RESPONSE TO DIRNSA CONCERNING CAPABILITIES PROGRAMMING AND BUDGETING (CPB) COMPUTER SUPPORT

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP85-00142R000100370002-1
Release Decision: 
RIPPUB
Original Classification: 
T
Document Page Count: 
18
Document Creation Date: 
December 23, 2016
Document Release Date: 
April 19, 2013
Sequence Number: 
2
Case Number: 
Publication Date: 
January 12, 1983
Content Type: 
MEMO
File: 
AttachmentSize
PDF icon CIA-RDP85-00142R000100370002-1.pdf837.78 KB
Body: 
Declassified in Part- Sanitized Copy Approved forRelease2013/04/19 : CIA-RDP85-00142R000100370002-1 STAT STAT ROUTING AND RECORD SHEET SUIUKTs (001 II Response to DIRNSA Concerning Capabilities Programming and Budgeting (CPB) Computer Support ?DP-Pi-04 F4066 EXTENSION NO. DCl/IC 83-3505 Director, Staff Intelligence Community DATE 12 January 1983 TO: (OfRaiies4_ignotion, building) a,1.0 room number, and _ cc,st? es DATE OPFKER'S INITIALS COMMENTS (Numb*, teach comment to show from whom so whom. Draw a lino across column after each tommont.) REMO FORWAKIED L D/ODP Rm 2D0 HOS 25 JAN 1983 2 5 JAN (lid' 67,~4.0 tie...44. Ale:4i- iN-4-- qrilv/5). , 2. i. ?rm ,A2 ?, 7..0,44 )V 64/1;f4t tr Tcr"-' ? 3. cleite() 36- flr 4. .. 5. tt k ? . 6. 7. 1 8. ! 9. 1 10. 11. 11 , 13. 14. 15. FORM 610 USID17741?Uld 1-79 Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 STAT STAT DCl/IC 83-3505 12 January 1983 MEMORANDUM FOR: Deputy Director of Central Intelligence FROM: SUBJECT: REFERENCES: Director, Intelligence Community Staff Response to DIRNSA Concerning Capabilities Programming and Budgeting (CPB) Computer Support a. Memo to DIRNSA from ADM Inman dtd 22 Feb. 1982, subj: Community Data Processing Support for CPB b. Memo to DDCI from DIRNSA dtd 15 March 1982 same subject c. Memo to DDCI from DIRNSA dtd 27 Dec. 1982 same subject 1. Action Requested: That you sign the attached memorandum to Lt. General Faurer. 2. Background: On 22 February ADM Inman sent reference a to DIRNSA asking for NSA's assistance in providing improved computer support to a range of budget activities conducted by the ICS and the Community's program offices. DIRNSA's initial response, in reference b, suggested that more details were required before he could commit to the requested support. Since then, additional discussions between our staffs have occurred; congressional concerns about the effort have been alleviated by our agreeing not to use a computer solely dedicated to this function; and after seemingly endless delays within NSA, they propose to provide the support outlined in DIRNSA's latest memorandum of 27 December (reference c). 3. The attached response accepts their proposal with two mild caveats. First, because DIRNSA's memorandum is mute on NSA's willingness to provide at FOC communications to program offices other than those to be connected at IOC, we have included a reminder of this requirement in paragraph 1. Second, you will note that NSA's proposal includes a very conservative schedule for system completion that provides a comfortable hedge against all contingencies. As alluded to in paragraph 2 of your response, we remain hopeful that the job will prove less complex than they originally estimated, and at least some of the requested capabilities will be available late this year. Thus far cooperation at the working level has been quite good. Attachment: As stated , ?+(ear Aamiral, USN All Portions of this Memorandum are UNCLASSIFIED Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 Declassified in Part- Sanitized Copy Approved forRelease2013/04/19 : CIA-RDP85-00142R000100370002-1 ine Deputy Director of Central Intelligence IWashington. D C.20505 STAT 1s JIVI 1983 MEMORANDUM FOR: Lieutenant General Lincoln D. Faurer, U.S. Air Force Director, National Security Agency/ Chief, Central Security Service SUBJECT: Community Data Processing Support for Capabilities Programming and Budgeting 3? 5 1. I was pleased to receive your memorandum of 27 December agreeing to help the IC Staff establish improved computer support for Community budget activities. As you described, the system at IOC will include electrical connections amona oroaram offices at NSA, the IC Staff, the CIA, the DIA, and In addition, if the development proceeds as we anticipate, to achieve FOC we will need NSA's assistance in establishing electrical connections for at least some of the remaining seven NFIP members. These additional communications would be required no sooner than CV 1984, and all software required by these remaining program offices would be developed by the IC Staff. 2. In all other respects your proposal agrees with our expectations. Although I am hopeful that the currently projected IOC completion date will prove conservative, I understand that a more detailed specification of requirements is necessary before it can be reevaluated and possibly advanced. In the interim, I am told that the necessary detailed discussions are under way and proceeding well. IS ' John N. McMahon All Portions of this Memorandum are UNCLASSIFIED Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 -- Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 iv1/4.:11/4._ Mshingt. cm. D C20505 ?7r1 25X1 22 February 1982 MEMORANDUM FOR: Lieutenant General Lincoln D. Faurer, USAF Director, National Security Agency/ Chief, Central Security Service SUBJECT: Community Data Processing Support for Capabilities Programming and Budgeting (CPB) 1. As you are aware, the new Capabilities Programming and Budgeting System (CPB) is being implemented by NFIP component organizations commencing with the FY 1984 budget cycle. A major element of the CPB system is the . concurrent development of data processing support that Community program offices can use to prepare, edit, and communicate with the Intelligence Community Staff the data and text that comprise their budget submissions and justification material for the Congress. (U) 2. The concept of operations for the proposed system is straightforward and can be summarized as follows: NFIP components will have electrical access to a Community computer, using, wherever possible, existing word processing stations as terminals. The central computer will serve as a communications medium between the ICS and all components. In addition, the ICS and some components will use the Community computer to maintain and manipulate their detailed budget data. Other components may choose to use their in-house computers for data base maintenance and provide updates to the Community computer as required. Data and text will be merged to produce required displays using word processor stations--first as terminals to generate and retrieve numeric reports on the mainframes, and then as word processors to add the narrative descriptions. Combined displays will then be communicated with the ICS through the Community computer, edited as required during budget review, and ultimately form the basis for large portions of the Congressional Budget Justification Books (CBJBs). CBJB material will be communicated from the Community computer to the Printing and Photography Division at CIA for photo composition and printing. (U) Declassified in Part - Sanitized Copy Approved for Release 2013/04/19 : CIA-RDP85-00142R000100370002-1 - Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 SUBJECT: Community Data Processing Support for Capabilities Programming and Budgeting (CPB) ? 3. My goal is to have an initial capability as outlined above operational by 1 August 1982 for the larger NFIP components (i.e., CCP, CIAP, 25X1 GDIP, and for the entire Community in 1983. My staff has discussed the requirements for the system with a number of Community participants, and it is apparent that to achieve this goal we must take advantage of efforts already under way that are relevant to the task. Discussions with NSA personnel indicate that N2 is currently developing an internal capability analogous to that envisioned for the Community system, and much of the hardware, software, and data processing expertise being applied to the NSA system appears to be directly applicable to Community needs. For this reason, I request that NSA take the lead in providlna the necessary ADP support 25X1 to fully implement the CPB system across the NFIP. 4. As an initial step, I propose that your representatives meet with the IC Staff to more fully detail the system requirements. An important considera- tion in formulating the requirements is to size the Community computer to handle both the CPB task and other Community applications that are candidates for eventual implementation on the Community machine. Future NSA support, perhaps in conjunction with other NFIP components, may be required for these activities as well How v r my near-term priority is clearly CPB 25X1 implementation. 25X1 25X1 25X1 25X1 The IC Staff action officer for this task is (secure I believe close coordination between all participants is essential roug out the development process the system meets Community needs within the short time available. Admiral, U. S. Navy 2 CONFIDENTIAL Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 Araia411419* Declassified in Part - Sanitized Copy Approved for Release 2013/04/19 : CIA-RDP85-00142R000100370002-1 ?-?c ITRAL SECURITYSERVICE FORI GEORGE G. MEADE. MARYLAND 20733 a CONFIDENTIAL Serial: N0288 15 March 1982 MEMORANDUM FOR THE DEPUTY DIRECTOR OF CENTRAL INTELLIGENCE SUBJECT: Community Data Processing Support for Capabilities Programming and Budgeting (CPB) (U) 1. (U) The requirement outlined in your memorandum of 22 February is a complex problem which I regret cannot be fully resolved in time to meet your 1 August operational goal. I believe that the first objective of our staffs should be to develop a more complete and detailed specification, decide the relative priorities of the various capabilities required, and evaluate the potential of existing systems and software. Then a system concept and phased implementation schedule can be developed, along with alternative approaches that may result in a limited capability for the FY 1984 budget cycle. T4, 4779 secure. ? L NCCLN D. FAURER Lieutenant General, USAF Director, NSA/Chief, CSS CONFIDENTIU (1) 25X1 CLASSIFIED BY, NSA/CSSNI 123-2 REVIEW ON neclassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 ? Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 NATIONAL SECURITY AGENCY CENTRAL SECURITY SERVICE FORT GEORGE G. MEADE, MARYLAND 20755 Serial: N-1505-82 27 December 1982 lai4OrA ri MEMORANDUM FOR THE DEPUTY DIRECTOR OF CENTRAL INTELLIGENCE SUBJECT: Community Data Processing Support for Capabilities Programming and Budgeting (CPB) 1. Our staffs have completed their specification and evaluation efforts, as described in my memorandum of 15 March. They have produced a proposal which is within the congressional guidance for CPB processing support for the Intelligence Community (IC) Staff. This proposal is to use our Administrative Computer, on which we perform our CPB processing, and to use the software packages on this system to develop CPB support for the IC Staff. 2. Our staffs have defined a minimum set of requirements that will be met as the initial operating.capability (IOC) of the system. The attached statement of requirements provides a detailed description of these requirements. In brief, the functions to be performed at IOC are: a. Connect the NSA host system with communications to STAT the IC Staff, the CIA, the DIA \C C b. Provide an electronic mail capability between the users to support exchanges concerning congressional questions and their answers, for example. c. Provide a capability to store and forward files, such as the Congressional Budget Justification Book narratives. d. Connect existing word processing terminals to the system, if practicable. e. Provide system access and data access security. f. Provide a demonstration data base. After IOC, the existing data base support for the IC Staff would be replaced on the Administrative Computer. The development of this support would be under the same data base system that we use for our CPB processing and would have compatibility of the two systems as a design goal. I - ' t FOR OFFICIAL USE ONLY Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 , ?? Serial: N-1505-82 3. The delivery of the capabilities described above (items a. through f.) will require some three man years over a 12-month period, primarily to accomplish the communications work. NSA will provide the manpower to work communications for the host computer to the various agencies. Communications within each agency would be the responsibility of that agency. The development of the data base capability, to replace the ' existing IC Staff CPB data base system, will require some nine man years, over a 24-month period. Our computer organization will provide four man years of effort; our program and budget organization will provide one man year of effort; and the IC Staff will provide four man years of effort. Informal discus- sions with the staff have resulted in the identification of two persons who will work full time at NSA in the development of the data base system. 4. After the IOC system and the data base capability have been delivered, our computer organization will provide an additional four people full time for operations and software life-cycle support. The IC Staff will provide the personnel to do the development of any new applications software or enhancements to the delivered applications and to provide user support. End: a/s 5. I trust this proposal meets with your agreement. NCOLN D. FAURER Lieutenant General, USAF Director NSA/Chief, CSS Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 Capabilities Programming and Budgeting System 1. Introduction: The basic requirement for an Intelligence Community Capa- bilities Programming and Budgeting (CPB) System was stated by the Deputy Director for Central Intelligence in his memorandum, to General Faurer, dated 22 February 1982. His statement of the requirement is as follows: NFIP components will have electrical access to a Com- munity computer, using, wherever possible, existing word processing terminals. The central computer will serve as a communications medium between the ICS and all components. In addition, the' ICS and some components will use the Community computer to maintain and manipulate their detailed budget data. Other components may choose to use their in-house computers for data base maintenance and provide updates to the Community computer as required. Data and text will be merged to produce required displays using word processor stations--first as terminals to generate and retrieve numeric reports on the mainframes, and then as word processors to add the narrative discrip- tions. Combined displays will then be communicated with the ICS through the Community computer, edited as required during budget review, and ultimately form the basis for large portions of the Congressional Budget Justification Books (CBJBs). CBJB material will be communicated from the Community computer to the printing and Photography Division at CIA for photo composition and printing. Discussions with representatives of the Intelligence Community Staff (ICS) have identified a subset of the overall requirement which represents the minimum essential requirement (MER) for an initial operating capability (IOC). The following paragraphs further define the overall IOC requirement. The MER requirements are divided into four subsets of requirement: functional require- ments, security requirements, performance requirements and system requirements. Functional requirements are the requirements the user has for specific functions to be performed. Security require- ments are the user's requirements for access to and protection of the system, the data on the system, and the functions of the system. Security requirements also include the physical security (TEMPEST) requirements for the hardware and terminals. Performance requirements are the user's requirements for the system's availability and responsiveness. System requirements are a function necessary to meet the user requirements defined under the three categories described above. ENCLOSURE -1- Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 STAT ? ? 2. IOC Requirements The IOC CPB system requirements are as follows: 2.1. Functional Requirements The functional requirements for the IOC CPB system are: for a word-processing function, supported by communications linking existing word-processing capabilities at the ICS, CIA, DIA, NSA, with the community computer; an and forward data function; and a prototype of these requirements follows. electronic mail function; a store 2.1.1 Word-Processing Function The fundamental word-processing requirement is to enable existing word-processing terminals at the NFIP components noted above to access the community computer. The actual word-processing function will be performed on the word-processing terminals with output to be made available to the community computer. The com- munications requirement to support this access is covered under system requirements. While the community computer will not be expected to support a full word-processing function, it should be able to support the editing of sequential files. 2.1.2. Electronic Mail Function The electronic mail function is intended to supply the users with a means of communicating with each other via the system. The specific functions to be supported are: a. Exchange informal correspondence and notes with other users. b. Exchange formal correspondence with other users. c. Exchange congressional questions and answers with other users. d. Retrieve mail by subject. e. Edit mail messages before users. f. Retain mail messages for a receipt. -2- releasing them to other period of time after Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 g. Submit mail messages prepared on a word-processing terminal for inclusion in the mail system. h. Archive congressional questions and answers and formal correspondence included in the mail system. 2.1.3. Store and Forward Function The store and forward function provides the ability to transfer files between the user's word processors or in-house computers and the community computer. This function will be used for the following purposes: a. The transfer to and storage on the community computer of files generated on the user's word processors. This will include narrative files supporting budget submissions and CBJB narrative. b. The transfer of files stored on the community computer to the user's word processors. This also will include narrative files supporting budget submissions and CBJB narrative. c. The transfer and storage of individual updates to the user's word processors. This also will include nar- rative files supporting budget submissions and CBJB narrative. d. The transfer and storage of bulk updates to the ICS CPB data base. These updates will normally have been generated on the user's in-house computer. e. Files transferred and stored on the community computer must be available in hard or soft copy to the ICS. 2.1.4. Prototype Data Base Function The prototype data base requirements is, as far as is prac- ticable, to be able to demonstrate some of the CPB Data Base features that will be required for the data-base support of the system. The capabilities to be demonstrated, in relative priority, are as follows: a. to retrieve data using predefined queries, b. to make ad hoc (interactive and batch) retrievals of data, c. to apply updates (interactive and batch) against the data base, -3- Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 : Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 d. to restrict access to the data base and to restrict access to specific data within the data base, e. to protect the data integrity of the data base, f. to use formatted screens for ease of user data entry and access to the data base, g. to use data-base administration tools. 2.2. Security Requirements The basic security requirements are as follows: 2.2.1. TEMPEST The hardware and terminals will need to meet the appropriate TEMPEST criteria. 2.2.2. System Access The host system on which the CPB system resides must support control of user access to the system. This will involve a means of identifying users that are authorized to access the system and of authenticating them at the time they attempt to gain access. This access mechanism also must be able to control access to specific capabilities on the system, such as access to the CPB system. 2.2.3. Data Access The system must support control of user access to data. This includes access to data base files, to sequential files that are not physically part of the data base, and to mail files. Within the Capabilities Programming and Budgeting Data Base, access to the data must also be controlled at the record level. The file access levels of control are: access not allowed, read only access allowed, read and write access allowed. The system must allow the owner of a file to establish the access level of other users. The data base administrator is considered the owner of the CPB Data Base and will establish the access level for all users of the data base. The owner of a sequential file will establish the access level for other users of that file. The system default access for all files must be no access allowed, to ensure that access to a file will be determined by the file owner. The only access to the data not controlled by the data-base adminstrator for the CPB Data Base or by the owner of a sequential file will be that necessary to ensure the integrity of the system; that is, access to the data will be available to the system administrator and to the security administrator, as a matter of necessity. -4- Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 ? Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 , For those users authorized access to the CPB Data Base, access control at the record level will determine whether a user is authorized access to all or only some of the records in the data base. This level of access control will be based on an individual's clearance level and need to know. 2.2.4. Security Audit Trail The system must support the logging of an audit trail to record attempts to access the system and attempts to access files. The DBMS which support the CPB Data Base should support the logging of an audit trail to record accesses to the data base and its data. Failure to provide the proper authentication for the attempted level of access, (system access, file access or data base access) also should be recorded. 2.3. Performance Requirements The performance requirements establish the criteria for system availability, system responsiveness, and for the time to perform various system functions, such as recover/restore a file. The requirements are: 2.3.1. Availability a. The system must be available for interactive use from 0630 to 1830, Monday through Saturday, during the months of February through August. b. The system must be available for interactive use from 0630 through 2130, Sunday through Saturday, during the months of September through January. c. Overall availability of the system (hardware and software) should be 95 percent. d. The system must be available for overnight batch updates to the data base. 2.3.2. Response Time a. The system should respond within 2 seconds to command-level instructions, edit session instruc- tions, etc. b. The system should respond within 10 seconds to data-base actions. (Since this system operates on a large multiple use system, these response times may not always be satisfied.) -5- Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 STAT STAT 2.3.3. Throughput Batch updates to the data base should be accomplished within 1 hour. At IOC there will be no other batch processing with any specific throughput requirement. 2.3.4. Recover/Restore Files Recovery/restoration of files, when required, should be accom- plished with 3 hours from the time the file becomes unavailable. 2.4. System Requirements 2.4.1. Communications Requirements At IOC the system will need commullications to support both interactive and RJE access for remote terminals, both CRTs and printers. The remote terminals will be located at the IC Staff. NSA, CIA, DIA (Pentagon), and (Pentagon). For all users but the IC Staff, the interactive support should be via lines with a 9.6KB speed. The terminals to be connected are Xerox 860 terminals at NSA, DIA and the and either NBI or WANG terminals at the IC Staff and CIA. Both types of terminals should be interfaced via an emulator to operate in 3270 mode. Initially there will be no more then 25 terminals to be con- nected to the system. 2.4.2. Hardware Requirements The CPB system will reside on the NSA Administrative system, an IBM 3081. The hardware requirements for the IOC system are as follows: a. The terminal requirement is to be met by existing word-processing terminals, as far as is practicable. The terminals, therefore, must be capable of inter- facing to the IBM mainframe. b. The hardware configuration must be capable of sup- porting 20-25 terminals at IOC. c. The system should have at least 5 billion bytes of real DASD available for user files. d. The system should be able to support simultaneous journaling and output on tape drives. e. The system configuration should be suitable for ease of switching to a back-up system. -6- Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 2.4.3. Software Requirements The CPB system will use software packages that are already in use on the Administrative system. No requirement for other software packages exists for the IOC system. 2.4.4. Back-Up Requirements a. System back-up The CPB system requires a back-up capability for any period of system unavailability that is expected to exceed eight hours. The back up capability must be able to meet all of the CPB functional and security requirements. It is recognized that the back-up capability may not be able to meet all of the CPB performance requirements. b. File back-up Data base files will need to be backed up once a day, for system back-up purposes. If the DBMS provides automatic recovery, no further back-up of the data base files will be necessary. If there is to be no automatic recovery by the DBMS, the data base files will need to be backed up twice a day. Sequential files related to the data base and all mail files will need to be backed up once a day. The daily back-up of files should be done out of normal operating hours (see Availability Require- ments, above). If the data base files are to be backed up twice a day, the second back-up should be done during the operating day, at a point approximately midway between the beginning and ending of the operating day, to ensure that data base file problems do not affect more than half a day's work. 2.4.5. File Retention On-line a. Data base files for budget years that no longer need to be two budget years immediately preceding the budget year being built will need to be on-line. In addition, "snap shots" of the data base will be taken at various key points in the budget cycle. These "snap shots" for the budget year and the preceding two years will also need to be on-line. Data for the two years preceding the budget year at IOC will need to be converted from the previous format to the CPB data base format. -7- Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 . Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 b. Sequential files which store budget submission and CBJB narratives should be retained on-line in the same fashion as the CPB data base. Personnally owned sequential files should be subject to auto- matic deletion after a period of time or period of disuse. c. Mail files will remain on-line in accordance with the procedures established by the Data Base Administrator. 2.4.6. File Retention Off-line a. Data base files for budget years that no longer need to be on-line will be archived to tape for indefinite retention. The data base administrator will be responsible for invoking the archival procedure for the CPB data base. b. Sequential files containing CBJB narrative or the narrative accompanying program budget submissions will be archived to tape for indefinite retention. The data base administrator will be responsible for invoking the archival procedure for these sequential files. c. Congressional questions and answers and formal correspondence that no longer need to be on-line will be archived to tape for indefinite retention. The owner of these mail files will be responsible for staging them from the mail system. Periodically mail files so staged will be archived to tape. 2.4.7. Recovery Requirements In addition to standard system recovery procedures, the system operators will be required to implement recovery procedures that will be defined during implementation planning. These pro- cedures will cover any automatic and/or manual data base recovery and the recovery of sequential and mail files. AT IOC there will be no requirement for automatic recovery other than that identified for the data-base management system. 2.4.3. Support Requirements a. The CPB system requires that configuration management procedures be adopted to cover system (hardware and software) changes, application software changes, changes to the data base, and the validation and handling of new requirements. These procedures will be in accordance with the management plan that will be defined during the implementation planning. -8- Declassified in Part - Sanitized Copy Approved for Release 2013/04/19 : CIA-RDP85-00142R000100370002-1 : Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 -*-. . ? b. The CPB system requires that system adminis- tration functions, such as space management and the providing of systems information to users, be available. c. The CPB system requires that a Data Base Administrator (DBA) be named to control the CPB Data Base. The DBA will be a member of the IC Staff data processing staff. He will be responsible for granting access to the data base, establishing security levels within the data base, overseeing the integrity of the data base, performing various data-base functions, controlling the data dictionary, and participating in any change control board governing the CPB Data Base. The DBA will also be responsible for determining standards and establishing procedures for sequential and mail files. d. The CPB system requires that a system security administrator be named to control access to the system, data base and files. The system security administrator will be responsible for maintaining all password files and will be the ultimate authority for security matters concerning the CPB system. -9 Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 25X1 Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1 R Next 1 Page(s) In Document Denied Declassified in Part - Sanitized Copy Approved for Release 2013/04/19: CIA-RDP85-00142R000100370002-1