LETTER TO JOHN HOLMES(SANITIZED)

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP90-00191R000100050022-4
Release Decision: 
RIPPUB
Original Classification: 
K
Document Page Count: 
3
Document Creation Date: 
December 23, 2016
Document Release Date: 
October 24, 2013
Sequence Number: 
22
Case Number: 
Publication Date: 
September 9, 1986
Content Type: 
LETTER
File: 
AttachmentSize
PDF icon CIA-RDP90-00191R000100050022-4.pdf130.65 KB
Body: 
Declassified in Part- Sanitized Copy Approved forRelease2013/10/24 : CIA-RDP90-00191R000100050022-4 STAT STAT John Holmes Management Science America, Inc. 61 S. Paramus Paramus, N.J. 07652 Dear Mr. Holmes: 9 September, 1986 Attached is a memo from my systems programming shop denoting their concerns with MSA security. This should be a good jumping off point for discussions with your systems people. If you could get comments from your folks on each of these points,- we can get the dialogue underway. For more information, you may call me at CC: Bob Hunt Sincerely, Declassified in Part - Sanitized Copy Approved for Release 2013/10/24: CIA-RDP90-00191R000100050022-4 Declassified in Part- Sanitized Copy Approved forRelease2013/10/24 : CIA-RDP90-00191R000100050022-4 1 STAT STAT MEMORANDUM FOR: FROM: SUBJECT: 31 August 1986 Draft- Questions for MSA o owing are a draft set of questions we would like to present to MSA to help clarify and correct any concerns we have with their packages. Some of these questions are related to our general concern with security and others relate to our ability to integrate their software packages into our environment. 1. There is an apparent lack of auditing capabilities with the MSA applications software. Will MSA provide audit trails, or at the very least exits that we could use to implement our own audit trails? 2. The need for a separate logon ID and logon process to MSA applications as distinct from the VM and IDMS/R is contrary to our intended direction. We would like a user to be authenticated only once, when signing onto the host operating system (VM), and that all subsequent authentications (IDMS/R or MSA) be performed by a 'trusted method' automatically such that a user only sees one signon process. We have the necessary exits in IDMS/R to perform a trusted signon, but it is not apparent that MSA provides the same capability. Does MSA provide exits during the logon process that we could take advantage of? 3. There are no provisions within MSA software to provide security for Batch jobs. How can we get these required features? or, How do we disable this batch capability if it is not required? 4. The Information Expert (IE) component has job submission capability that must be integrated into our systems in secure manner. We must get a commitment from MSA to work this issue. It is not at all clear how we would do this at this time. Without solving this problem we introduce a significant security hole into our systems. It would be appear currently, that all jobs submitted via this mechanism would assume the same security characteristics and therefore we could not differentiate between users having distinct security profiles. Declassified in Part - Sanitized Copy Approved for Release 2013/10/24 : CIA-RDP90-00191R000100050022-4 Declassified in Part - Sanitized Copy Approved for Release 2013/10/24: CIA-RDP90-00191R000100050022-4 STAT PAGE 2 5. We have a major concern at this time that MSA does not consistently use IDSM/R to access data. Some MSA components, for example, issue their own OPEN macros to data files by-passing IDMS/R control all together. This by-passes any controls that we have built into the Central Version for IDMS/R. Can MSA define all instances in which they directly access data owned by IDMS/R? Does MSA do any type 1 SVC calls? What if any user exits are provided to audit data that is accessed directly ? What if any capability is there for security checking of data that is accessed directly? 6. The security architecture used by MSA requires that applications be provided with rather wide access to subchemas within systems in which a transaction is to run. Security is then provided with the online MSA software which narrows the view of data to the user. We have two significant problems with this approach: Any defined MSA user will be given rather broad access to data which is only narrowed when accessed using the MSA online software. Should the user gain access to the IDMS/R system with other packages (ie CULPRIT) he now has the broader view of data. How does MSA propose to provide consistent access of the data ? In our environment we need to limit access to the data regardless of the tools used to access it? b. It also appears that MSA user are provided read/write access of the MSA security rules. How does MSA propose to provide a secure environment if any can access and change the online security rules? 7. Interfaces to the Agency's print network will need to be developed. We need to have USA commitment to provide the appropriate exits so that they can be developed. Can MSA identify to us the locations within their code wich generate print? Do they have a standard print exit that we can take advantage of? 8. Is MSA willing to provide system programing suppot to the Agency so that some of these issues can be resolved? Declassified in Part - Sanitized Copy Approved for Release 2013/10/24: CIA-RDP90-00191R000100050022-4