DIRECTOR OF CENTRAL INTELLIGENCE DIRECTIVE NO. 1/16 SECURITY OF COMPARTMENTED COMPUTER OPERATIONS

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP84-00780R004000100003-6
Release Decision: 
RIFPUB
Original Classification: 
C
Document Page Count: 
5
Document Creation Date: 
December 19, 2016
Document Release Date: 
October 16, 2006
Sequence Number: 
3
Case Number: 
Publication Date: 
January 7, 1971
Content Type: 
REGULATION
File: 
AttachmentSize
PDF icon CIA-RDP84-00780R004000100003-6.pdf330.38 KB
Body: 
Approved For Release 2006/10/16: CIA-RDP84-0078OR004000100003-6 DCID No. 1/ 16 (New Series) DIRECTOR OF CENTRAL INTELLIGENCE DIRECTIVE NO. 1/16 SECURITY OF COMPARTMENTED COMPUTER OPERATIONS (Effective 7 January 1971) Pursuant to the provisions of NSCID No. 1 (New Series, revised 4 March 1964), paragraph 2, subparagraph a. (5) and in order to ensure uniform protection of sensitive compartmented information 1 when such informa- tion is stored and/or processed in remotely accessed resource-sharing computer systems, minimum security requirements are established for the utilization of such computer systems in a compartmented mode of operation. These requirements are equally applicable within the USIB Community, and to contractor and non-USIB government systems han- dling sensitive compartmented information. The diversity and complexity of such computer systems now in place in the Community and those already designed for future placement may not provide for compliance with the requirements of this directive in their entirety. Recognizing both the validity of the requirements and the difficulty involved in their application to currently installed and already designed systems, the extent to which the requirements of this directive are applied to such systems is left to the determination of each USIB member in view of his ultimate responsibility for the security of sensitive compartmented information. Nothing in this directive shall supersede or augment the requirements on the control, use and dissemination of Restricted Data or Formerly Restricted Data made by or under existing statutes, directives and Presidential policy. Whenever Restricted Data or Formerly Restricted Data is involved in any compartmented operation of remotely accessed resource-sharing computer systems, appropriate personnel and physical security procedures and controls shall be implemented. (See Section 11, 141, 142.e., 144.a., b., c. and d., 143, and 145, of the Atomic Energy Act of 1954, as amended.) 1 The term "sensitive compartmented information" as used in this directive is identical with its use in DCID No. 1/14 (New Series, effective 1 July 1968). It is intended to include all information and material bearing special Com- munity controls indicating restricted handling within Community intelligence collection programs and their end products for which Community systems of compartmentation are formally established. The term does not include Re- stricted Data as defined in Section 11, Atomic Energy Act of 1954, as amended. GROUP 1 Excluded from automatic downgrading and declauification Copy N2 47 Approved For Release 2006/10/16: CIA-RDP84-0078OR004000100003-6 Approved For Release 2006/10/16: CIA-RDP84-00780R004000100003-6 Purpose 1. This directive prescribes the basic policy concerning the security aspects of utilizing remotely accessed resource-sharing computer systems in a compartmented mode of operation. It specifies the conditions and prescribes minimum security requirements under which such systems may be operated. Further it assigns the responsibility for the security analysis, test, and evaluation as well as for the accreditation of such systems to individual USIB members. 2. Remotely Accessed Resource-Sharing Computer System: A system which includes one or more central processing units, peripheral devices, remote terminals, communications equipment and interconnecting links, which allocates its resources to more than one user, and which can be entered from terminals located outside the computer center. 3. Compartmented Mode of Operation: Utilization of a remotely ac- cessed resource-sharing computer system for the concurrent processing and/or storage (a) of two or more types of sensitive compartmented information or (b) of any type of sensitive compartmented information with other than sensitive compartmented information. System access is afforded personnel holding Top Secret clearances but not necessarily all the sensitive compartmented information access approvals involved. 4. Controlled Top Secret Environment: Total system protection and control from a physical, technical and personnel security standpoint in accordance with the minimum requirements for the processing and handling of Top Secret material. 5. System Accreditation: Approval by USIB member for a remotely accessed resource-sharing computer system to be operated in a compart- mented mode within a controlled Top Secret environment as defined above. Policy 6. Remotely accessed resource-sharing computer systems shall not be utilized for the concurrent processing and/or storage of two or more types of sensitive compartmented information, or of any type of sensitive compartmented information with other than sensitive compartmented information unless the total system is secured to the highest classifica- tion level and for all types of sensitive compartmented information processed or stored therein, except as provided for below: a. Such systems may be operated in a compartmented mode if maintained in a controlled Top Secret environment as defined herein and provided that at least the minimum requirements identified in this directive are implemented and made a part of system operation; Approved For Release 2006/10/16: CIA-RDP84-00780R004000100003-6 Approved For Release 2006/10/16: CIA-RDP84-0078OR004000100003-6 ? ? ? CONFIDENTIAL b. Upon the determination by a USIB member in unique situations that immediate implementation of the minimum requirements will significantly impair his mission effectiveness, he may temporarily exempt specific systems operating in a compartmented mode from compliance; however, every USIB member authorizing such an exemp- tion must strive for the earliest feasible attainment of the minimum requirements identified in this directive. 7. Judicious implementation of the basic requirements set forth below dictates a need to test and evaluate their effectiveness when applied to a specific system as a basis for accreditation of that system. Each USIB member is responsible for conducting such testing and evaluation and has the authority to accredit systems within the purview of his responsibility for compartmented operation based on their meeting the requirements specified in this directive. Such accreditation shall be subject to periodic review of the security of system operation. Minimum Requirements 8. All remotely accessed resource-sharing computer systems accredited for compartmented operation shall contain the following security capa- bilities as an absolute minimum: a. Information System Security Officer (ISSO): Each USIB member shall appoint a security officer for each computer system operating in a compartmented mode within the purview of his responsibility. The ISSO is specifically responsible for ensuring continued application of the requirements set forth in this directive, for reporting security deficiencies in system operation to the USIB member, and for moni- toring any changes in system operation as they may affect the security status of the total system. b. Personnel Security and System Access Control Measures: Un- escorted access to the computer center shall be limited to personnel with a predetermined need and holding Top Secret clearances as well as access approvals for those types of sensitive compartmented infor- mation stored and/or processed by the system. Other personnel re- quiring access to the computer center area shall be properly escorted. A record shall be maintained of personnel who have access to the computer center. Access to and use of remote terminals shall be limited to designated personnel holding Top Secret clearances and access approvals for all compartmented information designated for input/ output at that terminal. Administrative approvals, not requiring sub- stantive briefings, may be granted for access to the computer center and/or remote terminals when access to all sensitive compartmented information stored and/or processed in the system is not operationally required. 3 CONFIDENTIAL GROUP 1 Excluded from automatic downgrading and dedowiflcation Copy N! 47 paved For Release 2006/10/16: CIA-RDP84-00780R004000100003-6 c. Physical Security Protection: Physical security requirements for the computer center and remote terminal areas shall be determined by the classification and types of sensitive compartmented information involved. The physical security of the computer center area shall be based on prescribed requirements, as implemented by each USIB member for the most demanding sensitive compartmented information stored or processed by the system; each remote terminal shall be protected in accordance with the requirements for Top Secret informa- tion and for all sensitive compartmented information designated for input/output at that terminal. Those terminals designated for the input/output of sensitive compartmented information shall be in areas approved at least as temporary work areas for the sensitive compart- mented information involved while operating in a compartmented mode. d. Communications Links: The communications links between all components of the system shall be secured in a manner appropriate for the transmission of Top Secret sensitive compartmented infor- mation. e. Emanations Security Aspects: The vulnerability of system opera- tions to exploitation through compromising emanations shall be con- sidered in the process of system accreditation. Evaluation of the risks associated with the computer center and the remote terminal areas as well as related control measures shall be accomplished within the appropriate agency. f. Software/Hardware Controls: Compartmentation of information stored and/or processed in the system shall be based on the features outlined below. Measures shall be implemented to provide special controls over access to and/or modification of these features. (1) Security Labels: Security classification and other required control labels shall be identified with the information and programs in the system to ensure appropriate labeling of output. (2) User Identification/ Authentication: System operation shall include a mechanism that identifies and authenticates personnel accessing it remotely. This mechanism shall consist of software and/or hardware devices, manual control procedures at terminal sites, and other appropriate measures designed to validate the identity and access authority of system users. (3) Memory Protection: Hardware and software control shall be exercised by the system over the addresses to which a user program has access. (4) Separation of User/Executive Modes of Operation: The user and executive modes of system operation shall be separated so that a program operating in user mode is prevented from performing ? 0 Approved For Release 2006/10/16: CIA-RDP84-0078OR004000100003-6 CONFIDENTIAL unauthorized executive functions. Controls shall be implemented to maintain continued separation of these modes. (5) Residue Clean Out: Measures shall be implemented to ensure that memory residue from terminated user programs is made in- accessible to unauthorized users. (6) Access Control: Effective controls shall be implemented to limit user and terminal access to authorized information and pro- grams as well as to control read and/or write capability. (7) Audit Trail Capability: Each system shall produce in a secure manner an audit trail containing sufficient information to permit a regular security review of system activity. g. Individual Security Responsibilities: All users of the system shall be briefed on the need for exercising sound security practices in pro- tecting the information stored and processed by the system, including all output. Users shall be informed that the system is operating in a compartmented security mode and that the receipt of any information not specifically requested shall be reported immediately to the ISSO. 9. This directive declares the policy of the United States Intelligence Board concerning minimum security requirements for the compart- mented operation of remotely accessed resource-sharing computer sys- tems in a controlled Top Secret environment. This policy shall become effective as soon as practicable after approval of this directive but in no case later than 1 February 1971. Existing directives,2 regulations, agree- ments and such other references governing access to sensitive compart- mented information as defined herein shall be revised accordingly. This Directive shall be reviewed within three years from date of issuance and modified in the light of developments in computer security. Richard Helms Director of Central Intelligence 5 GROUP 1 Copy N2 47 Approved For Release 2006/10/16: CIA-RDP84-0078OR004000100003-6