Operationally Focused CYBER Training Framework



Similar documents
Joint Information Environment Single Security Architecture (JIE SSA)

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

DoD IA Training Products, Tools Integration, and Operationalization

National Initiative for Cybersecurity Education

NICE and Framework Overview

National Initiative for Cyber Security Education

CHAPTER 20 CRYPTOLOGIC TECHNICIAN (CT) NAVPERS K CH-63

Department of Defense DIRECTIVE

Cyber Workforce Training

Introduction to NICE Cybersecurity Workforce Framework

State of Cyber Workforce Development

Big Data Platform (BDP) and Cyber Situational Awareness Analytic Capabilities (CSAAC)

AGENDA. CNDSP Program CNDSP is a Team Sport. Protect Respond CNDSP Contacts Questions

THE NATIONAL CYBERSECURITY WORKFORCE FRAMEWORK. USER GUIDE Employers

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide

NICE Cybersecurity Workforce Framework Tutorial

Improvements Needed With Host-Based Intrusion Detection Systems

workforce operate and maintain protect and defend securely provision support investigate analyze operate and collect CYBERSECURITY framework

National Initiative for Cybersecurity Education

SECURE POWER SYSTEMS PROFESSIONALS (SPSP) PROJECT PHASE 3, FINAL REPORT: RECRUITING, SELECTING, AND DEVELOPING SECURE POWER SYSTEMS PROFESSIONALS

Access FedVTE online at: fedvte.usalearning.gov

The National Cybersecurity Workforce Framework Delaware Cyber Security Workshop September 29, 2015

UNCLASSIFIED. Trademark Information

Mark S. Orndorff Director, Mission Assurance and NetOps

Cyber Education triangle clarifying the fog of cyber security through targeted training

The Comprehensive National Cybersecurity Initiative

Director, IT Security District Office Kern Community College District JOB DESCRIPTION

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Ray A. Letteer, CISSP, NSA-IAM, ITIL Director, IA Division; USMC SIAO; MCEN DAA Headquarters, US Marine Corps, C4IA

DOD Information Assurance Training & Awareness Products To order our products, please go to the following website:

Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace

Cyber Situational Awareness - Big Data Solution

McAfee Security Architectures for the Public Sector

An Overview of Large US Military Cybersecurity Organizations

Subj: CYBERSPACE/INFORMATION TECHNOLOGY WORKFORCE CONTINUOUS LEARNING

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Middle Class Economics: Cybersecurity Updated August 7, 2015

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

Department of Homeland Security

Forecast to Industry 2015

BlacKnight. Cyber Security international A BUSINESS / MARKETING PRESENTATION

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Space Ground Services in the Joint Information Environment (JIE)

Department of Defense DIRECTIVE

The STAGEnet Security Model

Ports, Protocols, and Services Management (PPSM)

A Comprehensive Cyber Compliance Model for Tactical Systems

Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

Department of Defense Cyberspace Workforce Strategy. December 4, Approved for public release: distribution unlimited.

Department of Defense INSTRUCTION. SUBJECT: Communications Security (COMSEC) Monitoring and Information Assurance (IA) Readiness Testing

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Enterprise Security Tactical Plan

Combating Spear-phishing:

Independent Security Operations Oversight and Assessment. Captain Timothy Holland PM NGEN

Information Assurance Workforce (IAWF) Contracting Officer Representative (COR) & Project Manager (PM) Workshop

Department of Defense INSTRUCTION

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

A Combat Support Agency

State of Minnesota. Enterprise Security Strategic Plan. Fiscal Years

How To Manage Security On A Networked Computer System

Information Security Workforce Development Matrix Initiative. FISSEA 23 rd Annual Conference March 23, 2010

CYBER SECURITY TRAINING SAFE AND SECURE

An Accelerated Pathway to Careers in Cybersecurity for Transitioning Veterans. NICE Annual Conference November 2015

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

FEDERAL RÉSUMÉ. Client Name PROFILE SUMMARY

DoD Strategy for Defending Networks, Systems, and Data

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

CyberNEXS Global Services

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

RECRUITMENT PROCEDURES FOR CYBER SECURITY POSITIONS UNDER SCHEDULE A AUTHORITY

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

SELECTING THE RIGHT HOST INTRUSION PREVENTION SYSTEM:

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Department of Defense MANUAL

DoD Directive (DoDD) 8570 & GIAC Certification

The SIEM Evaluator s Guide

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce

DISA's Application Security and Development STIG: How OWASP Can Help You. AppSec DC November 12, The OWASP Foundation

Priority III: A National Cyberspace Security Awareness and Training Program

Raytheon Oakley Systems

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

AUDIT REPORT WEB PORTAL SECURITY REVIEW FEBRUARY R. D. MacLEAN CITY AUDITOR

How To Manage Sourcefire From A Command Console

Understanding the Federal IT Security Professional (FITSP) Certification

DoD Cloud Computing Strategy Needs Implementation Plan and Detailed Waiver Process

How To Protect A Network From Attack From A Hacker (Hbss)

Transcription:

Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012

Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation plan Documentation & Product Development Examples Related DoD Initiatives Way Ahead 2

Vision Establish a robust workforce training and certification program that will better prepare DoD cyber warriors to operate and defend our networks in an increasingly threat-based environment 3

One Standard Whether we do our cyber training at one school or at multiple schools, the training will have to be executed to one standard. I think that s what we need to do so that the combatant commanders and the forces in the field know that whether they get a soldier, marine, airman or sailor, that person is trained to a standard and can accomplish the mission that is expected of them. - GEN Keith Alexander 4

Basic Tenets Provide a Training Strategy Roadmap for Role-Based & Crew Certification Commercial certifications broader than what is often needed DISA can produce focused, relevant qualifications and certifications for our Cyber warriors Crew certification is a grouping of qualified Role-Based operators who obtain the desired effects necessary to defend and operate in cyberspace A Cyber Defense Academy will qualify role-based individuals to work effectively as part of crews and teams Joint Cyberspace Training & Certification Standard (JCT&CS) is the current baseline for work role definition National Initiative for Cybersecurity Education (NICE) will be baseline for Federal and DoD work role definitions 5

Role-Based Educational/Assessment Implementation Plan 6

CYBER Roles Combat Element Server Administrator Systems Security Analyst Network Operations Manager CND Incident Responder Cyber Security/ IS Professional CND Manager Interactive Operator Production Operator Close Access Network Operator Joint Cyberspace Training and Technical Support Specialist Systems Test & Eval Specialist Knowledge Manager Data Administer System Requirements Plan Technical Support Specialist CND Auditor Assessment Analyst Network Warfare Cyber Planner Legal Advisor/ SJA Certification Standards Combat Support Systems Developer Software Engineer Systems Architect IA Compliance Agent Net Infrastructure Spec Systems Developer Test & Eval Engineer Partner Ops Planner R&D Engineer Cyber Policy & Strategy Planner I & W Analyst CND Analyst Intel Analyst CND Forensic Analyst Endpoint Exploit Analyst Cryptographic Cyber Planner BDA Analyst Forensic Analyst Operational Target Dev Analyst Digital Network Exploit Analyst Target Digital Network Analyst Target Analyst Reporter Administration Logistic Finance Joint Training Requiremts Procedures & Guidelines Individual, staff and collective tasks 3 Lines of Operations DGO DCO OCO Each Work Role Associated Tasks Requisite Knowledge Skill Abilities Proficiency Levels Entry Intermediate Advance Training Products Role Based TTPS 7

National Initiative for Cybersecurity Education (NICE) Federal Gov t effort Overarching Framework Taxonomy Lexicon Focused on Awareness Education Training Professional Development Population Information Technology Information Assurance Computer Science Structure 7 High Level Categories 31 Specialty Areas/Roles Knowledge Skills Abilities End Result Better trained & equipped workforce with the cyber skills required for a position 8

Cyber Security Training Relationships Roles to Roles Roles to Tools Tools to Tools Notional Network Diagram 9

Documentation and Product Development 10

Training Matrix Roles require tools and function training at various levels depending on mission need Roles will need training on how to interface with other Roles and how their tools interface with other tools and roles Tools and Functions (Tn) training focused on Roles to tools Tools to tools Roles to roles T1 T1 T1 IA Audit Agent Server Admin CND Analyst Global Admin/Management T2 T3 T4 T5 T Tx T2 T3 T4 T5 T Tx T2 T3 T4 T5 T Tx 11

Crosswalk KSAs to Training Module KSA Role 24 - CND 138 KSAs containing 19 matches 24 - CND-A 21 - SA 14 - NO 23 - DBA 31 - SWE 22.83 Average (U) Ability to conduct vulnerability scans and recognize vulnerabilities in security systems. 6 of 9 Targeted Roles Training Module Steps Complete TTP Identify training objectives Conduct vulnerability scans Recognize vulnerability Build Storyboards/content Instructional design Graphics Programming Test final product Objective? Post/link to TTP on IASE 12

Training Product Delivery Raw Content Development Delivery Assessment Tactics Techniques Procedures Vendor Delivered Course Training Operation Orders/ Policies INPUTS DoD focused Operational Focused Capability Specific Capability Specific Orders Threat TTPs Cyber Training Coordinators Roles Tools Cyber Course Developers TTPs (Entry Intermediate-Advance) Cyber Trainers/Instructors Trainers Trainers Classroom Training rooms Local Training Area VTE AGILE FedVTE.gov CBT/WBT Web Based Computer Based Collaborative DCO/VTC Cyber Range 1. Observations 2. Interviews 3. Surveys 4. Tests 5. Live Fire Exercises 6. Unit Level Exercises for Crew Certifications Commercial Training Delivery DoDize/Operationalize Training Effective Training Delivery Training Evaluation/Course Follow up 13

Role-based Curriculum Home Page Training Resources For Assigned Role 14

Examples 15

Example Tactics, Techniques FRAGO 13 TTP for HBSS and Procedures (TTPs) - Marriage of HBSS Capabilities to IAM/O Responsibilities - Ensure Compliance with Info System Security Policies and Procedures - Monitor and Audit Information Systems - Report information System Security Violations and Intrusions - Establish Information System Configuration Management Procedures 16

FRAGO 13 For HBSS IAM/O Roles and Responsibilities Taken from IAO Duty Appointment document: a. Develop and Issue Security Procedures Governing Information Systems Operations b. Ensure Compliance with Information System Security Policies and Procedures c. Monitor and Audit Information Systems d. Report information System Security Violations and Intrusions e. Establish Information System Configuration Management Procedures f. Ensure Education, Training, and Awareness Program is operational Act as bridge between IA personnel and IA mandates (external/internal) Provide oversight to IA personnel and system administrators in technical security tool policy creation 17

FRAGO 13 for HBSS TTP Asset Awareness Deployment of HBSS components and Point Products to current HBSS Baseline. Begin Tuning process and enable configuration of reporting capabilities. Target workstations and servers. Enable SIM reporting. Minimum Protection Builds on Asset Awareness, continue Tuning process, Block High and Log Medium severity IPS signatures. Protected Site Builds on Minimum Protection, continue Tuning process, Block High, Block Medium, and Log Low severity IPS signatures. Enable Application Monitoring in a adaptive mode, Enable host-based Firewall in adaptive mode. Secure Site Builds on Protected Site, continue Tuning process, Block High, Block Medium, and Block Low severity IPS signatures. Enforce Application Blocking, enforce Firewall policy to include a Connection Aware Group (CAG). 18

Example CCRI Reviewer Certification Reviewer Certification Program (RCP) Program goals: Increase the number of Command Cyber Readiness Inspections (CCRIs) -- thus increasing inspection footprint on the DISN Improve overall technical knowledge of agency and service personnel and maintain their skill sets Increase job satisfaction and obtain operational awareness Supports USCYBERCOM requirement for services to conduct CCRIs 19

RCP Training Process Application & Approval Interested candidate reviews program requirements and applies for program DISA FSO reviews candidate qualifications and approves entry Training Candidates complete applicable training, including CBTs, classroom training, and training trips (OJT and Checkride) Certification & Accreditation FSO certifies candidates upon successful completion of all training requirements and recommends candidates for accreditation by USCYBERCOM Recertification Reviewers are required to maintain certification through refresher training courses 20

Related DoD Initiatives DoD 8140 workforce requirements initiative Learning Management System selection by OSD P&R JCT & CS CONOPs and Implementation Plan DHS and NSA Centers for Academic Excellence Associate Director for Education and Training DISA Cyber Workforce Developments 21

Focus on delivery of Operationalizing DISA delivered Cyber Tool Suites that support Role & Crew qualifications Entry to Advance level use of tool Entry to Advance level use for a Role(s) Integration to other tools and Roles Prioritize the effort Provide Tactics, Techniques, Procedures (TTPs) template and repository Move forward on the development of the foundation for a DoD Cyber Defense University Academy Cyber Role-Based training & assessments products, and qualification standards Coordinate with other education leaders Coordinate with operations leads Way Ahead 22

Way Ahead Develop procedure roadmaps for roles Observe, describe and document role Map training to knowledge, skills and abilities (KSAs) Map KSAs to training for creating Individual Development Plans (IDPs) Review current 8570 approved certifications and make recommendations on objectives for creation of new DoD Role- Based certification Education Testing Experience Continuing education 23

Resource Information Information Assurance Support Environment (IASE) iase.disa.mil Training Framework Working Group!FSOTrainingFramew@disa.mil Reviewer Certification Program E-mails address: FSO_RCP_Coordinator@disa.mil URL: https://www.us.army.mil/suite/page/643689 (must request access) TTP location SIPR URL: cybercom.smil.mil (look for tools on right side of screen) IA Symposium, Nashville, 27-30 Aug 12 24

Questions 25