CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922.



Similar documents
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

Cybersecurity Throughout DoD Acquisition

Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

1 July 2015 Version 1.0

AF Life Cycle Management Center

Cybersecurity in Test & Evaluation. James S. Wells Deputy Director, Cyberspace & HSE Programs Office of Test & Evaluation

WORKFORCE COMPOSITION CPR. Verification and Validation Summit 2010

RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED

DoD Software Assurance (SwA) Overview

Interim DoDI The Cliff Notes Version --

NICE and Framework Overview

System Security Engineering

Update: OSD Systems Engineering Revitalization Efforts

National Initiative for Cyber Security Education

How To Become A Senior Contracting Official

Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield

Implementing Program Protection and Cybersecurity

Building Security In:

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

FOUNDATION: Material Solution Analysis Is More Than Selecting an Alternative

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

SYSTEMS SECURITY ENGINEERING

Department of Defense INSTRUCTION

NDIA Manufacturing Council: DoD Systems Engineering / Manufacturing Update

THE drop cap white spread is the chartacter style to use for the drop cap. Use this masater

FREQUENTLY ASKED QUESTIONS

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 16 R-1 Line #145

Department of Defense INSTRUCTION

Systems Engineering and Integration Efforts. 11 Dec 2013

DoD CIO s 10-Point Plan for IT Modernization. Ms. Teri Takai DoD CIO

International Acquisition Career Path

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Cybersecurity: Mission integration to protect your assets

Security Risk Management For Health IT Systems and Networks

Policy on Information Assurance Risk Management for National Security Systems

How To Write A Cybersecurity Framework

TABLE OF CONTENTS. Chapter 1: EXECUTIVE SUMMARY... 1

New Acquisition Policy Changes for Systems Engineering

DoD Strategy for Defending Networks, Systems, and Data

PM/PMO Knowledge and Tools from DAU through the AT&L Knowledge Management System

Department of Defense INSTRUCTION

Proposed Cybersecurity T&E Process

Achieving True Risk Reduction through Effective Risk Management

Managing Security Risk In a World of Complex Systems and IT Infrastructures

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

Preventing and Defending Against Cyber Attacks October 2011

Cybersecurity Training in OT&E for DOT&E Action Officers

Defense Healthcare Management Systems

THE UNDER SECRETARY OF DEFENSE DEFENSE PENTAGON WASHINGTON, DC

Preventing and Defending Against Cyber Attacks June 2011

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

DOD Medical Device Cybersecurity Considerations

Re-Issuance of DOD Instruction

Software Engineering Framing DoD s Issues

Early Development Planning Leads to Affordable Systems. NDIA 14 th Annual Systems Engineering Conference Track 4 Early Systems Engineering

Preventing and Defending Against Cyber Attacks November 2010

Improving Cybersecurity and Resilience through Acquisition [DRAFT] IMPLEMENTATION PLAN

Rising to the Challenge

ICBA Summary of FFIEC Cybersecurity Assessment Tool

Department of Defense INSTRUCTION

Department of Defense INSTRUCTION

How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives

Cybersecurity. Cybersecurity 331

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition

Trusted Systems and Networks (TSN) Analysis

Critical Infrastructure Cybersecurity Framework. Overview and Status. Executive Order Improving Critical Infrastructure Cybersecurity

Guidelines for Cybersecurity DT&E v1.0

Remarks for Admiral David Simpson WTA Advocates for Rural Broadband Spring Meeting Cybersecurity Panel

Obtaining Enterprise Cybersituational

U.S. Defense Priorities OSD PA&E

How To Write A National Cybersecurity Act

The Comprehensive National Cybersecurity Initiative

Information Security Risk and Compliance Series Risking Your Business

Middle Class Economics: Cybersecurity Updated August 7, 2015

Click to edit Master title style

Introduction to NICE Cybersecurity Workforce Framework

Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent

Big Data, Big Risk, Big Rewards. Hussein Syed

System Security Engineering and Comprehensive Program Protection

September 10, Dear Administrator Scott:

Department of Defense NetOps Strategic Vision

Department of Defense DIRECTIVE

An Overview of Large US Military Cybersecurity Organizations

Cloud Security for Federal Agencies

APPENDIX J INFORMATION TECHNOLOGY MANAGEMENT GOALS

CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

Department of Defense INSTRUCTION

Cyber Security for Advanced Manufacturing Next Steps

Cybersecurity Delivering Confidence in the Cyber Domain

Joint Interoperability Certification

SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Statement. Mr. Paul A. Brinkley Deputy Under Secretary of Defense for Business Transformation. Before

SCADA Security Training

OPERATING AND SUPPORT COST-ESTIMATING GUIDE

Transcription:

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS 1 Steve Mills Professor of Information Technology Steve.mills@dau.mil 256.922.8761

Overview Cybersecurity Policy Overview Questions Challenge #1 - Cybersecurity Owners and Stakeholders Challenge #2 - Cybersecurity Performance of DoD Programs Challenge #3 - Integrating Cybersecurity into the DoD Acquisition Lifecycle Recommendations Final Thoughts How DAU Can Help 2

3 Cybersecurity Policy Overview

DoDI 8500.01 Cybersecurity Signed Mar 14, 2014 Adopts the term Cybersecurity in lieu of Information Assurance Extends applicability to all DoD information technology processing DoD information Emphasizes operational resilience, integration, and interoperability Leverages and builds upon numerous existing Federal policies and standards so we have less DoD policy to write and maintain Adopts common Federal Cybersecurity terminology so we are all speaking the same language Transitions to the NIST SP 800-53 Security Control Catalog Incorporates Cybersecurity early and continuously throughout the acquisition lifecycle 4

DoDI 8510.01 Risk Management Framework (RMF) for DoD IT Signed Mar 12, 2014 New approach for DoD to manage Cybersecurity risk RMF adds another dimension to the DoD Risk Management Process A 6 step process that emphasizes continuous monitoring and timely correction of deficiencies Adopts NIST s Risk Management Framework, used by Civil and Intelligence communities Moves from a checklist-driven process to a risk based approach Embeds the RMF steps/activities in the DoD Acquisition Lifecycle Promotes DT&E and OT&E integration Implements Cybersecurity via security controls vice numerous policies and memos Supports and encourages use of automated tools 5

Cybersecurity & DoDI 5000.02 Cybersecurity: Prevention of damage, protection of, and restoration of computers, electronic communications systems, wire communication, and electronic communication, including information contained therein DoDI 8500.01 Required by DoDI 5000.02 Enclosure 11, Section 6. Cybersecurity All acquisitions of systems containing IT will have a Cybersecurity Strategy. Beginning at Milestone A, the PM will submit the Cybersecurity Strategy STATUTORY for all programs containing IT, including NSS. Also cited in DODI 5000.02 - Table 9. Clinger-Cohen Act Ensure that the program has a Cybersecurity Strategy that is consistent with DoD policies, standards and architectures 6 Cybersecurity = All DoD IT is included. Not just the network! Cybersecurity effort spans the entire acquisition process A team sport with impacts to all Acquisition Career Fields

Cybersecurity in Acquisition Research Efforts Defense Science Board (DSB) Task Force Report: Resilient Military Systems and the Advanced Cyber Threat. (January 2013) Ongoing DSB Studies on Cybersecurity: DSB Task Force on Cyber Defense (Oct 09, 2014) DSB Task Force on Cyber Deterrence (Oct 09, 2014) DSB Task Force on Cyber Supply Chain (Nov 12, 2014) Sponsor of ongoing studies is Mr. Frank Kendall, USD AT&L 7

Questions Who in the acquisition workforce needs to be involved in addressing the Cyber threat? How vulnerable and resilient are DoD systems against the Cyber threat? How well is Cybersecurity integrated into the DoD Acquisition Lifecycle? 8

9 Challenge #1 Cybersecurity Stakeholders

Cybersecurity Stakeholders J2 - Intel It s Hacking! It s Network Defense! J3 - Ops PM SE J6 CIO Cybersecurity is Operational! It s Electronic Warfare! Cybersecurity It s Program Protection! IT T&E LOG CON 10

11 Challenge #2 Cybersecurity Performance of DoD Programs

Defense Science Board CyberSecurity Observations Current DoD actions, though numerous are fragmented. Thus DoD is not prepared to defend against this threat. DoD Red Teams, using cyber attack tools which can be downloaded from the internet, are very successful at defeating our systems With present capabilities and technology it is not possible to defend with confidence against the most sophisticated cyber attacks. It will take years for the Department to build an effective response to the cyber threat. 12 Source: DoD Defense Science Board Task Force Report: Resilient Military Systems and the Advanced Cyber Threat. (January 2013)

DOT&E FY 2014 Annual Report Cyber adversaries have become as serious a threat to U.S. military forces as the air, land, sea and undersea threats represented in operational testing for decades" Program managers worked to resolve vulnerabilities found from cybersecurity testing in prior years, but FY-14 testing revealed new vulnerabilities. Cyber Opposition Forces (OPFOR) portraying adversaries with beginner or intermediate cyber capabilities were able to demonstrate that many DOD missions are currently at risk from cyber adversaries Demand has begun to exceed the capacity of existing personnel able to portray cyber threats. 2 years later Things are not getting better!! 13 Source: DOT&E FY 2014 Annual Report (January 2015)

14 Challenge #3 Integrating Cybersecurity into the DoD Acquisition Lifecycle

Cybersecurity in the DoD Acquisition Lifecycle Model 1: Hardware Intensive Program A B C IOC Materiel Solution Analysis Materiel Development Decision Technology Maturation & Risk Reduction. CDD-V DRFPRD Engineering & Manufacturing Development LRIP FRP Decision Sustainment Operations & Support ICD Draft CDD CDD PDR CDR CPD Production & Deployment FOC Disposal JCIDS Process Defense Acquisition System/JCIDS Process Warfighter/End User 15 To achieve positive acquisition outcomes, we must consistently bake in Cybersecurity into our acquisition programs

Measuring Cybersecurity How should Cybersecurity be Measured? Common Vulnerabilities and Exposures (CVE) approach? Operational Resilience approach? How can we bake in Cybersecurity into our DoD systems without a standard way to measure it? Linkage exists between measurement and the SE process What are the C/S/P impacts of Cybersecurity on our DoD systems? Many PMs consider Cybersecurity an unfunded requirement How important is Cybersecurity to the key stakeholders who have numerous priorities? 16

Integrating Cybersecurity across the Acquisition Lifecycle A B C IOC ICD Materiel Solution Analysis Materiel Development Decision Draft CDD Technology Maturation & Risk Reduction. CDD-V CDD DRFPRD Engineering & Manufacturing Development LRIP CPD FRP Decision Production & Deployment Sustainment FOC Operations & Support Disposal Develop Cybersecurity Strategy (CS) Establish Cybersecurity Working IPT (WIPT) RMF STEPS 1. Categorize System 2. Select Controls 3. Implement Controls 4. Assess Controls 5. Authorize System 6. Monitor System 1 Categorize System 2 Select Security Controls Influence Design/RFP 3 Implement Security Controls 4 Access Security Controls Monitoring Strategy 5 Request Authority to Operate / Authorize 6 Effective Cybersecurity in DoD acquisition programs encompasses all of the actions taken to ensure the Confidentiality, Integrity and Availability (CIA) of the system PMs should integrate cybersecurity into the system s acquisition lifecycle activities, e.g., SEP, TEMP, PPP, Cybersecurity Strategy and Source Selection processes 17 Cybersecurity Shift Left approach will yield better acquisition outcomes

Recommendations DoD needs to develop an accurate way to measure Cybersecurity Cybersecurity KPP? Cybersecurity should treated as a design consideration and recognized as a key component of the System engineering effort Cybersecurity must be integrated into the Acquisition Strategy, SEP, TEMP, and LCSP May require some type of forcing function to ensure compliance A Cybersecurity Champion is needed to effectively synchronize Cybersecurity efforts across the acquisition lifecycle of DoD programs AMRDEC Cyber Integrator Pilot Program Product Support Manager approach 18

Cybersecurity Final Thoughts Cybersecurity is not just the network. It is part of the DNA of an acquisition program Cybersecurity threats cannot be totally mitigated. You must manage the risk Your Cybersecurity effort must be synchronized across your acquisition program (PPP, Cybersecurity Strategy, Security Plan, TEMP & SEP) The PM must work the people side Reward and encourage your Cybersecurity heroes! Industry Partners are a critical component of your Cybersecurity efforts. They design and build our products! Communicate across systems and functional boundaries. Cybersecurity requires everyone s energy and expertise Take every opportunity to educate and train your team Cybersecurity is a moving target 19

How DAU Can Help DAU Cybersecurity Courses DAU Course offerings and availability dates: o Cybersecurity Throughout DoD Acquisition (CLE 074) o Covers Cybersecurity across acquisition career fields. Available CY15 o Risk Management Framework (RMF) Implementers Course (ISA220) - Available CY16 o Cybersecurity content being incorporated into all career fields 20

How DAU Can Help (cont.) Contact DAU directly for : Content Consulting/Tailored Assistance Targeted Training such as: Seminar Cybersecurity Challenges for DoD PMs Seminar Risk Management Framework (RMF) Seminar Cybersecurity Testing in DoD Acquisition DAU POCs for Cybersecurity Outreach and Mission Assistance: Steve Mills (256) 922-8761 Tim Denman (256) 922-8174 21