The Rand Report - Defense Task Force 1970 - Computer Security
The Rand Report - Defense Task Force 1970 - Computer Security
;-~-~1-UI:~--liA~-~-~{~-~-~;·7)~1·
' '\!' \
\
2 :r-r
11 FEBRUARY 1970
·,
~-;
~~~ ... ;/
Although this report contains no information not available in a well stocked
technical library or not known to computer experts, and although there is little
or nothing in it directly attributable to classified sources, the partiCipation of
representatives from government agencies in its preparation makes the informa
tion assume an official character. It will tend to be viewed as an authoritative
Department of Defense product, and suggestive of the policies and guidelines
that will eventually have to be established. As a prudent step to control dissemi
nation, it is classified CONFIDENTIAL overall.
'-'
~ :-..- ..i "
; ,'
11 FEBRUARY 1970
}
<(.:C)~IriBEts.:l+lts:l /'/
Published by The RAND Corporation
OFFICE OF THE DIRECTOR OF DEFENSE RESEARCH AND ENGINEERING
WASHINGTON, 0. C. 20301
11 Febru·ary 1970
The Task Force on Computer Security herewith transmits the final report on its study:
Security Controls for Computer Systems. We visualize that this document will have wide
interest and application; therefore, it contains an informative discussion of the problem
as well as guidelines for implementing solutions.
It should be noted that this is the first attempt to codify the principles and details of
a very involved technical-administrative problem. Thus, this report reflects the best
ideas of individuals knowledgeable about a problem which is relatively new, has been
solved only a few times, and has never been solved with the generality and breadth of
scope attempted in this report. There is no significant difference of opinion within the
Task Force on the general content of this document. However, some aspects of the
problem are so new and controversial that there is a residual difference of opinion on
a few fine details.
Our recommendations and guidelines address the most difficult security control situa
tion-a time-sharing multi-access computer system serving geographically distributed
users, and processing the most sensitive information. This report is a compilation of
those aspects which should be considered separately and in combination when design
ing or adapting computer systems to provide security control or user privacy. It is
impossible to address the multitude of details that will arise in the design or operation
of a particular resource-sharing computer system in an individual installation.
Thus, the security problem of specific computer systems must, at this point in time,
be solved on a case-by-case basis, employing the best judgment of a team consisting
of system programmers, technical hardware and communication specialists, and
security experts.
This report provides guidance to those responsible for designing and certifying that a
given system has satisfactory security controls and procedures.
rfll\.ICIIlCl\.ITI A I
-- • , .......... . _ , . , I II \L
Interim standards and regulations must be drafted to serve as design and operational
guidelines for the early resource-sharing security-controlling systems. Technical exper
tise is required in the preparation of these documents and must be provided to the
Directorate of Security Policy at least initially, and perhaps also on a continuing basis
to furnish both technical-assistance to operational systems and technical judgment for
interpretation of policy. There are several sources of concepts and specific recommen
vi
dations for inclusion in interim regulations. They include this report, the documents of
the DIA/ ANSR system, the JCCRG Collocation Study, and the documents of the NSA
et ai/COINS system.
The need for this agent is immediate, but it will be difficult to create on short notice.
System certification is a new technical area, and substantial technical expertise in
several disciplines is required. Two models come to mind for such an agent. The
responsibility could be assigned to an existing agency of government if it has the
requisite skills, e.g., NSA, DIA, JTSA. Alternatively, an attractive idea is a multi-service
agency, operated and staffed by a contractor, and created in the image of the Electro
magnetic Compatibility Analysis Center.
Vll
rry;,.. l£:11""\l:t...I'TI A I
Finally, it is suggested that the Task Force be maintained intact formally to provide
technical advice as required to the Directorate of Security Policy and the Technical
Agent, and to designers, certifiers, and operators of secure systems.
The issue of providing security controls in computer systems will transcend the Depart
ment of Defense. Furthermore, the computing industry will eventually have to supply
computers and systems with appropriate safeguards. Thus, the content of this report
is of interest to, and should be circulated to other government agencies, industry,
research groups, and defense contractors.
A number of working papers have been produced during this study. The Chairman will
maintain for five years a complete file of such documents, all relevant correspondence
and minutes, comments on draft reports, etc. At the end of th<,~t time, the material will
be microfilmed and deposited with an agency specified by the Defense Science Board.
The Task Force and its members are available to assist in the implementing of any of
these recommendations, and to assist with policy and technical issues which may arise
in connection with formulation of policy and regulations for security controls in comput
ers.
Willis H. Ware
Chairman, Task Force
on Computer System Security
viii
rf\1'1.. ll:lr'\1:11..111 A I
CONTENTS
Preface ................................................................. xi
Introduction •.•••.••••••••••••••••••.••••••••••••••••••••.•••••••••••••• XV
I. Introduction ............................................... 26
III. Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
VI. Terminals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
ix
rtll\.ll=lnJ:I\.ITI A I
LVI'IriUCI'\j IIAL
Introduction ............................................... 48
Update .................................................. 54
X
PREFACE
Xl
John W. Kuipers, Central Intelligence Agency, Washington, D.C.
Jerome D. Moskowitz, National Security Agency, Fort George G. Meade,
Maryland
Lawrence G. Roberts (formerly, Robert W. Taylor), Advanced Research
Projects Agency, Department of Defense, Washington, D.C.
Robert von Buelow, System Development Corporation, Santa Monica,
Calif.
The two panels organized under the Steering Group are the Policy Panel
and the Technical Panel. The following are members of the Policy Panel:
xii
AUTHORSHIP
The members ofthe Task Force participated as individuals knowledgeable
of the technical, policy, and administrative issues involved. Thus, the views
stated herein do not reflect the policy of the Federal Government, any of its
agencies, or any university or industrial corporation.
Ultimately, a Report has to be written by one person. The original draft
was written by Willis H. Ware using sources as noted below. It was then
critiqued, modified, emended, and shaped by the members of the Steering
Group and the Panels. A second complete draft was written by Thomas Chit
tenden, and the final version by Willis H. Ware.
Each Panel produced a series of papers which formed the basis for the
recommendations on software, hardware, procedures, and policy. The Intro
duction and portions of Part A were initially authored by Wade B. Holland,
utilizing material provided by Willis H. Ware and other sources. Section V of
Part A, on System Characteristics, is largely from Willis H. Ware, incorporat
ing material from a paper by the Technical Panel and some information from
personal letters of Prof. E. L. Glaser.
Part B, the Policy Considerations and Recommendations, is substantially
from the final paper produced by the Policy Panel. Many of the explanatory
comments come from the original paper, although some were added in the final
writing. The Technical Recommendations, Part C, mainly reflect the content
of two papers produced by the Technical Panel, modified to a minor extent by
information from personal letters of Prof. Glaser. Finally, Part D, on Manage
ment and Administrative Control, was written by Willis H. Ware, and utilizes
ideas from "Security of Classified Information in the Defense Intelligence
Agency's Analyst Support and Research System" (February 1969, C-3663/MS
5), and from "Security Procedures for the RYE System" (W. B. Ellis, December
1968). .
The Appendix was first drafted by Arthur A. Bushkin and Willis H. Ware;
it was subsequently extended and rewritten by Mr. Bushkin and Robert M.
Balzer.
The final editing and details of format and style are due to Wade B. Hol
land. The Report was printed and published by The Rand Corporation, under
ARPA sponsorship.
ACKNOWLEDGMENTS
The success ofa venture such as this depends upon the personal dedication
and volunteer participation ofthe individuals involved. In addition to the listed
members ofthe Steering Group and the Panels, it is also a pleasure to acknowl
edge the contributions of Dr. Robert M. Balzer and Mr. Wade B. Holland, The
Rand Corporation, Santa Monica, California; Miss Hilda Faust, National
Security Agency, Fort George G. Meade, Maryland; and Mr. Clark Weissman,
System Development Corporation, Santa Monica, California. A special ac
knowledgment is due Thomas Chittenden, National Security Agency, Fort
George G. Meade, Maryland, who rewrote the entire document to produce the
all-important second draft.
xiii
The subject ofsecurity control in multi-access computer systems is ofsuffi
ciently wide interest that many members ofthe Steering Group and the Panels
contacted a number of individuals, organizations, and agencies in the course
of this effort. It would be impossible to mention every person with whom we
have talked and who in some way has influenced our final recommendations.
Among others, however, we interacted with Colonel Roy Morgan ofthe Defense
Intelligence Agency representing the ANSR computing system, and Mr.
George Hicken, National Security Agency, representing the RYE and COINS
systems. The Steering Group and its Panels also acknowledge the contributions
of the many individuals who read our draft material and supplied valuable
comments and suggestions.
Willis H Ware
January 1, 1970
XIV
INTRODUCTION
'The system software, which schedules work through the computer system, assigns resources
to each job, accounts for resources used, etc.
XV
Part A
I. THE SECURITY PROBLEM to users who wish to preserve the integrity of their
data and their programs. Thus, designers and manu
The wide use of computers in military and de facturers of resource-sharing systems are concerned
fense installations has long necessitated the applica with the fundamental problem of protecting infor
tion ofsecurity rules and regulations. A basic princi mation. In protecting classified information, there
ple underlying the security of computer systems has are differences of degree, and there are new surface
traditionally been that of isolation-simply remov problems, but the basic issues are generally equiva
ing the entire system to a physical environment in lent. The solutions the manufacturer designs into
which penetrability is acceptably minimized. The in the hardware and software must be augmented and
creasing use of systems in which some equipment refined to provide the additional level of protection
components, such as user access terminals, are demanded of machines functioning in a security en
widely spread geographically has introduced new vironment.
complexities and issues. These problems are not The recommendations of the Defense Science
amenable to solution through the elementary safe Board's Task Force on Computer Security represent
guard of physical isolation. a compilation of techniques and procedures which
In one sense, the expanded problems of security should be considered both separately and in combi
provoked by resource-sharing systems might be nation when designing or adopting data processing
viewed as the price one pays for the advantages systems to provide security or user privacy. The solu
these systems have to offer. However, viewing the tions to specific problems are intended to be flexible
question from the aspect ofsuch a simplistic tradeoff and adaptive to the needs of any installation, rather
obscures more fundamental issues. First, the than being oriented to any one applications environ
security problem is not unique to any one type of ment. It is intended that the general guidelines in
computer system or configuration; it applies across this Report be of use to DOD components, other gov
the spectrum of computational technology. While ernment installations, and contractors.
the present paper frames the discussions in terms of
time-sharing or multiprogramming, we are really
dealing not with system configurations, but with
security; today's computational technology has II. TYPES OF COMPUTER SYSTEMS
served as catalyst for focusing attention on the prob
lem of protecting classified information resident in There are several ways in which a computer sys
computer systems. tem can be physically and operationally organized to
Secondly, resource-sharing systems, where the serve its users. The security controls will depend on
problems of security are admittedly most acute at
the configuration and the sensitivity of data proc
. present, must be designed to protect each user from
essed in the system. The following discussion pre
interference by another user or by the system itself,
sents two ways of viewing the physical and opera
and must provide some sort of "privacy" protection
tional configurations.
1
--• ,. •--·, I II t.L.
Difficulty and
Complexity of
Security Controls
Figure 1
Type Ill
PROGRAMMING VIA
Type I Type II LIMITED LANGUAGES Type IV
AND
FILE PROGRAMMING VIA CHECKED-OUT FULL PROGRAMMING
QUERY INTERPRETATION COMPILERS CAPABILITY
•
Limited
Application
• • Increasing
•
New Languages
New Compilers
Programs·
User Capability,
Difficulty, and ...
Complexity of
Security Controls
Figure 2
line. Finally, the illegal terminal might drain off counteract both accidental and deliberate events.
output directed to a legitimate terminal and pass on The specific leakage points touched upon in the
an error message in its place so as to delay detection. · foregoing discussion can be classified in five groups:
Active infiltration also can be by an agent oper physical surroundings, hardware, software, com
ating within the secure organization. This technique munication links, and organizational (personnel and
may be restricted to taking advantage of system pro procedures). The overall safeguarding of informa
tection inadequacies in order to commit acts that tion in a computer system, regardless of configura
appear accidental but which are disruptive to the tion, is achieved by a combination of protection fea
system or to its users, or which could result in acqui tures aimed at the different areas ofleakage points.
sition of classified information. At the other ex Procedures, regulations, and doctrine for some of
treme, the agent may actively seek to obtain remova these areas are already established within DOD, and
ble files or to create trap doors that can be exploited are not therefore within the purview of the Task
at a later date. Finally, an agent might be placed in Force. However, there is some overlap between the
the organization simply to learn about the system various areas, and when the application of security
and the operation of the installation, and to obtain controls to computer systems raises a new aspect of
what pieces of information come his way without an old problem, the issue is discussed. An overview
any particularly covert attempts on his part at subv of the threat points is depicted in Fig. 3.
ersion.
Passive Subversion. In passive subversion, Physical Protection
means are applied to monitor information resident
within the system or being transmitted through the Security controls applied to safeguard the physi
communication lines without any corollary attempt. cal equipment apply not only to the computer equip
to interfere with or manipulate the system. The most ment itself and to its terminals, but also to such
obvious method of passive infiltration is the wire tap. removable items as printouts, magnetic tapes, mag
If communications between remote terminals and netic disc packs, punchcards, etc. Adequate DOD
the central processor are over unprotected circuits, regulations exist for dissemination, control, storage,
the problem of applying a wire tap to the computer and accountability of classified removable items.
line is similar to that of bugging a telephone call. It Therefore, security measures for these elements of
is also possible to monitor the electromagnetic ema the system are not examined in this Report unless
nations that are radiated by the high-speed elec there are some unique considerations. The following
tronic circuits that characterize so much of the general guidelines apply to physical protection.
equipment used in computational systems. Energy
given off in this form can be remotely recorded with (a) The area containing the central computing
out having to gain physical access to the system or complex and associated equipment (the ma
to any of its components or communication lines. chine room or operational area) must be
The possibility ofsuccessful exploitation ofthis tech secured to the level commensurate with the
nique must always be considered. most highly classified and sensitive material
Physical Attack. Overt assault against or at handled by the system.
tack upon the physical environment (e.g., mob ac (b) Physical protection must be continuous in
tion) is a type of vulnerability outside the scope of time, because ofthe threat posed by the possi
this Report. bility of physical tampering with equipment
and because of the likelihood that classified
information will be stored within the com
IV. AREAS OF SECURITY puter system even when it is not operating.
PROTECTION (c) Remote terminal devices must be afforded
physical protection commensurate with the
The system designer must be aware ofthe points classification and sensitivity of information
ofvulnerability, which may be thought ofas leakage that can be handled through them. While re
points, and he mustprovide adequate mechanisms to sponsibility for instituting and maintaining
rtli\.IJ:InJ:I\.ITI A I
_._. ,. • - ..... , I II~._
RADIATION
. TAPS
a.j Q
RADIATION
1
RADIATION
TAPS
CROSSTALK l
RADIATION RADIATION ~
CROSSTALK t ~ll-.
l 1
COMMUNICATION
--1--+---~ SWITCHING
PROCESSOR LINES
CENTER
FILES
THE~
~t ~ ~\ ~ARE
IMP~OPER CONNECTIONS
"': ~
tw
COPYING
OPERATOR CROSS COUPLING
UNAUTHO~IZEO ACCESS
REPLACE SUPERVISOR SYSTEMS PROGRAMMER REMOTE
REVEAL PROTECTIVE DISA&LE PROTECTIVE FEATURES CONSOLES
MEASURES PROVIDE "INS"
REVEAL PROTECTIVE MEASURES
. HARDWARE
Figure 3
physical protection measures is normally as isolated systems can be physically shielded to elimi
signed to the organization that controls the nate emanations beyond the limits of the secure in
terminal, it is advisable for a central au stallation, but with geographically dispersed sys
thority to establish uniform physical security tems comprehensive shielding is more difficult and
standards (specific protection measures and expensive. Currently, the only practical solutions
regulations) for all terminals in a given sys are those used to protect communications systems.
tem to insure that a specified security level The problem of emanation security is covered by
can be achieved for an entire system. Termi existing regulations; there are no new aspects to this
nal protection is important in order to: problem raised by modern computing systems. It
should be emphasized, however, that control of
• Prevent tampering with a terminal (in
spurious emanations must be applied not only to the
stalling intelligence sensors);
main computing center, but to the remote equip
• Prevent visual inspection of classified
ment as well.
work in progress;
Although difficult to accomplish, the possibility
• Prevent unauthorized persons from trying
exists that covert monitoring devices can be in
to call and execute classified programs or
stalled within the central processor. The problem is
obtain classified data.
that the computer hardware involved is ofsuch com
If parts of the computer system (e.g., magnetic plexity that it is easy for a knowledgeable person to
disc files, copies of printouts) contain unusually sen incorporate the necessary equipment in such a way
sitive data, or must be physically isolated during as to make detection very difficult. His capability to
maintenance procedures, it may be necessary to do so assumes access to the equipment during manu
physically separate them and independently control facture or major maintenance. Equipment is also
access to them. In such cases, it may be practical to vulnerable to deliberate or accidental rewiring by
provide direct or remote visual surveillance of the maintenance personnel so that installed hardware
ultra-sensitive areas. Ifvisual surveillance is used, it appears to function normally, but in fact by-passes
must be designed and installed in such a manner or changes the protection mechanisms.
that it cannot be used as a trap-door to the highly Remote consoles also present potential radiation
sensitive material it is intended to protect. vulnerabilities. Moreover, there is a possibility that
recording devices might be attached to a console to
Hardware Leakage Points pirate information. Other remote or peripheral
equipment can present dangers. Printer ribbons or
Hardware portions of the system are subject to platens may bear impressions that can be analyzed;
malfunctions that can result directly in a leak or removable storage media (magnetic tapes, disc
cause a failure of security protection mechanisms packs, even punchcards) can be stolen, or at least
elsewhere in the system, including inducing a soft removed long enough to be copied.
ware malfunction. In addition, properly operating Erasure standards for magnetic media are not
equipment is susceptible to being tapped or other within the scope of this Task Force to review or es
wise exploited. The types of failures that most di tablish. However, system designers should be aware
rectly affect security include malfunctioning of the that the phenomena of retentivity in magnetic
circuits for such protections as bounds registers, materials is inadequately understood, and is a threat
memory read-write protect, privileged mode opera to system security.
tion, or priority interrupt. Any hardware failure po
tentially can affect security controls; e.g., a single-bit Software Leakage Points
error in memory.
Both active and passive penetration techniques Software leakage points include all vulnerabili
can be used against hardware leakage points. In the ties directly related to the software in the computer
passive mode, the intervener may attempt to moni system. Of special concern is the operating system
tor the system by tapping into communication lines, and the supplementary programs that support the
or by monitoring compromising emanations. Wholly operating system because they contain the software
• - • - . . - .. 1-.-1 A I
safeguards. Weaknesses can result from improper tacker could mount a deliberate search for such loop
design, or from failure to check adequately for com holes with the expectation of exploiting them to
. binations of circumstances that can lead· to un acquire information either from the system or about
predictable consequences. More serious, however, is the system-e.g., the details of its information safe
the fact that operating systems are very large, com guards.
plex structures, and thus it is impossible to exhaus
tively test for every conceivable set of conditions Communication Leakage Points
that might arise. Unanticipated behavior can be
triggered by a particular userprogram or by a rare The communications linking the central proces
combination of user actions. Malfunctions might sor, the switching center and the remote terminals
only disrupt a particular user's files or programs; as present a potential vulnerability. Wiretapping may
such, there might be no risk to security, but there is be employed to steal information from land lines,
a serious implication for system reliability and and radio intercept equipment can do the same to
utility. On the other hand, operating system mal microwave links. Techniques for intercepting com
functions might couple information from one pro promising emanations maybe employed against the
gram (or user) to another; clobber information in the communications equipment even more readily than
system (including information within the operating against the central processor or terminal equipment.
system software itself); or change classification of For example, crosstalk between communications
users, files, or programs. Thus, malfunctions in the lines or within the switching central itself can pre
system software represent potentially serious sent a vulnerability. Lastly, the switch gear itself is
security risks. Conceivably, a clever attacker might subject to error and can link the central processor to
establish a capability to induce software malfunc the wrong user terminal.
tions deliberately; hiding beneath the apparently
genuine trouble, an on-site agent may be able to tap Organizational Leakage Points
files or to interfere with system operation over long
periods without detection. There are two prime organizational leakage
The security safeguards provided by the oper points, personnel security clearances and institu
ating system software include access controls, user tional operating procedures. The first concerns the
identification, memory bounds control, etc. As a re structure, administration, and mechanism ofthe na
sult of a hardware malfunction, especially a tran tional apparatus for granting personnel security
sient one, such controls can become inoperative. clearances. It is. accepted that adequate standards
Thus, internal checks are necessary to insure that and techniques exist and are used by the cognizant
the protection is operative.· Even when this is done, authority to insure the reliability of those cleared.
the simultaneous failure of both the protection fea This does not, however, relieve the system designer
ture and its check mechanism must always be re of a severe obligation to incorporate techniques that
garded as a possibility. With proper design and minimize the damage that can be done by a subver
awareness of the risk, it appears possible to reduce sive individual working from within the secure
the probability of undetected failure of software organization. A secure system must be based on the
safeguards to an acceptable level. concept of isolating any given individual from all
Probably the most serious risk in system software elements of the system to which he has no need for
is incomplete design, in the sense that inadvertent access. In the past, this was accomplished by denying
loopholes exist in the protective barriers and have physical access to anyone without a security clear
not been foreseen by the designers. Thus, unusual ance of the appropriate level. In resource-sharing
actions on the part of users, or unusual ways in systems ofthe future, a population of users ranging
which their programs behave, can induce a loophole. from uncleared to those with the highest clearance
There may result a security breach, a suspension or levels will interact with the system simultaneously.
modification of software safeguards (perhaps un This places a heavy burden on the overall security
detected), or wholesale clobbering of internal pro control apparatus to insure that the control mech
grams, data, and files. It is conceivable that an at anisms incorporated into the computer system are
properly informed of the clearances and restrictions bility and responsibility to control the movement of
applicable to each user. The machine system must be personnel into and within the central computing
designed to apply these user access restrictions relia area in order to insure that only authorized individu
bly. als operate equipment located there, have access to
In some installations, it may be feasible to re removable storage media, and have access to any
serve certain terminals for highly classified or machine parts not ordinarily open to casual inspec
highly sensitive or restricted work, while other ter tion.
minals are used exclusively for less sensitive opera
tion. Conversely, in some installations any terminal
can be used to any degree of classification or sen Leakage Point Ecology
sitivity, depending on the clearance and needs ofthe
user at the given moment. In either of these cases, In dealing with threats to system security, the
the authentication and verification mechanisms various leakage points cannot be considered only in
built into the machine system can be relied upon dividually. Almost any imaginable deliberate at
only to the degree that the data on personnel and on tempt to exploit weaknesses will necessarily involve
operational characteristics provided it by the a combination of factors. Deliberate acts mounted
security apparatus are accurate. against the system to take advantage of or to create
The second element of organizational leakage leakage points would usually require both a system
points concerns institutional operating procedures. design shortcoming, either unforeseen or un
The consequences of inadequate organizational detected, and the placement ofsomeone in a position
procedures, or of their haphazard application and to initiate action. Thus, espionage activity is based
unsupervised use, can be just as severe as any other on exploiting a combination of deficiencies and cir
malfunction. Procedures include the insertion of cumstances. A software leak may be caused by a
clearance and status information into the security hardware malfunction. The capability to tap or tam
checking mechanisms of the machine system, the per with hardware may be enhanced because ofdefi
methods of authenticating users and of receipting ciencies in software checking routines. A minor, os
for classified information, the scheduling of comput tensibly acceptable, weakness in one area, in combi
ing operations and maintenance periods, the provi nation with similar shortcomings in seemingly un
sions for storing and keeping track of removable related activities, may add up to a serious potential
storage media, the handling of printe9 machine out for system subversion. The system designer must be
put and reports, the monitoring and control of ma aware of the totality of potential leakage points in
chine-generated records for the security apparatus, any system in order to create or prescribe techniques
and all other functions whose purpose is to insure and procedures to block entry and exploitation.
reliable but unobtrusive operation from a security The security problem of specific computer sys
control viewpoint. Procedural shortcomings repre tems must be solved on a case-by-case basis employ
sent an area of potential weakness that can be ex ing the best judgment of a team consisting ofsystem
ploited or manipulated, and which can provide an programmers, technical, hardware, and communica
agent with innumerable opportunities for system tions specialists, and security experts. This Report
subversion. Thus, the installation operating proce cannot address the multitude of details that will
dures have the dual function of providing overall arise in the operation ofa particular resource-shared
management efficiency and of providing the ad computer system in an individual installation. In
ministrative bridge between the security control ap stead, it is intended that the Report provide guide
paratus and the computing system and its users. lines to those responsible for designing and certify
The Task Force has no specific comments to make ing that a given system has satisfactory security con
with respect to personnel security issues, other than trols and procedures. On the other hand, the security
to note that control of the movement of people must controls described in Parts B through D can
include control over access to remote terminals that markedly reduce the probability that an undetected
handle classified information, even if only intermit attempt to penetrate a resource-sharing computer
tently. The machine room staffmust have the capa system will succeed.
9
This Report addresses the most difficult security for maintaining it under conditions of shifting job
control situation, a time-sharing system serving geo assignments, issuance and withdrawal ofclearances,
graphically distributed users. Where circumstances changes in need-to-know parameters, transfer ofper
warrant, a lesser set of controls may be satisfactory, sonnel from one duty assignment to another, etc.
and it is not intended that in such cases there be The system should be responsive to changing op
prohibitions on implementing a system with a lesser erational conditions, particularly in time of emer
set of safeguards. The recommendations have been gency. While not an aspect of security control per se,
framed to provide maximum latitude and freedom of it is important that the system be responsive in that
action in adapting the ideas to specific installations. it does not deny service completely to any class of
users as the total system load increases. It may prove
. desirable to design special emergency features into
the system that can suspend or modify security con
V. SYSTEM CHARACTERISTICS
trols, impose special restrictions, grant broad access
privileges to designated individuals, and facilitate
Constraints rapid change of security parameters. 3
The U.S. Government classifies defense informa The system should be auditable. It must provide
tion within a well defined and long established struc records to the security control supervisor, so that
ture. Although it might be desirable from the com system performance, security safeguards, and user
puter point of view to modify these rules, to do so activities can be monitored. This implies that both
would be equivalent to tailoring the structure to fit manual and automatic monitoring facilities are
the computer operation and would constitute an desirable.
inappropriate recommendation. Obviously then, a The system should be reliable from a security
constraint is that a secure computer system must be point ofview. It ought to be fail-safe in the sense that
consonant with the existing security classification if the system cannot fulfill its security controls, can
structure. not make the proper decisions to grant access, or
A second constraint, at least initially, is the as cannot pass its internal self-checks, it will withhold
sumption that the general tenets of the existing, information from those users about which it is un
familiar, manual security control procedures will certain, but ideally will continue to provide service
prevail. For example, the Task Force recommenda to verified users. A fallback and independent set of
tions require not only that a secure computer system security safeguards must be available to function
identify a user, but also that the user establish and to provide the best level of security possible un
(prove) his authenticity; furthermore, he will be der the degraded conditions if the system is to con
asked to receipt by a simple response for any and all tinue operation.
classified information that is made available to him The system should be manageable from the
through any type of terminal. This is a desirable point of view of security control. The records, audit
feature, not only from a consideration of system ac controls, visual displays, manual inputs, etc., used to
countability, but also from the point of view of pro monitor the system should be supplemented by the
tection for the user. It is conceivable that an error by capability to make appropriate modifications in the
the computer system might result in an allegation operational status ofthe system in the event ofcatas
that it had given a user certain information, when, trophic system failure, degradation of performance,
in fact, it had not. change in workload, or conditions of crisis, etc.
The system should be adaptable so that security
controls can be adjusted to reflect changes in the
General Characteristics classification and sensitivity of the files, operations,
In formulating its recommendations, the Task ana the needs of the local installation. There should
Force recognized the following general characteris be a convenient mechanism whereby special
tics as desirable in a secure system. security controls needed by a particular user can be
The system should be flexible; that is, there
should be convenient mechanisms and procedures •see the definition of Security Parameters, p. 13.
10
CONFIDENTIAL
embedded easily in its system. Thus, the security lute and demonstrable security risk-level. Since the
control problem ideally must be solved with general security risk probabilities of present manual sys
ity and economy. It would be too costly to treat each tems are not well known, it is difficult to determine
installation as an individual instance and to con whether a given design for a secure computer system
ceive an appropriate set of unique safeguards. will do ·as well as or better than a corresponding
The system must be dependable; it must not manual arrangement. This issue is likely to raise
deny service to users. In times of crisis or urgent considerable discussion at such time as official policy
need, the system must be self-protecting in that it decisions about security control in computer systems
rejects effo!"ts to capture it and thus make it unavail must be made.
able to legitimate users ..This point bears on the As described above, computer systems differ
number and kinds of internal records that the sys widely in the capabilities they make available to the
tem must keep, and implies that some form ofration user. Jn the most sophisticated (and highest security
ing algorithm must be incorporated so that a pene risk) case, a user can construct both new programs
tration would capture no more than a specified share and new programming languages from his console,
of system capability. and embed such new languages into the computer
The system must automatically assure configu system for use. In such a computer system, offering
ration integrity. It must self-test, violate its own the broadest capability to the user, the security prob
safeguards deliberately, attempt illegal operations, lems and risks are considerably greater when users
monitor communication continuity, monitor user ac from the following two classes must be served simul
tions, etc., on a short time basis. taneously:
11
applications, some of the capabilities that are pre spoken of as having a given level of clearance, it is
sent in order to make a time-sharing system work at implied that certain investigative procedures and
all are also applicable to the provision of security tests have established that the corresponding level of
controls. In other computing systems, any facilities classified information can be safely transmitted
for security control would have to be specially in through that terminal. When referring to an aggre
stalled. Thus, the Task Force cannot give an accu gation of equipment, together with its management
rate estimate ofthe cost ofsecurity. It will depend on controls and procedures, facility clearance is some
the age of the software and hardware, but certainly times used.
security control will be cheapest ifit is considered in Need-to-know. An administrative action certi
the system architecture prior to hardware and soft fying that a given individual requires access to spe
ware design. In the opinion of some, the investment cified classified information in order to perform his
in the security controls will give a good return in assigned duties. The combination of a clearance and
tighter and more accurate accountability and dis a need-to-know constitutes the necessary and suffi
semination of classified information, and in im cient conditions for granting access to classified in
proved system reliability. formation.
The cost of security may depend on the workloatl Classification. The act of identifying the sen
of the installation. If all classified operations can be sitivity of defense information by ascertaining the
accommodated on a single computer, and all unclas potential level of damage to the interests of the
sified operations on a second computer, the least ex United States were the information to be divulged to
pensive way to maintain the integrity of the clas an unfriendly foreign agent. The classification of in
sified information may be to retain both machines. formation is formally defined in Executive Order
Such a configuration will present operational ineffi 10501. There are only three formal levels of national
ciency for those users who need to work with both classification: Top Secret, Secret, and Confidential,
classified and unclassified data bases, but the con but it is expedient from the computer point of view
cept of a dual installation-with one machine work also to consider Unclassified as a fourth level ofclas
ing in the clear and a second machine fully protected sification. The identifiers associated with an item of
-cannot be summarily rejected. classified information, indicating the level ofclassifi
cation or any special status, are generically called
labels.
VI. DEFINITIONS Special Category (or: Special-Access Category
or Compartment). Classified defense information
There are many terms commonly used in connec that is segregated and entrusted to a particular
tion with security control for which usage is not com agency or organizational group for safeguarding. For
pletely standardized. Terms used throughout this example, that portion of defense classified informa
Report are defined below as a group; certain other tion that concerns nuclear matters is entrusted to
terms (especially computer-related ones) are defined the Atomic Energy Commission, which is responsi
at appropriate places in the text. ble for establishing and promulgating rules and
Clearance. The privilege granted to an in regulations for safeguarding it and for controlling its
dividual on the basis of prescribed investigative dissemination. Classified information in a special
procedures to have formal access to classified infor category is normally identified by some special
mation when such access is necessary to his work. marking, label, or letter; e.g., AEC information,
The three formal national clearances are Top Secret, whether classified Confidential, Secret, or Top Se
Secret, and Confidential. However, it is also expedi cret, is collectively identified as Q-information. It is
ent from the computer point of view to recognize often called Q-classified, but note that this use of
Uncleared as a fourth level ofclearance. A clearance classification is an extended sense of the formal us
is a necessary but not sufficient condition to have age of the word.
access to classified information. By extension, the Sometimes, special investigative procedures are
concept of clearance can be applied also to equip stipulated for granting access to information in spe
ment. For example, when a computer terminal is cial categories. Thus, while formally there are only
12
three broadly defined national clearance levels, in protected, or utilized. Examples: "Limited Distri
practice there is a further structure within each bution," "Special Handling Required," "Group 1
level. In part, this reflects the separation of informa -Excluded from Automatic Downgrading and
tion into special categories, and, in part, the fact that Declassification."
many different agencies are authorized to grant Fully Cleared. An individual who has the clear
clearances. For example, an individual functioning ance and all need-to-know authorizations granting
within the AEC domain and cleared to Top Secret him access to all classified information contained in
will often be said to have a Q-clearance because he a computer system. By extension, the term can be
is authorized access to Top Secret information en applied to equipment, in which case it implies that
trusted to the AEC for safeguarding and identified all necessary safeguards are present to enable the
by the special category Q. These special types of equipment to store and process information with
clearances at given levels are not always specifically many levels of classification and caveated in many
identified with a unique additional marking or label. different ways.
Caveat. A special letter, word, phrase, sentence, Security Flag. For the purposes ofthis Report, it
marking, or combination thereof, which labels clas is convenient to introduce this new term. It is a com
sified material as being in a special category and posite term, reflecting the level of classification, all
hence subject to additional access controls. Thus, a caveats (including codewords and labels), and need
caveat is an indicator of a special subset of informa to-know requirements, which together are the fac
tion within one or more levels of classification. The tors establishing the access restrictions on informa
caveat may be juxtaposed with the classification la tion or the access privileges of an individual. By ex
bel, may appear by itself, or sometimes does not ap tel1sion, the concept can be applied to equipment,
pear explicitly but is only inferred. Particular kinds and indicates the class of information that can be
of caveats are: stored and processed.
Thus, the security flag contains all the informa
Codewords. An individual word or a group of tion necessary to control access. One security flag is
words labelling a particular collection ofclassified considered to be equal to or higher than a second if
information. ' a requestor with the first flag is authorized access to
information which has the second flag.
Dissemination Labels (Access Control Labels). Security Parameters. The totality of informa
A group of words that imposes an additional re tion about users, files, terminals, communications,
striction on how classified information can be etc., which a computer system requires in order to
used, disseminated, or divulged; such labels are an exercise security control over the information that it
additional means for controlling access. Exam contains. Included are such things as user names,
ples: "No Foreign Dissemination," "U.S. Eyes clearances, need-to-know authorizations, physical lo
Only," "Not Releasable Outside the Department cation; terminal locations and. clearances; file clas
of Defense." sifications and dissemination restrictions. Thus, a
Information Labels. A group of words that con set of security parameters particularizes a general
veys to the recipient of information some addi ized security control system to the specific equip
tional guidance as to how the information may be ment configuration, class of information, class of us
further disseminated, controlled, transmitted, ers, etc., in a given installation.
13
Part B
The policy recommendations that follow are in words, authentication words, and specifically desig
tended to provide a security skeleton around which nated sensitive procedures shall require classifica
a specific secure computer system may be built. Ad tion.
ditionally, these recommendations set forth there Comment: These principles reflect the constraint
sponsibilities and functions of the personnel needed that the recommendations of the Task Force be con
to evaluate, supervise, and operate a secure system. sistent with generally accepted, existing security doc
This is a new field, and this Report represents the trine. The last item is considered relevant in order to
first major attempt to codify its principles. In some permit maximum operational convenience.
cases, the rationale behind a specific recommenda
tion and appropriate examples are presented in a
Comment.
II. SYSTEM PERSONNEL
Depending upon the nature of the individual
I. FUNDAMENTAL PRINCIPLES computing installation, some or all of the following
categories of personnel will be associated with it. It
Automatic data processing systems shall accom is recognized that a given individual may have more
modate, without exception, the responsibilities ofin than one responsibility, and either simultaneously
dividuals to ensure that certain official information or at different times perform more than one func
affecting national defense is protected against unau tion. It is also recognized that the scope of responsi
thorized disclosure, pursuant to Executive Order bility may imply a substantial organizational group
10501 (Amended), "Safeguarding Official Informa for each function.
tion in the Interests of the Defense of the United Responsible Authority. The head ofthe depart
States." ment or agency responsible for the proper operation
A computer system shall grant access to classified of the secured computer system.
information only to persons for whom it can deter User. Any individual who interacts directly
mine that their official duties require such access, with the computer system by virtue of inserting in
and that they have received the proper security formation into the system or accepting information
clearances and need-to-know authorizations. from it. "Information" is considered to include both
The means employed to achieve system security computer programs and data.
objectives shall be based on any combination of soft Comment: A user is thus defined whether he in
ware, hardware, and procedural measures sufficient teracts with the system from a remote terminal or
to assure suitable protection for all classification submits work directly to the computing central
categories resident in the system. through a batch-process mode.
To the maximum extent possible, the policies and
procedures incorporated to achieve system security System Administrator. An individual desig
shall be unclassified. However, specific keys, pass nated as responsible for the overall management of
14
all system resources, both the physical resources of bility in order to maintain system integrity with re
the system and the personnel attached to it. spect to security matters, and (2) maintain the basic
Comment: The users are generally excluded from functioning of the system.
the System Administrator's management purview, Comment: The hardware and software mainte
although personnel under his control may also be nance personnel are permitted to service not only the
users at times. normal, basic features of the computing system, but
also the security control features. However, there need
System Certifier. An individual designated by be no prohibition on the assignment of these two
an appropriate authority to verify and certify that classes of maintenance requirements to separate in
th~ security measures of a given computer system dividuals or groups of individuals.
and of its operation meet all applicable, current cri
teria for handling classified information; and to es System Operators. Those personnel responsible
tablish the maximum security level at which a sys for performing the manual procedures necessary to
tem (and each of its parts) can operate. provide and maintain on-going service operations of
System Security Officer. An individual desig the system.
nated by a Responsible Authority as specifically re
sponsible for (1) proper verification of personnel Personnel Designations and
clearances and information-access authorizations; Responsibilities
(2) determination of operational system security
status (including terminals); (3) surveillance and System Administrators, System Security Offic
maintainance of system security; (4) insertion of ers, and System Maintenance and Operations Per
security parameters into the computing system, as sonnel shall be formally designated by the Responsi
well as general security-related system matters; (5) ble Authority. The total number of such personnel
security assurance. · should be kept to a minimum. Where necessary to
meet special operational needs ofa particular instal
Comment: The System Certifier will establish the lation, special restrictions affecting personnel may
maximum security level at which the system (and be incorporated into the individual agency's proce
each part of it) can operate; the System Security dures, formulated under the cognizance of the Re
Officer will determine on an operational basis· the . sponsible Authority.
level at which it does operate. He will normally verify
personnel clearances with the overall security offi Comment: This recommendation is intended to per
cials of the organization, and need-to-know authori mit installations that have special operational needs,
zations with the organizational element that has cog either because of mission or sensitivity of informa
nizance over the information in question (e.g., an tion, to impose additional constraints on system per
. Office of Primary Interest). sonnel or on their responsibilities.
Security assurance implies an independent group As a general approach, it is desirable that persons
that continuously monitors security provisions in the designated as System Personnel have sufficient clear
computer system. It includes such functions as con ance and need-to-know authorization for all informa
tinuously probing the system to ascertain its weak tion resident in the computer system. However, it is
nesses and vulnerabilities, recommending additional conceivable that even for System Personnel, access
safeguards as need is determined, and validating the could be segmented so that such clearance would not
security provisions in a system. Because ofthe techni be absoluteiy necessary. For example, Operators and
cal expertise implied by security assurance, it is prob Administrators may not have access to the keys or
able that this responsibility will be shared by the mechanism that allow access to the interior of the
System Certifier. hardware. This policy will accommodate either ap
proach as found to be necess.ary by the exact nature
System Maintenance Personnel. The individu of the computer system involved and the information
als designated as responsible for the technical to be protected. A typical user-agency decision might
maintenance ofthose hardware and software system be to limit System Personnel to U. S. Government
features that (1) must operate with very high relia personnel, or to special two-man teams, each ofwhich
15
may be limited to partial access. Another user-agency selfand to authenticate his identity to the system at
decision might be to require some degree of sanitiza any time requested by it, using authentication tech
tion preliminary to the performance of certain types niques or devices assigned by the System Security
ofsystem maintenance, especially if the person capa Officer. Such techniques or devices shall be sufficient
ble ofperforming such maintenance is not or cannot to reduce the risk of unauthorized divulgence, com
be cleared adequately. Sanitization refers to the pro promise, or sabotage below that required by the sen
tection ofclassified information resident in computer sitivity of the data resident in the system.
files either by deliberate erasure or by physically Comment: Identification is for the purposes of sys
removing and/or protecting the storage medium or tem accounting and billing, whereas authentication
device. is the verification procedure necessary before the sys
Although it is recognized that System Personnel may tem can grant access to classified information. Th.e
fulfill more than one responsibility, this option may choice oftechnique or device obviously will depend.on
not be exploitable in practice because of the signifi the sensitivity of the data resident within the com
cantly different skills required. For example, skilled puting system, the physical location ofthe user termi
and experienced system programmers will be required nal, the security level to which it and its communica
to maintain the software, whereas computer engi tion links are protected, the set of users that have
neers will be required for the hardware, and com access to it at any time, etc.
munication engineers for the communications.
User Responsibility
User Designation
A properly authenticated user is responsible for
Each user (or specific group of users) shall be ad all action at a given terminal between the time that
ministratively designated (identified) to the com his identity has been established and verified, and
puter system by the System Administrator, with the his interaction with the system is terminated and
concurrence of the System Security Officer. The acknowledged. Termination can occur because he
designation shall include indicators of the user's notifies the system of his departure, or because the
status in sufficient detail to enable the system to system suspends further operation with him. The
provide him with all material to which he is author user is responsible for observing all designated
ized access, but no more. procedures and for insuring against observation of
Comment: As will be seen in the Appendix, which classified material by persons not cleared for access
defines a language and schema for identifying both a to it; this includes proper protection of classified
security structure and security parameters to a com hard copy. Furthermore, he is responsible for report
puting system, the number ofparameters that must ing system anomalies or malfunctions that appear to
be kept within the system for each user will reflect the be related to system security controls to the System
kind ofclassified information with which the system Security Officer, especially when such occurrences
deals. In some instances, it will be necessary to verify suggest that system security control measures may
more than a user's clearance and need-to-know status be degraded, or that a deliberate attempt to tamper
before access to classified information can be granted; with or penetrate the system is occurring. Other sys
e.g., it may be necessary to verify his agency ofemploy tem anomalies should be reported to System Mainte
ment. It may also be desirable to keep within the nance Personnel, who, in turn, must report to the
computing system extensive info;mation on each System Security Officer those hardware or software
user, not for routine verification of his access privi malfunctions that investigation shows have affected
leges, but for the convenience of the System Security security controls.
Officer when he finds it necessary to intervene in the
system~ operation. Access
Access to classified information stored within the
User Authentication computer system shall be on the basis of specific
Each user shall be required both to identify him authorization from the System Security Officer to
16
receive such information, or by automatic processes recting a computational process to declare and
operating under his control and authority. The au verify the classification and any applicable caveats
thority of the System Security Officer to authorize and other labels for an information unit produced as
system users to have access to classified information a result of some computer process (e.g., calculations
stored in the system does not implicity apply to the of bomber ranges or weapon effectiveness), or as a
System Security Officer himself. Separate and spe result of a transformation of some previously exist
cific restraints over his access to classified informa ing unit (e.g., merging or sorting of files). 1 This re
tion shall be established by the System Administra sponsibility extends to security control and manage
tor. A specific algorithm (or combination of al ment ofinformation subunits. Procedures analogous
gorithms) for controlling access to all classl.fied infor to those in force for controlling introduction ofinfor
mation shall be specified and embedded in the sys mation from or release of information to entities
tem. Moreover, a specific protocol and mechanism outside the system must be observed, and are de
shall be specified for inserting into the computer scribed in Sec. VI below, "Information Security La
system those security parameters that grant andre bels." Since a hierarchical structure of information
scind access privileges. For both purposes, hardware, classification will usually exist, a composite unit
software, and procedural mechanisms shall be im must be at least at the highest level of classification
plemented .that insure that neither the access con of the units contained in the composite, but, in fact,
trol algorithm nor the security-parameter insertion may be higher. Automatic algorithms may be used to
mechanism is circumvented, either accidentally aid the user in the execution of these responsibili
(through component failure) or intentionally. ties.
Comment: This recommendation establishes the Comment: The intent of this recommendation is to
general principle on which user access to classified provide procedures analogous to those for handling
information within the system is granted. The details documents, as specified in Section 3 ofExecutive Or
of the algorithm that permits access to classified in der 10501 (Amended). The recommendation on infor
formation obviously will depend on that part of the mation structure and transforms leaves unspecified
total security structure with which the computer sys whether a computer-based file is classified as an en
tem is concerned, and also on the status information tity, or whether the individual entries or elements of
kept within the system for each user. The Appendix the file are separately classified. The design of the file
illustrates a particular algorithm that appears to be structure and the details of how it shall be classified
sufficiently comprehensive to cover all requirements are operational matters, not a problem ofproviding
known to the Task Force. It should be noted that this security control mechanisms. However, where the
recommendation attempts to incorporate redundancy security structure of the file is established, the proce
into the access control mechanism, and also into the dures outlined in this recommendation will apply.
parameter insertion mechanisms, by requiring a com This recommendation also permits the use of com
bination of hardware, software, and procedural puter algorithms to assist in classifying new informa
mechanisms. tion. In the Appendix, examples are given which sug
gest how such algorithms may be applied, but the
computer system may not be able to establish classifi
III. INFORMATION STRUCTURE cation level or applicable special caveats and labels
in every circumstance. At most, the system can tell a
AND TRANSFORMS
user that he has had access to classified information
Data storage shall be organized and controlled at
the level of the basic computer system in terms of 'This statement is not adequate for nongovernmental organi
information units, each ofwhich has a classification zations, nor in some government situations. For example, an em
ployee of an industrial contractor can only suggest the classifica
descriptor plus applicable special-access categories tion of information which he creates; the formal .declaration of
(as required by the presence of caveats) and other classification is made by a designated, appropriate authority,
sometimes external to the contractor company. Some secure com
labels that apply to the information unit as a whole. puter systems will require a supplementary procedure to validate
It is the explicit responsibility of the individual di classifications suggested by users.
17
vith given caveats and labels; it' will be his responsi overlaps somewhat the control offile integrity, and it
•ility to confirm to the computer system the classifica may prove desirable for some of the audit informa
ion, special caveats, and labels that should apply. If tion to be made available to the System Administra
he sensitivity ofthe information warrants, audit in tor.
ormation should be made available to the System The number and kinds ofaudits and the periodicity
~ecurity Officer, informing him that a user has taken
with which they are made will depend on such fac
ome specified action in establishing or modifying a tors as sensitivity ofthe information contained in the
learance level, applicable caveats, or labels. computer system, the class of users it services and
their clearance status, the operational requirements
ofthe system, etc. Some portions ofthe status log will
V. SYSTEM TRANSACTION be only historical, others will be used operationally.
~CCOUNTING It is conceivable that in some installations it will
prove desirable to provide the System Se~urity Officer
. .ogging of Transactions with a visual display of the system transaction log.
It should be noted that when the System Security
All relevant transactions between users and the Officer is interacting with the system (e.g., inserting
omputer system shall be automatically logged (in new security parameters), he is considered by the sys
luding date and time) by the computer system so tem to be a user. Thus, even though his actions are
b.at an audit oftransactions involving access to and privileged and executable only by himself, his activi
eneration, classification, reclassification, and de ties will be automatically logged. Furthermore,
truction of files is possible. The provisions of this maintenance personnel will also be considered users
aragraph also apply to unclassified information when their activity can be accomplished with the
b.at resides in a system containing, or cleared to system in an operational status, and their actions
ontain, classified information. Supplementary will also. be automatically logged. Finally, the in
1anual logs (including date and time) must record teractions of the operating personal, especially the
ll significant events that cannot be automatically console operators, will be considered as user activity
>gged. and logged.
:Omment: Transaction as used here includes such
hings as a user logging onto or off the system; the Receipting
ystem granting a user access to a specified file; the
terging offiles by a user; the generation ofnew infor Where required by applicable regulations, a re
tation to which a user assigns classification; ceipt shall be obtained from any user who has re
hanges made in a classified file by a user; and ex ceived classified information from the system. Re
hanges of information with another computer. The ceipting shall require an overt action on the part of
"tclusion of unclassified information is intended to the user following delivery (or presentation) to him
rovide for the case where "unclassified" information of the classified information. The purpose of the re
ecomes upgraded, and to protect against unobserved ceipt is to insure that the user is aware that he has
ctivity in the manipulation of the system by users. received classified data. For the purposes of this re
'he audit-trail data should be made available to the quirement, the bounds of a dialogue between a user
'ystem Security Officer to aid him in the continuous and the computer system are defined to be based on
wnitoring of the security of the system. the beginning and ending of access to a particular
t may prove operationally desirable to aggregate in unit of information contained within the system or
)rmation of this type and present it in various peri transferred to or from the system.
die reports. Thus, for example, the System Security Comment: While a properly functioning system al
lfficer could be informed at the end of each shift as ready knows, to the degree adequate for logging of
) which files have been addressed by or released to system activity, where information should be or to
zch user, or which files have been updated or had whom it has been delivered, the requirement for a
1eir classification changed. The control of security receipt recognizes a need for an acknowledgment
18
19
'Jf such self checks are not matters that can be as would need to be provided with a great deal of visu
~essed readily by the local System Security Officer. ally displayed information and with appropriate
flence, this recommendation requires that the prob manual controls over system performance.
lem be addressed at the level of design and installa Typical actions that the System Security Officer
tion certification. However, it is reasonable that the might take, depending on the type offailure detected
System Security Officer have the option of adjusting and upon the operational urgency of the moment,
the periodicity and depth and scope ofself-checking, include:
1ccording to the level of information that his system
must accommodate. (a) Disabling the system completely-i.e., closing it
rt is not possible to make positive statements about down and requesting maintenance.
the frequency with which internal self-checking must (b) Continuing to operate the system in the degraded
~eperformed. In part, this reflects lack ofinsight into mode, but under his continuous manual surveil
1nd experience with the security control mechanisms lance.
to be installed in the computing systems under con (c) Prohibiting new users, while allowing current
;ideration. It may be desirable to perform internal users to continue interaction with files presently
;elf-checking on some scheduled periodic basis, or, accessible to them.
oerhaps more wisely, the internal self-checking (d) Restricting access to classified files to those ter
;hould take place on an aperiodic basis, such as when minals over which he or some other responsible
1 user from a terminal requests access to a file. Aperi authority has visual cognizance. Alternatively,
)dic checking denies a potential penetrator the assur he might suspend all but fully-cleared users.
mce that he has guaranteed intervals of time in (e) Denying all user requests to access files ofspecial
'.Vhich to attempt to subvert or bypass the security sensitivity.
~ontrol mechanisms, but it also increases the self (f) Electrically severing malfunctioning storage de
~hecking load on the machine as the user load in vices, thus permitting the balance ofthe system to
~reases. In any event, the maximum interval between continue in operation. If these devices contain the
~nternal self-tests should be chosen jointly by the us security control and checking programs and au
~r-agency and the System Security Officer. The objec thentication words, etc., then a choice must be
tive is to find an acceptable balance between system made between this option and point (g) below.
~fficiency and the amount of classified information (g) By-passing all security checks and operating the
that could be compromised between tests, while main system "wide-open. "
taining a risk acceptable to the user-agency. (h) Electing to operate with unprotected communi
cations.
rn the event of an automatically detected failure of
z control mechanism, it is clear that the computing It is reasonable that the system be designed so that
rystem must shift to a degraded mode of operation the action options available to the System Security
'Jecause ofthe risk of unauthorized divulgence. How Officer can be automatically presented tp him by the
mer, the system design must be such that the system system itself. It is also reasonable that each option
zttempts to maintain maximum service to the great displayed be accompanied by instructions detailing
~st number of users. It is also clear that the issue the manual and procedural actions that he ought to
~ranscends the computing central and its procedures; take.
z response to malfunction can also involve communi Ultimately, the amount of self-checking incor
:ations, remote terminals, other computers, etc. porated into a system, the frequency with which self
rhe degraded mode suggested by the wording of this checking is done, and the precise details of how the
·ecommendation seems to be reasonable, but it is not system functions in a degraded mode, will represent
~he only possibility. Another, for example, is to bring a design compromise betwf!en maintaining maximum
~he System Security Officer into the access control service to the users and maintaining maximum
Jrocedure and let him manually verify each user re safety of the information resident within the system.
ruest for access to a given file. If such a procedure When circumstances warrant, the system can be de
.vere to be implemented, the System Security Officer signed to automatically go into a more extensive
20
mode of internal selfchecking, or even to switch au separate page or display ofinformation, means must
tomatically to alternate software packages that can be provided for the user to obtain them at his re
substitute for malfunctioning hardware or software quest.
protection mechanisms. Comment: Ideally, all information provided a user,
whether printed out in hard copy or electronically
displayed, should be accompanied by all relevant
VI. INFORMATION SECURITY security parameters. However, practical limitations
LABELS in the capabilities of display devices or printers may
make alternati.ve procedures necessary. At the mini
mum, the classification level must be displayed or
Information Input
printed with each page. The user must be able to
The system shall not accept information, even for obtain the complete set of security parameters as
temporary use, without first receiving from the user sociated with information when he is being asked to
a declaration of the relevant security parameters, receipt for it.
which in this case inch.ide classification, all caveats,
and labels. These parameters will be used by the
system to control further use or dissemination ofthe VII. MANAGEMENT OF STORAGE
information. The security parameters can be han RESOURCES
dled as a declaration covering a definable set of in
teractions between a user and the system--e.g., the User-to-User Leakage
totality of a dialogue between user and system, be
ginning when the user logs on and ending when he Allocation, use, and erasure of storage resources
logs off. The capability for specifying security param ofall types in the computing system shall be handled
eters as a declaration covering a set of interactions both by the system and by operational procedures in
is provided in order that the user not be burdened such a way that no information from a prior use of
with specifying security information more often the storage medium can leak to the current use.
than absolutely necessary. Comment: The consequence ofthis recommendation
Comment: The requirement that the security is to require that appropriate schemes for manage
parameters be specified before the system will accept ment of storage allocation and erasure of storage be
information is simply a fail-safe mechanism to avoid incorporated into the system software and system op
oversight on the part of a user. It is reasonable that erational features. The problem of leakage concerns
the system assist the user by asking him in turn for both complete and fragmentary pieces of informa
level of classification, codewords, dissemination la tion, and entire as well as partial quantities ofstor
bels, and information labels (as applicable). Where age. For example, the scratch space on a magnetic
possible, the system should automatically apply any disc assigned to one classified job must be satisfac
caveats, labels, etc., implied by information already torily sanitized before assigning it to a second job.
supplied. It is also reasonable that, on request, the The problem of leakage would be greatly facilitated
system provide the user with a listing oflabels so that if magnetic tape transports contained a rewind-and
he can assure himself that nothing has been over erase feature, and magnetic discs a read-and-erase
looked. feature.
21
22
spections and tests shall be at the discretion of the vironment supplements and complements hardware
Responsible Authority. The inspections and tests and software safeguards, and that physical safe
shall be conducted to determine the degree to which guards are appropriate. It is anticipated that certifi
the system conforms to the requirements here cation review will be most extensive and thorough at
recommended, any derivative regulations, and other the time ofinitial installation ofthe system. Installa
applicable regulations. tion certification will probably be conducted by a
Comment: This recommendation does not specify special team, not necessarily under the control ofthe
the details of tests and inspections to be conducted, Responsible Authority. Ideally, the System Security
nor does it specify when such tests and inspections are Officer will participate in this certification so that he
necessary. Furthermore, it does not prohibit the Re becomes familiar with the safeguards in the system
sponsible Authority from using expert technical per and with the process and intent of certification in
sonnel from an external agency or department. On the ordP.r that he can conduct subsequent certifications.
contrary, some of the tests and inspections should be Recertification. Some level of recertification
conducted by an external group. Where the sensitivity must be accomplished periodically, as indicated by
of the information in the system warrants, some of operational circumstances. These instances are as
the tests, inspections, and deliberate diagnostic at follows:
tempts at penetration should be conducted on an Periodically during the operational life. It is
unannounced basis. It is not implied that the extent desirable to recertify the system at intervals dur
and nature of the tests and inspections necessarily be ing its lifetime. This is in the nature of a preven
the same for each of the types ofsystem certification. tive procedure to establish the continuity of
security safeguards, to make gross checks on sys
Types of System Certification tem functioning, and to search for loopholes in the
protection. It is conceivable that some level of
Design Certification. A series of tests and in recertification might be desirable at the beginning
spections that establish that the safeguards designed of each scheduled shift of operation or on some
into the hardware and software of the system are other periodic basis, as dictated by the needs or
operative, function as intended, and collectively con sensitivity of the computing installation.
stitute acceptable controls for safeguarding clas~
sified information. Production models of a given de After system malfunction. Depending upon how
sign need be tested only to verify that all safeguards the system has malfunctioned and on what
are present and properly functioning. It is recom remedial action has been taken, some recertifica
mended that this certification be performed by an tion procedures are desirable to re-establish that
agency or a special team not part ofthe using agency the security controls are fully functioning. The
and separate from design or maintenance groups. responsibility for determining which recertifica
Specifications (procedures, tests, inspections) for tion tests and inspections are necessary rests with
subsequent certification reviews must be produced the System Security Officer, although he may so
as part of the design certification process. licit expert opinion from System Maintenance
Installation Certification. A series of tests and Personnel or the System Administrator.
inspections performed according to specifications es After scheduled or unscheduled hardware or soft
tablished during the design certification phase to in ware maintenance or modification. As with system
sure that the required set of security safeguards malfunctions, some level of recertification un
(hardware, software, and procedural) are in fact pre doubtedly is necessary after modifications have
sent and operational in the installed equipment, and been made in the computing equipment or the
on all communication links that will carry classified system software. The scope and depth of these
information to remote terminals or other computers. tests and inspections should reflect what mainte
This certification must also examine the operational nance has been performed and what changes have
procedures and administrative structure of the been made. The ultimate judgment as to which
organization that controls the equipment, and must recertification procedures are necessary must be
establish that the procedural and administrative en the responsibility of the System Security Officer,
23
although he may solicit expert opinion. For suffi mation is permissible without the need for recertifi
ciently extensive modifications or maintenance, cation as long as precautions (escorting, continuous
the recertification procedure may well approxi surveillance to prevent tampering, etc.) are taken to
mate the extensive set of tests and inspections prevent subversion of the security mechanisms
made at the time of initial installation. needed (and previously certified as effective) to pro
Comment: The Task Force does not recommend any tect the stipulated classification of the terminal.
oarticular recertification periodicity, but suggests Comment: The impact of this recommendation on
that initially, at least, the question ofperiodic inspec the clearance specified for a remote terminal is com
tion and recertification be jointly determined by the plex. In effect, it requires that the clearance assigned
System Security Officer and the Responsible Au to a given terminal be determined by appropriate tests
thority. As each acquires confidence in the capability and safeguards that are commensurate with the
Jf the system to maintain satisfactory security con highest classification of information to be handled.
trol, it is likely that the intervals between tests and Temporary operation of the terminal with informa
-ecertifications will be adjusted accordingly. tion ofa lower classification is acceptable, providing
4.utomatic internal selftesting pr~wiously described that adequate measures are taken to maintain the
:an be regarded as a form ofrecertification that takes integrity of the certified status of both the terminal
Jlace on a short time scale (e.g., milliseconds), as op and its environment. There must be safeguards that
Josed to the type discussed above which occurs on a· insure that the system responds to each user appropri
~ong time scale (e.g., hours, days). ately to his clearance, and tests must be applied dur
ing the various certification phases that verify the
presence and efficacy of these protection mechanisms.
)perational Security Parameters Extra precautions must be taken before and after the
use of a terminal by an uncleared person. Following
The necessary operational security parameters of use of a terminal by a person not cleared to receive
he overall system, or of each portion of it, shall be information classified equivalent to the terminal's
nserted into the system by the System Security maximum clearance, authentication ofa new user is
)fficer. mandatory before initiating transactions involving
":omment: This recommendation is consistent with higher classifications. In establishing his authen
'he view that the security apparatus of the agency ticity, the new user is also tacitly indicating that the
'hat operates a computing system has the necessary former user is no longer in a position to monitor the
1verall view to be able to specify the relevant security higher classification transactions.
)arameters for the system. The recommendation also
·eflects the requirement that the System Security Post-Certification Changes
)fficer be responsible for the currency and accuracy of
he parameters in his system. The point is included Changes in the hardware or software of the sys
ts part of certification because proper tests and in tem shall be installed for normal operations only by
pections must be conducted in order to ascertain that the designated System Maintenance Personnel or
he security parameters have in fact been correctly personnel operating under their observation and
nserted into the system (and accepted by it), both supervision, with the concurrence of the System
nitially and each time the security parameters ofthe Security Officer. An explicit report of all such
ystem are modified. changes shall be made to the certifying authority for
the particular system, in addition to the normal
manual and/or automatic logging ofsystem transac
,rotection at Boundaries tions.
Information shall be passed to or accepted from Comment: This recommendation requires explicit
ny portion of the system only at a security level reporting of all changes in system hardware or soft
ommensurate with the security parameter for that ware. If such changes are sufficiently minor i17- the
ortion of the system. The use by an uncleared per opinion of the System Security Officer or the System
on of a terminal certified for highly classified infor Certifier, then reporting may be sufficient. However,
24
if, in the opinion of the System Certifier or the System guard against the implantation of intelligence sen
Security Officer, the changes are sufficiently major sors or software changes that might aid penetration
that security safeguards may have been affected, then ofsafeguards. Note that it does not require the items
some level of recertification tests and inspection will to be classified, nor does it require physical protection
be essential. for all copies of an item. For example, several copies
(e.g., on card decks or magnetic tapes or discs) of the
Continuity of Physical Protection operating system software will usually exist. Only
that copy to be inserted into the machine for actual
Equipment and associated materials (e.g., media running of the system and the master copy from
containing copies of programs) used for handling which it was made must be physically protected as
classified information must be continuously pro required; even then, protection need commence only
tected against unauthorized change commensurate after a copy has been certified to be correct. Other
with the security level at which they most recently copies, which are for the convenience ofmaintenance
have been certified. Copies of operating ·software personnel or system operators and which will not be
that is not itselfclassified and which is not to be used used to make additional copies or used operationally
for actual insertion into the system or to generate in the system when it contains classified information,
programs for insertion into the system need not be need not be protected. This recommendation should
subject to this requirement. also aid in avoiding unnecessary classification of
Comment: This recommendation is intended to equipment or software.
25
rll"-.ICif"'\Ct\.ITI A I
Part C
TECHNICAL RECOMMENDATIONS
26
necessary and sufficient for a closed secure system. relevant hardware features greatly simplifies the
However, their sufficiency for an open system cannot achievement of isolation. It is recommended that
be guaranteed in the abstract. Only by intelligent hardware user-isolation mechanisms be required for
adaptation to a specific open environment utilizing all resource-sharing systems ofTypes I, II, and III (in
experience from closed systems and by extremely Fig. 2).
objective and stringent testing and evaluation can It is recommended that isolation hardware be
their adequacy be established for a specific open sys mandatory in systems that provide extensive pro
tem. gramming capability to the user in any language
and with any compiler of his choice, including the
machine language of the computer (Type IV in Fig.
II. CENTRAL PROCESSOR 2).
HARDWARE While many contemporary machines designed
for multiprogramming or time-sharing environ
Central processor hardware must provide some ments incorporate hardware safeguards that pro
or all ofthe following mechanisms, depending on the vide user isolation, there is very little internal hard
class of service it renders its users: user ·isolation; ware self-checking to guard against malfunctions.
supervisory software 1 protection; and assurance Older machines operating in a security controlling
against unanticipated conditions. mode may not be able to fully meet these recommen
dations. To some extent, user isolation achieved by
User Isolation Mechanisms means of hardware mechanisms can be exchanged
for isolation via software mechanisms. This should
Each user (or worker) program 2 must be isolated
be done with caution, for the protection mechanisms
from all other programs in the computing system.
effected by software-means must themselves be safe
The currently known principal hardware mech
guarded against collapse due to a hardware or soft
anisms for isolating programs include base-address
ware malfunction.
ing registers and various forms of hardware check
ing circuits to assure that memory addresses gener
ated within the processor are in fact restricted to Supervisor Protection
those permitted for the programs of a particular
The objective of Supervisor protection is to deny
user. In addition, some contemporary machines pro
a user program the ability to penetrate the Supervi
vide memory protection through length-check regis
sor (which contains security control safeguards)
.ters, bounds registers, and storage locks.
without detection by the Supervisor. A user program
The characteristics of the system software deter
might attempt such a subversion for the purpose of
mine whether or not user-isolation hardware fea
manipulating supervisory information in such a way
tures are required on systems that provide the user
'as to disable security control barriers, or to pre-empt
with a file-query capability (Type I in Fig. 2), or with
the system and so deny service to other users.
full programming capability through an interpre
It is recommended that computer systems that
tive mode or in a restricted set of languages with
provide for programming via interpretation or via
checked-out compilers; (Types II and III in Fig. 2).
limited languages and checked-out compilers, and
Sometimes, the hardware features are not necessary
systems that provide extensive programming
in principle, but as a practical matter the use of
capabilities (Types II, III, and IV in Fig. 2), incorpo
'Supervisory software, or the Supervisor (also called the Ex
rate hardware techniques that have the effect of pro
ecutive or the Monitor) includes that portion of the software that viding at least two distinct operating states: the user
internally manages job flow through the computer, allocates sys state and the supervisor state (also called worker or
tem resources to jobs, controls information flows to and from files,
etc. slave, and master or privileged, respectively). Any
2
User program (or worker program) is a computer program hardware configuration is acceptable if it can create
that performs some task for a user of the system. The Supervisor one internal operating state that cannot be pene
handles scheduling of the user program into the job stream of the
system, the allocation of resources to it, control of its security
trated by·any software that a user program can exe
aspects, etc. cute.
27
In the supervisor state, the machine is able to exe ute, for example), but imposing a shorter delay (10
cute all instructions, including those which affect seconds, for instance) if he has stated that he is in a
security controls. In the user state, any instruction debug mode and this statement has been verified by
that initiates an input or output operation (such as the System Security Officer; imposing successively
a reference to a file), that attempts to modify a regis longer delays on the user as the frequency of his in
ter used to isolate users or to protect the Supervisor, fractions increases; notifying the System Security
or that attempts to suspend or modify security con Officer when a user has exceeded a certain number of
trols must not be executed. Thus, in the user state, violations.
a user program will not be able to execute certain
instructions and operations that are prohibited to it. Assurance Against Unanticipated
Entrance to the supervisor state must be hardware
Conditions
controlled. This frequently is established by pro
viding a facility to detect a special instruction, and Since it is virtually impossible to determine in
creating by hardware means an interrupt signal every situation whether a computing system is work
that returns the computing system to its supervisor ing as designed, it is obvious that a machine not
state. operating properly is not only ofdoubtful utility, but
If a user program attempts to execute a prohib also poses a grave risk to the security ofthe informa
ited instruction, the attempt must be thwarted by tion being handled by it. Thus, it is desirable to incor
immediately suspending the user program and re porate safeguards that protect the system against
turning control to the Supervisor. Furthermore, if a unanticipated conditions that might arise. As a
user program attempts to execute an undefined in minimum condition, it is mandatory that the com
struction, this too must be thwarted by immediately puter produce a known response to all possible in
suspending execution of the user program and re structions (both legal ones specifically in the ma
turning control to the Supervisor. chine repertoire, and undefined ones), together with
Comment: There are two technical points involved all possible combinations of tags or modifiers,
in this recommendation, as well as a delicate ques whether legal or not.
tion of balancing tight security control against user
service. A user program may accidentally attempt to Comment: This condition is required to prevent the
execute a prohibited instruction because the user has exploitation of undefined instruction bit patterns
made a mistake in his programming; similarly, a that might by-pass normal isolation and protection
sequence of instructions in a user program can inad mechanisms.
vertently create a "false instruction," one whose bit
Summary Comment: There are many other hard- ·
pattern is undefined in the machine,· this can give rise
ware features that are not absolutely essential for
to unpredicted results, including bypassing security
implementing security controls, but which can help
safeguards. As an aid to the Supervisor in determin
protect against certain threats or can increase the
ing which event has occurred, it would be convenient
assurance that controls are working properly and
for the hardware to generate unique interrupt signals
have not been inadvertently by-passed. For example:
for each. Conversely, a user program can deliberately
create either of these actions as part ofa penetration Program-readable status switches on the hard
attempt. ware can assure that the program is aware of the
hardware configuration in which it resides. This
From a security point of view, the safe thing is to
feature can protect against loading of the wrong
suspend execution of the user program whenever it
·software, and against some actions ofthe operator.
behaves suspiciously. However, if the user is attempt
ing to debug a program, he is likely to have errors in Key switches on all important peripheral-device
his program that will result in his suspension, and controllers can protect against accidental change
consequently interfere with his work. Possibilities for in their status or in security safeguards.
handling this conflict include imposing a time delay Program-readable hardware clocks assist in con
on the user before allowing him to continue (one min trolling and maintaining audits and recording ac
28
tions by date and time. other errors. As recommended earlier with respect
An interrupt system can give first priority to hard to hardware, language processors should provide to
ware errors, malfunctions, and undefined instruc the maximum extent possible known responses for
tion bit patterns. various error conditions.
Comment: This discussion applies only to the struc
ture of the software components. Additional safe
III. SOFTWARE guards against misuse ofthe software or malfunction
by it can be incorporated with appropriate procedural
The software of a resource-sharing system in controls. Examination of the software is really an
cludes the Supervisor, the language processors (com aspect of certification and it is conceivable that, be
pilers, assemblers, etc.), the program library, and the cause ofthe technical expertise implied, examination
utility programs (e.g., sort programs, file copying and testing ofsoftware can most efficiently be done by
programs, etc.). The design of a computer system a certifying group.
must consider all software components of the sys
tem, as well as the hardware on which the software
will run. Supervisor Program
The detailed structure of the Supervisor for are
Language Processors and Utility Routines
source-sharing computer system is a function of the
While a Supervisor ofsome sort is required on all hardware configuration and of the type of service
types of systems enumerated in Fig. 2, the broad provided by the system to its users. Because of the
range of user software capabilities inherent in sys variety of Supervisors and the fact that most re
tems of Types III and IV implies that a much more source-sharing systems are delivered by the manu
complex Supervisor is required for them. With re facturer with a Supervisor, it is difficult to specify
spect to language processors and utility programs, requirements in detail. In general, however, the soft
very little can be said that will be ofassistance in the ware design should be clean, in the sense that it is
design and development of secure resource-sharing as modular as possible. There are some aspects to
systems. In a Type III system (permitting program Supervisor design that are sufficiently important to
ming via limited languages and certified compilers) qualify as requirements.
the care and thoroughness with which the language It is recommended that Supervisors designed for
processors are examined prior to approval can limit a resource-sharing system include the following fea
the threat that a user of the system might be able to tures:
mount against the classified information it contains.
A careful analysis of all language translators, and 1. As much of the Supervisor as possible must
particularly the assumptions that have been made run in the user state (as opposed to the supervisor
regarding the execution environment of user pro state); each part of the Supervisor should have only
grams, is essential on all four types of computing as much freedom of the machine as it needs to do its
systems. job. This should provide the Supervisor more protec
Assembly languages and the processors for them tion than is given to user programs against faulty
impose a particularly difficult problem because of. programming or machine errors. Supervisor func
the manifold opportunities for the user to create tions should be separated into individual, self-con
seemingly safe instruction sequences that, in turn, tained modules with explicit communication3 be
construct executable instruction sequences designed tween modules. Each module must be fully described
to disrupt service or to by-pass security controls in
the operating system. Little more can be said about
"For example, we would discourage writing a subroutine that
language processors or utility programs except to on its own initiative reaches into another subroutine for informa
require that they be thoroughly tested by the user tion without the knowledge of the second one. We would insist
that some communication require that the first module ask infor
agency for correct operation and for detection and mation from the second, and that the exchange take place in an
rejection of incorrect sequences of instructions or information-exchange area within neither.
29
with flowcharts to assist in its security analysis. 4 tures as automatic logging out of users and access
2. The Supervisor must assure, to the extent closure to all files ofclassified information). Further
technically feasible, that no classified information more, it must be possible for system personnel, work
can remain as program-accessible residue in either ing at a control console, to pre-empt selected users or
primary or secondary storage. This includes all to deny access to a given user or terminal (e.g., if an
forms of secondary storage (magnetic drums, mag attempt to access the system with improper authori
netic discs, magnetic tapes), as well as the primary zation has been detected).
core store and all registers. One technique is to have 4. The Supervisor must have a certified capabil
the Supervisor erase any segment of primary (core) ity to control access to files. This point is so critical
storage before making that segment available to an that it is treated separately below.
other program.
Summary Comment: The detailed design of the
Comment: For systems with sufficiently small Supervisor and the protective safeguards that it con
amounts of secondary storage, the requirement to tains and that are afforded it are vital to adequate
erase-before-reuse will not be burdensome, but sys security control. Since commercially designed Super
tems with voluminous secondary storage will suffer visors and operating systems have not included
in terms of efficiency. A possibility for handling the securlty control, it is to be expected that the average
situation (which, however, may be costly in terms of commercial software will not provide the standards,
system efficiency) is as follows. If the user program conventions, and capabilities required. A number of
requires some temporary secondary storage, the potential design guidelines are suggested here.
Supervisor can keep track ofhow much of the store is
assigned, and also of how much information ha8 ac The Multics time-sharing software 5 utilizes the con
tually been transferred into secondary storage. Subse cept ofconcentric circles ofprotection. The most sensi
quent read-out of such information by the user pro tive part of the Supervisor (sensitive in the sense that
gram will be restricted by the Supervisor to only that penetration of it will open the machine completely to
volume that has been written. This procedure can be the user) is conceptually at the innermost circle. Sur
applied to so-called scratch tapes or disc space. It rounding it in successive rings are decreasingly sensi
should be noted, however, that tapes, drums, or discs tive parts of the Supervisor. A user program seeking
controlled in this fashion must be classified and pro access to some portion of the Supervisor must specifi
tected appropriately for the highest level ofclassifica cally thread its way through the concentric rings un
tion of the information written on them until erased til it reaches the desired portion. Thus, there is no
by an acceptable method. Any arrangement that gua direct route from a user program to, for example, the
rantees that a user program cannot read secondary file-access control mechanism.
storage beyond material that it wrote originally In the case where the Supervisor is responsible for
avoids unnecessary erasure ofsecondary storage, and data segregation, it must check the authority of ter
also unnecessary computer-erasure of the informa minals that originate traffic, must properly label (in
tion. This issue is one which requires attention in ternally) all traffic, must label all tasks whose execu- .
future machine designs; features such as bulk-eras tion is required in order to service a user request, must
ure ofmagnetic discs will be valuable in maintaining keep track of all tasks and of the programs that exe
system efficiency. cute them, must validate the security markings (in
cluding security flags) on all tasks and control access
3. The Supervisor must have provision for bring to files on the basis of the markings, and must vali
[ng the computing system into operational status in date (by reference to internal tables or files) the au
m orderly manner. There also must be provision for
>rderly shutdown of the system (including such fea
•v. A. Vyssotsky, F. J. Corbato, and R. M. Graham, "Structure
of the Multics Supervisor," AFIPS Conference Proceedings, Vol.
27, Part 1, Spartan Books, Washington, D.C., 1965, pp. 203-212;
4
For an example of this type of design and the level of docu also R. M. Graham, "Protection in an Information Processing
mentation required, see the software maintenance documenta Utility," Communications oftheACM, Vol.ll, No.5, May 1968,
tion for the GE 625/35 GECOS III time-sharing system. pp. 365-369.
30
thority ofa remote location to receive output informa IV. ACCESS CONTROL
tion with a given security marking or flag. THROUGHOUT THE SYSTEM
The system programs that collectively form the
Supervisor must not be allowed to execute with com In a resource-sharing computer system, access to
plete freedom of the machine. Ideally, such system the system itself and access to the information (files
programs should execute only in the system's user and programs) contained in the system must be sepa
state; otherwise, these programs should execute with rately controlled. Iftheresource-sharing system is a
as many restrir.tions as possible. Only the minimum multiprogrammed computer operating with only lo
number ofsystem programs should be allowed to exe cal (as opposed to remote) access, operations person
cute without any restriction. Relaxation of this nel can visually ·identify an individual before grant~
philosophy in order to facilitate execution ofa system ing him access to the system. Furthermore, the oper
program can lead to a serious weakness in security. ations people can perform whatever verification pro
cedure is necessary before releasing particular files
An essential aspect of access control is the security
or programs to that user. Alternatively, if such user
flag that identifies the classification level of the pro
information as authentication words or access proto
gram, the data, the terminal, and the user. The basic
cols must be protected when in punchcard form, an
philosophy ofa program executing in the user state is
arrangement can be made to have the card deck read
that it is able to process anything that it has availa
under the visual surveillance of its owner, and im
ble within the region of core memory (or logical ad
mediately returned to him. For remote batch and
dress space) assigned to it. Thus, satisfactory security
resource-sharing computer systems, such functions
control depends upon careful monitoring and control
must be performed by security-controlling mech
of what a user program brings within its memory
anisms in the system software and hardware.
region (physical or logical). Specifically, it must not
be allowed to bring security flags into its region. Ifan
unusual program has the privilege of writing outside User Access
its core region, it can in principle modify security
flags. Obviously, such programs must be carefully de In a terminal-oriented system, a user must an
signed and must be faultless. nounce himself to the system through a log-on pro
cedure that requires standard identification and ac
Since system programs are very sensitive with respect counting information, and a specific user authentica
to security controls, they must be carefully debugged tion step so that the computer system can verify the
before becoming resident in the permanent program identity of the individual at the terminal. For sys
library. Those of particularly high sensitivity, such tems that have point-to-point permanent and pro
as routines for controlling access to classified files, tected communication links, physical control of ac
must be given extraordinary attention during the cess to a terminal may be used in lieu of authentica
debugging phase. tion. In this case, responsibility for authentication is
It is desirable that system programs which have transferred to the administrative jurisdiction which
unusually broad capabilities (such as being able to has cognizance over the terminal. For systems that
access all permanent files in secondary storage or in utilize dial-up communication links, or in which ·
temporary working stores) be programmed so as to physical access control is undesirable, a password
print console messages notifying the System Opera scheme or its equivalent must be used to provide
tors of the specific privileges being extended; before authentication.
proceeding to implement such privileges, the system Authentication words or techniques must be clas
should require explicit permission. All such events sified and protected by the user in accordance with
should be logged automatically, together with the the highest level of information to which it permits
operator's response and, when deemed necessary, the him access. Authentication words or techniques
concurrence of the System Security Officer. This re must be obtained from an approved source, or, alter
striction is a double check to prevent unauthorized natively, must be generated and distributed under
execution of broad-capability programs with mali the cognizance of the System Security Officer by ap
cious intent. proved techniques. Specifically, a user cannot gener
31
ate his own passwords. Depending on the sensitivity of the total security structure with which his system
ofinformation or operating conditions (circuit noise, must deal, as well as a means for inserting security
interruptions, etc.) contained within a system, a user parameters into the system.
may be required to reauthenticate himself from time In addition to the security reasons for controlling
to time during a single terminal session. Authentica access to files, it is necessary also to control access so
tion words must be changed as frequently as pre that unauthorized changes cannot be made, particu
scribed by the approved issuing source. larly ifthe file management responsibility is assigned
Provided that techniques approved by the appro exclusively to some individual or group-e.g., the
priate cognizant agency are used, the resource-shar Office of Primary Responsibility. For example, even
ing system can itselfbe utilized to generate authenti though a given user might qualify for access to a
cation words, provided the output is available only at particular file in terms ofproper clearance and need-·
a designated terminal and that the procedure is car to-know, he might be granted access to read it but
ried out under the cognizance ofthe System Security denied the right to change the file because this privi
Officer. lege is reserved to a designated file manager. Thus, in
The Supervisor software must be so constructed part, security control and file integrity overlap. Both
that user identification and authentication word features are essential, and common software can con
lists can be maintained as part of the normal opera veniently accommodate both. 6
tion of the system from the terminal designated for
the System Security Officer who has sole responsibil
ity for such lists. Denial of Access
A user must not be able to acquire information
Information Access about the security controls or the files when access
The fact that a user is granted access to a system is denied him for any reason. Assuming inadvert
does not imply authorization to access classified files ence on the part ofthe user, the system should assist
of data and programs contained in that system. For him in identifying his mistakes or procedural errors.
example, he may be authorized to perform only on However, the system logs should record all unsuc
line computation, but not on-line file processing. cessful attempts to access classified files.
Before a user is given access to a classified file, the Comment: The point of this prohibition is to guard
user's clearance level, need-to-know, and access against acquiring incidental information by brow
privileges must be checked against the access res sing. Thus, an improper access request must result in
trictions of that file. If information from this file is some innocuous reply, such as, "File not found. "
to be delivered to the user's terminal or to a terminal However, the restriction that the system not reveal
designated by him, the status of the designated ter the existence of a file creates a potentially awkward
minal must also be verified. To do this, the computer situation because the user might inadvertently create
system must have an internal catalog of user clear a file (perhaps public and unclassified) with the same
ance levels and access privileges, as well as a catalog name as one whose existence is unknown to him.
of the characteristics of all terminals connected to Since different files of the same name are unaccepta
the system. Each file must be marked with any clear ble in a system, the system must (1) inform the user
ance, need-to-know, or other restrictions on its use. that his proposed name is unacceptable (without giv
Finally, there must be an explicit and separate capa ing a reason), (2) prefix all file names with a user
bility to update such an internal catalog. If the re unique code to guarantee dissimilarity of names, or
sponsibility for maintaining this catalog is divided (3) use some pseudo-random process to automatically
among several people, each must be restricted to generate file names.
only that part of it for which he is responsible.
Comment: The Appendix describes a system for im
plementing a file-access control mechanism. It also "For example, seeR. C. Daley and P. G. Neumann, "A Gener
al-Purpose File System for Secondary Storage," AFIPS Confer
discusses a scheme whereby the System Security ence Proceedings, Vol. 27, Part 1, Spartan Books, Washington,
Officer can describe to the computing system that part D.C., 1965, pp. 213-229.
32
33
Clearance Classification
Figure 4
34
remote input information only from the terminal file data, input, and output. The question of which
that originates the job and, correspondingly, to out jobs a user can run in each possible circumstance can
put information only at that terminal. If operational become very complex. Unfortunately, the Supervi
requirements dictate otherwise, the Supervisor must sor will have to determine user privileges algorith
be so designed that it can identify and authenticate mical_ly; it cannot exert judgment. Thus, the issue
terminals and users other than the originating one must be examined carefully in each operational en
and with which information will be exchanged. vironment, with appropriate rules formulated to
match user needs and security restrictions of the
installation.
Job Security Interaction
Comment: A program might be intrinsically clas
As a user's job actually runs in the computer,. it sified because it implements classified algorithms,
will carry a security flag that initially is determined and, thus, its claSsification establishes a lower bound
from the security flags of the user and of the termi when it runs as part of a job. On the other hand, a
nal from which he works unless the user specifically classified program might access data more highly
designates otherwise at the beginning ofthe job. In classified, and, hence, the job classification can ex
either case, as the job unfolds, the security flag may ceed that of the program that is executing.
have to be modified automatically by the system to
reflect the security flags offiles ofinformation or files Multilevel Utilization
of other programs that are used. The job flag need
not be limited by the terminal flag. For example, an It is possible to demonstrate that many resource
individual cleared for Top Secret might run an en sharing computer systems may be safe from direct
tirely Top Secret job through a Secret terminal if user 'attacks from terminals by proving that a par
there is to be no Top Secret input or output through ticular hardware/software component is effective in
the terminal; the output, for example, might be di blocking attacks of various kinds. However, there is
rected to a Top Secret printer. A situation such as the recurring question of the risk ofinadvertent dis
this might be common for remotely initiated batch closure of classified information through software,
operations, and no deception is indicated since the hardware, or a combination of failures; in such a
user is cleared for the job even though his terminal case; it would be necessary to prove that a single
is not. The basic point is that the security flag of the failure or a combination of failures cannot occur.
user is the absolute limit on his access privileges, Since a complete proofofprotection is not within the
unless the program in question has been certified to present state of the art, particularly for existing
have access to higher security flags but to produce computer systems, it is recommended that the sys
information that does not exceed the flag ofthe user. tem designer estimate the probability of occurrence
The access control limitation just outlined can be ofa single failure or the combination offailures that
represented as shown in Fig. 4. It is read: user (de could result in a disclosure of classified information.
vice) flag should be greater than or equal to ( > ) the Based on this information, the Responsible Au
input (job, output) flag. thority can determine whether the risk probability
It may prove too difficult in a specific case to cer is acceptable or not. If the decision is that the risk is
tify that a program can access highly classified infor too great, a segregated mode of operation should be
mation but produce results of a lower level. If so, it used, and the system certification made accordingly.
is strongly recommended that a user's job never be A system functioning in a segregated mode re
allowed to access information-either data or pro quires that all users are cleared to a specified level,
grams-whose security flag exceeds that of the user. all terminals are physically protected to that level,
Since parts of the Supervisor will run in the user and all communication lines are secure to that level.
state as a user program, access in such a case to If, within any level of classification, special caveat
accounting and control files must be excluded from information is introduced, a new determination
the restriction. must be made as to whether the risk and conse
In principle, the following items can each carry a quences of exposure of the special caveat informa
security flag: user, terminal, job program, job data, tion to cleared but not authorized persons operating
35
Top Secret
• • • •
Secret
• • •
Confidential
• •
Uncleared
•
• -Access authorized.
•"" -Access may or may not be authorized, depending on the relation
of the Special Category to the given national classification.
Figure .5
36
within the system warrants segregated operation of formation about the specific classification
the entire system at the special caveat level. If the status ofthe new mode. A change in the mode
classification level at which the system is certified to of operation must be accomplished by recess
function hierarchically subsumes other levels of ing or logging off, as appropriate, all active
classification, then authorized users of the system users and forcing a new log-on procedure, in
may execute programs ofsuch lower levels ofclassifi cluding authentication, for the new level.
cation. However, if the scheduled mode for the sys A change in the operational status of the sys
tem establishes a level of classification which is tem will obviously inconvenience users. While
mutually exclusive of other levels, the users are re some will be required to terminate their work
stricted to programs classified at the current mode of completely; all will be required to momen
the system. Fig. 5 illustrates these relations. tarily suspend operation until the change in
The concept of segregated operational modes re status and the new log-on have been accom
quires that users of various clearance levels be sche plished. To the maximum extent possible, the
duled separately. In addition, special controls are procedures for changing the status of the ma
needed to assure that highly classified or caveated chine should be designed with user conven
material does not become accessible when a lower ience in mind.
level classification or differently caveated mode be (d) Since the operational clearance status of the
gins operation. The precise procedures and mech system can change in a segregated style of
anisms necessary to change the operational status of operation, any user who is granted access to
a system must be tailored to the precise hardware/ the system must be informed by the system of
software configuration. The following steps are rep its current status.
resentative of the procedures necessary to maintain (e) When initiating a new operational mode, ter
segregation when system status changes. minals in work areas not cleared to receive
the information at the forthcoming level of
(a) When file information is permanently resi operation must be disconnected from com
dent in the system (e.g., on disc files or mass munication links with the computer (by cer
storage devices), the information must be pro tified electronic switching, unplugging, or
tected by disconnecting such devices (by cer manual operation of switches).
tified electronic switching, unplugging cables, (f) When initiating a new operational mode, any
or manual operation ofswitches) ifthe classifi special software relevant to the new mode
cation or special-access categories of the file must replace that of the previous mode.
information are such that the file must not (g) In the event of a failure in the Supervisor
become accessible to unauthorized users un software or in the hardware resulting in an
der any circumstances. operational malfunction, the system must be
(b) Before a file device is made available to users restarted at the appropriate clearance level
with more restricted access privileges than by an approved restart procedure as a part of
those who have been using it, it must be sanit returning it to operational status in the same
ized (and checked) by approved procedures of mode. 8 Depending upon the nature ofthe mal
any classified information more highly clas function, it may be necessary to verify the
sified or restricted in access than appropriate security flags of on-line data files in order to
to the new mode of operation. assure that the malfunction did not affect
(c) Each user must be notified of any change in them.
the operational status of the system, whether
The recommendations above indicate in a gen
scheduled or not. This notification should be
eral way what is required; additional issues, such as
transmitted prior to the change to all active
the following, must be considered.
terminals that will be able to access the sys
tem in its new mode of operation. However, a
(a) Indicator lights visible to the operator may be
terminal not authorized to access the system
in the new mode should not be given any in "See Part D.
37
\.....VI'~riUI:l'l IIAL
needed so that the status of on-line file media protected in accordance with Government-approved
is readily discernible. communication security methods. They may include
(b) The disabling of read heads of magnetic disc provision of approved secure cable between the ter
devices may be required. minal and the central location, or of approved cryp
(c) Appropriate key locks may be needed so that tographic equipment. Intelligent deception of the
an operator is assured that certain actions link (i.e., spoofing) must not be possible.
have been taken; the action of these locks
must be electrically reported." Emergency Communication Arrangements
(d) Checklists are helpful to assure that system
operating personnel methodically verify each There may be an operational requirement to
step of the process. maintain continuity of service to a remote user in
(e) Storage of such classified material as punch spite of communication circuit failure. If so, there
cards, printed paper, magnetic tapes, etc., must be emergency provisions and procedures for
must be provided. establishing alternate channels to remote locations,
(f) Printers or punchcard equipment must be sa and such actions must be accomplished by properly
nitized by running out blank paper or blank cleared and authorized individuals, in accordance
cards; ribbons must be changed or protected. with established operating procedures for secure
(g) Positive control procedures should be used to communications.
assure that magnetic tapes or magnetic disc
packs containing classified information ofone
level. of classification or special category are
High-Risk Areas
not accidentally used at some other inappro If the resource-sharing computer system operates
priate level.
in an environment wherein there is a reasonable
(h) There must be detailed instructions to the probability ofone or more terminals being captured,
system operating personnel for each mode, then it is essential to employ the technique ofcrypto
relative to such things as console actions, on graphic isolation (i.e., use of a unique key for each
line file status, memory-clear procedures, terminal). In the event of capture, this confines the
mode shut down, mode initiation, message in operational and information loss to the captured ter
sertion via the console typewriter, etc.
minal, and prevents the captor from intruding on
(i) There must be continuous surveillance ofthe
other communication links in the system and inter
operations area by fully cleared personnel.
cepting classified information intended for other ter
It is not possible to consider explicitly all the minals.
changes that must take place in a computer system
for a change in operational clearance level. In gen
eral, the recommendations given parallel practices VI. TERMINALS
common in existing security doctrine. At a particu
lar installation, the System Security Officer will be
aware ofthe levels ofclassification and special access
Terminal Protection
categories in his system, and must be able to formu Any terminal through which a user can gain ac
late the detailed procedures for shifting the opera cess to classified information in the central comput
tional mode of the system from one to another. ing facility must be physically protected in accord
ance with the highest classification of information
processed through the terminal. Furthermore, if
V. COMMUNICATION LINES protection requirements are specified for any crypto
graphic equipment collocated with the terminal, the
Any communication line that passes classified in physical protection must be in accordance with the
formation between a terminal and the central com protection requirements specified for that crypto
puter facility or between computer systems must be graphic equipment. In addition, if the system is
38
closed, the protection must be consistent with that sifted information. It is almost impossible to identify
specified for the overall system. and protect against all possible failure modes of a
To guard against the covert emplacement of ille system.
gal intelligence sensors or recorders, terminal Design certification is the process of measuring,
maintenance personnel must be cleared for the high testing, and evaluating the probable effectiveness
est level of classified information handled at the ter under operating conditions of the security control
minal, or the terminal maintenance must be per features of a stable system-i.e., one whose software
formed under. surveillance of an appropriately and hardware have been completed. In order to
cleared and technically knowledgeable person. make the measuring process meaningful, the
security protection designed into a system must be
Terminal Identification quantified to the maximum extent possible. It is
stropgly recommended that design certification be
Because present security doctrine depends performed by a group other than that responsible for
heavily upon identification, it is necessary that a the design, construction, or maintenance of an oper
remote-access, resource-sharing system require posi ational system. A suggested procedure is given be
tive identification of each terminal with which it ·low:
communicates, and that the system be able to inter
rogate a terminal for its identification at any time. (a) Identify all hardware elements (such as regis
ters, base address registers, counters, etc.)
Comment: Terminal identification is particularly
that provide or are depended upon for direct
important when a computing system is being brought
operation of a security control function. Iden
into operational status initially, or when it is being
tify all system software features, barriers, and.
recertified as a secure configuration. This recommen
components that have a security control func
dation also applies to all remote equipment, such as
tion. For each of these determine:
other computers.
(1) Its logic;
If remote terminals are connected into the central (2) Hardware failures that will cause incor
processor via a dial-up connection rather than perma rect operation and any inherent checks
nent hard wire, this requirement for terminal iden that are intended to detect such failures
tification may require a separate authentication e.g., a parity .check on register-to-register
method despite the use ofcryptographic equipment on transfer;
the circuit. This recommendation will also apply to (3) The probability of failure of the hard
the situation in which a user at a terminal connected ware upon which a security control de
to one system wishes to access a second system. In pends;
some systems it may be permissible for the user to (4) Possible software checks on the consist
authenticate himself to his own system, which then ency of its operations and the accuracy of
passes the authentication to the second system via parameters, addresses, etc., used by the
their mutually authenticated and protected com function;
munication link. In other cases, a unique arrange (5) Combinations of data (parameters, ta
ment may be necessary to enter the second system. bles, etc.) that will result in incorrect op
eration;
(6) Its dependence on other functions for its
VII. CERTIFICATION own operation;
(7) The probable effect of its failure;
Certifying that a resource-sharing computer sys (8) Specific tests-either software or elec
tem is secure represents a very difficult issue. It in tronic-that can be made to determine
volves an examination ofthe safeguards-hardware, if the function really works as specified.
software, procedural, administrative-that have (b) Based on the determination of these factors
been provided, and, ideally, a quantitative estimate and test results, make an overall estimate of
of the probability of inadvertent disclosure of clas the probability offailure ofthe total function.
39
r{)"IJ:Jnl=t\.ITI A I
(c) Based on the probability of failure of each (e) Loss of an operator console may require that
security function, estimate the overall proba the associated computer must be shut off if it
bility of a system security failure that would cannot be properly controlled, or if alternate
result in a compromise of classified informa locations for operator control are not availa
tion or an illegal entry into the system. ble.
The matter of overall equipment configuration At the time of installation certification, the ad
becomes especially important in large systems con ministrative and procedural environment in which
taining many computers, either collocated or geo the system is to function must be examined to verify
graphically distributed. The overall hardware confi that it supports the controls present in the hard
guration must be examined in order to establish the ware/software complex, and that it provides the ad
consequences to the security controls of a total or ditional controls on the people, paper, magnetic
partial loss of a major component in the system. For tapes, etc., of the system, Also at installation certifi
example, if the controller for a group of magnetic cation, the communications arrangement must be
discs were to fail, it is necessary to determine verified to be secure, the level of spurious emana
whether a crucial segment of the software would be tions must be demonstrated to be acceptable, physi
made unavailable for security. control. Whenever cal protection must be shown to be adequate, and all
possible, security controls should be designed so that controls over remote equipment (physical, person
failure of a portion of the system does not invalidate nel, emanation) must be verified.
or weaken the controls in the balance of the system Complete certification should be performed
remaining operational. Conversely, the design before changing a closed system into an open system
should permit rapid and simple physical disconnec even though it may be operated in a segregated
tion of an inoperative portion of the system. Follow mode, as previously described, when processing
ing are some other points that should be considered. highly sensitive information. After a system has
been certified, all changes to the system must be
(a) If the failed component (such as a magnetic similarly examined before being incorporated. Such
drum, a section of core, or a second computer) an examination is required whether the changes
contains information required for security originate with the user-agency or with either the
control and not available elsewhere in the sys hardware or software vendors.
tem, the entire system must shut down or op After the general reliability of a system has been
erate in a degraded mode. The decision should established by operating successfully for a reasona
be made jointly by the System Security Officer ble length of time, a limited recertification process
and the System Administrator. should be performed at appropriate intervals, con
(b) The loss ofsome components may so seriously sisting only of tests and inspections intended to re
affect the operational performance and ac veal changes surreptitiously made in the system, or
curacy of the remainder of the system that it to detect inadvertent changes made in the system
should be shut down for that reason, even during maintenance, or to validate the continuing
though significant security controls continue performance of system security controls.
to function.
(c) Loss of communciation between elements of
the system may force it to be shut down ifdata Audit Trails
critical to security control in the system can
not be transferred. The audit-trail technique can be used to verify
(d) If the Supervisor software is designed to that a system is operating correctly and, more im
monitor the operating status of each remote portantly, that it is being used properly. For pur
station before sending information to it, the poses of monitoring security controls, it is recom
loss of a remote station is not a security mended that the system contain software that au
threat, although such incidents must be re tomatically records (with date and time) at least the
ported to the System Security Officer. following:
40
(aJ All user log-ons and log-offs, including each gram, and the system reaction. In general, the log
user's name, identification, and terminal; should be complete enough to permit the System
(b) All maintenance log-ons and log-offs for Security Officer to monitor system performance on a
whatever purpose, including the names of real-time or periodic basis, as needed. The data col
maintenance personnel, the nature of the lected by the system log can also be aggregated at
maintenance, and any files accessed; intervals to provide performance statistics that indi
(cJ All operator-initiated functions, including cate the efficacy of existing security safeguards, and
his name and the function (from the point of to develop new or improved procedures and controls.
view of the logs, the operator should be
Comment: If a system contains unusually sensitive
treated as a user);
information or must operate in an unusually hostile
(dJ Each attempt by a user or his program to ac
environment, more extensive automatic logging of
cess files or programs for which he is not au
system activity may be desirable. Furthermore, in
thorized, including his name, terminal, and
some cases the presence of special machine instruc
an identification of his program;
tions whose execution might modify or by-pass
(e) All program-abort incidents, including the
security controls, or the existence ofan unusual confi
name of the program, the user, terminal, and
guration, etc., might require logging of additional
time of abort;
activity-e.g., any use ofa diagnostic instruction that
(f) Any special usage of the system-e.g., gener
can lead to subsequent errors because of change-of
ation of passwords, changing of the classifica
mode in the machine.
tion, or modifying security parameters; a re
cord of the type of transaction, including the
authority or person under whose cognizance Supplementary manual logs kept by the opera
the usage is conducted, and the terminal used; tors to record such events as the following may be
(g) Groups of output operations that the system useful.
performs at the request of a user, including
those which he directs to be sent to a terminal (a) Machine faults, failures of internal checks,
other than the one from which the request power losses, environmental malfunctions;
was made; including identification of the file (b) Restarts of the system, including details of
accessed and a measure of the amount of in the loading of system software and by whom,
formation read out from the file, and the re checking or verification of files, manual oper
questing and receiving terminals. Similar in ations taken, etc.;
formation should be logged for all input oper (c) All changes to the Supervisor, the program
ations that create or destroy files or instruc library, or any system files made by way ofthe
tions, or that change file classifications or operator console;
security parameters. (d) Each running of unusually privileged system
programs and by whom;
To the extent deemed necessary by the System (e) Each instance of hardware or software
Security Officer, the log records must contain suffi maintenance, by whom, and for what purpose.
cient detail to permit reconstruction of events that
indicate an unsuccessful attempt to penetrate the Comment: A system will also log much information
system or that clearly resulted in a compromise of for purposes of accounting for resources assigned to
information or a security violation. For example, re users, for scheduling events and users in the system,
peated unsuccessful attempts to gain access to the for allocating charges to users and to accounts, etc.
system software or to a file should be promptly re Such information may also be useful for monitoring
ported by the Supervisor software in order to alert the security controls. Since a large volume of infor
system operations personnel and, if necessary, the mation will be available through the various logs, it
System Security Officer. The audit trails should ena is clear that special data reduction programs, event
ble security investigation personnel to identify the correlation programs, and data-summary programs
terminal involved, the user, the target file or pro will be required by the System Security Officer.
41
42
tered by other controls. A possible benefit ofinternal and solutions to it must be based on a system point
encryption may be that it reduces the scope of sys ofview. A number of problems covered in the preced
tem certification to more manageable proportions. A ing discussions are brought together here briefly be
possible drawback is the possibility of a malfunction cause of their importance to the system as a whole.
in the encryption device permanently "freezing" the
information in an encrypted, impenetrable state.
Internal encryption could be applied not only to
Redundancy
the primary magnetic core storage, but also to sec Given the present state of computer hardware
ondary file stor~ge. All programs and all data resi and software technology, we can expect that even
dant in core storage could be in encrypted form and the best designed systems will have relatively fre
decrypted only as they pass from storage to the proc quent malfunctions. While system designers can be
essing unit for execution. As information is returned very ingenious in attempting to arrange safeguards
from the processing unit to storage, it would be re so that malfunctions do not result in serious conse
encrypted. Incorporation of this technique into a sys quences, nonetheless, given the present lack of ex
tem would protect against unauthorized access to perience with computer systems that contain
data resident in primary storage. In addition, infor security safeguards, it is strongly recommended that
mation in secondary storage could be protected by an redundancy be incorporated throughout the system
encrypting mechanism connected directly to the en safeguards. Redundancy might take such forms as
crypted primary storage in such a way that informa duplicate software residing in different parts of the
tion could be transferred from primary to secondary memory; software checks that verify hardware
storage without an intermediate plain-text stage oc checks, and vice versa; self-checking hardware ar
curring. The purpose of securing secondary storage rangements; error-detecting or error-correcting in
in this fashion is to protect against physical access to formation representations; duplication of procedu
storage devices. On the other hand, encryption of ral checks; error-correcting internal catalogs and
secondary storage greatly complicatesthe file man security flags; or audit processes that monitor the
agement problem. performance of both software and hardware func
tions.
A particular point to note is that the absence of
IX. RESEARCH NEEDED a parity check in the memory or in information
In addition to continuing research into internal transfers can permit errors which perturb, disable,
encryption devices, as mentioned above, other re or mislead security controls. In the absence of parity
search requirements include special hardware confi checks throughout the machine configuration,
gurations to maintain absolute segregation between equivalent error-detecting procedures must be incor
uncleared and other users, special software for such porated into the software.
configurations, automatic recertification procedures
to be used by the system itselfbetween configuration Certification·
changes, comprehensive automatic monitors (hard
ware and software) for security controls, more relia As system designers and system operators ac
ble self-checking hardware architectures, me quire insight into the behavior of resource-sharing
thodology for identifying failure modes and accurate configurations, new and revised certification tests
prediction of failure probabilities, and new machine will have to be developed to check one or another
architectures whose security controls minimally aspect of system behavior. Certification is a continu
affect the efficiency or cost of the system. ing process. It is the experience ofdesigners ofmulti
access, resource-sharing systems that even with the
best and most ingenious designs, users of a system
X. OVERALL SYSTEM PROBLEMS find ways of chaining together actions that were not
foreseen by the designers and which, in many cases,
Security control in a computer system, especially lead to undesirable or disastrous consequences.
a resource-sharing one, is a system-design problem, Therefore, in order to establish confidence in the
43
security controls, the certification procedure must the Supervisor tend to be subtle and not immedi
include a phase that deliberately attempts to pene ately detectable; as a general principle, it is desirable
trate our best designs, and that is conducted by tech to design the Supervisor so that faults result in gross
nically competent individuals not part of the design misbehavior, thus facilitating detection. However, in
group or of the operating agency, and not adminis practice, this principle is difficult to apply because of
tratively responsible to either. the complexity of the Supervisor software and be
cause only after-the-fact operational experience will
Debugging and Testing indicate the general manner in which a given soft
ware design faults.
During debugging of a new program or testing of
a program with new data, the likelihood of an error Cross-checking
is much greater. It is inappropriate to levy security
violations against a user for security errors occur Where possible, security controls should be de
ring during a debugging phase; but it is dangerous to signed to cross-check each other; e.g., operator input
risk having an agent conceal his activities as debug actions should be recorded automatically in the log,
ging errors. Possibilities for dealing with the prob which is transmitted to the System Security Officer,
lem include: requiring the user to state his intention thus minimizing the opportunity for an operator to
to be in a debugging mode and to have this fact noted take any undetected hostile action. Also, to the max
(and possibly authenticated to the system) by the imum extent possible, checks between security con- -
System Security Officer; requiring all debugging to trois should cross system components; e.g., manual
operate through a certified interpreter; requiring all actions should be checked by equipment records,
debugging of programs to operate on dummy and software checks of hardware should not depend on
unclassified data; reflecting all errors and violations the hardware being checked.
of security control back to the user with an enforced
delay before he can resume work.
Gradation
44
• The manner in which user debugging and ways to get around, ignore, or subvert controls.
testing of programs is handled;
• The periodicity and completeness of the in Centralization of Vulnerability
ternal self-testing program;
• The frequency with which users must au Care must be exercised not to create inadvert
thenticate themselves; ently a system weakness by centralizing too much
• The amount of redundancy in the security responsibility in one individual. For example, the
controls; System Security Officer oversees all the protective ·
• The number of events reported to the System features ofthe system, as well as controlling its oper
Security Officer for his attention; ational security status. Thus, he has broad and criti
• The depth of operational control exerted by cal powers, and becomes a potential target for subv
the System Security Officer; ersion. Appropriate administrative and procedural
• The frequency of recertification procedures; safeguards, plus division of responsibility and power
• The internal events that are reported as in the System Security Office, will be required to .
security violations; offset such a threat.
• The frequency with which authentication
words must be changed. Positive Alarms
45
Part D
In addition to overall policy guidance and to tech fresh, certified copy of the Supervisor software, for
nical methods, there must be an effective set ofman verification of its correct loading, for validation of
agement and administrative controls and proce system security checks, for inserting relevant
dures governing the flow ofinformation to and from security parameters, and for certification of system
the computer system and over the movement and security status by the System Security Officer.
actions within the system environment ofpeople and Scheduled shutdown. The procedures for a
movable components (e.g., demountable magnetic scheduled shutdown ofoperations must take account
tapes and discs, print-outs). An essential aspect of of proper notification of the System Security Officer,
effective control is standardization of activities and physical protection of demountable storage (tapes,
the need for standards throughout the system. Their discs) as required, orderly closing of internal files,
presence will make attempts to subvert the system validation ofthe suspension ofoperation ofall termi
much more visible and detectable. nals, demounting of all copies (or required parts) of
Comment: The importance of.standards is a subtle the Supervisor software, erasure of any parts of the
philosophical point. They are effective in many ways: Supervisor software remaining in working storage,
with rigidly prescribed procedures, operators will be verification of erasure of the Supervisor, disconnec
inhibited from taking shortcuts that can result in tion of remote communication circuits, and physical
leakage; "game players" who wish to subvert the sys securing of the power controls.
tem to their own ends will find it much more difficult Unscheduled shutdown. An unscheduled shut
in a highly standardized environment; records ofsys down must initiate procedures for immediate sur
tem performance and human activities will be avail-· veillance and recording of all indicators to help as
able so that the system can be tuned for improved certain what happened; any needed emergency ac
service; etc. tions in case of fire, water hazard, etc.; special sur
veillance or physical protection measures to guaran
The discussion below presents typical procedures tee that no demountable items are removed; immedi
that are required, and suggests some details of each. ate notification of the System Security Officer; and
For each, it is necessary to provide forms for record special security controls (for example, protecting all
ing, initiating, and controlling events; definitions printouts, including those at terminals, in accord
and documentation of procedures; checklists for aid ance with protection rules for the highest classifica
ing in the execution of procedures; training aids; tion handled in the system until the situation can be
periodic and archival summaries of activities; spe resolved).
cifications and limitations of personnel responsibili Restart after unscheduled shutdown. If a
ties; etc. trouble condition has caused the system to shut
down, it is necessary that there be procedures to
Operational start-up. Procedures must be es handle restart, including the loading of a new, cer
tablished for putting a resource-sharing system into tified copy of the Supervisor software, clearing the
operation, and must include provisions for loading a internal state of the equipment in order to clean up
46
memory untidiness resulting from the shutdown, rigid control and protection of certified copies of the
verifying correct loading of the Supervisor, validat Supervisor and other software bearing on system
ing security controls and security parameters, and security or threat to the system, for loading the
certifying the system security status by the System Supervisor, for making changes to it, and for verify
Security Officer. ing the changes.
File control. File control procedures include Maintenance. All maintenance to be per
those for identifying the cognizant agency of each formed on hardware or software must be covered by
file, scheduling changes for files, modifying access appropriate procedures, including measures for sur
restrictions of files, giving operators access to de veillance of maintenance personnel by properly
mountable files, moving files into and out ofthe com cleared personnel, for verifying with the System Ad
puting area, pre-operator handling offiles (including ministrator any iidjustments made to the system's
mounting and demounting of tapes and discs), and configuration, and for manually logging all changes
sanitization of files. and adjustments made or errors discovered.
Control of magnetic tapes and discs. These Certification. Certification procedures should
procedures must account for and control the circula embrace various personnel responsibilities, tests
tion and storage of tapes and discs; their use, reuse, and inspections to be performed and their conduct,
and sanitization; and their classification markings the responsibilities of the System Security Officer,
and entrance to and release from the area. etc.
Control of paper-based media. Procedures for User aids. The production, distribution, and
punchcards, forms, papertape, and printouts must document control of manuals, guides, job procedure
cover their accountability, classification marking, write-ups, etc., must be covered by appropriate
storage, and entrance to and release from the area. procedures; there must be approved ways ofconduct
·Additionally, manuals, guides, and various system ing personnel training.
documents must be covered. Change of mode. These procedures include the
Personnel control. Personnel control proce provision of checklists for actions requiredin chang
dures include measures for verifying clearances and ing mode, removal and storage of paper media and
.special-access authorization for personnel ent~y to demountable files, physical and electronic surveil
each area of the system, visual surveillance of oper~ lance of the machine area, purging of printers by
ating and maintenance areas, and logging and es running out the paper, purging ofpunchcard equip
corting of uncleared visitors. The reporting ofsuspi ment by running out cards, removal or erasure of
cious behavior and security infractions is included Supervisor software from the previous mode and
among the personnel control procedures. proper verification thereof, loading ofthe Supervisor
Terminal control. Various procedures are re for the new mode and proper verification thereof,
quired with respect to the operation of remote termi clearing of all storage devices so that residual infor
nals. These include provisions for logging user entry mation from the previous mode does not carry for
to the terminal area, removal of hardcopy, proper ward, removal of print ribbons from printers and
marking of hardcopy not marked by the system, terminal typewriters for storage or destruction,
clearing of displays, and securing as required during mounting of files for the new mode, and certification
orderly shutdown. of the security status of the new mode.
Security parameter control. Procedures must Assurance of security control. Security control
be provided for authorizing security parameters to assurance includes procedures for reporting anoma
be entered into the system; for verifying correct en lous behavior of the system or security infractions;
try; for changing them on the basis of shift, day of for monitoring security controls, including those on
the week, etc.; for receiving and processing requests communications; for assuring continuity of security
to modify them; and for actions to be taken in case control; for devolution of responsibility in case of
of a system emergency or an external crisis. personnel nonavailability; and for auditing user and
Software control. These include procedures for system behavior.
47
Appendix
48
• For each file, a list of certain access parame cess) only to the Secret level. This is regarded
ters relevant to the information contained in as an illegal use ofthe clearance control struc
that file; ture. For the purposes of the computer re
• For each terminal connected to the system, a cords, an individual granted (say) a national
list of certain parameters relevant to it. Top Secret clearance and access to informa
The details ofthese parameters and how they are tion of Type A is automatically assumed to be
used are developed below. cleared for all Type A information through
Certain assumptions and definitions have been the Top Secret level; this does not imply, how
made for the purposes of this discussion: ever, that he is automatically authorized ac
cess to all levels ofType A information. Thus,
(a) The System Security Officer must be aware of it can be said that a national clearance factors
the structure of that portion of the total or distributes over all special information
security system that is ofconcern to his instal types. The phrase Type A can refer to a special
lation. clearance system, a compartment or special
(b) Access authorizations must be verified by ex grouping that may be within a special clear
plicit reference to a name check, organization ance system, or any major or minor segment
check, other check, or combination of checks, of any clearance system that may have to be
etc., as may be required by security proce specified.
dures. This is in addition to verification of the
clearance status of the user requesting access Comment: The above-mentioned special situation
to a given file. was ruled out for two reasons. First, discussion with
(c) A clearance 1 status must be associated with several security officers indicated that it is, in fact, a
both a user and a terminal; a classification 1 misuse ofthe security system. Second, the inclusion of
status must be associated with a file of infor this case would introduce a logical inconsistency in
mation. the security control processing described herein,
(d) The word accesses, when used below as part of thereby making it possible to circumvent the system.
the security structure language, is defined to While this could be corrected, the cost, in terms of
be semantically equivalent to permits access computer processing, would be prohibitively high,
and the first reason makes it unnecessary.
to information labelled as.
(e) The phrase national clearances is taken to
(g) As a consequence of the above, the computer
mean the normal defense clearances of Top algorithm which matches the parameters of
Secret, Secret, Confidential, and Uncleared, the user against the parameters of the file to
which are hierarchical in that order. The na
be accessed will first compare the user's na
tional clearance status ofan individual will be tional clearance and the file's national classifi
taken as the major parameter in controlling cation. If a user is to be granted access to a
his access to classified information. given file, then his national clearance level
(f) If an individual is authorized to have access
must equal or exceed the national classifica
to information of Type A at one or more na
tion level of the file. Note that this is a neces
tional clearance levels, then it is assumed that
sary but not sufficient condition for access.
he is (in principle) granted access to Type A
Additional controls, such as code words, spe
information up through the level of his na
cial access categories or compartments, etc.,
tional clear~nce. This is intended to rule out
will be regarded as controlling access to spe
the following case, which we believe is com
cific information types within the framework
mon in present manual practice. An in
of the national clearance structure.
dividual with a national clearance of Top Se
(h) A dissemination label is regarded as an addi
cret is authorized access to (say) crypto tional means of access control, and will re
graphic information (i.e., is granted Crypto ac
quire verification against the user's status.
Examples of such labels are "No Foreign Dis
'These terms are defined on p. 12. semination" and "Not Releasable Outside the
49
Department of Defense." (d) His citizenship.
(i) An information label is regarded as not con (e) His agency assignment(s).
trolling access to information, but rather giv (f) His permanent identification number (Social
ing guidance to the user on how the informa Security or other).
tion may be further disseminated, controlled, (g) Special need-to-know designators other than
utilized, etc. Examples of such labels are those explicitly contained in the first and
"Limited Distribution," "Special Handling third items.
Required," "Downgrading Group 1."
The computer system will maintain the following
G) All names, code words, etc., are assumed to be
unique. information for each file:
50
affect the software or any ofits built-in checks. Thus, tion specifies the dissemination labels and the way
installation personnel need not know about or imple they are processed. It is not discussed here because
ment any part of the security control system; nor we have been unable to determine any standardized,
should they be expected or allowed to modify it. Each rigorous order in the current practice of using such
installation, through the security control system labels: We recommend that this area be further ex
generation process, particularizes the security tables plored. Note that the processing ofthe dissemination
to its environment (with built-in validity and consist labels will depend upon the Personnel Definition.
ency checks), and thus can minimize recertification For example, a "DoD Only" file will necessitate the
of the security control system. ability to determine the agency that the individual
. The card deck (or magnetic tape ot1magnetic disc) represents.
detailing the security control system and the tables The other four specifications of the Security Con
produced during the geil'eration proceSl(> contain the trol Definition are discussed below. The reader is
most sensitive information resident in the computer directed to Annex A for the formal System Access
system. As such, no proyision is made for directly Specification in a slightly modified Backus-Naur
classifying or accessing this information via the file Form (BNF). In addition to the language specifica
system; rather, special mechanisms must be pro tion, it is necessary to specify the algorithms for
vided to limit access to this information to only the processing this information. These are discussed be
responsible authorities. low in all but the obvious cases. The reader should
System Access Definition is the vehicle for de reference the Annexes as he reads the remainder of
scribing to the computer system those parameters the discussion, particularly Annex B, which contains
that will affect an individual's access to information. examples of Security Component Definitions.
This consists ofa Personnel Definition, describing all
relevant parameters for the individuals permitted to
use the system, except information dealing with SECURITY STRUCTURE DEFINITION
security; a Terminal Definition, describing all rele
vant parameters for any terminals that may be con The Security Structure Definition formally
nected to the system, except information dealing defines the structure of that portion of the security
with security; and a Security Control Definition, d~ classification and control system that is applicable to
scribing all relevant security parameters. The Per the particular installation in question. The language
sonnel and Terminal Definitions are not discussed presented in Annex A is sufficient to describe all
here, since they are installation dependent and are special clearances and compartments with which we
not within the scope of this Report. are familiar, although actual examples demonstrat
Security control system generation is the process ing the completeness of this approach cannot be pre
whereby the System Security Officer (or other re sented at this level of classification.
sponsible authority) specifies the Security Control The Security Structure Definition consists ofany
Definition to the computer system. The computer number of Security Component Definitions, followed
system will process this information, doing such by any merge rules relating different components. A
things as validity checking and internal table stor component may be a compartment, a special cate
age generation, and thus render the system ready for gory, or a special access. It is reasonable to expect
actual use. After the initial security system has been that changes to the Security Structure Definition
generated, changes to the Security Control Defini will necessitate a new system generation.
tion can (in almost all cases) be handled directly by The security structure language formally defines
the system without cause for regenerating the a set of relations among entities, including names of
security control system. clearances or classifications, code words, labels, etc.
The Security Control Definition consists of five The structure below can be thought of as defining a
separate specifications: Security Structure Defini set of decision rules that the computer system can
tion, Personnel Security Definition, Authorization consult when it wishes to make a decision concern
Group Definition, Terminal Security Definition, and ing security parameters. It is immaterial as to how
Releasability Definition. The Releasability Defini these decision rules are actually stored in the com
51
puter, and this is (for the present) left to the in nent, respectively. This is interpreted to mean that
dividual software system designers. access authorized by a given clearance implies the
Following is an example ofa Security Component automatic access (unless otherwise limited) author
Definition: 2 ized by other clearances lower in the hierarchy. For
example, ifan individual has a Top Secret clearance,
DEFINE: NATIONAL CLEARANCES;
Top Secret implies Secret (TS IMPLIES S) in the
CLEARANCES: TOP SECRET, SECRET, CON sense that an individual cleared for Top Secret also
FIDENTIAL, UNCLEARED; has access to information to which an irtdividual
SYNONYMS: TOP SECRET = TS, SECRET = cleared for Secret has access.
S, CONFIDENTIAL = C, UNCLEARED = UR, Under ACCESS RULES, there is only one opera
UNCLASSIFIED= U; tor, called accesses, which has been previously
INTERNAL STRUCTURE:TS IMPLIES S, S IM defined as permits access to information labelled as.
PLIES C, C IMPLIES UR; These rules explicitly state the relation between the
names of the clearances in the security component
ACCESS RULES: TS ACCESSES TS, S AC being defined and the labels on the information to
CESSES S, C ACCESSES C, UR ACCESSES U; which that security clearance permits access. In
REQUIRED LABELS: NONE; many cases, the same word is used to specify a clear
EXTERNAL STRUCTURE: NONE; ance and a label indicating classification of informa
tion (as in the example above).
REQUIREMENTS: NONE;
The REQUIRED LABELS are those other than
MERGE RULES: TS AND (S OR C OR U) the normal classification labels on a file. For exam
YIELDS TS, SAND (COR U) YIELDS S, C AND ple, certain security components require all informa
U YIELDS C; tion within the component to be handled via special
END; channels, and this fact is explicitly stated on any
piece of information protected by the component. In
The component name (as specified in the DE effect, a required label can be regarded as a pseudo
FINE statement) is the name normally applied to a classification, accessed by any of the clearances
classification system, compartment, or special cate listed in the Security Component Definition (or their
gory. It, and all CLEARANCES within the compo synonyms). The necessity ofthis view is indicated in
nent, are listed· in the definition. Note that a compo the Crypto example of Annex B (Example 1), where
nent name and a clearance name may be the same. administrative traffic not having the Crypto classifi
SYNONYMS allows for commonly used abbrevia cation label, but still confined to Crypto-authorized
tions or synonyms. people, must be recognized by the system.
The INTERNAL and EXTERNAL STR UC · Note that information and dissemination labels,
TURE statements (i.e., internal and external to the although required on information, are not included
particular component in question) are handled the here as REQUIRED LABELS because at present
same way by the system software. They are stipu their usage is neither standardized nor logically con
lated separately in the definition merely to assist the sistent. When their usage becomes standardized, it
System Security Officer in organizing his thoughts will be possible to revise slightly the scheme here
as he defines the security structure. A possible use of described to accommodate them and handle them
the EXTERNAL STRUCTURE statement is to cre automatically.
ate Universal Privileges, as discussed below; its use The REQUIREMENTS statement is the vehicle
is also illustrated in Example 4 of Annex B. These for describing situations in which a particular clear
statements describe hierarchical relationships that ance requires the simultaneous existence or non
exist between one of the clearances being defined in existence of other clearances or access authoriza
the component, and either another clearance within tions (see Examples 2-4 in Annex B). Note that clas
that component or a clearance from another compo sification labels are not mentioned, since the particu
lar labels accessed by a given clearance can always
2
Additional examples are found in Annex B. be determined.
52
MERGE RULES, discussed more fully below, clearance from being accepted before the Secret
contain the information that allows the system to clearance is deleted.)
determine automatically the classification of infor
mation that results from merging information of Consistency Check of the Security
various classifications. Standard logical relation Structure Definition
ships (utilizing the Boolean connectives AND and
ORJ are permitted. After all Security Component Definitions have
The operator YIELDS means that the combina been entered into the computer and preprocessing
tion of classifications (or labels) on the left requires has been completed, two consistency checks are
the classification (or labels) on the right to be placed made. The first insures that all clearances refe
on the merged information. renced have been defined and that no clearance is
multiply-defined. The second insures that no chains
Security Structure Preprocessing for exist that lead to contradictions. For example, A re
Minimization of Clearances quires B, B requires C, C requires NOT A, would form
an inconsistent set of clearances in which clearance
Afte:r the complete Security Structure Definition A could never be granted.
has been entered into the computer, an augmented The consistency check is performed as follows for
set of Requirement statements will be automatically each clearance in the Security Structure Definition:
constructed as follows. For each implication state (a) Form an expression, called the consistency ex
ment ofthe form A IMPLIES Bin either an Internal pression, consisting of the clearance being
or an External Structure statement, the Require tested.
ment statement of Bwill be modified by the conjunc (b) Moving through this consistency expression
tion of NOT A. If there is no previous Requirement from left to right, pick up the next clearance
statement for B, then one must be created. in the expression and replace it by itself con
The purpose of this is to provide for consistency juncted with the right-hand side of the Re
in the minimization of the user's clearance set. For quirements statement for that clearance
example, if an individual is to be granted a Top Se (from its Security Component Definition), all
cret clearance after already possessing ·a Secret enclosed in parentheses.
clearance, the system should rightfully expect that (c) Repeat step (b) above, each time moving to
his Secret clearance be removed when the Top Se the next clearance appearing in the consist
cret is granted. Similarly, there are instances of in ency expression (i.e., the next one to the right
terrelated components where it is mandatory that a of the one just processed), until all clearances
clearance not mutually coexist with another clear in the consistency expression have been proc
ance that implies it (see Example 4 in Annex B). The essed.
system includes this capability, and this results in (d) Assign the value of TRUE to the next (left
the following rule: most) clearance in the consistency expression
(i.e., to the one being tested for consistency
When upgrading any user clearance that is with the rest of the security structure).
hierarchical, the security officer must first
(e) If any set of assignments of TRUE and
remove the lower clearance and then add the
higher clearance. 3 FALSE can be made to the other Clearances in
the consistency expression which result in a
In the example just given, this means that the value of TRUE (when the expression is eva
security officer must remove the user's Secret clear luated according to the normal rules of Boo
ance before adding the user's Top Secret status to the lean expression evaluation), then the clear
system. (The system's consistency checking mech ance being tested is consistent with the rest of
anism described below will prevent the Top Secret the Security Structure Definition.
(f) If no such assignment can be found to make
3
As described below, the user is not allowed to be logged onto
the system while his clearance status is being modified, nor can the consistency expression TRUE, then the
his status be changed while he is logged on the system. clearance being tested is inconsistent with the
53
rest of the Security Structure Definition. The side of the rule. (Treat the left-hand side
consistency expression and the inconsistent of the merge as a Boolean expression and
clearance must be output by the system to evaluate according to the normal rules. If
facilitate the correction of the inconsistency. ·a label appears in the concatenated label
The consistency check should continue to look set, consider it TRUE in the expression;
for further inconsistencies, but .the particular otherwise, FALSE. Hence, the right side
Security Structure Definition cannot be ac is substituted for the left side of a merge
cepted by the system. (The system cannot al rule when the left side is TRUE.)
low any type of error in the Security Struc In attempting to apply steps (1) and (2) above,
ture Definition.) After correcting the incon the labels can be freely reordered to promote
sistency, the entire process of Security Struc a simplification.
ture Definition must be restarted from the be (c) If any simplification results from step (b),
ginning. Also, because ofthe complex process then repeat steps (b) and (c).
ing described above, there is no provision for
on-line definition of new clearances.
(g) Repeat steps (d), (e), and (f) above, each time
moving to the next clearance appearing in the
PERSONNEL SECURITY DEFINITION
consistency expression (i.e., the next one to
AND USER CLEARANCE UPDATE
the right of the one just processed), until all The next step in system generation is Personnel
clearances in the consistency expression have Security Definition. It is possible to modify this infor
been processed. mation subsequently through the on-line use of the
user clearance update language. The processing in
Merge Rules volved is the same for both initial system generation
and subsequent updates, and is as follows:
Merge rules are provided to permit automatic (a) Update of a user's clearance status by the
determination of the classification of information security officer can be done if and only if the
that has been produced by the combination of infor user is not logged onto the system.
mation of dissimilar classifications (see the example (b) The granting agency and expiration date
above of National Clearances, and also Examples 2-4 may be specified for clearances and put into
in Annex B). Note that all relationships, including the user's information, but are not presently
hierarchical ones, must be explicitly stated in terms utilized. The cognizant agency is neither spe
of classification labels; the software cannot be ex cified nor stored. This implies that within this
pected to infer that one classification subsumes an automated security system, a Top Secret
other. clearance granted from one agency also im
plies access to Top Secret information from
Merge Rule Processing another agency, unless additional labels that
deny such access have been applied to this
The actual merge rule processing is as follows: information.
(a) Concatenate (i.e., conjunct) all the labels of (c) On each addition or deletion of a user clear
each file accessed during the merge process ance, a check will be made that the user ex
(this includes required labels). ists; that (on addition) the clearance exists
(b) Simplify resultant merge label by the follow and has not already been granted to the user;
ing rules: and (on deletion) that the user does, in fact,
(1) Identity transformation. A AND A yields have the clearance to be deleted.
A for all A; (d) At the time of Personnel Security Definition,
(2) Apply merge rules; i.e., if the left-hand and at the time of granting an additional
side of a special merge rule matches the clearance to (or removing an existing clear
concatenated labels or a portion thereof, ance from) a user, a consistency check is made
replace that portion by the right-hand to insure that the Requirements statement for
54
each of the user's clearances is still satisfied information to which he has in fact been granted
after the addition (deletion) of the new (old) access. In the usual context, need-to-know is really
clearance; this is accomplished as follows: need-to-know for reading. We have simply extended
OJ Generate the set of access privileges spe that concept to allow separate need-to-know groups
cified by the user's explicit clearances; for reading, changing, etc., and we call this extended
this can be done as follows: concept "authorization groups" in order to avoid con
• Form the set of all the user's explicit fusion.
clearances (called the clearance set);
• For each clearance in the clearance
set, add all clearances implied by this . UNIVERSAL PRIVILEGES
particular clearance in either Inter
nal or External Structure statements Under emergency conditions, it may be necessary
within the Security Component Defi to grant a user or a group of users unrestricted ac
nition; cess to all files in the system or to a set offiles regard
• Apply identity transformation (A less of clearances, special access categories, and/or
[AN_D] A yields A) to the clearance set need-to-know restrictions. Rather than turning off
(i.e., remove all duplicates). th~ file safeguards in the system, necessitating con
Notice that this is the algorithm used in cern for user identification, protection of terminals,
generating the set of all labels to which etc. (especially under emergency conditions), a spe
the user's clearance permits access (ex cial capability is provided within the system so that
plained below in "File Access Processing") the system security controls are not impaired.
with steps (b), (c)(l), and (c)(3) deleted. The System Security Officer in a normal Security
(2) For each explicit clearance the user has
Component Definition can define a universal or
been granted, including the new one being emergency clearance, which implies all other clear
added (or excluding the old one being de ances or special-access categories in the system and
leted), check to see ifthe requirements as which has no external requirements. It can be
stated in the Requirements statem~nt(s) granted to a given user by first removing all his
in the Security Component Definition are clearances (to prevent a clearance inconsistency
satisfied by the occurrence or absence of check) and then granting the universal or emer
the clearances in the clearance set just gency clearance. (Obviously, any number of such
generated according to the normal rules emergency clearances could be set up for any subsets
of Boolean expression evaluation. of the overall security system by simply listing the
desired ones in the External Structure statement.)
Universal authorization groups can be defined to
AUTHORIZATION GROUP
handle the problem of overriding the system's file
DEFINITION
manipulation and access authorization restrictions.
Membership in such a group authorizes the in
Authorization Group Definition occurs at system dividual to take some action on the files to which he
generation time, but, like Personnel Definition, also is permitted access, either on a standing or an emer
may be updated on-line. There is no special process gency basis. Examples of universal authorizations
ing explicitly required for authorization groups. A are: universal right-to-read, universal right-to
user does not have to be authorized to use the system change, etc .
... . for his name to be in an authorization group. Up Comment: The word "emergency" is used here in a
dates are made via the authorization group update limited sense; i.e., we refer mainly to the numerous
language. unanticipated special situations that always seem to
Comment: Our concept ofan authorization group is arise at any computer installation. Through appro
more general than the normal need-to-know concept priate forethought and predefinition, these situations
associated with classified information. It also ad can be hlLndled routinely as they arise. Still, however,
dresses the question of what a person can do to the there may arise a true emergency (such as an enemy
55
attack) where there is no time to do anything but may therefore specify authorizations and an access
respond. The techniques discussed here are not in list to be assnciated with each authorization.
tended to address that problem. Rather, we would If not specified, default access lists are assumed
assume some sort of fail-safe, joint-key mechanism as follows:
whereby appropriately authorized individuals could
turn off all access controls of the system in time of All authorization access lists have the default
dire emergency. condition of null (i.e., unless otherwise spe
cified, they are empty) except those associated
Mechanisms such as described above should be with the following actions: unrestricted access,
sufficient for accommodating any specific situations right-to-change authorization lists, and right
that may arise, assuming the appropriate universal to-change file classifications. The access lists as
groups have been predefined. In addition, they allow sociated with these particular authorization
types must be initialized by the system to con
routine handling of two situations normally requir
tain the name of the author of the file.
ing special provisions. These are the privileges ofthe
System Security Officer and the file-backup mech It should be noted that the syntax of the authori
anism. The System Security Officer should have, in zation specification provides capability for the re
addition to his normal clearance status, universal moval ofthe author's name from an access list. Un
authorizations for read-only, right-to-change author less this is explicitly done, however, the author of a
ization lists, and right-to-change file classifications. file will be permitted unrestricted access to the file,
The file backup program can be given the clearance as well as the privilege ofchanging the authorization
status to handle all files for which it is to provide specification and classification of the file.
backup and universal authorization for read-only to At present, it is not deemed necessary to provide
enable it to read any of these files. the capability to be able to syntactically distinguish
between authorization group identifiers and user
identifiers. Rather, it is assumed that the processing
TERMINAL SECURITY DEFINITION algorithms will have to check the identifier in ques
AND UPDATE tion against master lists, and that the semantics will
be obvious from the context.
Terminal Security Definition is handled in a man Anyone who has the ability to write in a file can,
ner similar to personnel security information. There in principle, add to it information ofa higher classifi
exists the capability to update this information on cation than the file. Therefore, he must have some
line. In the present specification, the capability to way of altering the classification status of the file.
specify a terminal access list has not been included; Whether this is provided by allowing anyone with
i.e., a list ofthe authorized users ofa given terminal. write privilege to alter the file classification directly,
It appears, for the present, that this is an unneces or by requesting the original author of the file to
sary complexity to add to an already burdened sys alter the classification, or by requesting the System
tem, and we expect that physical access to terminals Security Offic~ to alter the classification, is an oper
processing classified information will normally be ational policy decision. The first alternative is simpl
controlled. Further control seems unnecessary, but est, but it may be operationally desirable to have a
should it be desired, mechanisms similar to those second person involved in change of classification.
already specified can be used. For.example, a special The mechanisms in the overall scheme provide capa
clearance status can be defined, access to which is bility to specify a separate group of individuals who
permitted only for a particular terminal. can only alter the classification of a file.
56
may reference a particular file of information. First, ofmanipulation he is allowed for the file in question.
the user's clearance must be sufficient to permit ac The proce.ss for carrying this out is as follows:
cess to the file classification, and this is determined
as follows: (a) Copy the user's universal authorization privi
leges (which are explicitly specified at log-on
(a) Obtain the file classification labels. time by the universal authorization algorithm
(b) Obtain the set of labels to which user clear described below) into a memory area called
ances permit access. This set may be cal his file-access rights block. If he has universal
culated as needed at log-on time or at security unrestricted access after specifying this in the
system update time (if the latter is used, on file-access-rights block as explained in step
line updating of a user's clearance by the Sys (b)(2) below, then processing can stop (i.e.,
tem Security Officer cannot be allowed). there is nothing that can be added to his ac
(c) If the set of labels to which the user's clear cess rights).
ance status permits him access contains all (b) For each authorization type (starting with
the labels in the file classification status, then unrestricted access):
the formal security accessing requirements (1) If the user is in the access list either ex
have been satisfied. plicitly (by name) or implicitly (either by
membership in a group specified in the list
The method of generating the set of labels to or because the universal set was specified),
which a user's clearance status permits him access grant the user the specified type of access;
is as follows: (2) If the authorization is for unrestricted ac
cess and the user qualifies for it, grant
(a) Form the set of all user's clearances and spe him (in his file-access-rights block for this
cial access categories (called clearance set). file) all the other authorization types, and
(b) Initialize to null the set oflabels to which the stop processing these rights.
user's clearance status permits him access
(called the accessible label set). The file-access-rights information (in the file
(c) For each entry in the clearance set: access-rights block) is consulted by the Supervisor on
(1) Add to the accessible label set all labels to everyinput/output operation in order to determine
which the particular entry permits access. whether or not the operation on the file is legal.
These are obtained fro~. the access rules Thus, the authorization processing occurs during the
in the Security Componenr Definition. linkage of a user to a file after clearance status
Also, add all required labels for this par checks have been made, and results only in the crea
ticular clearance entry. tion ofthe file-access-rights data, which is later used
(2) Add to the clearance set all clearances or by the Supervisor for controlling access to the file.
special-access categories implied by this The universal authorization aigorithm consists of
particular clearance entry in either Inter checking each universal group for the presence of
nal or External Structure statements the user in the set, either explicitly by name or im
within the Security Component Defini plicitly by membership in another group specified as
tion. a member of the universal group. If the user is pre
(3) Delete this entry from the clearance set. sent in the set, then grant him the associated univer
(d) Apply identity transformation (A AND A sal access privilege.
yields A) to the accessible label set (i.e., delete
all duplicates). Comment: When access control labels are standard
ized and any precedence or combinatorial relations
After a user's clearance status has been checked among them have been specified, the algorithms for
and successfully permits access to a file, the security handling them can be developed, and the restrictions
system must determine whether the user satisfies resulting from the operation of such algorithms
the authorization limitations for the file. This check would be examined at this point in file access process
determines the user rights and specifies what types ing.
57
Annex A:
the following BNF rules that could lead to an ambiguity, the <STRING>
58
59
60
61
Annex B
SECURITY COMPONENT DEFINITION EXAMPLES
Example I
Consider a class ofinformation.called Crypto, which is to be regarded as
a further restriction on access under the national clearance system. Since
Crypto information is to be transmitted via special channels, and is labelled as
such, administrative traffic without the classification label Crypto can still be
confined to Crypto-authorized personnel by regarding the required label on the
file as a pseudo-classification accessed by any of the clearances listed in the
definition. ·
DEFINE: CRYPTO;
CLEARANCES: CRYPTO;
END;
62
Example 2
Consider a hypothetical refinement of the national clearance system
called DATATEL as follows:
DEFINE: DATATEL;
SYNONYMS: NONE;
MERGE RULES: ABLE AND (BAKER OR CHARLIE) YIELDS ABLE, BAKER AND CHARLIE
YIELDS BAKER;
END;
Example 3
Now consider a hypothetical compartment of information within the
DATATEL structure. It has been assumed that APPLE information is not
labelled as such, but is to carry the codeword ALICE. The APPLE definition
below relates APPLE to III; the DATATEL definition relates III to ABLE and
also to Top Secret. Thus, the system can correctly determine that the proper
classification labe,l for APPLE information is TOP SECRET ABLE ALICE.
Note also that such information has two required labels; some rule of prece
dence must be specifi~d to handle such situations.
DEFINE: APPLE;
CLEARANCES: APPLE;
SYNONYMS: NONE;
END;
Example 4
Consider a hypothetical example (named ROUND ROBIN) in which it is
assumed that at the Secret levelthere are two categories ofinformation, called
63
MERGE RU~S: ANN AND BETTY YIELDS TOP SECRET AND CHICO;
END;
64
)
The typographical format used in this report represents a practical application
of current computer-associated technology to decrease the time and expense
usually involved in manuscript preparation and typesetting. The copy is key
boarded on an IBM Magnetic Selectric Typewriter (MT/STJ, an office machine
designed to reduce the time required for correctin(J and editing of written
material. After correction, the MT/ST tape is processed through an IBM 2495
Converter multiplexed to Rand's IBM 360165 computer, producing a standard
computer-readable magnetic tape. This tape is processed on an RCA Spectra
70145 and an RCA Videocomp, operated by Auto-Graphics, Inc., of Monterey
Park, California, to produce phototypeset galleys which are then pasted up for
reproduction. The RCA system also does the line justification and hyphenation,
according to standard algorithms. This process results in a substantial reduc
tion in the author-to-reader costs normally associated with graphics quality
publications.
'-:UNt-IUENTIAL c
~~ . . .................. ·- ?'
/
/