Ports, Protocols, and Services Management (PPSM)



Similar documents
Department of Defense INSTRUCTION

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

Interim Department of Defense (DoD) Certification and Accreditation (C&A) Process Guidance

Service Oriented Architecture (SOA) for DoD

Applying the DOD Information Assurance C&A Process (DIACAP) Overview

DIACAP Presentation. Presented by: Dennis Bailey. Date: July, 2007

NOV q11. DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTOr D.C

DoD IA Training Products, Tools Integration, and Operationalization

Unified Capabilities (UC)

Department of Defense INSTRUCTION. SUBJECT: Information Assurance (IA) in the Defense Acquisition System

FAST FILE TRANSFER INFORMATION ASSURANCE ASSESSMENT REPORT

Jeff Shockley Roche Diagnostics

DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND Thanks

DSS Secret Internet Protocol Router Network (SIPRnet) Processing Procedures

DoDI IA Control Checklist - MAC 3-Public. Version 1, Release March 2008

UNCLASSIFIED (U) U.S. Department of State Foreign Affairs Manual Volume 5 Information Management 5 FAM 870 NETWORKS

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN

DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND

Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process

A Comprehensive Cyber Compliance Model for Tactical Systems

DEPARTMENT OF THE NAVY DOD INFORMATION ASSURANCE CERTIFICATION AND ACCREDITATION PROCESS (DIACAP) HANDBOOK. Version 1.0

DISA Cloud: RACE (IaaS) and Platform as a Service (PaaS)

Department of Defense INSTRUCTION. Public Key Infrastructure (PKI) and Public Key (PK) Enabling

Information Assurance Manual

Department of Defense INSTRUCTION

Department of Defense DIRECTIVE. SUBJECT: Management of the Department of Defense Information Enterprise

Out with. AP, In. with. (C&A) and (RMF) LUNARLINE, INC

How To Improve The Defense Communications System

DoD s Strategic Mobility Vision: Needs & Challenges

NETWORK SERVICES (NS/NSC) ENTERPRISE CONNECTION DIVISION DEFENSE INFORMATION SYSTEMS NETWORK (DISN) CONNECTION PROCESS GUIDE (CPG)

Report No. D September 30, 2008

APPLICATION SECURITY AND DEVELOPMENT SECURITY TECHNICAL IMPLEMENTATION GUIDE Version 3, Release July Developed by DISA for the DoD

UNCLASSIFIED. Trademark Information

Report No. D July 30, Data Migration Strategy and Information Assurance for the Business Enterprise Information Services

TABLE OF CONTENTS. Section 5 IPv Introduction Definitions DoD IPv6 Profile Product Requirements...

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

Department of Defense NetOps Strategic Vision

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

Directives and Instructions Regarding Wireless LAN in Department of Defense (DoD) and other Federal Facilities

BY ORDER OF THE COMMANDER USTRANSCOM INSTRUCTION 33-3 UNITED STATES TRANSPORTATION COMMAND 5 DECEMBER 2011

Product Framework. Products must use a common suite of infrastructure Support Services

Raytheon Oakley Systems

Operationally Focused CYBER Training Framework

Department of Defense INSTRUCTION. Security of Unclassified DoD Information on Non-DoD Information Systems

DoD ANNEX TO THE COLLABORATIVE PROTECTION PROFILE (cpp) FOR STATEFUL TRAFFIC FILTER FIREWALLS V1.0. Version 1, Release 2.

SUBJECT: systems. in DoD. capabilities. d. Aligns identity. (Reference (c)). (1) OSD, the Staff and

Directives and Instructions Regarding Security and Installation of Wireless LAN in DoD Federal Facilities

Improvements Needed With Host-Based Intrusion Detection Systems

Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS

DISA Acquisition Opportunities

DEFENSE INFORMATION SYSTEMS AGENCY P. O. BOX 549 FORT MEADE, MARYLAND Joint Interoperability Test Command (JTE) 7 Jan 15

Raytheon Secure Systems and Networks

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition

Department of Defense INSTRUCTION

DoDI IA Control Checklist - MAC 2-Sensitive. Version 1, Release March 2008

Cloud Computing and Enterprise Services


Department of Defense

Mark S. Orndorff Director, Mission Assurance and NetOps

A Combat Support Agency

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

UNIFIED CAPABILITIES APPROVED PRODUCTS LIST (UC APL) PROCESS GUIDE

DoD Secure Configuration Management (SCM) Operational Use Cases

Forge.mil Overview. Software Engineering Collaborator's Exchange. Tom Morton Forge.mil Chief Engineer

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Implications of Security and Accreditation for 4DWX (Information Assurance) By Scott Halvorson Forecasters Training 26 February 2009

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

Local Session Controller: Cisco s Solution for the U.S. Department of Defense Network of the Future

DoD ENTERPRISE CLOUD SERVICE BROKER CLOUD SECURITY MODEL

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

4. Objective. To provide guidelines for IS requirements and LCM support under NMCI.

DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC

Network Security Policy

UNITED STATES PATENT AND TRADEMARK OFFICE. AGENCY ADMINISTRATIVE ORDER Agency Administrative Order Series. Secure Baseline Attachment

DEPARTMENTOFDEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

STATE OF NEW JERSEY IT CIRCULAR

FSIS DIRECTIVE

Department of Defense INSTRUCTION

Global Video Services (GVS)

Department of Defense INSTRUCTION

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

DoD Needs an Effective Process to Identify Cloud Computing Service Contracts

RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

Department of Defense INSTRUCTION

1. Has your command deployed an Enterprise Content Management (ECM) application? Yes, but we do not have TRIM deployed in ECM mode.

Department of Defense. Enterprise Information Warehouse/Web (EIW) Using standards to Federate and Integrate Domains at DOD

NASA Information Technology Requirement

What is Unified Capabilities?

Transcription:

Defense Information Systems Agency A Combat Support Agency Ports, Protocols, and Services Management (PPSM) PPSM, Project Manager 29 July 2010

NSC Org Chart DSAWG Dennis Ruth, Chair NSCA Connection Approval Division Teri C. Netter, Chief NSC PPSM C. J. Davis, PM NSCB Vacant Dep NSC Information Assurance Branch Ms Kate Felts NSC1 Plans and Management Branch Ms Cora Banks NSC2 Unclassified Connection Approval Office Ms P. Patterson Classified Connection Approval Office Vacant 2

PPSM Mission Develop and implement DoD policy and procedures that govern the use and management of applications, protocols, and services (with their associated ports) in DoD Information Systems; in a manner that promotes network security, interoperability, and the evolution of net-centric operations across the Enterprise Networks. Committed to Protecting Data End-to to-end 3

What is PPSM? Created to ensure that applications, protocols, and services (with their associated ports) used in DoD Information Systems are registered, controlled, and regulated. PPSM provides support to: Acquisition and Development Certification and Accreditation Enterprise, Organization, and System DAAs NetOps Perimeter and boundary defense Connection approval processes (UCAO/CCAO/DSAWG/DISN PAA) Firewall Administrators 4

Why is PPSM Important? To identify the vulnerabilities and risks associated with the use of certain protocols or services: Registered in the DoD PPSM Registry Undergo a vulnerability assessment Assigned an assurance category Regulated based on their potential to cause damage to DoD operations. 5

What if I Do Not Comply? Failure to comply with DoD Ports, Protocols, and Services Management (PPSM) requirements can result in: Compromise of the enclave boundary protections Impair functionality of the protocols and services DoD Information System exposed to unnecessary risk 6

Negative Impacts: What Else Should I Know? Certification & Accreditation (C&A) Hosting/Fielding Systems in the Defense Enterprise Computing Centers (DECCs) May not be allowed to connect to GIG Traffic being Blocked by Destination Firewalls 7

When to Comply w/ppsm DIACAP Activities DCPP-1 DCPP-1 8

PPSM Process Register DoD IS PPSM URL: https://pnp.cert.smil.mil VA team researches associated protocols and services Technical Advisory Group (TAG) PPSM CCB Votes on Category Assurance Levels (CAL) Products published on IASE and DKO websites (high/low) Information Assurance Support Environment IASE NIPRNet - http://iase.disa.mil/ports/index.html SIPRNet - http://iase.disa.smil.mil/ports/index.html Army Knowledge Online/Defense Knowledge Online - AKO/DKO NIPRNet - https://www.us.army.mil/suite/page/396114 SIPRNet - http://www.us.army.smil.mil/suite/page/13648 9

Assurance Levels A Combat Support Agency Red Banned Yellow Acceptable Green Best Practice Orange Controlled (DSAWG Approved) o Operational Need o System by System basis 10

2009 Accomplishments A Combat Support Agency Provided greater clarity of PPSM policy and technical guidance Redesigned the analysis criteria Developed and published the Exception Management Process PPSM training module -- DISN Data Services Training Manual. Introduced a new Assurance Category & Exception Process Awarded DISA Non-Technical Program/Project of the Year 11

Future Outlook A Combat Support Agency Link the PPSM (Registry) database with other repositories Incorporating Air Force PPSM database Compliance validation and configuration management toolsets Differentiating between Classified and Unclassified environments Ability to access the PPSM Registry on the low side (NIPRNet) 12

PPSM Committed to Protecting Data End-to to-end Questions? 13

Back ups 15

Stakeholders Who depends on PPSM? DoD Non-DoD Agencies PAAs (Principal Accrediting Authorities) DAAs (Designated Accrediting Authorities) DSAWG JTF-GNO -- Network Operations/Enforcement FSO STIGS and Audits DISA CIO -- Certification & Accreditation authority Development Program Managers Acquisition Program Managers Firewall Administrators Commercial Vendors 16

What is a DoD Information System? DoD Information System Set of information resources organized for the collection, storage, processing, maintenance, use, sharing, dissemination, disposition, display, or transmission of information. Includes AIS applications, enclaves, outsourced IT-based processes, and platform IT interconnections. 17

What does a DOD IS Look Like? 18

Assurance Level Changes A Combat Support Agency Old N E W!!! Green (High assurance) Considered best security practices and recommended for use when implemented with the required mitigation strategy and approved for a specific DoD information system. Yellow (Medium assurance) acceptable for routine use only when implemented with the required mitigation strategy and approved for a specific DoD information system. Red (Low assurance) Unacceptable vulnerability for routine use. Only be allowed when approved by for a specific DoD information system under defined conditions and restrictions and if no suitable alternative exists. Green (Best Practice) Recommended as best security practices Technical vulnerability acceptable with minimal mitigations Advocated for use in new systems Yellow (Acceptable) Technical vulnerability can be acceptably mitigated Orange (Controlled) Technical vulnerability cannot be mitigated to an acceptable level Legacy usage only - based on operational need Not for use in the Acquisition and Development of new systems Red (Banned) Prohibited No Exceptions! Technical vulnerability cannot be mitigated Malware Protocols and Services with no Life Cycle Support Or, 3rd Party Maintenance Support 19

Exception Package A Combat Support Agency Operational Need Ports, Protocols, Services, and IP Addresses Includes hosts, IP address ranges, and subnets Executive DIACAP package includes: System Identification Profile (SIP) DIACAP Implementation Plan (DIP) System Accreditation Decision POA&M 20