The Rainbow Books



 
                                                 CSC-STD-004-85







              TECHNICAL RATIONAL BEHIND CSC-STD-003-85:
                   COMPUTER SECURITY REQUIREMENTS


              GUIDANCE FOR APPLYING THE DEPARTMENT OF DEFENSE
                TRUSTED COMPUTER SYSTEM EVALUATION CRITERIA
                         IN SPECIFIC ENVIRONMENTS








              Approved for public release;
              distribution unlimited.


              25 June 1985





                                            CSC-STD-004-85
                                        Library No. S-226,728


                        FOREWORD

This publication, Technical Rationale Behind CSC-STD-003-85: Computer Security
Requirements--Guidance for Applying the Department of Defense Trusted Computer
System Evaluation Criteria in Specific Environments, is being issued by the DoD
Computer Security Center (DoDCSC) under the authority of and in accordance with
DoD Directive 5215.1, "Computer Security Evaluation Center." This document
presents background discussion and rationale for CSC-STD-003-85, Computer
Security Requirements--Guidance for Applying the Department of Defense Trusted
Computer System Evaluation Criteria in Specific Environments. The computer
security requirements identify the minimum class of system required for a given
risk index. System classes are those defined by CSC-STD-001-83, Department of
Defense Trusted Computer System Evaluation Criteria, 15 August 1983. Risk index
is defined as the disparity between the minimum clearance or authorization of
system users and the maximum sensitivity of data processed by the system. This
guidance is intended to be used in establishing minimum computer security
requirements for the processing an-or storage and retrieval of sensitive or
classified information by the Department of Defense whenever automatic data
processing systems are employed. Point of contact concerning this publication is
the Office of Standards and Products, Attention: Chief, Computer Security
Standards.


                                 25 June 1985
Robert L. Brotzman
Director
DoD Computer Security Center



                ACKNOWLEDGMENTS

Special recognition is extended to H.  William Neugent and Ingrid M.  Olson of
the MITRE Corporation for performing in-depth analysis of DoD policies and
procedures and for preparation of this document.

Acknowledgment is given to the following for formulating the computer security
requirements and the supporting technical and procedural rationale behind these
requirements: Col Roger R. Schell, formerly DoDCSC, George F. Jelen, formerly
DoDCSC, Daniel J. Edwards, Sheila L. Brand, and Stephen F. Barnett, DoDCSC.

Acknowledgment is also given to the following for giving generously of their
time and expertise in the review and critique of this document: CDR Robert
Emery, OJCS, Dan Mechelke, 902nd Ml Gp, Mary Taylor, DAMI-CIC, Maj.  Freeman,
DAMI- CIC, Ralph Neeper, DAMI-CIC, Duane Fagg, NAVDAC, H.  O.  Lubbes, NAVELEX,
Sue Berg, OPNAV, Susan Tominack, NAVDAC, Lt Linda Fischer, OPNAV, Eugene
Epperly, ODUSD(P), Maj Grace Culver, USAF-SITT, Capt Mike Weidner, ASPO, Alfred
W.  Arsenault, DoDCSC, James P.  Anderson, James P.  Anderson & Co., and Dr.
John Vasak, MITRE Corporation.





























                                    ii


               TABLE OF CONTENTS
FOREWORD.............................................................   i
ACKNOWLEDGMENTS......................................................  ii
LIST OF TABLES.......................................................  iv
1.0 INTRODUCTION.....................................................   1
2.0 RISE INDEX.......................................................   5
3.0 COMPUTER SECURITY REQUIREMENTS FOR OPEN
    SECURITY ENVIRONMENTS............................................   11
4.0 COMPUTER SECURITY REQUIREMENTS FOR CLOSED
    SECURITY ENVIRONMENTS............................................   19
APPENDIX A: SUMMARY OF CRITERIA......................................   23
APPENDIX B: DETAILED DESCRIPTION OF CLEARANCES
     AND DATA SENSITIVITIES..........................................   27
APPENDIX C: ENVIRONMENTAL TYPES......................................   31
GLOSSARY.............................................................   33
ACRONYMS.............................................................   37
REFERENCES...........................................................   39






















                                   iii


                 LIST OF TABLES
Table
1: Rating Scale for Minimum User Clearance.........................    6
2: Rating Scale for Maximum Data Sensitivity.......................    7
3: Security Risk Index Matrix......................................    8
4: Computer Security Requirements for Open Security Environments...   12
5: Security Index Matrix for Open Security Environments............   13
6: Computer Security Requirements for Closed Security Environments.   20
7: Security Index Matrix for Closed Security Environments..........   21






























                                    iv

 1.0 INTRODUCTION
The purpose of this technical report is to present background discussion and
rationale for Computer Security Requirements--Guidance for Applying the DoD
Trusted Computer System Evaluation Criteria in Specific Environments(1)
(henceforth referred to as the Computer Security Requirements).  The
requirements were prepared in compliance with responsibilities assigned to the
Department of Defense (DoD) Computer Security Center (DoDCSC) under DoD
Directive 5215.1, which tasks the DoDCSC to "establish and maintain technical
standards and criteria for the evaluation of trusted computer systems."(2)

DoD computer systems have stringent requirements for security. In the past,
these requirements have been satisfied primarily through physical, personnel,
and information security safeguards.(3) Recent advances in technology make it
possible to place increasing trust in the computer system itself, thereby
increasing security effectiveness and efficiency. In turn, the need has arisen
for guidance on how this new technology should be used. There are two facets to
this required guidance:

     a.  Establishment of a metric for categorizing systems according to the
         security protection they provide.

     b.  Identification of the minimum security protection required in
         different environments.

The DoD Trusted Computer System Evaluation Criteria (henceforth referred to
as the Criteria), developed by the DoDCSC, satisfy the first of these two
requirements by categorizing computer systems into hierarchical security
classes.(4) The Computer Security Requirements satisfy the second requirement
by identifying the minimum classes appropriate for systems in different risk
environments. They are to be used by system managers in applying the Criteria
and thereby in selecting and specifying systems that have sufficient security
protection for specific operational environments.

Section 2 of this document discusses the risk index.  Section 3 presents a
discussion of the Computer Security Requirements for open security
environments.  Section 4 presents a discussion of the Computer Security
Requirements for closed security environments. A summary of the Criteria is
contained in Appendix A.  Appendix B contains a detailed description of
clearances and data sensitivities, and Appendix C describes the environmental
types.  A glossary provides definitions of many of the terms used in this
document.

1.1 Scope and Applicability

This section describes the scope and applicability for both this report and the
Computer Security Requirements. The primary focus of both documents is on the
technical aspects (e.g., hardware, software, configuration control) of computer
security, although the two documents also address the relationship between
computer security and physical, personnel, and information security.  While

                                    2


communications and emanations security are important elements of system
security, they are outside the scope of the two documents.

Both documents apply to DoD computer systems that are entrusted with the
protection of information, regardless of whether or not that information is
classified, sensitive, national security-related, or any combination thereof.
Furthermore, both documents can be applied throughout the DoD.(5,6,7,8,9)

The two documents are concerned with protection against both disclosure and
integrity violations. Integrity violations are of particular concern for
sensitive unclassified information (e.g., financial data) as well as for some
classified applications (e.g., missile guidance data).

The recommendations of both this report and the Computer Security
Requirements are stated in terms of classes from the Criteria. Embodied in each
class and therefore encompassed within the scope of both documents are two
types of requirements:  assurance and feature requirements.  Assurance
requirements are those that contribute to confidence that the required features
are present and that the system is functioning as intended.  Examples of
assurance requirements include modular design, penetration testing, formal
verification, and trusted configuration management.  Feature requirements
encompass capabilities such as labeling, authentication, and auditing.

1.2 Security Operating Modes

DoD computer security policy identifies several security operating modes, for
which the following definitions are adapted:(10,11,12,13)

     a.  Dedicated Security Mode--The mode of operation in which the system is
         specifically and exclusively dedicated to and controlled for the
         processing of one particular type or classification of information,
         either for fulltime operation or for a specified period of time.

     b.  System High Security Mode--The mode of operation in which system
         hardware/software is only trusted to provide need-to-know protection
         between users.  In this mode, the entire system, to include all
         components electrically and/or physically connected, must operate with
         security measures commensurate with the highest classification and
         sensitivity of the information being processed and/or stored.  All
         system users in this environment must possess clearances and
         authorizations for all information contained in the system, and all
         system output must be clearly marked with the highest classification
         and all system caveats, until the information has been reviewed
         manually by an authorized individual to ensure appropriate
         classifications and caveats have been affixed.

     c.  Multilevel Security Mode--The mode of operation which allows two or
         more classification levels of information to be processed
         simultaneously within the same system when some users are not cleared
         for all levels of information present.
                                      3


     d.  Controlled Mode--The mode of operation that is a type of multilevel
         security in which a more limited amount of trust is placed in the
         hardware/software base of the system, with resultant restrictions on
         the classification levels and clearance levels that may be supported.

     e.  Compartmented Security Mode--The mode of operation which allows
         the system to process two or more types of compartmented information
         (information requiring a special authorization) or any one type of
         compartmented information with other than compartmented information.
         In this mode, system access is secured to at least the Top Secret (TS)
         level, but all system users need not necessarily be formally
         authorized access to all types of compartmented information being
         processed and/or stored in the system.

In addition to these security operating modes, Service policies may define
other modes of operation.  For example, Office of the Chief of Naval Operations
(OPNAV) Instruction 5239.  IA defines Limited Access Mode for those systems in
which the minimum user clearance is uncleared and the maximum data sensitivity
is not classified but sensitive (6)

                                 5


2.0 RISK INDEX

The evaluation class appropriate for a system is dependent on the level of
security risk inherent to that system.  This inherent risk is referred to as
that systems risk index.  Risk index is defined as follows:
     The disparity between the minimum clearance or authorization of system
     users and the maximum sensitivity of data processed by a system.
 
The Computer Security Requirements are based upon this risk index.  Although
there are other factors that can influence security risk, such as mission
criticality, required denial of service protection, and threat severity, only
the risk index is used to determine the minimum class of trusted systems to be
employed, since it can be uniformly applied in the determination of security
risk.  The risk index for a system depends on the rating associated with the
system's mimimum user clearance (Rmin) taken from Table 1 and the rating
associated with the system's maximum data sensitivity (Rmax) taken from Table

2.  The risk index is computed as follows:

Case a. If Rmin is less than Rmax, then the risk index is determined by
subtracting Rmin from Rmax.2
                        Risk Index  Rmax   Rmin

Case b. If Rmin is greater than or equal to Rmax, then
                1, if there are categories on the system to which some users
                   are not authorized access;
Risk Index
                0, otherwise (i.e., if there are no categories on the system or
                   if all users are authorized access to all categories)

     Example: For a system with a minimum user clearance of Confidential and
     maximum data sensititivy of Secret (without categories), Rmin 2 and
     Rmax 3.


1 Since a clearance implicitly encompasses lower clearance levels (e.g., a
Secret- cleared user has an implicit Confidential clearance), the phrase
"minimum clearance...of system users" is more accurately stated as "maximum
clearance of the least cleared system user." For simplicity, this document uses
the former phrase.

2 There is one anomalous case in which this formula gives an incorrect result
This is the case where the minimum clearance is Top Secret/Background
Investigation and the maximum data sensitivity is Top Secret. According to
the formula, this gives a risk index of l. In actuality, the risk index in this
case is zero. The anomaly results because there are two "levels" of Top Secret
clearance and only one level of Top Secret data.

                                     6




                        TABLE 1

       RATING SCALE FOR MINIMUM USER CLEARANCE1





            MINIMUM USER CLEARANCE                                RATING

                      Uncleared (U)                                  0

   Not Cleared but Authorized Access to Sensitive Unclassified       1
                     Information (N)
                     Confidential (C)                                2
                        Secret(S)                                    3
     Top Secret (TS)/Current Background Investigation (BI)           4
 Top Secret (TS)/Current Special Background Investigation (SBI)      5
                One Category (1C)                                    6
              Multiple Categories (MC)                               7



















1 See Appendix B for a detailed description of the terms listed

                             7


                       TABLE 2

      RATING SCALE FOR MAXIMUM DATA SENSITIVITY

 MAXIMUM DATA
  SENSITIVITY
  RATINGS 2         RATING   MAXIMUM DATA SENSITIVITY WITH
    WITHOUT         (Rmax)        CATEGORIES1
  CATEGORIES
     (Rmax)

 Unclassified (U)      0          Not Applicable3
Not Classified but     1     N With One or More Categories            2
     Sensitives4
 Confidential (C)      2     C With One or More Categories            3
   Secret(S)           3     S With One or More Categories With No    4
                               More Than One Category Containing
                               Secret Data
                             S With Two or More Categories Containing 5
                               Secret Data
 Top Secret (TS)       55    TS With One or More Categories With No   6
                             More Than One Category Containing
                             Secret or Top Secret Data
                             TS With Two or More Categories           7
                             Containing Secret or Top Secret Data



1 The only categories of concern are those for which some users are not
authorized access to the category.  When counting the number of categories,
count all categories regardless of the sensitivity level associated with the
data.  If a category is associated with more than one sensitivity level, it is
only counted at the highest level.

2 Where the number of categories is large or where a highly sensitive category
is involved, a higher rating might be warranted.

3 Since categories imply sensitivity of data and unclassified data is not
sensitive, unclassified data by definition cannot contain categories.

4 N data includes financial, proprietary, privacy, and mission sensitive data.
Some situations (e.g., those involving extremely large financial sums or
critical mission sensitive data), may warrant a higher rating.  The table
prescribes minimum ratings

5 The rating increment between the Secret and Top Secret data sensitivity
levels is greater than the increment between other adjacent levels.  This
difference derives from the fact that the loss of Top Secret data causes
exceptionally grave damage to the national security, whereas the loss of Secret
data causes only serious damage.  (4)
                                     
			         8


                            TABLE 3
                  SECURITY RISK INDEX MATRIX

                         Maximum Data Sensitivity

                             U     N     C    S    TS   1C   MC

                      U      0     1     2    3    4    5    6
                      N      0     0     1    2    4    5    6
   Minimum            C      0     0     0    1    3    4    5
   Clearance          S      0     0     0    0    2    3    4
   or
   Authorization    TS(BI)   0     0     0    0    0    2    3
   of
   System Users     TS(SBI)  0     0     0    0    0    1    2
                      1C     0     0     0    0    0    0    1
                      MC     0     0     0    0    0    0    0




U = Uncleared or Unclassified
N = Not Cleared but Authorized Access to Sensitive Unclassified Information or
Not Classified but Sensitive
C = Confidential
S = Secret
TS = Top Secret
TS(BI) = Top Secret (Background Investigation)
TS(SBI) = Top Secret (Special Background Investigation)
1C = One Category
MC = Multiple Categories
                                 9


In situations where the local environment indicates that additional risk
factors are present, a larger risk index may be warranted.  Table 2 and the
above discussion show how the presence of nonhierarchical sensitivity
categories such as NOFORN (Not Releasable to Foreign Nationals) and PROPIN
(Caution- Proprietary Information Involved) influences the ratings.(14)
Compartmented information is also encompassed by the term sensitivity
categories as is information revealing sensitive intelligence sources and
methods.  A' subcategory (and a subcompartment) is considered to be independent
from the category to which it is subsidiary.

Table 3 presents a matrix summarizing the risk' indices corresponding to the
various clearance/sensitivity pairings. For simplicity no categories are
associated with the maximum data sensitivity levels below Top Secret.
                                     11


3.0 COMPUTER SECURITY REQUIREMENTS FOR OPEN
    SECURITY ENVIRONMENTS


This section discusses the application of the Computer Security Requirements to
systems in open security environments. An open security environment is one in
which system applications are not adequately protected against the insertion of
malicious logic.  Appendix C describes malicious logic and the open security
environment in more detail.

3.1 Recommended Classes

Table 4 presents the minimim evaluation class identified in the Computer
Security Requirements for different risk indices in an open security
environment.  Table 5 illustrates the impact of the requirements on individual
minimum clearance/maximum data sensitivity pairings, where no categories are
associated with maximum data sensitivity below Top Secret.  The minimum
evaluation class is determined by finding the matrix entry corresponding to the
minimum clearance or authorization of system users and the maximum sensitivity
of data processed by the system.

     Example: If the minimum clearance of system users is Secret and the
     maximum sensitivity of data processed is Top Secret (with no categories),
     then the risk index is 2 and a class B2 system is required.

The classes identified are minimum values.  Environmental characteristics must
be examined to determine whether a higher class is warranted.  Factors that
might argue for a higher evaluation class include the following:

     a. High volume of information at the maximum data sensitivity.

     b. Large number of users with minimum clearance.

Both of these factors are often present in networks.

The guidance embodied in the Computer Security Requirements is best used during
system requirements definition to determine which class of trusted system is
required given the risk index envisioned for a specific environment. They are
also of use in determining which choices are feasible given either the maximum
sensitivity of data to be processed or minimum user clearance or authorization
requirements. The Computer Security Requirements can also be used in a security
evaluation to determine whether system safeguards are sufficient.

3.2 Risk index and Operational Modes

Situations with a risk index of zero encompass systems operating in system high
or dedicated mode.  Systems operating in dedicated mode--in which all users
have both the clearance and the need-to-know for all information in the
system--do not need to rely on hardware and software protection measures for
security.(10) Therefore, no minimum level of trust is prescribed.  However,
because of the integrity and denial of service requirements of many systems,
additional protective features may be warranted.

                                 12




                             TABLE 4

  COMPUTER SECURITY      REQUIREMENTS FOR OPEN SECURITY
                         ENVIRONMENTS


    RISK INDEX         SECURITY OPERATING        MINIMUM CRITERIA
                               MODE                  CLASS1

         0              Dedicated                  No Prescribed
                                                    Minimum2
         0                  System High                C23
         1            Limited Access, Controlled,      B14
                      Compartmented, Multilevel
         2            Limited Access, Controlled,       B2
                      Compartmented, Multilevel
         3               Controlled, Multilevel         B3
         4              Multilevel                      A1
         5              Multilevel                      *
         6              Multilevel                      *
         7              Multilevel                      *




1 The asterisk (*) indicates that computer protection for environments with
that risk index are considered to be beyond the state of current technology.
Such environments must augment technical protection with personnel or
administrative security safeguards.

2 Although there is no prescribed minimum, the integrity and denial of service
requirements of many systems warrant at least class C1 protection.

3 If the system processes sensitive or classified data, at least a class C2
system is required.  If the system does not process sensitive or classified
data, a class C1 system is sufficient.

4 Where a system processes classified or compartmented data and some users do
not have at least a Confidential clearance, or when there are more than two
types of compartmented information being processed, at least a class B2 system
is required.
                              13


                            TABLE 5

 SECURITY INDEX MATRIX FOR OPEN SECURITY ENVIRONMENTS1


                Maximum Data Sensitivity

                          U     N     C     S     TS    1C    1M

                    U     C1    B1    B2    B3    *     *     *
     Minimum        N     C1    C2    B2    B2    A1    *     *
     Clearance or   C     C1    C2    C2    B1    B3    A1    *
     Author-
     ization        S     C1    C2    C2    C2    B2    B3    A1
     of System
     Users        TS(BI)  C1    C2    C2    C2    C2    B2    B3

                 TS(SBI)  C1    C2    C2    C2    C2    B1    B2
                   1C     C1    C2    C2    C2    C2    C22   B13
                   MC     C1    C2    C2    C2    C2    C22   C22


1 Environments for which either C1 or C2 is given are for systems that operate
in system high mode.  No minimum level of trust is prescribed for systems that
operate in dedicated mode.  Categories are ignored in the matrix, except for
their inclusion at the TS level.

2 It is assumed that all users are authorized access to all categories present
in the system.  If some users are not authorized for all categories, then a
class B1 system or higher is required.

3 Where there are more than two categories, at least a class B2 system is
required.

U = Uncleared or Unclassified
N = Not Cleared but Authorized Access to Sensitive Unclassified Information or
Not Classified but Sensitive
C = Confidential
S = Secret
TS = Top Secret
TS(BI) = Top Secret (Background Investigation)
TS(SBI) = Top Secret (Special Background Investigation)
1C = One Category
MC = Multiple Category
                                           14





In system high mode, all users have sufficent security clearances and category
authorizations for all data, but some users do not have a need-to-know for all
information in the system.(10) Systems that operate in system high mode thus
are relied on to protect information from users who do not have the appropriate
need-to-know. Where classified or sensitive unclassified data is involved, no
less than a class C2 system is allowable due to the need for individual
accountability.

In accordance with policy, individual accountability requires that individual
system users be uniquely identified and an automated audit trail kept of their
actions.  Class C2 systems are the lowest in the hierarchy of trusted systems
to provide individual accountability and are therefore required where sensitive
or classified data is involved.  The only case where no sensitive or classified
data is involved is the case in which the maximum sensitivity of data is
unclassified.  In this case, hardware and software controls are still required
to allow users to protect project or private information and to keep other
users from accidentally reading or destroying their data.  However, since there
is no officially sensitive data involved, individual accountability is not
required and a class C1 system suffices.  In system high mode sensitivity
labels are not required for making access control decisions.  In this mode
access is based on the need-to-know, which is based on permissions (e.g., group
A has access to file A), not on sensitivity labels.  The type of access control
used to provide need-to-know protection is called discretionary access control.
It is defined as a means of restricting access to objects based on the identity
of subjects and/or groups to which the subjects belong.  All systems above
Division D provide discretionary access control mechanisms.  These mechanisms
are more finely grained in class C2 systems than in Class C1 systems in that
they provide the capability of including or excluding access to the granularity
of a single user.  Division C systems (C1 and C2) do not possess the capability
to provide trusted labels on output.  Therefore, output from these systems must
be labeled at the system high level and manually reviewed by a responsible
individual to determine the correct sensitivity prior to release beyond the
perimeter of the system high protections of the system.(10)

Environments with a risk index of 1 or higher encompass systems operating in
controlled, compartmented, and multilevel modes.  These environments require
mandatory access control, which is the type of access control used to provide
protection based on sensitivity labels.  It is defined as a means of
restricting access to objects based on the sensitivity (as represented by a
label) of the information contained in the objects and the formal clearance or
authorization of subjects to access information of such sensitivity.  Division
B and A systems provide mandatory access control, and are therefore required
for all environments with risk indices of 1 or greater.

The need for internal labeling has a basis in policy, in that DoD Regulation
5200.1-R requires computer systems that process sensitive or classified data to
provide internal classification markings.(3) Other requirements also exist.

     Example: The DCID entitled "Security Controls on the Dissemination of
     Intelligence Information" requires that security control markings be
                                 15


     "associated (in full or abbreviated form) with data stored or processed in
     automatic data processing systems."(14)

Sensitivity labeling is also required for sensitive unclassified data.(15,16)

     Example: Data protected by Freedom of Information (FOI) Act exemptions
     must be labeled as being "exempt from mandatory disclosure under the FOI
     Act."(15)

This example illustrates not only the need for labeling but also the fact that
the purpose of FOI Act exemptions is to provide access control protection for
sensitive data.  In summary, it is a required administrative security practice
that classified and unclassified sensitive information be labeled and
controlled based on the labels.  It follows that prudent computer security
practice requires similar labeling and mandatory access control.

The minimum class recommended for environments requiring mandatory access
control is class B1, since class B1 systems are the lowest in the hierarchy of
trusted systems to provide mandatory access control.

     Example:  Where no categories are involved, systems with minimum
     clearance/maximum data sensitivity pairings of U/N and C/S have a risk
     index of 1 and thus require at least a class B1 system.

Some systems that operate in system high mode use mandatory access control for
added protection within the system high environment, even though the controls
are not relied upon to properly label and protect data passing out of the
system high environment.  There has also been a recommendation that mandatory
access controls (i.e., class B1 or higher systems) be used whenever data at two
or more sensitivity levels is being processed, even if everyone is fully
cleared, in order to reduce the likelihood of mixing data from files of higher
sensitivity with data of files of lower sensitivity and releasing the data at
the lower sensitivity.(17) These points reaffirm the fact that the classes
identified in the requirements are minimum values.

This report emphasizes that output from a system operating in system high mode
must be stamped with the sensitivity and category labels of the most sensitive
data in the system until the data is examined by a responsible individual and
its true sensitivity level and category are determined.  If a system can only
be trusted for system high operation, its labels cannot be assumed to
accurately reflect data sensitivity.  The use of division B or A systems does
not necessarily solve this problem.

     Example: Take the case of a system in an open security environment that
     processes data classified up to Secret and supports some users who have
     only Confidential clearances.  According to the requirements, such a
     situation represents a risk index of 1 and thus requires a class B1
     system.  Some of the reports produced by the system might be unclassified.
     Nevertheless, such a report cannot be forwarded to uncleared people until
     the report is examined and its contents determined to be unclassified.
     Without the existence of such a review, the recipient becomes an indirect
     user and the risk index becomes 3. A class B1 system no longer provides
                                      16


     adequate data protection. Therefore, even though the system is trusted to
     properly label and segregate Confidential and Secret data, it is not
     simultaneously trusted to properly label and segregate unclassified data.

Systems with a risk index of 2 require more trust than can be placed in a class
B1 system.  Where no categories are involved, class B2 systems are the minimum
required for minimum clearance/maximum data sensitivity pairings such as U/C,
N/S and S/TS, all of which have a risk index of 2.  Class B2 systems have
several characteristics that justify this increased trust:

     a.  The Trusted Computing Base (TCB) is carefully structured into
         protection-critical and nonprotection-critical elements.  The TCB
         interface is well defined, and the TCB design and implementation
         enable it to be subjected to more thorough testing and more complete
         review.

     b.  The TCB is based on a clearly defined and documented formal security
         policy model that requires the discretionary and mandatory access
         control enforcement found in class B1 systems to be extended to all
         subjects and objects in the system. That is, security rules are more
         rigorously defined and have a greater influence on system design.

     c.  Authentication mechanisms are strengthened, making it more difficult
         for a malicious user or malicious software to improperly intervene in
         the login process.

     d.  Stringent configuration management controls are imposed for life-cycle
         assurance.

     e.  Covert channels are addressed to defend against their exploitation by
         malicious software.(18) A covert channel is a communication channel
         that violates the system's security policy.

Because of these and other characteristics, class B2 systems are relatively
resistant to penetration.  A risk index of 3, however, requires greater
resistance to penetration.  Class B3 systems are highly resistant to
penetration and are the minimum required for situations with a risk index of 3
such as those with minimum clearance/maximum data sensitivity pairings of U/S,
C/TS, S/TS with one category, and TS(BI)/TS with multiple categories.
Characteristics that distinguish class B3 from class B2 systems include the
following:

     a.  The TCB must satisfy the reference monitor requirements that it
         mediate all accesses of subjects to objects, be tamperproof, and be
         small enough to be subjected to analysis and tests.  Much effort is
         thus spent on minimizing TCB complexity.

     b.  Enhancements are made to system audit mechanisms and system
         recovery procedures.

     c.  Security management functions are performed by a security
         administrator rather than a system administrator.
                              17


While several new features have been added to class B3 systems, the major
distinction between class B2 and class B3 systems is the increased trust that
can be placed in the TCB of a class B3 system.  The most trustworthy systems
defined by the Criteria are class Al systems.  Class Al systems can be used for
situations with a risk index of 4, such as the following minimum
clearance/maximum data sensitivity pairings: N/TS, C/TS with one category, and
S/TS with multiple categories.  Class Al systems are functionally equivalent to
those in class B3 in that no additional architectural features or policy
requirements are added.  The distinguishing characteristic of systems in this
class is the analysis derived from formal design specification and verification
techniques and the resulting high degree of assurance that the TCB is correctly
implemented.  In addition, more stringent configuration management is required
and procedures are established for securely distributing the system to sites.

The capability to support systems in open security environments with a risk
index of 5 or greater is considered to be beyond the state-of-the-art.  For
example, technology today does not provide adequate security protection for an
open environment with uncleared users and Top Secret data.  Such environments
must rely on physical, personnel, or information security solutions or on such
technical approaches as periods processing.
                             19




4.0 COMPUTER SECURITY REQUIREMENTS FOR CLOSED
    SECURITY ENVIRONMENTS


This section discusses the application of the Computer Security Requirements to
systems in closed security environments.  A closed security environment is one
in which system applications are adequately protected against the insertion of
malicious logic.  Appendix C describes the closed security environment in more
detail.  The main threat to the TCB from applications in this environment is
not malicious logic, but logic containing unintentional errors that might be
exploited for malicious purposes.  As system quality reaches class B2, the
threat from logic containing unintentional errors is substantially reduced.
This reduction permits the placement of increased trust in class B2 systems due
to (1) the increased attention that B2 systems give to the interface between
the application programs and the operating system, (2) the formation of a more
centralized TCB, and (3) the elimination of penetration flaws.  Nevertheless,
the evaluation class of B1 assigned for open security environments cannot be
reduced to a class C1 or C2 in closed security environments because of the
requirement for mandatory access controls.

Table 6 presents the minimum evaluation class identified in the Computer
Security Requirements for different risk indices in a closed security
environment.  The principal difference between the requirements for the open
and closed environments is that in closed environments class B2 systems are
trusted to provide sufficient protection for a greater risk index.  As a
result, environments are supportable that were not supportable in open
situations (e.g., uncleared user on a system processing Top Secret data).
Table 7 illustrates the requirements' impact on individual minimum
clearance/maximum data sensitivity pairings.
                                    20




                             TABLE 6

COMPUTER SECURITY      REQUIREMENTS FOR CLOSED SECURITY
                       ENVIRONMENTS





  RISK INDEX         SECURITY OPERATING       MINIMUM CRITERIA
                            MODE                   CLASS1

        0                  Dedicated             No Prescribed
                                                  Minimum 2
        0                 System High                C23
        1        Limited Access, Controlled,         B14
                 Compartmented, Multilevel
        2        Limited Access, Controlled          B2
                 Compartmented, Multilevel
        3              Controlled, Multilevel        B2
        4                  Multilevel                B3
        5                  Multilevel                A1
        6                  Multilevel                *
        7                  Multilevel                *





1 The asterisk (*) indicates that computer protection for environments with
that risk index are considered to be beyond the state of current technology.
Such environments must augment technical protection with physical, personnel,
and/or administrative safeguards.

2 Although there is no prescribed minimum, the integrity and denial of service
requirements of many systems warrant at least class C1 protection.

3 If the system processes sensitive or classified data, at least a class C2
system is required.  If the system does not process sensitive or classified
data, a class C1 system is sufficient.

-Where a system processes classified or compartmented data and some users do
not have at least a Confidential clearance, at least a class B2 system is
required.   
                                21


                             TABLE 7
      SECURITY INDEX MATRIX FOR CLOSED SECURITY ENVIRONMENTS1

                            Maximum Data Sensitivity

                        U     N     C     S     TS    1C    MC

                  U     C1    B1    B2    B2    A1    *     *
   Minimum        N     C1    C2    B1    B2    B3    A1    *
   Clearance or   C     C1    C2    C2    B1    B2    B3    A1
   Author-        S     C1    C2    C2    C2    B2    B2    B3
   ization      TS(BI)  C1    C2    C2    C2    C2    B2    B2
   of System   TS(SBI)  C1    C2    C2    C2    C2    B1    B2
   Users         1C     C1    C2    C2    C2    C2    C22   B13
                 MC     C1    C2    C2    C2    C2    C22   C22




1 Environments for which either C1 or C2 is given are for systems that operate
in system high mode.  There is no prescribed minimum level of trust for systems
that operate in dedicated mode.  Categories are ignored in the matrix, except
for their inclusion at the TS level.

2 It is assumed that all users are authorized access to all categories on the
system. If some users are not authorized for all categories, then a class B1
system or higher is required.

3 Where there are more than two categories, at least a class B2 system is
required.

U = Uncleared or Unclassified
N = Not Cleared but Authorized Access to Sensitive UnclassiFied Information or
Not Classified but Sensitive
C = Confidential
S = Secret
TS = Top Secret
TS(BI) = Top Secret (Background Investigation)
TS (SBI) = Top Secret (Special Background Investigation)
1C = One Category
MC = Multiple Categories
                                       23



                   APPENDIX A

          SUMMARY OF CRITERIA The DoD Trusted Computer System Evaluation
Criteria(4) provides a basis for specifying security requirements and a metric
with which to evaluate the degree of trust that can be placed in a computer
system.  These criteria are hierarchically ordered into a series of evaluation
classes where each class embodies an increasing amount of trust.  A summary of
each evaluation class is presented in this appendix.  This summary should not
be used in place of the Criteria.  The evaluation criteria are based on six
fundamental security requirements that deal with controlling access to
information.  These requirements can be summarized as follows:

   a. Security policy--There must be an explicit and well-defined security
      policy enforced by the system.

   b. Marking--Access control labels must be associated with objects.

   c. Identification--Individual subjects must be identified.

   d. Accountability--Audit information must be selectively kept and
      protected so that actions affecting security can be traced to the
      responsible party.

   e. Assurance--The computer system must contain hardware and software
      mechanisms that can be evaluated independently to provide sufficient
      assurance that the system enforces the security policy.

   f. Continuous protection--The trusted mechanisms that enforce the
      security policy must be protected continuously against tampering and
      unauthorized changes.

The evaluation criteria are divided into four divisions--D, C, B, and A;
divisions C, B, and A are further subdivided into classes.  Division D
represents minimal protection, and class A1 is the most trustworthy and
desirable from a computer security point of view.

The following overviews are excerpts from the Criteria:

   Division D: Minimal Protection. This division contains only one class. It is
reserved for those systems that have been evaluated but fail to meet the
requirements for a higher evaluation class.

   Division C: Discretionary Protection. Classes in this division provide for
discretionary (need-to-know) protection and accountability of subjects and the
actions they initiate, through inclusion of audit capabilities.
                               24


     Class C1: Discretionary Security Protection.  The TCB of class C1 systems
nominally satisfies the discretionary security requirements by providing
separation of users and data.  It incorporates some form of, credible controls
capable of enforcing access limitations on an individual basis, i.e.,
ostensibly suitable for allowing users to be able to protect project or private
information and to keep other users from accidentally reading or destroying
their data.  The class C I environment is expected to be one of cooperating
users processing data at the same level(s) of sensitivity.

     Class C2: Controlled Access Protection. Systems in this class enforce a
more finely grained discretionary access control than class C1 systems, making
users individually accountable for their actions through logic procedures,
auditing of security-relevant events, and resources encapsulation.

     Division B: Mandatory Protection.  The notion of a TCB that preserves the
integrity of sensitivity labels and uses them to enforce a set of mandatory
access control rules is a major requirement in this division.  Systems in this
division must carry the sensitivity labels with major data structures in the
system.  The system developer also provides the security policy model on which
the TCB is based and furnishes a specification of the TCB.  Evidence must be
provided to demonstrate that the reference monitor concept has been
implemented.

     Class B1: Labeled Security Protection. Class B1 systems require all the
features required for class C2. In addition, an informal statement of the
security policy model, data labeling, and mandatory access control over named
subjects and objects must be present. The capability must exist for accurately
labeling exported information. Any flaws identified by testing must be removed.

     Class B2: Structured Protection.  In class B2 systems, the TCB is based on
a clearly defined and documented formal security policy model that requires the
discretionary and mandatory access control enforcement found in B1 systems be
extended to all subjects and objects in the system.  In addition, covert
channels are addressed.  The TCB must be carefully structured into
protection-critical and nonprotection-critical elements.  The TCB interface is
well defined and the TCB design and implementation enable it to be subjected to
more thorough testing and more complete review.  Authentication mechanisms are
strengthened, trusted facility management is provided in the form of support
for systems administrator and operator functions, and stringent configuration
management controls are imposed.  The system is relatively resistant to
penetration.

     Class B3: Security Domains. The class B3 TCB must satisfy the reference
monitor requirements that it mediate all accesses of subjects to objects, be
tamperproof, and be small enough to be subjected to analysis and tests. To this
end, the TCB is structured to exclude code not essential to security policy
enforcement, with significant software engineering during TCB design and
implementation directed toward minimizing its complexity.  A security
administrator is supported, audit mechanisms are expanded to signal security-
relevant events, and system recovery procedures are required. The system is
highly resistant to penetration.

     Division A: Verified Protection. This division is characterized by the use
of formal security verification methods to assure that the mandatory and
                               25


discretionary security controls employed in the system can effectively protect
the classified and other sensitive information stored or processed by the
system.  Extensive documentation is required to demonstrate that the TCB meets
the security requirements in all aspects of design, development, and
implementation.

   Class A1: Verified Design.  Systems in class A1 are functionally equivalent
to those in class B3 in that no additional architectural features or policy
requirements have been added.  The distinguishing feature of systems in this
class is the analysis derived from formal design specification and verification
techniques and the resulting high degree of assurance that the TCB is correctly
implemented.  This assurance is developmental in nature starting with a formal
model of security policy and a formal top-level specification (FTLS) of the
design.  In keeping with the extensive design and development analysis of the
TCB required of systems in class A1, more stringent configuration management is
required and procedures are established for securely distributing the system to
sites.  A system security administrator is supported.
                                  27



                        APPENDIX B

DETAILED DESCRIPTION OF CLEARANCES AND DATA
               SENSITIVITIES
This appendix describes in detail the clearances and data sensitivities (e.g.,
classification) introduced in the body of the report.

B.1 Clearances

This section defines increasing levels of clearance or authorization of system
users. System users include not only those users with direct connections to the
system but also those users without direct connections who might receive output
or generate input that is not reliably reviewed for classification by a
responsible
individual.

   a. Uncleared (U)--Personnel with no clearance or authorization.
      Permitted access to any information for which there are no specified
      controls, such as openly published information.

   b. Unclassified Information (N)--Personnel who are authorized access to
      sensitive unclassified (e.g., For Official Use Only (FOUO)) information,
      either by an explicit official authorization or by an implicit
      authorization derived from official assignments or responsibilities.(15)

   c. Confidential Clearance (C)--Requires U.S. citizenship and typically
      some limited records checking.(19) In some cases, a National Agency
      Check (NAC) is required (e.g., for U.S. citizens employed by colleges or
      universities).(20)

   d. Secret Clearance (S)--Typically requires a NAC, which consists of
      searching the Federal Bureau of Investigation fingerprint and
      investigative files and the Defense Central Index of Investigations.(19)
      In some cases, further investigation is required.

   e. Top Secret Clearance based on a current Background Investigation
      (TS(BI))--Requires an investigation that consists of a NAC, personal
      contacts, record searches, and written inquiries. A B1 typically
      includes an investigation extending back 5 years, often with a spot
      check investigation extending back 15 years.(19)

   f. Top Secret Clearance based on a current Special Background
      Investigation (TS(SBI))--Requires an investigation that, in addition to
      the investigation for a B1, includes additional checks on the subject's
      immediate family (if foreign born) and spouse and neighborhood
      investigations to verify each of the subject's former residences in the
      United States where he resided six months or more. An SBI typically
      includes an investigation extending back 15 years.(19)
                                 28


     g. One category (1C)1 - In addition to a TS(SBI) clearance, written
        authorization for access to one category of information is required.
        Authorizations are the access rights granted to a user by a responsible
        individual (e.g., security officer).

    h.  Multiple categories (MC)' - In addition to TS(SBI) clearance, written
        authorization for access to multiple categories of information is
        required.

The extent of investigation required for a particular clearance varies based
both on the background of the individual under investigation and on derogatory
or questionable information disclosed during the investigation.  Identical
clearances are assumed to be equivalent, however, despite differences in the
amount of investigation peformed.

Individuals from non-DoD agencies might be issued DoD clearances if the
clearance obtained in their agency can be equated to a DoD clearance.  For
example, the "Q" and "L" clearances granted by both the Department of Energy
and the Nuclear Regulatory Commission are considered acceptable for issuance of
a DoD industrial personnel security clearance.(20) The "Q" clearance is
considered an authoritative basis for a DoD Top Secret clearance (based on a
B1) and the "L" clearance is considered an authoritative basis for a DoD Secret
clearance.(20)

Foreign individuals might be granted access to classified U.S.  information
although they do not have a U.S.  clearance.  Access to classified information
by foreign nationals, foreign governments, international organizations, and
immigrant aliens is addressed by National Disclosure Policy, DoD Directive
5230.11, and DoD Regulation 5200.I-R.(3,21,22) The minimum user clearance
rating table applies in such cases if the foreign clearance can be equated to
one of the clearance or authorization levels in the table.

B.2 Data Sensitivities

Increasing levels of data sensitivity are defined as follows:

     a. Unclassified (U)--Data that is not sensitive or classified:  publicly
        releasable information within a computer system. Note that such data
        might still require discretionary access controls to protect it from
        accidental destruction.

     b. Not Classified but Sensitive (N)--Unclassified but sensitive data. Much
        of this is FOUO data, which is that unclassified data that is exempt
        from release under the Freedom of Information Act.(15) This includes
        data such as the following:

        I.  Manuals for DoD investigators or auditors.


1 These are actually authorizations rather than clearance levels, but they are
included here to emphasize their importance.
                               29


     2. Examination questions and answers used in determination of the
        qualification of candidates for employment or promotion.

     3. Data that a statute specifically exempts from disclosure, such as
        Patent Secrecy data.(23)

     4. Data containing trade secrets or commercial or financial
        information.

     5. Data containing internal advice or recommendations that reflect
        the decision-making process of an agency.(24)

     6. Data in personnel, medical, or other files that, if disclosed, would
        result in an invasion of personal privacy.(25)

     7. Investigative records.

        DoD Directive 5400.7 prohibits any material other than that cited
        in FOI Act exemptions from being considered or marked
        FOUO.(15) One other form of unclassified sensitive data is that
        pertaining to unclassified technology with military application.(16)
        This refers primarily to documents that are controlled under the
        Scientific and Technical Information Program or acquired under
        the Defense Technical Data Management Program.(26,27) In
        addition to specific requirements for protection of particular forms
        of unclassified sensitive data, there are two general mandates. The
        first is Title 18, U.S. Code 1905, which makes it unlawful for any
        office or employee of the U.S. Government to disclose information
        of an official nature except as provided by law, including when such
        information is in the form of data handled by computer
        systems.(28) Official data is data that is owned by, produced by or
        for, or is under the control of the DoD. The second is Office of
        Management and Budget (OMB) Circular A-71, Transmittal
        Memorandum Number I, which establishes requirements for
        Federal agencies to protect sensitive data.(30)

c.   Confidential (C)--Applied to information, the unauthorized disclosure of
     which reasonably could be expected to cause damage to the national
     security.(3)

d.   Secret (S)--Applied to information, the unauthorized disclosure of which
     reasonably could be expected to cause serious damage to the national
     security.(3)

e.   Top Secret (TS)--Applied to information, the unauthorized disclosure of
     which reasonably could be expected to cause exceptionally grave
     damage to the national security.(3)
                                     30


     f.  One Category (1C)2--Applied to Top Secret Special Intelligence
        information (e.g., Sensitive Compartmented Information (SCI) or
        operational information (e.g., Single Integrated Operational
        Plan/Extremely Sensitive Information (SIOP/ESI)) that requires
        special controls for restrictive handling.(3) Access to such
        information requires authorization by the office responsible for the
        particular compartment.  Compartments also exist at the C and 5 levels
        (see the discussion below).

     g.  Multiple Categories (MC)2--Applied to Top Secret Special Intelligence
        or operational information that requires special controls for
        restrictive handling.  This sensitivity level differs from the 1C level
        only in that there are multiple compartments involved.  The number can
        vary from two to many, with corresponding increases in the risk
        involved.

Data sensitivity groupings are not limited to the hierarchical levels discussed
in Section B.2.  Nonhierarchical sensitivity categories such as NOFORN and
PROPIN are also used.(14) Compartmented information is also included under the
term sensitivity categories, as is information revealing sensitive intelligence
sources and methods.  Other sources of sensitivity categories include (a) the
Atomic Energy Act of 1954, (b) procedures based on International Treaty
requirements, and (c) programs for the collection of foreign intelligence or
under the jurisdiction of the National Foreign Intelligence Advisory Board or
the National Communications Security Subcommittee.(11,32,33,34,35) Such
nonhierarchical sensitivity categories can occur at each hierarchical
sensitivity level.

















2 These are actually categories rather than classification levels.  They are
included here to emphasize their importance.
                                     31



                   APPENDIX C

          ENVIRONMENTAL TYPES The amount of computer security required in a
system depends not only on the risk index (Section 2) but also on the nature of
the environment.  The two environmental types of systems defined in this
document are based on whether the applications that are processed by the TCB
are adequately protected against the insertion of malicious logic.  A system
whose applications are not adequately protected is referred to as being in an
open environment.  If the applications are adequately protected, the system is
in a closed environment.  The presumption is that systems in open environments
are more likely to have malicious application than systems in closed
environments.  Most systems are in open environments.

Before defining the two environmental categories in more detail, it is
necessary to define several terms.

   a. Environment. The aggregate of external circumstances, conditions,
      and objects that affect the development, operation, and maintenance of
      a system.

   b. Application. Those portions of a system, including portions of the
      operating system, that are not responsible for enforcing the systems
      security policy.

   c. Malicious Logic. Hardware, software, or firmware that is intentionally
      included for the purpose of causing loss or harm (e.g., Trojan horses).

   d. Configuration Control. Management of changes made to a system's
      hardware, software, firmware, and documentation throughout the
      development and operational life of the system.

C.1 Open Security Environment

Based on these definitions, an open security environment includes those systems
in which either of the following conditions holds true:

   a. Application developers (including maintainers) do not have sufficient
      clearance (or authorization) to provide an acceptable presumption that
      they have not introduced malicious logic. Sufficient clearance is
      defined as follows: where the maximum classification of data to be
      processed is Confidential or below, developers are cleared and
      authorized to the same level as the most sensitive data; where the
      maximum classification of data to be processed is Secret or above,
      developers have at least a Secret clearance.

   b. Configuration control does not provide sufficient assurance that
      applications are protected against the introduction of malicious logic
      prior to or during the operation of system applications.
                                    32


Configuration control, by the broad definition above, encompasses all factors
associated with the management of changes to a system.  For example, it
includes the factor that the application's user interface might present a
sufficiently extensive set of user capabilities such that the user cannot be
prevented from entering malicious logic through the interface itself.

In an open security environment, the malicious application logic that is
assumed to be present can attack the TCB in two ways.  First, it can attempt to
thwart TCB controls and thereby "penetrate" the system.  Secondly, it can
exploit covert channels that might exist in the TCB.  This distinction is
important in understanding the threat and how it is addressed by the features
and assurances in the Criteria.

C.2 Closed Security Environment

A closed security environment includes those systems in which both of the
following conditions hold true:

     a. Applications developers (including maintainers) have sufficient
        clearances and authorizations to provide an acceptable presumption
        that they have not introduced malicious logic.

     b. Configuration control provides sufficient assurance that applications
        are protected against the introduction of malicious logic prior to and
        during the operation of system applications.

Clearances are required for assurance against malicious applications logic
because there are few other tools for assessing the security-relevant behavior
of application hardware and software.  On the other hand, several assurance
requirements from the Criteria help to provide confidence that the TCB does not
contain malicious logic.  These assurance requirements include extensive
functional testing, penetration testing, and correspondence mapping between a
security model and the design.  Application logic typically does not have such
stringent assurance requirements.  Indeed, typically it is not practical to
build all application software to the same standards of quality required for
security software.

The configuration control condition implicitly includes the requirement that
users be provided a sufficiently limited set of capabilities to pose an
acceptably low risk of entering malicious logic.  Examples of systems with such
restricted interfaces might include those that offer no data sharing services
and permit the user only to execute predefined processes that run on his
behalf, such as message handlers, transaction processors, and security
"filters" or "guards."
                                  33



                    GLOSSARY
For additional definitions, refer to the Glossary in the DoD Trusted Computer
System Evaluation Criteria.(4)

Application
   Those portions of a system, including portions of the operating system, that
   are not responsible for enforcing the security policy.

Category
   A grouping of classified or unclassified but sensitive information, to which
   an additional restrictive label is applied (e.g., proprietary, compartmented
   information).

Classification
   A determination that information requires, in the interest of national
   security, a specific degree of protection against unauthorized disclosure
   together with a designation signifying that such a determination has been
   made. (Adapted from DoD Regulation 5200.I-R.)(3) Data classification is
   used along with categories in the calculation of risk index.

Closed Security Environment
   An environment that includes those systems in which both of the following
   conditions hold true:

   a. Application developers (including maintainers) have sufficient
      clearances and authorizations to provide an acceptable presumption
      that they have not introduced malicious logic. Sufficient clearance is
      defined as follows: where the maximum classification of data to be
      processed is Confidential or below, developers are cleared and
      authorized to the same level as the most sensitive data; where the
      maximum classification of data to be processed is Secret or above,
      developers have at least a Secret clearance.

   b. Configuration control provides sufficient assurance that applications
      are protected against the introduction of malicious logic prior to and
      during operation of system applications.

Compartmented Information
   Any information for which the responsible Office of Primary Interest (OPI)
   requires an individual needing access to that information to possess a
   special authorization.

Configuration Control
   Management of changes made to a system's hardware, software, firmware,
   and documentation throughout the developmental and operational life of
   the system.

Covert Channel
   A communications channel that allows a process to transfer information in
   a manner that violates the system's security policy.(4)
                                34


Discretionary Access Control
   A means of restricting access to objects based on the identity of subjects
   and/or groups to which they belong. The controls are discretionary in the
   sense that a subject with a certain access permission is capable of passing
   that permission (perhaps indirectly) on to any other subject.(4)

Environment
   The aggregate of external circumstances, conditions, and objects that affect
   the development, operation, and maintenance of a system. (See Open
   Security Environment and Closed Security Environment.)

Label
   Apiece of information that represents the security level of an object and
   that describes the sensitivity of the information in the object.

Malicious Logic
   Hardware, software, or firmware that is intentionally included in a system
   for the purpose of causing loss or harm.

Mandatory Access Control
   A means of restricting access to objects based on the sensitivity (as
   represented by a label) of the information contained in the objects and the
   formal authorization (i.e., clearance) of subjects to access information of
   such sensitivity.(4)

Need-To-Know
   A determination made by the processor of sensitive information that a
   prospective recipient, in the interest of national security, has a
   requirement for access to, knowledge of, or possession of the sensitive
   information in order to perform official tasks or services.  (Adapted from
   DoD Regulation 5220.22-R.)(20)

Open Security Environment
   An environment that includes those systems in which one of the following
   conditions holds true:

   a. Application developers (including maintainers) do not have sufficient
      clearance or authorization to provide an acceptable presumption that
      they have not introduced malicious logic. (See the definition of Closed
      Security Environment for an explanation of sufficient clearance.)
   b. Configuration control does not provide sufficient assurance that
      applications are protected against the introduction of malicious logic
      prior to and during the operation of system applications.

Risk Index
   The disparity between the minimum clearance or authorization of system
   users and the maximum classification of data processed by the system.

Sensitive Information
   Information that, as determined by a competent authority, must be
   protected because its unauthorized disclosure, alteration, loss, or
                                 35


     destruction will at least cause perceivable damage to someone or
     something.(4)

System
     An assembly of computer hardware, software, and firmware configured for
     the purpose of classifying, sorting, calculating, computing, summarizing,
     transmitting and receiving, storing and retrieving data with a minimum of
     human intervention.

System Users
     Users with direct connections to the system and also those individuals
     without direct connections who receive output or generate input that is
     not reliably reviewed for classification by a responsible individual.  The
     clearance of system users is used in the calculation of the risk index.
                                   37



                     ACRONYMS
A1       An evaluation class requiring a verified design
ADP      Automated Data Processing
ADPS     Automated Data Processing System
AFSC     Air Force Systems Command

B1       An Evaluation class requiring labeled security protection
B2       An Evaluation class requiring structured protection
B3       An evaluation class requiring security domains
BI       Background Investigation

C        Confidential
C1       An evaluation class requiring discretionary access protection
C2       An evaluation class requiring controlled access protection
CI       Compartmented Information
CSC      Computer Security Center
COMINT   Communications Intelligence

DCI      Director of Central Intelligence
DCID     Director of Central Intelligence Directive
DIAM     Defense Intelligence Agency Manual
DIS      Defense Investigative Service
DoD      Department of Defense
DoDCSC   Department of Defense Computer Security Center

ESD      Electronic Systems Division

FOI      Freedom of Information
FOUO     For Official Use Only
FTLS     Formal Top-Level Specification

IEEE     Institute of Electrical and Electronics Engineers

L        A personnel security clearance granted by the Department of Energy
         and the Nuclear Regulatory Commission

MC       Multiple Compartments

N        Not Cleared but Authorized Access to Sensitive Unclassified
         Information or Not Classified but Sensitive
NAC      National Agency Check
NATO     North Atlantic Treaty Organization
NOFORN   Not Releasable to Foreign Nationals
NSA      National Security Agency
NSA/CSS  National Security Agency/Central Security Service
NTIS     National Technical Information Service

OMB      Office of Management and Budget
OPI      Office of Primary Interest
OPNAV    Office of the Chief of Naval Operations
OSD      Office of the Secretary of Defense

PRO PIN  Caution--Proprietary Information Involved
                              38



Q         A personnel security clearance granted by the Department of Energy
                   and the Nuclear Regulatory Commission

S         Secret
SBI       Special Background Investigation
SCI       Sensitive Compartmented Information
SIOP      Single Integrated Operational Plan
SIOP-ESI  Single Integrated Operational Plan--Extremely Sensitive Information
SM        Staff Memorandum
STD       Standard

TCB       Trusted Computing Base
TS        Top Secret

U         Uncleared or Unclassified
U.S.      United States

IC        One Compartment
                                  39



                   REFERENCES
1. DoD Computer Security Center, Computer Security Requirements --
   Guidance for Applying the Department of Defense Trusted Computer
   System Evaluation Criteria in Specific Environments, CSC-STD-003-85, 25
   June 1985.

2. DoD Directive 5215.1, "Computer Security Evaluation Center," 25 October
   1982.

3. DoD Regulation 5200.1-R, Information Security Program Regulation,
   August 1982.

4. DoD Computer Security Center, DoD Trusted Computer System Evaluation
   Criteria, CSC-STD-001-83, IS August 1983.

5.  Army Regulation 380-380, Automated Systems Security, IS June 1979.

6. Office of the Chief of Naval Operations (OPNAV) Instruction 5239. IA
   "Department of the Navy Automatic Data Processing Security Program," 3'
   August 1982.

7. Air Force Regulation 205-16, Automated Data Processing System (ADPS)
   Security Policy, Procedures, and Responsibilities, I August 1984.

8. Marine Corps Order P5510.14, Marine Corps Automatic Data Processing
   (ADP) Security Manual, 4 November 1982.

9. DoD Directive 5220.22, "DoD Industrial Security Program," 8 December
   1980.

10. DoD Directive 5200.28, "Security Requirements for Automatic Data
   Processing Systems," 29 April 1978.

11. DoD Manual 5200.28-M, ADP Security Manual - Techniques and
   Procedures for Implementing, Deactivating, Testing, and Evaluating
   Secure Resource-Sharing ADP Systems, 25 June 1979.

12. Defense Intelligence Agency Manual (DIAM) 50-4, "Security of
   Compartmented Computer Operations (U)," 24 June 1980,
   CONFIDENTIAL.

13. National Security Agency/Central Security Service (NSA/CSS) Directive
   10-27, "Security Requirements for Automatic Data Processing (ADP)
   Systems," 29 March 1984.

14.  Director of Central Intelligence Directive (DCID), "Security Controls on
   the Dissemination of Intelligence Information (U)," 7 January 1984,
   CONFIDENTIAL.
                                   40


15.  DoD Directive 5400.7, "DoD Freedom of Information Act Program," 24
     April 1980.

16.  Office of the Secretary of Defense (OSD) Memorandum, "Control of
     Unclassified Technology with Military Application," 18 October 1983.

17.  Anderson, James P., "An Approach to Identification of Minimum TCB
     Requirements for Various Threat/Risk Environments," Proceedings of the
     1983 IEEE Symposium on Security and Privacy, 24-27 April 1983.

18.  Schell, Roger R., "Evaluating Security Properties of Systems," Proceedings
     of the IEEE Symposium on Security and Privacy, 24-27 April 1983.

19.  Defense Investigative Service (DIS) Manual 20-1, Manual for Personnel
     Security Investigations, 30 January 1981.

20.  DoD Regulation 5220.22-R, Industrial Security Regulation, January 1983.

21.  National Disclosure Policy - I, 9 September 1981.

22.  DoD Directive 5230.11, "Disclosure of Classified Military Information to
     Foreign Governments and International Organizations," 31 December
     1976.

23.  Title 35, United States Code, Section 181-188, "Patent Secrecy."

24.  Title 5, United States Code, Section 551, "Administrative Procedures Act."

25.  DoD Directive 5400.11, "Department of Defense Privacy Program," 9 June
     1982.

26.  DoD Directive 5100.36, "Defense Scientific and Technical Information
     Program," 2 October 1981.

27.  DoD Directive 5010.12, "Management of Technical Data," 5 December
     1968.

28.  Title 18, United States Code, Section 1905, "Disclosure of Confidential
     Information Generally."

29.  DoD Directive 5200.1, "DoD Information Security Program," 7 June 1982.

30.  Office of Management and Budget (OMB) Circular No. A-71, Transmittal
     Memorandum No. I, "Security of Federal Automated Information Systems,
     27 July 1978.

31.  Joint Chiefs of Staff (JCS) Staff Memorandum (SM) 313-83, Safeguarding
     the Single Integrated Operational Plan (SIOP) (U), 10 May 1983, SECRET.


                                  41

32.  "Security Policy on Intelligence Information in Automated Systems and
     Networks (U)," Promulgated by the DCI, 4 January 1983,  CONFIDENTIAL.

33.  Director of Central Intelligence Computer Security Manual (U), Prepared
     for the DCI by the Security Committee, 4 January 1983, CONFIDENTIAL.

34.  DoD Directive 5210.2, "Access to and Dissemination of Restricted Data," 12
     January 1978.

35.  DoD Instruction C-5210.21, "Implementation of NATO Security Procedure
     (U)," 17 December 1973, CONFIDENTIAL.