home *** CD-ROM | disk | FTP | other *** search
Text File | 1995-09-15 | 155.9 KB | 3,077 lines |
- COMPUTER SECURITY ACT OF 1987
-
-
-
- June 11, 1987 - Ordered to be printed
-
- Mr. Roe, from the Committee on Science, Space, and Technology,
- submitted the following
-
-
- REPORT
-
- [To accompany H.R. 145 which on January 6, 1987, was referred
- jointly to the Committee on Science, Space, and Technology and the
- Committee on Government Operations]
-
- [Including cost estimate of the Congressional Budget Office]
-
- The Committee on Science, Space, and Technology, to whom was
- referred the bill (H.R. 145) to provide for a computer standards
- program within the National Bureau of Standards, to provide for
- Government-wide computer security, and to provide for the training
- in security matters of persons who are involved in the management,
- operation, and use of Federal Computer systems, and for other
- purposes, having considered the same, report favorably thereon with
- an amendment and recommend that the bill as amended do pass.
-
-
-
-
- CONTENTS
-
- Original
- Page
-
- I. Background 6
- II. Issues raised during the hearings 9
- III. Need for legislation 23
- IV. Explanation of the bill 23
- V. Sectional analysis 31
- VI. Effect of legislation on inflation 37
- VII. Committee oversight findings and
- recommendation 37
- VIII. Oversight findings and recommendations by
- the Committee on Government Operations 37
- IX. Budget analysis and projection 37
- X. Congressional Budget Office cost estimate 37
- XI. Administration position 41
- XII. Changes in existing law made by the bill,
- as reported 41
- XIII. Committee recommendation 47
-
-
- The amendment is as follows:
-
- Strike out all after the enacting clause and insert in lieu
- thereof the following:
-
-
- SECTION 1. SHORT TITLE
-
- The Act may be cited as the "Computer Security Act of 1987".
-
-
- SEC. 2 PURPOSE
-
- (a) IN GENERAL.-The Congress declares that improving the
- security and privacy of sensitive information in Federal computer
- systems is in the public interest, and hereby creates a means for
- establishing minimum acceptable security practices for such
- systems, without limiting the scope of security measures already
- planned or in use.
-
- (b) SPECIFIC PURPOSES.-The purposes of this Act are--
-
- (1) by amending the Act of March 3, 1901, to assign to the
- National Bureau of Standards responsibility for developing
- standards and guidelines for Federal computer systems, including
- responsibility for developing standards and guidelines needed to
- assure the cost-effective security and privacy of sensitive
- information in Federal computer systems, drawing on the technical
- advice and assistance (including work products) of the National
- Security Agency, where appropriate;
-
- (2) to provide for promulgation of such standards and
- guidelines by amending section 111(d) of the Federal Property and
- Administrative Services Act of 1949;
-
- (3) to require establishment of security plans by all
- operators of Federal computer systems that contain sensitive
- information; and
-
- (4) to require mandatory periodic training for all persons
- involved in management, use, or operation of Federal computer
- systems that contain sensitive information.
-
-
- SEC. 3. ESTABLISHMENT OF COMPUTER STANDARDS PROGRAM.
-
- The Act of March 3, 1901, (15 U.S.C. 271-278h), is amended--
-
- (1) in section 2(f), by striking out "and" at the end of
- paragraph (18), by striking out the period at the end of paragraph
- (19) and inserting in lieu thereof: "; and", and by inserting
- after such paragraph the following:
-
- "(20) the study of computer systems (as that term is defined
- in section 20(d) of this Act) and their use to control machinery
- and processes.";
-
- (2) by redesignating section 20 as section 22, and by
- inserting after section 19 the following new sections:
- "SEC. 20. (a) The National Bureau of Standards shall--
-
- "(1) have the mission of developing standards, guidelines, and
- associated methods and techniques for computer systems;
-
- "(2) except as described in paragraph (3) of this subsection
- (relating to security standards), develop uniform standards and
- guidelines for Federal computer systems, except those systems
- excluded by section 2315 of title 10, United States Code, or
- section 3502(2) of title 44, United States Code.
-
- "(3) have responsibility within the Federal Government for
- developing technical, management, physical, and administrative
- standards and guidelines for the cost-effective security and
- privacy of sensitive information in Federal computer systems
- except--
-
- "(A) those systems excluded by section 2315 of title 10,
- United States Code, or section 3502(2) of title 44, United
- States Code; and
-
- "(B) those systems which are protected at all times by
- procedures established for information which has been
- specifically authorized under criteria established by an
- Executive Order or an Act of Congress to be kept secret in the
- interest of national defense or foreign policy, the primary
- purpose of which standards and guidelines shall be to control
- loss and unauthorized modification or disclosure of sensitive
- information in such systems and to prevent computer-related
- fraud and misuse;
-
- "(4) submit standards and guidelines developed pursuant to
- paragraphs (2) and (3) of this subsection, along with
- recommendations as to the extent to which these should be made
- compulsory and binding, to the Secretary of Commerce for
- promulgation under section 111(d) of the Federal Property and
- Administrative Services Act of 1949;
-
- "(5) develop guidelines for use by operators of Federal
- computer systems that contain sensitive information in training
- their employees in security awareness and accepted security
- practice, as required by section 5 of the Computer Security Act of
- 1987; and
-
- "(6) develop validation procedures for, and evaluate the
- effectiveness of, standards and guidelines developed pursuant to
- paragraphs (1), (2), and (3) of this subsection through research
- and liaison with other government and private agencies.
-
- "(b) In fulfilling subsection (a) of this section, the National
- Bureau of Standards is authorized--
-
- "(1) to assist the private sector, upon request, in using and
- applying the results of the programs and activities under this
- section;
-
- "(2) to make recommendations, as appropriate, to the
- Administrator of General Services on policies and regulations
- proposed pursuant to section 111(d) of the Federal Property and
- Administrative Services Act of 1949;
-
- "(3) as requested, to provide to operators of Federal computer
- systems technical assistance in implementing the standards and
- guidelines promulgated pursuant to section 111(d) of the Federal
- Property and Administrative Services Act of 1949;
-
- "(4) to assist, as appropriate, the Office of Personnel
- Management in developing regulations pertaining to training, as
- required by section 5 of the Computer Security Act of 1987;
-
- "(5) to perform research and to conduct studies, as needed,
- to determine the nature and extent of the vulnerabilities of, and
- to devise techniques for the cost effective security and privacy
- of sensitive information in Federal computer systems; and
-
- "(6) to coordinate closely with other agencies and offices
- (including, but not limited to, the Departments of Defense and
- Energy, the National Security Agency, the General Accounting
- Office, the Office of Technology Assessment, and the Office of
- Management and Budget)--
-
- "(A) to assure maximum use of all existing and planned
- programs, materials, studies, and reports relating to computer
- systems security and privacy, in order to avoid unnecessary
- and costly duplication of effort; and
- "(B) to assure, to the maximum extent feasible, that
- standards developed pursuant to subsection (a) (3) and (5) are
- consistent and compatible with standards and procedures
- developed for the protection of information in Federal
- computer systems which is authorized under criteria
- established by Executive order or an Act of Congress to be
- kept secret in the interest of national defense or foreign
- policy.
-
- "(c) For the purposes of--
-
- "(1) developing standards and guidelines for the protection
- of sensitive information in Federal computer systems under
- subsections (a)(1) and (a)(3), and
-
- "(2) performing research and conducting studies under
- subsection (b)(5), the National Bureau of Standards shall draw upon
- computer system technical security guidelines developed by the
- National Security Agency to the extent that the National Bureau of
- Standards determines that such guidelines are consistent with the
- requirements for protecting sensitive information in Federal
- computer systems.
-
- "(d) As used in this section--
-
- "(1) the term computer system'--
-
- "A) means any equipment or interconnected system or
- subsystems of equipment that is used in the automatic
- acquisition, storage, manipulation, management, movement,
- control, display, switching, interchange, transmission, or
- reception, of data or information; and
-
- "(B) includes--
-
- "(i) computers;
- "(ii) ancillary equipment;
- "(iii) software, firmware, and similar procedures;
- "(iv) services, including support services; and
- "(v) related resources as defined by regulations
- issued by the Administrator for General Services
- pursuant to section 111 of the Federal Property and
- Administrative Services Act of 1949;
-
- "(2) the term 'Federal computer system'--
-
- "(A) means a computer system operated by a Federal agency
- or by a contractor of a Federal agency or other organization
- that processes information (using a computer system) on behalf
- of the Federal Government to accomplish a Federal function;
- and
-
- "(B) includes automatic data processing equipment as that
- term is defined in section 111(a)(2) of the Federal Property
- and Administrative Services Act of 1949;
-
- "(3) the term 'operator of a Federal computer system'
- means a Federal agency, contractor of a Federal agency, or
- other organization that processes information using a computer
- system on behalf of the Federal Government to accomplish a
- Federal function;
-
- "(4) the term 'sensitive information' means any
- information, the loss, misuse, or unauthorized access to or
- modification of which could adversely affect the national
- interest or the conduct of Federal programs, or the privacy
- to which individuals are entitled under section 552a of title
- 5, United States Code (the Privacy Act), but which has not
- been specifically authorized under criteria established by an
- Executive order or an Act of Congress to be kept secret in the
- interest of national defense or foreign policy; and
-
- "(5) the term 'Federal agency' has the meaning given such
- term by section 3(b) of the Federal Property and
- Administrative Services Act of 1949.
-
- "SEC. 21. (a) There is hereby established a Computer System
- Security and Privacy Advisory Board within the Department of
- Commerce. The Secretary of Commerce shall appoint the chairman of
- the Board. The Board shall be composed of twelve additional
- members appointed by the Secretary of Commerce as follows:
-
- "(1) four members from outside the Federal Government who
- are eminent in the computer or telecommunications industry,
- at lease one of whom is representative of small or medium
- sized companies in such industries;
-
- "(2) four members from outside the Federal
- Government who are eminent in the fields of computer or
- telecommunications technology, or related disciplines,
- but who are not employed by or representative of a
- producer of computer or telecommunications equipment; and
-
- "(3) four members from the Federal Government who have
- computer systems management experience, including experience
- in computer systems security and privacy, at least one of whom
- shall be from the National Security Agency.
-
- "(b) The duties of the Board shall be--
-
- "(1) to identify emerging managerial, technical,
- administrative, and physical safeguard issues relative to
- computer systems security and privacy;
-
- "(2) to advise the Bureau of Standards and the Secretary
- of Commerce on security and privacy issues pertaining to
- Federal computer systems; and
-
- "(3) to report its findings to the Secretary of Commerce,
- the Director of the Office of Management and Budget, the
- Director of the National Security Agency, and the appropriate
- Committees of the Congress.
-
- "(c) The term of office of each member of the Board shall be four
- years, except that--
-
- "(1) of the initial members, three shall be appointed
- for terms of one year, three shall be appointed for terms of
- two years, three shall be appointed for terms of three years,
- and three shall be appointed for terms of four years; and
-
- "(2) any member appointed to fill a vacancy in the Board
- shall serve for the remainder of the term for which his
- predecessor was appointed.
-
- "(d) The Board shall not act in the absence of a quorum, which
- shall consist of seven members.
-
- "(e) Members of the Board, other than full-time employees of the
- Federal Government while attending meetings of such committees or
- while otherwise performing duties at the request of the Board
- Chairman while away from their homes or a regular place of
- business, may be allowed travel expenses in accordance with
- subchapter I of chapter 57 of title 5, United States Code.
-
- "(f) To provide the staff services necessary to assist the Board
- in carrying out its functions, the Board may utilize personnel from
- the National Bureau of Standards or any other agency of the Federal
- Government with the consent of the head of the agency.
-
- "(g) As used in this section, the terms 'computer system' and
- 'Federal computer system' have the meanings given in section 20(d)
- of this Act."; and
-
- "(3) by adding at the end thereof the following new section:
-
- "SEC. 23. This Act may be cited as the National Bureau of
- Standards Act."
-
-
- SEC. 4 AMENDMENT TO BROOKS ACT.
-
- Section 111(d) of the Federal Property and Administrative
- Services Act of 1949 (40 U.S.C. 759(d)) is amended to read as
- follows:
-
- "(d)(1) The Secretary of Commerce shall, on the basis of
- standards and guidelines developed by the National Bureau of
- Standards pursuant to section 20(a) (2) and (3) of the National
- Bureau of Standards Act, promulgate standards and guidelines
- pertaining to Federal computer systems, making such standards
- compulsory and binding to the extent to which the Secretary
- determines necessary to improve the efficiency of operation or
- security and privacy of Federal computer systems. The President
- may disapprove or modify such standards and guidelines if he
- determines such action to be in the public interest. The
- President's authority to disapprove or modify such standards and
- guidelines may not be delegated. Notice of such disapproval or
- modification shall be submitted promptly to the Committee on
- Government Operations of the House of Representatives and the
- Committee on Governmental Affairs of the Senate and shall be
- published promptly in the Federal Register. Upon receiving notice
- of such disapproval or modification, the Secretary of Commerce
- shall immediately rescind or modify such standards or guidelines
- as directed by the President.
-
- "(2) The head of a Federal agency may employ standards for the
- cost effective security and privacy of sensitive information in a
- Federal computer system within or under the supervision of that
- agency that ar more stringent than the standards promulgated by the
- Secretary of Commerce, if such standards contain, at a minimum, the
- provisions of those applicable standards made compulsory and
- binding by the Secretary of Commerce.
-
- "(3) The standards determined to be compulsory and binding may
- be waived by the Secretary of Commerce in writing upon a
- determination that compliance would adversely affect the
- accomplishment of the mission of an operator of a Federal computer
- system, or cause a major adverse financial impact on the operator
- which is not offset by government-wide savings. The Secretary may
- delegate to the head of one or more Federal agencies authority to
- waive such standards to the extent to which the Secretary
- determines such action to be necessary and desirable to allow for
- timely and effect implementation of Federal computer systems
- standards. The head of such agency may redelegate such authority
- only to a senior official designated pursuant to section 3506(b)
- of title 44, United States Code. Notice of each such waiver and
- delegation shall be transmitted promptly to the Committee on
- Government Operations of the House of Representatives and the
- Committee on Governmental Affairs of the Senate and shall be
- published promptly in the Federal Register.
-
- "(4) The Administrator shall revise the Federal information
- resources management regulations (41 CFR ch. 201) to be consistent
- with the standards and guidelines promulgated by the Secretary of
- Commerce under this subsection.
-
- "(5) As used in this subsection, the terms 'Federal computer
- system' and 'operator of a Federal computer system' have the
- meanings given in section 20(d) of the National Bureau of Standards
- Act.".
-
-
- SEC. 5. FEDERAL COMPUTER SYSTEM SECURITY TRAINING.
-
- (a) In General.--Each Federal agency shall provide for the
- mandatory periodic training in computer security awareness and
- accepted computer security practice of all employees who are
- involved with the management, use, or operation of each Federal
- computer system within or under the supervision of that agency.
- Such training shall be--
-
- (1) provided in accordance with the guidelines developed
- pursuant to section 20(a)(5) of the National Bureau of
- Standards Act (as added by section 3 of this Act), and in
- accordance with the regulations issued under subsection (c)
- of this section for Federal civilian employees; or
-
- (2) provided by an alternative training program approved by
- the head of that agency on the basis of a determination that
- the alternative training program is at least as effective in
- accomplishing the objectives of such guidelines and
- regulations.
-
- (b) TRAINING OBJECTIVES.--Training under this section shall be
- started within 60 days after the issuance of the regulations
- described in subsection (c). Such training shall be designed--
-
- (1) to enhance employees' awareness of the threats to and
- vulnerability of computer systems; and
-
- (2) to encourage the use of improved computer security
- practices.
-
- (c) REGULATIONS.--Within six months after the date of the
- enactment of this Act, the Director of the Office of Personnel
- Management shall issue regulations prescribing the procedures and
- scope of the training to be provided Federal civilian employees
- under subsection (a) and the manner in which such training is to
- be carried out.
-
-
- SEC. 6. ADDITIONAL RESPONSIBILITIES FOR COMPUTER SYSTEMS SECURITY
- AND PRIVACY.
-
- (a) IDENTIFICATION OF SYSTEMS THAT CONTAIN SENSITIVE INFORMATION-
- Within 6 months after the date of enactment of this Act, each
- Federal agency shall identify each Federal computer system, and
- system under development, which is within or under the supervision
- of that agency and which contains sensitive information.
-
- (b) SECURITY PLAN.--Within one year after the date of enactment
- of this Act, each such agency shall, consistent with the standards,
- guidelines, policies, and regulations prescribed pursuant to
- section 111(d) of the Federal Property and Administrative Services
- Act of 1949, establish a plan for the security and privacy of each
- Federal computer system identified by that agency pursuant to
- subsection (a) that is commensurate with the risk and magnitude or
- the harm resulting from the loss, misuse, or unauthorized access
- to or modification of the information contained in such system.
- Copies of each such plan shall be transmitted to the National
- Bureau of Standards and the National Security Agency for advice and
- comment. A summary of such plan shall be included in the agency's
- five-year plan required by section 3505 of title 44, United States
- Code. Such plan shall be subject to disapproval by the Director
- of the Office of Management and Budget. Such plan shall be revised
- annually as necessary.
-
-
- SEC. 7. DEFINITIONS.
-
- As used in this Act, the terms "computer system", "Federal
- computer system", "operator of a Federal computer system",
- "sensitive information", and "Federal agency" have the meanings
- given in section 20(d) of the National Bureau of Standards Act (as
- added by section 3 of this Act).
-
-
- SEC. 8. RULES OF CONSTRUCTION OF ACT.
-
- Nothing in this Act, or in any amendment made by this Act, shall
- be construed--
-
- (1) to constitute authority to withhold information sought
- pursuant to section 552 of title 5, United States Code; or
-
- (2) to authorize any Federal agency to limit, restrict,
- regulate, or control the collection, maintenance, disclosure, use,
- transfer, or sale of any information (regardless of the medium in
- which the information may be maintained) that is--
-
- (A) privately-owned information;
-
- (B) disclosable under section 552 of title 5, United
- States Code, or other law requiring or authorizing the
- public disclosure of information; or
-
- (C) public domain information.
-
- ***************************************************************
-
-
- I. BACKGROUND
-
- Computers and information systems have so permeated today's
- society that there is virtually no sector which does not rely
- heavily on their use. This includes the Federal Government, which
- currently has over 17,000 medium- and large-scale computers and
- will have almost 500,000 microcomputers by 1990, according to a
- 1985 report by the General Services Administration, entitled "ADP
- Management of Information Systems".
-
- The Federal Government is the largest single user of computers
- in the world. Its investment in automated systems technology is
- so large that about l.6 percent of the 1986 budget was spent on
- automated data processing (ADP) equipment and services, or more
- than 15 billion dollars. This budget, included ADP for defense and
- national security, education, national energy programs, social
- welfare, and tax problems.
-
- As the role of the Federal Government has become broader, the
- need to automate and the corresponding need to secure data also has
- grown. In recent years, Congress and the executive agencies have
- directed their attention to Federal computer systems in a number
- of areas, including investigating and commenting on their integrity
- and security. Both Section 111(f) of the Federal Property and
- Administrative Service Act of 1949 (as amended by the Brooks Act
- of 1965) and the Paperwork Reduction Act of 1980 represented
- attempts by Congress to address the issues of automating
- information in Federal agencies and creating an efficient method
- of storing and disseminating this information. In October 1984,
- Congress passed the first Federal computer crime legislation, the
- Counterfeit Access Device and Computer Fraud Act of 1984 (P.L. 98-
- 473). That law has been amended by the Computer Fraud and Abuse
- Act of 1986 (P.L. 99-474). This law prohibited "unauthorized
- access" into "Federal interest computers" affecting national
- security data, financial data, and other data stored in these
- computers. In addition, penalties were established for pirated
- "bulletin boards" containing information which might lead to the
- fraud or abuse of data in a computer.
-
- Within the Federal Government several agencies have been charged
- with the responsibility for establishing computer security controls
- and standards. The Office of Management and Budget (OMB) has
- overall responsibility for computer security policy. The General
- Services Administration (GSA) also issues regulations for physical
- security of computer facilities, and ensures that security hardware
- and software meet certain technological and fiscal specifications.
- In defense and national security, the National Security Agency
- (NSA) has traditionally been responsible for the security of
- classified information, including that processed by and stored
- within computers. Recently, NSA has been given the responsibility
- to establish and maintain technical standards for secure, or
- "trusted" computers. NSA does this through its administration of
- the Department of Defense (DOD) National Computer Security Center.
- NSA also will work with industries at the DOD Computer Security
- Center to develop security standards for private sector use.
-
- At the Department of Commerce, the National Bureau of Standards'
- (NBS) Institute of Computer Science and Technology (ICST) has
- developed computer and processing standards, such as the Data
- Encryption Standard (DES), which protects data transferred between
- automated information systems. The Federal Information Processing
- Standards (FIPS) developed by the ICST provide specific codes,
- language, procedures, and techniques for Federal and private sector
- information systems managers. Also at the Department of Commerce,
- the National Telecommunications and Information Administration
- (NTIA) has the responsibility for analyzing, developing,
- implementing and applying executive branch policy for
- telecommunications in the Federal Government.
-
-
- CURRENT FEDERAL ROLE
-
- This mixture of laws, regulations, and responsible agencies has
- raised concern that Federal computer security policy is lacking
- direction and forcefulness in some areas, yet has created
- overlapping and duplication of effort in other areas. Recently,
- Federal regulations and directives have been issued and
- congressional legislation has been introduced to address the lack
- of coordination of Federal ADP systems.
-
- On March 15, 1985, OMB issued a draft circular intended "to
- provide a general framework of management of information
- resources." This circular combined and updated previous OMB
- circulars, including OMB Circular A-71 (originally issued in July
- 1978). The final OMB circular, A130, was issued on December 12,
- 1985. Appendix III of the circular addressed Federal Government
- computer security. Those responsible for implementing of this
- circular include the Department of Commerce, Department of Defense,
- General Services Administration, and the Office of Personnel
- Management, in addition to OMB.
-
- On September 17, 1984, the executive branch issued National
- Security Decision Directive 145 (NSDD-145), "National Policy on
- Telecommunications and Automated Information Systems Security".
- This directive is aimed at safeguarding automated information
- systems with a special focus on protecting those Federal systems
- accessed via (and dependent on) network communications. NSDD-145
- creates a National Telecommunications and Information Systems
- Security Committee (NTISSC), a panel of 22 voting representatives
- from 12 defense/intelligence agencies and 10 civilian agencies.
- An Assistant Secretary of Defense chairs NTISSC, and the Director
- of the National Security Agency acts as the National Manager for
- implementing policy under NSDD-145. The NTISSC is empowered to
- issue operating policies to assure the security of
- telecommunications and automated information systems that process
- and communicate both classified national security information and
- other sensitive information.
-
- On June 27, 1985, Representative Dan Glickman, then chairman of
- the Subcommittee on Transportation, Aviation and Materials, House
- Committee on Science and Technology, introduced H.R. 2889, the
- Computer Security and Training Act of 1985. The intent of this
- legislation was to establish NBS as the focal point for developing
- training guidelines for Federal employees who are involved in
- management, operation, and use of automated information processing
- systems. This legislation was based in part on hearings which the
- subcommittee conducted in 1983 and a 1984 subcommittee report which
- had recommended increased ADP training and awareness in Federal
- agencies. The Subcommittee on Transportation, Aviation and
- Materials held hearings on H.R. 2889 on September 24, 1984, June
- 17, 1985, and October 29 and jointly with the Subcommittee on
- Science, Research and Technology on October 30, 1985. At the end
- of the 99th Congress, under House procedures, the bill was brought
- up for consideration under suspension of rules, the bill failed to
- obtain the two-thirds vote required and the bill went no further.
-
- On October 29, 1986, National Security Adviser John Poindexter
- issued National Telecommunications Information Systems and Security
- (NTISS) policy Directive No. 2. This directive would have added
- a new "sensitive but unclassified" category of Federal information,
- setting new classification criteria for information formerly
- unclassified. It would not only have affected managers, users, and
- programmers of information systems within the Federal Government,
- but there was concern that it could have been extended to private
- sector contractors of the Federal Government as well, potentially
- restricting the type of information and data released. However,
- on March 16, 1987, National Security Adviser Frank Carlucci
- rescinded NTISS Directive No. 2, following negotiations with the
- committees having jurisdiction over H.R. 145.
-
- On January 6, 1987, Representative Dan Glickman introduced H.R.
- 145, the Computer Security act of 1987. This legislation, based
- in part on H.R. 2889 introduced during the 99th Congress would
- assign the National Bureau of Standards responsibility for
- developing standards and guidelines for the security of Federal
- computer systems, drawing upon technical guidelines developed by
- the National Security Agency, when such guide lines are consistent
- with the requirements for protecting sensitive information. H.R.
- 145 also provides for a Computer Systems Advisory Board to identify
- emerging Federal computer security and privacy issues, advise NBS
- on these issues, report its findings to the Office of Management
- and Budget (OMB), NSA, and Congress. The bill also would amend the
- Brooks Act of 1965 by updating the term "computer"; require
- establishment of security plans by all operators of Federal
- computer systems that contain sensitive information; and require
- mandatory periodic training for all persons involved in management,
- use, or operation of Federal computer systems that contain
- sensitive information.
-
-
- ****************************************************************
-
- II. ISSUES RAISED DURING THE HEARINGS
-
- During the 99th Congress, the Subcommittee on Transportation,
- Aviation and Materials held hearings on Federal computer and
- communications privacy and security on September 24, 1984, June 27,
- 1985, and October 29 and jointly with the Subcommittee on Science,
- Research and Technology on October 30, 1985. During the 100th
- Congress, the Subcommittee on Transportation, Aviation, and
- Materials, and the Subcommittee on Science, Research and Technology
- of the House Science, Space, and Technology Committee held hearings
- on H.R. 145 on February 26, 1987. The Subcommittee on
- Transportation, Aviation, and Materials held an additional hearing
- on May 19, 1987, before final consideration of H.R. 145 by the full
- House Science, Space and Technology Committee.
-
- These hearings touched upon four major issues: (1) the current
- state of computer security in the Federal Government; (2) the role
- of the National Security Agency (NSA) in setting Federal computer
- security; (3) the issue of privacy and security, particularly with
- a new "sensitive but unclassified" criteria; and (4) the role of
- the Federal Government in adequately training Federal employees and
- heightening awareness of computer security.
-
-
- FEDERAL COMPUTER CRIME AND SECURITY
-
- 99th Congress
-
- Over the course of the 99th Congress, there was a heightened
- awareness both inside and outside the Federal Government that
- current computer security measures were inadequate. The American
- Bar Association, the Inspector General's Office of the Department
- of Health and Human Services, computer crime experts such as Donn
- Parker, and industry representatives have repeatedly cited the lack
- of management, controls, and coordination of computer security in
- both the private sector and in the Federal Government.
-
- During the September 24, 1984 hearings, John Tompkins, chairman
- of the Task Force on Computer Crime of the American Bar Association
- (ABA), commented on a survey conducted by the ABA on the state of
- computer crime in government and the private sector. The ABA
- report was one of the first extensive studies done on the number
- of "known and verifiable losses" which have resulted from computer
- crimes, and the results of the survey included responses from 13
- Federal agencies and 28 State and local agencies. Although the
- results of the survey indicated a wide range of losses by
- respondents, several consistent factors emerged: that "insiders"
- having access to computer systems are the more likely perpetrators
- of fraud and abuse; that there is a proliferation of computers in
- government; that such security systems as currently exist do not
- facilitate detection of computer crimes; that security systems
- themselves often are vulnerable and inadequate; and that a lack of
- awareness and concern by the public as well as computer systems
- managers, are contributing to these problems. Mr. Tompkins noted
- that, although the ABA did not state any formal recommendations,
- the conclusions reached by the respondents to the ABA survey
- indicated: the need for Federal computer crime legislation; the
- need to adequately train and supervise personnel in data
- processing; and the large overall cost and expense of computer
- fraud and abuse.
-
- Richard Kusserow, Inspector General for the Department of Health
- and Human Services, also testified on the nature of fraud and abuse
- in Federal computer systems. AS Inspector General for the largest
- Federal civil agency, Mr. Kusserow's office has been involved with
- auditing computer systems, reducing costs, and insuring the
- integrity of HHS ADP systems. As Mr. Kusserow stated at the
- September 24 hearings:
-
- We must ensure that agency managers in overseeing programs
- that use computerized systems, do audit the systems, do look
- and make sure that the controls are functioning, and that we
- in the inspector general community, using our auditors and
- investigators, follow up to make sure it's being done. I
- think that in all of these areas is has not been done nearly
- enough.
-
- Also, as chairman of the President's Council on Integrity and
- Efficiency investigating computer crime in the Federal Government,
- Mr. Kusserow testified on September 24, 1984, and again on October
- 29, 1985, on a study he directed which examined computer-related
- fraud and abuse in general, and a subsequent study in which the
- Inspector General's office interviewed those who had been convicted
- of Federal computer fraud and abuse. The results of these studies
- are consistent with the findings of the ABA study: that Federal
- computer fraud and abuse is often committed by insiders within the
- Federal agency; that training for computer security and awareness
- of vulnerabilities in computer systems were lacking; and that
- internal controls for computer security need to be increased. The
- profile of Federal computer criminals shows that they are young,
- considered good employees, and often use co-conspirators, that many
- who commit these crimes never think about the consequences of being
- caught, or if they consider the consequences, assess the risk of
- being caught as minimal. As Mr. Kusserow stated in the October 29
- hearing:
-
- One of the most disturbing findings from this study is that
- the work environment provided the perpetrators with the
- opportunity to commit their crime. We asked the perpetrators
- about computer security where they had committed their crime
- . . . Virtually all of them had been aware of security efforts
- but most said they had been weak. So, they make the judgment
- that, although there may have been security efforts in their
- agencies, they were weak and could not be counted upon to act
- as a deterrence for them to committing the crime.
-
- The General Accounting Office also testified during the hearings
- on June 27, 1985, and October 29 and 30, 1985. GAO has conducted
- several studies on a computer crime and security in the Federal
- Government, including a 1985 survey of 25 computer systems in 17
- Federal civil agencies, to evaluate the state of computer security
- and integrity of these systems. This survey was conducted by GAO
- using two questionnaires and subsequent interviews, promising
- anonymous to the agencies so the systems could not be compromised
- after public disclosure. GAO indicated that:
-
- Generally, the results of our survey showed that each of the
- systems is vulnerable to abuse, destruction, error, fraud, and
- waste. Specifically we found that: key management
- responsibilities were missing. For example, many agencies do
- not use a risk management approach as part of implementing a
- security program; and actual safeguards needed to protect
- systems from potential threats were not always in place. For
- example, computerized techniques, such as passwords, allowing
- access to systems were not periodically changed.
-
- GAO categorized Federal computer security methods into management
- and three basic safeguard components: physical, technical, and
- administrative. No agency met all of the management
- responsibilities outlined in the questionnaire, and only five of
- the 25 systems evaluated contained an element of physical,
- technical and administrative control. Only two of the systems
- provide what GAO described as adequate training for computer
- employees. GAO further characterized the systems as very
- vulnerable, and given the minimal oversight and coordination
- between agencies, GAO found that there is a lack of a balanced
- approach to security of Federal computer systems.
-
- The testimony by the ABA, the Inspector General's office of HHS,
- and GAO clearly indicated that Federal systems are in danger
- because of improper use and negligence. Other witnesses from both
- the public and private sector testified during the hearings that
- they also found computer security in general and Federal computer
- security specifically remains vulnerable and open to fraud and
- abuse, despite stated efforts by representatives of the Federal
- agencies to remedy this problem.
-
- 100th Congress
-
- After the hearings on H.R. 2889 during the 99th Congress, the
- House Science and Technology Committee requested that GAO review
- how successfully appropriate security controls are being
- incorporated into mission-critical, sensitive systems now being
- developed in Federal civilian agencies. GAO proceeded to evaluate
- nine Federal civilian agencies to determine the effectiveness of
- computer security controls.
-
- GAO evaluators determined during the course of this study that
- currently there is a lack of effective guidance for assessing
- whether appropriate security controls are initiated during the
- development of computer systems. None of the nine agencies
- reviewed treated information security as one of its functional
- requirements. According to GAO, six of the nine agencies studied
- did not address, or inadequately addressed, the sensitivity of the
- information to be handled in a computer system. Eight of the nine
- agencies performed no risk analysis of the computer systems in the
- agency.
-
- Thomas B. Giammo, Associated Director, Information Management and
- Technology Division of GAO stated during testimony:
-
- Mr. Chairman, our review suggests that the practices
- currently being used by civilian agencies in the development
- of mission-critical, sensitive systems will not assure that
- the appropriate security controls are being successfully
- incorporated into these systems. Specifically, we reviewed
- the practices currently being used at nine civilian agencies
- in the development of nine specific systems. We found that
- the practices in use at all nine agencies had permitted
- decisions critical to the specification, design, and
- construction of all nine systems to be made without adequate
- management consideration of important security issues.
-
- This evaluation of Federal civilian agencies' lack of computer
- security planning and management supports the previous GAO study
- on Federal civilian agency computer security. It also corroborates
- testimony from other witnesses during hearings on H.R. 145
- regarding the need for incorporating security controls into
- mission-sensitive critical computer systems.
-
-
- ROLE OF THE NATIONAL SECURITY AGENCY (NSA)
-
- With the introduction of NSDD-145, the prominent role of the NSA
- in establishing Federal computer security in civilian agencies
- became a subject of debate among computer security experts. The
- Subcommittee on Transportation, Aviation and Materials devoted an
- entire day of hearings to this subject on June 27, 1985, during
- which representatives from NSA and DOD testified. The role of NSA
- under NSDD-145 was a topic mentioned during the hearings on October
- 29 and 30, 1985. The role of NSA under NSDD-145 was further
- examined during hearings on H.R. 145 on February 26, 1987.
-
-
- 99th Congress
-
- Donald Latham, Chairman of the National Telecommunications and
- Information Systems Security Committee (NTISSC), Walter Deeley,
- Deputy Director for Communications Security, NSA, and Robert
- Brotzman, Director, DOD National Computer Security Center,
- testified on why NSDD-145 was necessary to coordinate Federal
- computer security. Citing a lack of overall coordination among
- Federal agencies, the high risk of compromising, losing or
- destroying Federal agency data, and the overall vulnerability of
- Federal computer security systems, they emphasized that the NSA had
- the experience and expertise to administer Federal computer
- security programs. As Mr. Latham stated:
-
- We have provided cryptographic devices for protection of
- classified data, as Mr. Deeley will explain further. While
- we have done a reasonable job in some areas, there are still
- many areas that are left uncovered and there is more emphasis
- needed here.
-
- We have put in controls for tighter access to unclassified
- data through network access controls and things like this, so
- that the so-called hackers can't go in and just play havoc
- with our data.
-
- We are fostering very much a security awareness program.
- We are instituting training programs at the national level as
- well as the local level, I'll say, within service schools and
- across the various agencies. And we are looking at more
- rigorous ways of clearing people who have access to computer
- systems and telecommunications network security devices.
-
- Other witnesses appearing before the subcommittee expressed
- concerns that NSDD-145 would hamper efforts to adequately
- administer Federal computer security. One area of concern is that
- NSDD-145 will create conflict with other Federal security
- regulations, notably Transmittal Memorandum 1 to OMB Circular A-71
- (which has since been embodied in OMB Circular A-130, published
- December 12, 1985). Although both NSDD-145 and the OMB circular
- are broadly constructed, the emphasis in the OMB circular for
- planning and implementing Federal computer security rests with
- civil agencies, primarily with OMB and the Department of Commerce.
- In NSDD-145, the Director of NSA and the Secretary of Defense have
- primary roles. NSDD-145 does incorporate many of the lead Federal
- agencies on its NTISSC panel; but not all agencies are included.
- When Warren Reed, Director, Information Management and Technology
- Division, General Accounting Office, testified on the GAO survey
- on Federal computer security, he stated that the issuance of NSDD-
- 145 might create confusion among the Federal agencies over which
- agency has jurisdiction over security functions. Mr. Reed stated
- that this could be a large or small problem, and may interfere with
- other Federal statutes and regulations which have given this
- jurisdiction to NBS. Raymond Wyrsch, Senior Attorney, Office of
- General Counsel at GAO, stated:
-
- * * * we do have laws on the books, the Brooks Act and the
- Paperwork Reduction Act, and there are very distinct
- responsibilities that have been placed on these agencies,
- namely OMB has been given the general oversight authority, if
- you will to set government policy.
-
- * * * And I don't know if anyone is really in the position
- to say with any degree of conclusiveness now, on what are the
- other agencies supposed to do if you have inconsistent or
- conflicting guidance that may be issued. There have been
- various pronouncements that have been made by the Secretary
- of Commerce over the years dealing with ADP standards.
-
- Representative Jack Brooks, Chairman of the Subcommittee on
- Legislation and National Security of the House Government
- Operations Committee, and author of the Brooks Act, highlighted
- these concerns during his testimony on NSDD-145: "NSA has a
- propensity and a tendency to classify everything." GAO witnesses
- also expressed concern that a lack of definition of "unclassified
- information considered sensitive" in civil agencies may be
- interpreted either broadly or narrowly, significantly affecting how
- agencies store and disseminate information contained in computer
- and telecommunications systems. However, Lt. Gen. Odom, Director
- of NSA, has stated in a letter to Chairman Fuqua on February 25,
- 1986: ". . . the Systems Steering Group, the senior governmental
- body created by NSDD-145 for information security matters, has
- concluded that each government department or agency must make its
- own determination as to what constitutes sensitive information to
- that department or agency mission or operation."
-
- Other witnesses, including representatives from the American
- Civil Liberties Union and the Institute of Electrical and
- Electronics Engineers, expressed similar concerns over the
- "unclassified but sensitive" categorization of computerized data
- and how that will affect citizens' access to public information or
- freedom to exchange scientific information.
-
- There has been some controversy over the review process for NSDD-
- 145. Expressing concern that issuing National Security Decision
- Directive 145 effectively circumvents the review process that OMB
- Circular A-71 went through, Subcommittee Chairman Glickman noted
- during testimony given on June 27, that a document which ordinarily
- might be called a regulation, if labeled a national security
- directive, may avoid the Administrative Procedures Act, all public
- notification requirements, and Congressional oversight. Also, Mr.
- Richard P. Kusserow, Inspector General of HHS, stated at the
- October 29 hearing that "I haven't seen it, and I have not had any
- input in the process". Still the review process spanned nearly a
- year and Dr. Robert E. Conley, who was chairman of the Subgroup on
- Telecommunications Security created under NSDD-145 while he was
- with the Treasury Department, said at the same hearing that "we
- invited all of the government agencies to attend the meetings".
- Thus, although there is no question that Federal computer security
- is a vital national issue, use of NSDD-145 as an instrument for
- setting policy, without legislative or agency debate and review,
- has raised concerns in the Congress.
-
- 100th Congress
-
- During the 100th Congress, the debate regarding NSDD-145 and the
- role of NSA in setting computer security policy for Federal
- civilian agencies has continued. H.R. 145 states that the
- responsibility for developing standards and guidelines for the
- security and privacy of Federal computer systems rests with NBS,
- with technical advice and assistance coming from NSA "where
- appropriate". The hearings before the Subcommittee on
- Transportation, Aviation, and Materials and the Subcommittee on
- Science, Research and Technology on H.R. 145 at the beginning of
- the 100th Congress continued to focus on the role of NSA oversight
- in computer security among the Federal agencies.
-
- Donald Latham, Chairman of the National Telecommunications and
- Information Systems Security Committee (NTISSC) and Lt. General
- William Odom, Director of the National Security Agency, testified
- at the February 26, 1987 hearings on the role of the NSA, the
- function of NSDD-145, and the form of technical assistance which
- the defense and military security agencies provide for the Federal
- Government. Also on February 26, 1987, Raymond Kammer, Deputy
- Director of the National Bureau of Standards, testified before the
- two Subcommittees on the role of NBS and his position on NTISS
- Directive No. 2 and its effect on Federal information security.
-
- Mr. Latham's statement before the House Subcommittees outlined
- the role of NSA under NSDD-145. Mr. Latham stated that the
- civilian agencies are represented on two committees created under
- NSDD-145. These include the Systems Security Steering Group which
- consists entirely of civilian members of the President's Cabinet
- (see table 1), which sets overall information security policy for
- Federal agencies, and the National Telecommunications Information
- Systems Security Committee (NTISSC) (see table 2 for membership),
- under which NSA is the National Manager and assists NTISSC in
- implementing actual Federal computer security. Mr. Latham stated
- during questioning from Subcommittee Members:
-
- TABLE 1.--SYSTEMS SECURITY STEERING GROUP
-
- Chairman: The Honorable Frank C. Carlucci, Assistant to the
- President for National Security Affairs.
- Executive Secretary: Lieutenant General William E. Odom,
- USA, National Manager for Telecommunications and Automated
- Information Systems Security.
- Member: The Honorable George P. Shultz, Secretary of State;
- The Honorable James A. Baker III, Secretary of the Treasury;
- The Honorable Casper W. Weinberger, Secretary of Defense; The
- Honorable Edwin Meese III, Attorney General; The Honorable
- James C. Miller III, Director, Office of Management and
- Budget; and Robert Gates, Acting Director of Central
- Intelligence.
-
- TABLE 2.--NATIONAL TELECOMMUNICATIONS AND
- INFORMATION SYSTEMS SECURITY COMMITTEE (NTISSC)
-
- Chairman: The Honorable Donald C. Latham, Assistant
- Secretary of Defense C3I.
- Executive Secretary: John C. Wobensmith.
- Members: NSC, Department of State, Department of the
- Treasury, Department of Defense, Office of Management and
- Budget, Department of Justice, Department of Commerce,
- Department of Transportation, Department of Energy, Director
- of Central Intelligence, General Services Administration,
- Office of the Joint Chiefs of Staff, Department of the ARmy,
- Department of the Navy, Department of the Air Force, United
- States Marine Corps, National Security Agency, Defense
- Intelligence Agency, Federal Bureau of Investigation, Federal
- Emergency Management Agency, and National Communications
- System.
- Observers: Federal Communications Commission, Intelligence
- Community Staff, Defense Communications Agency, National
- Aeronautics and Space Administration, Nuclear Regulatory
- Commission, Chairman, SAISS, and Chairman, STS.
- The Steering Group is chaired by the Assistant to the
- President for National Security Affairs and then is composed
- of all civilians from various cabinet level departments that
- are on the Steering Committee--Treasury, Defense, State, and
- so on--so that there is, in fact, at the very top of the NSDD-
- 145 structure a group of cabinet level civilians who actually
- operate the mechanisms that are laid out in 145.
-
- General Odom, in his testimony before the Subcommittee, described
- the role of the Department of Defense's National Computer Center
- and the services this Center provides both military and civilian
- agencies in the Federal Government. Under NSDD-145, the Assistant
- Secretary of Defense for Command, Control, Communications and
- Intelligence (C31) chairs NTISSC.
-
- Both Mr. Latham and General Odom, while testifying on the
- respective roles of NSA and DOD, stated that their main concern
- with an enhanced role for NBS, as outlined in H.R. 145, would be
- to duplicate efforts in computer security in the Federal
- Government. Both Mr. Latham and General Odom praised the role of
- NBS in providing standards for Federal computer systems, including
- security. However, both felt that many of the responsibilities
- outlined for NBS under H.R. 145 are identical to the
- responsibilities already provided for under NSDD-145, and that NSA
- and DOD currently are handling these responsibilities capably. In
- response to a question on how the respective roles of NSA and NBS
- might be affected under H.R. 145, General Odom stated:
-
- Well, it is my general impression that it would give NBS
- responsibility for a lot of things we are now doing and would
- essentially build a duplication, presumably for two different
- sectors. In other words, you're building computers that are
- secure for civilian agencies, non-military or intelligence
- activities, and you would be securing computers or developing
- a program for those in the Defense Department.
-
- However, despite the concern for duplication and potential
- overlap of computer security technology and services, there are
- those who are still concerned that civilian and defense and
- military computer security policies in the Federal Government
- should be separated. Specifically, there is concern that, for the
- sake of a unified Federal computer security policy, the military
- and defense would gain preeminence over Federal civilian agencies.
- Representative Glickman stated in his opening remarks before the
- first panel of witnesses.
-
- * * * the basic concept of this bill, civilian preeminence in
- determining standards for classified information is the heart
- of what we are trying to do, not military preeminence * * *
-
- Raymond Kammer, Deputy Director of the National Bureau of
- Standards, commented on the role of NBS in setting Federal computer
- security, particularly the role of the Institute of Computer
- Sciences and Technology at NBS in developing a civilian
- telecommunications and computer security program. Mr. Kammer
- stated that he believed that H.R. 145, rather than causing
- duplication between NBS and NSA, complemented the two agencies.
- According to Mr. Kammer:
-
- The bill removes the potential for conflict between the
- Department of Commerce and the Director of the National
- Security Agency (NSA) in his capacity as National Manager
- under National Security Directive 145 (NSDD 145). Conflict
- has not yet arisen because the level of cooperation between
- NBS and the National Manager to develop security standards has
- been satisfactory. We have worked well together.
-
- Mr. Kammer emphasized that there are some technical skills which
- NSA has which NBS does not have, nor is likely to acquire. Mr.
- Kammer also responded to questioning on the NBS budget by stating
- that a larger program involving reimbursable funding, in which
- Federal agencies pay NBS directly for services contracted out,
- would be an appropriate method for increasing the Federal civilian
- computer security budget at NBS.
-
- David Pronko, President of PE Systems, a supplier of encryption
- devices for both military and private sector communications, added
- a private sector viewpoint. He was asked to characterize the
- relative strengths and weaknesses of NSA and NBS with respect to
- providing security for military and civilian computers. He said:
-
- From the communications security point of view, I feel that
- NSA has--my own personal view--a much more pragmatic approach
- and a more methodical approach on handling the communications
- security. AT NBS, you have really more of a laissez faire
- approach to it, and here again, it is probably brought about
- by private industry working within that system.
-
-
- INFORMATION PRIVACY AND SECURITY
-
- During the Subcommittee hearings on the 99th Congress, several
- questions were raised about a possible "sensitive but unclassified"
- categorization of Federal information. When NTISS Directive No.
- 2 was issued in late 1986, providing a mechanism for a "sensitive
- but unclassified" category, interest and concern both in the
- Federal Government and in the private sector grew.
-
- This concern was voiced by several witnesses during the hearings
- on February 26, 1987. The definitions of "sensitive but
- unclassified" used in NTISS Directive No. 2 and in H.R. 145
- initially appear similar. H.R. 145 defines "sensitive" information
- as "any information, the loss, misuse, or unauthorized access of
- which could adversely affect the national interest or the conduct
- of Federal programs . . . " NTISS Directive No. 2 cited that
- "sensitive" information is that information in which the
- "disclosure, loss, misuse, alteration, or destruction could
- adversely affect national security or other Federal Government
- interests." But NTISS Directive No. 2 goes on to add that
- government interests may be those related, but not limited to:
-
- . . . the wide range of government or government-derived
- economic, human, financial, industrial, agricultural,
- technological, and law enforcement information, as well as the
- privacy or confidentiality of personal or commercial
- proprietary information provided to the U.S. Government by its
- citizens.
-
- This additional range of activities, along with the intent of
- classifying this information as "sensitive", concerned many
- witnesses during the hearings on H. 145. Mr. Kammer of NBS stated:
-
- The definition of sensitive data that's contained in the
- Poindexter Directive is a totally--in my point of view, at
- least--is a totally inclusionary definition. There is no data
- that anyone would spend money on that is not covered by that
- definition. Therefore, civil data is covered; therefore, the
- Brooks Act and the Privacy Act are either in conflict with it,
- or one is superior to the other.
-
- One group of witnesses which responded to the definition of
- "sensitive" information during the hearings on February 26, 1987
- included Jack Simpson, President of Mead Data Central, Inc.;
- Kenneth Allen, Senior Vice President, Government Relations,
- Information Industry Association; Ms. Ceryl Helsing, Information
- Security Manager, BankAmerica Corporation and Chairman, Data
- Security Committee, American Bankers Association; and Mr. Geoffrey
- Turner, Communications Security manager, BankAmerica Corporation.
- They raised concerns that NSA would apply the "sensitive but
- unclassified" categorization to commercial databanks (such as
- NEXIS), which provide a wide range of data on Federal Government
- policies and laws; as well as raising concerns about the role of
- NSA in recertifying the Data Encryption Standard (DES), a method
- of encrypting data in information systems, developed by NBS. NSA
- had stated it would not recertify DES after 1988.
-
- Many commercial databases are online services in which a user,
- gaining access to the database through a computer, can retrieve
- information on a wide variety of subjects. Corporations, news
- media, Federal, State and Local governments, and the legal, medical
- and accounting professions use these services for timely and
- current information. Providers of these services feel that
- restrictions on the type of information which may be made available
- to the general public will hurt that industry. Mr. Simpson stated
- in testimony:
-
- Such new restrictive and unwarranted policies and the
- unilateral control of the Defense Community threaten to bring
- this industry to a halt and would negate the significant
- productivity gains being made in many sectors of our economy
- including legal, financial, government, medical, and the
- scientific and technological community.
-
- Mr. Simpson and others also stated that they were not opposed to
- the restriction of classified data by the national security and
- defense communities in the Federal Government. But Mr. Simpson
- stated that no "magical transformation" occurs when unclassified
- data is entered into a computer; if it is already unclassified in
- print form, it does not become more important or crucial because
- it is entered into a computer database. Mr. Simpson opposed the
- "sensitive" categorization in NTISS Directive No. 2, and supported
- H.R. 145 during testimony.
-
- The failure to recertify DES and NSA also was criticized by
- several witnesses during the February 26, 1986 hearings. Failure
- to recertify is seen by many in the private sector as an attempt
- by NSA to infringe on a security process for transmitting data.
- Mr. Turner, commenting on the ability of BankAmerica to safely and
- expeditiously transfer funds through DES, claimed that a failure
- to recertify by NSA has led to a "slowdown" in the security of
- electronic funds transfer and further encryption technology
- development and use in the financial community. Ms. Helsing also
- echoed these concerns, and strongly supported the concept of a
- Computer Security and Privacy Advisory Board, with some minor
- changes, as recommended by H.R. 145, as a formal measure for
- private sector communication with the Federal Government on such
- issues as data encryption.
-
- Other witnesses were concerned that an expanded "sensitive but
- unclassified" definition would impinge upon personal liberties, as
- well as the free flow of information vital to scientific and
- industrial development. Mr. Jerry Berman of the American Civil
- Liberties Union and Mr. John Richardson of the Institute of
- Electrical and Electronics Engineers, testified during the 100th
- Congress on this issue.
-
- Mr. Berman, in his opposition to NSDD-145 and NTISS Directive No.
- 2, testified that currently there are statutes which protect
- classified information from disclosure: "If it's classified,
- protect it. If it's proprietary, trade secrets, there are statutes
- on the books." Mr. Berman stated that a broad and vague definition
- would lead to a restriction of information, less free access to
- information, and less right to know, and he supported H.R. 145 for
- passage into law. Mr. Berman also stated that since NSA has no
- public charter, that statutory power to NSA for categorizing
- sensitive information would lead to a situation in which citizens
- would not have redress to overturn decisions restricting sensitive
- information.
-
- Mr. Richardson, also testifying on February 26, 1987, opposed
- NTISS Directive No. 2, and supported H.R. 145, because of concerns
- which the IEEE has that a new categorization of information as
- sensitive might restrict the free flow of information vital to U.S.
- economic survival. Mr. Richardson stated:
-
- The IEEE thinks, in this regard, that the unabridged
- dissemination of unclassified scientific and technical
- information is crucial for the continued advancement of U.S.
- industry, and we oppose restraints on its exchange.
-
- Mr. Richardson stated that such exchanges would be severely
- restricted under NTISS Directive No. 2. He stated that both
- government and non-government information might qualify for this
- classification, and supported H.R. 145 as an alternative to
- separate the protection of computer systems which deal with
- national security information, from those computer systems dealing
- with non-national security information. Mr. Richardson also
- expressed some dissatisfaction with the definition of "sensitive"
- as outlined in H.R. 145, believing that it was, like the NTISS
- definition, too broad and general.
-
- These witnesses, representing a variety of perspectives and
- concerns, felt that NTISS Directive No. 2, with its expanded
- definition of "sensitive" data, would impair the use of data bases,
- the ability to encrypt data, the protection of civil liberties, and
- the free flow of scientific and technical information. All
- supported the general intent of H.R. 145. The subsequent
- rescinding of NTISS Directive No. 2 in March, 1987, resulted in
- part from this opposition over the nature and intent of this
- directive.
-
-
- TRAINING FOR FEDERAL COMPUTER SYSTEMS USERS
-
- Testimony from the hearings during the 99th Congress emphasized
- the need for greater training of personnel responsible for computer
- security training of personnel in the Federal Government. GAO,
- ABA, the Inspector General of HHS, and others commented on the
- current state of Federal computer training during the course of the
- Subcommittee on Transportation, Aviation and Materials hearings.
-
- H.R. 2889, as introduced by Representative Glickman during the
- 99th Congress, would have established a focus within the Federal
- Government at the National Bureau of Standards for computer
- security research, and development of computer security guidelines.
- The intent of this provision was to ensure that agencies would
- better train personnel in the vulnerabilities of computer and
- communication systems. On the last day of testimony before the two
- subcommittees on October 30, 1985, witnesses dealt directly with
- H.R. 2889 and the need for Federal computer security training.
-
- There is little argument that such training is needed or that in
- some areas, that much is needed to supplement existing training
- procedures. Most of the witnesses testifying on the current state
- of Federal computer security commented that computer security
- training the Federal Government is either inadequate or nonexistent
- and that such training is necessary. William Franklin, Associate
- Director, Information Management and Technology Division, GAO,
- stated on October 30:
-
- There can be little question that extensive and continuing
- security research and training are essential if we are to gain
- reasonable assurance that our computerized information is
- properly safeguarded in storage, processing and transmission.
-
- However, there was concern that the creation of a new structure
- within the Federal Government might add unnecessarily to its
- overall cost and bureaucracy. Several witnesses stated that
- existing Federal computer training facilities, such as those at
- NSA, should be used to train Federal employees. Robert Brotzman,
- Assistant Director for Computer Security at the National Computer
- Security Center at NSA, described the security program at the
- Computer Security Center. This program assists civilian and
- military agencies, as well as outside contractors with sensitive
- data, to develop secure information and communication systems. As
- Mr. Brotzman stated:
-
- The knowledge base that we have now will support an
- effective training program, and it will support the
- substantial improvement in the security of computer systems
- operated by and for the United States Government.
-
- James Burrows, Director, Institute for Computer Sciences and
- Technology (ICST), of the NBS, spoke on the computer training and
- security programs at the ICST. As part of its mandate to develop
- computer security standards and guidelines, the ICST assists
- Federal agencies in developing computer security programs. This
- includes both software and hardware development, system interfaces,
- personal identification and authentication of users. The
- Department of Commerce opposed the structure of H.R. 2889 because
- of its interpretation that the Brooks Act and other legislation
- makes a Federal computer training and awareness mandate for NBS
- unnecessary. However, Mr. Burrows did state that NSDD-145 could
- be "slightly confusing in who has control" of overall Federal
- security management among the agencies. Mr. Burrows also stated
- that, to date, NSDD-145 has had little adverse effect on NBS'
- activities in computer security and training.
-
- Several of the witnesses did speak in favor of Federal computer
- training legislation, although they also suggested changes in the
- language and intent of H.R. 2889. Donn Parker, a computer crime
- and security expert at SRI International, also spoke on October 30
- on computer security in general, while testifying on H.R. 2889.
- Mr. Parker made several observations: that it is the information,
- not the technology, which needs security; that information must be
- considered secure before it goes into the computer; that technology
- controls to date are inadequate--it is the management of "human
- controls" which need improvement; that most information systems
- employees consider security a detriment to productivity, therefore,
- that measures must be taken to incorporate computer security into
- personnel performance evaluations; that each individual must be
- held accountable for taking security precautions, to ensure that
- these measures are taken; that advisory and counseling provisions
- within an organization can short-circuit the stresses and problems
- which may drive someone to commit a computer crime; that all
- information systems workers, not just computer programmers, should
- be trained in securing systems; and that training should be
- broadened to include a wider range of potential vulnerabilities,
- including the full civil, military, and private sector prospective
- of computer training and awareness.
-
- William Franklin of GAO also addressed H.R. 2889:
-
- We endorse the bill's purpose in requiring the National
- Bureau of Standards to establish and conduct a computer
- security research program in the Federal Government and the
- requirement that each Federal agency provide mandatory
- periodic training in computer security.
-
- Testimony during the 100th Congress also touched upon the current
- state of computer security and the need for training of Federal
- employees. This issue was discussed specifically during the May
- 19, 1987 testimony by GAO of its investigation of the computer
- security policies of nine Federal agencies. Other witnesses,
- during the hearings on February 26, 1987, on H.R. 145, stated that
- the overall responsibility for civilian Federal computer security
- policies should rest in the civilian agencies. Under H.R. 145, the
- focus for training civilian Federal agency personnel for computer
- security again would be placed with the National Bureau of
- Standards. The need for a strong computer security training
- program for Federal employees is still seen as a necessary and
- vital aspect of ensuring Federal computer security.
-
- David Pronko, President of PE Systems, responded to a question
- about whether NSA or NBS could provide the training envisioned in
- H.R. 145.
-
- At this stage, from what I've seen and in my earlier
- comments, I'm not sure either has a leg on the other as far
- as the computer security training right now. It seems that
- the NSA within the last few years has gained a foot hold in
- that arena, due to their programs.
-
-
- ****************************************************************
-
-
- III. NEED FOR LEGISLATION
-
- There are several key principles the Committee seeks to emphasize
- by this legislation:
-
- 1. Computer crime in the Federal Government appears to be much
- more pervasive and serious an issue than previously assumed.
- Descriptions of computer criminals as "insiders" by ABA, GAO, the
- Inspector General of HHS, and others may imply that many Federal
- computer users represent potential risks of fraud and abuse.
-
- 2. Security measures in a number of agencies are very vulnerable
- to abuse and fraud. Only five of 25 Federal computer systems
- surveyed by GAO contained minimum safeguards, and only two of 25
- systems offered formal training sessions for computer users.
-
- 3. There is a need for coordinated guidance for security of
- sensitive information in computers. There is a perception that
- NSDD-145 could further complicate a situation which already is
- unclear; that is Federal agencies are currently required to follow
- existing laws and regulations, such as the Brooks Act, the
- Paperwork Reduction Act, and the OMB circular, to set guidelines
- and standards for computer security.
-
- 4. NSDD-145 can be interpreted to give the national security
- community too great a role in setting computer security standards
- for civil agencies. Although the Administration has indicated its
- intention to address this issue, the Committee felt it is important
- to pursue a legislative remedy to establish a civilian authority
- to develop standards relating to sensitive, but unclassified data.
-
- 5. Training of Federal personnel in ADP security is a critical
- issue to ensure security in Federal agencies. Yet many Federal
- agencies do not take advantage of available training to remedy this
- problem. A stronger, more active computer training and awareness
- program is needed to address this issue in the civil agencies of
- the Federal Government.
-
- 6. Greater emphasis should be given to cooperation between the
- military and civil agencies as well as the private sector in
- setting computer security and training goals. This can be
- accomplished by fostering greater communication and cooperation
- between the NBS and NSA in setting overall Federal computer policy.
-
-
- **************************************************************
-
-
- IV. EXPLANATION OF THE BILL
-
- PURPOSE
-
- The purpose of H.R. 145, the Computer Security Act of 1987, as
- amended, is to improve the security and privacy of sensitive
- information in Federal computer systems. It achieves this purpose
- through improved training, aimed at raising the awareness of
- Federal workers about computer system security, by establishing a
- focal point within the government for developing computer system
- security standards and guidelines to protect sensitive information,
- and by requiring agencies to establish computer system security
- plans.
-
- To explain what these mean, it is first necessary to examine
- several underlying concepts that define and scope the boundaries
- of the bill's coverage. First, the primary objective of the bill
- is controlling unauthorized use of the information in Federal
- computer systems, rather than merely protecting the computer
- systems themselves. Although computer hardware and software have
- real value and certainly must be safeguarded, it is the data
- stored, manipulated, displayed and transmitted by computer systems
- that represent the greatest vulnerability. Nevertheless, computer
- systems are the instrumentality through which security measures are
- usually applied. Therefore, the bill makes distinctions both about
- which computer systems are included as well as about what kinds of
- information are subject to the bill's provisions.
-
- Second, the term "computer system" as used throughout the bill
- is defined to be essentially identical to the term "automatic data
- processing equipment" in Section 111 of the Federal Property and
- Administrative Services Act of 1949 (Brooks Act). A computer
- system is described structurally to include traditional hardware
- (computers and ancillary equipment), software, firmware, procedures
- for use of the system by people, services intended to provide
- support to the operation of the system, and related resources as
- defined in regulations issued by the Administrator of General
- Services. A computer system is also described functionally to
- include any equipment or interconnected system or subsystems used
- in the automatic acquisition, storage, manipulation, management,
- movement, control, display, switching, interchange, transmission,
- or reception of data or information.
-
- The term "federal computer system" is used to delineate the reach
- of the bill to include federal agencies, contractors of federal
- agencies, and other organizations that process information using
- a computer system on behalf of the federal government to accomplish
- a federal government function. The latter category is limited to
- cases where there is a direct federal interest. Examples would
- include state agencies that disburse federal funds, monitor
- compliance with federal regulations on behalf of the federal
- government, collect statistical information for the purpose of
- federal funding decisions, or act in some other way as a direct
- extension of the federal government. The measures used for
- protecting sensitive information in such cases, just as elsewhere,
- must be cost effectively applied and commensurate with the risk and
- magnitude of harm. The term "operator of a federal computer
- system" denotes an agency or institution that owns or otherwise
- possesses a federal computer system, rather than an individual who
- physically operates the machine. The term "sensitive information"
- is used to limit the kinds of information which are covered by the
- bill. It is intended to guide the National Bureau of Standards as
- to the kinds of information it should address in the standards
- development process. It is not intended to authorize establishment
- of a formal new category of information. (See discussion on Rules
- of Construction.) Sensitive information is defined as unclassified
- information which, if lost, misused, accessed or modified in an
- unauthorized way, could adversely affect the national interest the
- conduct of federal programs or the privacy of individuals.*
- Examples include information which if modified, destroyed or
- disclosed in an unauthorized manner could cause:
-
- Loss of Life;
-
- Loss of property or funds by unlawful means;
-
- Violation of personal privacy or civil rights;
-
- Gaining of an unfair commercial advantage;
-
- Loss of advanced technology, useful to a competitor; or
-
- Disclosure of proprietary information entrusted to the
- government.
-
- The definition of sensitive information allows the possibility
- that some unclassified information may not be sensitive. Each
- operator of a federal computer system must make a determination (as
- described later) as to which unclassified information in its
- possession is sensitive. Sensitive information does not include
- nor does the bill apply to classified information for which
- extensive standards-setting authority already exists. These
- mechanisms are unaffected by H.R. 145.
-
-
- ADDITIONS TO NBS ORGANIC ACT
-
- H.R. 145 amends the Act of March 3, 1901, creating the National
- Bureau of Standards, to add the mission of developing standards,
- guidelines and associated methods and techniques for computer
- systems to the list of authorized activities of the agency. The
- reason for this language is to provide specific authorization
- for activities that are widely acknowledged as necessary in the
- computer age, but which are conducted currently under general
- authorities contained in the Act. It is intended to authorize NBS
- to study the means of automatic computation (computer science)
- independent of the technology involved. Therefore, this
- clarification of NBS' Organic Act sets out the NBS mission in
- computer science in general and does not focus on computer
- security.
-
- _______________
-
- * But which has not been specifically authorized under criteria
- established by Executive Order or an Act of Congress to be kept
- secret in the interest of national defense or foreign policy. The bill also adds three new sections to the Act of March 3,
- 1901. Section 20 provides a hierarchy enumeration of NBS'
- responsibilities. At the top of the hierarchy is the mission of
- developing standards, and associated methods and techniques for
- computer systems generally. An example would be the "Open Systems
- Interconnection" (OSI) standards for computer networking, which the
- Bureau develops technically (with extensive private sector input)
- and presents to the American National Standards Institute, and
- through it to the International Standards Organization, for
- adoption. This statement of responsibility is intended to conform
- Section 20 with the above addition to the list of authorized
- activities.
-
- At the next hierarchical level NBS is responsible for developing
- uniform standards and guidelines, in all areas other than security,
- for federal computer systems. As before, this delineation of
- responsibility is intended to conform Section 20 and to provide
- specific authority for activities that are currently carried out
- under general provisions of the Organic Act. The product of this
- effort is the Federal Information Processing Standards (FIPS) which
- are used government-wide.
-
- In current practice, some computer standards developed by NBS
- become compulsory under authority of OMB pursuant to the Brooks Act
- and the Paperwork Reduction Act. The process outlined in H.R. 145-
- -which includes standards development by NBS and subsequent
- promulgation by the Secretary of Commerce under redrafted authority
- in the Brooks Act (to be described later)--is essentially the same
- as current practice, but is spelled out more explicitly.
-
- Systems involving intelligence activities, cryptologic activities
- related to national security, direct command and control of
- military forces, equipment that is integral to a weapons system or
- direct fulfillment of military or intelligence missions (except
- routine administrative and business functions) are exempted from
- this provision. Such systems are highly specialized in their
- functions and have been traditionally exempted from government-wide
- standards and regulations applying to general purpose computer
- systems. Therefore, the boundary of NBS' responsibility for non-
- security standards is drawn so as to exclude such defense-related,
- special-purpose systems.
-
- The third hierarchial level spells out explicitly, and thereby
- gives special emphasis to, responsibility for standards and
- guidelines in the computer security arena. It assigns to NBS
- responsibility within the federal government for developing
- technical, management, physical and administrative standards and
- guidelines designed to achieve, in a cost-effective way, the
- security and privacy of sensitive information in federal computer
- systems. The purpose of the standards and guidelines is to control
- loss and unauthorized modification or disclosure of sensitive
- information and to prevent computer-related fraud and abuse.
-
- Certain computer systems are exempted from this provision,
- regardless of the kind of information they contain. There are two
- categories of such exempted systems. The first is the same list
- of defense and intelligence-related systems that were exempted in
- the previous subsection, dealing with non-security standards. The
- second category includes systems that are operated at all times
- under rules designed to protect classified information. The chief
- effect of this exemption is to exclude classified systems from
- coverage by this subsection of the bill. Also exempted are mixed
- systems--those systems containing classified information at certain
- times and unclassified information at other times--provided such
- systems are operated at all times under the rules for protecting
- classified information. The purpose of this exemption is to avoid
- imposition of a second, less stringent set of security standards-
- -the NBS standards--for the unclassified operations of a mixed
- system. Further relief for mixed systems is provided in the
- amendment to the Brooks Act, allowing system operators to employ
- standards, other than the NBS standards, if such standards are more
- stringent. For example, an operator of a mixed system might use
- a subset of the classified rules for his unclassified operations,
- if the subset were more stringent than the NBS standards.
-
- One reason for the assignment of responsibility to NBS for
- developing federal computer system security standards and
- guidelines for sensitive information derives from the committee's
- concern about the implementation of National Security Decision
- Directive-145. As indicated previously, this directive established
- an interagency committee--the National Telecommunications and
- Information Systems Security Committee (NTISSC). The function of
- the NTISSC is to devise operating policies needed to assure the
- security of telecommunications and automated information systems
- that process and communicate both classified national security
- information and other sensitive government national security
- information. Policies developed by NTISSC would apply government-
- wide.
-
- While supporting the need for a focal point to deal with the
- government computer security problem, the Committee is concerned
- about the perception that the NTISSC favors military and
- intelligence agencies. It is also concerned about how broadly
- NTISSC might interpret its authority over "other sensitive national
- security information". For this reason, H.R. 145 creates a
- civilian counterpart, within NBS, for setting policy with regard
- to unclassified information. In so doing, the bill has the
- additional effect of specifically limiting the purview of the
- NTISSC to systems containing classified information and cancelling
- the authority contained in NSDD-145 for systems containing
- unclassified information. NBS is required to work closely with
- other agencies and institutions, such as NSA, both to avoid
- duplication and to assure that its standards and guidelines are
- consistent and compatible with standards and guidelines developed
- for classified systems; but the final authority for developing the
- standards and guidelines for sensitive information rests with the
- NBS.
-
- Note that the previous subsection dealt with developing non-
- security standards and guidelines, most of which affect hardware
- and software performance and interfaces. Accordingly, the bill's
- jurisdiction in that area is defined by the universe of federal
- computer systems, as limited by certain exceptions. In this
- subsection, the bill deals with security standards and guidelines,
- which apply more properly to protecting information. Therefore,
- the bill addresses unclassified (but sensitive) information in
- federal computer systems, but with certain systems exempted.
-
- The method for promulgating federal computer system security
- standards and guidelines is the same as for non-security standards
- and guidelines. NBS submits them to the Secretary of Commerce
- along with recommendations regarding the extent to which they
- should be made compulsory and binding. The Secretary of Commerce,
- under redrafted authority in the Brooks Act (to be explained
- later), then promulgates standards and guidelines, making those
- standards compulsory and binding that he determines are necessary
- to improve the efficiency of operation or security and privacy of
- federal computer systems.
-
- An additional responsibility of NBS is to devise guidelines for
- use by agencies in training employees in security awareness and
- good security practice. Section 5 of H.R. 145 requires each
- Federal agency to provide for the training of certain employees of
- each operator of a Federal computer system that is within or under
- the supervision of that agency.
-
- Also, as part of its responsibility for developing computer
- standards and guidelines, NBS is required to devise validation
- procedures to evaluate the effectiveness of the standards and
- guidelines. This is not an enforcement or compliance determining
- function. Rather, it provides the ability for operators to
- determine if the standards and guidelines are achieving their
- desired purpose. NBS is to maintain liaison (as it now does) with
- users of the standards, to assure their workability.
-
- In fulfilling these responsibilities, NBS is authorized to give
- technical assistance to the General Services Administration, the
- Office of Personnel Management, operators of federal computer
- systems and the private sector in implementing the standards and
- guidelines promulgated pursuant to the bill. Also, NBS is
- authorized to perform research and conduct studies to determine the
- nature and extent of the vulnerabilities of computer systems and
- to devise techniques to protect in a cost effective way, the
- information contained in them, and to coordinate with other
- agencies (including NSA) which perform such research, to gain the
- benefits of their efforts.
- Finally, in carrying out its responsibilities to develop
- standards and guidelines for protecting sensitive information in
- federal computer systems and to perform research, NBS is required
- to draw upon technical security guidelines developed by the NSA to
- the extent that NBS determines that NSA's guidelines are consistent
- with the requirements of civil agencies. The purpose of this
- language is to prevent unnecessary duplication and promote the
- highest degree of cooperation between these two agencies. NBS will
- treat NSA technical security guidelines as advisory, however, and
- in cases where civil agency needs will best be served by standards
- that are not consistent with NSA guidelines, NBS may develop
- standards that best satisfy the agencies' needs.
-
- It is important to note the computer security standards and
- guidelines developed pursuant to H.R. 145 are intended to protect
- sensitive information in Federal computer systems. Nevertheless,
- these standards and guidelines will strongly influence security
- measures implemented in the private sector. For this reason, NBS
- should consider the effect of its standards on the ability of U.S.
- computer system manufacturers to remain competitive in the
- international marketplace.
-
- A new Section 21 of the NBS Organic Act establishes a twelve-
- member Computer System Security and Privacy Advisory Board within
- the Department of Commerce. The chief purpose of the Board is to
- assure that NBS receives qualified input from those likely to be
- affected by its standards and guidelines, both in government and
- the private sector. Specifically, the duties of the Board are to
- identify emerging managerial, technical, administrative and
- physical safeguard issues relative to computer systems security and
- privacy and to advise the NBS and the Secretary of Commerce on
- security and privacy issues pertaining to federal computer systems.
-
- Members of the Board are to be appointed by the Secretary of
- Commerce and are to come from both inside and outside the federal
- government and have qualifications as specified in the bill.
-
- Specifically, the Board's complement is basically divided between
- federal government and non-federal government members.
-
- The non-federal government segment is further divided into two
- sub-entities, namely, (1) industry and (2) technology or other
- related disciplines.
-
- The industry segment is intended to be for hardware, and/or
- software producers and systems integrators; at least one of whom
- is representative of small or medium sized companies, and one of
- whom is representative of a large company.
-
- The technology or other related disciplines segment could include
- those eminent in academia, as well as the private sector producers
- of data bases, the financial community and other sophisticated
- users of the technology. Members will not be paid for their
- services, other than for reimbursement of travel expenses. The
- Board may use personnel from NBS or other agencies of the federal
- government for the purpose of staff support, with the consent of
- the respective agency head.
-
- The Board may conduct business with as few as seven members
- present. Findings must be reported to the Secretary of Commerce,
- the Director of the Office of management and Budget, the Director
- of the National Security Agency, and the appropriate Committees of
- Congress.
-
- Section 23 is a housekeeping change. It adds a short title to
- the NBS Organic Act for ease of reference.
-
-
- AMENDMENT TO THE BROOKS ACT
-
- H.R. 145 contains a redrafted version of section 111(d) of the
- Federal Property and Administrative Services Act of 1949. The
- chief purpose is to establish an orderly process for promulgating
- standards and guidelines pertaining to Federal computer systems.
- Specifically, the Secretary of Commerce is charged with issuing
- standards and guidelines based on the standards and guidelines
- developed by NBS, pursuant to two subsections in the amendment to
- the NBS Act. As explained, those subsections formalize NBS'
- responsibility for developing both non-security and security
- standards and guidelines. The Secretary is authorized to make
- certain standards compulsory and binding as needed to improve the
- efficiency of operation or security and privacy of federal computer
- systems. The President may disapprove or modify the standards and
- guidelines if he determines such action to be in the public
- interest.
-
- As described earlier, the amendment contains relief from strict
- compliance with these standards, when agencies already employ
- standards that are more stringent. An example is the instance
- where the unclassified operations of a mixed system are conducted
- under a subset of the rules used during classified operations,
- provided the subset is tougher than the standards mandated by the
- Secretary.
-
- Further relief is provided by language authorizing the Secretary
- of Commerce to waive the compulsory standards when compliance would
- adversely affect an operator's mission or cause major financial
- impact on the operator that is not offset by government-wide
- savings. The Secretary may delegate this authority to agency heads
- when necessary and desirable to achieve timely and effective
- implementation of measures to improve federal computer system
- security and privacy. Agency heads may redelegate this authority
- only to certain high level officials, designated pursuant to the
- Paperwork Reduction Act for the purpose of carrying out the
- agencies information management activities under that Act.
- The need for delegation authority arises from Committee concerns
- about the administrative burden on NBS. Under normal procedures,
- the Secretary can be expected to rely on NBS for technical
- evaluation of any requests for waiver. The Committee expects NBS
- to devote the bulk of its energy to producing computer systems
- standards, rather than to such compliance determinations.
- Accordingly, the amendment to the Brooks Act allows the Secretary
- flexibility to delegate the waiver authority.
-
- The amendment ties the process for developing and promulgating
- computer system standards to the requirement for an integrated
- information resources management system, as set forth in the
- Paperwork Reduction Act. To achieve this, the Administrator of
- General Services is charged with developing and implementing
- policies on federal computer systems and revising the federal
- information resources management regulations to reflect the
- standards and guidelines emanating from the Secretary of Commerce.
-
-
- TRAINING
-
- One of the fundamental purposes of H.R. 145 is improved computer
- security awareness and use of accepted computer security practice
- by all persons involved in management, use, or operation of federal
- computer systems that contain sensitive information. As indicated,
- the Committee found in its hearings that training in these areas
- is a particular weakness at most agencies. A GAO study revealed,
- for example, that only two of twenty-five major federal computer
- systems surveyed had adequate training programs. For this reason,
- the bill contains a requirement that each Federal agency provide
- for the periodic training of all employees involved with the
- management, use or operation of each Federal computer system within
- or under the supervision of that agency. The objectives of the
- training are to enhance employees' awareness of the threats and
- vulnerabilities of computer systems and to encourage the use of
- improved security practices.
-
- The process envisioned in the bill starts with NBS, which is
- responsible for developing training guidelines based on its
- research and study of vulnerabilities and countermeasures. Within
- six months of enactment and using these guidelines, the Office of
- Personnel Management must issue regulations covering such areas as
- training objectives for various categories of employee, general
- guidance concerning course content and frequency of training.
- Strictly speaking, the regulations issued by OPM under this section
- apply only to Federal civilian employees. The overall effect of
- the section, however, is to extend the regulations' applicability
- to employees of all operators of a Federal computer system as
- defined in the bill. The bill specifies that training begin within
- 60 days after the issuance of regulations by OPM. Each Federal
- agency is responsible for making provisions for the training of its
- own employees as well as those of contractors and other
- organizations that it supervises. Training should be tailored to
- the particular operating conditions and needs of each operator.
- Agencies may provide for the training in a variety of ways. For
- example, an agency may use its internal training capabilities or
- the services of training providers such as OPM or private
- companies. For the employees of contractors and other
- organizations under the supervision of an agency, the agency may
- use any available contractual or management instrument to require
- the operator to conduct periodic training in accordance with the
- NBS training guidelines and the OPM regulations. In so doing, the
- Committee expects that the agency will require the operator to bear
- the costs associated with furnishing the training. An agency head
- may approve an alternative training program which he determines to
- be at least as effective in accomplishing the objectives of the NBS
- guidelines and OPM regulations.
-
- A key determination upon which many provisions of the bill depend
- is the identification of which Federal computer systems contain
- sensitive information. By definition, the search for such systems
- is restricted to systems containing unclassified information.
- Some, but possibly not all of these systems will be determined to
- contain unclassified-sensitive information. The philosophy
- reflected in the bill is that each Federal agency is best equipped
- to make that determination relative to its own mission and
- circumstances. Therefore, the bill calls on each agency to make
- a determination for each computer system under its control, within
- six months of enactment. The determination should be based on the
- definition of "sensitive" contained in the bill and use the
- additional guidance in the section on purpose in this report.
-
- Within one year of enactment, each agency must also establish a
- plan for the security and privacy of each computer system so
- identified. Plans are to be based on the standards and guidelines
- issued by the Secretary of Commerce pursuant to the Brooks Act, or
- any waivers received. This requirement applies only to those
- computer systems subject to the provision of that Act. Plans are
- also to be commensurate with the risk and magnitude of the harm
- resulting from the loss, misuse, or unauthorized access to or
- modification of the information being protected. Copies of the
- plans must be submitted to the National Bureau of Standards and the
- National Security Agency for advise and comment and to the Office
- of Management and Budget, which has the authority to disapprove the
- plan.
-
- Implicit in the authority to disapprove security plans is
- responsibility for oversight of the identification process and
- compliance with the security plans as approved. Thus, OMB is the
- watchdog over the key implementation step in the bill.
-
-
- RULES OF CONSTRUCTION
-
- The purpose of this section is to make it explicitly clear that
- the Computer Security Act has no bearing on the public availability
- or use of information. The designation of information as sensitive
- [or as subject to protection] under the Computer Security Act is
- not a determination that the information is not subject to public
- disclosure.
-
- The Computer Security Act is strictly neutral with respect to
- public disclosure of information. Any information that was
- required to be disclosed under the Freedom of Information Act or
- other laws before enactment of the Computer Security Act will still
- have to be disclosed after enactment. Requests for information
- that was previously subject to withholding and that continues to
- qualify for withholding may be denied.
-
- Also, the Act may not be construed to expand the authority of
- any Federal agency to limit, restrict, regulate, or otherwise
- control the collection, maintenance, disclosure, use, transfer, or
- sale of (1) any privately-owned information; (2) any information
- disclosable under the Freedom of Information Act or other law
- requiring or authorizing the public disclosure of information by
- Federal agencies; or (3) any public domain information. This
- restriction on government authority applies regardless of the
- medium in which the information may be maintained. For example,
- in recent months, interest has been expressed by some Federal
- officials in restricting or monitoring use of unclassified, private
- sector computerized databases such as LEXIS and NEXIS. This
- section makes it explicitly clear that no such authority is granted
- to agencies by the Computer Security Act.
-
-
-
- *****************************************************************
-
-
- V. SECTIONAL ANALYSIS--H.R. 145
-
- Section 1. Short Title
-
- Section 2. Purpose: Sets forth the Congressional declaration
- that improving the security and privacy of federal computer systems
- is in the public interest and states Congressional intent to
- institute a means for establishing minimum acceptable security
- practices for such systems, without limiting the scope of security
- measures already planned or in use.
-
- The specific purposes of the Act are to assign the National
- Bureau of Standards responsibility for developing standards and
- guidelines for Federal computer systems, including standards and
- guidelines for the cost-effective security and privacy of sensitive
- information in Federal computer systems drawing upon the technical
- advice and assistance of the National Security Agency, where
- appropriate; to provide for promulgating such standards and
- guidelines through the Federal Property and Administrative Services
- Act of 1949; to require all operators of Federal computer systems
- that contain sensitive information to establish security plans; and
- to require mandatory periodic training for all persons involved in
- management, use or operation of Federal computer systems that
- contain sensitive information.
- Section 3. Establishment of Computer Standards Program. Amends
- the Act of March 3, 1901 to add to the mission of the National
- Bureau of Standards the study of computer systems, as defined in
- section 20(d) of the NBS Act, and their use to control machinery
- and processes.
-
- Inserts a new Section 20(a) stating the National Bureau of
- Standards shall:
-
- (1) have the mission of developing standards, guidelines,
- and associated methods and techniques for computer systems;
-
- (2) develop uniform standards and guidelines for Federal
- computer systems, except those systems excluded by section
- 2315 of title 10, United States Code, or section 3502(2) of
- title 44, United States Code;
-
- (3) have responsibility within the Federal Government for
- developing technical, management, physical and administrative
- standards and guidelines for the cost-effective security and
- privacy of sensitive information in Federal computer systems
- except--
-
- (A) those systems excluded by section 2315 of title 10,
- United States Code; and
-
- (B) those systems which are protected at all times by
- procedures established for information which has been
- specially authorized under criteria established by an
- Executive order or an Act of Congress to be kept secret
- in the interest of national defense or foreign policy;
-
- (4) submit standards and guidelines developed pursuant to
- paragraphs (2) and (3) above, along with recommendations as
- to the extent to which these should be made compulsory and
- binding, to the Secretary of Commerce, for promulgation under
- section 111 of the Federal Property and Administrative
- Services Act of 1949;
-
- (5) develop guidelines for use by operators of Federal
- computer systems that contain sensitive information in
- training their employees in security awareness and accepted
- security practice, as required by section 5 of the Computer
- Security Act of 1987; and
-
- (6) develop validation procedures for, and evaluate the
- effectiveness of, standards and guidelines developed pursuant
- to paragraphs (1), (2), and (3) above through research and
- liaison with other government and private agencies.
-
- Inserts a new Section 20(b) authorizing the National Bureau of
- Standards to:
- (1) assist the private sector in using and applying the
- results of the programs and activities under this section;
-
- (2) make recommendations to, assist and coordinate with
- other Federal agencies, as appropriate, in carrying out this
- Act;
-
- (3) provide, as requested, technical assistance to operators
- of Federal computer systems in implementing the standards and
- guidelines promulgated pursuant to this Act;
-
- (4) perform research and to conduct studies, as needed, to
- determine the nature and extent of the vulnerabilities of, and
- to devise techniques for the cost effective security and
- privacy of sensitive information in Federal computer systems;
- and
-
- (5) coordinate closely with other agencies and offices
- (including, but not limited to, the Departments of Defense and
- Energy, the National Security Agency, the General Accounting
- Office, the Office of Technology Assessment, and the Office
- of Management and Budget) to assure--
-
- (A) maximum use of all existing and planned programs,
- materials, studies and reports relating to computer
- systems security and privacy, in order to avoid
- unnecessary and costly duplication of effort; and
-
- (B) to the maximum extent feasible, that standards
- developed by the National Bureau of Standards are
- consistent and compatible with standards and procedures
- developed for the protection of information in Federal
- computer systems which is authorized under criteria
- established by Executive order or an Act of Congress to
- be kept secret in the interest of national defense or
- foreign policy.
-
- Inserts a new Section 20(c) that requires the National Bureau of
- Standards to draw upon computer system technical security
- guidelines developed by the National Security Agency to the extent
- that the National Bureau of Standards determines that such
- guidelines are consistent with the requirements for protecting
- sensitive information in Federal computer systems.
-
- Inserts a new Section 20(d) that defines--
-
- (1) the term "computer system" as--
-
- (A) any equipment or interconnected system or
- subsystems of equipment that is used in the automatic
- acquisition, storage, manipulation, management, movement,
- control, display, switching, interchange, transmission,
- or reception, of data information; and
-
- (b) includes--
-
- (i) computers;
- (ii) ancillary equipment;
- (iii) software, firmware, and similar procedures;
- (iv) services, including support services; and
- (v) related resources as defined by regulations
- issued by the Administrator for General Services
- pursuant to section 111 of the Federal Property and
- Administrative Services Act of 1949;
-
- (2) the term "Federal computer system" as a computer system
- operated by a Federal agency or by a contractor of a Federal
- agency or other organization that processes information using
- a computer system on behalf of the Federal Government to
- accomplish a Federal Government function;
-
- (3) the term "operator of a Federal computer system" as a
- Federal agency, or other organization that processes
- information using a computer system on behalf of the Federal
- Government to accomplish a Federal Government function;
-
- (4) the term "sensitive information" as any information, the
- loss, misuse, or unauthorized access or modification of which
- could adversely affect the national interest or the conduct
- of Federal programs, or the privacy to which individuals are
- entitled under section 552 of title 5, United States Code (the
- Privacy Act), but which has not been specifically authorized
- under criteria established by an Executive order or an Act of
- Congress to be kept secret in the interest of national defense
- or foreign policy; and
-
- (5) the term "Federal agency" as having the meaning given
- such term by section 3(b) of the Federal Property and
- Administrative Services Act of 1949.
-
- Inserts a new section 21(a) establishing a Computer System
- Security and Privacy Advisory Board, with a chairman to be
- appointed by the Secretary of Commerce and twelve members as
- follows:
-
- (1) four members from outside the Federal Government who are
- eminent in the computer or telecommunications industry, at
- least one of whom is representative of small or medium sized
- companies in such industry;
-
- (2) four members from outside the Federal Government who are
- eminent in the computer or telecommunications industry, at
- least one of whom is representative of small or medium sized
- companies in such industry;
-
- (2) four members from outside the Federal Government who are
- eminent in the computer or telecommunications technology, or
- related disciplines, but who are not employed by or
- representative of a producer of computer or telecommunications
- equipment; and
-
- (3) four members from the Federal Government who have
- computer systems management experience, including experience
- in computer systems security and privacy, at least one of whom
- shall be from the National Security Agency.
-
- Inserts a new Section 21(b) stating that the duties of the Board
- shall be:
-
- (1) to identify emerging managerial, technical,
- administrative, and physical safeguard issues relative to
- computer systems security and privacy;
-
- (2) to advise the Bureau of Standards and the Secretary of
- Commerce on security and privacy issues pertaining to Federal
- computer systems; and
-
- (3) to report its findings to the Secretary of Commerce, the
- Director of the Office of Management and Budget, the Director
- of the National Security Agency, and the appropriate
- Committees of the Congress.
-
- Inserts a new Section 21(b) stating that the term of office of
- each member of the Board shall be four years, except that--
-
- (1) of the initial members, three shall be appointed for
- terms of one year, three shall be appointed for terms of two
- years, three shall be appointed for terms of three years, and
- three shall be appointed for terms of four years; and
-
- (2) any member appointed to fill a vacancy in the Board
- shall serve for the remainder of the term for which his
- predecessor was appointed.
-
- Inserts a new Section 21(d) prohibiting the Board from acting in
- the absence of a quorum, which shall consist of seven members.
-
- Inserts a new section 21(e) stating that Members of the Board,
- other than full-time employees of the Federal Government, while
- attending meetings of such committees or while otherwise performing
- duties at the request of the Board Chairman while away from their
- homes or a regular place of business, may be allowed travel
- expenses in accordance with subchapter I of chapter 57 of title 5,
- United States Code.
-
- Inserts a new Section 21(f) that authorizes the Board in carrying
- out its functions, to use staff personnel from the National Bureau
- of Standards or any other agency of the Federal Government with the
- consent of the head of the agency.
-
- Adds a new Section 23 which establishes a short title for the Act
- of March 3, 1901, henceforth to be known as the "National Bureau
- of Standards Act".
-
- Section 4. Amendment to the Brooks Act. Replaces Section 11(d)
- of the Federal Property and Administrative Services Act of 1949
- with new language that:
-
- (1) empowers the Secretary of Commerce, on the basis of
- standards and guidelines developed by the National Bureau of
- Standards pursuant to section 20(a)(2) and (3) of the National
- Bureau of Standards Act, to promulgate standards and
- guidelines pertaining to Federal computer systems, making such
- standards compulsory and binding to the extent to which the
- Secretary determines necessary to improve the efficiency of
- operation of security and privacy of Federal computer systems;
-
- (2) authorizes the head of a Federal agency to employ
- standards for the cost effective security and privacy of
- sensitive information in a Federal computer system within or
- under the supervision of that agency that are more stringent
- than the standards promulgated by the Secretary of Commerce,
- if such standards contain, at a minimum, the provisions of
- those applicable standards made compulsory and binding by the
- Secretary of Commerce.
-
- (3) provides that the standards determined to be compulsory
- and binding may be waived by the Secretary of Commerce in
- writing upon a determination that compliance would adversely
- affect the accomplishment of the mission of an operator of a
- Federal computer system, or cause a major adverse financial
- impact on the operator which is not offset by government-wide
- savings. The Secretary may delegate to the head of one or
- more Federal agencies authority to waive such standards to the
- extent to which the Secretary determines such action to be
- necessary and desirable to allow for timely and effective
- implementation of Federal computer systems standards. The
- head of such agency may redelegate such authority only to a
- senior official designated pursuant to section 3506(b) of
- title 44, United States Code. Notice of each such waiver and
- delegation shall be promptly transmitted to the Committee on
- Government Operations of the House of Representatives and the
- Committee on Governmental Affairs of the Senate;
-
- (4) directs the Administrator of the General Services
- Administration to revise the Federal information resources
- management regulations to be consistent with the standards and
- guidelines promulgated by the Secretary of Commerce; and
- (5) defines the terms "Federal computer system" and
- "operator of a Federal computer system" as having the meanings
- given in section 20(d) of the National Bureau of Standards
- Act.
-
- Section 5. Federal Computer System Security Training. Requires
- each Federal agency to provide for the mandatory periodic training
- in computer security awareness and accepted computer security
- practice of all employees who are involved with the management,
- use of, or operation of, each Federal computer system within or
- under the supervision of that agency.
-
- (1) Directs that training be provided in accordance with the
- guidelines developed by the National Bureau of Standards and
- in accordance with regulations issued by the Office of
- Personnel Management for Federal civilian employees; or
-
- (2) Provided by an alternative training program approved by
- the head of that agency on the basis of a determination that
- the alternative training program is at least as effective in
- accomplishing the objectives of such guidelines and
- regulations.
-
- Training under this section shall be started within 60 days after
- the issuance of the regulations. Such training shall be designed-
-
- (1) to enhance employees' awareness of the threats to and
- vulnerability of computer systems; and
-
- (2) to encourage the use of improved security practices.
-
- Directs that within six months after the date of the enactment
- of this Act, the Director of the Office of Personnel Management
- shall issue regulations prescribing the procedures and scope of the
- training to be provided and the manner in which such training is
- to be carried out.
-
- Section 6. Additional Responsibilities for Computer Systems
- Security and Privacy. Directs that within 6 months after the date
- of enactment each Federal agency shall identify each Federal
- computer system, and system under development, which is within or
- under the supervision of that agency and which contains sensitive
- information.
-
- Provides that within one year after the date of enactment of this
- Act, each such agency shall, consistent with the standards,
- guidelines, policies, and regulations prescribed pursuant to
- section 111(d) of the Federal Property and Administrative Services
- Act of 1949, establish a plan for the security and privacy of each
- Federal computer system identified by that agency that is
- commensurate with the risk and magnitude of the harm resulting from
- the loss, misuse, or unauthorized access to or modification of the
- information contained in such system. Copies of each such plan
- shall be transmitted to the National Bureau of Standards and the
- National Security Agency for advice and comment. A summary of such
- plan shall be included in the agency's five-year plan required by
- section 3505 of title 44, United States Code. Such plan shall be
- subject to disapproval by the Director of the Office of Management
- and Budget. Such plan shall be revised annually as necessary.
-
- Section 7. Definitions. Defines the terms "computer system",
- "Federal computer system", "operator of a Federal computer system",
- "sensitive information", and "Federal agency" as having the
- meanings given in section 20(d) of the National Bureau of Standards
- Act (as added by section 3 of this Act).
-
- Section 8. Rules of Construction of Act. States that nothing
- in this Act, or in any amendment made by this Act, shall be
- construed--
-
- (1) to constitute authority to withhold information sought
- pursuant to section 552 of title 5, United States Code; or
-
- (2) to authorize the collection, maintenance, disclosure,
- use, transfer, or sale of any information (regardless of the
- medium in which the information may be maintained) that is--
-
- (A) privately-owned information;
-
- (B) disclosable under section 552 of title 5, United
- States Code, or other law requiring or authorizing the
- public disclosure of information; or
-
- (C) public domain information.
-
-
- ***************************************************************
-
-
- VI. EFFECT OF LEGISLATION ON INFLATION
-
- In accordance with Rule XI, Clause 2(l)(4), of the Rules of the
- House of Representatives, this legislation is assessed to have no
- adverse inflationary effect on prices and costs in the operation
- of the national economy.
-
-
- **************************************************************
-
-
- VII. COMMITTEE OVERSIGHT FINDINGS AND RECOMMENDATIONS
-
- Pursuant to Rule XI, Clause 2(l)(3)(A), and under the authority
- of Rule X, Clause 2(b)(l) and Clause 3(f), of the Rules of the
- House of Representatives, the following statement on oversight
- activities is made:
-
- The Committee's oversight findings are incorporated in the
- recommendations contained in the present bill and report.
-
-
- ****************************************************************
-
-
- VIII. OVERSIGHT FINDINGS AND RECOMMENDATIONS BY THE
- COMMITTEE ON GOVERNMENT OPERATIONS
-
-
- Pursuant to Rule XI, Clause 2(l)(3)(D), and under the authority
- of Rule X, Clause 2(c)(2), of the Rules of the House of
- Representatives, the following statement on oversight activities
- by the Committee on Government Operations is made:
-
- The Committee's oversight findings are reflected in the
- recommendations contained in the bill as reported by that Committee
- and the accompanying report.
-
-
-
- *****************************************************************
-
-
- IX. BUDGET ANALYSIS AND PROJECTION
-
-
- The bill provides for new authorization rather than new budget
- authority and consequently the provisions of Section 308(a) of the
- Congressional Budget Act are not applicable.
-
-
- *****************************************************************
-
-
- X. CONGRESSIONAL BUDGET OFFICE COST ESTIMATE
-
- Pursuant to Section 403 of the Congressional Budget Act of 1974
- and Rule XI, Clause 2(l)(3) of the Rules of the House of
- Representatives, the report of the Congressional Budget Office
- follows:
-
-
- CONGRESSIONAL BUDGET OFFICE COSTS ESTIMATE
-
- 1. Bill number: H.R. 145
- 2. Bill title: Computer Security Act of 1987.
- 3. Bill status: As ordered reported by the House Committee
- on Science, Space, and Technology, May 20, 1987.
- 4. Bill purpose: H.R. 145 would require the National Bureau
- of Standards (NBS) to establish a computer security standards
- program for those computer systems subject to the Brooks Act. The
- bill directs NBS to develop government-wide standards and
- guidelines, training programs, and validation standards to evaluate
- the effectiveness of computer security standards; and to work with
- the National Security Agency (NSA) and other agencies in developing
- these standards and guidelines and conducting research and studies.
- Based on recommendations submitted by the NBS, the Secretary of
- Commerce would be required to promulgate standards and guidelines
- for computer security. The bill would also establish a 13-member
- Computer System Security and Privacy Advisory Board composed of
- representatives of other federal agencies and the private sector.
-
- Within six months after the date of enactment, H.R. 145 would
- require all federal agencies to identify each computer system that
- contains sensitive data. Each agency would be required to
- establish a plan for the security of each computer and related
- system previously identified within a year after the date of
- enactment, and to revise it annually as necessary. The bill also
- requires mandatory periodic training in computer security for all
- federal agency employees who manage, use or operate computer
- systems. Each federal agency would also be required to provide for
- similar training for certain employees of private contractors and
- other organizations, such as state and local governments, that
- process information on behalf of the federal government.
-
- 5. Estimated cost to the Federal Government: CBO estimates
- that enactment of this bill would cost NBS about $4 million to $5
- million annually beginning in fiscal year 1988. Additional costs
- for planning and training in computer security by all agencies
- throughout the federal government would probably cost $20 million
- to $25 million in 1988 and $15 million to $20 million in each
- fiscal year thereafter. To the extent that this legislation would
- reduce fraud or other financial losses, some savings could also
- result from enactment of this bill. It is not possible to quantify
- these potential savings at this time.
-
- Basis of Estimate: Under the National Security Decision
- Directive (NSDD) 145, which became effective in September 1984, the
- President gave the National Security Agency (NSA) responsibility
- for ensuring the security of all classified and certain other
- sensitive information transmitted by federql computers or
- telecommunications systems. If enacted, H.E. 145 would assign some
- of this authority to NBS, mainly in the area of unclassified data.
- Although under current guidelines it is expected that most federal
- agencies, with assistance from NSA, would have strengthened
- security efforts consistent with the directive, this bill would
- enhance the role of NBS and would also impose new requirements upon
- federal agencies and their contractors in the area of computer
- security.
-
- National Bureau of Standards.--Assuming enactment of H.R. 145 and
- any necessary appropriations by October 1, 1987, the expanded role
- of NBS in computer security management and training is estimated
- to cost about $2 million annually beginning in 1988. Based on
- information from NBS, an estimated $2 million to $3 million
- annually may also be needed for research, beginning in 1988. This
- assumes that NBS would expand its management and oversight role,
- but would also receive assistance and information from the National
- Computer Security Center (NCSC) within the Department of Defense
- (DoD).
-
- Government-wide computer security plans.--The level of computer
- security varies greatly among the approximately 80 federal
- entities, including about 1,300 different organizations that would
- be affected by this legislation. The cost of identifying all
- sensitive computer systems and developing an appropriate plan for
- facility, application and personnel security would thus vary
- greatly from agency to agency, depending upon the agency's current
- level of security, the size and number of sites, and the resources
- and expertise available to implement this provision.
-
- CBO has not been able to contact each major federal entity to
- determine the cost of identifying and developing these plans for
- computer security. Based on the information available, it is
- expected that most agencies would probably assign existing
- personnel and resources to this task in order to meet the one-year
- deadline imposed by H.R. 145. If approximately 10,000 plans were
- developed, each requiring about 1-2 work weeks of effort by agency
- personnel, and two and one-half work days of review by NBS, NSA,
- and the Office of Management and Budget (OBM), the cost spread
- among the various federal agencies would be $10 million to $20
- million over the fiscal years 1988 and 1989.
-
- Government-wide training.--Currently, training resources in the
- area of computer security are scattered throughout the federal
- government. A few civilian agencies, such as the Department of
- Energy, have developed their own computer security training for
- both classified and unclassified systems. Most agencies, however,
- send employees to commercial courses or those offered by other
- federal agencies, such as the General Services Administration
- (GSA), the Office of Personnel Management (OPM), the Department of
- Agriculture Graduate School, or NSA.
-
- H.R. 145 would require mandatory training for all federal and
- contractor personnel who manage, use or operate computer systems.
- The cost of such training depends on the number of people involved
- and the kind of training provided. Based on information from a
- number of agencies, it is expected that roughly half of all
- government and contractor employees, or about 3 million employees,
- would initially receive some type of training as a result of the
- bill. Subsequently, training would be provided to most new
- employees, and retraining would be required only periodically.
-
- It is expected that most training in the area of computer
- security would become decentralized, with each agency responsible
- for developing its own programs, although some centralized training
- for smaller agencies and in specialized program areas would remain.
- The NCSC has developed a data base of educational opportunities
- offered by government, universities and private sources that is
- available to agencies. Training courses are relatively expensive,
- however. They currently cost about $50 to $200 per day per person
- (not including development costs) and typically are offered to
- technical personnel who attend a three-to-five day session. In an
- effort to reduce training costs, NCSC is developing training
- packages that will be available on tape or film, sharply reducing
- the training cost per person.
-
- Based on the information from NCSC, GSA, OPM, and OMB, CBO made
- a number of assumptions about the amounts and types of training
- that would be required as a result of enactment of H.R. 145. The
- resulting estimates provide a rough estimate of the possible
- additional cost of training, but should not be considered precise.
-
- Within three years after the date of enactment, it is assumed
- that about 90 percent of the estimated 3 million employees affected
- by the bill would receive some type of computer security awareness
- training. Assuming the availability of training modules and other
- low-cost products, it is expected that the cost for this type of
- training would have no significant budget impact over and above the
- cost of maintaining good information sysstems, which is now the
- responsibility of each agency. It is estimated that about 10
- percent of the 3 million employees, or 300,000, would require more
- formalized training. Assuming that about three-quarters of these
- individuals (about one-half from DoD) would have received training
- under current law, then about 75,000 employees would like require
- training as a result of this bill. Three days of specialized
- training, at an average cost of $100 per day, for 75,000 persons
- would cost $20 million to #25 million over several years. After
- the initial training, costs for retraining and training of new
- personnel are expecsted to cost about $5 million annually.
-
- Finally, it is assumed that about 250 civilian employees would
- gradually be recruited and/or trained to evaluate the technical
- protection capabilities of industry and government-developed
- systems, and to train other agency personnel. This type of
- training, according to NCSC, takes two to three years. At an
- average cost of $60,000 per year, including overhead, it is
- estimated that this type of support staff would cost the feceral
- government about $15 million annually, once fully implemented.
-
- 6. Estimated cost to State and local governments: H.R. 145
- would require training in computer security for non-federal as well
- as federal operators of computer systems that process data on
- behalf of the federal government. This requirement would include
- state or local governments that are involved in such activities as
- monitoring compliance with federal regulations, disbursing federal
- funds, and collecting or maintaining data for ultimate federal use.
- Based on information from the committee, these non-federal
- operators would be expected to bear the cost of furnishing the
- training. Because no complete inventory of the relevant computer
- systems at the state and local level exists, it is not possible at
- this time to estimate with precision the costs to state and local
- governments of providing this training. Based on the limited
- information available, we expect that total costs incurred by state
- and local governments are likely to be less than $25 million
- annually.
-
- 7. Estimate comparison: None
-
- 8. Previous CBO estimate: On May 4, 1987, CBO transmitted
- to the House Committee on Government Operations a cost estimate for
- H.R. 145, as ordered reported by that committee on April 7, 1987.
- The estimated cost of each version of H.R. 145 is the same.
-
- 9. Estimate prepared by: Carol Cohen
- 10. Estimate approved by: C.G. Nuckols, for James L. Blum,
- Assistant Director for Budget Analysis.
-
-
- ****************************************************************
-
-
- XI. ADMINISTRATION POSITION
-
- EXECUTIVE OFFICE OF THE PRESIDENT
- OFFICE OF MANAGEMENT AND BUDGET
- Washington, DC, May 12, 1987
-
- Hon. Robert A. Roe,
- Chairman, Committee on Science, Space and Technology,
- U.S. House of Representatives, Washington, DC.
-
- DEAR MR. CHAIRMAN: I am pleased that through intensive
- consultations between the Administration and the Congress great
- progress has been made toward agreement on a Computer Security Act
- of 1987. I hope that this statement of Administration views will
- assists in offering construction solutions to areas where further
- improvements are desirable.
-
- As we have reviewed H.R. 145, a primary concern has been to
- assure that the roles of the National Security Agency (NSA) are
- discharged in a manner that will promote a sound public policy and
- result in efficient/cost effective, and productive solutions. In
- this regard it is the Administration's position that NBS in so far
- as they are available and consistent with the requirements of civil
- departments and agencies to protect data processed in their
- systems. When developing technical security guidelines, NSA will
- consult with NBS to determine how its efforts can best support such
- requirements. We believe this would avoid costly duplication of
- effort.
-
- Computer security standards, like other computer standards, will
- be developed in accordance with established NBS procedures. In
- this regard the technical security guidelines provided by NSA to
- NBS will be treated as advisory and subject to appropriate NBS
- review. In cases where civil agency needs will best be served by
- standards that are not consistent with NSA technical guidelines,
- the Secretary of Commerce will have authority to issue standards
- that best satisfy the agencies' needs. At the same time agencies
- will retain the option to ask for Presidential review of standards
- issued by the Department of Commerce do not appear to be consistent
- with U.S. public interest, including that of our national security.
- I am enclosing proposed changes to the present text of H.R. 145
- which are consistent with the NBS-NSA relationship outlined above
- and make several minor changes that would further improve the bill.
-
- In closing, I want to assure you that a reported bill within the
- parameters outlined in this letter will have the Administration's
- support.
-
- Sincerely yours,
-
- JAMES C. MILLER III, Director
-
-
- ****************************************************************
-
-
- XII. CHANGES IN EXISTING LAW MADE BY THE BILL, AS REPORTED
-
- In compliance with clause 3 of rule XIII of the Rules of the
- House of Representatives, changes in existing law made by the bill,
- as reported, are shown as follows (existing law proposed to be
- omitted is enclosed in black brackets, new matter is printed in
- italic, existing law in which no change is proposed is shown in
- roman):
-
- ACT OF MARCH 3, 1901
-
- AN ACT To establish the National Bureau of Standards
-
- * * * * * * *
-
- SEC. 2. The Secretary of Commerce (hereinafter referred to as the
- "Secretary") is authorized to undertake the following functions:
- (a) * * *
-
- * * * * * * *
-
- (f) Invention and development of devices to serve special needs
- of the Government.
-
- In carrying out the functions enumerated in this section, the
- Secretary is authorized to undertake the following activities and
- similar ones for which need may arise in the operations of
- Government agencies, scientific institutions, and industrial
- enterprises:
-
- (1) * * *
-
-
- * * * * * * *
-
- (18) the prosecution of such research in engineering,
- mathematics, and the physical sciences as may be
- necessary to obtain basic data pertinent to the functions
- specified herein; [and]
-
- (19) the compilation and publication of general
- scientific and technical data resulting from the performance
- of the functions specified herein or from other sources when
- such data are of importance to scientific or manufacturing
- interests or to the general public, and are not available
- elsewhere, including demonstration of the results of the
- Bureau's work by exhibits or otherwise as may be deemed most
- effective, and including the use of National Bureau of
- Standards scientific or technical personnel for part-time or
- intermittent teaching and training activities at educational
- institutions of higher learning as part of and incidental to
- their official duties and without additional compensation
- other than that provided by law [.]; and
-
- (20) the study of computer systems (as that term is
- defined in section 20(d) of the Act) and their use to control
- machinery and processes.
-
- * * * * * * *
-
- SEC 20.(a) The National Bureau of Standards shall--
-
- (1) have the mission of developing standards,
- guidelines, and associated methods and techniques for computer
- systems;
-
- (2) except as described in paragraph (3) of this
- subsection (relating to security standards), develop uniform
- standards and guidelines for Federal computer systems, except
- those systems excluded by section 2315 of title 10, United
- States Code, or section 3502(2) of title 44, United States
- Code;
-
- (3) have responsibility within the Federal Government
- for developing technical, management, physical, and
- administrative standards and guidelines for the cost-effective
- security and privacy of sensitive information in Federal
- computer systems except-
-
- (A) those systems excluded by section 2315 of title 10,
- United State Code, or section 3502(2) of title 44, United
- States Code; and
-
-
-
- (B) those systems which are protected at all times by
- procedures established for information which has been
- specifically authorized under criteria established by an
- Executive order or an Act of Congress to be kept secret
- in the interest of national defense or foreign policy,
- the primary purpose of which standards and guidelines
- shall be to control loss and unauthorized modification
- or disclosure of sensitive information in such systems
- and to prevent computer-related fraud and misuse;
-
- (4) submit standards and guidelines developed pursuant
- to paragraphs (2) and (3) of this subsection, along with
- recommendations as to the extent to which these should be made
- compulsory and binding, to the Secretary of Commerce for
- promulgation under section 111(d) of the Federal Property and
- Administrative Services Act of 1949;
-
- (5) develop guidelines for use by operators of Federal
- computer systems that contain sensitive information in
- training their employees in security awareness and accepted
- security practice, as required by section 5 of the Computer
- Security Act of 1987; and
-
- (6) develop validation procedures for, and evaluate the
- effectiveness of, standards and guidelines developed pursuant
- to paragraphs (1), (2), and (3) of this subsection through
- research and liaison with other government and private
- agencies.f
-
- (b) In fulfilling subsection (a) of this section, the National
- Bureau of Standards is authorized-
-
- (1) to assist the private sector, upon request, in using
- and apply the results of the programs and activities under
- this section;
-
- (2) to make recommendations, as appropriate, to the
- Administrator of General Services on policies and regulations
- proposed pursuant to section 111(d) of the Federal Property
- and Administrative Services Act of 1949;
-
- (3) as requested, to provide to operators of Federal
- computer systems technical assistance in implementing the
- standards and guidelines promulgated pursuant to section
- 111(d) of the Federal Property and Administrative Services Act
- of 1949;
-
- (4) to assist, as appropriate, the Office of Personnel
- Management in developing regulations pertaining to training,
- as required by section 5 of the Computer Security Act of 1987;
-
- (5) to perform research and to conduct studies, as
- needed, to determine the nature and extent of the
- vulnerabilities of, and to devise techniques for the cost
- effective security and privacy of sensitive information in
- Federal computer system; and
-
- (6) to coordinate closely with other agencies and
- offices (including, but not limited to, the Departments of
- Defense and Energy, the National Security Agency, the General
- Accounting office, the Office of Technology Assessment, and
- the Office of Management and Budget)--
-
- (A) to assure maximum use of all existing and planned
- programs, materials, studies, and reports relating to
- computer systems security and privacy, in order to avoid
- unnecessary and costly duplication of effort; and
-
- (B) to assure, to the maximum extent feasible, that
- standards developed pursuant to subsection (a) (3) and
- (5) are consistent and compatible with standards and
- procedures developed for the protection of information
- in Federal computer systems which is authorized under
- criteria established by Executive order or an Act of
- Congress to be kept secret in the interest of National
- defense or foreign policy.
-
- (c) For the purposes of-
-
- (1) developing standards and guidelines for the protection
- of sensitive information in Federal computer systems under
- subsections (a)(1) and (a)(3), and
-
- (2) performing research nd conducting studies under
- subsection (b)(5),
-
- the National Bureau of Standards shall draw upon computer
- system technical security guidelines developed by the National
- Security Agency to the extent that the National Bureaus of
- Standards determines that such guidelines are consistent with
- the requirements for protecting sensitive information in
- Federal computer systems.
-
- (d) As used in this section-
-
- (1) the term "computer system"-
-
- (A) means any equipment or interconnected system or
- subsystems of equipment that is used in the automatic
- acquisition, storage, manipulation, management, movement,
- control, display, switching, interchange, transmission,
- or reception, of data or information; and
-
- (B) includes--
-
- (i) computers;
- (ii) ancillary equipment;
- (iii) software, firmware, and similar
- procedures;
- (iv) services, including support
- services; and
- (v) related resources as defined by
- regulations issued by the Administrator
- for General Services pursuant to
- section 111 of the Federal Property and
- Administrative Services Act of 1949;
-
- (2) the term "Federal computer system"--
-
- (A) means a computer system operated by a
- Federal agency or by a contractor of a Federal
- agency or other organization that processes
- information (using a computer system) on behalf of
- the Federal Government to accomplish a Federal
- function; and
-
- (B) includes automatic data processing equipment
- as that term is defined in section 111(a)(2) of the
- Federal Property and Administrative Services Act of
- 1949;
-
- (3) the term "operator of a Federal computer system"
- means a Federal agency, contractor of a Federal agency,
- or other organization that processes information using
- a computer system on behalf of the Federal Government to
- accomplish a Federal function;
-
- (4) the term "sensitive information" means any
- information, the loss, misuse, or unauthorized access to
- or modification of which could adversely affect the
- national interest or the conduct of Federal programs, or
- the privacy to which individuals are entitled under
- section 552a of title 5, United States Code (the Privacy
- Act), but which has not been specifically authorized
- under criteria established by an Executive order or an
- Act of Congress to be kept secret in the interest of
- national defense or foreign policy; and
-
- (5) the term "Federal agency" has the meaning given
- such term by section 3(b) of the Federal Property and
- Administrative Services Act of 1949.
-
- SEC. 21. (a) There is hereby established a Computer System
- Security and Privacy Advisory Board within the Department of
- Commerce. The Secretary of Commerce shall appoint the chairman of
- the Board. The Board shall be composed of twelve additional
- members appointed by the Secretary of Commerce as follows:
-
- (1) four members from outside the Federal Government
- who are eminent in the computer or telecommunications
- industry, at least one of whom is representative of
- small or medium sized companies in such industries;
-
- (2) four members from outside the Federal Government who
- are eminent in the fields of computer or
- telecommunications technology, or related disciplines,
- but who are not employed by or representative of a
- producer of computer or telecommunications equipment;
- and
-
- (3) four members from the Federal Government who have
- computer systems management experience, including
- experience in computer systems security and privacy, at
- least one of whom shall be from the National Security
- Agency.
-
- (b) The duties of the Board shall be--
-
- (1) to identify emerging managerial, technical,
- administrative, and physical safeguard issues relative
- to computer systems security and privacy;
-
- (2) to advise the Bureau of Standards and the Secretary
- of Commerce on security and privacy issues pertaining to
- Federal computer systems; and
-
- (3) to report its findings to the Secretary of Commerce,
- the Director of the Office of Management and Budget, the
- Director of the National Security Agency, and the
- appropriate Committees of the Congress.
-
- (c) The term of office of each member of the Board shall be
- four years, except that--
-
- (1) of the initial members, three shall be appointed for
- terms of one year, three shall be appointed for terms of
- two years, three shall be appointed for terms of three
- years, and three shall be appointed for terms of four
- years; and
-
- (2) any member appointed to fill a vacancy in the Board
- shall serve for the remainder of the term for which his
- predecessor was appointed.
-
- (d) The Board shall not act in the absence of a quorum, which
- shall consist of seven members.
-
- (e) Members of the Board, other than full-time employees of
- the Federal Government while attending meetings of such committees
- or while otherwise performing duties at the request of the Board
- Chairman while away from their homes or a regular place of
- business, may be allowed travel expenses in accordance with
- subchapter I of chapter 57 of title 5, United States Code.
-
- (f) To provide the staff services necessary to assist the
- Board in carrying out its functions, the Board may utilize
- personnel from the National Bureau of Standards or any other
- agency of the Federal Government with the consent of the head of
- the agency.
-
- (g) As used in this section, the terms "computer system" and
- "Federal computer system" have the meanings given in section 20(d)
- of this Act."
-
- SEC. 23. This Act may be cited as the National Bureau of
- Standards Act.
-
-
- SECTION 111 OF THE FEDERAL PROPERTY AND ADMINISTRATIVE
- SERVICES ACT OF 1949
-
- AUTOMATIC DATA PROCESSING EQUIPMENT
-
- SEC. 111. (a) * * *
-
- * * * * * * *
-
- [(d) The Secretary of Commerce is authorized (1) to provide
- agencies, and the Administrator of General Services in the
- exercise of the authority delegated in this section, with
- scientific and technological advisory services relating to
- automatic data processing and related systems, and (2) to make
- appropriate recommendations to the President relating to the
- establishment of uniform Federal automatic data processing
- standards. The Secretary of Commerce is authorized to undertake
- the necessary research in the sciences and technologies of
- automatic data processing computer and related systems, as may be
- required under provisions of this subsection.]
-
- (d)(1) The Secretary of Commerce shall, on the basis of
- standards and guidelines developed by the National Bureau of
- Standards pursuant to section 20(a) (2) and (3) of the National
- Bureau of Standards Act, promulgate standards and guidelines
- pertaining to Federal computer systems, making such standards
- compulsory and binding to the extent to which the Secretary
- determines necessary to improve the efficiency of operation or
- security and privacy of Federal computer systems. The President
- may disapprove or modify such standards and guidelines if he
- determines such action to be in the public interest. The
- President's authority to disapprove or modify such standards and
- guidelines may not be delegated. Notice of such disapproval or
- modification shall be submitted promptly to the Committee on
- Government Operations of the House of Representatives and the
- Committee on Governmental Affairs of the Senate and shall be
- published prompt in the Federal Register. Upon receiving notice
- of such disapproval or modification, the Secretary of Commerce
- shall immediately rescind or modify such standards or guidelines
- as directed by the president.
-
- (2) The head of a Federal agency may employ standards for the
- cost effective security and privacy of sensitive information in a
- Federal computer system with in or under the supervision of that
- agency that are more stringent than the standards promulgated by
- the Secretary of Commerce, if such standards contain, at a
- minimum, the provisions of those applicable standards made
- compulsory and binding by the Secretary of Commerce.
-
- (3) The standards determined to be compulsory and binding may
- be waived by the Secretary of Commerce in writing upon a
- determination that compliance would adversely affect the
- accomplishment of the mission of an operator of a Federal computer
- system, or cause a major adverse financial impact on the operator
- which is not offset by government-wide savings The Secretary may
- delegate to the head of one or more Federal agencies authority to
- waive such standards to the extent to which the Secretary
- determines such action to be necessary and desirable to allow for
- timely and effective implementation of Federal computer systems
- standards. The head of such agency may redelegate such authority
- only to a senior official designated pursuant to section 3506(b)
- of title 44, United States Code. Notice of each such waiver and
- delegation shall be transmitted promptly to the Committee on
- Government Operations of the House of Representatives and the
- Committee on Governmental Affairs of the Senate and shall be
- published promptly in the Federal Register.
-
- (4) The Administrator shall revise the Federal information
- resources management regulations (41 CFR ch. 201) to be consistent
- with the standards and guidelines promulgated by the Secretary of
- Commerce under this subsection.
-
- (5) As used in this subsection, the terms "Federal computer
- system" and "operator of a Federal computer system" have the
- meanings given in section 20(d) of the National Bureau of
- Standards Act.
-
- * * * * * * *
-
-
- ***************************************************************
-
-
- XIII. COMMITTEE RECOMMENDATION
-
- A quorum being present, the bill was ordered favorably reported
- on May 20, 1987, by unanimous voice vote.
-
-
-
- ************************* END OF TEXT **********************
-