Showing posts with label Area: Information Assurance. Show all posts
Showing posts with label Area: Information Assurance. Show all posts

January 19, 2012

Information Assurance, Network Defense and Interoperability of U.S. Armed Forces, as reported by DOT&E Annual Assessment


News Report

The U.S. DoD has recently published the Defense Department's Director, Operational Test and Evaluation FY2011 Annual Report. The document reports the findings of a systematic review by the Office of Director, Operational Test & Evaluation (DOT&E) of recent major U.S. acquisition programs that experienced delays. These programs were examined to determine the causes and lengths of program delays, and the marginal cost of operational test and evaluation.

The report emphasizes that each U.S. Service operational test agency has developed methods for rapidly evaluating systems fulfilling urgent operational needs, including combining testing with the training of the first unit to be equipped and conducting quick reaction assessments. A typical example of such approach is the Network Integration Evaluation (that has been extensively covered by this blog, and that resulted one of the key C4I trends of the last period). Network Integration Evaluations (NIEs) are executed twice a year at Fort Bliss, Texas, and White Sands Missile Range, New Mexico, in order to provide a venue for operational testing of U.S. Army acquisition programs with a particular focus on the integrated testing of programs related to tactical communications networks supporting command and control. The exercises are also intended to provide an operationally realistic environment to evaluate new emerging capabilities that are not formal acquisition programs.

Together with NIESs, a substancial effort was dedicated by U.S. DoD to assess the situation concerning Cyber Warfare, Information Assurance and Interoperability. U.S. DoD recognizes the importance of applying the same approach of the NIE to these domains, and in fact it is planned that by the end of 2014 the Department should have in place all the capabilities and processes to perform selected evaluations of offensive and defensive cyber-warfighting capabilities in representative cyber‑threat environments. This will allow to assess how well U.S. fighting forces can defend against or fight through the most serious cyber attacks, as well as perform defensive and appropriate response. In order to apply these enhanced capabilities across all major exercises and acquisition programs, the Department will need to identify additional resources to expand the capacity and capabilities of the Red Teams who portray advanced cyber adversaries. This would include funding the cyber-ranges and modeling and simulation capabilities that provide operationally realistic environments for those activities inappropriate for live networks, as well as assessment teams to develop rigorous plans to ensure the cyber adversary is accurately portrayed, and assess the effects of representative cyber adversary activities.

According to the DOT&E report, hoevewev, important analyeses and assessments on cyber, interoperability and information assurance have been carried out already in 2011. In February 2011, the Chairman of the Joint Chiefs issued an Executive Order directing that all major exercises include realistic cyber-adversary elements as a training objective to ensure critical missions can be accomplished in cyber-contested environments. During 2011, the DOT&E Information Assurance (IA) and Interoperability (IOP) Assessment Program performed 23 assessments during combatant command and Service exercises; four of these assessments involved units preparing to deploy (or already deployed) to Iraq or Afghanistan.

The results were not so good...

Information Assurance and Network Defense

The IA posture observed during the assessed exercises was considered not sufficient to prevent an advanced adversary from adversely affecting the missions that were being exercised. DOT&E also observed modest improvements in certain areas of network defense, but there were also several areas in which prior progress has declined. In general, information technology and personnel were not fully prepared to operate in realistic and contested cyberspace conditions. Red Teams generally overcame defenses during exercises by only moderately increasing their level of effort over previous years.

Specifically, most Red Teams reported increased difficulty in penetrating network defenses, but results show that with sufficient time, Red Teams routinely managed to penetrate networks and systems. Detection rates of network intrusions remained low, and the ability of network defenders to detect subsequent exploitations of network data was minimal; most assessments witnessed large exfiltrations of operationally significant data. The extracted data was available, in only a few cases, to the exercise opposition force for tactical/strategic exploitation, which in effect created a more benign exercise environment than postulated by DIA and the intelligence community.

The assessments also showed a decrease in the use of backup files and systems, proper audit logging and reviews, logical access controls, incident planning, and vulnerability management. There was an overall increase in high-risk vulnerabilities observed (indicating a decrease in effective patch management), as well as a decrease in effective use of anti-virus tools and software (including failures to routinely update virus signatures). Although the ongoing fielding of the Host Based Security System (HBSS) has resulted in many local improvements in network protection from intrusion as well as intrusion detection, the majority of HBSS suites observed were found to be incorrectly or ineffectively configured.

Interoperability

The 2011 assessments found that interoperability issues encountered by the training audience typically hindered, but rarely prevented, mission accomplishment; this is due primarily to operators who developed and executed workarounds that may have preserved the timeliness and accuracy of mission data at the cost of the efficiency or level of effort required. Even though missions were generally accomplished, the workarounds usually increased operator workload, and often resulted in degraded effectiveness in completing mission tasks. Assessment teams documented measurable impacts to the timeliness, accuracy, and efficiency of operational data handling in these assessments.

A major source of poor interoperability was often found to be an incomplete set of interface requirements, or uncoordinated upgrades and updates to interdependent systems. Some of the observed mission impacts include: delays in critical battlefield situational awareness, reductions in forces available for operational tasking due to delays or inaccuracies in planning systems, re-allocation of personnel from less critical tasks to support increased manual efforts for critical ones, large-scale exfiltration of operationally significant data from force planning systems, modification of blue-force operational data by opposition force actors, manual transfers of information between systems unable to automatically interoperate.

It was also found that less than one-third of all systems observed during assessments had been fully certified for interoperability, although configuration management and documentation was satisfactory in almost 9 of 10 systems reviewed. Despite the lack of interoperability testing/certification, local authorities certified these systems for network operation. In some instances, major software suites were found to be in operational use despite having not completed operational testing or interoperability certification.

Unresolved interoperability issues, coupled with low-to-moderate level threats, were observed to be sufficient to adversely affect the quality and security of mission critical information in a way that could, and did degrade, mission accomplishment. Interoperability and IA problems are rarely observed in isolation from each other, but are frequently interrelated.

In 2012, DOT&E will continue to support the implementation of more realistic cyber threats in exercises and will report both the IA and IOP results of these assessments.

References: U.S. DoD (1)

January 12, 2012

API's SST Lightweight Liason Kit provides secure portable communications


News Report

As reported in a recent press release, API announced the availability of its new secure, portable communications suite, the SST™ Lightweight Liaison Kit. At just 24lbs (11kg) the Lightweight Liaison Kit is a discreet, lightweight, rugged sealed case-based suite. It is completely customizable and designed to incorporate the customer’s choice of cryptography, in addition to the secure laptop, satellite terminal, scanner, power, and communications interfaces.

Comments

The Lightweight Liaison Kit is designed to be easily carried as an inconspicuous, ultra-portable personal computing and communication solution,” said Matthew Richards, Managing Director, SST, “A key component is the rugged TEMPEST Level A laptop -- at just 6lbs (2.8kg), it’s a revolution in design and weighs about half a normal TEMPEST laptop.

References: API Technologies (1)

December 15, 2011

Secure Cross Domain Data Transfers with Raytheon's High Speed Guard


News Report

As announced in a recent press release, Rayheon's High Speed Guard cross domain technology (HSG) is now commercially available as an off-the-shelf product. High Speed Guard, previously offered as a service, has been on the U.S. Department of Defense's Unified Cross Domain Management Office baseline list of approved solutions since May of 2010.

The new HSG 3.0.3 release lowers data center maintenance cost and improves monitoring by enabling consolidated network management. Previously, customers would pay for each additional feature that was added to the product. Now, through commercialization of HSG, customers can benefit from product enhancements at no charge as part of a standard maintenance agreement. Another advantage of commercialization is that HSG will no longer be sold as an appliance. This allows customers' freedom of choice in selecting a hardware platform on which to run HSG

The Technology

The sharing and movement of data from a wide variety of sources is essential to the rapid, accurate, and precise execution of almost all applications. Modern military, intelligence, and law enforcement operations, in particular, critically depend on a timely sharing of information. Data collected at higher security levels is typically processed into intelligence meant to be shared at lower security levels, including releasable data for coalition partners. Command and control systems in the field require automated access to higher security level tasking and reporting systems.

Unfortunately, the persistent threat of cyber attack, penetration, and data loss requires that only the most secure methods are utilized to allow information sharing and transfer.

Cross domain solutions provide the ability to manually or automatically access or transfer between two or more differing security domains and thus enable transfer of information among incompatible security domains or levels of classification. Current security policies require a trusted entity to independently validate data being moved between top secret, secret, releasable and unclassified networks. These products are commonly known as trusted guards, high assurance guards, or just guards. Guards typically function as proxies, providing network separation between the two systems being connected.

High Speed Guard™ (HSG) is an accredited software solution that enables highly complex, bi-directional, automated data transfers between multiple domains. HSG has demonstrated the fastest bi-directional transfer rates of more than 9 gigabits per second (Gb/s) on dual processor commodity servers, running a hardened Red Hat® Enterprise Linux® operating system with a strict Security Enhanced Linux (SELinux) policy.

HSG supports a wide variety of data transfer scenarios through the use of flexible transfer mechanisms and extensive data support. These include web services, flow real-time Moving Pictures Experts Group (MPEG2 and MPEG4) video, transfer imagery of multiple formats, imagery metadata files, eXtensible Markup Language (XML), inter-system messaging, Ground Moving Target Indicator (GMTI) data, and a wide variety of proprietary data formats.

Multiple accredited transfer mechanisms provide a variety of fixed security protections and secure transfer methods. These mechanisms include:
  • Streaming Video. High-Speed Guard enables real-time video streaming while providing unparalleled control and auditing of video streams through its MPEG2 parsing capability. This validates key metadata fields, including classification and release caveats. The High-Speed Guard provides the same validation capability for video clip files.
  • Service-Oriented Architecture (SOA) Web Services. High-Speed Guard includes built-in support forWeb services utilizing HTTP. In addition to providing complete inspection of all HTTP headers, the XML parsing capabilities provide full validation support for SOAP based services. Complete support is also provided for SOAP attachments, enabling product retrieval services with multi-gigabyte payloads, while enforcing complete data inspection routines.
  • High Performance Transfer. High-Speed Guard delivers data transactions through simultaneous, bi-directional information transfers using separate transmission sockets. This allows it to sustain rates of more than 9Gb/s on two CPU commodity commercial off-the-shelf servers running Red Hat Enterprise Linux 5 with a Strict SELinux policy.
  • Automated Secure Transfer (AST). High-Speed Guard supports file “drop box” transfers utilizing Secure Shell’s Secure Copy or FTP. AST validates files using the same rule engine as other High-Speed Guard services, a COTS virus scanner, digital signatures, or any combination thereof. Interaction with remote systems is highly customizable, including the mechanism used to indicate files are ready for transfer. Failed files can automatically be re-directed to a HRM. AST supports a “one-to-many” capability for copying files to multiple destinations in a single transaction.
High Speed Guard is deployed with an audit configuration that meets standard requirements across the cross domain community. Each deployment is enhanced with auditing specific to the data flows and security policies for that deployment. This unique auditing is driven by the Rule Engine, permitting the security policy to send any data deemed appropriate to the audit trail at any time. HSG supports local and remote log consolidation of the standard operating system syslog, binary auditing, and data transfer logging. All log and audit data is actively collected, parsed and reduced for immediate administrator notification of security eventsƒ.

High Speed Guard is engineered to satisfy cross domain security requirements for Top Secret/SCI and Below Interoperability (TSABI) and Secret and Below Interoperability (SABI) C&A processes. Multiple customers, including NGA, Federal Bureau of Investigation (FBI), Missile Defense Agency (MDA), and several classified customers have deployed HSG and received accreditation under Director of Central Intelligence Directive (DCID) 6/3, National Institute of 800-53 and 8500.2 security controls.

The Context

High-Speed Guard received its first certification and accreditation in 1998. Since then, it has been fielded to the National Geospatial - Intelligence Agency, Air Force and several other agencies that require critical infrastructures that guard U.S. classified information.

In 2002, High-Speed Guard became certified against Director of Central Intelligence Directive 6/3, Protection Level 4 - Integrity and Availability High, and Appendix E requirements.

In 2010, High-Speed Guard was added to the Unified Cross Domain Management Office (UCDMO) Baseline. UCDMO is the U.S. DoD office that provides centralized coordination and oversight of all cross domain initiatives across the U.S. DoD and the Intelligence Community.

Comments

"The commercialization of HSG provides significant advantages to customers," stated Ed Hammersla, chief operating officer for Raytheon Trusted Computer Solutions. "Now they can purchase a product license and maintenance contract and will receive all new product enhancements as well as customer support."

References: Raytheon (1,2,3,4), UCDMO (5)