Shaping Cyberspace for Our Advantage

Shaping Cyberspace for Our
Advantage
Randy Cieslak
Chief Information Officer
12 November 2013
1
Shaping Cyberspace to Our Advantage
1.
2.
3.
4.
5.
Understanding Cyberspace
Characterizing Cyberspace
Using Cyberspace
Protecting Cyberspace using Risk Management
Protecting Cyberspace through the Information Assurance
Framework
6. Suggestions, Solutions and Our Way Ahead
2
Understanding Cyberspace
“Gimme some of that cyber stuff”
“Release the cyber forces!”
3
Cyber – Historical Background
• Cyber: Greek: steersman, pilot, helmsman; to steer, guide, govern,
governor
• Used today as the short term for “cybernetics” which means:
– The science or study of communication in organisms, organic
processes, and mechanical or electronic systems.
• Coined by U.S. mathematician Norbert Wiener (1894-1964) who
hypothesized that there is a similarity between the human nervous
system and electronic machines.
• In his book, Neuromancer (1984), science fiction writer William Gibson (b.
1948) presents the idea of global information network called the Matrix, and
the term Cyberspace, by which he meant a virtual reality simulation with a
direct neural feedback.
– During the years since Gibson wrote Neuromancer, other names have been created for that
shadowy space where computer data exist: the Internet, the Net, the Web, the Cloud, the
Matrix, the Metaverse, the Datasphere, the Electronic Frontier, and even the Information
Superhighway.
– Gibson’s coined term may be the most lasting because by 1989 it was borrowed by the
online community to describe today’s interconnected computer systems; especially, the
millions of computers on the Internet, and not just a science-fiction fantasy in the author’s
imagination.
Source: WordInfo.info, Senior Scribe Publications under normal fair use exceptions.
4
Cyberspace Definitions
• Cyberspace: the interdependent network of information technology
infrastructures, and includes the Internet, telecommunications
networks, computer systems, and embedded processors and
controllers in critical industries. Common usage of the term also
refers to the virtual environment of information and interactions
between people.
National Security Presidential Directive 54/Homeland
Security Presidential Directive 23 (NSPD-54/HSPD23)
• Cyberspace Operations: The employment of cyber capabilities
where the primary purpose is to achieve objectives in or through
cyberspace. Such operations include computer network operations
and activities to operate and defend the Global Information Grid.
JP 1-02
5
Cyberspace Definitions (continued)
• Cybersecurity Policy: The strategy, policy, and standards regarding
the security of and operations in cyberspace, and encompasses the
full range of threat reduction, vulnerability reduction, deterrence,
international engagement, incident response, resiliency, and
recovery policies and activities, including computer network
operations, information assurance, law enforcement, diplomacy,
military, and intelligence missions as they relate to the security and
stability of the global information and communications
infrastructure. The scope does not include other information and
communications policy unrelated to national security or securing
the infrastructure.
White House Cyberspace Policy Review,
June 2009
6
Characterizing Cyberspace
“Information Technology and Cyber are different.”
Huh?
7
UNCLASSIFIED//FOUO
Cyber / Infostructure Modernization Approach
1. Framework to capture efforts
2. Objectives, guidelines and principles to map efforts to the
framework
3. Solutions to meet the requirements from the objectives
4. Architecture that maps the solutions to implementation
5. Plans to implement the solutions
6. Projects to execute the plan
7. Infostructure (Information Infrastructure) Info to provide capability
services
8. Services to provide and enable capabilities
9. Capabilities to accomplish the mission
10. Mission to support and protect our national interests
8
USPACOM C2/CS Architecture Framework
Based on the Information Services Reference Model
Strengthen
Relationships
Cooperative Security
Arrangements
Robust Military
Capability
Reduce Violent
Extremism
STRATEGIC LAYER
Protect the Homeland
Strategic
Direction
Exchange
Situational
Information
Information Retrieval
Content Discovery / People
Discovery / Service Discovery
Mediation
Make Sound
Decisions
Monitor Plan
Execution
OPERATIONS LAYER
Operational Logic
Business Rules
Data Sourcing
Timely and Accurate
Provide /
Obtain
Authorities
Deter
Adversaries from
using WMDs
Deter Military
Aggression
Maintain SA /
Replan as
Necessary
Allocate
Forces (JTF)
Based on
ADM Willard’s C2 Cycle
Information Conditioning
Common formatting and tagging
Presentation &
Knowledge Management
Dashboards
Rendering information for mental consumption
INFORMATION CONTENT LAYER
Command & Control Battlespace Awareness Force Application
Protection
Building Partnerships
Common Applications
GCCS / NECC
IntelLink / Intelipedia
BMD / JADOCS
TSCMIS / APAN
Corporate
File / Print / Share / E-Mail / Web / Chat /
NetCentric
Logistics
Management
Office Automation / AMHS /GPS /
Force Management
GCSS
& Support
Voice / Video / Collaboration NCES/DCO/CyberDefense APPLICATIONS LAYER
Information
Conditioning &
Control
Tactical
Network
Enclave Mgt.
Identification &
Authentication
POTS
Vulnerability
Mgt.
NIPRNET
SIPRNET
JWICS
NSANet
VPNs
NETWORKING & ENCLAVING LAYER
Space Sensors
Unattended Autonomous Vehicles
Internet
Terrestrial / Undersea
Undersea Cabling Area Cable Plants
Defense Data Transport Services
Commercial Data Transport Services
Weapon Platforms
Cyber Sensors
SENSORS SENSOR
ACTUATORS
& COMPUTING
LAYER
& ACTUATOR
LAYER
Undersea Sensors
Ground Sensors
USAF-Led
JTF
Army-Led
JTF
JSOTF
Personnel
Education &
Awareness
CENTRIXSs
Wireless Mobile Phone / IP Data
LOS/BLOS Radio
Commercial Space Military
WiFi
GSM
EVDO
INMARSAT
DSCS AEHF EHF-LDR TSAT UHF VHF HF TMR LMR WIMAX
CWSP Iridium
WGS EHF-MDR GBS UHF
JTRS
TELECOMMUNICATIONS LAYER
BBS
Overhead Sensors
Incident
Mgt.
Continuity
of Ops.
(BACKPLANE)
DVS-G
DSN
Physical
Enclave Mgt.
INFORMATION ASSURANCE LAYER
Authorization &
Privilege Mgt.
Link 11 Link 16
TADIL-A TADIL-J
Boundary
Defense
USMC-Led
JTF
Navy-Led
JTF
Agency-Led
JTF
UNCLASSIFIED//FOUO
UNCLASSIFIED//FOUO
Cyber Discussion Framework
Dimensions of Cyberspace
Lines of Cyberspace
Operations / Capabilities
Physical
Logical
(Virtual)
Cognitive
(Mental)
Provisioning
Information
Capabilities
Operations
Defense
Active Defense
Exploitation
Capabilities
Exploitation
Attack
10
11
The products and
payload for awareness,
knowledge, and
understanding
APPLICATION
SERVICES
The ability to process,
display, produce and
consume information
The ability to connect
communities for sharing
and collaboration
NETWORKING
SERVICES
TELECOMMUNICATION The ability to move and
distribute signals, data
SERVICES
and information
* ISRM - Information Services Reference Model
INFORMATION
CONTENT
SERVICES
The ability to protect
and assure information
and infostructure
Work and activities to
make decisions and
produce results –
fueled by information
INFORMATION
ASSURANCE
SERVICES
PROCESS,
TASKS &
TRAINING
SERVICES
EDGE/COMPUTING The ability to sense and
process data, and
SERVICES
execute controls
Attack
Exploitation
Exploitation
Capabilities
Operations
Information
Capabilities
Activities and resources
that provide manpower,
facilities, consumables
and technical support of
the Infostructure
Active Defense
SUPPORT,
MAINTENANCE,
SUSTAINMENT,
SHELTER & SPACE
Defense
Policies, guidance and activities
to design, plan, resource,
organize, coordinate and oversee
information capabilities and uses
Overarching set of
activities to
accomplish a major
objective
Provisioning
Physical
GOVERNANCE,
PLANNING, &
MANAGEMENT,
DEVELOPMENT
ARCHITECTURE,
Cognitive
(Mental)
Logical
(Virtual)
Lines of Cyberspace
Operations / Capabilities
Dimensions of Cyberspace
Cyber Discussion Framework with ISRM*
UNCLASSIFIED//FOUO
MISSIONS,
OPERATIONS
& EFFORTS
Cyber Discussion Framework with ISRM* for Dependencies
Dimensions of Cyberspace
Lines of Cyberspace
Operations / Capabilities
Provisioning
GOVERNANCE,
PLANNING, &
MANAGEMENT,
DEVELOPMENT
ARCHITECTURE,
MISSIONS,
OPERATIONS
& EFFORTS
Work and activities to
make decisions and
produce results –
fueled by information
Overarching set of
activities to
accomplish a major
objective
INFORMATION
ASSURANCE
SERVICES
PROCESS,
TASKS &
TRAINING
SERVICES
NETWORKING
SERVICES
The products and
payload for awareness,
knowledge, and
understanding
Activities and resources
that provide manpower,
facilities, consumables
and technical support of
the Infostructure
Defense
Policies, guidance and activities
to design, plan, resource,
organize, coordinate and oversee
information capabilities and uses
to sense and
EDGE/COMPUTING The abilityAPPLICATION
process data, and
SERVICES
SERVICES
execute controls
TELECOMMUNICATION
SERVICES
Cognitive
(Mental)
INFORMATION
CONTENT
SERVICES
Operations
Physical
SUPPORT,
MAINTENANCE,
SUSTAINMENT,
SHELTER & SPACE
Information
Capabilities
Logical
(Virtual)
The ability to protect
and assure information
and infostructure
Active Defense
Exploitation
Capabilities
Exploitation
Attack
* ISRM - Information Services Reference Model
12
Cyberspace Operations at USPACOM
Operations (J3):
• Make decisions
• Execute C2
• Assess impacts
Joint Cyber Center
Fuses these operations
Intelligence (J2):
• Assess adversary info gains
• Assess threats & vectors
• Assess adversary vulnerabilities
ACT
ACT
DECIDE
Friendly
Decision Loop OBSERVE
OBSERVE
“Cyberspace
Box”
DECIDE
ORIENT
ORIENT
Communications (J6) :
• Enable capability
• Empower users
• Protect information
• Maintain security
• Respond to threats &
vulnerabilities
Adversary
Decision Loop
CYBERSPACE
Commons
Neutral
Friendly Adversary
Cognitive
Information
Service
Reference
Model
(ISRM)
Logical
Physical
13
Using Cyberspace
“Wouldn’t life be better without computers and cell phones?”
“I hate PowerPoint.
“I hate e-mail.”
“I hate ...”
14
Why we need good information capabilities
•
•
•
•
•
•
•
Effective work
Information Actions
Good decisions
• Direct
Situation awareness
• Guide
Learning and understanding
• Inform
Automatic responsive control
• Report
Command and control
Collaboration, coordination and cooperation
15
Our Challenge in Cyber
INFORMATION & APPLICATIONS
Share with partners
Protect against adversaries
In fo rm a tio n P u s h
C o lla b o ra tio n T o o ls
C r o s s -IN T in te llig e n c e
p r o d u c ts
S e le c t P r o file :
P r o file 1
C o lla b o ra tio n b e tw e e n
A n a ly s ts , C o n s u m e rs
W h i t e B o ar d
C h at
V id eo /A u d io
S h ar ed A p p s
P ro d u c t S ta tu s
S ta tu s o f p r o d u c tio n
ta s k s
A
B
S e a rc h
C o lle c tio n S ta tu s
.
.
S ta tu s o f c o lle c tio n ta s k s
.
In fo r m a tio n S e a rc h o f
A ll IN T In te l S o u r c e s
K ey W o rds :
P r o d u c t T a s k in g
E m a il/M e s s a g in g
In p u ts fr o m c o n s u m e r ,
P r o d u c t a v a ila b ility
Everyday
Applications
Our Challenge in Cyber
Emphasis on Sharing
• Easier to exploit
• Good interoperability
• Ease of providing new applications
• User friendly
• Rapid development
Emphasis on Protecting
• Harder to exploit
• Frustration with safeguards &
controls
• Poor interoperability
• Technology obsolescence
• Slower development
Our Challenge in Cyber
Balancing Sharing and Protection
• Harder to exploit
• Good interoperability
• Ease of providing new applications
• User friendly
• Rapid development
Information Assurance
• Available - Making sure the information is there when we need it
• Sharable - Making sure the information can be disseminated to those
who need it
• Integrity - Making sure the information we use, transmit, process, or
stored has not been corrupted or adversely manipulated
• Authorized - Making sure we know and allow those accessing our
information
• Authenticated - Making sure there is someone responsible for the
information being published or disseminated
• Confidential - Making sure the information is protected from
unauthorized disclosure
• Non-Repudiable - Making sure the information is ‘tagged’ so when we
send it – we know it got there, and the recipient knows who sent it
Cyber Actions to Assure Information Capabilities
6. Assure
– Informed sound decisions
– Situational awareness through understanding
– Effective and efficient functional capability (work)
5. Assure effective use of application and production processes
4. Maintain and operate cyberspace
3. Sustain and administrate cyberspace
2. Control and manage the cyberspace configuration
1. Resource, control and manage the cyberspace architecture
20
Protecting Cyberspace
using Risk Management
“A risk assumed by one is a risk assumed by all.”
We can do better than that.
21
Optimizing Risk, Resources and Rewards
Acceptable
Risk
Confidence
Resources
to Achieve
Objectives
Accomplish
the
Mission
Optimal
Capability
Capability
Resources
to Avoid
Failures
Cyber Design & Implementation Must Balance Risk, Rewards and
Resources to Accomplish the Mission
Threat - Vulnerability – Exploitation Matrix
Threat –
Exploitation
Matrix
Exploit
Type
Vulnerability Vector
Human / User
Technical / System
Environmental
Unintended
Negligence, Ignorance,
Lack of Training
System Faults;
Logical, Physical
Natural
Calamities
Exposure
OPSEC Violations
Poor Design
Weak Disclosure Policy
Design Flaws
Weak Classification
Poor Quality
Guidance
Intrusion
Social Engineering,
Manipulation
Lack of Training, Drills
Easiest Exploits
Malicious Software
(Malware)
Mis-Configurations
Natural
Calamities
Natural
Calamities
Most Attended To
23
UNCLASSIFIED//FOUO
Mission Impact Severity Multiplier
Mission Impact
Severity
Multiplier
By increasing severity:
Exploit
Relative Severity Multiplier
Discovery
Bad
x -1
Denial
Worse
x -2
Exposure
Even Worse
x -3
Exfiltration
Worse Still
x -4
Deception
Almost Worst
x -5
Takeover
Worst
X-10
24
Defending Cyberspace Through Risk Management
Adverse Intent
Exploitation
Capability
Risk = f
Asset Value
Information Value
Mission
Accomplishment
Operational Capability
Endeavor Success
Lives at Stake
Threat x Vulnerability x Impact
Assurance Measures
Architecture
Asset & Configuration
Management
Controls, Measures, Safeguards
Policies, Practices, Processes
Education, Training, Awareness
Culture
Defending Cyberspace Through Risk Management
Risk = f
Threat x Vulnerability
Vulnerability =
x Impact
Assurance Measures
f
Access to System Exposure &
Procedural Weaknesses
Public:
Low Access
Partners:
Medium Access
Private:
Selective Access
Administrators: High Access
Users
System
Procedural
x
x
Exposure Weakness
Trust
No certification
No updates
No virus protection
Poor design
No scanning
No firewalls
Weak passwords
Exposed info storage
No backups
Improper disposal
Weak physical protection
Poor training
System design and operation must accommodate varying trust levels
Controlling Risk
Minimize
Risk = f
Threat x Vulnerability x Impact
Assurance Measures
Maximize
Limit Exposure:
Internet
Intranet
Extranets
Computer Hygiene
Software updates
Virus protection
Bot detection
Clean dead files
Manage Access
Adequate Protection
Access control lists
Physical Protection
High assurance guards
Electronic Isolation
Cryptographic Isolation Intrusion detection
“DMZ” & Proxies
Best Practices
Enhanced Practices
Backup data
Honey pots
Manage passwords
Intrusion traps
Maintain vigilance
Redundancy
Understand threats
Diversity
Cyber Defense Solution Elements
1. Compartmentalization
a. Protection of Information Controls
b. Separation of Risk Tolerance Deltas
2. Precise Discretionary Access Control
3. Information Conditioning
4. Cyber Awareness
5. Infostructure Control
6. Infostructure Concealment
Acceptable
Risk
=
Threshold
Information
Sensitivity
User
Trust
=
Required
Security
28
Protecting Cyberspace
through the
Information Assurance Framework
If we can’t describe it, we can’t manage it.
If we can’t manage it, we can’t protect it.
If we’re not building security into the system,
then we’re building the system for the enemy.
29
Cyber Defense Core Depiction
Users
Information
Content
IA / IT / IM
Professionals
System
Infrastructure
Adversaries
30
Cyber Defense Core Depiction – Defense in Depth
USER ACCESS
AND PRIVILEGE
BASED ON
TRUST
Information
Content
Limited
System
Access
Limited
Member
Access
Limited
Information
Access
Community
Enclave
System
Infrastructure
31
Cyber Defense Core Depiction – Defense in Depth
USER ACCESS
AND PRIVILEGE
BASED ON
TRUST
Information
Content
Limited
System
Access
Limited
Member
Access
Limited
Information
Access
Community
Enclave
System
Infrastructure
32
Content-Centric Defense-in-Depth
Leads to IA Measures
1. Information Content
Conditioning & Control
USER ACCESS
AND PRIVILEGE
BASED ON
TRUST
2. Identity Authentication
& Authorization
Information
Content
Limited
System
Access
Limited
Member
Access
Limited
Information
Access
Community
Enclave
System
Infrastructure
6. Education Training &
Awareness
3. Design, Configuration,
Operations & Admin.
7. Continuity of
Operations
4. Cyber Security
Services
5. Physical Security
Services
Information Sharing AND Information Protection
through a seven layer model
Information Assurance Functional Areas
a)
b)
c)
d)
e)
f)
g)
h)
Maintain Integrity
Maintain Availability
Maintain Confidentiality
Manage Trust
Protect Services
Detect Risks
React to Intrusions
Restore Operations
Share
Information
Sustain
Defend
Protect
Information
Respond
Assure the
Mission
Assures communication, collaboration and
information capability for mission accomplishment
Information Assurance Framework
IA Measures
Information
Assurance
Framework
a. Maintain Integrity
c. Maintain Confidentiality
d. Manage Trust
DEFEND
IA Functions
SUSTAIN
b. Maintain Availability
e. Protect Services
f. Detect Risks
RESPOND
g. React to Intrusions
h. Restore Operations
Cost of Implementation >
Framework cells enable higher fidelity in cost-riskbenefit decisions
MITIGATION
CONTROL
Functions
THREAT
RESIDUAL RISK
COST
Mission Impact?
Acceptable Risk?
Acceptable Cost?
36
IAF enables alignment to more accurately target
measures and determine residual risk
Threats
Potential
Vulnerabilities
Controls
Policy
Practices
Remaining
Vulnerabilities
Residual
Risk
Mitigations
Threat Vectors
Functions
Functions
Functions
Functions
Functions
37
IA Readiness Assessments
Reversible
ASSESSMENT
“White Team”
ASSISTANCE
“Green Team”
ANALYSIS
“Blue Team”
EVALUATION
“Red Team”
SUSTAIN
SUSTAIN
E
M
SS s
L S E on
RO AS r a t i
e
NT
CO
O p ons
e
si
or
st
tr u
R e o In
f.
tt
ac
s
sk
Re
Ri
s
e.
ct
ce
te
vi
er
De
tS
d.
t
us
T r ity
gr
te
In
Pr
n
AS
6. Identity Authentication &
Authorization
6. Identity Authentication &
Authorization
4. Security Operations &
Administration
3. Continuity of
Operations
2. Cyber Security
Services
1. Physical Security
Services
FUNCTIONAL
ASSESSMENT
4. Security Operations &
Administration
3. Continuity of
Operations
2. Cyber Security
Services
1. Physical Security
Services
5. Education Training &
Awareness
4. Security Operations &
Administration
3. Continuity of
Operations
2. Cyber Security
Services
1. Physical Security
Services
FUNCTIONAL
ASSESSMENT
FUNCTIONAL
ASSESSMENT
OR
ES
UR E NT
M
6. Identity Authentication &
Authorization
C O N TR O L M EAS UR ES
7. Information Content
Control
C O N TR O L M EAS UR ES
7. Information Content
Control
5. Education Training &
Awareness
e
S
7. Information Content
Control
5. Education Training &
Awareness
ec
ai
ag
ON
ot
an
nt
ai
ES
UR E NT
M
TI
M
M
AS
Information
Assurance
Framework
RESPOND
c.
a.
n
e
S
NC
DEFEND
b.
E
M
SS s
L S E on
RO AS r a t i
e
NT
CO
O p ons
e
si
or
st
tr u
R e o In
f.
tt
ac
s
sk
Re
Ri es
e.
ct
c
te
vi
er
De
tS
d.
ec
t
us
T r ity
gr
te
In
ot
ai
FU
ag
ON
SUSTAIN
Pr
an
nt
ai
ES
UR E NT
M
TI
M
M
AS
Information
Assurance
Framework
RESPOND
c.
a.
n
S
NC
DEFEND
b.
E
M
SS s
L S E on
RO AS r a t i
e
NT
CO
O p ons
e
si
or
st
tr u
R e o In
f.
tt
ac
s
sk
Re
Ri es
e.
ct
c
te
vi
er
De
tS
d.
ec
t
us
T r ity
gr
te
In
FU
e
ON
RESPOND
ot
FUNCTIONAL
ASSESSMENT
DEFEND
ai
1. Physical Security
Services
Specific
set of
measures of
the IA
Framework
is subject to
the
proficiency
activity
ag
2. Cyber Security
Services
A single
functional
area of the
IA
Framework
is subject to
the
proficiency
activity
an
3. Continuity of
Operations
C O N TR O L M EAS UR ES
4. Design, Configuration,
Operations & Administration
All elements
of the IA
Framework
are subject
to the
proficiency
activity
Several
selected
major areas
of the IA
Framework
are subject
to the
proficiency
activity
Pr
s
5. Education Training &
Awareness
TI
Class 4
c.
on
si
CO NT RO L M E ASU RE S
6. Identity Authentication &
Authorization
nt
ai
tru
p
In
O
s
7. Information Content
Conditioning & Control
NC
Class 3
M
e
ce
ity
Information
Assurance
Framework
M
or
s
t
gr
S
RE T
SU EN
E A S SM
M
s
L SE o n
R O A S a ti
er
st
NT
Re
o
vi
sk
er
te
us
In
Tr
Ri
tS
ct
tt
te
ac
De
Re
FU
Class 2
b.
a.
CO
f.
e.
ec
n
e
NS
ot
ag
O
SUSTAIN
RESPOND
d.
Pr
ai
nt
TI
an
ai
NC
M
M
Information
Assurance
Framework
c.
a.
b.
FU
DEFEND
Class 1
Suggestions, Solutions and Our Way
Ahead
It’s a journey, not a destination;
but there are milestones and checkpoints along the way.
39
Suggested Approach
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
Categorize information to denote the impact of denial or loss
Determine the extent of exposure to which community
Develop an internet, intranet and extranet design strategy
Develop security measures for each network zone
a) Isolation means
b) Access controls
c) Intrusion detection
Establish policies, practices and procedures
a) Ensure a chain of accountability
Manage system interfaces
Maintain computer host hygiene and control
Provide for awareness, training and education
Maintain readiness:
Monitor – Detect – React – Respond – Restore
Frequently groom and refresh
Use teams of experts
White – Blue – Green – Red
Resource (fund) accordingly
Cyberspace Operational Solutions
• Defendable cyber infrastructure
– Shapeable to meet the threat and respond to emergent operational needs
– Accommodates risk profiles attendant to each COCOM’s specific mission set so
that a risk assumed by one is not a risk assumed by all
• Command Attention to Network and Computer Hygiene
• Sufficient billets and manpower to maintain, shape and operate Cyberspace
• Adequate instrumentation to provide situation awareness, indications and
warnings that can be tailored to each COCOM mission
– To support a tailorable, scalable red/blue cyber dashboard that can support a
cyber common operational picture (COP)
• Authorities and procedures
– To direct cyber activities
– To rapidly ask, task or execute cyber efforts in support of theater missions
• Audit and assessment capability
– To perform deep analysis to discover emergent threat vectors and system
vulnerabilities
• Enhanced planning capability
– To prepare for cyber configuration to be implemented upon mission execution
41
USPACOM’s Cyber Defense Development Approach
• Primary Goal: C2 Assurance
• Challenges: Our C2 infrastructure – “Infostructure,” is inadequate to
support the future needs of decision making and cyber defense
– Agile segmentation without isolation
– Responsive, flexible acquisition
– Defense in Depth
– Agility versus robustness
• Development Drivers
– Unified Command and Control (UC2)
– Computer Aided Network Defense-in-Depth (CANDID)
– Discretionary Risk Acceptance
• Through Cyber Joint Operating Areas (Cyber JOA)
• Operational Network Domains (OND)
• Primary Effort: Joint Information Environment Increment 2
42
Questions, Answers and
Discussion