DoD Joint Information Enterprise



Similar documents
How To Improve The Defense Communications System

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

Core Data Center Reference Architecture

DISA Testing Services for the Enterprise. Luanne Overstreet

Space Ground Services in the Joint Information Environment (JIE)

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

Unified Capabilities (UC)

Unified Capabilities (UC)

Department of Defense NetOps Strategic Vision

DISA and the Evolving DoD Enterprise

Reliable, Repeatable, Measurable, Affordable

Marine Corps. Commercial Mobile Device Strategy

SUBJECT: Joint Information Environment Implementation Guidance

DoD s Strategic Mobility Vision: Needs & Challenges

The Department of Defense Strategy for Implementing the Joint Information Environment

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process

IT Service Management in the JIE and the DoD Enterprise Service Management Framework

PRODUCT DIRECTOR, ENTERPRISE CONTENT, COLLABORATION, AND MESSAGING

Cloud Computing Strategy

Department of Defense (DoD) Unified Capabilities Master Plan (UC MP)

DoD Strategy for Defending Networks, Systems, and Data

Forecast to Industry 2015

Executive Summary. Army HR IT Strategic Plan 1

Joint Information Environment Single Security Architecture (JIE SSA)

Partnering with Small Business

Northrop Grumman White Paper

DoD Mobility Kim Rice

ENTERPRISE COMPUTING ENVIRONMENT. Creating connections THROUGH SERVICE & WORKFORCE EXCELLENCE

AFCEA Aberdeen Luncheon. Army Common Operating Environment (COE) Update. March 11, 2015

Enterprise IT. Aligning Strong Solutions, Assuring Enterprise Strength

Cloud Computing Strategy

Mobilizing Business Applications, Efficiently and Affordably

Advanced Systems & Development

DoD Mobility Overview

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN VERSION 2

Verizon Applications and Cloud

CYBER PANEL MEMBERS. Mr. Hart is a member of the United States Air Force Senior Executive Service with over fifteen years service as an SES.

Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience

United States Department of Defense

Joint Training Enterprise Architecture

Leveraging Network Infrastructure to Bring Critical Information to Users

STATE OF MARYLAND 2017 INFORMATION TECHNOLOGY MASTER PLAN (ITMP) Department of Information Technology David Garcia; State CIO

Defense Information Systems Agency A Combat Support Agency. Identity and Access Management (IdAM): Consistent Access to Capability

GAO DEFENSE DEPARTMENT CYBER EFFORTS. More Detailed Guidance Needed to Ensure Military Services Develop Appropriate Cyberspace Capabilities

CHOOSING AN MDM PLATFORM

Uncomplicated Communications

Marine Corps Private Cloud Computing Environment Strategy

Network Management and Defense Telos offers a full range of managed services for:

Enabling the University CIO Strategic Plan Vision for Mission

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Space and Naval Warfare Systems Center Atlantic

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

Cyber Situational Awareness - Big Data Solution

FROM THE DOD CIO. Teresa M. Takai, DoD CIO

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

Choosing an MDM Platform

Army Cloud Computing Strategy

WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD

How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives

What Is Cisco Mobile Workspace Solution?

Trust: When Physical and Logical Security Worlds Collide

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

AFCEA JIE Mission Partner Symposium

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

GOVERNMENT USE OF MOBILE TECHNOLOGY

Today s Best Practices: How smart business is protecting enterprise data integrity and employee privacy on popular mobile devices. Your Device Here.

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Advancing the U.S. Air Force Mission

This Conference brought to you by

Office of Warfighting Integration and Chief Information Officer SAF/CIO A6. Mission Brief

Mobile Device Inventory the first step in enterprise mobile management

DoD IT Enterprise Strategy and Roadmap Department of Defense (DoD) Information Technology (IT) Enterprise Strategy and Roadmap

DoD Needs an Effective Process to Identify Cloud Computing Service Contracts

Technology Strategy April 2014

National Cyber Security Framework and Protocol. for securing digital information in networked critical infrastructures and communications

DoD ESI & The Joint Information Environment (JIE)

AF C2 Capability Modernization Leveraging Architectures to Achieve Warfighting Integration

Cybersecurity Enhancement Account. FY 2017 President s Budget

Review of the Total Information Technology Operations Cost for the Pentagon Reservation and National Capital Region

The Internet of ANYthing

Bridging the Digital Divide with Net-Centric Tactical Services

Service Oriented Architecture (SOA) for DoD

Consolidated Afloat Networks and Enterprise Services (CANES)

Defining a Secure Mobile Framework Architecture at DHA

Cybersecurity: Mission integration to protect your assets

Accenture Technology Consulting. Clearing the Path for Business Growth

BT Unified Trading communication. The Future Delivered

Remote Management Services Portfolio Overview

Department of Defense Information Enterprise Architecture (DoD IEA) Version 2.0

Cybersecurity: The Defense Perspective

A guide to HP enterprise mobility solutions. Expanding the potential of your business with advanced mobility services

Network Systems Integration

How To Build A Data Center

Telephony Denial of Service (TDoS) Attacks. Dan York, CISSP Chair, VoIP Security Alliance

AUSA Background Brief

Transcription:

DoD CIO DoD Joint Information Enterprise Mr. David DeVries DoD Deputy Chief Information Officer For Information Enterprise (IE) May 21, 2013

DoD s Cyber Footprint How Big? DoD IT User Base ~1.4 million active duty ~783,000 civilian personnel ~1.2 million National Guard and Reserve 5.5+ million family members and military retirees 146 + countries 5,000 + locations 600,000 + buildings and structures Total IT Budget > $39.6B in FY14 > $17.4B in IT Infrastructure > $4.7B for cybersecurity IT Systems >10,000 operational systems (20% mission critical) ~1850 data centers ~65,000 servers ~7+ million computers and IT devices Thousands of networks/ enclaves Thousands of email servers, firewalls, proxy servers, etc. Mobile devices ~ 493,000 Blackberries ~ 41,000 ios Systems (Pilots) ~ 8,700 Android Systems (Pilots) Scale of the SUPPORT footprint THE WARFIGHTER scope of the challenge 2

Current DoD IT Environment Hundreds of sub-optimal datacenters and networks incur unnecessary costs Limited interoperability reduces information sharing and collaboration on mission threats Increasing demand for new technology on rapidly evolving devices IT programs average 81 months* cannot rapidly, efficiently field new tech to meet warfighter needs Cybersecurity vulnerabilities threaten to exploit classified information and endanger mission success Current IT delivery process hinders our ability to take advantage of new commercial technology * Source: Defense Science Board 3

DoD CIO Transforming DoD IT/Cyber Environment From This: To This: DoD Must Change 4

DoD CIO DoD IT Future: Joint Information Environment (JIE) A secure joint information environment, comprised of shared information technology (IT) infrastructure, enterprise services, and a single security architecture to achieve full spectrum superiority, improve mission effectiveness, increase security and realize IT efficiencies. JIE is operated and managed per Unified Command Plan (UCP) using enforceable standards, specifications, and common tactics, techniques, and procedures (TTPs). JIE drives: Mission Effectiveness: Enables Joint forces to achieve full spectrum superiority in protecting US. national interests Cybersecurity: Improves network security, enabling dynamic tasking of cyber forces IT Efficiencies: Synchronizes IT investment strategies through a common vision using a single security architecture 5

JIE Enabling Characteristics Transition from network-centric to data-centric capabilities Rapid delivery and use of integrated cloud services accessible by all means from anywhere An interdependent information environment providing real-time cyber situational awareness A scalable platform allowing flexibility and mission partnering Secure where it needs to be, resilient throughout, and appropriately consolidated Information is a Critical Strategic Asset 6

DoD CIO How Does JIE Impact DoD? All DOD users receive a select set of common services automatically All services ride on centralized foundational services Targeted mission services shared to the enterprise Wikis, blogs, IM, chat Founda9on Services Coali9on, NGO space Audit Services Standardized Accounts Mission Services Collabora9on, search, voice, video. Weather, logis9cs, Common User A"ributes A"ribute- Based Access Smart Data Data Tagged and Wrapped Credentials work automatically & globally Security End-to-End Situational Awareness down to the desktop Any DoD device anywhere Enables C2 Cyber Ops Eliminate network divisions & barriers Consolidate computing/storage Supports LowBandwidth Disconnected Common Gateways Air Force Airborne Networking NAVY DIL NGOs Army/Marine Comm on the Move 7

DoD CIO DoD IT Modernization FY14 ~FY17 < 100 ~2000 Federated/ Enterprise Duplicative > 65 < 25 Unified Communications Client-Based Technology Desktop PCs Multiple Contracts 90 360 days Enterprise Contracts 10 60 days Plan of Action & Milestones (POA&M) Rough Order of Magnitude (ROM): TBD Bottom Line: DoD IT Annual Budget $39.6B $???? 8

JIE Strategy: Keep Initial Focus on Big Rocks Network Optimization Common network standards and TTPs Single Security Architecture Data Center Consolidation Core Enterprise Data Center Standards Service Data Center consolidation plans move to a Department focused plan Identity and Access Management Access the Network from anywhere Attributes access to data Enterprise Services Common capabilities across the Department Mission specific applications remain Governance Move Service IT efforts into optimized DoD plan 9

Network Optimization: Europe JIE Use Case As Is I-NOSC East (Langley AFB) Data Centers: 23 + Security Stacks: 4+ Operations Centers: 4+ Other European B/P/C/S not represented RAF Molesworth RAF Mildenhall RAF Lakenheath Army - TNOSC Spangdahlem AB Ramstein AB Grafenwohr Wiesbaden Kaiserslautern Stuttgart MARFOREUR Panzer Aviano AFB (AFNet) EUCOM Stuttgart Base Stuttgart Datacenter AFRICOM Security Stack Aggregation Router (AR) Provider Edge Router (PE) Ops Center Data Center Service Desk Note: All locations/facilities depicted were used exercise purposes only Dal Molin Naples MAGTF Navy NOSC (ONE-NET) Flt Net Ops Center Sigonella 10

Network Optimization: Europe JIE Use Case To Be ~50 B/P/C/S Re-homed Data Centers: 5 Security Stacks: 5 (plus tactical entry) Operations Centers: 2 RAF Molesworth RAF Mildenhall RAF Lakenheath EOC Spangdahlem AB Ramstein AB Grafenwohr Wiesbaden Kaiserslautern.. Stuttgart MARFOREUR Panzer Aviano AFB (AFNet) EUCOM Stuttgart Base Stuttgart Datacenter AFRICOM Security Stack Aggregation Router (AR) Dal Molin 11 Provider Edge Router (PE) Ops Center Data Center Service Desk Pre- Decisional / Hypothe6cal Note: All locations/facilities depicted were used exercise purposes only Naples MAGTF EOC Sigonella 11

Data Center Consolidation DoD Core Data Center Reference Architecture defines the DoD cloud. Extension of this core with modularized and containerized data centers (data center in a box) will enable synchronized data and services within tactical edge environments. 12

Identity and Access Management (IdAM) DoD IdAM Vision: DoD Enterprise Users and Non-Person Entities (NPEs) have trusted access to any resource, anywhere, at anytime DoD IdAM Strategic Goals - Drive out Anonymity - Implement Dynamic Access Control - Institutionalize DoD IdAM Enterprise approach for Attribute Based Access Control and services - Digital identity management, credentialing, authentication, authorization, and access auditing - Linking identity to data, applications, and IT resources access transactions Data 13

DoD CIO Enterprise Services: Mobility End-to-End Vision DoD Mobile Applica9on Storefront Shared pre- approved Apps from across DoD Secure Government Enterprise Services DoD Enterprise Capabili9es Mobile Device Management VoIP/ Video Email Txt Msging Calendars Mobility Gateway Apps and devices authorized & ready to connect to DoD networks & services Mobility Networking Wireless Carriers Standardized service plans and DoD nego6ated rates Iden9ty Management DoD wide creates interoperability Commercial Mobile Devices Simplified pre- approval of mul6ple devices for all DoD Bottom Line: New mission-specific capabilities are more agile and quick to develop because standard S U P Pinfrastructure ORT THE W R F I G H T E R is A available 14

Enterprise Services: DOD Cloud Infrastructure: Soldier Always Stays Connected to the Cloud 15

Challenges Achieving JIE Cultural Changes o o Cultural/institutional differences Adapting to new management construct for JIE Technology o Disparate technologies and security architectures throughout DoD CC/S/As Resources o o o Stovepipe funding streams Seed money to fund investments Budget / Sequestration 16

Way Ahead DoD CIO Continue to articulate JIE Vision to internal and external audiences Continue to leverage COCOMs, Services and Agencies IT initiatives to achieve end-state Drive implementation and execution actions necessary to deliver capabilities Embed policies, procedures, oversight, and culture that enable info sharing Partner with industry to deliver National Security in Cyberspace Leverage extensive and unprecedented capabilities afforded by the Information Age Implement JIE Increment 1 to test capabilities in Europe Coalition Forces 17

Looking Ahead with Industry Improve / simplify the user experience Turn capabilities into mobile applications o Applications to represent lite versions of working business systems Keep pace with emerging technologies Mobile device management; device auditing; and device provisioning Strong partnerships between government and industry Work early and often with Industry to get it right from the start! Combined efforts to protect DoD Environments from outside adversaries Must deliver mobile solu6ons that leverage commercial off- the- shelf products, improve func6onality, decrease cost, and enable increased personal produc6vity 18

DoD CIO DoD Joint Information Environment Achieving JIE enables: - Faster Deliveries - Innovative Solutions Federation/Shared Infrastructure - Improved Efficiencies Enterprise Services - Secure Capability Defensibility/Redundancy/ Resiliency Access at the Point of Need The relevance of space and cyberspace to national security will grow exponentially in magnitude of importance. Our reliance on technological superiority is a potential vulnerability that our adversaries will seek to exploit. General Martin E. Dempsey, USA, Chairman, Joint Chiefs of Staff 19

20