Defensive Cyber Operations Testing

|1|

Defensive Cyber Operations Testing

Dr. Georgianna "George" Shea MITRE support to D-DT&E

|2|

Who do I support? D- DT&E

Roles and Responsibilities

? Policy, Guidance, and Congressional Reporting.

? Major Program Engagement.

? T&E Workforce

Office of the Secretary of Defense (OSD)

Office of the Undersecretary of Defense for Research and Engineering (OUSD (RE))

Director of Defense Research and Engineering for Advanced

Capabilities

Deputy Director, Developmental Test and Evaluation and Prototyping

Director for Developmental Test and Evaluation

|3|

DCO Defined

DCO ? Defensive Cyber Operations OCO ? Offensive Cyber Operations DCO- RA ? DCO Response Action DCO-IDM ? DCO Internal Defensive Measures

DCO-RA

Cyber Operations DCO DCO-IDM

OCO

|4|

Cybersecurity T&E Guidance 6 Phases

Developmental Testing

Phase 1 Understanding Requirements Phase 2 Characterize the Cyber-Attack

Surface

Phase 3 Cooperative Vulnerability

Identification (CVI)

Phase 4 Adversarial Cybersecurity DT&E

(ACD)

Operational Test

Phase 5 Cooperative Vulnerability and

Penetration Assessment (CVPA)

Phase 6 Adversarial Assessment (AA)

|5|

Cybersecurity T&E Process

PHASES

MDD

MS A

Dev RFP

CDD Validation

Release Decision

MS B

IATT

ATO

MS C

Full Rate Production Decision Review

Materiel Solution

Technology

Analysis Maturation & Risk

DRAFT CDD

Reduction

PDR CDD

Engineering & Manufacturing

Development

Production & Deployment

OTRR IOT&E

CDR TRR

CPD

Operations & Support

Lower Fidelity

Mission-Based Cyber Risk Assessments

Higher Fidelity

Phase 1 Understand Cybersecurity Requirements

Phase 2 Characterize

the Cyber Attack Surface

Cyber T&E analysis and planning

Phase 3 Cooperative Vulnerability Identification

Phase 4 Adversarial Cybersecurity

DT&E

Phase 5 Cooperative Vulnerability and Penetration Assessment

Cyber T&E

DoDI 5000.02, Enclosure 14 ? planning and conducting cyber T&E

Cybersecurity T&E is necessary and required by policy

? Evaluates a system's mission performance in the presence of cyber threats ? Informs acquisition decision makers regarding cybersecurity, resilience and survivability

Phase 6 Adversarial Assessment

5

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download