Mark S. Orndorff Director, Mission Assurance and NetOps



Similar documents
Joint Information Environment Single Security Architecture (JIE SSA)

STIGs,, SCAP and Data Metrics

Infrastructure Development Forecast to Industry

How To Monitor Your Entire It Environment

DoD Secure Configuration Management (SCM) Operational Use Cases

UNCLASSIFIED. Trademark Information

DoD IA Training Products, Tools Integration, and Operationalization

DoD Strategy for Defending Networks, Systems, and Data

DISA Testing Services for the Enterprise. Luanne Overstreet

Department of Defense INSTRUCTION

Access FedVTE online at: fedvte.usalearning.gov

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

RED HAT ENTERPRISE LINUX 6 SECURITY TECHNICAL IMPLEMENTATION GUIDE (STIG) OVERVIEW. Version 1, Release July 2015

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Improvements Needed With Host-Based Intrusion Detection Systems

Network Security Monitoring: Looking Beyond the Network

SANS Top 20 Critical Controls for Effective Cyber Defense

A Comprehensive Cyber Compliance Model for Tactical Systems

DISA Acquisition Opportunities

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Network Management and Defense Telos offers a full range of managed services for:

Automating Attack Analysis Using Audit Data. Dr. Bruce Gabrielson (BAH) CND R&T PMO 28 October 2009

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Cyber Situational Awareness - Big Data Solution

Cyber Watch. Written by Peter Buxbaum

Reliable, Repeatable, Measurable, Affordable

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

Critical Controls for Cyber Security.

QRadar SIEM 6.3 Datasheet

Defending Against Data Beaches: Internal Controls for Cybersecurity

The Comprehensive National Cybersecurity Initiative

A Combat Support Agency

Looking at the SANS 20 Critical Security Controls

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

DOD Information Assurance Training & Awareness Products To order our products, please go to the following website:

Operationally Focused CYBER Training Framework

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process

Security Content Automation Protocol for Governance, Risk, Compliance, and Audit

Ports, Protocols, and Services Management (PPSM)

Forecast to Industry 2015

Concierge SIEM Reporting Overview

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

ARF, ARCAT, and Summary Results. Lt Col Joseph L. Wolfkiel

Campus. Impact. UC Riversidee Security Tools. Security Tools. of systems

Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI

DISA and the Evolving DoD Enterprise

Professional Services Overview

FREQUENTLY ASKED QUESTIONS

Intelligent Security Design, Development and Acquisition

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Forge.mil Overview. Software Engineering Collaborator's Exchange. Tom Morton Forge.mil Chief Engineer

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN

Middle Class Economics: Cybersecurity Updated August 7, 2015

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

How To Evaluate A Dod Cyber Red Team

Changing the Enterprise Security Landscape

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

Enhancing Your Network Security

Windows Least Privilege Management and Beyond

How To Protect A Network From Attack From A Hacker (Hbss)

How To Buy Nitro Security

The Protection Mission a constant endeavor

Meeting the Challenges of Virtualization Security

Caretower s SIEM Managed Security Services

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

US-CERT Year in Review. United States Computer Emergency Readiness Team

Federal Desktop Core Configuration (FDCC)

Product Framework. Products must use a common suite of infrastructure Support Services

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

Unified Capabilities (UC)

Practical Steps To Securing Process Control Networks

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

TABLE OF CONTENTS. Section 5 IPv Introduction Definitions DoD IPv6 Profile Product Requirements...

Cisco Security Optimization Service

Department of Defense NetOps Strategic Vision

Continuous Monitoring

Stephen Coty Director, Threat Research

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

DECC Montgomery. Mr. Chris Kemp Director May 2009

Service Oriented Architecture (SOA) for DoD

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

FY15 Quarter 1 Chief Information Officer Federal Information Security Management Act Reporting Metrics V1.0

IBM Security Intelligence Strategy

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Department of Defense DIRECTIVE

DoDI IA Control Checklist - MAC 2-Sensitive. Version 1, Release March 2008

Transcription:

Mark S. Orndorff Director, Mission Assurance and NetOps

Sustaining US Global Leadership: Priorities for 21 st Century Defense Both state and non-state actors possess the capability and intent to conduct cyber espionage and, potentially, cyber attacks on the United States, with possible severe effects on both our military operations and our homeland. Modern armed forces cannot conduct high-tempo, effective operations without reliable information and communication networks and assured access to cyberspace and space. Today space systems and their supporting infrastructure face a range of threats that may degrade, disrupt, or destroy assets. Accordingly, DoD will continue to work with domestic and international allies and partners and invest in advanced capabilities to defend its networks, operational capability, and resiliency in cyberspace and space. J (J

Approach Defendable GIG Configure securely, automatically Enhance perimeter defenses defense in depth Drive out anonymity Improved cyber readiness Improve Cyber C2 Improved situational awareness Cyber attack detection, diagnosis, reaction at network speed Improve Safe Sharing Cross domain flows as an enterprise service Evolve directory, identity, and access control

Cyber Operations Magic Quadrant for Cloud Infrastructure as a Service DoD Private Cloud Critical C2 Systems Critical MissionSystems Non-critical Systems Key Enablers Intelligence Cyber COP CND RA Mission Assurance Cyber Workforce Magic Quadrant for Public Cloud Infrastructure as a Service Source: Gartner (December 2011) GIG Resiliency

Notional Security Architecture Internet Web E-Mail DDoS DMZ IA ENTERPRISE IA DoD DMZ Non-DoD Partners Joint NetOps NIPR SIPR Shared Situational Awareness Attack analysis Continuous Monitoring Regional Boundary CDES Regional Boundary DMZ IA DoD DMZ Joint Base IA Server Zone IA Host based security System Antivirus CAC and SIPR Token Joint Base User Zone Joint CC/S/A Server Zone Identity and Access Management Privilege Management

Security Guidance: Approach to Improve Agility Utilize a standards based approach to develop IA configuration guidance, publish IA guidance, assess assets, and report compliance Leverage Security Content Automation Protocol (SCAP) Industry standard championed by NIST Designed to provide a structured means to express security checks to any SCAP enabled tool and ensure consistent results Benefits: Enables vendor community to develop standardized guidance once for use by all communities Allows commercial assessment tools to utilize DoD configuration guidance Produce Security Requirements Guides (SRG) SRGs serve as the basis for requirements in developing a STIG Benefits: SRGs are non-vendor specific Product vendors can use SRGs to develop product specific guidance or support validation of compliance in the C&A process Mobile Devices will be key use-case to prove benefits of our new approach

Framework for the Future DOD IA Policy Documents SP 800-53 DOD Directives & Instructions CJCS Policy USCYBERCOM CTOs SCAP STANDARDS CCI Control Correlation Identifier Security Requirements Guide Policy SRG OS SRG ----------------------------- Unix SRG Mobile SRG Application SRG -------------------------------- DB SRG Mobile Apps SRG MDM SRG Network SRG ------------------------------- Router SRG IDS SRG Examples CVSS STIG Specific Technology products, and system guidance and procedures Enclave Mobile policy Traditional Access Control Network Infrastructure STIGs Android 2.2 Blackberry Red hat 5 Solaris 9 HP UX 11.3.1 STIGs Oracle 11 Microsoft SQL Good Fixmo Google Maps STIGs CISCO Switch Juniper Switch SourceFire Securify STIGs CPE CVSS CCE CVE XCCDF HBSS NOC DKO SME/PED DoD DMZ System STIGs Input from multiple SRG source requirements are used to build System or Specialized STIGs

PEO-MA Engineering Support Services Project: PEO-MA Engineering Support Services Anticipated Start Date: 4 th Quarter, FY12 Predecessor Contracts: N/A Anticipated Small Business Involvement: Small Business set-aside Anticipated Contract Type: Multiple-Award BPA RFP to be released: May/June 2012 This acquisition will provide a full range of engineering support services in support of IA2, IA3, IA4 and IA5 missions. All missions supported will require IA and CND expertise. The Government s intention is to set up a Blanket Purchase Agreement (BPA) with one or more contractors to provide the support described in the Performance Work Statement (PWS), with delivery orders specifying which task and sub-task areas will be completed at that time. Defendable GIG/Improve Safe Sharing/Improve Cyber 20 C2

Project: Distributed Denial of Service Mitigation Solution (DDoS-MS) Anticipated Start Date: 3 rd Quarter, FY13 Predecessor Contracts: Distributed Denial of Service-Tech Refresh (DDoS- TR), NNG07DA21B/HC102810F2699 RFI released: September 2011 DDoS-MS PEO-MA requires a Distributed Denial of Service-Mitigation Solution (DDoS-MS), to be integrated with Distributed Denial of Service-Tech Refresh (DDoS-TR) program, which will monitor network traffic traversing the internet/niprnet border and protect DoD assets. The DDoS-MS solution must enhance the current DDoS-TR system by providing packet scrubbing. The current DDoS-TR system uses Arbor Peakflow to perform DDoS detection and mitigate attacks with Remote Triggered Black Hole (RTBH) and BGP Flow-Spec. The government is interested in solutions that provide other mitigation techniques. Defendable GIG

Project: Hardened System Secure Configuration Management and Reporting (HSSCMR) Anticipated Start Date: 2 nd Quarter, FY13 Predecessor Contracts: None RFI released: September 2011 HSSCMR The goal of HSSCMR is to improve configuration management practices by increasing awareness of security weaknesses through the identification and analysis of host configuration states using operational context. HSSCMR is a DoD Enterprise-wide capability envisioned to provide visibility and awareness of the security posture of every networkconnected host in DoD. HSSCMR provides visibility of DoD host operating systems and application inventories, system and environmental attributes, and technical and non-technical security guidance and security patch compliance measurements. The HSSCMR capability is enabled by the use of standardized configuration assessment and reporting data specifications and is architected as a service oriented architecture (SOA). Defendable GIG

Project: Host Based Security System (HBSS) Phase II Anticipated Start Date: 1 st Quarter, FY14 Predecessor Contracts: HBSS Phase I, HC1028-08-D-2023/0056 HBSS Phase II RFI released: December 2011 (Central Management Framework and Host- Based Security Modules) The Host Based Security System (HBSS) solution suite is an enterprise-wide automated, standardized tool that provides host-based security, against both insider threats and external threats. DISA, at the request USSTRATCOM and in support of National Security goals established by the President; purchased from industry, a capability that will develop and deploy an automated HBSS solution. HBSS supports the Defense-in-Depth initiative by providing network administrators and security personnel with mechanisms to prevent, detect, track, report, and remediate malicious computer-related activities and incidents across all DoD networks and information systems throughout the DoD Enterprise. Defendable GIG

DIBNet Development Project: Defense Industrial Base Network (DIBNet) Development Anticipated Start Date: 4th Quarter, FY12 Predecessor Contracts: IATAC, SPO70098D4002/0334 The purpose of DIBNet is to develop and deploy DIBNet-U and DIBNet-S to facilitate the collaboration between DoD and Defense Industrial Base (DIB) partners to protect Sensitive DoD data residing in commercial space. DIBNet-U and DIBNet-S capabilities facilitate the sharing, analysis, integration, and visualization of network attacks, to include a publicly available registration site that is a critical capability in opening the DIB Cyber Security/Information Assurance (CS/IA) Program to all qualified cleared defense contractors (CDCs). The DIB CS/IA program is focused on helping Cleared Defense Contractors (CDCs) protect DoD information resident on DIB unclassified networks that is not publicly releasable. To be successful the DoD and DIB require a secure environment for cyber threat information sharing and collaboration between the DoD and DIB. The DIB CS/IA Program is critical to assisting the DoD community that includes the DIB, in securing DoD program information on DIB unclassified networks that are threatened daily, mitigating attacks when they occur, and enabling the DIB Partners to protect against future attacks. This multi-phased project will facilitate the sharing, analysis, integration, and visualization of network attacks, and is a critical milestone in opening the DIB CS/IA Program to all qualified CDCs. Improve Cyber C2

IA Audit Management Project: Information Assurance (IA) Audit Management Anticipated Start Date: 3 rd Quarter, FY13 Predecessor Contracts: Centaur Support, HC1028-10-C-2015/0000 RFI to be released: TBD This effort will provide follow-on support for the development and support of the implementation of an IA Audit Management operational pilot focused on web, firewall and other application logs. This includes researching, developing, testing, and providing IA Web Audit Management tool(s), and tactics, techniques and procedures (TTPs) to the Government to support DOD Computer Network Defense (CND) analytics performed at the operational level. Improve Cyber C2

PCAP Solution Project: Packet Capture and Analysis Solution (PCAP) Anticipated Start Date: TBD Predecessor Contracts: None RFI released: March 2012 The Data Access and Long Term Storage (DALTS) initiative requires a Packet Capture and Data Retrieval System. For network security and situational awareness purposes, the DoD plans to collect the data traveling through the network infrastructure. The DoD is seeking a solution capable of providing full Packet Capture of the Enterprise GIG, to include long-term storage of that capture data, and allowing systems analysts to retrieve the data from the system. The needed solution will consist of three aspects: full packet capture, data storage, and query capability for analysis. Improve Cyber C2

SIEM Solution Project: Security Information and Event Management (SIEM) Solution Anticipated Start Date: TBD Predecessor Contracts: None RFI released: March 2012 PEO-MA needs a Security Information and Event Management (SIEM) solution with a data fusion and long-term storage capability. This SIEM solution will provide the collection, trending, reporting and analysis of log data from host systems and applications as well as network and security devices. Improve Cyber C2

CDES Operations & Integration Support Project: Cross Domain Enterprise Service (CDES) Operations and Integration Support Anticipated Start Date: 1 st Quarter, FY13 Predecessor Contracts: Cross Domain Solutions Implementation, Engineering and Documentation Support, HC1028-08-D-2025/0010 RFI released: November 2011 The objective is to provide DISA and the Cross Domain Solutions Branch with software and systems engineering and information assurance services, i.e., high quality operational, integration and documentation support services at the lowest reasonable cost, in support of the Cross Domain Enterprise Service and Cross Domain Solutions Product Line. Improve Safe Sharing

Project: Public Key Infrastructure (PKI), Program Management, Technical and Engineering Support Anticipated Start Date: 2 nd Quarter, FY13 Predecessor Contracts: PKI PM Support, HC1028-08-D-2015/0014, PKI Engineering Support, HC1028-08-D-2015/0015 RFI to be released: May 2012 PKI Program Management, Technical and Engineering Support PEO-MA has two goals for this effort: 1) The Contractor shall provide program management consultant services through subject matter experts on the configuration of PKI systems; and 2) The Contractor shall provide technical and engineering support services to execute the PKI program in accordance with the current DoD X.509 Certificate Policy and the appropriate DoD approved architectures, programs standards and guidelines such as DoDI 5000.2, Defense Information Infrastructure (DII), Defense Information Systems network (DISN), and Global Information Grid (GIG). Improve Safe Sharing

Project: Cross Domain Enterprise Service (CDES) Enterprise E-mail Web Services Anticipated Start Date: TBD Predecessor Contracts: None RFI released: September 2011 Cross Domain Enterprise Services File Transfer The PEO-MA Cross Domain Solutions (CDS) Program implements the Cross Domain Enterprise Service (CDES), which provides hardware and software for the transfer of information between the DoD s classified and unclassified networks. This transfer of information between networks of different security domains is conducted using various cross domain guard technologies and accomplished with high assurance, speed, and integrity. This enterprise service is provided to combat commands, military services, and defense agencies. Aspects of the enterprise service are web services, e-mail, and file transfer across security domains. The CDS Program is seeking technologies that can serve the needs of the DoD enterprise for cross domain web services, e-mail, and file sharing, scale to support the DoD enterprise, operate within the enterprise environment, and realize cost efficiencies. Improve Safe Sharing

A Combat Support Agency Summary Defendable GIG Building enterprise architecture consistent with CYBERCOM and DoD CIO vision. Significant capability available today. Improve Cyber C2 Basic capabilities in place with significant challenges ahead. Improve Safe Sharing Robust foundation with actions underway to achieve near term successes. The foundation of the Cyber program is a well trained and experienced workforce