Testing & Training Cross Talk Forum: Scoping the Cyber T&E Challenge

Similar documents
Introduction to NICE Cybersecurity Workforce Framework

NICE and Framework Overview

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology

NICE Cybersecurity Workforce Framework Tutorial

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

DoD Strategy for Defending Networks, Systems, and Data

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 16 R-1 Line #145

Joint Interoperability Certification

UNCLASSIFIED R-1 ITEM NOMENCLATURE

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

The Comprehensive National Cybersecurity Initiative

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

CyberSecurity Solutions. Delivering

FREQUENTLY ASKED QUESTIONS

Obtaining Enterprise Cybersituational

Empowering IT Acquisitions

1 July 2015 Version 1.0

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

Department of Defense NetOps Strategic Vision

National Initiative for Cyber Security Education

Guidelines for Cybersecurity DT&E v1.0

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

System Security Engineering and Comprehensive Program Protection

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System

SYSTEMS SECURITY ENGINEERING

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

Network Mission Assurance

System Security Engineering

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

DOD DIRECTIVE CLIMATE CHANGE ADAPTATION AND RESILIENCE

Cyber R &D Research Roundtable

Cyber Security Solutions Integrated. Proactive. Resilient.

Cybersecurity Throughout DoD Acquisition

Department of Defense Net-Centric Services Strategy

C ETS C/ETS: CYBER INTELLIGENCE + ENTERPRISE SOLUTIONS CSCSS / ENTERPRISE TECHNOLOGY + SECURITY

Cyber Superiority. Weapon System Normalization Update. Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority. AFCEA Luncheon Jan 2015

CYBER SECURITY GUIDANCE

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 9 R-1 Line #139

Cybersecurity. Cybersecurity 331

WHITE PAPER December, 2008

Common Criteria Evaluations for the Biometrics Industry

Writing a Systems Engineering Plan, or a Systems Engineering Management Plan? Think About Models and Simulations

Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE

Cisco Advanced Services for Network Security

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

Department of Defense. SUBJECT: Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS)

Defining a Secure Mobile Framework Architecture at DHA

Department of Defense DIRECTIVE

An Overview of Large US Military Cybersecurity Organizations

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Department of Defense DIRECTIVE

PEO IWS Enterprise Product Lifecycle Management Integrated Data Environment (eplm IDE) Jolene Marshall Thomas Murphy

Operationally Focused CYBER Training Framework

Advanced Systems & Development

Rethinking Cyber Security for Industrial Control Systems (ICS)

Actions and Recommendations (A/R) Summary

DOCUMENT CHANGE RECORD

Enterprise Security Tactical Plan

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED

SECTION C: DESCRIPTION/SPECIFICATIONS/WORK STATEMENT

DoD Software Assurance (SwA) Overview

Statement of Gil Vega. Associate Chief Information Officer for Cybersecurity and Chief Information Security Officer. U.S. Department of Energy

workforce operate and maintain protect and defend securely provision support investigate analyze operate and collect CYBERSECURITY framework

Middle Class Economics: Cybersecurity Updated August 7, 2015

Update On Smart Grid Cyber Security

2 Gabi Siboni, 1 Senior Research Fellow and Director,

National Cyber Security Policy -2013

Industrial Control Systems Security Guide

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

Systems Engineering and Integration Efforts. 11 Dec 2013

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

The Information Assurance Process: Charting a Path Towards Compliance

Some Thoughts on the Future of Cyber-security

White Paper Case Study: How Collaboration Platforms Support the ITIL Best Practices Standard

Implementing Program Protection and Cybersecurity

Department of Defense INSTRUCTION

ESKISP Manage security testing

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA

National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications

This Conference brought to you by

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Federal Bureau of Investigation s Integrity and Compliance Program

Defense Security Service

Table of Contents CYBER SECURITY STRATEGIC PLAN VERSION 1.0

Big Data, Big Risk, Big Rewards. Hussein Syed

Transcription:

Testing & Training Cross Talk Forum: Scoping the Cyber T&E Challenge Ryan Norman Test Resource Management Center 4800 Mark Center Drive Suite 07J22 Alexandria, VA 22350-3700 (571) 372-2725 Ryan.Norman@osd.mil

Cyberspace T&E Problem Cyberspace vulnerabilities leave our warfighters vulnerable Warfighter s mission is at risk to cyberspace attacks A cyberspace attack could render systems inoperable and prohibit warfighters from completing their missions Cyberspace vulnerabilities in DoD warfighting systems and information systems are our biggest concern How can the T&E community help? Cyberspace vulnerabilities need to be tested and resolved during system development, prior to operational testing Existing DoD laboratories and ranges the testbeds for DoD systems are essential to test cyberspace defense TRMC Immediate Focus: Computer Network Defense (CND) of Weapon and IT Acquisition Systems 1

Specialty Engineering Development/Design Engineering Decision Authority Input Requirements Definitions (JCIDS) Cyberspace T&E within the Acquisition Process Operational Need Measures of Effectiveness/Suitability Output to Next Phase of Development or Lifecycle Support Transition Identify Cyberspace Measures Decomposition & Definition Cyberspace Vulnerability Assessments Component Level Testing to the chipset level Requirements Analysis Understand System of Logical Systems Dependencies Analysis Design Solution Detailed Design System Measures of Performance Allocated Functions & Performance Requirements Component/Interface Definition Element Design Criteria Validation Ensure System of Systems Mitigation of Verification Cyberspace Threats Integration Confirmation Audits OT&E Validation against actual Cyber Threats Realization & Assessment DT&E Verification in Realistic Environment Integrated Component Testing Implementation Tech Data & Training Pubs Component Characterization Hardware Fabrication Software Creation/Coding V Chart Source: DAU Acquisition Community Connection 2

Cyberspace T&E Strategy Overview Test & Evaluation that accurately and affordably measures cyberspace effectiveness and vulnerabilities of warfighting systems and DoD information systems, to verify the warfighter s capability to achieve mission success while operating in cyberspace Cyberspace Attack Effects and Impacts: Unauthorized Access Unauthorized Use Disruption of Ops Loss of Control Data Corruption Data Fabrication Target Spoofing Cyberspace Test Tools Systems Under Test Cyberspace T&E Vision Federated Cyberspace T&E Capability Cyberspace Threat Representations Cyberspace Test Instrumentation An integrated T&E enterprise capable of creating a realistic cyberspace test environment at all required security levels, collecting performance & vulnerability test data, and assessing effects Four Major Thrusts 1.Cyberspace T&E Process Additional activities to test cyberspace during the acquisition process 2.Cyberspace T&E Methodology Test approach to adequately assess cyberspace capabilities/limitations 3.Cyberspace T&E Workforce T&E training to enable T&E professionals to conduct future cyberspace T&E 4.Cyberspace T&E Infrastructure Existing DoD Labs, Ranges, & Networks Industry & Academia Accessible Common Framework for: Cyberspace Environment Tools Cyberspace Test Instrumentation 3

Some Tenets of a Successful Cyberspace T&E Strategy 1. Mission Focus 2. Enterprise Perspective Beyond DoD 3. Tiered Management Structure & Accountability 4. Leveraging Existing Processes & Capabilities 5. Utilize Agile Concepts Cyberspace T&E Vision: T&E that accurately and affordably measures cyberspace effectiveness and vulnerabilities of warfighting systems and DoD information systems, to verify the warfighter s capability to achieve mission success while operating in cyberspace 4

Cyberspace T&E Strategy: Infrastructure Enterprise that supports DoD cyberspace testing needs Automated IA Test Tools Analysis Tools Test Control Sim/Stim Instrumentation Infrastructure Core Traits Managed Common Framework: Ensure interoperability of developed infrastructure Robust & Contained Environment Instantiation: Enterprise components that address cyberspace T&E needs Non-obtrusive instrumentation: Data capture of cyberspace measures Assessment Teams Readily Available: Infrastructure that spans C/S/A s and interfaces with other government, industry, and academia asappropriate Enterprise Knowledge Management: Infrastructure must enable collaboration, learning, and sharing data Net Ops Red Teams Credentialed Centers of Excellence : Managed & implemented process for documenting quality of cyberspace facilities and capabilities 5

The TRMC Blueprint : Putting Test Capabilities on the DoD Map Quadrennial Defense Review Strategic Planning Guidance Service T&E/S&T Working Groups DoD Strategic Plan for T&E Resources Service T&E Needs and Solutions Process TRMC Joint Investment Programs Risk mitigation needs Technology shortfalls Requirements Risk mitigation solutions Capabilities Advanced development (6.3 Funding) (6.4 Funding) (6.5 Funding) Service Improvement & Modernization/ Programs Acquisition Programs / Advanced Concept Technology Demonstrations T&E Multi-Service / Agency Capabilities DoD Corporate Distributed Test Capability 6

JMETC, JIOR, and You We must all work together to maximize our ability to perform cyberspace test and training The TRMC Joint Mission Environment Test Capability (JMETC) now has responsibility for Cyber T&E infrastructure Will leverage existing TRMC processes to ensure the best bang for the buck Investments can be beneficial to test & training communities Coordination has begun with Joint Staff J7 Joint and Coalition Warfare JMETC and JIOR have been in coordination for several years Working towards established processes for persistent connectivity in support of emerging test & training requirements Obviously, there are many policy / IA impediments Progress being made slowly but surely 7

Summary Cyberspace vulnerabilities leave our warfighters vulnerable Cyberspace T&E must become as agile as the threat Cyberspace T&E Vision Thrust Areas: 1. Process 2. Methodology 3. Workforce 4. Infrastructure Starting in FY13, the Joint Mission Environment Test Capability is resourced to provide Cyberspace Test Infrastructure Testing and Training collaboration essential for mutual success of both missions 8

Questions? Ryan Norman Test Resource Management Center 4800 Mark Center Drive Suite 07J22 Alexandria, VA 22350-3700 (571) 372-2725 Ryan.Norman@osd.mil

Backup Slides Not Intended for Presentation

Computer Network Operations Defend Cyberspace Defensive Cyberspace Operations (DCO) Actions taken to protect, monitor, analyze, detect and respond to unauthorized activity within Department of Defense information systems and computer networks. CND employs IA capabilities to respond to unauthorized activity within DoD information systems and computer networks in response to a CND alert or threat information Note: CND also employs intelligence, counterintelligence, law enforcement, and other military capabilities to defend DoD information and computer networks. Own Cyberspace Offensive Cyberspace Operations (OCO) Actions taken through the use of computer networks to disrupt, deny, degrade, or destroy information resident in computers and computer networks, or the computers and networks themselves. Computer Network Exploitation (CNE) Enabling operations and intelligence collection capabilities conducted through the use of computer networks to gather data from target or adversary automated information systems or networks. Our T&E Infrastructure must support both Defending & Owning Cyberspace. Existing laboratories and ranges are essential to test CND. 11

Development Progression Development Stage DT&E Functions DT&E Cyberspace Functions Requirements Engage early Identify Cyber Defense Measures to be Evaluate testability tested Design Component Test Integration System Test Interoperability Cyberspace T&E Strategy: T&E Process DT&E Activities for Cyberspace Assist in engineering design Verify component specification compliance and functionality Verify system specification compliance Assess human-system integration Progress to plan for Reliability Growth Characterize system functionality Stress the system within an intended mission environment Provide assessments of capabilities and limitations Verify KPPs, COIs, CTPs, and KSAs Assess progress towards meeting COIs Assess system safety Support joint interoperability process Assess compatibility with legacy systems Assurance, Certification, and Accreditation Assess vulnerability, susceptibility, and threat Test individual hardware / software components (SW/HW Assurance) Ensure SUT instrumented to Chipset level Test integrated components in integration lab SUT w/digital mission traffic & scenario simulation Penetration tests Penetration effects tests Test & Evaluate standards conformance Perform live interoperability tests Information Assurance Activities Cyberspace Testing Look beyond compliance to performance Certify system readiness for OT&E Test in realistic cyber environments - Benign - Threat Test in COCOM mission scenarios 12

Mechanism(s) for sharing best practices for cyberspace T&E throughout the community Define test procedures to measure and assess cyberspace capabilities and limitations Design Reference Missions (DRM) Threat Reference Designs (TRD) Example IA Attributes: Availability, Integrity, Authentication, Confidentiality, Nonrepudiation CND Metric Types: Cyberspace T&E Strategy: Methodology Test Procedures & Best Practices for Cyberspace Protection: Available, timely, & reliable access to data and information Detection: Measured time to determine threat has penetrated defenses Reaction: Measured Response from Human Factors, SUT, and Network Warfighting Environment Test Environment Restoration: Measured time and degree to which operations are returned to normal 13

Cyberspace T&E Strategy: Workforce Cyberspace Curriculum for T&E Professionals Cyberspace activities/operations require an additional skill set for the T&E Workforce (current focus is on Weapon Systems Acquisition) Additional Cyberspace T&E skill set needs to include knowledge of: Performing T&E Cyberspace functions. Computer Network Operations (CNO) Technology trends Potential Cyber Threats (Communications, Software and Hardware) Cyberspace T&E infrastructure, Environment Tools, Test Instrumentation, and Test Control Tools T&E Cyberspace functions include: Identifying Cyber Defense Measures that need to be tested Assess vulnerability, susceptibility, and threat Planning and executing of Penetration Tests on Systems and the evaluation of results Planning, Executing, and Evaluating System-of-Systems Test events in realistic cyberspace environments (both benign and threat) Strategy: Leverage ongoing competency assessment of the DoD T&E Workforce to identifying gaps, create Learning Objectives, and develop training material on Cyberspace T&E Encourage the use of external Cyberspace training opportunities 14

Cyberspace T&E Strategy Proposed Implementation Plan Define Traits of Major Thrusts Develop Cyberspace T&E Reqmts. Begin AoA s and CBA s Develop Cyberspace T&E Roadmap Increment #1 FY12+ Validate Progress through Test Pilots Increment #0 Cyberspace T&E Vision & Major Thrusts : Provides unified end state for cyberspace DT&E and test infrastructure. Continue to refine and socialize with C/S/As Define Traits of Major Thrusts : Functional decomposition of qualities necessary to achieve cyberspace T&E vision Develop Cyberspace T&E Requirements: TCRD-like document that describes process, methodology, workforce, and infrastructure requirements that must be met to achieve cyberspace T&E vision Begin Analysis of Alternatives (AoA) and Capabilities Based Assessments (CBA): Identify existing leverage opportunities that could help and risk items that could hinder achieving cyber T&E vision Develop Cyberspace T&E Roadmap: Implementation plan to realize defined requirements Validate Progress through Test Pilots: Ensures requirements are satisfied and matured as needed 15

InterTEC Cyber Event (ICE) 2011 Test Objectives 1. Conduct a series of tests that measure progress towards stakeholder goals: Verify Interoperability: Establish baseline operational mission performance in a benign environment conducted as part of InterTEC Systems Acceptance Testing (SAT) to leverage existing, proven methodology Conduct Cyber Defense Test: Conduct representative cyberspace attacks to evaluate mission performance in a threat-enriched operational environment 2. Gauge progress towards cyberspace T&E vision in context of cyberspace T&E major thrust traits: Assess Infrastructure connectivity, tools, and processes for repeatability and gaps Assess validity of utilized cyberspace T&E methodologies and measures JCAS Operational Use Case provides realistic context for achieving 2011 ICE test objectives 16

Key ICE 2011 Deliverables Three ICE 2011 Systems Under Test 1. [THRUST AREA: Methodology] Initial Methodologies for conducting cyberspace T&E 2. [THRUST AREA: Methodology] Preliminary set of CND DT&E metrics and measures 3. [THRUST AREA: Infrastructure] Gap analysis for a more robust red and blue cyberspace T&E infrastructure 17