System Security Engineering and Comprehensive Program Protection
|
|
|
- Aubrey Bridges
- 10 years ago
- Views:
Transcription
1 System Security Engineering and Comprehensive Program Protection Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering 16th Annual NDIA Systems Engineering Conference Arlington, VA October 30, /30/2013 Page-1
2 Trusted Defense Systems and Networks Strategy Drivers/Enablers National Cybersecurity Strategies Prioritize by Mission Dependence Comprehensive Program Protection Planning Globalization Challenges Increasing System Complexity Intellectual Property Protection Enhance R&D for Vulnerability Detection and Response Partner with Industry Report on Trusted Defense Systems Delivering Trusted Systems USD(AT&L) ASD(NII)/DoD CIO Executive Summary: 10/30/2013 Page-2
3 Ensuring Confidence in Defense Systems Threat: Nation-state, terrorist, criminal, or rogue developer who: Gain control of systems through supply chain opportunities Exploit vulnerabilities remotely Vulnerabilities All systems, networks, and applications Intentionally implanted logic Unintentional vulnerabilities maliciously exploited (e.g., poor quality or fragile code) Traditional Consequences: Loss of critical data and technology Emerging Consequences: Exploitation of manufacturing and supply chain Either can result in corruption; loss of confidence in critical warfighting capability Today s acquisition environment drives the increased emphasis: Then Stand-alone systems >>> Some software functions >>> Known supply base >>> CPI (technologies) >>> Now Networked systems Software-intensive Prime Integrator, hundreds of suppliers CPI and critical components 10/30/2013 Page-3
4 What Are We Protecting? Program Protection Planning DODI Update DoDI Change 1, dated Dec 2010 Technology DoDI Components DoDI 8500 Series DoDI Information What: Leading edge research and technology Who Identifies: Technologists, System Engineers ID Process: CPI Identification Threat Assessment: Foreign collection threat informed by Intelligence and Counterintelligence assessments Countermeasures: AT, Classification, Export Controls, Security, Foreign Disclosure, and CI activities Focus: Keep secret stuff in by protecting any form of technology What: Mission critical elements and components Who Identifies: System Engineers, Logisticians ID Process: Criticality Analysis Threat Assessment: DIA SCRM TAC Countermeasures: SCRM, SSE, Anticounterfeits, software assurance, Trusted Foundry, etc. Focus: Keep malicious stuff out by protecting key mission components What: Information about applications, processes, capabilities and end items Who Identifies: All ID Process: CPI identification, criticality analysis, and classification guidance Threat Assessment: Foreign collection threat informed by Intelligence and Counterintelligence assessments Countermeasures: Information Assurance, Classification, Export Controls, Security, etc. Focus: Keep critical information from getting out by protecting data Protecting Warfighting Capability Throughout the Lifecycle 10/30/2013 Page-4
5 SSE Priorities Policy Initiatives DoDI Operation of the Defense Acquisition System DoDI Critical Program Information (CPI) Protection Within the DoD DoDI Protection of Mission Critical Functions to Achieve Trusted Systems and Networks DoDI E Information Assurance Depth of PPP Analysis throughout the Life Cycle Protection of Integrated Circuits Software Assurance Protection of Defense Industrial Base Systems Incorporating SSE into Contracts Program Protection Guidance Integrated SSE DoD efforts are targeting integration of system security engineering considerations throughout the system life cycle 10/30/2013 Page-5
6 Program Protection Integrated in Policy DoDI Operation of the Defense Acquisition System Regulatory Requirement for Program Protection Plan at Milestones A, B, C and FRP/FDD References DoDI DoDI Critical Program Information (CPI) Protection Within the DoD Assigns responsibility for Counterintelligence, Security, and System Engineering support for the ID and protection of CPI Expands definition of CPI to include degradation of mission effectiveness DoDI Protection of Mission Critical Functions to Achieve Trusted Systems and Networks Establishes policy and responsibilities to minimize the risk that warfighting capability will be impaired due to vulnerabilities in system design or subversion of mission critical functions or components DoDI E Information Assurance Establishes policy and assigns responsibilities to achieve DoD information assurance (IA) through a defense-in-depth approach that integrates the capabilities of personnel, operations, and technology, and supports the evolution to network centric warfare - Update underway DoD Issuances Website: 10/30/2013 Page-6
7 DoDI Trusted Systems and Networks Implements the DoD s Trusted Systems and Networks (TSN) strategy Manage risk of mission-critical function and component compromise throughout lifecycle of key systems by utilizing Criticality Analysis as the systems engineering process for risk identification Countermeasures: Supply chain risk management, software assurance, secure design patterns Intelligence analysis to inform program management Codify trusted supplier requirement for DoD-unique application-specific integrated circuits (ASICs) Document planning and accomplishments in program protection and information assurance activities 10/30/2013 Page-7
8 System Specification Level Criticality Analysis (CA) Vulnerability Assessment (VA) Risk Assessment (RA) Countermeasure (CM) IA / Cyber security RFP PPP Analysis Level of Detail through the Life Cycle (SETR) ASR SRR SFR PDR CDR SVR/FCA System Functional Baseline Allocated Baseline Initial Product SVR System Performance System functions Preliminary design Baseline performance Spec decomposed and (fct and i/f) for all Detailed design & i/f verified to meet Verifiable sys mapped to System elements (HW & for comp/unit functional & req ts detailed to elements SW) complete production and test allocated baselines enable functional Sys elements HW Verifiable HW Physical (form Product Baseline decomposition defined component fit, function) for initial Req. traceability Preliminary characteristics SW CSU level production External i/f allocation of SW CSCs, CSUs design documented functions optimized ICD / Comments on Draft CDD (if avail) Prelim System Performance Spec Sys model/arch including CONOPS, i/f, & operational/ functional requirements Mission based functions Response to tutorial questions Objective risk criteria established Applied at function level Risk based supply chain, design and SW CM in RFP System Categorization/Regi stration Initial Controls & tailoring CM and IA controls incorporated into TD SOW and SRD System requirements level functions System function level response to tutorial questions Risk criteria updated applied at system Subsystem level subfunctions Subsystem level responses Risk criteria updated & applied at subsystem level DRAFT level Risk based system function level CM selection Risk based control strength of implementation determined Risk based subsystem function level CM selection IA Control trace to spec Additional IA Controls tailoring/trades as CM if needed CM and IA controls incorporated into EMD SOW and SRD Assembly/ component Component/ part Part (prelim) Assembly / Component level responses Risk criteria updated & applied at assembly level Risk based assembly level CM selection IA Control trace to spec Additional IA Controls as CM if needed IA/IA enabled Components ID d as CM component level responses Risk criteria updated & applied at component level Risk based component level CM selection IA controls incorporated traced to physical baseline Controls Assessed and discrepancies ID d/categorized CM and IA controls incorporated into Production SOW and SRD Part level responses (prelim) Risk criteria updated & applied at prelim part level of critical components Risk based part level CM selection IA controls incorporated traced to product baseline IAVM program established for IA control maintenance 10/30/2013 Page-8
9 PPP Analysis Level of Detail through the Life Cycle (Milestones) PPP Analysis Criticality Analysis (CA) Vulnerability Assessment (VA) Risk Assessment (RA) Countermeasure (CM) IA / Cyber security RFP Milestone A Same level as ASR analysis Pre-EMD Same level as SRR and SFR Milestone B Same level as PDR Milestone C Same level as CDR and SVR Part FRP/PCA/FDD PCA Est. Product Baseline Critical function component bill of material (BOM) Part level responses Risk criteria updated & applied at BOM level critical components Risk based part level CM selection IA controls incorporated traced to product baseline and BOM IAVM program established for CM and IA controls incorporated into TD SOW and SRD CM and IA controls incorporated into EMD SOW and SRD CM and IA controls incorporated into Production SOW and SRD IA control maintenance 10/30/2013 Page-9
10 Misuse Mission Scenario Evaluation during Requirements Analysis Misuse Mission Scenarios are used to analyze the mission consequences of exploitation of a system, supply chain or development environment vulnerabilities to determine protection requirements Possible Failure Description Exploit Risk Assessment Event Weapon cannot guide to target Triggering Event Mission Controller malicious insertion Consequence - Missed target - Collateral damage Insider Perspective Autonomous Triggered In-Place CM Controller OEM Diversity Residua l Risk Low 10/30/2013 Page-10
11 Notional Use Cases and Countermeasures for Integrated Circuits Use Cases Use Case 1: Custom ASIC that has a specific DoD military end use Use Case 2: ASIC in a COTS assembly that is primarily intended for commercial market Use Case 3: MOTS/GOTS Integrated Circuit (IC) that has a DoD end use Countermeasures Use Trusted Supply Flow (Trusted Supplier) for design, mask, fabrication, packaging and testing Perform supply chain risk assessment of ASICs if the COTS assembly is determined as a critical component Implement SCRM countermeasures commensurate with assessed risk Consider source and employment history Apply countermeasures commensurate with assessed risk, including enhanced/focused testing Use trusted supplier and product flow as applicable, such as FPGA programming services; Use DMEA accredited trusted supplier and trusted product flow if ASIC 10/30/2013 Page-11
12 Software Assurance (SwA) SwA is a fundamental element of DoD s Trusted Systems and Networks policy and procedures and DoD acquisition DoD cyber policies enhance the focus on Software Assurance Policy documents are being updated to address evolving SW Assurance tools, methodologies, and to address statutes Guidance for SW Assurance is being updated to support programs across the life cycle The SwA CoP is important to the DoD s growing competence in SwA Participate in development and promulgation of enabling guidance, tools, methods Assist in coordination and building partnerships across the DoD, and with external organizations Become a SME resource for Program Management teams to support SwA planning and vulnerability risk mitigation FY 12 Accomplishments Established DoD SwA enterprise-level Community of Practice (CoP) with DCIO(CS)/TMSN and NSA(CAS) Initiated three DoD SwA stakeholder initiatives: o SwA-related contract language o DoD Enterprise coordination and information sharing o Workforce education and training Updated SwA elements of the Defense Acquisition Guidebook to assist acquisition programs in tailoring and refining software security requirements Initiated a study of SwA tools for development and operational testing Agreed upon a standard definition of SwA across the Department FY 13 Goals Expand the DoD SwA Community of Practice to increase coordination, collaboration, and promulgation of best practices Update policy, guidance, and PPP activities to address software assurance in software development and system operation Assess state-of-the-art in commercially available SW vulnerability detection and analysis tools and methodologies 10/30/2013 Page-12
13 Defense Industrial Base (DIB) Cyber Security The private sector, government, military, our allies - all share the same global infrastructure and we all share the responsibility to protect it. - Secretary of Defense Leon E. Panetta Thursday, October 11, 2012 DoD efforts to advance cyber security in the DIB include: DIB Cyber Security/Information Assurance (CS/IA) Program, and its optional enhanced component the DIB Enhanced Cybersecurity Services ( Standards development in collaboration with Industry Reinforcing protection of technical information in acquisition activities 10/30/2013 Page-13
14 RFP Sections RFP Package Section A: Solicitation Contract Form Section B: Supplies or services and prices/costs Section C: Description/specifications/work statement System Requirements Document (SRD - SPEC) Statement of Work (SOW) Contract Deliverable Requirements List (CDRLs) Section D: Packaging and marking Section E: Inspection and Acceptance Section F: Deliveries or performance Section G: Contract administration data Section H: Special contract requirements Section I: Contract Clauses Section J: List of Documents, Exhibits, and other Attachments Section K: Representations, Certification, and Other Statements of Offerors Section L: Instructions, conditions, and notices to offerors Section M: Evaluation factors for award Incorporate Design Protections System Requirements Document (SRD), Specification, or equivalent Incorporate Process Protections Statement of Work (SOW), Statement of Objectives (SOO), Performance Work Statement (PWS), or equivalent Contract Deliverable Requirements List (CDRLs) Data Item Description (DID) Description of program protection processes for Level I and Level II critical components Sections L and M 10/30/2013 Page-14
15 Program Protection Guidance Program Protection Plan Outline & Guidance, dated 18 Jul 2011 Focal point for documenting Program security activities, including: Plans for identifying and managing risk to CPI and critical functions and components Responsibilities for execution of comprehensive program protection Tables of actionable data, not paragraphs of boilerplate End-to-end system analysis and risk management July2011.pdf Defense Acquisition Guidebook Chapter 13, Program Protection Provides implementation guidance for TSN Analysis and CPI Protection Describes SSE activities throughout the Defense Acquisition Life Cycle 10/30/2013 Page-15
16 In Summary Holistic approach to security is critical To focus attention on the threat To avoid risk exposure from gaps and seams Program protection policy provides overarching framework for trusted systems Common implementation processes are beneficial Stakeholder integration is key to success Acquisition, CIO, Intelligence, Engineering, Industry, Academic communities are all stakeholders Systems engineering brings these stakeholders, risk trades, policy, and design decisions together Informing leadership early; providing programs with risk-based options 10/30/2013 Page-16
17 For Additional Information Melinda Reed ODASD, Systems Engineering /30/2013 Page-17
18 Systems Engineering: Critical to Defense Acquisition Innovation, Speed, Agility 10/30/2013 Page-18
DoD Software Assurance (SwA) Overview
DoD Software Assurance (SwA) Overview Tom Hurt Office of the Deputy Assistant Secretary of Defense for Systems Engineering NDIA Program Protection Summit / Workshop McLean, VA May 19, 2014 May 19, 2014
System Security Engineering and Program Protection Integration into SE
System Security Engineering and Program Protection Integration into SE Melinda Reed Deputy Director for Program Protection Office of the Deputy Assistant Secretary of Defense for Systems Engineering 17
Vulnerability Analysis Techniques to Support Trusted Systems and Networks (TSN) Analysis
Vulnerability Analysis Techniques to Support Trusted Systems and Networks (TSN) Analysis Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering 17th Annual NDIA Systems
Implementing Program Protection and Cybersecurity
Implementing Program Protection and Cybersecurity Melinda Reed Office of the Deputy Assistant Secretary of Defense for Systems Engineering Mark Godino Office of the Deputy Assistant Secretary of Defense
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN) References: See Enclosure
System Security Engineering
A Critical Discipline of SE Ms. Kristen Baldwin Director, Systems Analysis DDR&E/Systems Engineering 12th Annual NDIA Systems Engineering Conference 28 October 2009 10/28/09 Page-1 Defense Research & Engineering
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals
Suggested Language to Incorporate System Security Engineering for Trusted Systems and Networks into Department of Defense Requests for Proposals JANUARY 2014 Deputy Assistant Secretary of Defense for Systems
Missile Defense Agency Small Business Conference Supply Chain Risk Management (SCRM) Information Briefing
Missile Defense Agency Small Business Conference Supply Chain Risk Management (SCRM) Information Briefing Mr. David S. Lane Assistant Director BMDS Acquisition Security Missile Defense Agency 13-14 August
Trusted Systems and Networks (TSN) Analysis
Trusted Systems and Networks (TSN) Analysis JUNE 2014 Deputy Assistant Secretary of Defense for Systems Engineering and Department of Defense Chief Information Officer Washington, D.C. Deputy Assistant
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5200.39 May 28, 2015 USD(I)/USD(AT&L) SUBJECT: Critical Program Information (CPI) Identification and Protection Within Research, Development, Test, and Evaluation
The United States Department of Defense Revitalization of System Security Engineering Through Program Protection
The United States Department of Defense Revitalization of System Security Engineering Through Program Protection Kristen Baldwin Principal Deputy, DASD, Systems Engineering United States Department of
DoD Software Assurance Initiative. Mitchell Komaroff, OASD (NII)/DCIO
DoD Software Assurance Initiative Mitchell Komaroff, OASD (NII)/DCIO Agenda Background Software Assurance Definition and Strategy Guiding Principles for SwA DoD SwA Strategy Elements Industry Outreach
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 NOV 1 0 2015 CHIEF INFORMATION OFFICER MEMORANDUM FOR ASSISTANT SECRETARY OF THE ARMY FOR ACQUISITION, LOGISTICS AND TECHNOLOGY ASSIST
How To Protect Your Data From Being Hacked
Cyber Division & Manufacturing Division Joint Working Group Cyber Security for the Advanced Manufacturing Enterprise Manufacturing Division Meeting June 4, 2014 Michael McGrath, ANSER [email protected]
Supply Chain Attack Patterns: Framework and Catalog
OFFICE OF THE ASSISTANT SECRETARY OF DEFENSE FOR RESEARCH AND ENGINEERING OFFICE OF THE DEPUTY ASSISTANT SECRETARY OF DEFENSE FOR SYSTEMS ENGINEERING Supply Chain Attack Patterns: Framework and Catalog
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5505.13E March 1, 2010 ASD(NII)/DoD CIO SUBJECT: DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3) References: See Enclosure 1 1. PURPOSE. This Directive:
Manufacturing Readiness Level (MRL) Deskbook Version 2.0 May, 2011
Manufacturing Readiness Level (MRL) Deskbook Version 2.0 May, 2011 Prepared by the OSD Manufacturing Technology Program In collaboration with The Joint Service/Industry MRL Working Group This document
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System
Department of Defense INSTRUCTION NUMBER 8580.1 July 9, 2004 SUBJECT: Information Assurance (IA) in the Defense Acquisition System ASD(NII) References: (a) Chapter 25 of title 40, United States Code (b)
Achieving True Risk Reduction through Effective Risk Management
Achieving True Risk Reduction through Effective Pete Nolte Deputy Director, Major Program Support Office of the Deputy Assistant Secretary of Defense for Systems Engineering 16th Annual NDIA Systems Engineering
Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing
Department of Defense INSTRUCTION NUMBER 8560.01 October 9, 2007 ASD(NII)/DoD CIO SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing References: (a) DoD
Supply Chain Attack Framework and Attack Patterns
MTR140021 MITRE TECHNICAL REPORT Supply Chain Attack Framework and Attack Patterns Sponsor: DASD SE Dept. No.: Z610 Contract No.: W15P7T-13-C-F600 Project No.: 0713D050-AA The views, opinions and/or findings
1 July 2015 Version 1.0
1 July 2015 Version 1.0 Cleared for Open Publication June 26, 2015 DoD Office of Prepublication and Security Review Cybersecurity T&E Guidebook ii July 1, 2015 Version 1.0 Table of Contents 1 INTRODUCTION...
Cyber Security for Advanced Manufacturing Next Steps
Status Update Cyber Security for Advanced Manufacturing Next Steps NDIA Manufacturing Division February 19, 2015 Michael McGrath Consultant, Analytic Services Inc. [email protected] NDIA White
Cybersecurity Throughout DoD Acquisition
Cybersecurity Throughout DoD Acquisition Tim Denman Cybersecurity Performance Learning Director DAU Learning Capabilities Integration Center [email protected] [email protected] Cybersecurity
AF Life Cycle Management Center
AF Life Cycle Management Center Avionics Weapon Systems Cybersecurity Risk Management Framework Assessment & Authorization Update Harrell Van Norman AFLCMC/EZAS Cybersecurity Technical Expert [email protected]
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS Steve Mills DAU-South 1 Overview Questions Cybersecurity Owners and Stakeholders Cybersecurity Why It Matters to DoD Program Managers Defense Science
Click to edit Master title style
Click to edit Master title style Fourth level» Fifth level Click Integrating to edit Master Cybersecurity title style Requirements into Source Selection and Contracts Breakout Session #F15 Alex Odeh, Third
Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 DoD CIO SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure 1 1. PURPOSE. This Instruction:
Software Assurance in Acquisition and Contract Language
Software Assurance in Acquisition and Contract Language Acquisition & Outsourcing, Volume I Version 1.1, July 31, 2009 Software Assurance (SwA) Pocket Guide Resources This is a resource for getting started
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE
STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE HOUSE OVERSIGHT AND GOVERNMENT REFORM COMMITTEE S INFORMATION TECHNOLOGY SUBCOMMITTEE AND THE VETERANS
DEPARTMENT OF THE AIR FORCE HEADQUARTERS AERONAUTICAL SYSTEMS CENTER (AFMC) WRIGHT-PATTERSON AIR FORCE BASE OHIO
DEPARTMENT OF THE AIR FORCE HEADQUARTERS AERONAUTICAL SYSTEMS CENTER (AFMC) WRIGHT-PATTERSON AIR FORCE BASE OHIO BULLETIN AWB 002A 17 May 2011 ((supersedes AWB-002) United States Air Force (USAF) Airworthiness
Adding a Security Assurance Dimension to Supply Chain Practices
Adding a Security Assurance Dimension to Supply Chain Practices John Whited, CISSP, CSSLP Randall Brooks, CISSP, CSSLP Raytheon Company Session ID: GRC-401 Session Classification: Intermediate Agenda What
DEPARTMENT OF THE NAVY NAVAL AIR SYSTEMS COMMAND RADM WILLIAM A. MOFFETT BUILDING 47123 BUSE ROAD, BLDG 2272 PATUXENT RIVER, MARYLAND 20670-1547
DEPARTMENT OF THE NAVY NAVAL AIR SYSTEMS COMMAND RADM WILLIAM A. MOFFETT BUILDING 47123 BUSE ROAD, BLDG 2272 PATUXENT RIVER, MARYLAND 20670-1547 IN REPLY REFER TO NAVAIRINST 4355.19E AIR-4.0/5.0/6.0 FEB
WORKFORCE COMPOSITION CPR. Verification and Validation Summit 2010
WORKFORCE COMPOSITION CPR PEO IEW&S Organizational Assessment VCSA Brief Date 2010 October 13, 2010 This briefing is UNCLASSIFIED/FOUO PREDECISIONAL LIMITED DISTRIBUTION AS OF: 11 Sep 2010 Verification
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive
Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise
Department of Defense DIRECTIVE SUBJECT: Management of the Department of Defense Information Enterprise References: See Enclosure 1 NUMBER 8000.01 February 10, 2009 ASD(NII)/DoD CIO 1. PURPOSE. This Directive:
How To Ensure Your Software Is Secure
Software Assurance Countermeasures in Program Protection Planning MARCH 2014 Deputy Assistant Secretary of Defense for Systems Engineering and Department of Defense Chief Information Officer Washington,
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes
Software & Supply Chain Assurance: Mitigating Risks Attributable to Exploitable ICT / Software Products and Processes Joe Jarzombek, PMP, CSSLP Director for Software & Supply Chain Assurance Stakeholder
Get Confidence in Mission Security with IV&V Information Assurance
Get Confidence in Mission Security with IV&V Information Assurance September 10, 2014 Threat Landscape Regulatory Framework Life-cycles IV&V Rigor and Independence Threat Landscape Continuously evolving
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology [email protected] 256.922.
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology [email protected] 256.922.8761 Overview Cybersecurity Policy Overview Questions Challenge #1 -
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5205.16 September 30, 2014 USD(I) SUBJECT: The DoD Insider Threat Program References: See Enclosure 1 1. PURPOSE. In accordance with sections 113 and 131 through
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives DON IT Conference // AFCEA West 2015 Presented by: RDML John Ailes Chief Engineer SPAWAR
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 16 R-1 Line #145
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS)
Department of Defense DIRECTIVE NUMBER 4630.05 May 5, 2004 Certified Current as of April 23, 2007 ASD(NII)/DoD CIO SUBJECT: Interoperability and Supportability of Information Technology (IT) and National
FOUNDATION: Material Solution Analysis Is More Than Selecting an Alternative
Establishing the Technical FOUNDATION: Material Solution Analysis Is More Than Selecting an Alternative Aileen G. Sedmak, Zachary S. Taylor, and Lt Col William A. Riski, USAF (Ret.) Several government
A Comprehensive Cyber Compliance Model for Tactical Systems
A Comprehensive Cyber Compliance Model for Tactical Systems Author Mark S. Edwards, CISSP/MSEE/MCSE Table of Contents July 28, 2015 Meeting Army cyber security goals with an IA advocate that supports tactical
Interim DoDI 5000.02 -- The Cliff Notes Version --
Interim DoDI 5000.02 -- The Cliff Notes Version -- A Quick Glance at New Guidance -- 17 December 2013 -- Defense Acquisition University/Midwest Region [email protected] 17 Jan 2014, v 1.0 The New Department
Defense Security Service
Defense Security Service Defense Security Service Cybersecurity Operations Division Counterintelligence UNCLASSIFIED Defense Security Service DSS Mission DSS Supports national security and the warfighter,
Reducing risks in the Software Acquisition Life Cycle
Reducing risks in the Software Acquisition Life Cycle Stan Wisseman 6 December 2007 Agenda Buyers vs. Sellers Need for enhancing acquisition process with SwA considerations DHS SwA Initiative Overview
Overview of SAE s AS6500 Manufacturing Management Program. David Karr Technical Advisor for Mfg/QA AFLCMC/EZSM 937-255-7450 [email protected].
Overview of SAE s AS6500 Manufacturing Management Program David Karr Technical Advisor for Mfg/QA AFLCMC/EZSM 937-255-7450 [email protected] 1 Outline Background Objectives Requirements Implementation
DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO
DoD CIO s 10-Point Plan for IT Modernization Ms. Teri Takai DoD CIO Executive Summary Proactive Partnerships for IT Modernization IT Modernization Strategy Consolidate Infrastructure Streamline Processes
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8320.05 August 18, 2011 ASD(NII)/DoD CIO SUBJECT: Electromagnetic Spectrum Data Sharing References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes
AF Life Cycle Management Center
AF Life Cycle Management Center Aircraft Cybersecurity Risk Management Framework Harrell J. Van Norman Cybersecurity Tech Expert Engineering Directorate AFMC/AFLCMC/EZAS [email protected]
Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield
Cybersecurity Defending the New Battlefield Steven J. Hutchison, Ph.D. Cybersecurity is one of the most important challenges for our military today. Cyberspace is a new warfighting domain, joining the
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Department of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5144.02 November 21, 2014 DCMO SUBJECT: DoD Chief Information Officer (DoD CIO) References: See Enclosure 1. PURPOSE. Under the authority vested in the Secretary
DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process
Inspector General U.S. Department of Defense Report No. DODIG-2015-045 DECEMBER 4, 2014 DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process INTEGRITY EFFICIENCY ACCOUNTABILITY
Empowering IT Acquisitions
Empowering IT Acquisitions Public Release 66ABG-2015-0081 Tim Rudolph, Ph.D. AFLCMC Chief Technology Officer AF Tech Advisor, Integrated Information Capabilities 21 May 2015 The Point Value Deployed Rapidly
SYSTEMS SECURITY ENGINEERING
SYSTEMS SECURITY ENGINEERING Mission Statement Integrating Security into Every Solution We Deliver Reducing Risk and Providing Fully Reliable and Trusted Solutions Utilizing Best Practices and Rigorous
Cybersecurity Delivering Confidence in the Cyber Domain
Cybersecurity Delivering Confidence in the Cyber Domain With decades of intelligence and cyber expertise, Raytheon offers unmatched, full-spectrum, end-to-end cyber solutions that help you secure your
Program Protection Plan Outline & Guidance
Program Protection Plan Outline & Guidance VERSION 1.0 July 2011 Deputy Assistant Secretary of Defense Systems Engineering 1 Introduction This document provides an outline, content, and formatting guidance
SOFTWARE CONFIGURATION MANAGEMENT GUIDEBOOK
Office of Safety and Mission Assurance NASA-GB-9503 SOFTWARE CONFIGURATION MANAGEMENT GUIDEBOOK AUGUST 1995 National Aeronautics and Space Administration Washington, D.C. 20546 PREFACE The growth in cost
The GAO has shown that technical, cost, schedule, and performance risks are inherent. Software Acquisition: Reducing Risks.
Acquisition: Reducing Risks James Jones The Acquisition Risk Crisis The GAO has shown that technical, cost, schedule, and performance risks are inherent in delivering software-intensive systems. The GAO
The Software Supply Chain Integrity Framework. Defining Risks and Responsibilities for Securing Software in the Global Supply Chain.
The Software Supply Chain Integrity Framework Defining Risks and Responsibilities for Securing Software in the Global Supply Chain July 21, 2009 Editor Stacy Simpson, SAFECode Contributors Dan Reddy, EMC
Supply Chain Risk Management. Operating ahead of the threat, not behind the vulnerabilities
Supply Chain Risk Management Operating ahead of the threat, not behind the vulnerabilities Navigation in the Meeting Room Notes box for audio information and other announcements To enlarge the slide, click
UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test & Evaluation, Defense-Wide / BA 6: RDT&E Management Support COST
(Billing Code 5001-06) Defense Federal Acquisition Regulation Supplement: Network. Penetration Reporting and Contracting for Cloud Services (DFARS
This document is scheduled to be published in the Federal Register on 08/26/2015 and available online at http://federalregister.gov/a/2015-20870, and on FDsys.gov (Billing Code 5001-06) DEPARTMENT OF DEFENSE
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
5 FAH-5 H-520 LIFE CYCLE MANAGEMENT
5 FAH-5 H-520 LIFE CYCLE MANAGEMENT (CT:ITS-5; 02-05-2013) (Office of Origin: (IRM/BMP/SPO/PM) 5 FAH-5 H-521 CONFIGURATION MANAGEMENT REQUIREMENTS Configuration management (CM) is a function deployed throughout
Policy on Information Assurance Risk Management for National Security Systems
CNSSP No. 22 January 2012 Policy on Information Assurance Risk Management for National Security Systems THIS DOCUMENT PRESCRIBES MINIMUM STANDARDS YOUR DEPARTMENT OR AGENCY MAY REQUIRE FURTHER IMPLEMENTATION
Why Cybersecurity Matters in Government Contracting. Robert Nichols, Covington & Burling LLP
Why Cybersecurity Matters in Government Contracting Robert Nichols, Covington & Burling LLP Cybersecurity is the No. 1 Concern of General Counsel and Directors 2 Cybersecurity Concerns in the Government
COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide
COUNTERINTELLIGENCE O F F I C E O F T H E N A T I O N A L C O U N T E R I N T E L L I G E N C E Protecting Key Assets: A Corporate Counterintelligence Guide E X E C U T I V E Counterintelligence for the
Security Control Standard
Department of the Interior Security Control Standard Security Assessment and Authorization January 2012 Version: 1.2 Signature Approval Page Designated Official Bernard J. Mazer, Department of the Interior,
NDIA Manufacturing Council: DoD Systems Engineering / Manufacturing Update
NDIA Manufacturing Council: DoD / Manufacturing Update 12 May 2010 Nicholas Torelli Director, Mission Assurance Office of the Secretary of Defense 05/12/2010 Page-1 DISTRIBUTION STATEMENT A -- Cleared
Legislative Language
Legislative Language SEC. 1. COORDINATION OF FEDERAL INFORMATION SECURITY POLICY. (a) IN GENERAL. Chapter 35 of title 44, United States Code, is amended by striking subchapters II and III and inserting
Better Buying Power 3.0
Attachment 1 Better Buying Power 3.0 Achieving Dominant Capabilities through Technical Excellence and Innovation Achieve Affordable Programs Continue to set and enforce affordability caps Achieve Dominant
ERA System Development Statement of Objectives
ATTACHMENT 1 STATEMENT OF OBJECTIVES NARA Electronic Records Archives (ERA) ERA System Development Statement of Objectives 1.0 Purpose of the Statement of Objectives (SOO) This Statement of Objectives
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Counterintelligence Awareness Glossary
Counterintelligence Awareness Glossary Access: The ability and opportunity to obtain knowledge of classified information. Anomaly: Activity r knowledge, outside the norm, that suggests a foreign entity
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS
APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS Section 5123 of the Clinger-Cohen Act requires that the Department establish goals for improving the efficiency and effectiveness of agency operations
How To Become A Senior Contracting Official
Program Management Specific Functional Requirements for Key Leadership Positions (Attributes and Demonstrated Experience Beyond Level III Certification) Education: o Advanced Degree Preferably in a technical,
Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
Table of Contents CYBER SECURITY STRATEGIC PLAN VERSION 1.0
U.S DEPARTMENT OF ENERGY CYBER SECURITY PROGRAM CYBER SECURITY STRATEGIC PLAN FEBRUARY 12, 2007 Table of Contents INTRODUCTION... 4 CYBER SECURITY STRATEGY OVERVIEW... 5 CYBER SECURITY VISION AND MISSION...
ICT Supply Chain Risk Management
ICT Supply Chain Risk Management Celia Paulsen Computer Security Division IT Laboratory Manager s Forum June 4, 2013 General Problem Definition Scope of Supplier Expansion and Foreign Involvement graphic
GAO. IT SUPPLY CHAIN Additional Efforts Needed by National Security- Related Agencies to Address Risks
GAO For Release on Delivery Expected at 10:00 a.m. EDT Tuesday, March 27, 2012 United States Government Accountability Office Testimony Before the Subcommittee on Oversight and Investigations, Committee
THE UNDER SECRETARY OF DEFENSE 30 1 0 DEFENSE PENTAGON WASHINGTON, DC 20301-3010
THE UNDER SECRETARY OF DEFENSE 30 1 0 DEFENSE PENTAGON WASHINGTON, DC 20301-3010 ACQUISmON, TECHNOLOGY AND LOGISTICS NOV 0 8 2013 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS COMPONENT ACQUISITION
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 5000.02 January 7, 2015 USD(AT&L) SUBJECT: Operation of the Defense Acquisition System References: See References 1. PURPOSE. This instruction: a. In accordance
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here
Risk Management Framework (RMF): The Future of DoD Cyber Security is Here Authors: Rebecca Onuskanich William Peterson 3300 N Fairfax Drive, Suite 308 Arlington, VA 22201 Phone: 571-481-9300 Fax: 202-315-3003
Department of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3115.12 August 24, 2010 USD(I) SUBJECT: Open Source Intelligence (OSINT) References: See Enclosure 1 1. PURPOSE. This Instruction: a. Establishes policy, assigns
Subject: Critical Infrastructure Identification, Prioritization, and Protection
For Immediate Release Office of the Press Secretary The White House December 17, 2003 Homeland Security Presidential Directive / HSPD-7 Subject: Critical Infrastructure Identification, Prioritization,
Introduction to NICE Cybersecurity Workforce Framework
Introduction to NICE Cybersecurity Workforce Framework Jane Homeyer, Ph.D., Deputy ADNI/HC for Skills and Human Capital Data, ODNI Margaret Maxson, Director, National Cybersecurity Education Strategy,
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary
Water Critical Infrastructure and Key Resources Sector-Specific Plan as input to the National Infrastructure Protection Plan Executive Summary May 2007 Environmental Protection Agency Executive Summary
