PROPOSED GUIDELINES FOR ADP DISASTER PREVENTION AND CONTINGENCY BACK-UP PLANNING
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP79M00096A000100060010-9
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
13
Document Creation Date:
December 15, 2016
Document Release Date:
January 22, 2004
Sequence Number:
10
Case Number:
Publication Date:
December 6, 1971
Content Type:
MF
File:
Attachment | Size |
---|---|
![]() | 508.35 KB |
Body:
Approved For Release 2004/02/10 : C1j. pM00096A000100060010-9
6 December 1971
MEMORANDUM FOR: Chairman, United States Intelligence Board
Security Committee
SUBJECT : Proposed Guidelines for ADP Disaster
Prevention and Contingency Back-up Planning
1. Attached for Security Committee approval are Proposed
Guidelines for ADP Disaster Prevention and Contingency Back-up
Planning. These guidelines have been developed by the Computer
Security Subcommittee In cooperation with the Support Staff of the
Intelligence Information Handling Committee,. and are designed for
dissemination to the USIB Community to assist member organizations
in addressing the problems of disaster prevention and contingency
planning in automatic data processing operations.
2. The proposed guidelines have been coordinated throughout
the USIB Community at the Subcommittee level with the exception
of the Atomic Energy Commission, which has not consistently
participated in recent CSS meetings. All other Subcommittee
members have concurred in the content of the proposed guidelines.
3. Since promulgation of this paper is to be co-sponsored
with the Intelligence Information Handling Committee, copies of
the attachment are being furnished the IHC Support Staff for IHC
dissemination at this time. After SECOM approval of the document,
it will be forwarded to the Chairman, .IHC for coordination with his
Committee.
"SIGNED"
I
Chairman
Computer Security Subcommittee
CCs Chief, IHC Support Staff w/att
STAT
Will? I
Excluded from automatic
Approved For Release 2004/02/10 : CIA ff00096A000100060010-9
downgrading and
declassification
OFFICIAL USE ONLY
Approve c,f I? sSe 208f 1o2111 +q- 6A014bq?060010-9
1. PURPOSE
C 3EC 1971
To provide basic guidance for the development of a
disaster prevention and contingency back-up program for
insuring the continuous computer processing and exchange of
vital information. To outline the major areas of concern and
list conditions and procedures necessary to insure the
protection of ADP assets. To list actions and procedures for
consideration in the formulation of a contingency plan.
H. APPROACH
Guidance set forth herein is based on the premise that
organizations relying heavily on computer system operations
should develop an integrated ADP Disaster Prevention and
Contingency Back-Up Program to minimize the severity and
effects of unforeseen computer system di_sas.ters. Such
planning should be a specific design factor integrated into
total system planning for each individual system and its
unique environment.
111. GENERAL CONSIDERATIONS
'Potential causes of disaster vary considerably in their
Approved For Release 2004/02/10 : CIA-RDP79M00096AO00100060010-9
OFFICIAL USE ONLY
OFFICIAL USE ONLY,
Approved For Release 2004/02/10 : CIA-RDP79M00096A00010006CPA8. 2
%W fir'
probability of occurrence, degree of criticality and
feasibility of preventive and/or hack-up measures. Fires,
explosions', toxic fumes, nuclear weapon detonation and the
effects of natural disasters such as'earthquakes, hurricanes
and floods can be immediately disastrous resulting in the
death or serious Injury to personnel. The damage caused by
such events to computer equipment, the physical structure
housing the system, and the storage media may be disastrous
for an extended period of time depending upon resource
recovery capabilities. Other disruptive events such as
outages of electric power or air conditioning, the loss of
telecommunications facilities or the erasure of vital
information from magnetic 'storage media are not likely to be
as serious because back-up measures can be provided.
Although positive security actions and procedures can reduce
the effects of riots, theft, sabotage and vandalism, these
events can occur and result in disastrous operating
consequences.
IV. DISASTER ANALYSIS
A disaster includes any incident or event which results
in a critical disruption of the computer operations.
Rescheduling of work loads according to user priority may be
required depending upon the allowable delay of the most
critical user processing requirements. Processing priorities
may also he required if the disruption results in partial
Approved For Release 20 OFFICIAL: USE Ol. 9M00096AO00100060010-9 CIA-R
OFFICIAL USE ONLY
Approved For-Release 2004/02/10 : CIA-RDP79M000966AAQ00100MA(%T0-$
operability of the system. The disruption can reach major
proportions rendering the system inoperable for a prolonged
period of time and requiring movement of highest priority
processing to an alternate computer site.
The emergency or back-up actions needed to restore the
capabilities of a computer system after a disaster has
occurred should be proportionate to the critical effects of
that disaster. These actions may be identified through
consideration of at least the following:
1. The event, cause or condition creating the disruption;
2. The capability to restore the system;
3. The total period of time the system is expected to be
nonoperational;
.4. The tolerable time-limits of system inactivity based
on user requirements and dependent upon the type of system;
5. The feasibility of a degraded mode of system operation
whereby critical processing could continue; and
6. The availability of an alternate system capable of
assuming the critical processing requirements for a
specified period of time.
V. MAJOR AREAS OF CONCERN AND PREVENTIVE MEASURES
The major areas of concern involve the protection of
assets required for computer operation. The protection of
AC)P assets requires the Implementation of various measures
as part of a disaster prevention program. Security and
Approved For Release 2004/02/10 : CIA-RDP79M00096AO00100060010-9
OFFICIAL USE ONLY
OFFICIAL USE ONLY
Approved For__ReJease 2004/02/10: CIA-RDP79M00096A0001000 QJp-94
computer personnel should be alert to the possibility that a
disruption in computer activity may be deliberate rather
than accidental and should investigate any situation where
such evidence exists. Although the configuration of computer
systems and the physical environment of computer centers
vary, the following areas are applicable to all systems:
1. System Hardware: The mechanical, electronic,
magnetic and electrical components of a computer system.
a. Maintenance: Normal maintenance contracts with
equipment vendors represent the initial preventive measure
against a potentially serious disruption of operations.
b. Engineering Support: Technical support should be
available on a 24 hour on-site basis if the computer center
requires such support. Back-up . of critical hardware
components should be provided by the equipment vendor
on-site or in a readily accessible location.
c. Hardware Security: The implementation of measures
such as memory protection and user/executive modes of
operation is recommended to insure protection of user data
sets.
2. System Software: Computer programs and procedures
including system and user programs.
a. Testing a New Installation: Duplicate programs
should be run on both the current and proposed system so
that the data can be compared. If duplicate testing is not
Approved For Release 2004/02/10 : CIA-RDP79M00096AO00100060010-9
OFFICIAL USE ONLY
Approved For Release 200Qluzpa Pf%- Fy7-9M000966AA0001000 a -95
feasible, a test deck should be used to check the system's
logic.
b. Program Changes and Testing: Extensive program
debugging is recommended to reduce the number of disruptions
caused by software errors. Any request for a program change
should be submitted in writing and the action authorized
only by a responsible manager. The. number of persons
authorized to make changes in operating programs should be
limited. Program testing should be subject to review by
authorized personnel and not conducted solely by the person
who wrote the program.
c. Software Security: Software security measures such
as user identification and authorization should be used to
reduce the possibility of unauthorized personnel accessing
the system.
3. System Operational Personnel: The individuals whose
primary duties are concerned with the operation of the
computer system.
a. Selection of Key Personnel: Key personnel
designated to continue the operation of a computer system
should be briefed and provided written guidance as to their
responsibilities and duties in the event of a disaster.
b. Training of Key Personnel: Training programs
should be developed which stress the proper handling and
maintenance of computer system components. Key personnel
should he broadly cross-trained in the event that certain
Approved For Release 2004/02/10 : CIA-RDP79M00096AO00100060010-9
OFFICIAL USE ONLY.
OFFICIAL USE ONLY.
-Approved For Release 2004/02/10: CIA-RDP79M0009 0010006PA9
key personnel should be unable to respond to an emergency
situation.
c.'Personnel Security: Computer personnel, visitors
and users constitute a theft and/or'sabotare threat to the
computer center. Restrictions on 'the number of people
allowed unescorted access and on the areas to which they
have access are recommended.
4. System Environment: The computer facility,
supporting utilities and operational posture.
a. Facility (General): The facility housing a
computer system should be constructed of fire resistant
building materials and equipped with appropriate smoke
detection, heat sensing and fire fighting devices. Periodic
safety checks of such devices for their operational
capability is encouraged. The use of the FPMR and the
National Fire Code volume 5, section 75 is recommended in
the construction of computer facilities. Consideration
should be given to maximum physical protection against the
potentially catastrophic effects of natural disasters
(hurricanes, earthquakes and floods) as well as conventional
and nuclear weapons.
b. Auxiliary Power and Air Conditioning:
Malfunctions and failures of electric power and/or air
conditioning are two of the major causes of disaster
affecting a computer system. Provisions should be made for
the use of an independent back-up power source as well as
Approved For Release 2004/02/10 : CIA-RDP79M00096A000100060010-9
OFFICIAL USE ONLY
OFFICIAL USE ONLY
-9
Approved For Release 2004/02/10: 000VTH-97
Nw~ NW
providing for immediate repair or replacement of air
conditioning equipment. Consideration of line monitors
and/or overvoltage protectors to prevent damage from power
failure and power surges is recommended. Security controls
should be applied to reduce the possibility of willful or
inadvertent damage to the electrical and air conditioning
equipments.
c. Physical Security and Control: Access to the
facility housing the system by other than authorized
personnel should be prohibited. The mechanisms installed to
enhance the security of the computer system area should be
controlled by personnel designated as responsible for their
maintenance and integrity. All procedures relating to
facility control should be in writing and made available to
assigned personnel.
5. Data Files: Storage areas for magnetic storage media
should be located outside the main computer area, preferably
in a vault or secure area depending upon security
considerations. Proper temperature and humidity should be
maintained and cleanliness restrictions should be observed.
All appropriate executive programs, system documentation,
operation manuals, etc., required for the computerized
processing of information should be identified, duplicated,
and safely stored. Security procedures should be installed
to prevent unauthorized personnel from removing files such
as magnetic tapes from the computer center.
Approved For Release 2004/02/10 : CIA-RDP79M00096AO00100060010-9
OFFICIAL USE ONLY
OFFICIAL USE ONLY
-Approved ForrRRelease 2004/02/10: CIA-RDP79M000 6A0001000we
-9$
6. Communication Lines: Requirements for protecting
communication lines will vary depending upon the existence
and location of remote terminals. The communication links
from the central processor to the remote consoles are
vulnerable to crosstalk, electromagnetic radiation and
wiretaps. Unprotected data transmission should be
eliminated by use of cryptographic techniques or by physical
security measures. Back-up communication facilities should
be available to reduce the effect of failures in the
communication area.
7. Supplies: Supplies that are essential to computer
operations should he identified and accessibility to
back-up supplies should be provided.
V I . CONTINGENCY PLANNING
A manual or handbook detailing the computer center
methods of operation In the event of a disaster should be
prepared. It should specify the contingency or back-up
actions to be taken, individual responsibilities for these
actions and the follow-on investigative and reporting
requirements. The degree of implementation of the
contingency plan will depend upon the criticality of the
disaster.
Planning for possible emergencies should consider the
Approved For Release 2004/02/10 : CIA-RDP79M00096AO00100060010-9
OFFICIAL USE ONLY
OFFICIAL USE ONLY
Approved For Release 2004/02/10: CIA-RDP79M00096A0001000P-t
recommendations listed below for disaster prevention and/or
coping with disasters which have occurred.
A. Prior Planning
1. Duplication and storage of vital programs,
documentation and data files in a readily accessible
location, preferably off-site.
2. A determination that the fire safety equipment and
emergency plans are adequate to minimize damage from smoke,
chemicals, water or fire.
3. A determination that adequate electrical power, air
conditioning equipment, and heating systems are available
for back-up use.
4. Training of computer personnel to insure that they
are aware of proper procedures for operating and protecting
equipment and are aware of their responsibilities in the
event of a disaster.
5. Up-to-date lists of emergency and support
organizations and personnel with whom contact may be
required. This may include medical centers, fire stations,
security services and equipment maintenance services.
Approved For Release 2004/02/10 : CIA-RDP79M00096A000100060010-9
OFFICIAL USE ONLY
OFFICIAL USE ONLY
Approved For
NOW lease 2004/02/10 : CIA-RDP79M000Q6Ai00010006QRC 910
6. All data being processed should bear a priority of
processing order. Users should be alert to the need for
manual information processing in the event computer
processing is not available for low priority processing.
7. Copies of all disaster planning documentation should
be provided to each major functional area supporting the
organization. Specific roles and responsibilities of each
supporting function should be closely coordinated.
8. The contingency plan should he updated periodically
to reflect changes in equipment, user requirements,
personnel, and back-up computer compatibility and
.availability.
B. Major Disaster Planning- Contingency planning for a
major disaster which requires movement of computer
processing activities to an alternate site should also
consider the following recommendations:
1. Prior Identification of an alternate computer system
compatible with in-house systems that can be available if
.needed. Physical surrondings of the alternate system should
conform to required security and safety standards.
2. Identification and designation of personnel to
Approved For Release 2004/02/10 : CIA-RDP79M00096A000100060010-9
OFFICIAL USE ONLY
OFFICIAL. USE ONLY
Approved For Release 2004/02/10: CIA-RDP79M000966AAO00100060X1p 9
/1 GE 11
manage and operate the alternate system should be documented
and updated as the need arises.
3. The computer operations at the alternate site should
be carefully documented. Among other issues, this document
should address such items as the transportation of alternate
site computer personnel, their responsibilities during
alternate site operations, the necessary security
considerations for the computer environment and the transfer
of classified data to the alternate site, and the priority
processing order of data.
4. Periodic operation of the alternate computer system
using the duplicate documentation, software and data files
by the designated alternate system personnel should be made.
Results should be compared with normal operations in order
for changes to be effected if required.
5. Instructions for the destruction of classified.-data'
and/or equipment under combat-emergency conditions where
such classified materials may be reasonably expected to fall
Into the possession of unauthorized persons.
C. Post Disaster Planning
1. A determination of the criticality of the disaster
considering anticipated time of system inoperability and
Approved For Release 2004/02/10 : CIA-RDP79M00096AO00100060010-9
OFFICIAL USE ONLY
Approved For
Release 2009/0F p1I0_L A Uf P79M0009 A0001000RWIP-912
Nue
user processing requirements.
2. Immediate notification to management and system
users of the estimated length of delay in operations to
allow the users to consider alternate operational methods.
3. Notification of the appropriate higher levels of
management if the time delay exceeds initial estimates.
4. Contact with the appropriate emergency and support
organizations depending upon the cause and extent of the
disaster.
5. A determination of the feasibility of continued
computer operation in a degraded mode.
6. Initiation of actions to move computer operations to
an alternate site if conditions warrant the move.
7. A determination that the disaster has not degraded
the essential system hardware, software or physical security
features and that procedural security controls remain in
effect.
Approved For Release 2004/02/10 : CIA-RDP79M00096AO00100060010-9
OFFICIAL USE ONLY