Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN



Similar documents
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Looking at the SANS 20 Critical Security Controls

Critical Controls for Cyber Security.

The Future Is SECURITY THAT MAKES A DIFFERENCE. Overview of the 20 Critical Controls. Dr. Eric Cole

The Protection Mission a constant endeavor

Building a More Secure and Prosperous Texas through Expanded Cybersecurity

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

POSTAL REGULATORY COMMISSION

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

THE TOP 4 CONTROLS.

Jumpstarting Your Security Awareness Program

Defending Against Data Beaches: Internal Controls for Cybersecurity

raytek, Inc. Background Information and Capabilities

SANS Top 20 Critical Controls for Effective Cyber Defense

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

FedRAMP Standard Contract Language

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense

Office of Inspector General

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

University of Pittsburgh Security Assessment Questionnaire (v1.5)

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

Information Technology Risk Management

White Paper: Consensus Audit Guidelines and Symantec RAS

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Audit Report. Management of Naval Reactors' Cyber Security Program

CHAPTER 67 INFORMATION SYSTEMS TECHNICIAN (IT) NAVPERS H CH-63

Supplier Security Assessment Questionnaire

Check Point and Security Best Practices. December 2013 Presented by David Rawle

OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

VA Office of Inspector General

ADDENDUM #1 REQUEST FOR PROPOSALS

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Office of Inspector General

RFP No C017 OFFICE OF TECHNOLOGY INFORMATION SYSTEMS AND INFRASTRUCTURE PENETRATION TEST

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Security Management. Keeping the IT Security Administrator Busy

SENIOR SYSTEMS ANALYST

Report of Evaluation OFFICE OF INSPECTOR GENERAL. OIG 2014 Evaluation of the Farm Credit OIG 2014 Administration s. Management Act.

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Information Blue Valley Schools FEBRUARY 2015

Chief Review Services REVIEW OF DND/CF INFORMATION SECURITY. October (CRS) Canada

Client Security Risk Assessment Questionnaire

Data Consolidation and Application Optimization (DCAO) Organization

STATE OF NEW JERSEY Security Controls Assessment Checklist

In Brief. Smithsonian Institution Office of the Inspector General

Corporate Overview. MindPoint Group, LLC 8078 Edinburgh Drive, Springfield, VA Office: Fax:

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

AUDIT REPORT. Cybersecurity Controls Over a Major National Nuclear Security Administration Information System

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Information Technology Control Framework in the Federal Government Considerations for an Audit Strategy

TREASURY INSPECTOR GENERAL FOR TAX ADMINISTRATION

IT Networking and Security

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]

Final Audit Report -- CAUTION --

MONITORING AND VULNERABILITY MANAGEMENT PCI COMPLIANCE JUNE 2014

QUESTIONS & RESPONSES #2

Information Security Risk and Compliance Series Risking Your Business

GE Measurement & Control. Cyber Security for NEI 08-09

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

Security and Privacy Controls for Federal Information Systems and Organizations

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Publication 805-A Revision: Certification and Accreditation

Enterprise Information Technology Security Assessment RFP Answers to Questions

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

BPA Policy Cyber Security Program

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

UNCLASSIFIED (U) U.S. Department of State Foreign Affairs Manual Volume 5 Information Management 5 FAM 870 NETWORKS

NERC CIP VERSION 5 COMPLIANCE

INFORMATION TECHNOLOGY ENGINEER V

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

Security in Space: Intelsat Information Assurance

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Office of Inspector General

REQUEST FOR PROPOSAL INFORMATION SECURITY PROGRAM PROVIDER

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

Cyber-Security Assessment, Remediation, and Identity Protection, Monitoring, and Restoration Services

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

Assessing the Effectiveness of a Cybersecurity Program

Department of Management Services. Request for Information

Security Control Standard

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

Cybersecurity Health Check At A Glance

Briefing Report: Improvements Needed in EPA s Information Security Program

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Security Controls in Service Management

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION

Transcription:

Independent Security Operations Oversight and Assessment Captain Timothy Holland PM NGEN 23 June 2010

Independent Security Operations Oversight and Assessment Will Jordan NGEN Cyber Security 23 June 2010

Overview The Independent Security Operations Oversight and Assessment contract provides for: NGEN is a designated National Security System 3

Purpose ISOO&A is a capability to independently assess the security posture of the Naval Networking Environment (NNE) Will allow for independent third-party assessment Provides for frequent, comprehensive security assessments and independent oversight at the network operational nodes within the enterprise ISOO&A supports the need to lead/pace information assurance threats NGEN is a designated National Security System 4

Accomplishments Request For Information Released to Industry May 17, 2009 Responses to questions and comments were provided Performance Work Statement (draft) Released to Industry for review/comment February 1, 2010 Comments received from Industry have been reviewed and incorporated NGEN is a designated National Security System 5

Security Controls Current and past federal CIOs and CISOs have agreed that a prioritized baseline of information security measures and controls should be established that can be continuously monitored. The initial 20 controls are published at http://www.sans.org/critical-security-controls/guidelines.php Two (2) critical IA controls withdrawn for being beyond the scope of ISOO&A Application Software Security Data Loss Prevention The following critical IA controls within the scope of ISOO&A are as follows: Penetration Testing Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Software Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers Secure Configurations for Network Devices such as Firewalls, Routers, and Switches Boundary Defense NGEN is a designated National Security System 6

Security Controls (cont) Maintenance, Monitoring, and Analysis of Security Audit Logs Controlled Use of Administrative Privileges Controlled Access Based on Need to Know Continuous Vulnerability Assessment and Remediation Account Monitoring and Control Malware Defenses Limitation and Control of Network Ports, Protocols, and Services Wireless Device Control Secure Network Engineering Incident Response Capability Data Restoration Security Skills Assessment and Appropriate Training NGEN is a designated National Security System 7

Additional Security Controls Nine (9) Additional IA Controls (NGEN-Centric) Command and Control (C2) Tools and Processes Personally Identifiable Information (PII) Privacy and Security Safeguards/Security Architecture Media Protection Supply Chain Protection Legacy Networks Security Physical and Environmental Protection Contingency, Continuity of Operations, and Disaster Recovery Identity Management NGEN is a designated National Security System 8

Performance Work Statement Scope DON Classified and Unclassified Networks 5 primary sites 51 secondary sites Requirements Knowledge and Skills per DoD 8570.1 Minimum Secret clearance required Contractor Representative within 25 miles of Washington Navy Yard Services performed in 4 areas Scheduling Planning Testing/Auditing Reporting 5 contract Data Requirements List (CDRL) items Test/Audit Plan Standard Report Exception Report Monthly Summary Report Annual Project Report NGEN is a designated National Security System 9

Testing Locations The ISOO&A Contractor will be expected to travel to the 5 primary test/audit sites each year, for a total of 10 trips Secondary site visits may be required as directed by the government Five Primary Testing Locations Naval Station Norfolk, Norfolk, Virginia Naval Air Station North Island, San Diego, California Naval Station Ford Island, Pearl Harbor, Hawaii Naval Station Bremerton, Bremerton, Washington Naval Air Station Jacksonville, Jacksonville Florida NGEN is a designated National Security System 10

Scope of Testing Network Devices Switches Routers IP addressable network components Security Infrastructure Application/Services Servers Provides enterprise services to end users Storage Storage Area Network Servers Backup Storage Servers Applications (approved) NGEN is a designated National Security System 11

Contract Items of Interest Small Business Set Aside SeaPort-e RFP anticipated release Aug 2010 To ensure independence, any company that serves as the ISOO&A prime contractor or as a sub to the prime contractor will be ineligible to compete for any other NGEN contract (i.e. as either a prime or subcontractor) Government Furnished Information and Property Information will be provided to the successful contractor NGEN is a designated National Security System 12

Contract Items of Interest Evaluation Criteria Technical Approach Notional Scenario will be provided for developing a test plan as part of the technical evaluation criteria as vendors respond to the solicitation Past Performance Successful individualized or team-associated past experience on an Enterprise-wide network as documented in the Contractor Performance Assessment Reporting System (CPARS), past relevant experience, and additional references as requested Staffing Demonstrated ability to respond to surge or changing requirements Cost NGEN is a designated National Security System 13

NGEN Way Ahead ISOO&A Support contract is expected to be the first competition and award in NGEN Increment 1 Provides required independent security assessments on the NGEN Satisfies a need of the operational community Smooths the transition of network security management Monitor for ISOO&A RFP release NGEN is a designated National Security System 14

Questions and Answers Submit your questions to ngen_cybersecurity@bah.com NGEN Reference Library www.tinyurl.com/ngenreflibrary NGEN is a designated National Security System 15

Independent Security Operations Oversight and Assessment Captain Adam Coghan NGEN Cyber Security 23 June 2010

Q & As Question 1: What is the planned ISOO&A RFP release date? Answer: The RFP is expected to be released in the 4th quarter of fiscal year 2010. NGEN is a designated National Security System 17

Q & As Question 2: Will ISOO&A utilize the Defense Information Assurance Certification and Accreditation Process (DIACAP)? Answer: ISOO&A will provide Verification, Validation and Reporting (VV&R) but is separate from any Certification and Accreditation activities that may occur. NGEN is a designated National Security System 18

Q & As Question 3: Is there an incumbent on this opportunity? Answer: No, There is no incumbent to this opportunity. NGEN is a designated National Security System 19

Q & As Question 4: Will SIPRNET access and space be made available to create and transmit classified Exception Reports? Answer: Yes, the successful vendor will be provided access to the SIPRNET in order to create and transmit classified exception reports. NGEN is a designated National Security System 20

Q & As Question 5: Does the use of the word "continual" mean 24 hours per day, 7 days per week, 365 days per year? Answer: No, this is not meant to be 24/7, however, the word continual means that the contractor is to provide regular, periodic audits based on government approved Test or audit plans. NGEN is a designated National Security System 21

Q & As Question 6: Does the contractor have responsibility for uploading findings into a Navy or DoD Vulnerability Management System (such as the DoD VMS)? Answer: The ISOO&A contractor is not responsible for uploading any findings from associated test or audit into the Navy and/or DoD Vulnerability Management system. NGEN is a designated National Security System 22

Q & As Question 7: Is there a requirement to employ security audit or assessment tools approved by the Government (such as a scanning tool like Retina)? Answer: Yes, The ISOO&A vendor will only be allowed to utilize security audit or assessment tools provided by the Government. NGEN is a designated National Security System 23

Q & As Question 8: What current policy guidance will be used to develop the criteria to evaluate compliance for Supply Chain Management? Answer: The Committee on National Security Systems Instruction (CNSSI) 1253 or an equivalent follow on replacement technical guidance will be used to develop the criteria to evaluate compliance. NGEN is a designated National Security System 24

Q & As Question 9: Is the contractor responsible for developing a new Plan of Action & Milestones or will it tie into an existing POA&M? Answer: There is no POA&M requirement for this support contract. ISOOA is not part of the Certification and Accreditation process. NGEN is a designated National Security System 25

Q & As Question 10: How far in advance of the event will the government make the "list of approved devices and software" available to the contractor? Answer: Access to the list of approved devices and software will be made available to the successful contractor by the Government upon contract award. NGEN is a designated National Security System 26

Q & As Question 11: Is there an Organizational Conflict of Interest (OCI) associated with the ISOO&A contract that would preclude the winning contractor from bidding on other segments of NGEN? Answer: Yes. The ISOOA contractor and their subcontractors, if any, must function in a completely independent manner in the performance of the ISOOA contract. The ISOOA contractors cannot be placed in a position of evaluating their own products and/or services, therefore they will not be eligible, as a prime or subcontractor from doing any NGEN work other than ISOO&A. NGEN is a designated National Security System 27

Independent Security Operations Oversight and Assessment Cyber Security Industry Day 23 June 2010