E N D
1. LandWarNet 2008
2. PURPOSE: To provide an overview of the Army’s Information Assurance Program
OBJECTIVES:
To present key challenges
To highlight select programs
and initiatives
5. Changes in Threat Perspectives 1995 – Life was simple
Few foreign developed tools considered
Presence of a non U.S. citizen is a red flag
Trusted coalition partners is a short list
Threat to networks is not widely understood
Threat not that sophisticated –Jolt cola and SATAN perceptions
Limit access to the INTERNET
7. Changes in Threat Perspectives 2008 – Life is more complicated
Research Centers support multinational corporations are located In Russia, China and India
Multinational boards include non U.S. citizens
Demand for information sharing with coalition partners is significant – and really necessary
Supply Chain concerns
Theft of information
Organized crime
Personal Identifiable Information (PII) – identity theft
Technology – P2P/collaboration/virtual
Threat is more sophisticated
Solar Sunrise -- Israel
Moonlight Maze – Russian
Titan Rain -- China
9. Can You Guarantee 100% Security Can you guarantee with this IA investment that my information will be 100% protected ?
Information Assurance investments looked at as something separate, something special, something out of the norm.
After spending 1M plus for a tank does the decision maker ask if the provider can guarantee it will be 100 % assured of not being damaged/destroyed ?
Depth of armor
Reactive technology
Speed
Smoke
Stand off capability
IA is not always looked at as an integral and key enabler to facilitate the Integrity, confidentiality and availability of the information necessary to execute a mission.
13. Turn aShip in a Bathtub
14. What is the Challenge ? A Firewall/IPS that does not have adequate policy rules and or is not audited is a door stop !
The best Certification and Accreditation (C&A) and Networthiness process in the world is worthless if there is no daily follow up and compliance !
Need to get away from the “3 year” mind set
Need compliance checks
Lack of compliance needs to be painful !
Lack of enterprise results in pockets of excellence and pockets of failure.
15. What is the Challenge ?
16. Information, Information, Information In modern conflict, information as one of the eight elements of combat power (The other elements are leadership, movement and maneuver, intelligence, fires, sustainment, command and control, and protection) has become as important as lethal action in determining the outcome of operations.
18. HQDA IG IA Division Operational
IA Self Assessment Training Module
Question
Source
Standard
Determine standard is being met
Limited number of categories and questions
ALARACT directing use of the self assessment tool to conduct a self assessment
20. Authority To Connect (ATC) DISA requires customers to renew a request for their circuit connectivity.
To be successful the customer must have a valid IATO/ATO.
2008 is the first year that the Army is tracking the status of ATCs.
2008 is the first year that JTF GNO is disconnecting circuits that cannot meet the standards for an ATC.
21. Army NIPR Circuits
22. Army NIPR Circuits
29. Army Web Risk Assessment Cell Reviews:
Public assessable web sites
Army BLOGs
Works with owner/web manager to remediate
Trends:
Personably Identifiable Information
30. AWRAC Tracking Database Snapshot July 2008
33. IAVA – Hosts Scanned
34. IAVA – Patches Not Applied
35. IAVA- Sites Visited
36. IAVA – Army Annual Vulnerability Rate
40. Systems requiring Accreditation must have an Authority to Operate (ATO)
Systems need to have a Plan of Action and Milestones (POAM)
System owners must test their DoD 8500.2 Security Controls on Annual Basis
All Systems must have a Contingency Plan and test that Contingency Plan on an Annual Basis
System owners must conduct an annual security review
Annual IA training requirement
Army Portfolio Management System (APMS)
41. Army FISMA Statistics
43. Training: System Administrator
44. Training: e-Learning
46. Certificates Approved For FY08
48. Visual of legacy equipment and what they are being replaced by. This chart does not represent one for one
Visual of legacy equipment and what they are being replaced by. This chart does not represent one for one
49. Prior to FY08
Stopped issuing - KG-84, KG-94, KG-175, STUIII,
Production stopped- KG-175AC (classic), DTD, KIV-7 HSB, KG-75
New Technology- TALON, SecNet 11, SecNet 54, KG-250
FY08-
Stop issuing KG-175 AC, KY-68, KIV-7, KIV-19
Production stopped- KG-175 E-100, KG-175B, KG-235, KG-240
New Technology- KG-175D, KIV-7M, KIV-19M, KY-100s, vIPer, ECC, SME-PED, SKL, TALON, KG-255, SecNet 54
FY09-
Stop issuing- KOV-14
Production stopped- TBD
New Technology- 10 GB TACLANEs, other TBD
FY10
Not supported- STUIII
51. Public Key Infrastructure Identity Management
Logical access
Physical access
Select groups
Security - Security - Security
53. ON CYBER PATROL