PROPOSED WORK STATEMENT FOR SUPPORT OF CIRS SECURITY WORKING GROUP

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP85-00142R000100110001-0
Release Decision: 
RIPPUB
Original Classification: 
U
Document Page Count: 
8
Document Creation Date: 
December 22, 2016
Document Release Date: 
July 15, 2010
Sequence Number: 
1
Case Number: 
Publication Date: 
May 10, 1983
Content Type: 
MEMO
File: 
AttachmentSize
PDF icon CIA-RDP85-00142R000100110001-0.pdf293.61 KB
Body: 
Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0 Wawa ROUTING AND TRANSMITTAL ....iP TO: (Name, office symbol, room number, uilding, Agency/Post) Initials Date o ) a ion File Note and Return p roval For Clearance Per Conversation - Requested For Correction Prepare Reply irculate For Your Information See Me mment Investigate Signature Coordination Justify DO NOT use this form as a RECORD of approvals, concurrences, disposals, clearances, and similar actions FROM: (Name, org. symbol, Agency/Post) {U S.GPi1!197.4-0-2u1-847 3354 OPTIONAL FORM 41 (Rev. 7-76) Proscribed by GSA FPMR (41 CFR) 101-11.206 0 1(e Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0 Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0 ODP-83-675 May 10, 1983 MEMORANDUM FOR: Chief, Information Systems Security Group, Office of Security, DDA Chief, Systems Group, Information Management Staff, DDO UIA epresen a ive, CIRS Management Group SUBJECT: Proposed Work Statement for Support of CIRS Security Working Group REFERENCE: A. Task III, Work Statement for Support of CIRS Computer Security Working Group, dated 4 May 1983 B. Proposed Tasking Statement for CIRS Security Working Group, dated 12 January 1983 1. Attached you will find copies of references A and B for your revie During the CIRS Management Group (CMG) meeting of 5 May 1983 Chairman, CMG, submitted reference A for approval. indicated Th-aT-T- was not in a position to approve this statement without consultation with the appropriate Agency components. In addition, I felt that reference B should be more general in nature. 2. I withheld approval of reference A, pending further Agency review and coordination, for the following reasons: o The word "Computer" should be deleted from the title since the name of the group is properly the "CIRS Security Working Group". The intent here is not to limit working group purview to computer security issues but rather to include all aspects Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0 Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0 which may bear on CIRS security. o Without concurrence from the responsible Agency components, I could not approve a proposal permitting the CI RS support contractor, MITRE Corp., access to Agency resources for the purpose of evaluating the security policies and procedures of CIA computer systems and networks. The proposal calls for the contractor to "evaluate the security features ... including software, hardware, procedures, physical, personnel clearance procedures, TEMPEST, and COMSEC."; o Without concurrence from the responsible Agency components, I could not approve a proposal permitting the CIRS support contractor to review and evaluate the RECON GUARD project; and o The proposal should be changed to call for the production of a CIRS Requirements/Policy Document rather than a security plan; we should determine where we want to go before we draw up a plan detailing how to get there. 3. I also, feel that reference B, which I have not approved, is too specific. The tasking statement should be presented in terms of a general objective, leaving the details of how to accomplish it up to the Security Working Group. 4. It is important that we proceed in concert on these issues and that the CIRS Security Working Group (CSWG) have a broad tasking statement to allow it to properly develop a CIRS Security Requirements/Policy Document. I look to the CSWG to develop such a document and the CIA CSWG representatives to formulate and present the Agency position on this vital issue. Accordingly, I will propose to the CMG that: o The word "Computer" in the title of reference A be deleted; o The specifics of reference A be left up to the members of the CSWG; and o Reference B be reworded to provide a broad tasking statement to include the production of a CIRS Security Requirements/Policy Document. This document will serve as the basis for the ADMINISTRATIVE - INTERNAL USE ONLY Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0 Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0 ADMINISTRATIVE - INTERNAL USE ONLY development of satisfactory CIRS security controls and procedures. 5. Should you feel that the positions on reference A and B, as presented above, should be altered or have any questions or comments regarding CIRS security for which I might be of assistance olease hesitate to contact me. I can be reached on D/ODP/ C/MS/ODP C/ISG/OCR/DDI C/INT/PCS/DDO C/PATG/ORD/DDS&T ADMINISTRATIVE - INTERNAL USE ONLY Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0 Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0 1.2 3 0 4 May 1983 Task III Work Statement for Support of CIRS Computer Security Working Group The contractor will work in support of the government sponsored CIRS Computer Security Working Group to evaluate the security policies and procedures of the five computer systems (i.e., NSA SOLIS/WINDMILL, FTD CIRC, CIA and DIA SAFE, and new NPIC NDS) and two networks (i.e., COINS II and DODIIS) that will be used in accordance with the CIRS plan. Government' representatives who are responsible for the security of the five systems and two networks will brief and provide documentation to the contractor. Meetings between the contractor and the government members will be arranged by the CIRS coordinator. The contractor will evaluate the security features of each of these components in areas including software, hardware, procedures, physical, personnel clearance procedures, TEMPEST, and COMSEC. The contractor will use the evaluation criteria established by the DOD Computer Security Evaluation Center and other appropriate evaluation methodologies to provide an overall assessment of each of the components. The CIRS plan calls for these systems to operate in a "compartmented mode" of operations by 1990. Existing security procedures and any proposed new procedures should be evaluated or developed in accordance with this objective. The following substasks are included in this task: Subtasks I Documentation Review and Evaluation Criteria Development The contractor will review and be familiar with current and proposed versions of DCID 1/16, DOD Directive 5200.28, DIA Manual 50-4, DOD Computer Security Evaluation Center Evaluation Criteria, DODIIS DIN VI Criteria, and other pertinent documentation. The contractor will develop evaluation criteria for his efforts for review and approval by the government members of the working group. This subtask which will be documented in the form of a memorandum on arevised as necessary throughout the performance of ofa initiation and the task. Subtask II - Review and Evaluate Security Features of Each of the Component stems The contractor will review the security features of each of the components and document the features of each of these systems in the form of memoranda for the record. Briefings and documentation will be provided for the contractor as necessary and demonstrations of the features will be provided if possible. The contractor will consider the security features such as password protection, host control access procedures, and remote user identification in his eathetsostems htocprotectoORCONI Efocus XDIS,oLIMDISSeandity features used by each of Y eventually the possible inclusion of "G" materials. Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0 Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0 ILLEGIB Subtask III Review and Evaluate RECON Guard Approach and Other New Features The contractor will review the current progress of the RECON GUARD approach, the DIA fingerprint matrix identifier, BLACKER, DIN VI, and other new security facilities to assess their possible use in the overall CIRS effort. Such an assessment will include a technical risk assessment as well as a cost evaluation for the use of these features. These efforts will be documented in the form of memoranda within the third month of the contractural effort. Subtask IV Develop Proposed Security Standards for Overall CIRS Operations The contractor shall use all the previous analyses to develop draft security standards for processing under the CIRS plan. These draft security standards will be documented in a draft CIRS Security Plan that will include the identification of enhancements which must be made to each of the CIRS components in order to achieve these standards. This initial plan will also include resource estimates and identify milestone dates for the enhancement of each of the CIRS components. This initial CIRS Security Plan shall be./ completed within seven months from the initiation of this task. Upon review and possible modification by the government, this plan wil be revised at a future date under a separate task effort. Length of Task: Seven months from initiation of the task. Resources: Approximately 5.0 man-months of effort. Deliverables: a. Subtask I - Memorandum for the record providing evaluation criteria for review and approval by working group. b. Subtask II - Memoranda on the evaluation of each of the component systems. c. Subtask III - Memoranda on RECON GUARD and other specialized security features. d. Subtask IV - Final written report and briefing which summarize all previous efforts and presents the contractor's proposed initial CIRS Security Plan which will be reviewed and approved by the CIRS Computer Security Working Group and the full IHC. e. Monthly status reports. Travel Requirement: a. Local travel. b. One two-day trip to Dayton, Ohio, to visit the FTD facility. Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0 Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0 Clearance Required: a. Personnel o Agency TS/SI/TK/GAMMA with CIA polygraph for professionals working directly on effort. o Agency TS/SI/TK for admin personnel involved with the effort. b. Contractor Facility o Facility clearance for storage of TS/SI/TK materials. Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0 Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0 Attachment 5 12 January 1983 PROPOSED TASKING STATEMENT FOR CIRS SECURITY WORKING GROUP The CIRS Security Working Group will include agency/component representatives who are responsible for the security policies and procedures of computer systems and networks to be used in accordance with the CIRS plan. This working group will be supported by contractor/consultants and be tasked to do the following: o Review current security procedures of existing automated systems/data communications networks which will provide processing services under the CIRS plan highlighting variations in hardware, software, and procedural approaches (e.g., password protection, host control access procedures, terminal identifiers). o Review future security procedures to be incorporated in systems/networks such as SAFE, COINS, and the DODIIS DIN VI model as well as any future changes to,security in current processors. o Concentrate on security features and procedures for the protection of ORCON, "G" materials, EXDIS, and LIMDIS identifying how current systems are controlling access and how CIA and DIA SAFE will handle these materials in the future. o Review'the status and future potential of the RECON GUARD approach and assess its capability to be used as a feature for some or all of CIRS processors. o Assisted by the IHC staff and contractor/consultants, develop a preliminary and final security plan for the overall CIRS effort- incorporating minimum security features that each host and network must maintain in order to provide the specified services under the CIRS plan. Identify by system/network what enhancements must be made by milestone date in order to process the "generally available data" as well as the more highly sensitive material (i.e., "G" material). o Assist in the development, review and approval of a preliminary security plan by 1 September 1983 to be briefed to the IHC and updated on a quarterly basis. Sanitized Copy Approved for Release 2010/07/15: CIA-RDP85-00142R000100110001-0