Cybersecurity in Test & Evaluation. James S. Wells Deputy Director, Cyberspace & HSE Programs Office of Test & Evaluation



Similar documents
CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology

AF Life Cycle Management Center

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills DAU-South

1 July 2015 Version 1.0

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield

Proposed Cybersecurity T&E Process

Cybersecurity Throughout DoD Acquisition

How To Improve Federal Network Security

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

Department of Defense INSTRUCTION

UNITED STATES DEPARTMENT OF AGRICULTURE FOOD SAFETY AND INSPECTION SERVICE WASHINGTON, DC INFORMATION SYSTEM CERTIFICATION AND ACCREDITATION (C&A)

Independent Evaluation of NRC s Implementation of the Federal Information Security Modernization Act of 2014 for Fiscal Year 2015

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

United States Department of Agriculture. Office of Inspector General

Cybersecurity Training in OT&E for DOT&E Action Officers

Guidelines for Cybersecurity DT&E v1.0

RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED

How To Evaluate A Dod Cyber Red Team

Overview. FedRAMP CONOPS

Tim Denman Systems Engineering and Technology Dept Chair/ Cybersecurity Lead DAU South, Huntsville

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

AF Life Cycle Management Center

Information System Security Officer (ISSO) Guide

Information Security for Managers

Cybersecurity. Cybersecurity 331

Subj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE

Preventing and Defending Against Cyber Attacks November 2010

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Cloud Security. A Sales Guy Talks About DoD s Cautious Journey to the Public Cloud. Sean Curry Sales Executive, Aquilent

STATEMENT BY DAVID DEVRIES PRINCIPAL DEPUTY DEPARTMENT OF DEFENSE CHIEF INFORMATION OFFICER BEFORE THE

National Initiative for Cybersecurity Careers and Studies (NICCS) Cybersecurity Training and Education Catalog Training Provider Instruction Guide

Security Authorization Process Guide

How to use the National Cybersecurity Workforce Framework. Your Implementation Guide

National Initiative for Cyber Security Education

Test/Cyber Requirements and Capability Gaps Abstract

An Overview of Large US Military Cybersecurity Organizations

Audit of the Department of State Information Security Program

Actions and Recommendations (A/R) Summary

Department of Defense INSTRUCTION

Threat and Hazard Identification and Risk Assessment

Cyber Workforce Training

Achieving Cybersecurity Excellence Through Evolution of the Nation's Cyber Workforce

How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives

Cloud Security for Federal Agencies

Strategic Plan Network Optimization & Transport Services

Continuous Monitoring in a Risk Management Framework. US Census Bureau Oct 2012

Department of Homeland Security

Federal Risk and Authorization Management Program (FedRAMP)

NIST Cyber Security Activities

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

FREQUENTLY ASKED QUESTIONS

Start building a trusted environment now... (before it s too late) IT Decision Makers

NICE and Framework Overview

The U.S. Department of Education s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2014 FINAL AUDIT REPORT

Security Risk Management For Health IT Systems and Networks

ITU National Cybersecurity/CIIP Self-Assessment Toolkit. Background Information for National Pilot Tests

Security Control Standard

DEFENSE INFORMATION SYSTEMS AGENCY STRATEGIC PLAN UNITED IN SERVICE TO OUR NATION

National Cybersecurity Assessment and Technical Services: Capability Brief. Presented by: Sean McAfee Updated: May 5, 2014

Lessons from Defending Cyberspace

FEDERAL INFORMATION SECURITY. Mixed Progress in Implementing Program Components; Improved Metrics Needed to Measure Effectiveness

How To Write A Cybersecurity Framework

V & V of Enterprise Safety and Information Security

(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Supplemental Tool: Executing A Critical Infrastructure Risk Management Approach

CYBERSPACE SECURITY CONTINUUM

December 8, Security Authorization of Information Systems in Cloud Computing Environments

NICE Cybersecurity Workforce Framework Tutorial

Preventing and Defending Against Cyber Attacks June 2011

How To Make A National Security Agreement Between Dhs And Dod

National Cybersecurity Assessment and Technical Services

2014 Audit of the Board s Information Security Program

Department of Defense DIRECTIVE

Information Assurance Branch (IAB) Cybersecurity Best Practice for Executive Level Managers

DoD Strategy for Defending Networks, Systems, and Data

Introduction to NICE Cybersecurity Workforce Framework

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Review of the SEC s Systems Certification and Accreditation Process

Information System Security Officer (ISSO) Guide

Modeling and Simulation (M&S) for Homeland Security

THE UNDER SECRETARY OF DEFENSE DEFENSE PENTAGON WASHINGTON, DC

Managing Security and Privacy Risk in Healthcare Applications

NIST Cloud Computing Program Activities

Automate Risk Management Framework

UNCLASSIFIED/FOR OFFICIAL USE ONLY. Department of Homeland Security (DHS) Continuous Diagnostics & Mitigation (CDM) CDM Program Briefing

Transcription:

Cybersecurity in Test & Evaluation James S. Wells Deputy Director, Cyberspace & HSE Programs Office of Test & Evaluation

Problem Statement Insufficient T&E information regarding a system s cybersecurity posture is available to support major acquisition decisions. Networked information technology is a major component of most major DHS acquisition programs As a result, our adversaries have unprecedented access to our data and the ability to disrupt our operations Current T&E policies and practices do not adequately incorporate cybersecurity considerations in order to inform acquisition decisions 2

Current Parallel Processes Programs already plan and conduct cybersecurity activities IAW the Risk Management Framework HOWEVER Cybersecurity and T&E communities do not routinely coordinate and synchronize activities separate plans and separate reports to separate decision makers AND Operational T&E does not include realistic, threatrepresentative cyber attacks 3

Current Parallel Processes 0 1 2A 3 Need Analyze/ Select 2B Obtain 2C Produce/Deploy/Support Test & Evaluation Input to Operational Develop T&E Strategy Refine T&E Strategy Conduct Developmental T&E OTEP Conduct Operational T&E OTER OTER Risk Management Framework Categorize System Select Controls Implement Controls SAP Assess Controls SAR POAM SAR Authorize Operation POAM ATO Monitor Controls Systems Engineering Life Cycle SPR SER Solution Engineering Planning PPR SDR CDR IRR PRR OTRR ORR PIR PDR Definition Design Development Integration and Test Implementation Operations & Maintenance Disposal 4

Cybersecurity-Informed Acquisition Decisions Is there a sound plan to collect adequate cybersecurity data to inform future production & deployment decisions? Is the system sufficiently cyber secure to enter initial production/deployment? Is the system sufficiently cyber secure to enter full production/deployment? 0 1 2A 3 Need Analyze/ Select 2B Obtain 2C Produce/Deploy/Support Test & Evaluation Risk Management Framework Input to Operational Categorize System Develop T&E Strategy Define Cybersecurity Threats & Environment Identify Cybersecurity Select Controls Refine T&E Strategy Add Cybersecurity T&E Strategy to based on RMF Planning Implement Controls SAP Conduct Developmental T&E Improve Fidelity of Cybersecurity DT&E and Synchronization with RMF Assess Controls SAR POAM OTEP Authorize Operation Conduct Operational T&E SAR OTER Add Cybersecurity to OT&E POAM ATO OTER Monitor Controls Systems Engineering Life Cycle SPR SER Solution Engineering Planning PPR SDR CDR IRR PRR OTRR ORR PIR PDR Definition Design Development Integration and Test Implementation Operations & Maintenance Disposal 5

Draft DOT&E Policy Programs will include cybersecurity in s Threat description, evaluation framework, integrated T&E objectives & resources OTAs will include cybersecurity in test plans, test concept briefs, and evaluation reports Realistic threat portrayal to determine mission effects DOT&E will include cybersecurity in s Effectiveness, Suitability, Interoperability, & Cybersecurity 6

Current Activities Iterative coordination with DHS OCIO Initial discussions with Components & programs Inventorying possible cybersecurity T&E assets Coordinating with several programs as pilots Investigating process for program threat assessments with DHS I&A 7

Next Steps Coordinate and publish initial DOT&E cybersecurity policy memo Start integrating cybersecurity into s Start including cybersecurity in OT&E plans, reports, and DOT&E s Continue coordination with OCIO, DHS I&A, and Components Coordinate with Joint Council Continue discussion with red teams for possible recurring acquisition program support Continue coordination with pilot programs 8

9