Capitalizing on Commercial Innovation



Similar documents
Securely Managing Cryptographic Keys used within a Cloud Environment

Junos Pulse Instructions for Windows and Mac OS X

Cloud Services MDM. Windows 8 User Guide

Magenta HR in partnership with breath ehr

How Does Cloud Computing Work?

** Harmony integrated enrollments are online only.

Volume 2, Issue 11, November 2014 International Journal of Advance Research in Computer Science and Management Studies

AHLA. C. Big Data, Cloud Computing and the New World Order for Health Care Privacy

How To Write A Secure Cloud Computing For Critical Infrastructure

Cloud Industry Trends in Asia Pacific & Singapore. Cheong Lai Siong Cloud Chapter ViceChair SITF

The ADVANTAGE of Cloud Based Computing:

Build the cloud OpenStack Installation & Configuration Integration with existing tools and processes Cloud Migration

The Organizational NOS (Network Operating System)

White Paper for Mobile Workforce Management and Monitoring Copyright 2014 by Patrol-IT Inc.

Sample Outline for Prelicensure Course in Nursing Informatics

Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013

1)What hardware is available for installing/configuring MOSS 2010?

Better Practice Guide Financial Considerations for Government use of Cloud Computing

Treasury Gateway Getting Started Guide

Infor EAM Mobility Initiative

South Dakota State Library (SDSL) School Library Integrated Library Systems White Paper. April 2014

Data Protection Policy & Procedure

Remote Working (Policy & Procedure)

BRISTOL CITY COUNCIL ROLE AND EMPLOYEE PROFILE: Architect (Practitioner Level) Specific Role Data Architect

JADU UNIVERSE SPECIALIST CLOUD SERVICES: DEVELOPMENT

Symantec User Authentication Service Level Agreement

A96 CALA Policy on the use of Computers in Accredited Laboratories Revision 1.5 August 4, 2015

COPIES-F.Y.I., INC. Policies and Procedures Data Security Policy

For students to participate in BYOD please follow these two steps

Cloud Services Frequently Asked Questions FAQ

MIGRATION to IPv6 MTNL PLAN & PERSPECTIVE

G-CLOUD FRAMEWORK SERVICE DEFINITION. Oracle Technology Service for Agile Cloud Projects. Copyright: point6 Ltd

LINCOLNSHIRE POLICE Policy Document

Oakland County Department of Information Technology Project Scope and Approach

Capabilities Statement CONNECT WITH US:

Completing the CMDB Circle: Asset Management with Barcode Scanning

Leveraging Microsoft Dynamics CRM as an Enterprise Development Platform

HIPAA Compliance 101. Important Terms. Pittsburgh Computer Solutions

The user authentication process varies from client to client depending on internal resource capabilities, and client processes and procedures.

Configuring, Monitoring and Deploying a Private Cloud with System Center 2012 Boot Camp

IT CHANGE MANAGEMENT POLICY

Innovate faster with a cloud-enabled enterprise. Dirk Basenach, SAP SE, HANA Cloud Platform November 2 nd, 2015

DoD s Strategic Mobility Vision: Needs & Challenges

Zimbra Professional Services Portfolio, Purchasing Guide & Price List

ESSS Vendor Evaluation Form WhiteCanyon Software

Frequently Asked Questions: CMMI Data Collection

Solution Brief. Aerohive and Impulse. Powerful Network Security for Education and Enterprise

Cross Agency Priority Goal Quarterly Progress Update

Help Desk Level Competencies

The Nirvana Phone. Citrix Copyright

Service Level Agreement (SLA) Hosted Products. Netop Business Solutions A/S

MaaS360 Cloud Extender

Case Study. Sonata develops. comprehensive BI Application for a leading provider of Animal Nutrition Solutions. Ananthakrishnan

Xylos Technology Day. Delhaize Kurt Callens Pieter Boogaerts

Cross Agency Priority Goal Quarterly Progress Update

Transcription:

DD CIO DD CIO Mbility Industry Day Mbility Update / Overview Department f Defense Chief Infrmatin Officer July 9, 2015

DD CIO DD CIO Mbility Industry Day Capitalizing n Cmmercial Innvatin 2 Majr Themes : Security and Applicatins 10:00 11:15 Panel 1: Streamlining Security Apprval Prcesses t Keep Pace with Industry 11:45 12:15 Keynte: Mbility t the Jint Warfighter 13:15 14:30 Panel 2: Imprving Prductivity thrugh Mbile Applicatins and Services 14:45 16:00 Panel 3: MILDEP CIO / CTO Perspectives n the Day 15:30 16:00 Clsing Keynte 2

DD CIO DD Cmmercial Unclassified Prtfli Over 500K Mbile Devices Under Carrier Cntract ($40/mnth)* Big Three: ARMY ~180K NAVY ~105K AIR FORCE ~90K Device Type: 190K Smart Phnes 40K Tablets 120K Feature Phnes 70K Air Cards and Htspts 7K Tw-Way Pagers 4 Mbile Device Management (MDM) Architectures 4 Mbile Operating Systems 3 Wireless Service Cntract Vehicles *Snapsht f cmmercial mbile device (CMD) cunts frm May 2015 OMB submissin 3

DD CIO DD Cmmercial Classified Prtfli GOTS Based Slutins COTS Based Slutins 2G 3G 4G/LTE S/TS/SCI Capability?? QSEC 800 QSEC 2700 SME PED Past - GOTS Based Slutins - Cellular 2G Only - Nt user friendly Drid Pr Razr Maxx BlackBerry Bld 9900 Cmmercial Slutins fr Classified (CSfC) Present - COTS Based Slutins - NIAP apprved cmpnents - Over the Air Updates Samsung S4 Future - Mre Capabilities - Data-at-rest (DAR) - Apps/widgets - TS/SCI capability - Other apprved devices 4

DD CIO DD Apprval Prcess Security Requirements Natinal Infrmatin Assurance Partnership (NIAP) Cmmn Criteria (CC) Evaluatin & Validatin Over 14 Mbile Related Prtectin Prfiles Majr Mbile Prfiles: Mbile Device Fundamentals (MDF) Mbile Device Management (MDM) Applicatin Sftware Current Mbile Device Vendrs Participate in the NIAP: 5

DD CIO DD Managed vs Persnal Mbility Finding The Right Balance DD Managed Gvernment Owned Persnal Applicatins Gvernment Prtectins (Maximum) BYOD User Owned Gvernment Applicatins Persnal Use (Maximum) Unslved: - Data Spills - Installed Malware - Certificate Management 6

DD CIO Authenticatin n Mbile Devices - Past Same needs as ur ffice cmputers Sign, send, and encrypt email Web authenticatin Hardware challenge Cnnect smartphne t a smart card Cmmn Access Card (CAC) sled issues Cst Separate battery User expectatins 7

DD CIO Identity and Access Management (IdAM) - Present DD CIO Interim Guidance n Derived Credentials, 23 Sept 2014 Link t Cmmn Access Card (CAC) Eliminate smartcard readers Simplify credential management Hardware-backed encrypted keystres Derived DD CIO Manual issuance current ptins: Helpdesk manual prvisining via side-lading certs BlackBerry certificate ptin (May 2015) 8

DD CIO Identity And Access Management (IdAM) - Future Trusted Issuance Infrastructure Certificate authrity (CA) interfaces, fr ver-the-air (OTA) prvisining with trusted agents Purebred demnstratin ~ July 2015 Autmated OTA Factry t User prvisining Enrllment prtcl security (SCEP vs EST) EST Enrllment ver Secure Transprt SCEP Simple Certificate Enrllment Prtcl Bimetrics Integratin MDM agnstic

DD CIO DD Mbile Applicatin Envirnment Training Lgistics Cmbat Training Centers - DD Mbile App Stres (150+ Cmmercial Apps) - DD App Gallery - (50+ DD-Develped Apps) - NGA GEOINT App Stre (80 Apps) Army Field Inspectin Tl Tactical Operatins Andrid Tactical Assault Kit (ATAK) Air Frce Electrnic Flight Bag Tailred Applicatins Demnstrate the Advantages f Adapting t Military Needs 10

DD CIO Mbile Clud Cmputing Beynd Mbile Device Management (MDM) Clud adaptatins fr: Federated mbile management Applicatin Hsting Discnnected use case Clud Prviders t meet FEDRAMP requirements 11

DD CIO Help frm Industry: Wide Range f Operatins Operating Systems/MDM s/carrier: Multi vendr Plicy/Guidance: Security Guides t NIAP PPs Persnal use: Managed t BYOD Infrmatin Access: Email t Managed Clud Applicatins: Cmmercial and Custm Identity Management: Hard tken t derived credential SRG Security Requirements Guide NIAP Natinal Infrmatin Assurance Partnership PP Prtectin Prfile 12

DD CIO BACKUP 13

References DD CIO DD Mbile Device Strategy: http://www.defense.gv/news/ddmbilitystrategy.pdf DD Cmmercial Mbile Device (CMD) Implementatin Plan: http://www.defense.gv/news/ddcmdimplementatinplan.pdf CNSSP-17 Plicy n Wireless Systems: https://www.cnss.gv/cnss/issuances/plicies.cfm NSA Cmmercial Slutins fr Classified Prgram (CSfC) Prgram: http://www.nsa.gv/ia/prgrams/csfc_prgram/ DISA Mbility Prgram: http://www.disa.mil/services/enterprise-services/mbility DD Interim Guidance n the Use f DD PIV Derived PKI Credentials n Unclassified CMDs, 24 Sep 2014 DD Develpers Page: http://www.defense.gv/develper/ NIAP Prtectin Prfiles: https://www.niap-ccevs.rg/pp/ DISA Mbile STIGs: http://iase.disa.mil/stigs/net_perimeter/wireless/pages/smartphne.aspx DD Spectrum Strategy: http://www.defense.gv/news/ddspectrumstrategy.pdf DD Clud Cmputing Strategy: http://www.defense.gv/news/ddcludcmputingstrategy.pdf 14