SECURITY OF FEDERAL AUTOMATED INFORMATION SYSTEMS
Document Type:
Collection:
Document Number (FOIA) /ESDN (CREST):
CIA-RDP86-00674R000300080023-4
Release Decision:
RIPPUB
Original Classification:
S
Document Page Count:
20
Document Creation Date:
December 19, 2016
Document Release Date:
March 30, 2006
Sequence Number:
23
Case Number:
Publication Date:
July 27, 1978
Content Type:
MEMO
File:
Attachment | Size |
---|---|
![]() | 1.35 MB |
Body:
CIRCULAR NO. A-71
Transmittal Memorandum No. 1
TO THE HEADS OF EXECUTIVE DEPARTMENTS AND ESTA$t.ISHMENTS
SUBJECT: Security of Federal automated information systems
1. Purpose. This Transmittal Memorandum *to 0MB Circular
No. A-71 dated March 6, 1965 promulgates policy and
responsibilities for the development and implementation of
computer security programs by executive branch departments
and agencies. More specifically, It:
a. Defines the division of responsibility for computer
security between line operating agencies and the Department
of Commerce, the General Services Administration, and the
Civil Service Commission.
b. Establishes requirements for the development of
management controls to safeguard personal, proprietary and
other sensitive data in automated systems.
c. Establishes a requirement for agencies to implement
a computer security program. and 'defines a minimum set of
controls to be incorporated into each agency computer
security program.
d. Requires the Department of Commerce to develop and
issue computer security standards and guidelines.
e. Requires the General Services Administration to
issue policies and regulations for the physical security of
computer rooms consistent with standards and guidelines
issued by the Department of Commerce; assure that agency
procurement: requests for automated data processing
equipment, software, and related services include security
requirements; and assure that all procurements made by.,GSA
meet the security requirements established by the User
agency.
f. Requires the Civil Service Commission to establish
personnel security policies for Federal personnel associated
ved For @12'@M0Cffff lMQMRNED tM (3b80023-4
OFFICE OF MANAGEMENT AND BUDGET
WASHINGTON. D.C. 20503
(No. A-71)
Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080023-4
Sri tiiApprr ved F~e_sl8?se 20$P//1.~i:6 -F P86i993~i gAQW80 3-4 Federal
computer systems, or having access to data in Federal
computer systems.
designed computer systems have resulted in improper
payments, unnecessary purchases or' other improper actions.
The policies and responsibilities for computer security
of personal, proprietary or other sensitive data. Problems
have been encountered in the misuse of computer and
communications technology to perpetrate crime. In other
cases, inadequate administrative practices along with poorly
in regard to the risks associated with automated processing
management: problems. Many public concerns have been raised
dommunical ons technology to improve the effectiveness of,
governmental programs has introduced a variety of new
2. Background, Increasing use of computer and
established by this Transmittal Memorandum supplement
policies currently contained in OMB Circular.No. A-71.
.perform similar functions based on programmed criteria, with
little human intervention. -
applications which issue checks, requisition supplies or
a. "/automated decisionmaking systems" are computer
purposes of this memorandum:
3. Definitions. The following definitions apply for the
response, back-up operations and post-disaster recovery.
b. "Contingency plans" are plans for emergency
c. "Security specifications" are a detailed description
protection due to the risk and magnitude of loss or harm
which could result from inadvertent or deliberate
disclosure, alteration, or destruction of the data (e.g.,
personal data, proprietary data).
of the safeguards required to protect.a sensitive; computer
application.
d. "Sensitive application" is a computer - application
which requires a degree of protection because it processes
sensitive data or because of the risk and magnitude of loss
or harm that could result from improper operation or
deliberate manipulation of the application (e.,g., automated
decisionmaking systems).
e. "Sensitive data" is data which requires a degree of
4. Responsibility of the heads of executive agencies.-. The
head of each executive branch department and agency is-
(No. A-71)
Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080023-4
General Services Administration the Department of Commerce,
1
responsibility each agency head shall establish policies and.
procedures and assign responsibility for the development,
implementation, and operation of an agency computer security
program. The agency's computer security program shall be
consistent with all Federal policies, procedures and
standards issued by the office of Management and Budget, the
as well as national security data. It also includes
responsibility for assuring that automated processes operate
effectively and accurately. In fulfilling this
This includes responsibility for the establishment of
physical, administrative and technical safeguards required
to adequately protect personal, proprietary or other
sensitive data not subject to national security regulations,
all agency data whether processed in-house or commercially.
Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080023-4
responsible for assuring an adequate level of security for
0
ion. In consideration of
and the Civil Service Commiss
a minimum:
practices, each agency's computer security program shall at
problems w;nich have been identified in relation to existing
a. Assign responsibility for the security of each
processing and security matters.
agency (e.g., government-owned contractor operated
facilities), to a management official knowledgeable in data
installations operated directly by or on behalf of the
computer installation operated by the agency, including
b. Establish personnel security policies for screening
data in Federal computer systems. The level of screening
required by these policies should vary from minimal checks
to full background investigations commensurate with the
sensitivity of the data to be handled and the risk and
magnitude of loss or harm that could be caused by the
individual. These policies should be established for
government a,nd contractor personnel. Personnel security
.policies for Federal employees shall be consistent with
policies issued by the Civil Service Commission.
c. Establish a management control process to assure
that appropriate administrative, physical and technical
safeguards are incorporated into all new computer
applications and significant modifications to existing
computer applications. This control process should evaluate
the sensitivity of each application. For sensitive
applications, particularly those which will process
sensitive data or which will have a high potential for loss,
all individuals participating in the design, operation or
maintenance of Federal computer systems or having access to
(No. A-71)
Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080023-4
Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080023-4
.should, at a minimum, include policies and responsibilities
for
such as automated decisionmaking systems, specific controls
(1) Defining and approving security specifications
prior to programming the applications or changes. The views k
and recommendations of the computer user organization, the
computer installation and the individual responsible for the
.security of the computer installation shall be sought and
considered prior to the approval of the security
ations for the application.
(2;1 Conducting and approving design reviews and
application systems tests prior to using the systems
operationally. The objective of the design reviews should
be to ascertain that the proposed design meets the approved
security specifications. The objective of the system tests
should be to verify that the planned administrative,
meetss all applicable Federal policies, regulations and
standards, and that the results of the test demonstrate that
the security provisions are adequate for the application.
the documented and approved system security specifications,
official of the agency shall certify that the system meets
of the agency. Upon completion of the system test, an
results of the design review and system test shall be fully
documented and maintained as a part of the official records
operationally adequate prior to the use of the system. The
physical and technical security requirements are
d. Establish an agency program for conducting periodic
proprietary or other sensitive data, or which have a high
potential for financial loss, such, as automated
decisionmaking applications. Audits or evaluations are to
be conducted by an organization independent of the user
organization and computer facility manager.
Recertifications should be fully documented and maintained
as a part of the official documents of the agency. Audits
or evaluations and recertifications shall be performed at
time intervals determined by the agency, commensurate with
the sensitivity of information-processed and the risk and
magnitude of loss or harm that could result from the
application operating improperly, but shall be conducted at
least every.three years.
audits or evaluations and recertifying the adequdcy of the
security safeguards of each operational sensitive
application including those which process personal,
e. Establish policies and responsibilities to assure
that appropriate security requirements are included in
(No. A-71)
Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080023-4
Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080023-4
speciiicat:ions for the acquisition or operation of computer
facilities, equipment, software packages, or related
intended application and that they comply with current
Federal computer security policies, procedures, standards
and guidelines.:
Services Administration. These requirements shall be
reviewed and approved by the management official assignedt
responsibility for security of the computer installation to
be used. 'T'his individual must certify that the security
requirements specified are reasonably sufficient for the
services, whether procured by the agency or by the General
f Assign responsibility for the conduct of periodic
risk analyses for each computer installation operated by the
agency,. including installations operated directly by or on
.behalf of the agency. The objective of this risk analysis
potential :Loss.. A risk analysis shall be performed:
resources can effectively be distributed to minimize the
.vulnerabilities at the installation so that security
should be to provide a measure of the relative
(1) Prior to the approval of design specifications
or new computer installations.
that time.
(3) At periodic intervals of time established by
the agency, commensurate with the sensitivity of the
information processed by the installation, but not to exceed
five years, if no risk analysis has been performed during
information processed by the installation.
changes shall be commensurate with the sensitivity of the
physical facility, hardware or software at a computer
installation. Agency criteria for defining significant
(2) whenever there is a significant change to the
g. Establish policies and responsibilities to assure
that appropriate contingency plans are developed and
maintained. The objective of these pl'ans should be to
provide reasonable continuity of data processing support
should events occur which prevent normal operations. These
plans should be reviewed and tested at periodic intervals of
time commensurate with the risk and magnitude of loss or
harm which could result from disruption of data processing
support.
5. Responsibility of the Department of Commerce. The
Secretary of Commerce shall develop and issue standards and"
(No. A-71)
Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080023-4
Each standard shall, at a minimum, identify:
Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080023-4
guidelines for. assuring security of automated information.
Whether the standard is mandatory or voluntary.
required to take.
b. specific implementation actions which agencies are
.be granted.
standard and the conditions or criteria under which it may
e. The procedure for agencies to obtain a waiver to the
standard and evaluating its use.
The time at which implementation is required.
d A.process for monitoring implementation of each
Commerce.
with standards and guidelines issued by the Department of
a. Issue policies and regulations for the physical
Administrator of General Services shall:
Responsibility of the General Services Administration.
security of computer rooms in Federal buildings consistent
.:equirements as a part of the agency request for delegation
requirements. Other delegations. of procurement authority
shall require specific agency certification of security
certification programs or other so-called blanket
delegations shall include- requirements for agency
specifications and agency certification of security
authority to agencies by the General Services Administration
under mandatory programs, dollar threshold delegations,
security requirements which have been certified by a
responsible agency official. Delegations of procurement
b. Assure that agency procurement requests for
computers, software packages, and related services include
of procurement authority.
c. Assure that specifications for computer hardware,
software, related services or the construction of computer
facilities are consistent with standards and guidelines
established by the Secretary of Commerce.
d. Assure that computer equipment, software, computer
room construction, guard or custodial services,
tt ecommuni,cations services, and any other related services
procured by the General Services Administration meet the
security requirements established by the user agency and are
(No. A-71)
Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080023-4
Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080023-4
related /SDP services acquired by the General Services
Administration in anticipation of future agency requirements
shall include security safeguards which are consistent with
mandatory standards established by the Secretary of
Commerce.
issued by OMB, the Civil Service Commission and the
Department: of Commerce. Computer equipment, software, or
consistent with other applicable policies and standards
personnel security policies for Federal personnel associated
'with "the 'de"sign, operation or maintenance of Federal
computer systems, or having access to data in Federal
Chairman' of the Civil Service Comm ssion shall establish
7. Respor,lsibility of the Civil Service Commission. The
computer systems. These policies should emphasize personnel.
requirements to adequately protect personal, proprietary or
Transmittal Memorandum, each executive branch department and
agency shall submit to OMB 'plans and associated resource
estimate:; for implementing a security program consistent
with the policies specified herein.
9. I gu:Lries. Questions regarding this memorandum should
Vie-,,,,'.,.addressed' to the Information Systems Policy Division
(202) 395-4814.
fulfilling the responsibilities specifically assigned in
this memorandum. Within 120 days of the issuance of this
Services Administration and Civil Service Commission shall
submit to QMB plans and associated resource estimates for
8. Reports. Within 60 days of the issuance of this
Transmittal Memorandum, the Department of Commerce, General
normal reemployment screening procedures to full background
;investigations.
.and the risk and magnitude of loss or harm that could be
caused by the individual. The checks may range from merely
for personnel checks imposed by these policies should vary
commensurate with the sensitivity of the data to be handled
not subject to national security regulations. Requirements
other sensitive data as well as other sensitive applications
y C
mes T. McIntyre, Jr.
Director
(No. A-71)
Approved For Release 2006/04/19 : CIA-RDP86-00674R000300080023-4
1'I'17,P 44 . 113I3IIC PItlfIlTINCI ANT) l) '(viii\1FN'I'S I'aA'.,? N O l
ute>sc,~tt troXXe~td lForvRelease922006/a0,1/t,19 : CIAGRQp86-00674R000300080023-4 titAttera
poral of rec(,:rls of ti iporaty v,(Inw, and (3) ccttn- regarding of rrra(du, etc.
pliance ',,11th lhu I)roytalon'; of s,eltI(ois :392-,196.
397-401 I tills 1104. iu1,l Ile tr,:nh,tlon.s Isr,.led
thereunder,
(c) 3lorugc, p ion 17 dug, algid ?+ i 7 i log at recut 1117.
Whenever tle head of a 1,c(lvial agia y deter-
mines that }sub:,tuutlal economics pr tnit.leosed oper-
ating efrieient'y Co i be tef14'uttd Ihtfeby, he shall pro-
vide for the alut,tge, proce.,xtttic, and; servicing of
records that are appioprhttl' Iberetor?In a records
center muluittthsed and r.Itrralcil by Litt?Admitttstra-
toror, when aplts;rveal by tilt' Adtntnt:nI Our, In such
it (tenter ntitintuii 4.d t, ttl I'i 'i at,'(1 I;', ; the head of
st:'h Federal a);( ^Icy.
(d) t'eltiIi(lttIon, and 4)1410 l1I II', i,, I trattnferrcd
rcr?t&,
any rttb:iti of the Oov('rtt;ul o! \ I,? l" t(ulhurt:,ed
to (erlbrv it) facts on ttl( basis ,f ii olds In ills clis
tody, I:' autl, rls,e,t to eelttft In hie(>.ott the basis
of terottis Il tt have own Itnl, f, r,o- ,I tit hltn or its
Ptelltcrswtts to ib Adnlh11,1,,it, all Ina' auto
be the Ali lItlISttulur II c,'tillx in in ?IC b"innke
altnll'dst,it Livr dt'tIII lilt ,:ill lolt,') iIt lilt Ii,..i ; of t,'is,, d'.
7,1itnsfcli,ii to IIt.
Rdotint'tl it ,, ;:,?Galtilatnn(iutt?
[illy trthel` plum isi 'I I.' ut I,) w
(e) iSa(ekuat04.
The head of each 1? t Oral oiu'te' ?t),til est.,tt)1,sh
such 871fti iuttds ogit-n?t I0*' n-itt 14x3 of li of rec..
ords as he it dl delet huoc' to hr u,, ?1'' ; Iry and as
may be r(?quii d by re(t AM 1, ,, of tits Athnhdtitrat or
Stich srcfegunrds shall iticIil ie mahillt:.It known to
all ofllcials'and ciup1e ees if Ilt,~ aauf1ey ill that
no records lit Lite rust -di, of IIt' ,1 t'l 'v arc to be
alienated of le'.ttoy'Iid 1'?;14.;,1 i;t uc,'ur,hlllce wait
the pr' ilsuilt:, of ?.rrtlnn Min :1711 and :;78 ;180 of
1711.5 1111?', nf:.l 121 the pi 1;(.ills 1t.e,I:1('I I;', low `or
the tittle vfttl ! I'nttlval I- 1 5,.1:1 ,I .r, rII hi'
(f) linlt,wfntteulnvnl,dcnttu,(Ito etc.
'pile h' arl'of each III (it till St;( nJajil 11-dilly the
Administi atc:r of any ;u l 1111, inll,ct IIn{ , or threat-
ened urt:a',t'fnl i'cm'rval. drt11olug, aitrlatlon, or Cie-
structiori of records In I be L:u::I- "ly of the agency
of which Ile i': the hrod that : 10111 C ,nor , his atten-
tion, and with the assistni ' of Iflu rt' ibghtfstrator
shall in ,tie action tI:Iotiglt lilt, All unl'y General
for the 1ellu%cry of tecords In, ttosv In has reason
to belle', ' have bccn ultiovt buds r,'t,1 ,ve f from his
Agency, ( r from any uttl'r t'edrral agency whose rtc-
orda have bet 11 Irannfet it 11? hi'' 11', ' ?ustody,
(g) Authllrity of t'oatptlallot C. a, t !
Nuthttt 1p1 ecti'tts,92 3911 Itli it11fthis title
shall be sons' rur'tt a': Ilntll inc m c ' n ul l`.t.': ity of the
Contptroit('r 1 i'i' ttl of the ltolt, t 'tl,t - will re-
spect to l',''io [Sing I", ,,5 :ii i ,,; ,i' I' 011 1)1.5, and
prOCI''Iurrs. a Icsra'ninlt lilt Ii' ~ 1' of :uI-
h (-ttIg and d 1'i(tih114 ufll' rt. f 1 rlrah I, not' ttt''ir
accounts r r ehttletucttt by lilt tmooh An auuttlig
Clfticc. Ihilic :io, 19411, rh 'lilt Iilit' C, 4 500, as
addI d Hc't1t. 5.191101 1149. 1 6 it ' , 61 )t 1 583, and
intrude l F'i'b 5. I964. Pill) I tn,-;' 71t Stilt 8 1
Amirmu ttuis
rt)ri+4--85 ,=,e, (U) Pill). r 1115 t,I ,.IiIi uutttorl:u-
tlon Ia' A(itr'.ta1 drat?r to ezt0iy Li~ t i,t I II:,,;_n ndlntatn-
ttrRilvn ttet.rrlol ttloi a''u.si t:,ii I,, ('II 1, ni01
Nutwltll 1:1101n,, I,ny othrr Inl;vislon of the Fed-
(rut l'r?Is't I , and A,liuiol,trntl to 1317' ric(' i Act of
1:141), a:; anlCn(:r'1. ; hC A,inllllI trator :;111111 huvt' final
tult.hnrity in ail nloltel 1111?Ivilit; tits ''rtduct, of
surveys of 0':v- nntcnt records, and emit
Lionl nlalnl,'n,. 101 ul o:af;eni,'nt and (Iipo,td piac-
flees lu II'r,irtltl a, . u,?II,. iat)110 111, -u ;,'( 't-ns :if)-
and 3" of Ill hth nn't the n'pltnu nlatlon of
rrcumntl'nltut'-1 im, rd ,it r:Ch ',utvey:' : Anl' 213.
I?54. ell 9:30 eh III, $ 1101 fib Stitt. 81t; I
,,f 1040. II' ,
I IIt, a,,,t , ' I I(, ?
P,IhIIr C,101 n, I
IA XT
'It n n till' I''4' f hP-
h" ptor, rhapt.t- 1; C ?r 1?'t'..
it 1, ,t r., a ,ni,Pnt (141 ', d
I'11r -1, 1. 1'111111'' I StuI' i;;,,
1I'l.n.litill~', " 1 II ,i., 'i J ,ult nv , Intrl I tl:e' P?Irr+'
I',uln'ily s' I A -li- l?I 1 , 'ilv~? :a lvl?n Ail If 1019 I'ut
?f Ivl,I a ''I ' I , I1I?, 1-1 (,-1 'I 11?? P?, L?I?1 It uI 'r wI,i, 1, I,. , 's .r ,I..? I'it',,,I
Aln,ln l?IU,'1 ?'(,1It... 1,1 1 I949, uu,l 'vi, , ,.
Iii'd III I4' 'Ii?1?t ,I, I?' 3',11 4111 I'r Ii:,n W;,.
('0'
,rhllu? It t :I 1; !i'i. n I `;L :,t '111.1,7 unit, under -r,
tk,n 3g'! .( tale h Ill'
13111. .4 hi, nl - 411111 ,i?U alion.
(It) Arceplnnrr ul 1, -'d + for histuri,-al prI'-t? , atioa.
'till Adm'r.tl Won .vi,rn,'vl'r It appear:, to [tint to
he It, We htlbilr No," I t?, authorized--.
' 1 I t,, at," x111 h'1' Itrtxr.,lt, ith the National
At '11154', of ihr I'I II, `itules the yecncds of any
F(',irrtll ukrur} ,'I . t :hr ('0111 ,IS;; of flip tTjj,jj
:states that ;111' 1x the Atchivi.,,L it
have cuillrit't I I:1 t ,;I,:,l of tht'r ladle lIo v. III 141 7
their r,>nlinlil I I I, +' t?li?o l' thr Uoiled tilntes
(4ovrt'iltll' 111 .
,.!) to dire, I al?1 '''JIV I Uu' tlan.,;rv'. 'o tile
National Atrhltl'', of tti' iJnift'li it.at.e,: of any
ret'or(I" of a' Th' l'rsl 111:1174.1 that have been In
nxiste'nCI for n,ll'' l1, n fIttI, v(ar': and thut t're
drtertnlnld by H t '' i,('t,ivO,l to Nap hutllctcnt his-
lorlcr(l III otl:r, , alnr '. 4ui'I 1nt their cotILil ued
prt'se:talian by 1he? 1'uited Buttes C,overn4i001,
unlr:, the hr;(,i of lilt' a};rtc' which has CtiStltdy
of thrill snail (r? t,1', :, '.trithlt; to the Admints-
1100111' that thrS' ', 0 1 he i 'bOlt,ii in 14 Cu.4to(iv
fur nNe III tl,r r,tt.tl t't ?f the I4yil,la1 r:t,lil.t
1)11,1 't -'',,'f tLr :alit', alf, nry
,:it to dhri-t I 1,1 I'fret, with f.hr ttapraval (It
lilt' head ?f ill(' , 11, matt :g ag,ttcy IN' it the
exlstlllCI o1 'r11 I' If . (y' . hall hn'. )' Steed L('It11i
u::lt'rt, theft with tl r I'.tlHtoval of hi'; :,t,rressor to
fui;Cltoll If nut1 11'lI111,1, of
rectt,t:ILp,',Ited
Ior apl,;,tv, (I II.1 (h :),)sit I with the Nat' -?a!
, 1111IS if Ihr 1!nr t,,1 tat