ISB MEETING MINUTES - 15 SEPTEMBER 1987

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP90G00993R000300390003-9
Release Decision: 
RIPPUB
Original Classification: 
C
Document Page Count: 
10
Document Creation Date: 
December 27, 2016
Document Release Date: 
August 16, 2012
Sequence Number: 
3
Case Number: 
Publication Date: 
September 16, 1987
Content Type: 
MEMO
File: 
AttachmentSize
PDF icon CIA-RDP90G00993R000300390003-9.pdf688.89 KB
Body: 
Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 ER 4320-87 16 September 1987 MEMORANDUM FOR: Information Systems Board FROM: SUBJECT: Special Assistant to the Executive Director ISB Meeting Minutes - 15 September 1987 1. Computer Scientist for Engineering Group within OIT, discussed efforts to reduce the security risks posed by removable ma netic media through the use of "diskless" workstations. also conducted a demonstration of diskless works a ion prototypes. A copy of the presentation slides is attached. 2. within IMS, described plans for a test-bed of diskless wor stations in IMS. Notes from the presentation are attached. Attachments Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 C-O-N-F-I-D T-I-A-L THE "DISKLESS PC" CONCEPT: STRATEGY AND IMPLEMENTATION Summary This paper addresses the availability of methods for eliminating or reducing certain security problems associated with personal computers (PCs). Specifi- cally, technology is discussed which eliminates the problems due to the stor- age media associated with PCs, but without the use of encryption. Encryption alternatives have not yet proven to be either effective or practical, and cov- erage of these problems and this technology is excluded from this discussion. The Director of Information Technology has specifically asked for solutions to the "floppy disk" problem other than encryption, and the scope of this paper is restricted to this issue rather than PC strategies in general. The security problems introduced by storage media on PCs are many and serious. One solution is, however, conceptually simple--eliminate the media. The tech- nologies and procedures to allow this are what need to be evidenced and are the subject of this document. A review of all the problems with storage media is not included, since it would be quite lengthy. However, a brief review of the types of media and the attributes of each is presented for background. Background The security problems under discussion are often characterized as "the floppy disk problem," but storage media on PCs actually takes several forms. One is internal "hard disk." This is obviously unacceptable for classified use in the absence of adequate physical personnel controls. But even in vaulted areas, hard disks still pose significant problems in aggregation of data, com- partmentalized access controls between people in the vault, privacy, and information management concerns such as sharing, backup and maintenance. There are also removable hard disk drives which can be secured in a safe and which are designed for non-vaulted areas. Removable cartridge drives are the next form of removable "hard" storage and can be either magnetic or optical in nature. The removable media are followed downwards in scale by the familiar 5.25 inch floppy disks and the newer 3.5 inch units. This is actually just an ordered range of options for media, ranging from almost immovable to easily transportable. All suffer some security problems, trading some good points for other bad ones as the size and removability vary. The less transportable forms may have some valid utility in certain environments, but should never be assumed to be "secure" in the absence of strong procedural controls and cor- rect data management practice. In any case, the most secure PC is one without any non-volatile media at all. Such a PC is generically called a "diskless PC." C-O-N-F-I- -N-T-I-A-L Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 "Diskless PC" Technologies C-0-N-F-I-D-E-N-T-I-A-L Four technologies allow one to propose several varieties of diskless PC. Actually, the security goals do not require that the PC be truly without disks, merely that the disk either not be accessible or not permanent or not "writable." The use of volatile disk substitutes and "read-only" disk drives does not pose a hazard. Thus the four technologies are: disks simulated in volatile storage (RAM disk); disk services provided by a central, secure ser- ver (virtual disk); read-only disk drives; and networked disk services (LAN disk). These four concepts are not mutually exclusive, and actually are best used in combinations as circumstances require. Previous analyses of any one alternative at a time have generally missed the point that a combination is required to give adequate PC functionality. RAM Disk RAM disks are a standard commodity in the PC market, and are usually used to enhance performance of PCs without hard disks. Extra RAM (volatile random access memory) and software are installed to act as a high speed simulated disk, and sizes of 2 million bytes for a few hundred dollars are typical. The obvious security advantage is that the information on RAM disks can be almost instantly destroyed just with a program, or by turning off the power. Magnetic media cannot be sanitized by just over- writing it, but RAM memory can be. The obvious disadvantage is that information on RAM disk is lost if power to the PC is lost before the ? data can be transfered to a permanent storage medium on another, secure system. Certainly RAM disks could not be used in environments without stable power. Virtual Disk Virtual disks are simulated by host computer systems on behalf of PCs. The advantage is that the actual disk space is central on physically secured, backed-up, maintained systems with good access control facili- ties. This requires high speed connection between the PC and host, spe- cifically "local" 3270 connections as can be provided usually only in a headquarters-like environment. Although there have been several imple- mentations of this for IBM hosts and IBM compatible PCs, IBM's own stra- tegic implementation (based on something called SRPI) will not be avail- able until the later half of calendar 1987. Unfortunately, it may be available only for IBM brand software and perhaps even only IBM brand hardware until someone else clones this technology. Virtual disk usage requires very stable host systems as well, since the host going down is like a disk failure to the PC. For all these reasons, virtual disk tech- nology is a potential candidate for some situations, but is not main stream as yet. However, 'one can still use host disk storage as a viable medium to assist in "diskless" PC use. High speed file transfer to and from the host can be used in lieu of true virtual disks. This is less "transparent" to the PC operator, but is commercially available from many vendors. File transfer is not very sensitive to host stability--as long as the host is generally available and not down for long periods. Also, there are other "micro-mainframe" link products that can be used on 2 C-0-N-F-I-D-E-N-T-I-A-L Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 C-O-N-F-I-D-E-N-T-I-A-L "diskless" PCs for specific products on the host and which provide another tool for secure use of PCs. Read-only Disk Drives Read-only disk drives are a new concept which is not commercially recog- nized as yet, at least for magnetic media. Industry does provide the concept of read-only floppy disks, however, and this makes it trivially possible to extend the idea to read-only floppy disk drives. These are disk drives, specifically floppy disk drives, that will not write on disks but can still read them unimpaired. Low cost "after market" modi- fications to commercial floppy disk drives can produce such a read-only drive and change a PC with floppy disk drives into a read-only PC. This sort of PC has been dubbed a "neutered" PC to emphasize that it is not "diskless" but has been rendered non-threatening by surgery. This con- cept is not meant for hard disks, since such a modification would render them essentially useless. Read-only floppy disks are, by contrast, very useful in loading software into the PC. Since a PC floppy disk drive already has sensors and logic to detect and honor "read-only" disks (those with a write-protect "tab" on them), there is at least one trivial modification always possible to convince the disk drive that all disks are read-only and hence create a read-only drive. At least one company that performs "after market" modifications of PCs to satisfy peculiar customer requirements (e.g. TEMPEST) has already agreed to render read- only the PCs it sells if requested. Read-only optical disk drives are also a potentially useful technology for more secure use of PCs. However, use of read-only optical disks (CDROM) is not a viable solution in itself, since no PC today can get started up ("booted") from optical disk. Also, the CDROM would only be a source for programs and reference material, not working files. Hence, the other technologies under discussion have to be used and the CDROM drive could only be viewed as an accessory. Other optical storage alter- natives such as "write once, read many" (WORM) disks may also be useful adjunct to PCs if, for example, the disk is entirely pre-written with software before distribution and the disk drive is neutered just like a floppy disk drive. This would be a higher cost alternative that would provide more space but is essentially the same solution as for floppy disks in all other respects. Networked Disk (LAN File Servers) The last technology for removing the media from PCs is the use of net- worked files servers on local area networks (LANs). For PCs connected in a LAN, files can actually, be made to reside not on each PC, but on a spe- cific "file server" unit Instead. This file server can be located remotely from the PCs in a physically secured area if desired and can enforce a reasonable degree of access control to the files it houses so that individuals at the PCs can only access files to which they have legitimate access. Different LAN implementations offer different mecha- nisms and degrees of control; but, at a minimum, password access to data is supported. The file server PC has to be maintained by a systems administrator for the group of`people served by it. 3 C-O-N-F-I-D-E-N-T-I-A-L Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 C-0-N-F-I-D-E-N-T-I-A-L Architecturally, this is exactly like a small departmental computer like a Wang Alliance, just implemented with PCs and a LAN. A LAN presents some unique security challenges in its own right, however. A complete discussion of a LAN architecture is beyond the scope of this discussion, but can be shown to be a viable technology with a great deal of value to the customers in its own right as well as a solution to the media secur- ity problem. No presumption of "secure" LANs needs to be made in order to implement them in a satisfactory way with commercial technology. The "diskless PC" problem with a LAN solution is that the each PC needs some- how to get started and hence generally has at least a floppy disk drive for booting even if connected to a LAN. Some vendors market truly disk- less workstations, but this generally restricts the market to those ven- dors' LANs and devices and does not stay as strictly within the "IBM PC compatible" mainstream as one would like. However, this problem can now be solved in at least two ways. IBM and others will sell options for their local area network adapter cards which will allow a PC to "boot" from the LAN and never need disks at all. Or, one can use. a combination technique and employ a PC with a read-only disk drive which would allow it to come up and get access to the LAN for all subsequent disk needs. This combination technique allows use of anybody's LAN and anybody's PC without constraints on competition. Admittedly, installing either IBM's network boot option or modifying disk drives to be read-only after pur- chase does make the PC somewhat custom and stretch the concept of staying in the commercial mainstream. However, addressing PC security cannot be done in the strictly commercial sense and these minor modifications of. commercial PCs may actually represent the least "customized" solution. For specific applications where installing a local area network is not a problem, use of the commercially available diskless PCs (sometimes called "network terminals") might work fine without any customization. Suggested Configurations Clearly, stand-alone PCs with RAM disk or read-only disk make no sense--the range of solutions presented applies only to PCs as part of a larger informa- tion processing system or network. Depending on the network, there are two basic configurations that eliminate the media security problem. Configuration 1 For a PC that is connected to a host via a high speed 3270 connection, a combination of RAM disk and read-only floppy disk drives is viable. The floppy disks are used for loading software only and are unclassified. Either one or two drives can be used, giving the customer access to up to 2.88 million bytes of programs without swapping disks if new IBM PS/2 technology is used (2.4 Mbyte if using older 5.25 inch floppies). By swapping disks, one can get by with only one drive and can still have access to unlimited amounts of software. To prevent accidental "fixing" of the disk drives to let them write, the read-only drives and the PC itself are visibly marked as being "read-only", and the PC case is key locked to prevent easy removal. (Some concern has been expressed about people "fixing" the PCs to write deliberately. The relevance of this 4 C-0-N-F-I-D-E-N-T-I-A-L Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 C-O-N-F-I-D-E-N-T-I-A-L threat is for others to determine, but it would seem ineffective to go any farther in adding countermeasures since a truly hostile person who already has access to the classified data and who can smuggle electronic equipment in and out out the building probably is much more a threat in other ways than trying to fix floppy disk drives when more conventional tradecraft is safer and easier.) The PC itself and the program disks are all unclassified. RAM disk is used for all working files and to improve performance by copying frequently used software from floppy disk to RAM disk at start-up time. A RAM disk size of 2 Mbyte is recommended. Configuration 2 The PC is the same as in configuration 1, but with the addition of a local area networking adapter, software and supporting network elements. The LAN adapter should have a network boot capability so that the PC can be started without any floppy disk in it at all. However, the presence of a read-only floppy disk drive is still recommended since it makes the network boot capability optional and provides a way to run software that is not available on the network for some reason. The presence of RAM disk in the PC is optional, but recommended for performance. The PC must be supported by a network file server with hard disks and a device for backups. Depending on the environment, this server might be kept locally in a customer's vaulted office area or in a separate vault for computers. Access to the file server would be limited procedurally and/or physically to a systems administrator. The backup device would be streaming tape. or optical disk, media specific to this purpose and stored securely. This configuration would have no writable floppy disks anywhere on the network and would be equivalent in security to a Wang Alliance system. Host attachment is not required in this scenario, but can be provided if desired. Either each PC could attach individually just like the PCs in configuration 1, or the local area network could provide a "clustered" attachment point. Operational Concepts The "singleton" PC case, configuration 1, envisions a PC with host attachment only, no local area network. For a practical system, such a PC is really only useful as a very intelligent workstation for use with larger hosts. Such "PC terminals" can substantially improve customer interfaces, especially in word processing. Moreover, the hardware of configuration 1 is the right hardware to later add local area networks, optical disks, or whatever is required to build useful systems. The same device grows and can be used in many configu- rations and can be bought and used as a starting point well before all the questions surround LAN installations are resolved. To use a "read-only" PC, the PC customer must be provided with floppy disks to start up the PC and supply those programs needed. These unclassified disks have to be created by the customer's application builders and modified to suit each individual's needs. An unclassified stand-alone PC either in the custom- er's office or an "Information Center" can be used to customize programs as desired. The procedural and support aspects of configuring software and 5 C-O-N-F-I-D-E-N-T-I-A-L Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 C-0-N-F-I-D-E-N-T-I-A-L applications for read-only PCs are non-trivial since the individual user no longer does all the work himself to load and configure PC packages. In use, the PCs would boot from the read-only floppy and an "automatic" proce- dure (AUTOEXEC.BAT) would create a RAM disk, copy performance-related files to it, set up the system so that working files would be put on the RAM disk, and start 3270 terminal emulation software and any applications software desired. The customer would then log on to the host if desired or work off-line at the PC, but the presumption is that the source materials are on the host and that the finished product returns there before the PC is turned off. Assuming that "virtual disk" support is not available commercially, use of the PC depends on file transfers between the host and PC. Application software can make the PC "front end" for the host with varying degrees of user friendliness, depending on the level of investment in programming. A typical use would be by a customer using AIM and/or SAFE, where the primary interaction is with the host and the PC is used only transiently to prepare or edit files. These files are brought down to the PC for editing and shipped back up to the host for "filing." A number of procedures will be available to use PCs connected to the host in this way regardless of whether the PCs are "read-only" or not--this is just part of making PCs useful in conjunction with the host. Future development to provide a "windows" front end for an applica- tion like SAFE will work on a read-only PC just as on a "regular" PC. The only software that won't run on a read-only PC is something that is "copy pro- tected" by a method that requires writing to the disk. However, this method of copy protection is all but extinct. Most corporate and government accounts refuse to buy copy protected software and hence almost no commercially suc- cessful software still uses any such scheme. The only real limits in the "read-only" PC approach are procedural difficulties for the customer. Files must be returned to the mainframe before powering off the PC. The host does not have to be "up" while the PC is in use, but must become available before the customer can finish the work. In environments where PCs are replacing terminals and offering new word processing power to be applied to files that are destined for the host anyway, a read-only PC is functional, though not as mistake-proof as a PC with disks. In environments where there is only local processing (no host attachment) or substantial local processing, a local area network is required to make read- only PCs viable. For applications requiring extensive use of PCs for analy- sis, read-only PCs with only host attachment are not attractive, although they could be used in some cases with considerable loss in productivity. However, adding LAN functionality can not only ameliorate the ease-of-use difficulties, but add other new productivity aids and applications. As indicated, this sort of configuration is the logical equivalent of a Wang Alliance system, with the added benefit that each PC calLalso be host attached and hence have the best of both worlds--local processing and host processing. In a local area net- work, the PC has the equivalent of permanent local storage on the file server. Such a PC can be used exactly like one with a hard disk. There are really no functional issues in what the PC can or cannot do. There are some performance considerations in comparing network disks to internal hard disks, but the per- formance of the networked disk is generally sufficient to get the customer's job done. There are administrative,issues associated with installing, main- 6 C-0-N-F-I-D-E-N-T-I-A-L Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 C-O-N-F-I-D-E-N-T-I-A-L taming and operating the LAN in an acceptably secure manner. However, these issues have to do with the network itself, not the concept of "diskless" PCs. It is clear that in the long run, answering the dual questions of PC security and PC functionality will require LANs as part of the architecture. Work in Progress The use of "singleton" read-only PCs (configuration 1) has been explored within OIT. There appears to be no reason that the concept cannot be used to satisfy requirements for "terminals" for some components, specifically the DO. Work is required to use PCs at all as terminals, and this is progressing under the PCNEWS project umbrella. This work will apply equally well to a PC with- out writable disks as it does to any PC. As this PCNEWS software becomes available, it will be provided to customer offices to evaluate. Part of the evaluation for at least the DO will include use of "read-only" PCs to flush out any procedural and administrative issues. Clearly, providing "read-only" disks will place a greater responsibility on the applications developers and the "information centers" instead of the individual people sitting at the PCs, and each component will have to evaluate this. Read-only PCs are also to be installed in a community environment for coordi- nating intelligence drafts. In this case, the "host" with the real disks will be just another PC. This particular project ("Coordinet") uses a "Windows" front end and the customers should not care that their PCs cannot actually ? write floppy disks. Installing local areas networks of PCs has already begun in isolated instances, and activity to standardize and propagate such installations is underway. Installing only read-only PCs for all but the file servers is just a matter of deciding to implement the process of rendering disk drives read- only. OIT will install a testbed of certain LANs, including the IBM TRN to test out the "network boot" options available. However, commercially avail- able diskless PCs already indicate that this is all functional and operable. Internal Hard Disk Alternatives A competing school of thought on PC security holds that internal hard disks are an acceptable risk in secure (vaulted) environments. This is basically a policy and regulatory issue. So long as the information on the PC hard disk is no more sensitive or compartmented than information that can be left on top of the customer's desks in a vault, most customers would not recognize the existence of a security problem. Actually, there are some issues such as aggregation of data and control and accounting for data files (Privacy Act, FOIA, document registry, etc.)'. However, these issues can be managed by edu- cation and policy rather than technology if desired. Unfortunately, hard disks do pose some technical problems aside from the pol- icy issues. Without floppy disks or some mechanism for backing up the data, the hard drives are too risky to use for important information. Thus a PC with hard disks and no floppy disk drive or a read-only floppy disk drive is 7 C-O-N-F-I-D-E-N-T-I-A-L Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 C-O-N-F-I-D-E-N-T-I-A-L basically not feasible. Hence proposing PCs with hard disks as an alternative misses the target of eliminating floppy disks unless the PC is networked to a file server for backup anyway. And, if the PC is networked to a file server, the need for internal hard disks is reduced to a performance consideration only. Using host disks to backup the hard disk is also a possibility, but the performance and usability of the backup process to a host has yet to be demon- strated. In spite of these reservations, PCs with hard disks are the commercial stan- dard. It is becoming difficult to buy advanced PCs without hard disks, in fact. If their floppy disk drives are only used for backup and these backup diskettes are responsibly handled, PCs with hard disks can be lived with until local area networking becomes more widely available. For PCs not in vaults, removable hard disk drives are also something that should be considered as an acceptable interim solution to minimize or eliminate floppy disk use. Clearly, removable disk drives pose fewer risks than smaller, more easily concealed floppy disks. Configurations with a read-only floppy, disk and two removable disk drives (for backup of each other) are not unreasonable. Recommendations 1. OIT should continue efforts to refine and make available these diskless PC technologies. OIT must make available prototype models of read-only PCs for evaluation, and should ensure that consideration is given to the media security problems in all future supported configurations. 2. DO/IMS and OIT should jointly install a testbed of read-only PC terminals in order to expose all the technical problems, usability issues, and pro- cedural requirements of such a solution to the DO terminal requirements. This effort must result in a finding as to whether this offers a solution to the 1988 and following year requirements for terminals, obviating the need to acquire (by trade) Delta Data terminals as soon as possible. OIT should also seek testbed opportunities with other Agency components to publicize the potential availability of these technologies. 3. OIT should conduct LAN testbeds with the objective of answering all rele- vant security issues and validating the concepts presented above for use of file servers in conjunction with read-only of diskless PCs. This testbed activity must coordinate with standards activities to define a supported configuration of read-only or diskless PCs and file servers. This effort must also address the various customer requirements for LANs. L. OIT should coordinate all the interconnections of LANs among customer offices and from customer offices to remote locations such as a file ser- ver. A backbone grid of fiber optic cabling and distribution systems to support such a network is required and should be standardized upon and installed as rapidly as possible. 5. As soon as LAN standards and issues are agreed upon, OIT must undertake to select, install and maintain this technology. Furthermore, OIT should actively promote this technology and assist in defining solutions to cus- 8 C-O-N-F-I-D-E-N-T-I-A-L Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9 C-O-N-F-I-D-E-N-T-I-A-L tomer problems using diskless or read-only PC technology where applicable as part of any total solutions. 6. Existing policy publications on PC security are not effective in customer education, nor do they establish policy on information management issues. No policy on LANs is available at all. OS and OIT must prepare appropri- ate draft policy in all these areas, including a policy to minimize the use of floppy disks as much as possible. When coordinated and approved, these policies should become Agency regulations rather than mere guide- lines and must be promoted effectively with education. 7. Interim use of internal hard disks in vaulted areas should be recognized as an existing fact and part of the price of participating in the PC revo- lution and staying within the commercial marketplace. The Agency must establish clear policy as to the role of internal hard disks, removable disk drives and how one should use floppy disks only as backup if at all. A choice must be made between living with the hard disks (internal or external) until some unspecified future technology is available, living with them forever, or proceeding at maximum pace to install networked (LAN) disks. If networked disks are installed, a commitment must be made to remove or render read-only the floppy disk drives and a decision must be made as to whether to keep the hard disks or use only the networked disks, trading performance for security. 8. OIT should continue to investigate optical disk technology to see if CDROM or other optical disk varieties can be used to make PCs more secure or more functional in secure configurations. k 9 C-O-N-F-I-D-E-N7T-I-A-L Declassified in Part - Sanitized Copy Approved for Release 2012/08/16: CIA-RDP90G00993R000300390003-9