RESPONSE TO DDCI QUESTIONS REGARDING OMB BUDGET ACTIVITIES UNDER NSDD-145

Document Type: 
Collection: 
Document Number (FOIA) /ESDN (CREST): 
CIA-RDP87M00539R000400410001-9
Release Decision: 
RIPPUB
Original Classification: 
U
Document Page Count: 
13
Document Creation Date: 
December 22, 2016
Document Release Date: 
July 30, 2010
Sequence Number: 
1
Case Number: 
Publication Date: 
May 10, 1985
Content Type: 
MEMO
File: 
AttachmentSize
PDF icon CIA-RDP87M00539R000400410001-9.pdf572.36 KB
Body: 
Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 uIwl_n.Jaau LI-W DCI/ICS 85-4060 10 May 1985 MEMORANDUM FOR: Deputy Director of Central Intelligence VIA: Director, Intelligence Community Staff Chairman, Information Handling Committee C ; I" SUBJECT: Response to DDCI Questions Regarding OMB Budget Activities Under NSDD-145 1. This memorandum is provided in response to your request for further information regarding OMB activities carried out under the authority of NSDD-145, which was highlighted in the Information Handling Committee's (IHC) March input to the monthly NFIB Committee reports. 2. NSDD-145 was signed by the President on 17 September 1984 and includes the following language under paragraph 9b, Additional Responsibilities: "The Director, Office of Management and Budget shall: Specify data to be provided during the annual budget review by the departments and agencies on programs and budgets relating to telecommunications systems security and automated information systems security of the departments and agencies of the government. Consolidate and provide such data to the National Manager via the Executive Agent. Review for consistency with this Directive, and amend as appropriate, OMB Circular A-71 (Transmittal Memorandum No. 1), OMB Circular A-76, as amended, and other OMB policies and regulations which may pertain to the subject matter herein." 3. OMB worked very hard in the final review process to insure that this language was included in the signed NSDD-145. Immediately after the NSDD-145 was signed, OMB began working on a draft of an OMB bulletin which is intended to provide instructions on "submission of data pertaining to agency programs and budgets for security of automated information systems (computers) operated and maintained by an agency, and by contractors on behalf of an agency." Arnie Donahue, who is the director of OMB's division responsible for monitoring the NFIP and budget, is OMB's representative to the National Telecommunications and Information Systems Security Committee (NTISSC) and leads OMB's efforts in this area. STAT DCI EXEC REG (46 -01" Ibc 12 ---40G Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 UNCLASSIFIED 4. OMB Bulletin No. 85-11 (Tab A), dated 28 March 1985, has been issued as a result of OMB's efforts under NSDD-145 with instructions to respond with the submission of data by 28 June 1985. The apparent purposes for which the data is to be collected are set out in Tab B. The data requested includes government owned agency computers as well as contractor installations operated on behalf of an agency. George Rogers, Vice Chairman, IHC, passed consolidated comments on the bulletin to OMB including a strong recommendation to cut down on the data requested and to extend the response time from 60 to 180 days. OMB did cut down on the number of questions it had in its earlier draft and extended the reporting response date to 90 days. It noted that, since the National Security Division would be getting the responses (which could be appropriately classified), no agency would be exempted from responding on the basis of security. The information requested by OMB includes the following: - number of computer installations processing information classified higher than SECRET; - number of computer installations processing information classified SECRET or lower; type of equipment used at each installation; number of computer installations with current valid risk evaluations and accreditations on file and the number of risk evaluations and accreditations in progress; forecasts of the number of computer installations for each fiscal year from FY86 to FY90; and forecasts of the amount of resources to be obligated by the agency for the security of computer installations for the period 1985-1990 in areas such as: personnel salaries, procurement of computer security protection devices, acquisition of software, physical security of computer installations, and maintenance. 5. Initial reaction to the OMB bulletin was negative because of the amount of effort required to provide to the data OMB has requested. DIA representatives initially reported that DOD would not respond, but Don Latham apparently is now pressing all of DOD to comply with the bulletin. The NTISSC Secretariat at NSA has drafted a more detailed "data call" that it proposes to issue via the NTISSC if the OMB effort does not receive responses from all the agencies. There are indications that agency submissions to OMB will be released to a working group of the SAISS responsible for writing the report on the status of the security of automated information systems in the Federal government which is due in January 1986. This working group includes the SAISS representatives from the IC Staff, CIA, DIA, and NSA. 6. We will keep you informed of the status of the forte efforts. Attachments: a/s STAT Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 SUBJECT: Response to DDCI Questions Regarding the 0MB Budget Activities Under NSDD-145 Distribution: DCI/ICS 85-4060 Orig - DDCI 1 - Executive Registry 1 - D/ICS 1 - ExSec/NFIB 1 - ICS Registry 1 - ICS Registry 1 - IHC Subject 1 - IHC Chrono ICS/IHC/ (10 May 85) Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 1 L l~ Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON. D.G. *0593 March 28, 1985 BULLETIN NO. 85-11 TO THE HEADS OF EXECUTIVE DEPARTMENTS AND ESTABLISHMENTS SUBJECT: Data on Security of Automated Information Systems That Process Information Related to the. National Security Interest 1. Purpose. This bulletin provides instructions on submission of data pertaining to agency programs and budgets for security of automated information systems (computers) operated and maintained by an agency, and by contractors on behalf of an agency, to process information related to the national security interest. 2. Background. A National Security Decision Directive, Nations Policy on Telecommunications and Automated Information Systems Security (hereafter referred to as the NSDD), was signed by the President on September' 17, 1984. This directive assigns the Director of OMB respon$ibility to: a. Specify data to be provided during the annual budget s review by the departments t agencies on securityd ofdgthe relating to departments and agencies of the government. b. Consolidate and provide such data to the their rolof Defense and the Director, National Security Agency in as Executive Agent and National Manager under the NSDD. This bulletin is being issued to carry out those responsibilities. 3. Scope of initial submission. The NSDD defines two categories OT r national security information requiring security and protection. They are: a. Classified information; b. Other sensitive, but unclassified, government or government-derived information, the loss of which could adversely affect the national security interest. Information to be submitted under this bulletin will cover only programs and budgets for security of computers that process classified information. This focus on classified information only, as a first step, is intended to provide sufficient time to develop an operational definition of unclassified-but-sensitive information relating to national security--before requiring agencies to submit data on programs and budgets for security of computers that process such information. Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 2 4. Definitions. For purposes of this bulletin, the terms used below have:tWe- mellowing, meanings: a. Computer installation--A computer installation means a. data processor and associated input and output devices that perform the following functions: -- Receive information electronically; -- Process such information; -- Create products (i.e, reports, analyses, etc.) based on such processed information. Such functions can be performed, for example, by a stand-alone personal computer or by a mainframe computer with many peripheral work stations. Each such computer is considered an installation for purposes of this bulletin. More specifically, computer installations are classified as: Microcomputers used as word processors; Microcomputers used as personal computers; Minicomputers and other microcomputers; Mainframes and associated peripherals. For purposes of this bulletin, a computer that is used as a switching device to route communications is not considered a computer installation. Embedded computers in weapon systems are also to be.excluded. b. Risk evaluation--A risk evaluation means any document which contains an evaluation of the vulnerabilities of a computer- installation to the compromise of classified national security information. Such an evaluation should reflect the administrative, physical access, personnel, environmental, technical and communications safeguards installed to prevent a compromise. Such an evaluation could be an in-depth analysis of the security vulnerabilities of a large, specialized computer installation (the kind of evaluation described as a "risk analysis' by 0MB Circular No. A-71), or it could be. a less intensive examination of security vulnerabilities using less rigorous criteria for a smaller computer installation (such as a microcomputer used as a word processor). Both kinds of vulnerability assessments, if documented, could qualify as risk evaluations under this bulletin. A risk evaluation document can apply to more than one computer installation operated by an agency or by contractors on behalf of an agency. However, such multiples risk evaluations will identify each included computer installation. Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 c. Accreditation of security for a computer installation--An accredits on o secure fyf or a computer ns a a on means a document granting authorization and approval to a computer installation to process classified information in an operational environment. Such authorization and approval is made on the basis of a technical evaluation by designated technical personnel that establishes-the extent to which the computer installation design and implThentaccreditation document (must set signedc byta resquirements. responsible 'official of the agency. An accreditation document can apply to more than one computer installation operated by an included However, agency or contractors s i dlf of entify neachagency. multiple computer multaccreditations will installation. d. Computer security obligations--Computer security obligat ion s mean F`511 ar amounts within an agency's budget obligated, or to be 'obligated, for salaries, goods, and services that are primarily intended to improve security of computer installations. Such computer security obligations do not include those for security features readilylbeiremovedilt-in) to hardware or software 5. Required materials. Agencies will provide the required Information, n accordance with the instructions contained in the attachment and in the formats of Exhibits 1, 2, and 3. Negative reports are required. Agencies submissions at the appropriate 6. Timing of submissions. Agencies will submit the required materials o , Attention: National Security Division, by June 28, 1985. 7. Information contact. Further information may be obtained from-Robert Dotson (202) 395-4800. David A. Stockman Director Attachment Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 Attachment 0MB Bulletin 85- Instructions for Preparing Submissions in the Formats of Exhibits 1, 2 and 3 on Computer Security Data EXHIBIT 1 a. Column 1-1985. Entries in this column are the numbers of computer Installations operated and maintained by your agency that currently process classified 'information--grouped in terms of: a. Type of information processed (i.e., higher than Secret or no higher than Secret-). b. Type of equipment (i .e. , microcomputers used as word processors.. microcomputers used as personal computers, minicomputers and other microcomputers, and mainframes and associated peripherals). A particular computer. installation will be counted only once. For example, a word processor that is used to process both Top-Secret and Secret information would be counted only once--in the first entry of column 1 (within the number 516 1n the attached example Exhibit 1). b. Column 2--Computer Installations with Currently Valid Accra a ons. Entries in this column reflect the extent to which an agency has a formal program of computer-security accreditation meeting the criteria described earlier under the definitions section of this bulletin. Entries in this column will show the number of computer installations listed in Column I that have currently valid accreditations of security on file. In the attached example Exhibit 1, 416 of the 516 wor processors processing information classified higher than Secret have currently valid security accreditations on file. An accredited computer Installation will be counted only once. c. Coiumn 3--Computer Installations with Accreditations in Pro ress. Entries in column will show the number of computer Installations corresponding to those in column 1 with security accreditations in progress. In the attached example Exhibit 1, 100 of the 516 word processors processing information, classified higher than Secret, have security accreditations in progress. A computer installation with a security accreditation in progress will be counted only once. Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 - d. Column 4--Computer Installations with Currently Valid Risk .. - 1P a pr the PY en O an Evaluations. Enrr ie+ agency's risk evaluation program and will show the number of computer installations, corresponding to the entries of column 1, that have currently valid risk evaluations on file meeting the criteria described in the definitions section of this bulletin. In the attached example Exhibit 1, 420 of the 516 word processors processing information classified higher than Secre A have computer evaluations on file meeting such criteria. installation with a currently valid risk evaluation will be counted only once. n S--Computer Installations with Risk Evaluations l C um o e. Progress, Entries n column will s ow the number o computer installations* corresponding to the entries of column 1, without a currently valid Fisk evaluation on file, but with such a risk evaluation in progress., In the attached example Exhibit 1, 96 of the 516 word processors processing information classified higher than Secret do not have currently valid risk evaluations on file, but have risk evaluation in progress will Abecomputer cou installation nted only once. f. Columns 6 through 10--1986, 1987, 1988, 1989, 1990. Entries in ese c umns will sow the numbers o computer ns allations within the agency in President's budget for 1986 (including estimates for later years). In the attached example Exhibit 1, word processors processing information classified higher than Secret are forecasted to grow from 516, to 642 in 1986. Outyear forecasts for 1987 through 1990 in the 1986 President's. budget willword-processor counted onlyinstallations reflect further growth to780 such per by 1990. A computer installation col umn. EXHIBIT 2 a. Columns 1 through S. Entries in these columns will display information - on computer installations, accreditations and risk evaluations as provided in the instructions for completion of Exhibit 1 (above), -but these data will be limited to computer installations that by contractors on (behalf of an agency.are operated and ma b. Columns'6 through 10. Entries in these columns will show the best estima es that e responding agency can provide for numbers of computer installations, by type, to be operated and maintained in the future by contractors to process classified information on behalf of an agency. Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 EXHIBIT 3 Columns 1 throw h 6--1985 through 1990. Provide estimates of the amounts to e o ga e y --t-he-agency (in thousands of dollars) for the security of computer installations processing classified information--as reflected in the President's 1986 budget for the period 1985-1990. These estimates of obligations will be limited to computer security programs within the agency. To the ext that efforts to secure classified information are part of a larger program to prevent unauthorized use of information processed on the agency's computers, show only the obligations incurred within that larger program total for computer security of classified information. These amounts should reasonably reflect the numbers of computers, accreditations and risk evaluations listed in your agency's- reply to this bulletin in the to total agency levels for all format of Exhibit 1-- relatrisk ion evaluations. computers, accredits ns and Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 EXHIBIT 3 OMB Bulletin No. OS-11 Agency Contact: Phone: Date: Salaries and benefits of computer security administrators and specialists p?ocurement of computer security protective devices Acquisition of computer security software (development and procurement) Physical security of computer facilities Other operations and maintenance for computer security Total obligations for computer security of classified Information Obligations for Computer Security of Classified Information Department of Government (obligations In Thousands) --TM T986 1989 195V - W M T Tq 2040.1 2042.1 2050.4 2053.7 2055.0 1621.7 300.0 310.0 320.0 330.0 821.6 605.7 500.0 400.0 300.0 100.9 151.9 228.1 150.0 155.0 160.0 0.0 0.0 0 0 0.0 . 2952.1 4635.3 3175.9 3010.4 2928.7 2845.0 ti. Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 EXHIBIT 2 OMB Bulletin No. 85.1 1 Agency Contact: phone: Date: ber of Computer 19$S um N Installations that process information Classified Higher than Secret: Microcomputers used as word. processors Microcomputers used as personal computers Minicomputers and other microcomputers Mainframes and-associated. peripherals. Numbers of Computer installations that process informatiemr Classl fled No Higher than Secret: Microcomputers used as word processors' 1Mcrocompvters used as personal computers Minicomputers. m d other microcomputers Mainframes and associated peripherals Total Contractor Computers on cessingf oClassified Information The Department of Goverment Computer Installations with Computer installations with Cam uter Security Accreditation$ ? Risk Evaluations rren Valid in Jess ZWr-rg-ntjj Valid n): 126 57 69 120 6 4$ 23 25 _ .2 4 0 1 0. 1 0 S39 264 483 56 171 64. 1S7 14 S 0 920 486 433. 832 88' 1986 1987 196$ 1989 1990 1 7 -M -M TM 130 135 140 140 140 SO 55 60 66 70 S 6 7 7 7' 1 1 2 2 2 SSO S60 S70 S80 . S90 160 190" 190 190 190 2$ .30 30 30' 30 S S 6 949' 982 1005 1020 1035 Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 EXHIBIT 1 on Bulletin No. 8S- 1 1 Agency Contact:* Phone: Date: Numbers of Computer Installations that Process Process Information Classified Higher than Secret: Microcomputers used as word processors Microcomputers used as personal computers Minicomputers and other microcomputers Mainframes and associated peripherals Numbers of Computer Installations that Process Information Classified No Higher than Secret: Microcomputers used as word processors Microcomputers used as personal computers Minicomputers and other microcomputers Mainframes and associated peripherals Total Computers Processing Classified Information within The Department of Government Computer Computer Installations Security Accre with ditations Computer Installations with Risk Evaluations 990 Valid Urrentl ress in pro 1986 1961 1988 1989 1 urren 85 1 voila in Progress y g ' TAT - - 9 - 141 151 tat T TAT 07 516 416 420 96 642 710 750 770 780 12S 12S 12S 11 0 156 160 160 160 160 8 6 8 0 S 8 a 8? S 2 2 2 2 2 770 230 1251 1340 1370 K 1400 1400 327 350 350 350 350 226 22S 5 SO 0 S3 S3 S3 S3 S3 1 0 1 0 7 7 7 7 1 TM TM 77S TM ' 776 7157 3530 2700' 3750 7755 Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9 Resource Review Responsibilities and Authority Specified in NSDD-145 The purposes for the collection and consolidation of the requested data by 0MB and the provision of the consolidated data to the Executive Agent (SecDef) and the National Manager (DIRNSA) are: o To support the responsibilities of the Systems Security Steering Group to:* "Review consolidated resources program and budget proposals for telecommunications systems security, including the COMSEC Resources Program, for the US Government and provide recommendations to 0MB for the normal budget reivew process. (NSDD-145, 4a(4)) "Review in a re ate the program and budget proposals for the security of automate information systems of the departments and agencies of the government." (NSDD-145, 4a(5)) o To support the Executive Agent in his responsibility to:* "Review and assess for the Steering Group the proposed telecommunications systems security programs and budgets for the departments and agencies of the government for each fiscal year and recommend alternatives, where appropriate. The views of all affected departments and agencies shall be fully expressed to the Steering Group. (NSDD-145, 6f) "Review for the Steering Group the aggregated automated information systems security program and budget recommendations of the departments and agencies of the US Government for each fiscal year." (NSDD-145, 6g) o To support the National Manager in his responsibility to:* "Review and assess annually the telecommunications systems security programs and budgets of the departments and agencies of the government, and recommend alternatives, where appropriate, for the Executive Agent and the Steering Group. (NSDD-145, 7j) "Review annually the aggregated automated information systems security program and budget recommendations of the departments and agencies of the US Government for the Executive Agent and the Steering Group." (NSDD-145, 7k) o And collaterally, to support the NTISSC in its responsibility to: "Submit annually to the Steering Group an evaluation of the status of national telecommunications and automated information systems security with respect to established objectives and priorities." (NSDD-145, 5b(3)) *Note that while the National Manager, the Executive Agent, and Systems Security Steering Group may be able to review the detailed program and budget proposals of each agency for telecommunication systems ecurit , NSDD-145 provides those groups the authority only to view the aggregate of the program and budget proposals of the agencies for the security of ted information systems. 0MB aggregates this data. Declassified in Part - Sanitized Copy Approved for Release 2012/03/05: CIA-RDP87M00539R000400410001-9