Distribution Statement A – Approved for public release by DOPSR case # 16-S-1757. Distribution is unlimited. DAU Training Symposium April 27, 2016 | Page-1.

Slides:



Advertisements
Similar presentations
Copyright (C) The Open Group 2014 Securing Global IT Supply Chains and IT Products by Working with Open Trusted Technology Provider™ Accredited Companies.
Advertisements

Secure Systems Research Group - FAU Process Standards (and Process Improvement)
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Software Quality Assurance Plan
NDIA SE Div Mtg: Trusted System Overview 8/18/10 Page-1 DISTRIBUTION STATEMENT A -- Cleared for public release by OSR on 11 August 2010; SR Case # 10-S-2984.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
U.S. General Services Administration Presentation to: ACT-IAC Cybersecurity SIG Improving Cybersecurity through Acquisition Emile Monette Senior Advisor.
KDP-1: Integrate supply chain knowledge into secure solutions concepts Evaluate supply chain threats with respect to the set of possible solutions under.
National Infrastructure Protection Plan
DHS, National Cyber Security Division Overview
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
1 Acquisition and Technology Overview: System Assurance and Cyber Security Kristen Baldwin Deputy Director, Strategic Initiatives Office of the Deputy.
Lecture 1: Overview modified from slides of Lawrie Brown.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
Security Controls – What Works
DoD Systems and Software Engineering A Strategy for Enhanced Systems Engineering Kristen Baldwin Acting Director, Systems and Software Engineering Office.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Security Engineering II. Problem Sources 1.Requirements definitions, omissions, and mistakes 2.System design flaws 3.Hardware implementation flaws, such.
Session 3 – Information Security Policies
Complying With The Federal Information Security Act (FISMA)
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
SEC835 Database and Web application security Information Security Architecture.
1 1 Update on DoD Progress in Anti-Counterfeiting April 12, 2011 L&MR/SCI.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
DFARS & What is Unclassified Controlled Technical Information (UCTI)?
Information Systems Security Computer System Life Cycle Security.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
NIST Special Publication Revision 1
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Service Transition & Planning Service Validation & Testing
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
UNCLASSIFIED DITSCAP Primer. UNCLASSIFIED 1/18/01DITSCAP Primer.PPT 2 DITSCAP* Authority ASD/C3I Memo, 19 Aug 92 –Develop Standardized C&A Process DODI.
SE Team Agenda Review work being done by Dwayne –Review Sect 4.4.X for DAG – being processed –SEP Guide – being processed; seen as OK –Technical Reviews.
Radar Open Systems Architectures
Georgia Institute of Technology CS 4320 Fall 2003.
Chapter 1 Overview The NIST Computer Security Handbook defines the term Computer Security as:
Shift Left Feb 2013 Page-1 DISTRIBUTION STATEMENT A – Cleared for Open Publication by OSR on January 17 th, 2013 – SR case number 13-S-0851 Dr. Steven.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
LOG 101 Curriculum Review 16 Jul 04 Richard A. Andrews, CPL Course Manager.
DOD SOFTWARE ASSURANCE INITIATIVE: Mitigating Risks Attributable to Software through Enhanced Risk Management Joe Jarzombek, PMP Deputy Director for Software.
Fax: (703) DoD BIOMETRICS PROGRAM DoD Biometrics Management Office Phone: (703)
Of XX Data Rights, Intellectual Property, Information Technology and Export Controls in Government Contracting Fernand Lavallee, Partner, Jones Day ©2015.
SecSDLC Chapter 2.
Introduction and Overview of Information Security and Policy By: Hashem Alaidaros 4/10/2015 Lecture 1 IS 332.
Privacy Act United States Army (Managerial Training)
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
CNCI-SCRM STANDARDIZATION Discussion Globalization Task Force OASD-NII / DoD CIO Unclassified / FOUO.
LOG 101 Curriculum Review 28 Jun 02 Richard A. Andrews, CPL Course Manager.
How To Conduct An Administrative Inquiry (AI) Due To A Security Violation
The NIST Special Publications for Security Management By: Waylon Coulter.
Distribution Statement A – Approved for public release by DOPSR. Distribution is unlimited PSM Workshop April 6, 2016 | Page-1 Melinda Reed Office.
ISO 9001:2015 Subject: Quality Management System Clause 8 - Operation
UNCLASSIFIED The Open Group 01/07/10 Page-1 Kick-off Meeting for The Open Group Acquisition Cyber Security Initiative Ms. Kristen Baldwin Director, Systems.
1 Changes to Regulations Governing Personal Conflicts of Interest and Organizational Conflicts of Interest Breakout Session # C08 Name: Barbara S. Kinosky,
NSWC Crane 07/27/16 Page-1 Distribution Statement A – Approved for public release by DOPSR; Case # 16-S-2361 applies. Distribution is unlimited.Distribution.
DoD Template for Application of TLCSM and PBL
Safeguarding Covered Defense Information
NAVSEA Material Fraud and Counterfeit Materiel Manager
Trade-offs to establish an integrated, comprehensive protection scheme
Introduction to the Federal Defense Acquisition Regulation
Purpose Provide an update on recent major changes to law, policy, and guidance that affect the way we conduct IA&E activities National Defense Authorization.
Safeguarding Covered Defense Information
Supplier Information Session Safeguarding Covered Defense Information and Cyber Incident Reporting, DFARS August 16, 2016 Christian Ortego.
DFARS Cybersecurity Requirements
Cybersecurity ATD technical
Cybersecurity EXERCISE (CE) ATD Scenario questions
IT Management Services Infrastructure Services
Cybersecurity for Engineers
Purpose Provide an update on recent major changes to law, policy, and guidance that affect the way we conduct IA&E activities National Defense Authorization.
Presentation transcript:

Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. DAU Training Symposium April 27, 2016 | Page-1 Kristen J. Baldwin Acting Deputy Assistant Secretary of Defense for Systems Engineering (DASD(SE)) DAU Acquisition Training Symposium Fort Belvoir, Virginia | April 27, 2016 Program Protection

DAU Training Symposium April 27, 2016 | Page-2 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. Ensuring Cyber Resilience in Defense Systems Threat: –Adversary who seeks to exploit vulnerabilities to: − Acquire program and system information; − Disrupt or degrade system performance; − Obtain or alter US capability Vulnerabilities: –Found in programs, organizations, personnel, networks, systems, and supporting systems –Inherent weaknesses in hardware and software can be used for malicious purposes –Weaknesses in processes can be used to intentionally insert malicious hardware and software –Unclassified design information within the supply chain can be aggregated –US capability that provides a technological advantage can be lost or sold Consequences: –Loss of technological advantage –System impact – corruption and disruption –Mission impact – capability is countered or unable to fight through Access points are throughout the acquisition lifecycle… …and across numerous supply chain entry points -Government -Prime, subcontractors -Vendors, commercial parts manufacturers -3 rd party test/certification activities

DAU Training Symposium April 27, 2016 | Page-3 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. Spectrum of Program Protection Risks to Consider Product defect/ inadequacy introduced either through mistake or negligence during design, production, and post-production handling resulting in the introduction of deficiencies, vulnerabilities, and degraded life-cycle performance. Mission failure in the field due to environmental factors unique to military and aerospace environment factors such as particle strikes, device aging, hot- spots, electro- magnetic pulse, etc. Counterfeit and other than genuine and new devices from the legally authorized source including relabeled, recycled, cloned, defective, out-of-spec, etc. The intentional insertion of malicious hard/soft coding, or defect to enable physical attacks or cause mission failure; includes logic bombs, Trojan ‘kill switches’ and backdoors for unauthorized control and access to logic and data. Unauthorized extraction of sensitive intellectual property using reverse engineering, side channel scanning, runtime security analysis, embedded system security weakness, etc. Stolen data provides potential adversaries extraordinary insight into US defense and industrial capabilities and allows them to save time and expense in developing similar capabilities. Quality Escape Reliability Failure Fraudulent Product Reverse Engineering Malicious Insertion Information Losses DoD Program Protection focuses on risks posed by malicious actors

DAU Training Symposium April 27, 2016 | Page-4 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. Program Protection in DoDI Program Managers, with assistance from supporting organizations, are responsible for protecting the program and the system DoDI requires program managers to employ system security engineering practices and prepare a Program Protection Plan to manage the security risks to the program and system elements that are vulnerable and can be exposed to targeting − Critical Program Information − Mission-critical functions and critical components − Information about the program and within the system

DAU Training Symposium April 27, 2016 | Page-5 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. Cybersecurity in Acquisition Acquisition workforce must take responsibility for the cybersecurity of their programs from earliest research and technology development through system concept, design, development, test and evaluation, production, fielding, sustainment, and disposal Scope of program cybersecurity includes: –Program information Data about acquisition, personnel, planning, requirements, design, test data and support data for the system. Also includes data that alone might not be unclassified or damaging, but in combination with other information could allow an adversary to compromise, counter, clone, or defeat warfighting capability –Organizations and Personnel Government program offices, prime and subcontractors, along with manufacturing, testing, depot and training organizations –Networks Government and Government support activities, unclassified and classified networks, contractor unclassified and classified networks, and interfaces among Government and contractor networks –Systems and Supporting Systems The system being acquired, system interfaces, and associated training, testing, manufacturing, logistics, maintenance and other support systems

DAU Training Symposium April 27, 2016 | Page-6 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. What Are We Protecting? Policies, guidance and white papers are found at our initiatives site: What: A capability element that contributes to the warfighters’ technical advantage (CPI) Key Protection Measure Types: Anti-Tamper Exportability Features Goal: Prevent the compromise and loss of CPI What: Mission-critical functions and components Key Protection Measure Types: Software Assurance Hardware Assurance/Trusted Microelectronics Supply Chain Risk Management Anti-counterfeits Goal: Protect key mission components from malicious activity What: Information about the program, system, designs, processes, capabilities and end- items Key Protection Measure Types: Classification Export Controls Information Security Goal: Ensure key system and program data is protected from adversary collection Program Protection & Cybersecurity InformationComponentsTechnology Protecting Warfighting Capability Throughout the Lifecycle DoDM , Vol. 1-4 DoDI DoDI DoDI DoDM DoDI DoDI DoDI

DAU Training Symposium April 27, 2016 | Page-7 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. Concept Studies System Definition(Functional Baseline) Preliminary Design (Allocated Baseline) Detailed Design (Product Baseline) Design Definition Systems Security Engineering Activity Overview Protections are identified and integrated into technical baselines Analyses are iteratively informed by and informing the design Results are documented in the PPP. Technical Baselines* SSE Decision Analysis Determine candidate protections to address vulnerabilities. Utilize protections from across SSE specialties (e.g. anti-tamper (AT), cybersecurity) and security specialties (e.g. physical security, operations security) Contractor Implement SSE in design, development: Respond to SSE requirements Asses security risks during design review and system implementation Implement SSE in design, development: Respond to SSE requirements Asses security risks during design review and system implementation Verification & Validation Conduct V&V: Evaluate AT protections Assess hardware and software vulnerabilities Verify SSE reqmts (Contractor, DT&E, OT&E) Conduct V&V: Evaluate AT protections Assess hardware and software vulnerabilities Verify SSE reqmts (Contractor, DT&E, OT&E) Program and System Analyses Conduct engineering risk/cost trade-off analyses Establish protection measures System security requirements Identify acquisition mitigations Further analyses necessary Establish protection measures System security requirements Identify acquisition mitigations Further analyses necessary Threat and Vulnerability Assessments Identify threats and vulnerabilities related to: Mission-critical functions/components CPI Key info about the program and system (emphasis on technical information) Identify threats and vulnerabilities related to: Mission-critical functions/components CPI Key info about the program and system (emphasis on technical information) Design Definition SRR Criticality Analysis Determine critical functions and components based on critical mission threads Identify key suppliers Criticality Analysis Determine critical functions and components based on critical mission threads Identify key suppliers CPI Analysis Identify capability elements providing a US technological advantage Conduct horizontal analysis CPI Analysis Identify capability elements providing a US technological advantage Conduct horizontal analysis Information Analysis Properly apply classification and marking procedures Implement required info protections Information Analysis Properly apply classification and marking procedures Implement required info protections Assess SSE risks based on Program/ System Analyses and identified threats/ vulnerabilities

DAU Training Symposium April 27, 2016 | Page-8 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. Anti-Tamper AT protects critical program information (CPI) in U.S. systems (those lost/left on the battlefield or exported). AT techniques (e.g., hardware protective coatings, software encryption, etc.) may deter, prevent, detect, or respond to an attempt to reverse engineer the system. DoD Directive E, “Anti-Tamper (AT),” designates the Secretary of the Air Force as the DoD Executive Agent (EA) for AT and assigns responsibilities across the DoD Components for AT protection of CPI. The AT Plan, an appendix to the Program Protection Plan, is a document to help develop and communicate a program’s AT protection through its lifecycle. Programs are encouraged to contact the DoD EA for AT and their Service AT Representative early in the program for guidance.

DAU Training Symposium April 27, 2016 | Page-9 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. Joint Federated Assurance Center JFAC is a federation of DoD software and hardware assurance (SwA/HwA) capabilities and capacities to: –Support programs in addressing current and emerging threats and vulnerabilities –Facilitate collaboration across the Department and throughout the lifecycle of acquisition programs –Provide SW and HW inspection, detection, analysis, risk assessment, and remediation tools and techniques to PM’s to mitigate risk of malicious insertion JFAC Coordination Center and JFAC Portal –Offers enterprise licenses for SwA tools –SwA and HwA best practices, guidance and awareness Lead DoD microelectronic hardware assurance capability providers –Naval Surface Warfare Center Crane –Army Aviation & Missile Research Development and Engineering Center –Air Force Research Lab JFAC Portal (CAC-enabled)

DAU Training Symposium April 27, 2016 | Page-10 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. Trusted Microelectronics Suppliers (e.g. Trusted Foundry) The Defense Microelectronics Activity (DMEA) certifies trusted suppliers for DoD-unique microelectronic designs (e.g. ASIC chips) − There are over 70 trusted suppliers certified by DMEA The IBM Trusted Foundry contract provided microelectronics trust and access for 11+ years to many DoD, intelligence and NASA programs − Broad use by acquisition and technology programs, and special capabilities − The IBM TF produced state-of-the-art technology nodes; some of which were IBM-unique GlobalFoundries (GF) acquired IBM’s foundry operations in July 2015 − In March 2016, DoD awarded a new contract with GF to retain access to the two foundries that provided DoD trusted microelectronics parts − DoD programs are advised to execute life-time buys (LTBs) of production-ready parts while GF Trusted Foundry is available DoD has established a program to address long term trusted access to microelectronics − Provide an alternative trust model and eliminate reliance on sole source foundries − New approach will consist of secure microelectronics design and packaging technologies that protect CPI, provide assurance and trusted chain of custody − DoD programs and industry partners are being identified for piloting and transition of the new trust model

DAU Training Symposium April 27, 2016 | Page-11 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. Contract Regulation for Safeguarding Covered Defense Information DFARS Clause : Safeguarding Covered Defense Information and Cyber Incident Reporting; 2nd interim rule published December 30, 2015, to provide contractors with additional time to implement NIST security requirements. Publication of final rule is planned in the 3 rd /4 th QTR FY16. Purpose: Establish minimum requirements for contractors and subcontractors to safeguard DoD unclassified covered defense information and report cyber incidents on their contractor owned and operated information systems. Requires Contractors to : Flow down only to Subcontractors where their efforts will involve covered defense information or where they will provide operationally critical support. Comply with security requirements in the NIST SP , “Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations” Report cyber incident and compromises affecting covered defense information Submit malware that they are able to discover and isolate in connection with a reported cyber incident Contractor actions to support DoD damage assessment as needed The Program Office should pay particular attention to DoD unclassified information provided to, and developed by, the contractor

DAU Training Symposium April 27, 2016 | Page-12 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. Program Protection Relationship to Key Acquisition Activities - Incorporation into technical baselines - SSE entry and exit criteria in SE tech reviews - SSE as a design consideration - Technical risks and mitigation plans - Data needed to ascertain cybersecurity requirements are met - Cooperative Vulnerability Identification and Penetration Assessments - Adversarial Assessments - Trusted supplier requirements - Acquisition regulations (Safeguarding Covered Defense Information, Counterfeits, etc.) SEP TEMP Acq Strat/ Contract PPP Tailor to specific program situations AT Plan Cyber- security Strategy/ RMF Security Plan

DAU Training Symposium April 27, 2016 | Page-13 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. Intelligence & Counterintelligence Support to Program Protection Effective program protection planning is enabled by intelligence and counterintelligence (CI) support –Threat and CI information can help programs determine what potential protection measures would be most effective for the program’s circumstances –Program managers should expect to be informed by intelligence and CI throughout the acquisition lifecycle Key information provided by Intelligence and CI sources –Cyber reports –Threat reports and assessments –Foreign collection methods –Suspicious contact reports received from cleared industry –Insider threats –NISPOM related reporting

DAU Training Symposium April 27, 2016 | Page-14 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. Incorporating Program Protection into Acquisition Workforce Training Effective program protection planning requires qualified, trained personnel ACQ 160: Program Protection Overview (est. Summer 2016) –Distance learning (online); ~3 days –Provides an overview of program protection concepts, policy and processes –Intended for the entire Acquisition Workforce, with focus on ENG and PM ENG 260: Program Protection Practitioner Course (est. Summer 2017) –Hybrid (online and in-class); ~1 week –Intended for Systems Engineers and System Security Engineers –Focuses on application of program protection concepts and processes Future: Provide topic-specific CLMs –DEF, AT, SwA, SCRM, etc.

DAU Training Symposium April 27, 2016 | Page-15 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. Contact Us PP/SSE Initiatives Webpage JFAC Portal (CAC-enabled)

DAU Training Symposium April 27, 2016 | Page-16 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. Program Protection Integrated in Policy DoDI Operation of the Defense Acquisition System –Regulatory Requirement for Program Protection Plan at Milestones A, B, C and FRP/FDD DoDI Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation (RDT&E) –Assigns responsibility for Counterintelligence, Security, and System Engineering support for the ID and protection of CPI –Rescoped definition of CPI DoDI Protection of Mission Critical Functions to Achieve Trusted Systems and Networks –Establishes policy and responsibilities to minimize the risk that warfighting capability will be impaired due to vulnerabilities in system design or subversion of mission critical functions or components DoDI DoD Counterfeit Prevention Policy –Establishes policy and assigns responsibility to prevent the introduction of counterfeit material at any level of the DoD supply chain DoDI Cybersecurity –Establishes policy and assigns responsibilities to achieve DoD cybersecurity through a defense-in- depth approach that integrates the capabilities of personnel, operations, and technology, and supports the evolution to network centric warfare

DAU Training Symposium April 27, 2016 | Page-17 Distribution Statement A – Approved for public release by DOPSR case # 16-S Distribution is unlimited. DFARS Clause Safeguarding of Unclassified Controlled Technical Information, Nov 18, 2013 (Final Rule) Safeguarding Covered Defense Information and Cyber Incident Reporting, Aug 26, 2015 (Interim Rule) Safeguarding Covered Defense Information and Cyber Incident Reporting, Dec 30, 2015 (Interim Rule) Scope – What Information? Unclassified Controlled Technical Information Covered Defense Information Operationally Critical Support Covered Defense Information Operationally Critical Support Adequate Security – What Minimum Protections? Selected controls in NIST SP , Security and Privacy Controls for Federal Information Systems and Organizations NIST SP , Protecting Controlled Unclassified Information on Nonfederal Information Systems and Organizations When? Contract Award As soon as practicable, but NLT Dec 31, 2017 When? Oct 8, 2015 (Deviation) Security Requirement 3.5.3, w/in 9 months of Award 17 Unclassified