Cybersecurity TEMP Body Example

Similar documents
AVIONICS CYBER TEST AND EVALUATION

FORCE XXI BATTLE COMMAND, BRIGADE AND BELOW (FBCB2)

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 7 R-1 Line #9

New DoD Approaches on the Cyber Survivability of Weapon Systems

ARMY MULTIFUNCTIONAL INFORMATION DISTRIBUTION SYSTEM-LOW VOLUME TERMINAL 2 (MIDS-LVT 2)

ARMY TACTICAL MISSILE SYSTEM (ATACMS) BLOCK II

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

FIGHTER DATA LINK (FDL)

CYBER SECURITY PROTECTION. Section III of the DOD Cyber Strategy

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Protecting US Military s Technical Advantage: Assessing the Impact of Compromised Unclassified Controlled Technical Information

Department of Defense DIRECTIVE. SUBJECT: Electronic Warfare (EW) and Command and Control Warfare (C2W) Countermeasures

Information Assurance (IA) and Interoperability (IOP) Evaluations

Castles in the Clouds: Do we have the right battlement? (Cyber Situational Awareness)

JOINT SURVEILLANCE TARGET ATTACK RADAR SYSTEM (JSTARS) E-8C AND COMMON GROUND STATION (CGS)

C4I System Solutions.

Force 2025 Maneuvers White Paper. 23 January DISTRIBUTION RESTRICTION: Approved for public release.

An Enterprise Environment for Information Assurance / Computer Network Defense Testing and Evaluation

Department of Defense Fiscal Year (FY) 2013 President's Budget Submission

UNCLASSIFIED. UNCLASSIFIED R-1 Line Item No. 3 Page 1 of 15

Chapter FM 3-19

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

Information Assurance (IA) and Interoperability (IOP)

AFCEA Mission Command Industry Engagement Symposium

Joint Staff J7 Cyberspace Environment Division / Joint Information Operations Range (JIOR) Overview

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

MILITARY STRATEGIC AND TACTICAL RELAY (MILSTAR) SATELLITE SYSTEM

MC Network Modernization Implementation Plan

Cybersecurity United States National Security Strategy President Barack Obama

The Four-Element Framework: An Integrated Test and Evaluation Strategy

Cybersecurity FY16 CYBERSECURITY. Cybersecurity 441

Air-Sea Battle & Technology Development

Mission Based T&E Progress

MULTIPLE LAUNCH ROCKET SYSTEM (MLRS) M270A1 LAUNCHER

AIRBORNE LASER (ABL)

Prepared for Milestone A Decision

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

THINKING DIFFERENTLY ABOUT NETWORK RESILIENCE

COMMON AVIATION COMMAND AND CONTROL SYSTEM

UNCLASSIFIED R-1 ITEM NOMENCLATURE

SYSTEM DESCRIPTION & CONTRIBUTION TO JOINT VISION

Navy Information Warfare Pavilion 19 February RADM Matthew Kohler, Naval Information Forces

Mission-Based Test & Evaluation Strategy: Creating Linkages between Technology Development and Mission Capability

Iowa Air National Guard Cyber Protection Team. Maj Brian Dutcher Director of Operations, 168th Cyber Operations Squadron

MILITARY STRATEGIC AND TACTICAL RELAY (MILSTAR) SATELLITE SYSTEM

Merging Operational Realism with DOE Methods in Operational Testing NDIA Presentation on 13 March 2012

1. What is the purpose of common operational terms?

UNCLASSIFIED. Cost To Complete Total Program Element Continuing Continuing : Physical Security Equipment

CHAPTER 4 MILITARY INTELLIGENCE UNIT CAPABILITIES Mission. Elements of Intelligence Support. Signals Intelligence (SIGINT) Electronic Warfare (EW)

Rapid Innovation Fund (RIF) Program

CYBER ATTACK SCENARIO

Joint Test and Evaluation Program

DEPARTMENT OF THE NAVY HEADQUARTERS UNITED STATES MARINE CORPS 3000 MARINE CORPS PENTAGON WASHINGTON, DC

A Tool to Inject Credible Warfighter-Focused Non- Kinetic Attack Effects into the BMDS M&S Environment

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

Intelligence Preparation of the Battlefield Cpt.instr. Ovidiu SIMULEAC

UNCLASSIFIED. UNCLASSIFIED Air Force Page 1 of 6 R-1 Line #62

Cyber Resiliency FAQ

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

EVERGREEN IV: STRATEGIC NEEDS

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

AUSA BACKGROUND BRIEF

24th Air Force/ AFCYBER Delivering Outcomes through Cyberspace

Test and Evaluation in Acquisition of Capabilities

UNCLASSIFIED. UNCLASSIFIED Army Page 1 of 10 R-1 Line #161

Department of Defense INSTRUCTION

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

Appendix C. Air Base Ground Defense Planning Checklist

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

Embedded Training Solution for the Bradley Fighting Vehicle (BFV) A3

Institutionalizing a Culture of Statistical Thinking in DoD Testing

Tactical Employment of Mortars

Army Expeditionary Warrior Experiment 2016 Automatic Injury Detection Technology Assessment 05 October February 2016 Battle Lab Report # 346

JAVELIN ANTITANK MISSILE

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE A: Biometrics Enabled Intelligence FY 2012 OCO

B-1B CONVENTIONAL MISSION UPGRADE PROGRAM (CMUP)

F/A-18 E/F SUPER HORNET

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE F: Requirements Analysis and Maturation. FY 2011 Total Estimate. FY 2011 OCO Estimate

Training and Evaluation Outline Report

STATEMENT J. MICHAEL GILMORE DIRECTOR, OPERATIONAL TEST AND EVALUATION OFFICE OF THE SECRETARY OF DEFENSE BEFORE THE SENATE ARMED SERVICES COMMITTEE

Lifecycle Models for Survivable Systems

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

THE STRYKER BRIGADE COMBAT TEAM INFANTRY BATTALION RECONNAISSANCE PLATOON

Department of Defense DIRECTIVE

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

Subj: ELECTRONIC WARFARE DATA AND REPROGRAMMABLE LIBRARY SUPPORT PROGRAM

January 3, 2011 MEMORANDUM FOR THE HEADS OF EXECUTIVE DEPARTMENTS AND AGENCIES

Chapter 13 Air and Missile Defense THE AIR THREAT AND JOINT SYNERGY

NATIONAL AIRSPACE SYSTEM (NAS)

COMPLIANCE WITH THIS PUBLICATION IS MANDATORY

The Armed Forces Communications and Electronics Association (AFCEA)

UNCLASSIFIED/ AFCEA Alamo Chapter. MG Garrett S. Yee. Acting Cybersecurity Director Army Chief Information Officer/G-6. June 2017 UNCLASSIFIED

Department of Defense (DOD) Automated Biometric Identification System (ABIS) Version 1.2

AIR FORCE CYBER COMMAND STRATEGIC VISION

Department of Defense INSTRUCTION

Google Cloud Technical Brief

ARCHIVED REPORT. For data and forecasts on current programs please visit or call

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

SPS-TA THALES AIRBORNE SYSTEMS INTEGRATED SELF-PROTECTION SYSTEM FOR TRANSPORT AND WIDE-BODY AIRCRAFT.

ARMY RDT&E BUDGET ITEM JUSTIFICATION (R-2 Exhibit)

Transcription:

ybersecurity TEMP Body Example 1.3. System Description (...) A unit equipped with TGVS performs armed reconnaissance missions and provides operators with sensors and weapons to observe and engage enemies. TGVS uses the Single hannel Ground and Airborne Radio System (SINGARS) and Force XXI Battle ommand Brigade and Below (FBB2) systems to communicate digitally with other TGVSs and tactical vehicles on the battlefield. The TGVS comprises the ground vehicle with its integrated sensors, weapons, computers, displays, controls, external data links, and other networked devices hosted on board the vehicle. Systems that connect with the TGVS vehicle include the maintenance support device and the remote computer display unit. ommunications include IP and ontroller Area Network (AN) data bus traffic. External data sources including NIPRNet provide data used by the maintenance components of TGVS. Units equipped with the TGVS perform cyber defense functions interoperating with the U.S. Army yber ommand (ARYBER) Regional yber enters (Rs). 1.3.4. System Threats (...) A full range of cyber adversaries with nascent, limited, moderate, and advanced capabilities will target the Tactical Ground Vehicle System (TGVS). Adversaries will attempt to compromise the system; exfiltrate, infiltrate, or corrupt data; disrupt system operations; and, if possible, physically destroy equipment. Additional information on cyber threats to the TGVS is provided in the TGVS System Threat Assessment Report (STAR) and the omputer Network Operations apstone Threat Assessment (IO apstone, Volume 10) (ORRETED), 2 nd Edition, May 2013, DIA-08-1209-908.A. ( ) 3.5. Operational Evaluation Approach (...) The OTA will use the results of TGVS cybersecurity testing, in part, to determine its operational effectiveness, suitability, and survivability. These evaluations should take into account the results of any bench testing. 3.5.1. ybersecurity Operational Test Events and Objectives. The Operational Test Agency (OTA) will perform cybersecurity testing as part of OT&E for the Tactical Ground Vehicle System (TGVS) in accordance with 1 Aug 2014 DOT&E guidance. Prior to these tests, TGVS will have a signed Authority to Operate. The overall schedule of cybersecurity testing events is shown in Figure 3-1. <If the VPA and AA scheduling is not already denoted in the integrated test schedule in the body of the TEMP >

Figure 3-1. TGVS ybersecurity Test Schedule 3.5.1.1. ooperative Vulnerability and Penetration Assessment (VPA). The OTA will employ the Army Research Laboratory Survivability/Lethality Analysis Directorate (ARL/SLAD) to perform ooperative Vulnerability and Penetration Assessments (VPAs) during both the LUT and the IOT&E prior to Adversarial Assessments. ARL/SLAD will perform the VPAs on an operationally representative TGVS, including the use of local cybersecurity defenders such as system operators, maintainers, and system administrators to support data collection (e.g., through interviews), while the TGVS is in the motor pool with all systems present and powered. ARL/SLAD will execute vulnerability and penetration testing using their accredited tools and processes, which include automated scans and manual inspection. The TGVS will have all external interfaces active, and ARL/SLAD will conduct assessment activities from the insider, outsider, and nearsider postures; the proposed test boundary is shown in Figure 3-2. ARL/SLAD will collect and report, at a minimum, the data in Attachments A and B of DOT&E guidance. ARL/SLAD will provide a full report and all data to DOT&E within 45 days of the assessment. Resources required for this test can be found in Table 4-1. The OTA will submit the VPA test plan to DOT&E for approval 90 days prior to execution. 3.5.1.2. Adversarial Assessment (AA). The OTA will conduct Adversarial Assessments (AAs) during both the LUT and the IOT&E using the Army Threat Systems Management Office (TSMO) to portray the cyber threat. TSMO is an NSA-certified, USYBEROM-accredited cyber threat team. TSMO will execute the AAs using their accredited tools and processes to portray a representative cyber threat (insider, nearsider, and outsider) in accordance with the TGVS STAR, the DIA omputer Network Operations apstone Threat Assessment, and the TGVS omputer Network Operations (NO) Annex to the Threat Test Support Package. The OTA will conduct the assessment in the context of TGVS mission operations, with representative data sources, network traffic, and external interface connectivity; the proposed test boundary is shown in Figure 3-2. The assessment will include operationally representative network defense, including local operator, maintainer and administrator defense functions and will measure the detect and react abilities of a unit equipped with the TGVS and interoperating with the Tier 2 NDSP, the ARYBER 2 nd R. During the Adversarial Assessment the OTA will collect and report, at a minimum, the data in Attachment of the DOT&E guidance, which requires cyber-trained protect, detect, react, and restore (PDRR) data collectors located in both the local and Tier 2 network defense locations. Where allowed by crew safety or equipment damage concerns, the OTA will directly 2

measure mission effects; otherwise, the OTA will evaluate mission effects using independent subject matter experts and the details of the attacks performed during the Adversarial Assessment. These subject matter experts will consider the effect of the attacks and any demonstrated cyber defender responses on the execution of mission threads and associated system performance parameters. In the event that the network defenders do not detect malicious network activity, the OTA will inject one or more detection scenarios (white cards) in order to evaluate the reaction and response chain of events. The OTA will submit the Adversarial Assessment plan for DOT&E approval 90 days prior to execution, and provide a report from the cyber test team along with the data collected in accordance with Attachment of DOT&E Guidance within 45 days of the end of the assessment. 3.5.1.3. ybersecurity Test Architecture. The architecture, proposed test boundary for the VPA and AA, and external interfaces of the TGVS are shown in Figure 3-2. Figure 3-2. TGVS Test Architecture 3

In typical operations, cyber defense for the TGVS is provided locally (Tier 3) by the system operators, maintainers, and system administrators, including a contingent of sustainment support from the development contractor. The Tier 2 omputer Network Defense Service Provider (NDSP) 1 for the TGVS is the U. S. Army yber ommand (ARYBER) Regional yber enter (R). ( ) 3.5.2.1. ybersecurity ritical Operational Issue. The OTA will assess cybersecurity under ritical Operational Issue X using the following evaluation criteria: Table 3-1: TGVS ybersecurity ritical Operational Issue Evaluation riteria riterion Standard Minimum Data Required yberx.1: Ability to Protect Information and Information Systems yberx.2: Ability to Detect yber Threat Activity and Malfunctions yberx.3: Ability to React to yber Threat Activity and Malfunctions yberx.4: Ability to Restore System after yber Threat Activity or Malfunction yberx.5: Ability to onduct Missions yberx.6: Ability to Perform Reliably and Be Do the Vulnerabilities and Exploitations discovered during cybersecurity testing of the system put the unit s ability to conduct missions at risk? Are the accuracy of detections by the TGVS-equipped unit and their defenders during cybersecurity testing sufficient to identify cyber threat activity or malfunctions that put the unit s ability conduct missions at risk? Are the mitigation actions provided by the TGVS-equipped unit and their defenders during cybersecurity testing sufficient to ensure the unit s ability to conduct missions following cyber threat activity or malfunctions? Has the TGVS-equipped unit and their defenders demonstrated the ability to restore normal system operation and conduct missions following cyber threat activity or malfunctions? an a TGVS-equipped unit conduct their missions in the presence of malicious cyber threat activity or when encountering malfunctions? an the TGVS-equipped unit perform its mission reliably and perform Attachments A, B, Attachments A and Attachment Attachments A and Attachment Attachments A, B, 1 Sometimes called ybersecurity Defense Service Provider (DSP) 4

Maintained while also being Secure from yber Threat Activity yberx.6: Ability to Preserve System Physical Integrity and the Safety of Operators from yber Threat Activity and Malfunctions maintenance in the operational context with a degraded cyberspace environment? In the presence of malicious cyber activity or following a malfunction, is the TGVS able to preserve its own physical integrity and the physical safety of its operators? and Attachments B and 3.5.4. Test Limitations. ( ) Because the unit equipped with the system normally operates in a team with other identically-equipped units that are not resourced for the AA, the scope of mission threads the operators will execute for supporting mission effects data collection may be reduced. Also, TSMO will not knowingly launch cyber attacks that could affect control of the vehicle while it is in motion. If equipment damage concerns preclude the evaluation of any systems connected to the AN bus, independent laboratory testing of these systems will be performed. This data will be included in the VPA report and cyber exploitations based on the findings will be white-carded in the AA. ( ) 4.2.5. Threat Representation. ( ) Resources required for TGVS cybersecurity testing are found in Table 4-1. The figures for the Army Research Lab include funds for developing advanced cyber exploits against the system, e.g. for the subsystems on the AN bus. ( ) Table 4-1. TGVS ybersecurity Test Resources SUPPORTING UNITS FY16 FY17 FY18 ARL/SLAD VPA Team $x1 TSMO AA Team $x2 ARL/SLAD AA PDRR Data ollection $x3 OTA ybersecurity Testing Support $x4 $x5 Instrumentation $x6 Army Research Lab Testing Support $x7 $x8 5