GUIDANCE FOR THE SECURITY ANALYSIS, TEST AND EVALUATION OF RESOURCE-SHARING COMPUTER SYSTEMS
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP78-04723A000100040001-1
Release Decision:
RIPPUB
Original Classification:
C
Document Page Count:
2
Document Creation Date:
December 9, 2016
Document Release Date:
April 14, 2000
Sequence Number:
1
Case Number:
Publication Date:
November 19, 1970
Content Type:
MF
File:
Attachment | Size |
---|---|
CIA-RDP78-04723A000100040001-1.pdf | 171.16 KB |
Body:
(ONFIDENTIAI
Approved For Release''E000708/28 : CIA-RDP78-04723A00tO_Ob10001-1
i c --De
IS NOY 197r
MEMORANDUM FOR: CIA Member of the USIB Computer Security Subcommittee
SUBJECT Guidance for the Security Analysis, Test and Evalu-
ation of Resource-Sharing Computer Systems
REFERENCE . Your memo for the Information Processing Coordi-
nator/DDS dtd 13 November 1970; same subject
1. The deadline you established for comments about the draft
guidance was too short to permit a very careful or thorough consi-
deration of the proposal. A hasty review leads to the conclusion
that the proposal is totally impractical. The time, cost, and rela-
tive lack of resources required to analyze, test, and evaluate all
user programs would cause computer systems to founder from the weight
of their own overhead. I wonder whether any effort has been made to
assess the magnitude of the task that would be involved, how long it
would take how many people to do it at what cost, and evaluate that
in terms of the risk of not doing it in order to get some notion of
its worth. Perhaps a more practical and direct approach would be
simply to take particular are to guarantee the reliability, in the
personnel security sense, of systems programmers. .
2. There is a statement in paragraph III that the "security
analysis, test and evaluation should be conducted when the system is
operating...." There is nothing to say what happens if the systems
fail to pass the test and evaluation, but presumably it means that
they would have to be redesigned and reprogrammed. I have no way of
guessing how many existing programs or programs yet to be developed
would pass the test but the failure of any of them resulting in a need
to start over again would impose an unbearable burden on the systems
people and cause the alienation of users and managers at all levels
of the organization.
3. The scope of the paper says that the guidance applies "to
all community intelligence functions using resource-sharing computer
systems support for which special handling controls have been esta-
blished." The use of the word "all" presumably applies whether the
systems function in a totally intra-agency environment or an inter-
agency exchange. Perhaps this requires some clarification.
Approved For Releas~~000lO~~~T;ICA~
3A000100040001-1
CONFIDENTIAL
Approved For Release' 2000108/28 : CIA-RDP78-04723A000100040001-1
4. The statement of the scope says the guidance applies to
the intelligence functions for which special andlingscontrolsc have
been established. "Special handling" presumably
"intelligence functions" presumably do not include functions with
which we are primarily concerned in the Support Directorate. We have
established special handling controls for many of our systems that
deal with Security, Personnel, Financial, and Budgetary information
which are extremely sensitive but are not intelligence functions and
do not fall within any codeword system. I interpret the language in
the statement of scope to mean, therefore, that the guidance proposal
would not apply to systems in the Support Directorate. This is the
interpretation I would prefer and I would appreciate confirmation
that the Guidance does not apply to Support functions.
5. The word "should" is used throughout the paper with never
a specification of who "should", and there is nothing to say what the
consequences will be if all of those things which "should" be done
are not. The paper says that systems should be accredited but we do
not know who is authorized to do the accrediting. The combination of
the effort to analyze, test, and evaluate systems should be a positive
or negative recommendation for accreditation but there is no way of
knowing to whom the recommendations are to be submitted.
6. The editorial style of the paper is troublesome throughout.
One example from page 2: "A. Security Analysis - This process will
encompass the accumulation of all conceptual approaches and features
for providing security protection of information...." Perhaps the
problem is self-evident, but what is a conceptual approach? Row does
one accumulate conceptual approaches? How does a process encompass
the accumulation?
7. Pages 8 through 11 discussing security testing seem, in a
hasty review, to be almost exactly deplicative of pages 2 through 7
describing security analysis. I should think that a careful editorial
review would make it possible to improve the organization of the paper
significantly and shorten it appreciably.
25X1A
DDIS
Information Processing Coordinator
25X1A
DDS/SSS/RHW:sd (18 November 1970)
Distribution :
Orig & 1 - Addressee
1 - SSS Subject
1 - SSS Chrono
Approved For Release.2000 RftD gM178 j " 1 0040001-1
ae,.,,., raw