who have appropriate clearances and access
approvals for the material contained in the ADP system and are sufficiently
knowledgeable to understand the security implications and to control the activities and
access of the individual being escorted.
Front End Processor. A computer associated with a host computer that performs
pre-processing functions. It may perform line control, message handling, code
conversion, error control, data control, data management, terminal handling, etc. (See
Regulation, Chapter III, Figure 1.)
Operating System (O/S). An integrated collection of service routines for supervising
the sequencing and processing of programs by a computer, Operating systems control
the allocation of resources to users and their programs and play a central role in
assuring the secure operation of a computer system. Operating systems may perform
input/output, accounting, resource allocation, compilation, storage assignment tasks,
and other system-related functions.
Processing and/or Storing. All inclusive term used to include in addition to
processing and storing such functions as manipulating, deleting, modifying, editing,
outputting, etc.
15 No . Approved For Release 20 W09 2 NTMIA-RDP87BO1034ROOb500150004-1