{"id":11018,"date":"2015-08-12T15:55:09","date_gmt":"2015-08-12T19:55:09","guid":{"rendered":"https:\/\/lexingtoninstitute.org\/?p=11018"},"modified":"2015-08-15T13:48:11","modified_gmt":"2015-08-15T17:48:11","slug":"six-steps-to-securing-dods-networks-for-the-21st-century","status":"publish","type":"post","link":"https:\/\/www.lexingtoninstitute.org\/six-steps-to-securing-dods-networks-for-the-21st-century\/","title":{"rendered":"Six Steps to Securing DoD\u2019s Networks for the 21st Century"},"content":{"rendered":"

(A Forthcoming Lexington Institute Study)<\/strong><\/span><\/h2>\n

The Department of Defense (DoD) is at an inflection point with respect to its information networks and their security. The U.S. military is more dependent than ever on its networks which are continually expanding, incorporating new technologies such as mobile devices and Cloud services and adding new features. In order to more effectively, efficiently and securely exploit the advantages inherent in a networked force, DoD wants to change how its networks are organized and managed. The goal of this effort is greater standardization, end-to-end visibility, improved situational awareness, economies of scale, reduced operating costs and improved security in the face of an evolving threat.<\/p>\n

As recent events have demonstrated, the threats to DoD\u2019s networks are increasing in numbers and sophistication. It is imperative that DoD create a next generation cyber security system, one that can counter evolving threats, including malign insiders, provide security from the chip to the Cloud, improve both the speed and effectiveness of defenses and do all this while reducing costs. The goal should be to achieve a seamless network defense, a single pane of glass, with end-to-end visibility, situational awareness, rapid information sharing and threat detection and mitigation at network speed.<\/p>\n

The Defense Information Systems Agency (DISA), DoD\u2019s premier combat support agency, is responsible for, among other missions, joint defensive cyberspace operations. DISA invested more than a decade and significant resources in providing DoD\u2019s network with its first coordinated, department-wide security system, the core of which is the Host-Based Security System (HBSS). HBSS is a commercial off-the-shelf (COTS) based application that has undergone rigorous security, functionality and compatibility testing that proved its effectiveness on more than 7 million endpoints. When properly managed, with trained operators, kept up to date and fully implemented, HBSS is reported to be extremely effective against today\u2019s spectrum of threat. In order to have secure networks in the 21st<\/sup> Century, DoD must pursue a six step strategy:<\/p>\n

Build on existing investments in security<\/u><\/strong>. It is important that a new security system builds on DISA\u2019s current successful investments and experience with HBSS. \u00a0DoD is simply too large and complex an institution to start from scratch each time a new generation of security is required. Moreover, the current capabilities are still relevant.\u00a0 They have been thoroughly tested and vetted in the real world. If properly maintained, they permit new investments in security to be focused on more challenging tasks such a mitigating the advanced persistent threat. In addition many currently deployed security controls can be leveraged and repurposed to provide additional support for the single security architecture. A decision to start anew, from the ground up, could add hundreds of millions of dollars to the cost of this project, impose significant time penalties (potentially years), require retraining of personnel and, most significantly create the potential for adding new vulnerabilities.<\/p>\n

Create a single security architecture<\/u><\/strong>. This architecture must eliminate stovepipes, reduce access points (the so-called attack surface), consolidate network administration, ensure configuration control and coordination of upgrades, enable end-to-end situational awareness, provides the mechanism for information sharing and supports threat detection and mitigation at network speed. This must be an open architecture of connected security, able to incorporate new applications but based on a single scalable platform and unified framework. A new security architecture presents a unique opportunity to build security into the network from the initial stage of system design. Now is the time for DoD to think strategically and optimize the enterprise, networks and security architecture for long-term growth, reduced risk of surprise and the maximum operational flexibility.<\/p>\n

Establish an overall system manager for the new architecture<\/u><\/strong>. Given the scale, complexity and changing character of DoD\u2019s networks, it is imperative that there be an overall system manager (with policy coordination responsibilities), a single responsible entity that can maintain configuration control while advancing security capabilities across networks. The single manager also would assist DoD in realizing its goals of increased overall enterprise effectiveness and efficiency in the provision of services, particularly security.\u00a0 In close collaboration with the government, the single manager can find its way across the very challenging landscape of DoD enterprise security. In particular, looking ahead, the single manager would support the efficient allocation of resources while avoiding redundancies.<\/p>\n

Build in plans that will allow for growth and adaptation as threats change<\/u><\/strong>.\u00a0Cyber security is the quintessential competitive strategy in which each offensive action produces a corresponding defensive measure which, in turn, propels the offense to renew its search of another avenue of advance. The need for newer, more capable cyber solutions will be driven first and foremost by changes in threats, but also by the development of new network designs and management strategies, the addition of new network technologies and even by changes in cyber security capabilities such as next-generation non-host-based security technologies.\u00a0 Security must be more pro-active rather than reactive and cover the entire network life cycle. New technologies and tactics, techniques and procedures are needed to detect anomalous behavior, minimize the duration of successful intrusions and mitigate the effects of successful attacks.<\/p>\n

Empower the new architecture through increased automation<\/u><\/strong>. It is clear that the key to successful network security rests with the speed at which anomalies can be detected, prospective threats analyzed, mitigation efforts initiated and adversaries\u2019 dwell times on the network reduced. The sheer size of DoD\u2019s array of networks, their state of constant flux, the increasing speed at which information is moving on its networks and the growing sophistication of threats has already made it impossible to provide the required level of situational awareness and timely sense and response to intrusions solely with human security personnel. The ability to counter sophisticated threats employing purpose-built tools and targeted malware will require the extensive use of automated detection and response systems and adaptive threat prevention routines operating at network speeds. Automation can reduce manpower costs while reserving critical, highly trained personnel for the most important cyber missions.<\/p>\n

Exploit the strength of the commercial market<\/u><\/strong>. <\/strong>Expanding the effectiveness and coverage of cyber security systems in a timely manner and at an affordable cost will necessitate exploiting commercially driven research and development and commercially available products. The private sector has demonstrated an ability to rapidly develop, field and integrate new solutions. Given the pace at which the threat is evolving, this is critically important to managing the problem. DoD must leverage commercial IT products and services if it is to reduce the costs for cyber security and improve overall security effectiveness. Where possible, DoD needs to acquire COTS capabilities because government off-the-shelf technologies lag in effectiveness, are not developed in cybertime, and are not cost effective in 2015. The Pentagon also needs to study the methods employed by the private sector to reduce manpower usage and other costs associated with cyber security.<\/p>\n

 <\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

(A Forthcoming Lexington Institute Study) The Department of Defense (DoD) is at an inflection point with respect to its information networks and their security. The U.S. military is more dependent than ever on its networks which are continually expanding, incorporating new technologies such as mobile devices and Cloud services and adding new features. In order […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"yoast_head":"\nSix Steps to Securing DoD\u2019s Networks for the 21st Century - Lexington Institute<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lexingtoninstitute.org\/six-steps-to-securing-dods-networks-for-the-21st-century\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Six Steps to Securing DoD\u2019s Networks for the 21st Century - Lexington Institute\" \/>\n<meta property=\"og:description\" content=\"(A Forthcoming Lexington Institute Study) The Department of Defense (DoD) is at an inflection point with respect to its information networks and their security. The U.S. military is more dependent than ever on its networks which are continually expanding, incorporating new technologies such as mobile devices and Cloud services and adding new features. In order […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lexingtoninstitute.org\/six-steps-to-securing-dods-networks-for-the-21st-century\/\" \/>\n<meta property=\"og:site_name\" content=\"Lexington Institute\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-12T19:55:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-08-15T17:48:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lexingtoninstitute.org\/wp-content\/uploads\/2015\/02\/lex_share.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Daniel Gour\u00e9, Ph.D.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@LexNextDC\" \/>\n<meta name=\"twitter:site\" content=\"@LexNextDC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daniel Gour\u00e9, Ph.D.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/six-steps-to-securing-dods-networks-for-the-21st-century\/\",\"url\":\"https:\/\/www.lexingtoninstitute.org\/six-steps-to-securing-dods-networks-for-the-21st-century\/\",\"name\":\"Six Steps to Securing DoD\u2019s Networks for the 21st Century - Lexington Institute\",\"isPartOf\":{\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#website\"},\"datePublished\":\"2015-08-12T19:55:09+00:00\",\"dateModified\":\"2015-08-15T17:48:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/0c1d5c3983542d8075721908012bed74\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.lexingtoninstitute.org\/six-steps-to-securing-dods-networks-for-the-21st-century\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lexingtoninstitute.org\/six-steps-to-securing-dods-networks-for-the-21st-century\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/six-steps-to-securing-dods-networks-for-the-21st-century\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.lexingtoninstitute.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Six Steps to Securing DoD\u2019s Networks for the 21st Century\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#website\",\"url\":\"https:\/\/www.lexingtoninstitute.org\/\",\"name\":\"Lexington Institute\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lexingtoninstitute.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/0c1d5c3983542d8075721908012bed74\",\"name\":\"Daniel Gour\u00e9, Ph.D.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e98f7534865707f35c080691716b6a28?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e98f7534865707f35c080691716b6a28?s=96&d=mm&r=g\",\"caption\":\"Daniel Gour\u00e9, Ph.D.\"},\"url\":\"https:\/\/www.lexingtoninstitute.org\/author\/daniel-goure-ph-d\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Six Steps to Securing DoD\u2019s Networks for the 21st Century - Lexington Institute","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lexingtoninstitute.org\/six-steps-to-securing-dods-networks-for-the-21st-century\/","og_locale":"en_US","og_type":"article","og_title":"Six Steps to Securing DoD\u2019s Networks for the 21st Century - Lexington Institute","og_description":"(A Forthcoming Lexington Institute Study) The Department of Defense (DoD) is at an inflection point with respect to its information networks and their security. The U.S. military is more dependent than ever on its networks which are continually expanding, incorporating new technologies such as mobile devices and Cloud services and adding new features. In order […]","og_url":"https:\/\/www.lexingtoninstitute.org\/six-steps-to-securing-dods-networks-for-the-21st-century\/","og_site_name":"Lexington Institute","article_published_time":"2015-08-12T19:55:09+00:00","article_modified_time":"2015-08-15T17:48:11+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.lexingtoninstitute.org\/wp-content\/uploads\/2015\/02\/lex_share.png","type":"image\/png"}],"author":"Daniel Gour\u00e9, Ph.D.","twitter_card":"summary_large_image","twitter_creator":"@LexNextDC","twitter_site":"@LexNextDC","twitter_misc":{"Written by":"Daniel Gour\u00e9, Ph.D.","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.lexingtoninstitute.org\/six-steps-to-securing-dods-networks-for-the-21st-century\/","url":"https:\/\/www.lexingtoninstitute.org\/six-steps-to-securing-dods-networks-for-the-21st-century\/","name":"Six Steps to Securing DoD\u2019s Networks for the 21st Century - Lexington Institute","isPartOf":{"@id":"https:\/\/www.lexingtoninstitute.org\/#website"},"datePublished":"2015-08-12T19:55:09+00:00","dateModified":"2015-08-15T17:48:11+00:00","author":{"@id":"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/0c1d5c3983542d8075721908012bed74"},"breadcrumb":{"@id":"https:\/\/www.lexingtoninstitute.org\/six-steps-to-securing-dods-networks-for-the-21st-century\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lexingtoninstitute.org\/six-steps-to-securing-dods-networks-for-the-21st-century\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.lexingtoninstitute.org\/six-steps-to-securing-dods-networks-for-the-21st-century\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lexingtoninstitute.org\/"},{"@type":"ListItem","position":2,"name":"Six Steps to Securing DoD\u2019s Networks for the 21st Century"}]},{"@type":"WebSite","@id":"https:\/\/www.lexingtoninstitute.org\/#website","url":"https:\/\/www.lexingtoninstitute.org\/","name":"Lexington Institute","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lexingtoninstitute.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/0c1d5c3983542d8075721908012bed74","name":"Daniel Gour\u00e9, Ph.D.","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.lexingtoninstitute.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e98f7534865707f35c080691716b6a28?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e98f7534865707f35c080691716b6a28?s=96&d=mm&r=g","caption":"Daniel Gour\u00e9, Ph.D."},"url":"https:\/\/www.lexingtoninstitute.org\/author\/daniel-goure-ph-d\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/posts\/11018"}],"collection":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/comments?post=11018"}],"version-history":[{"count":0,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/posts\/11018\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/media?parent=11018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/categories?post=11018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lexingtoninstitute.org\/wp-json\/wp\/v2\/tags?post=11018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}