Department of Defense Information Assurance Range: A Venue for Test and Evaluation In Cyberspace DISA-JITC/JTG1 August 2011 UNCLASSIFIED.

Slides:



Advertisements
Similar presentations
Marc Grégoire, DRDC Ottawa Luc Beaudoin, Bologik Inc.
Advertisements

UNCLASSIFIED OFFICE OF ASSOCIATE DIRECTOR FOR MILITARY AFFAIRS March 2009 Train like you fight and fight like you train.
Navy’s Operational Authority for Naval Networks, Information Operations, and FORCEnet 2004 Strike, Land Attack & Air Defense Annual Symposium Vice Admiral.
Copyright © 2014 American Water Works Association Water Sector Approach to Process Control System Security.
BENEFITS OF SUCCESSFUL IT MODERNIZATION
Unit 1: Introductions and Course Overview Administrative Information  Daily schedule  Restroom locations  Breaks and lunch  Emergency exit routes 
A Combat Support Agency 1 Mission Assurance FY12 Opportunities Mission Assurance FY12 Opportunities.
National Infrastructure Protection Plan
4/29/2009Michael J. Cohen1 Practical DIACAP Implementation CS526 Research Project by Michael J. Cohen 4/29/2009.
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
DHS, National Cyber Security Division Overview
Protection of Classified Information & Cyber Security
South Carolina Cyber.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Information Assurance (IA) - Measures that protect and defend information and information systems by ensuring their availability, integrity, authentication,
Connecting People With Information DoD Net-Centric Services Strategy Frank Petroski October 31, 2006.
SECR 5140-FL Critical Infrastructure Protection Dr. Barry S. Hess Spring 2 Semester Week 3: 1 April 2006.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
IS-0700.A: National Incident Management System, An Introduction
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Stephen S. Yau CSE , Fall Security Strategies.
Overview 4Core Technology Group, Inc. is a woman/ veteran owned full-service IT and Cyber Security firm based in Historic Petersburg, Virginia. Founded.
Complying With The Federal Information Security Act (FISMA)
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
SEC835 Database and Web application security Information Security Architecture.
Part of a Broader Strategy
Audits & Assessments: What are the Differences and How Do We Learn from the Results? Brown Bag March 12, 2009 Sal Rubano – Director, Office of the Vice.
A Combat Support Agency Defense Information Systems Agency Expanding Non-DOD Partnerships 17 August 2011.
Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013 DRAFT.
N-Wave Shareholders Meeting May 23, 2012 N-Wave Security Update Lisa
Unit 8:COOP Plan and Procedures  Explain purpose of a COOP plan  Propose an outline for a COOP plan  Identify procedures that can effectively support.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Summer,
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Shift Left Feb 2013 Page-1 DISTRIBUTION STATEMENT A – Cleared for Open Publication by OSR on January 17 th, 2013 – SR case number 13-S-0851 Dr. Steven.
Jewuan Davis DSN Voice Connection Approval Office 18 May 2006 DSN Connection Approval Process (CAP)
WELCOME CyberSecurity and Global Affairs Workshop Enhancing Situational Awareness Through Cyber Intelligence Henry Horton, CISM Partner, CyberSecurity.
Defense Information Systems Agency A Combat Support Agency E3 Engineering Division 13 December 2011 Defense Information Systems Agency A Combat Support.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
JNTC Joint Management Office
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
1 Innovation & Transformation: Enabling Information Superiority for the Warfighter Mr. Arthur R. Friedman OASD(NII)/DoD CIO 4 October 2006.
Revision N° 11ICAO Safety Management Systems (SMS) Course01/01/08 Module N° 9 – SMS operation.
Information Security tools for records managers Frank Rankin.
The NIST Special Publications for Security Management By: Waylon Coulter.
Coast Guard Cyber Command
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
COBIT. The Control Objectives for Information and related Technology (COBIT) A set of best practices (framework) for information technology (IT) management.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Cybersecurity: Risk Management
Team 1 – Incident Response
DoD Cyberspace Workforce Definitions
Detection and Analysis of Threats to the Energy Sector (DATES)
ATD session 2: compliancy versus mission assurance
DoD Cyberspace Workforce Definitions
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
How to Mitigate the Consequences What are the Countermeasures?
Cybersecurity ATD technical
Introduction to: National Response Plan (NRP)
Cybersecurity Threat Assessment
Presentation transcript:

Department of Defense Information Assurance Range: A Venue for Test and Evaluation In Cyberspace DISA-JITC/JTG1 August 2011 UNCLASSIFIED

2Agenda Information Assurance (IA) Range –IA Range Drivers –Department of Defense (DOD) Range Initiatives –IA Range Mission Pillars and Objectives  Test and Evaluation (T&E) Mission Pillar and Objectives –IA Range Recent Success Stories –IA Range Status and Way Ahead –Points of Contact UNCLASSIFIED

DOD IA Range Drivers 3 Comprehensive National Cybersecurity Initiative (CNCI) –NSPD-54 / HSPD-23 –IA Range (Initiative 7) –Federal & national exercise program (Initiative 8) DOD IA Strategy (Goal 5): An IA workforce able to… –Effectively employ IA tools, techniques and strategies to defeat adversaries –Proactively identify and mitigate the full spectrum of rapidly evolving threats to defend the Net National Military Strategy for Cyberspace –Robust exercising with increased realism Need for DOD network defenders to learn to “Train as we Fight” –Protect and defend against specific threat generations UNCLASSIFIED

DOD Range Initiatives 4 LABELIA RANGEIO RANGEDARPA NCR ClassificationUnclassifiedMulti level, up to TS/SCI & SAP/SARMultiple levels of security AudienceDOD IA/CND Practitioners COCOMS, Services, Interagency, Coalition and Test & Eval Organizations Researchers Environment Today’s Global Information Grid (GIG) – IA/CND “Closed loop” fully meshed network & management among connected nodes Tomorrow’s environment Functions Provides test, training, and exercising environment, modeled after the GIG and joint services architecture Provides secure connectivity, resource allocation, event coordination and access to actual and modeled tools and targets Provides a simulated, emulated, and replicated research environment to support experiments Test and evaluate near-term tools; pilot shrink-wrapped products prior to acquisition Provides security, connectivity and network management to event participants’ capabilities Proof of concept for emerging/future capabilities Exercise and assess personnel and TTPs Access to IO tools/targets to provide exposure to and validation of IO capabilities in tests, training and exercises Advanced research of tomorrow’s cyber issues and capabilities focused at the national level Depth of Operation Normal operations to Level 2 attack conditions Does not own capabilities, rather a means to interconnect capabilities from distributed locations Sophisticated & highly adversarial attack conditions Provides Integration of current DOD technologies, people, policies, and procedures IO Range provides highly secure access to current and developmental IO capabilities and target environments Research & development of revolutionary technologies UNCLASSIFIED

IA Range Mission Pillars 5 Strengthen Global Information Grid (GIG) Security Posture Strengthen Global Information Grid (GIG) Security Posture Protect & Defend Pillar Missions EXERCISEEXERCISE TRAININGTRAINING TEST & EVALUATION UNCLASSIFIED

Test & Evaluation Objectives 6 The IA Range framework promotes a consistent, repeatable, and verifiable T&E venue by which IA and Computer Network Operations (CNO) technical and operational concepts will be validated against requirements and specifications for improvement. The IA Range will seek to achieve the following T&E objectives: –Improve Cyber Security Workforce Operational Performance –Validate Capabilities and Services Provided by CND Tools and Mechanisms –Validate and Improve CND Tactics, Techniques, and Procedures –Validate Acceptable Level of Service of Computer Network Defense Service Providers (CNDSPs) –Validate IA Mitigation Strategies for Program of Records UNCLASSIFIED

Improve Cybersecurity Workforce Operational Performance 7 UNCLASSIFIED

Validate Capabilities and Services Provided by CND Tools and Mechanisms Respond Analyze & Diagnose Detect Monitor Protect Level of Effectiveness CND Confidentiality Integrity Availability IA 8 UNCLASSIFIED

Validate and Improve CND TTPs People  Proper management and deployment of technologies and methods  Understanding of assigned roles and responsibilities Operations  Adherence to principles of commonality, standardization, and operational ease of use  Consistent and effective set of expectations to guide day-to-day operations Technology  Supports the procurement and deployment of new technology Adequate documentation of actions (and methods) to implement and manage technology Promotes a balanced integration of people, operations, and technology to meet day-to-day operational priorities 9 UNCLASSIFIED

Validate Acceptable Level of Service of CNDSPs  Network Security Monitoring/Intrusion Detection  Attack Sensing & Warning (AS&W)  Indications & Warning (I&W) / Situational Awareness  MOUs and Contracts, CND Policies and Procedures  CND Technology Development, Evaluation and Implementation  Personnel Levels and Training and Certification  Security Administration  Primary CNDS Provider Information Systems  Incident Reporting  Incident Response and Analysis  Vulnerability Analysis and Assessment (VAA) Support  Information Assurance Vulnerability Management (IAVM)  Virus Protection Support  Subscriber Protection Support and Training  Information Operations Condition (INFOCON) Implementation  CND Red Teaming UNCLASSIFIED

Validate IA Mitigation Strategies for Program of Records Test and Evaluation Risk Assessment Determine the extent of the potential threat and associated risk Prioritize, evaluate, and implement the appropriate risk-reducing controls Validate least cost-approach, decrease of mission risk to an acceptable level, and minimal adverse impact on the Global Information Grid’s resources and mission Risk Mitigation 11 UNCLASSIFIED

Recent Success Stories 12 The DOD IA Range sponsored the Host Based Security System (HBSS) Quick Reaction Test (QRT) – Under the authority of the Department of Defense Instruction (DODI) , Joint Test and Evaluation Program, the HBSS QRT tested and developed Concept of Operations (CONOPS) and Tactics, Techniques, and Procedures (TTPs) for the employment of personnel and equipment that resulted in standard configurations and tactics for the implementation and operation of HBSS throughout the Global Information Grid. January 6, 2010 – January 5, 2011 UNCLASSIFIED

IA Range Status and Way Ahead 13 IA Range Status –IA Range met its Initial Operational Capability objectives  Provides a foundational environment to educate, equip, and exercise IA and CNO  Provides an initial suite of services to include of Web, , Domain Name System, Voice over Internet Protocol, Instant Messaging, and Internet  Provides GIG transfer infrastructure by supporting the connection of separate CC/S/A and field activities ISs to meet common-user and special purpose information transfer requirements Way Ahead –Projected Activities  Methodical integration of selected DISA and NSA Tier 1 Global Network Defense (GND) mechanisms and capabilities to emulate GND technical and operational capabilities (today’s GIG IA architecture within a NetOps framework).  DISA is studying the possibility to physically move the IA Range from its pilot environment to its production environment (government facility) UNCLASSIFIED

Mr. Timothy Holmes, JITC IA Branch Technical Advisor –(301) DSN: 354 Mr. Gordon Bass, DOD IA Range Program Manager –(301) DSN: 312 Points of Contact 14 UNCLASSIFIED