New DoD Approaches on the Cyber Survivability of Weapon Systems
|
|
- Ambrose Bruce
- 6 years ago
- Views:
Transcription
1 New DoD Approaches on the Cyber Survivability of Weapon Systems Colonel Dean Data Clothier Chief, Cyberspace Division Joint Staff/J-6 CSE is the Critical Foundation for Ensuring Cyber Survivability is Considered as Part of the Operational Risk Trade-Space
2 Purpose/Objectives Purpose: Recommend JCB approval of Cyber Survivability Endorsement (CSE) Implementation Guide for the SS-KPP DepSecDef (DSD) directed Joint Staff develop Cybersecurity KPP o Initiated when DSD briefed on DOT&E Cybersecurity Report w/ OUSD(AT&L), OUSD(P), DOD-CIO and VCJCS Highlighted multiple weapon systems with vulnerabilities that could have been known and fixed prior to DT&E o Intended to eliminate or sufficiently mitigate known vulnerabilities prior to fielding o Implemented through deliberate design, test and associated DOTmLPF-P in applicable operational environments o Met DepSecDef intent by incorporating CSE into SS-KPP Endorsement Objectives o Drive development of Joint cyber survivability requirements to meet requirements for cyber attack prevention, mitigation and recovery o Ensure performance measures are consistent with the threat and consistently applied during requirements definition, development and testing o Ensure cyber survivability and cybersecurity requirements are considered and included as part of the operational risk trade-space End State: All DoD weapon systems are cyber survivable commensurate with a risk managed approach to countering a capable and determined adversary 2
3 Cyber Survivability Endorsement (CSE) Kinetic Threats Non-Kinetic Threats Electromagnetic Spectrum Cyber Sponsors must address the System Survivability KPP and provide specific Cyber Survivability Attributes (CSA) related to the SS KPP which must be met - 18 December 2014 JCIDS Manual, Enclosure D 3
4 Cyber Survivability Endorsement (CSE) Added Cyber Survivability to the JCIDS System Survivability (SS) Key Performance Parameter (KPP) o Cyber survivability is now part of operational risk trade-space (as of 18 Dec 2014 JCIDS Manual) CSE Implementation Guide: Joint Staff led effort with active participation from DoD CIO, AT&L, DOT&E, OUSD(I), DIA, and NSA. o Provides cyber survivability exemplar statements o Includes cyber survivability attributes to aid requirement definition o Describes tailoring approach for Capabilities Development Document (CDD) and Capabilities Production Document (CPD) requirements Build new weapon systems that are cyber survivable commensurate with a risk managed approach to countering a capable and determined adversary 4
5 Risk Managed Approach The CSE 5 step risk managed approach takes into account several variables the resulting CSRC provides consistency between levels of CS requirements, development and testing 5
6 Example STEP 1: System Mission Types MT 4 Strategic / National Systems whose degradation would result in the highest risks to achieving national objectives, require the very best cybersecurity practices MT 3 Operational / Tactical Mission systems, munitions, Command and Control capabilities that require unique DoD protections MT 2 Military Critical Selected high impact systems that ensure near-continuous operation with rapid recovery from failures MT 1 Mission Essential Military and Organizational Support systems; may be hosted within DoD or commercial facilities Determining the System Mission Type helps define the required cyber survivability protection for the capability 6
7 Example STEP 2: Cyber Dependence Criticality Analysis provides basis for cyber survivability emphasis for critical functions, components and information exchanges Determine the Mission Critical Functions of the System 1 Sustain Flight / Maneuverability 2 Maintain Internal/External Communication 3 Perform Offensive / Defensive Activities What is a System s Cyber Dependence to Perform its Mission Critical Functions? 7
8 Example STEP 3: How Select Threat Actors What level of cyber actor must the system be capable of withstanding if it is to fulfill its warfighting purposes? Cyber Threat Actor Capability Level Tier IV Tier III Tier II Tier I Advanced Moderate Limited Nascent *NOTIONAL SCORING IF Insurgent & Irregular Forces, THEN Determine the Level of Most Capable Cyber Threat Actor to the System 8
9 Example STEP 4: Mission Impact Critical Function I: What is the mission impact of compromised flight or maneuverability due to a cyber attack? Mission Critical Functions I Sustained Flight / Maneuverability II Internal / External Communication III Offensive / Defensive Capabilities Confidentiality H Severe Integrity H Disruptive Availability H Minutes M Serious M Degraded M Hours L Limited L Nuisance Confidentiality Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information Integrity Guarding against improper information modification or destruction, and includes ensuring information nonrepudiation and authenticity Availability Ensuring timely and reliable access to and use of information Determine the Mission Impact of Loss For All Mission Critical Functions Due to a Cyber Event L Days *NOTIONAL SCORING 9
10 Example STEP 5: System Survivability Risk The aggregation of the System Risk and the Threat Actor inform the level of System Security Engineering & Controls applied and the Residual Operational Risk assumed based on the purpose and intended operational environment of the system Fly Communicate Act Systemic Vulnerability Confidentiality Integrity Availability X X X X X X X X X Low High Medium Low Low High Medium High Medium Factor Cyber Threat Actor for the UAV System Tier IV Tier III Tier II Tier I System Survivability Risk Threat Actor Levels Ti er IV III II I X IL4, Severe Adverse Effect IL3, Serious Adverse Effect IL2, Limited Adverse Effect IL1, Risks Acceptable for Meeting Military and Organization Needs *NOTIONAL SCORING Vulnerability in the face of Threat Capability yields Survivability Risk 10
11 Cybersecurity Framework Integration 11
12 Cyber Survivability Attributes to Tailor in the CDD/CPD SS KPP Pillars (Mandatory) Prevent Mitigate Recover All 3 Pillars CSA 01 - Control Access CSA 02 - Reduce Cyber Detectability Cyber Survivability Attributes (CSA) (All are considered, select those applicable) CSA 03 - Secure Transmissions and Communications CSA 04 - Protect Information and Exploitation CSA 05 - Partition and Ensure Critical Functions at Mission Completion Performance Levels CSA 06 - Minimize and Harden Cyber Attack Surfaces CSA 07 Baseline & Monitor Systems, and Detect Anomalies CSA 08 - Manage System Performance if Degraded by Cyber Events CSA 09 - Recover System Capabilities CSA 10 Actively Manage System s Configuration to Counter Vulnerabilities Prevent Design requirements that protect weapon system s functions from most likely and greatest risk cyber threats. Mitigate Design requirements that detect and respond to cyber-attacks; enabling weapon systems functions resiliency to complete the mission. Recover Design requirements that ensure minimum cyber capability available to recover from cyber attack and enable weapon system quickly restore full functionality Fundamental to the CSE construct is enabling sponsor to select and articulate CSA choices to achieve each SS KKP Pillar 12
13 CSE Scorecard Assessment Process Requirement Sponsors use the Cyber Survivability Scorecard to document that appropriate CSAs have been considered, and where they are articulated within requirement s documents. CSE analysts use the Cyber Survivability Scorecard to review ICDs, and assess CDDs and CPDs entered into KM/DS with JROC Interest, JCB Interest, or qualify as Joint Integration. CSE assessment occurs during the 21 day Document Review and commenting stage within the JCIDS deliberate staffing process. CSE Scorecard is a management tool to help guide requirements development, and streamline review process to ensure CSAs are logically considered and articulated 13
14 Systemic Ability to Adapt to New Cyber Threats Systems must be capable of quickly adapting to new cyber threats Sustaining a system s cyber survivability requires elements in the resourcing, design, Life Cycle Sustainment Plans, and Ops & Maintenance procedures Cyber threats will continue to increase in capability for the foreseeable future 14
15 IPT Approach Terms of Reference: Identify exemplars of cyber survivability and cybersecurity capability requirements, which can be utilized in requirements documentation and associated CONOPS use cases and operational architecture information. Action Groups: Overall CSE Integrated Product Team led by JS-J6 o Requirements Action Group: Co-Led by JS-J6 and DoD CIO o Intelligence Action Group: Led by OUSD(I) o Acquisition Action Group: Led by AT&L o Testing Action Group: Led by DASD(DT&E) Scope: Review capability requirements documentation to ensure traceability and consistency of Cyber requirements throughout the programs development, testing and sustainment activities. Deliverable: Implementation Guide to support articulating and assessing Cyber Survivability within Capability Requirements Documentation 15
16 Wrap Up Problem: System survivability requirements not sufficiently articulated for cyber-attack prevention, mitigation and recovery, within requirements documents CSE Implementation Guide: Joint Staff led effort, with active participation from DOD-CIO, OUSD(AT&L), OUSD(I), DOT&E, DIA, and NSA o Includes high level cybersecurity threat exemplar statements prior to availability of DIA or Service developed system specific threat assessments o Defines Cyber Survivability Risk Category (CSRC) to enable a consistent approach to cybersecurity requirements, development and testing o Outlines Cyber Survivability Attributes (CSAs) to be considered by the requirement sponsor, which can be consistently applied, implemented by system security engineers and tested by DT&E/OT&E o Provides Exemplar Requirements and Scorecard supports development, assessment and management of requirements CSE Enables System Survivability KPP Endorsement 16
17 NDAA Section 1647: Evaluation of Cyber Vulnerabilities of Major Weapon Systems of the DoD 17
18 NDAA Section Nov 2015: Congress enacted FY16 NDAA S.1647 to evaluate the impact of cyber vulnerabilities on major weapon systems. Create a plan based on the criticality of major weapon systems, as determined by the Chairman of the Joint Chiefs of Staff. FY16-17 funding available for evaluations (cyber vulnerability assessments and non-recurring engineering design for remediation) 17 May 2016: JROCM endorsed CJCS prioritization required to release funds 29 Jun 2016: Briefed 4 Star- Cyber Investment Management Board Funding profile and execution strategy 22 Aug 2016: Develop the plan for conducting evaluations in FY16-19 Submit quarterly findings to HASC and SASC 31 Dec 2019: The Secretary of Defense shall, complete an evaluation of the cyber vulnerabilities of each major weapon system of the Department of Defense 18
19 Weapon System Prioritization Approach Step 1: Services identified major weapon systems to include: A subset of OUSD (AT&L) s Major Defense Acquisition Programs (MDAP) and Major Automated Information Systems (MAIS) Including major weapon systems and associated C2 systems essential to accomplishing the QDR missions Weapon systems must have reached Milestone B on or before 31 Dec 2015 to be included Step 2: Services prioritized Mission Areas (MAs) Service methodology for prioritizing major weapon systems Service MAs Self-identified, Mission Capabilities, Core Service Functionality Step 3: Services binned major WS within their MAs Step 4: Services characterized WS Intrinsic Cyber Vulnerabilities (ICV) Specific design, technical, programmatic and operational characteristics of a weapon system which may increase its vulnerability to cyber attack from a threat actor Define cyber vulnerability assessment levels Step 5: Joint Staff prioritized WS by binning it to its highest QDR priority and highest ICV score Mission priorities identified in the 2014 Quadrennial Defense Review (QDR) 19
20 Services Prioritized Mission Areas Army Strategic Mission Command Strategic Weapon System Tactical Mission Command Tactical Weapon System Enablers Service Mission Areas USMC Military Engagement, Security Cooperation and Deterrence Crisis Response and Limited Contingency Operations Major Operations and Campaigns Navy Decision Superiority Power Projection Maritime Security Sea Control Force Generation Air Force Nuclear Deterrence Operations ISR Command and Control Air Superiority Space Superiority Cyber Superiority Global Precision Attack Special Operations Personnel Recovery Rapid Global Mobility JCA Force Support Battlespace Awareness Force Application Logistics Command and Control Communications and Computers Protection Building Partnerships Corporate Mgt. and Support 2014 QDR Priorities 1. Maintain a secure and effective nuclear deterrent 2. Provide for military defense of the homeland 3. Defeat an adversary 4. Provide a global, stabilizing presence 5. Combat terrorism 6. Counter weapons of mass destruction 7. Deny an adversary s objectives 8. Respond to crisis and conduct limited contingency operations 9. Conduct military engagement and security cooperation 10.Conduct stability and counterinsurgency operations 11.Provide support to civil authorities 12.Conduct humanitarian assistance and disaster response 20
21 Notional Example Step 4: Intrinsic Cyber Vulnerability (ICV) Scoring System Name / Service/ MA Hermes / Navy / Combat Terrorism ICV Cumulative Score 63 Range Score Comments Range Score Comments 1. Technical Exposure: a. Origin of technology b. Export of technology 1 to 8 1 to Remaining System Life Expectancy 1 to 3 3 Overall Technical Exposure 9 Overall Remaining Life Expectancy 3 2. Degree of Connectivity or Isolation: a. Type of networks required for WS b. Level of connectivity required for WS data flows c. Type of COMSEC: strength of encryption 1 to 17 1 to 15 1 to Vulnerability Assessments: a. Level of Assessment b. Currency of Assessment 0 to 4 0 to 3 Overall Degree of Connectivity 16 Overall Vulnerability Assessment Intrinsic Cyber Dependency a. Type of remote access required b. Critical components/functions exposed to cyber threats c. Cyber capabilities required throughout the operations cycle 1 to 5 1 to 17 1 to System Owner Insights: a. Cyber Mitigation to Vulnerabilities b. Cyber Resilience 1 to 9 1 to Overall Intrinsic Cyber Dependence 26 Overall Owner Insight 7 ICV Cumulative Score 63 Intrinsic Cyber Vulnerability: Specific design, technical, programmatic and operational characteristics of a weapon system, which are indicators of vulnerability to cyber attack 21
22 Evaluation Process Step 1: Target List - Provides a list of systems to Evaluated by FY, by Event Step 2: Threat Folders/Cyber Table Top - Outlines Key Cyber Terrain; informs planners, operators, and system owners Step 3: Test Design - Describes the purpose, scope and objectives of the event to include: Design of Experiments w/ MOP s, and MOE s and Mission Thread Analysis Step 4: Detailed/Operational Test Plan Developed with event /range planners details MEL, scenarios, and rules of the road Step 5: Test Execution - Operational/ Laboratory event designed to stress the system and or the operators in a cyber contested environment Step 6: Green Book Mitigation - cost, performance, and schedule implications of the vulnerabilities discovered. Includes a Senior Level Review and approval of Risk (Operational and Acquisition) Step 7: Validation Confirmation of implementation of Corrective Actions Step 8: Quarterly Report to Congress Co Authored summary of findings and path forward Step 9: Waiver Candidates Determine if any systems qualify for assessment exclusion This 9-step process follows the DoDI and the DOT&E TEMP Guidebook
23 FY17 Goals & Objectives Conduct cyber vulnerability assessments Develop a knowledge sharing capability Service Chiefs present risk assessments and mitigation plans to SECDEF Initiating effort to better understand what cyber SA for mission systems Investment buys down risk for military operations in FY19 and beyond 23
Overview of the Chemical and Biological Defense Program Requirements Process
Overview of the Chemical and Biological Defense Program Requirements Process 14 March 2012 Director, Joint Requirements Office for Chemical, Biological, Radiological, and Nuclear Defense J-8, The Joint
More informationCybersecurity TEMP Body Example
ybersecurity TEMP Body Example 1.3. System Description (...) A unit equipped with TGVS performs armed reconnaissance missions and provides operators with sensors and weapons to observe and engage enemies.
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 3150.09 April 8, 2015 Incorporating Change 1, Effective January 16, 2018 USD(AT&L) SUBJECT: The Chemical, Biological, Radiological, and Nuclear (CBRN) Survivability
More informationDEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC
DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC 20350-3000 MCO 3100.4 PLI MARINE CORPS ORDER 3100.4 From: To: Subj: Commandant of the Marine Corps
More informationSubj: NUCLEAR SURVIVABILITY POLICY FOR NAVY AND MARINE CORPS SYSTEMS
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3401.3B N9 OPNAV INSTRUCTION 3401.3B From: Chief of Naval Operations Subj: NUCLEAR
More informationCOMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 10-25 26 SEPTEMBER 2007 Operations EMERGENCY MANAGEMENT ACCESSIBILITY: COMPLIANCE WITH THIS PUBLICATION IS MANDATORY Publications and
More informationDepartment of Defense INSTRUCTION. SUBJECT: Physical Security Equipment (PSE) Research, Development, Test, and Evaluation (RDT&E)
Department of Defense INSTRUCTION NUMBER 3224.03 October 1, 2007 USD(AT&L) SUBJECT: Physical Security Equipment (PSE) Research, Development, Test, and Evaluation (RDT&E) References: (a) DoD Directive 3224.3,
More informationProduct Support Manager Workshop. Rapid Capabilities. Mr. Chris O Donnell Director, Joint Rapid Acquisition Cell
Product Support Manager Workshop Rapid Capabilities Mr. Chris O Donnell Director, Joint Rapid Acquisition Cell June 8, 2017 17-S-1832 Deliberate Requirements vs. Urgent / Rapid Requirements Lanes Urgent
More informationCYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy
CYBER SECURITY PROTECTION Section III of the DOD Cyber Strategy Overview Build and maintain ready forces and capabilities to conduct cyberspace operations Defend the DOD information network, secure DOD
More informationJCIDS Overview. Joint Capabilities Integration & Development System. Joint Staff, J-8 Capabilities and Acquisition Division UNCLASSIFIED UNCLASSIFIED
Joint Capabilities Integration & Development System 1 JCIDS Overview Joint Staff, J-8 Capabilities and Acquisition Division 2 Previous Requirements and Acquisition Process Frequently produced stovepiped
More informationJCIDS: The New Language of Defense Planning, Programming and Acquisition
JCIDS: The New Language of Defense Planning, Programming and Acquisition By Gregory P. Cook Colonel, USAF (Ret) INTRODUCTION The past decade has seen significant change in the way the Department of Defense
More informationUNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Requirements Analysis and Maturation. FY 2011 Total Estimate. FY 2011 OCO Estimate
Exhibit R-2, RDT&E Budget Item Justification: PB 2011 Air Force DATE: February 2010 COST ($ in Millions) FY 2009 Actual FY 2010 FY 2012 FY 2013 FY 2014 FY 2015 To Complete Program Element 0.000 35.533
More informationNavy Information Warfare Pavilion 19 February RADM Matthew Kohler, Naval Information Forces
Navy Information Warfare Pavilion 19 February 2016 1030 RADM Matthew Kohler, Naval Information Forces It s All About Warfighting 2 IDC Reserve Command July 2012 Information Dominance Forces TYCOM October
More informationChallenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces. J.D. Crouch II March 5, 2003
Challenges of a New Capability-Based Defense Strategy: Transforming US Strategic Forces J.D. Crouch II March 5, 2003 Current and Future Security Environment Weapons of Mass Destruction Missile Proliferation?
More informationStatement by. Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3. Joint Staff. Before the 109 th Congress
Statement by Brigadier General Otis G. Mannon (USAF) Deputy Director, Special Operations, J-3 Joint Staff Before the 109 th Congress Committee on Armed Services Subcommittee on Terrorism, Unconventional
More informationCHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J-8 CJCSI 3170.01C DISTRIBUTION: A, B, C, J, S JOINT CAPABILITIES INTEGRATION AND DEVELOPMENT SYSTEM References: See Enclosure C 1. Purpose. The purpose
More informationAn Enterprise Environment for Information Assurance / Computer Network Defense Testing and Evaluation
An Enterprise Environment for Information Assurance / Computer Network Defense Testing and Evaluation Parker Horner, EWA Gov t Systems Inc. Steve Moore, Booz Allen Hamilton Today s Agenda Introduction
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 3000.07 August 28, 2014 Incorporating Change 1, May 12, 2017 USD(P) SUBJECT: Irregular Warfare (IW) References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues
More informationEVERGREEN IV: STRATEGIC NEEDS
United States Coast Guard Headquarters Office of Strategic Analysis 9/1/ UNITED STATES COAST GUARD Emerging Policy Staff Evergreen Foresight Program The Program The Coast Guard Evergreen Program provides
More informationREQUIREMENTS TO CAPABILITIES
Chapter 3 REQUIREMENTS TO CAPABILITIES The U.S. naval services the Navy/Marine Corps Team and their Reserve components possess three characteristics that differentiate us from America s other military
More informationFebruary 2009 Updated 31 July 2009 MANUAL FOR THE OPERATION OF THE JOINT CAPABILITIES INTEGRATION AND DEVELOPMENT SYSTEM
MANUAL FOR THE OPERATION OF THE JOINT CAPABILITIES INTEGRATION AND DEVELOPMENT SYSTEM 1. Purpose. This manual sets forth guidelines and procedures for operation of the Joint Capabilities Integration and
More informationMiddle Tier Acquisition and Other Rapid Acquisition Pathways
Middle Tier Acquisition and Other Rapid Acquisition Pathways Pete Modigliani Su Chang Dan Ward Contact us at accelerate@mitre.org Approved for public release. Distribution unlimited 17-3828-2. 2 Purpose
More informationSubj: THREAT SUPPORT TO THE DEFENSE ACQUISITION SYSTEM
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3811.1F N2N6 OPNAV INSTRUCTION 3811.1F From: Chief of Naval Operations Subj: THREAT
More informationPerspectives on the Analysis M&S Community
v4-2 Perspectives on the Analysis M&S Community Dr. Jim Stevens OSD/PA&E Director, Joint Data Support 11 March 2008 Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for
More informationJoint Capabilities to Combat Weapons of Mass Destruction
Joint Capabilities to Combat Weapons of Mass Destruction DoD Chemical and Biological Defense Advance Planning Briefing for Industry 4 April 2007 Presented by: Colonel Patrick J. Sharon, USA Deputy Director,
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 4650.08 February 5, 2015 DoD CIO SUBJECT: Positioning, Navigation, and Timing (PNT) and Navigation Warfare (Navwar) References: See Enclosure 1 1. PURPOSE. This
More informationProtecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information
Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information Mr. Brian D. Hughes Office of the Deputy Assistant Secretary of Defense for
More informationDepartment of Defense DIRECTIVE. SUBJECT: Electronic Warfare (EW) and Command and Control Warfare (C2W) Countermeasures
Department of Defense DIRECTIVE NUMBER 3222.4 July 31, 1992 Incorporating Through Change 2, January 28, 1994 SUBJECT: Electronic Warfare (EW) and Command and Control Warfare (C2W) Countermeasures USD(A)
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 3100.10 October 18, 2012 USD(P) SUBJECT: Space Policy References: See Enclosure 1 1. PURPOSE. This Directive reissues DoD Directive (DoDD) 3100.10 (Reference (a))
More informationDepartment of Defense INSTRUCTION. Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN)
Department of Defense INSTRUCTION NUMBER 5200.44 November 5, 2012 Incorporating Change 2, July 27, 2017 DoD CIO/USD(AT&L) SUBJECT: Protection of Mission Critical Functions to Achieve Trusted Systems and
More informationDoDI ,Operation of the Defense Acquisition System Change 1 & 2
DoDI 5000.02,Operation of the Defense Acquisition System Change 1 & 2 26 January & 2 February 2017 (Key Changes from DoDI 5000.02, 7 Jan 2015) Presented By: T.R. Randy Pilling Center Director Acquisition
More informationNew Directions for Defense Programs Pacific Overview
New Directions for Defense Programs Pacific Overview Mr. Jeffrey Bloom Japan Program Director, Pacific Armaments Cooperation Office of International Cooperation, OUSD (AT&L) The Future of the Asia- Pacific
More informationFact Sheet: FY2017 National Defense Authorization Act (NDAA) DOD Reform Proposals
Fact Sheet: FY2017 National Defense Authorization Act (NDAA) DOD Reform Proposals Kathleen J. McInnis Analyst in International Security May 25, 2016 Congressional Research Service 7-5700 www.crs.gov R44508
More informationMC Network Modernization Implementation Plan
MC Network Modernization Implementation Plan Mission Command Center of Excellence 1 Principles (Why) Warfighting Requirements CSA s Mission, Principles, Characteristics of the Network & Requirements Network
More informationSubj: DEPARTMENT OF THE NAVY CYBERSECURITY/INFORMATION ASSURANCE WORKFORCE MANAGEMENT, OVERSIGHT, AND COMPLIANCE
DEPARTMENT OF THE NAVY OFFICE OF THE SECRETARY 1000 NAVY PENTAGON WASHINGTON DC 20350 1000 SECNAVINST 5239.20 DON CIO SECNAV INSTRUCTION 5239.20 From: Secretary of the Navy Subj: DEPARTMENT OF THE NAVY
More informationDOD INSTRUCTION MISSION ASSURANCE (MA) CONSTRUCT
DOD INSTRUCTION 3020.45 MISSION ASSURANCE (MA) CONSTRUCT Originating Component: Office of the Under Secretary of Defense for Policy Effective: August 14, 2018 Releasability: Reissues: Cleared for public
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 3000.07 December 1, 2008 USD(P) SUBJECT: Irregular Warfare (IW) References: (a) DoD Directive 5100.1, Functions of the Department of Defense and Its Major Components,
More informationAgency Mission Assurance
DCMA Instruction 3301 Agency Mission Assurance Office of Primary Responsibility Integrating Capability - Agency Mission Assurance Effective: May 14, 2018 Releasability: Cleared for public release New Issuance
More informationTHREAT SUPPORT TO THE DEFENSE ACQUISITION SYSTEM
DEP ART MENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3811.1E N2/N6 OPNAV INSTRUCTION 3811.1E From: SUbj : Chief of Naval Operations THREAT
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 8330.01 May 21, 2014 Incorporating Change 1, December 18, 2017 DoD CIO SUBJECT: Interoperability of Information Technology (IT), Including National Security Systems
More informationThis block in the Interactive DA Framework is all about joint concepts. The primary reference document for joint operations concepts (or JOpsC) in
1 This block in the Interactive DA Framework is all about joint concepts. The primary reference document for joint operations concepts (or JOpsC) in the JCIDS process is CJCSI 3010.02, entitled Joint Operations
More informationCHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J-8 CJCSI 3170.01F DISTRIBUTION: A, B, C, J, S JOINT CAPABILITIES INTEGRATION AND DEVELOPMENT SYSTEM References: See Enclosure D 1. Purpose. The purpose
More informationAVIONICS CYBER TEST AND EVALUATION
AVIONICS CYBER TEST AND EVALUATION Joseph Nichols, PhD Technical Advisor for Flight Test and Evaluation Air Force Test Center Edwards AFB CA joseph.nichols.13@us.af.mil 1 Defining avionics cyber testing
More informationCryptologic and Cyber Systems Division
Cryptologic and Cyber Systems Division AFLCMC Cryptologic & Cyber Systems Division Supporting Multi-Domain Warfighting Colonel Gary Salmans Senior Material Leader December 2016 DISTRIBUTION STATEMENT A.
More informationDoD CBRN Defense Doctrine, Training, Leadership, and Education (DTL&E) Strategic Plan
i Report Documentation Page Form Approved OMB No. 0704-0188 Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,
More informationThe Joint Capabilities Integration & Development System (JCIDS)
The Joint Capabilities Integration & Development System (JCIDS) Demonstrating Relevance to Decision-Makers 14 January 2008 Lt Col Robert Prince Valin Joint Staff (J8), Force Application Engagement Division
More informationForce 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release.
White Paper 23 January 2014 DISTRIBUTION RESTRICTION: Approved for public release. Enclosure 2 Introduction Force 2025 Maneuvers provides the means to evaluate and validate expeditionary capabilities for
More informationDOD DIRECTIVE ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE
DOD DIRECTIVE 5111.13 ASSISTANT SECRETARY OF DEFENSE FOR HOMELAND DEFENSE AND GLOBAL SECURITY (ASD(HD&GS)) Originating Component: Office of the Chief Management Officer of the Department of Defense Effective:
More informationUNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #163
Exhibit R-2, RDT&E Budget Item Justification: PB 2015 Office of Secretary Of Defense Date: March 2014 0400: Research, Development, Test &, Defense-Wide / BA 6: RDT&E Management Support COST ($ in Millions)
More informationCHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J-8 CJCSI 3170.01H DISTRIBUTION: A, B, C, S JOINT CAPABILITIES INTEGRATION AND DEVELOPMENT SYSTEM References: See Enclosure B 1. Purpose. In support of
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 213 Army DATE: February 212 COST ($ in Millions) FY 211 FY 212 FY 214 FY 215 FY 216 FY 217 To Complete Program Element 125.44 31.649 4.876-4.876 25.655
More informationDOD DIRECTIVE DOD SPACE ENTERPRISE GOVERNANCE AND PRINCIPAL DOD SPACE ADVISOR (PDSA)
DOD DIRECTIVE 5100.96 DOD SPACE ENTERPRISE GOVERNANCE AND PRINCIPAL DOD SPACE ADVISOR (PDSA) Originating Component: Office of the Deputy Chief Management Officer of the Department of Defense Effective:
More informationDefense Acquisition Guidebook Systems Engineering Chapter Update
Defense Acquisition Guidebook Systems Engineering Chapter Update Ms. Aileen Sedmak Office of the Deputy Assistant Secretary of Defense for Systems Engineering 15th Annual NDIA Systems Engineering Conference
More informationDOD INSTRUCTION DoD SUPPORT TO INTERNATIONAL CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR (CBRN) INCIDENTS
DOD INSTRUCTION 2000.21 DoD SUPPORT TO INTERNATIONAL CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR (CBRN) INCIDENTS Originating Component: Office of the Under Secretary of Defense for Policy Effective:
More informationCHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J-6 DISTRIBUTION: A, B, C, JS-LAN References: See Enclosure C CRYPTOGRAPHIC MODERNIZATION PLANNING 1. Purpose. Given the authority by reference a, this
More informationUNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 13 R-1 Line #33
Exhibit R-2, RDT&E Budget Item Justification: PB 2016 Air Force : February 2015 3600: Research, Development, Test & Evaluation, Air Force / BA 4: Advanced Component Development & Prototypes (ACD&P) COST
More informationCastles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness)
Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness) The Nation's Army in Cyberspace OVERALL CLASSIFICATION: US Army Cyber Command and Second Army 1 COL Mark Schonberg,
More informationCOMPLIANCE WITH THIS PUBLICATION IS MANDATORY
BY ORDER OF THE SECRETARY OF THE AIR FORCE AIR FORCE POLICY DIRECTIVE 10-25 28 APRIL 2014 Operations AIR FORCE EMERGENCY MANAGEMENT PROGRAM COMPLIANCE WITH THIS PUBLICATION IS MANDATORY ACCESSIBILITY:
More informationJoint Staff J7 / Deputy Director for Joint Training
Joint Staff J7 / Deputy Director for Joint Training Joint Theater Level Simulation Global Operations Don Weter, CIV Joint Staff J7 Environment Operations Division Program Manager M&S Analysis Larry Hose,
More informationDOD DIRECTIVE DOD CONTINUITY POLICY
DOD DIRECTIVE 3020.26 DOD CONTINUITY POLICY Originating Component: Office of the Under Secretary of Defense for Policy Effective: February 14, 2018 Releasability: Reissues and Cancels: Approved by: Cleared
More informationRevising the National Strategy for Homeland Security
Revising the National Strategy for Homeland Security September 2007 The Need for a Revised Strategy Reflect the evolution of the homeland security enterprise since the National Strategy for Homeland Security
More informationSubj: ELECTRONIC WARFARE DATA AND REPROGRAMMABLE LIBRARY SUPPORT PROGRAM
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3430.23C N2/N6 OPNAV INSTRUCTION 3430.23C From: Chief of Naval Operations Subj: ELECTRONIC
More informationDepartment of Defense DIRECTIVE
Department of Defense DIRECTIVE NUMBER 5250.01 January 22, 2013 Incorporating Change 1, August 29, 2017 USD(I) SUBJECT: Management of Intelligence Mission Data (IMD) in DoD Acquisition References: See
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 4630.8 May 2, 2002 SUBJECT: Procedures for Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS) ASD(C3I) References:
More informationNAVY CONTINUITY OF OPERATIONS PROGRAM AND POLICY
OPNAV INSTRUCTION 3030.5B DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350 2000 IN REPLY REFER TO: OPNAVINST 3030.5B N3/N5 From: Subj: Chief of Naval
More informationCSFI Cyberspace Operations Strategist and Planner CSFI- CCOSP
CSFI Cyberspace Operations Strategist and Planner CSFI- CCOSP Learn advanced skills needed for practical and dynamic cyber operations (cyber warfare) strategy and planning and certify as a CSFI Cyberspace
More informationThe current Army operating concept is to Win in a complex
Army Expansibility Mobilization: The State of the Field Ken S. Gilliam and Barrett K. Parker ABSTRACT: This article provides an overview of key definitions and themes related to mobilization, especially
More informationDOD DIRECTIVE E ROLES AND RESPONSIBILITIES ASSOCIATED WITH THE CHEMICAL AND BIOLOGICAL DEFENSE PROGRAM (CBDP)
DOD DIRECTIVE 5160.05E ROLES AND RESPONSIBILITIES ASSOCIATED WITH THE CHEMICAL AND BIOLOGICAL DEFENSE PROGRAM (CBDP) Originating Component: Office of the Under Secretary of Defense for Acquisition, Technology,
More informationSubj: DEPARTMENT OF THE NAVY POLICY ON INSENSITIVE MUNITIONS
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 8010.13E N96 OPNAV INSTRUCTION 8010.13E From: Chief of Naval Operations Subj: DEPARTMENT
More informationDOD INSTRUCTION DOD PUBLIC HEALTH AND MEDICAL SERVICES IN SUPPORT OF CIVIL AUTHORITIES
DOD INSTRUCTION 3025.24 DOD PUBLIC HEALTH AND MEDICAL SERVICES IN SUPPORT OF CIVIL AUTHORITIES Originating Component: Office of the Under Secretary of Defense for Policy Effective: January 30, 2017 Releasability:
More informationFirst Announcement/Call For Papers
AIAA Strategic and Tactical Missile Systems Conference AIAA Missile Sciences Conference Abstract Deadline 30 June 2011 SECRET/U.S. ONLY 24 26 January 2012 Naval Postgraduate School Monterey, California
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 4630.8 June 30, 2004 SUBJECT: Procedures for Interoperability and Supportability of Information Technology (IT) and National Security Systems (NSS) ASD(NII)/DoD
More informationLt Gen BJ Shwedo. Chief, Information Dominance and Chief Information Officer SAF/ CIO A6
Lt Gen BJ Shwedo Chief, Information Dominance and Chief Information Officer SAF/ CIO A6 Overview Information Dominance Flight Plan Priorities Cyber Transition/Transformation Cyber Resilience Cyber Role
More informationSubj: CHEMICAL, BIOLOGICAL, RADIOLOGICAL, AND NUCLEAR DEFENSE REQUIREMENTS SUPPORTING OPERATIONAL FLEET READINESS
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON, DC 20350-2000 OPNAVINST 3400.10G N9 OPNAV INSTRUCTION 3400.10G From: Chief of Naval Operations Subj: CHEMICAL,
More informationUNCLASSIFIED. UNCLASSIFIED R-1 Line Item No. 3 Page 1 of 15
Exhibit R-2, RDT&E Project Justification May 2009 OPERATIONAL TEST AND EVALUATION, DEFENSE (0460) BUDGET ACTIVITY 6 (RDT&E MANAGEMENT SUPPORT) OPERATIONAL TEST ACTIVITIES AND ANALYSES (OT&A) PROGRAM ELEMENT
More informationDepartment of Defense MANUAL
Department of Defense MANUAL SUBJECT: DoD Operations Security (OPSEC) Program Manual References: See Enclosure 1 NUMBER 5205.02-M November 3, 2008 Incorporating Change 1, Effective April 26, 2018 USD(I)
More informationAir Force Science & Technology Strategy ~~~ AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff. Secretary of the Air Force
Air Force Science & Technology Strategy 2010 F AJ~_...c:..\G.~~ Norton A. Schwartz General, USAF Chief of Staff ~~~ Secretary of the Air Force REPORT DOCUMENTATION PAGE Form Approved OMB No. 0704-0188
More information2016 Major Automated Information System Annual Report
2016 Major Automated Information System Annual Report Deliberate and Crisis Action Planning and Execution Segments Increment 2A (DCAPES Inc 2A) Defense Acquisition Management Information Retrieval (DAMIR)
More informationUS Joint Forces Command Approach to Interoperability and Integration
US Joint Forces Command Approach to Interoperability and Integration Maj Gen Dan Dick Director for Requirements and Integration, U.S. Joint Forces Command Unclassified Overview DoD Top Ten Priorities (FY03)
More informationScience and Technology Conference for Chem-Bio Information Systems
Science and Technology Conference for Chem-Bio Information Systems Joint Requirements Office for Chemical, Biological, Radiological, and Nuclear Defense (JRO for CBRND) 24-28 October 2005 1 JRO CBRN Defense
More informationUNCLASSIFIED. FY 2011 Total Estimate
Exhibit R-2, RDT&E Budget Item Justification: PB 2011 The Joint Staff DATE: February 2010 COST ($ in Millions) FY 2009 Actual FY 2010 for the Warrior (C4IFTW) FY 2012 FY 2013 FY 2014 FY 2015 Cost To Complete
More informationSUBJECT: Army Directive (Implementation of Acquisition Reform Initiatives 1 and 2)
S E C R E T A R Y O F T H E A R M Y W A S H I N G T O N MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Army Directive 2017-22 (Implementation of Acquisition Reform Initiatives 1 and 2) 1. References. A complete
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE
Exhibit R-2, RDT&E Budget Item Justification: PB 2014 Office of Secretary Of Defense DATE: April 2013 0400: Research, Development, Test &, Defense-Wide COST ($ in Millions) All Prior FY 2014 Years FY 2012
More informationThe 19th edition of the Army s capstone operational doctrine
1923 1939 1941 1944 1949 1954 1962 1968 1976 1905 1910 1913 1914 The 19th edition of the Army s capstone operational doctrine 1982 1986 1993 2001 2008 2011 1905-1938: Field Service Regulations 1939-2000:
More informationINSIDER THREATS. DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems
United States Government Accountability Office Report to Congressional Committees June 2015 INSIDER THREATS DOD Should Strengthen Management and Guidance to Protect Classified Information and Systems GAO-15-544
More informationDepartment of Defense INSTRUCTION. SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems
Department of Defense INSTRUCTION NUMBER 8582.01 June 6, 2012 Incorporating Change 1, October 27, 2017 SUBJECT: Security of Unclassified DoD Information on Non-DoD Information Systems References: See Enclosure
More informationThis is definitely another document that needs to have lots of HSI language in it!
1 The Capability Production Document (or CPD) is one of the most important things to come out of the Engineering and Manufacturing Development phase. It defines an increment of militarily useful, logistically
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE
COST ($ in Millions) Years FY 2012 FY 2013 # ## FY 2015 FY 2016 FY 2017 FY 2018 Air Force Page 1 of 11 R-1 Line #36 To Program Element - 7.074 10.429 28.764-28.764 21.717 22.687 20.902 20.383 Continuing
More informationCHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J-6 CJCSI 5116.05 DISTRIBUTION: A, B, C MILITARY COMMAND, CONTROL, COMMUNICATIONS, AND COMPUTERS EXECUTIVE BOARD 1. Purpose. This instruction establishes
More informationDOD DIRECTIVE DOD COUNTERING WEAPONS OF MASS DESTRUCTION (WMD) POLICY
DOD DIRECTIVE 2060.02 DOD COUNTERING WEAPONS OF MASS DESTRUCTION (WMD) POLICY Originating Component: Office of the Under Secretary of Defense for Policy Effective: January 27, 2017 Releasability: Reissues
More informationDepartment of Defense DIRECTIVE. SUBJECT: DoD Electromagnetic Environmental Effects (E3) Program
Department of Defense DIRECTIVE NUMBER 3222.3 September 8, 2004 SUBJECT: DoD Electromagnetic Environmental Effects (E3) Program ASD(NII) References: (a) DoD Directive 3222.3, "Department of Defense Electromagnetic
More informationSUBJECT: Army Directive (Installation Energy and Water Security Policy)
S E C R E T A R Y O F T H E A R M Y W A S H I N G T O N MEMORANDUM FOR SEE DISTRIBUTION SUBJECT: Army Directive 2017-07 (Installation Energy and Water Security Policy) 1. References. A complete list of
More informationNORAD and USNORTHCOM Technology Needs Mr. John Knutson J8 Office of S&T
DISTRIBUTION A. Approved for public release: distribution unlimited. Technology Needs Mr. John Knutson J8 Office of S&T Two Commands - Complementary Missions The NORAD Mission: Aerospace warning Aerospace
More informationDepartment of Defense MANUAL
Department of Defense MANUAL NUMBER 5205.02-M November 3, 2008 USD(I) SUBJECT: DoD Operations Security (OPSEC) Program Manual References: See Enclosure 1 1. PURPOSE. In accordance with the authority in
More informationDEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC
DEPARTMENT OF THE NAVY OFFICE OF THE CHIEF OF NAVAL OPERATIONS 2000 NAVY PENTAGON WASHINGTON DC 20350-2000 OPNAVINST 3900.30 N4 OPNAV INSTRUCTION 3900.30 From: Chief of Naval Operations Subj: NAVY CAPABILITY
More informationCHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION
CHAIRMAN OF THE JOINT CHIEFS OF STAFF INSTRUCTION J-6 CJCSI 5128.02 DISTRIBUTION: A, B, C MISSION PARTNER ENVIRONMENT EXECUTIVE STEERING COMMITTEE; COALITION INTEROPERABILITY ASSURANCE AND VALIDATION WORKING
More information2016 Major Automated Information System Annual Report
2016 Major Automated Information System Annual Report Logistics Modernization Program Increment 2 (LMP Inc 2) Defense Acquisition Management Information Retrieval (DAMIR) UNCLASSIFIED Table of Contents
More informationHEADQUARTERS DEPARTMENT OF THE ARMY FM US ARMY AIR AND MISSILE DEFENSE OPERATIONS
HEADQUARTERS DEPARTMENT OF THE ARMY FM 44-100 US ARMY AIR AND MISSILE DEFENSE OPERATIONS Distribution Restriction: Approved for public release; distribution is unlimited FM 44-100 Field Manual No. 44-100
More informationDEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON DC
DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON DC 20350-3000 Canc: Jan 2018 MCBul 3900 CD&I (CDD) MARINE CORPS BULLETIN 3900 From: Commandant of the
More informationA Call to the Future
A Call to the Future The New Air Force Strategic Framework America s Airmen are amazing. Even after more than two decades of nonstop combat operations, they continue to rise to every challenge put before
More information