JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC)

Similar documents
Joint Mission Environment Test Capability (JMETC)

Test Resource Management Center Directed Energy T&E Conference A Joint DEPS ITEA Event

Overview of Infrastructure for Cyber, Interoperability, and Distributed Test

Cybersecurity Test and Evaluation at the National Cyber Range

The Perfect Storm Cyber RDT&E

Test & Evaluation/Science & Technology (T&E/S&T) Cyberspace Test Technology (CTT) Project Overview. 2nd Annual ITEA Cyber Security Workshop

Cyber T&E Standards Panel

Planning and Executing an Integration Test Strategy for a Complex Aerospace System

Naval Surface Warfare Center,

Air Force Test Center

Dr. Steven J. Hutchison Principal Deputy Developmental Test and Evaluation

Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment

Cyber, Command, Control, Communications, and Computers Assessments Division (C5AD)

Test and Evaluation Methodology and Principles for Cybersecurity

Cybersecurity T&E and the National Cyber Range

PCTE Program Management Update. Liz Bledsoe Acting Product Manager Cyber Resiliency and Training

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

UNCLASSIFIED UNCLASSIFIED

UNCLASSIFIED. R-1 ITEM NOMENCLATURE PE D8Z: Data to Decisions Advanced Technology FY 2012 OCO

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

The DoD T&E/S&T Program

M&S Strategic Initiatives to Support Test & Evaluation

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

Cloud Overview. Mr. John Hale Chief, DISA Cloud Portfolio February, 2018 UNITED IN SERVICE TO OUR NATION UNCLASSIFIED 1

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

Cybersecurity Testing

UNCLASSIFIED. R-1 Program Element (Number/Name) PE D8Z / Software Engineering Institute (SEI) Applied Research. Prior Years FY 2013 FY 2014

Forecast to Industry 2017

Introducing Cyber Resiliency Concerns Into Engineering Education

Advancing the Role of DT&E in the Systems Engineering Process:

Air Force Test Center

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Defense Information Systems Network (DISN) Test and Evaluation Network (DTEN)

National Cybersecurity Center of Excellence

Campus IT Modernization OPERATIONAL CONTINUITY FLEXIBLE TECHNOLOGY MODERNIZED SYSTEMS

Cyber Security CRA Overview

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

Current State of Test and Training Integration 2017 ITEA Engineering Workshop

CRIS Cyber Range Lexicon Version 1.0

Systems 2020 Strategic Initiative Overview

Accelerate Your Enterprise Private Cloud Initiative

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Q48: I noticed an amendment to the ASED BAA, what has changed? Q48: The due date for proposals has been extended from November 9 to November 28.

AFCEA BELVOIR. Industry Day. Joint Service Provider Overview. Victor O. Shirley Chief of Staff Joint Service Provider April 4, 2018

Next Generation Enterprise Network- Recompete (NGEN-R) Industry Day

Why UID? LeAntha Sumpter May 11, 2005

Cloud Services. Infrastructure-as-a-Service

Innovate Integrate Standardize Improving the C&A Process to Deliver Today s Technology Tomorrow

UNCLASSIFIED R-1 ITEM NOMENCLATURE

Welcome to the DISA Cloud Symposium

INFORMATION ASSURANCE DIRECTORATE

What is milcloud 2.0?

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Engineered Resilient Systems Advanced Analytics and Modeling in Support of Acquisition

Deployment Explained: DREN IPv6 Pilot

Department of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Advanced Research Projects Agency Overview

About the DISA Cloud Playbook

Marine Corps Tactical System Support Activity

Providing Cybersecurity Inventory, Compliance Tracking, and C2 in a Heterogeneous Tool Environment

UNCLASSIFIED. Exhibit R-2, RDT&E Budget Item Justification Date February 2007 Appropriation/Budget Activity RDT&E Defense-Wide, BA 7

6/18/ ACC / TSA Security Capabilities Workshop THANK YOU TO OUR SPONSORS. Third Party Testing Program Overview.

Quality Collaboration Across Government and Industry in a Time of Profound Changes

Enterprise Ground Services (EGS) Overview. SMC/AD Col Jim Planeaux GSAW Presentation 2 Mar 2016 Distribution A: Approved for Public Release

Securing the End Node in a Cloud World

GSAW Information Assurance in Government Space Systems: From Art to Engineering

An Integrative Framework for Secure and Resilient Mission Assurance

Joint Information Environment

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs

OASD(R&E) HBCU/MI Workshop Test Resource Management Center Opening Remarks. Ms. Denise De La Cruz June 29, 2017

NS2 Cloud Overview The Cloud Built for Federal Security and Export Controlled Environments. Hunter Downey, Cloud Solution Director

NDAA Section 804 Accelerated Test, Evaluation and Certification What is it and How Will it Impact IT Acquisitions?

Joint Federated Assurance Center (JFAC): 2018 Update. What Is the JFAC?

CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security

UNCLASSIFIED. UNCLASSIFIED R-1 Line Item #49 Page 1 of 10

Firewalls (IDS and IPS) MIS 5214 Week 6

Security by Default: Enabling Transformation Through Cyber Resilience

Power Grid Resilience, Reliability and Security Research at Idaho National Laboratory

AMRDEC CYBER Capabilities

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Architecting for Resiliency Army s Common Operating Environment (COE) SERC

NASA/AFSCN/NOAA/Lockheed Martin Ground Network and Space Network Interoperability Plans

PMW 790 Shore And Expeditionary Integration Program Office NDIA San Diego Fall Industry Forum

INFORMATION ASSURANCE DIRECTORATE

Defense Logistics Agency Environmental Management System

UNCLASSIFIED R-1 ITEM NOMENCLATURE. FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018

Federal Data Center Consolidation Initiative (FDCCI) Workshop III: Final Data Center Consolidation Plan

End User Terminal Service

SESSION G.1 CONVERGING LIVE AND VIRTUAL ARCHITECTURES FOR TRAINING, TEST AND EVALUATION

Defense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form

NCOIC Rapid Response Capability (NRRC)

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

Air Virtual At Sea (VAST) Platform Stimulation Analysis

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Cloud-based Open Architecture Approach for Common Enterprise Ground Services

Combat Effectiveness Testing of System of Systems in the Face of Cyber Threat

ASD CERTIFICATION REPORT

Transcription:

JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC) Cyber T&E Initiatives AJ Pathmanathan JMETC Deputy PM for Engineering NCR Technical Director November 14, 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE

DISCUSSION TOPICS Enhanced Distributed Test Infrastructure National Cyber Range (NCR) Regional Service Delivery Points (RSDP) Additional Cyber T&E Initiatives 2 13 Nov 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE 2

National Cyber Range (NCR) 3 13 Nov 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE 3

NATIONAL CYBER RANGE (NCR) ORLANDO, FL Oversight Transitioned program from the Defense Advanced Research Projects Agency (DARPA) to the TRMC in October 12 TRMC charged with functionalizing the capabilities for use by the Test, Training, and Experimentation communities Goal Create a secure, self-contained facility that can rapidly emulate the complexity of defense & commercial networks, allowing for cost-effective and timely testing Range Features Automated range build-out capability Automated range sanitization User friendly environment design and test planning tools Supports multiple concurrent tests events at varying classifications 4 13 Nov 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE

NCR AUTOMATED CYBER TEST PROCESS Step 6: Sanitize HW and virtually put HW/SW resources back in pool Start with a common pool of HW /SW Resources and Cyber Tool Set Running a Cyber/Test Evaluation Step 1: Utilize Test Spec Tool to define end to end aspects of test Sanitize resources Define Test Step 5: Test team validates environment, installs System Under Test and runs test/collects data using toolset Run Test Allocate Resources Step 2: Automated Scheduler determines what resources from the pool are needed and allocates them to test Step 4: Range Configuration Tools automatically configure and verify the SW you need to run test Configure the SW Configure the HW Step 3: Range Configuration Tools automatically wire HW to the appropriate configuration Efficiency and Accuracy via Automation 5 13 Nov 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE

NCR TEST TEAM Flexible Model End to end test support You give us a test specification or asset list and we give you a configured or empty testbed Other services Cyber and testing SME Develop threat vectors Custom traffic generation Custom sensors and visualization Integrate custom devices or software assets Custom data analysis Easily incorporate distributed event resources Remote red/blue teams Specialty or kinetic assets Additional computing resources 6 13 Nov 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE

NCR Event Examples HONOR: US Pacific Command (PACOM) sponsored event to test scalability of the Virtual Secure Enclave (VSE) Architecture 25 trials executed over 108 hours (8 AM Monday to 8 PM Friday) Automated Reconfiguration & Data Collection: 45 hours Test Time: 63 hours of testing time Testing Intervals: 1.8 hours Efficiency: 58.3% JAVELIN: DOT&E sponsored event to demonstrate interoperability with other DoD cyber testing resources (JCOR, Sandia, TSMO) JCOR/NCR Shared Infrastructure Network infrastructure Control network: DHCP hosted at NCR Experiment network: DHCP hosted at JCOR Control infrastructure Experiment coordinated from NCR Log collection and environment reset centrally executed from NCR Host configuration Single NCR-provided VM image was used at both NCR and JCOR Conducted at different classifications concurrently Enables large-scale scenarios to be tested efficiently 7 13 Nov 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE 7

Regional Service Delivery Points (RSDPs) 8 13 Nov 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE 8

REGIONAL SERVICE DELIVERY POINTS (RSDPS) The Regional SDPs (RSDPs) will: provide increased capacity and scalability to create persistent, representative cyber-threat environments provide common range services (i.e. traffic generation, simulation, instrumentation, visualization, and integrated event management) be flexible and adaptable to evolving users requirements leverage the latest technology to deliver cost and performance efficiencies (virtualization, rapid reconstitution) Challenge: Accreditation of MILS architecture Potential hurdles with sanitization and segregation Address Capacity & Capability Gaps 9 13 Nov 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE

RSDP: SCHEDULE Successful RSDP Capability Demonstration conducted May 30 st at TSMO Linked prototype RSDP and 1 st production RSDP Established a baseline metric of platform performance Established resource baseline to manage and operate Demonstrated ability to share resources Demonstrated integration of traffic generation capability (MIT Lincoln Labs LARIAT 8.6 and 9.0) Demonstrated ability to deploy virtual environments Constructed a Terminal Fury size event environment in ~5 hours (previously took ~6 weeks) Deployment Prototype to stay at TSMO for continued development Production RSDPs to be geographically dispersed 1st production RSDP homed to TSMO 2 nd production RSDP placement TBD (Nov 2013) Expect 1 RSDP per year over the FYDP 10 13 Nov 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE 1

OTHER CYBER INITIATIVES 11 13 Nov 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE

CYBER RANGE INTEROPERABILITY STANDARDS (CRIS) TRMC sponsored WG supported by MIT Lincoln Laboratories Government, Industry and Academia Cyber Ranges have been independently developed Tools Processes Architectures Underlying Technologies Lexicon Result is stovepipe solutions that are difficult to integrate Limited scalability Increased cost and schedule Goal: Identify key interoperability gaps and recommend solutions/approaches Task Status Lexicon: incorporating feedback for release in December Range Process: incorporating feedback with anticipated release in December Next Steps: Pilot Project to address Environment Generation Enable Interoperability through Standardization 12 13 Nov 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE 1

ADDITIONAL TRMC INVESTMENTS T&E/S&T Cyber Test Technology (CTT) Sponsored Efforts Expand upon current automated sanitization capabilities for Cyber environments Develop models for accurate, large scale cyber threat simulation at all layers of the OSI model Develop automated threat portrayal capability Status Award made to Georgia Tech Research Institute in March 2013 to develop Red Team-in-a-Box with anticipated completion in FY16 Award made to Lockheed Martin in June 2013 to develop enterprise sanitization capability with anticipated completion in FY16 Anticipate successful completion of award made to Scalable Network Technologies for development of high fidelity, large scale network emulation in FY14 Central T&E Investment Program (CTEIP) Sponsored Efforts Develop enhanced defensive Cyber instrumentation Develop enhanced LVC representations of large scale operational environments Status In early development with SPAWAR to develop Cyber T&E specific instrumentation and high fidelity, large scale, operational representative environments with anticipated completion in FY17-18 JMETC FY14 Tool Focus Areas Cyber T&E planning, execution and analysis tools Environment Generation Visualization Non-intrusive Instrumentation Real-time analysis Automation More 13 13 Nov 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE 1

Enhanced Distributed Test Infrastructure 14 13 Nov 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE 1

ENHANCED DISTRIBUTED TEST INFRASTRUCTURE: OVERVIEW Maintain all current JMETC key tenants Access to Industry and Academia (e.g., Boeing LabNet) Access to other DoD networks (e.g., JTEN) Help Desk Persistent Connectivity (e.g., standing IA agreements, continuous network performance characterization, proactive troubleshooting) Enterprise Services (e.g., VoIP, CHAT, Adobe Connect, patch servers, DNS, file transfers, NTP, Anti-Virus Updates, etc.) Onsite Event, Network and IA Support Distributed Test Tools Proposed Enhancements Support classifications up to TS/SCI Enterprise Coalition connectivity solution Incorporate RSDP capability (i.e., cloud based services such as tools, instrumentation, traffic generation, and virtual environments) RDT&E DAA Support both Interoperability and Cyber T&E requirements 15 15 13 Nov 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE

DISTRIBUTED TEST INFRASTRUCTURE ENHANCEMENTS: CHALLENGES, SCHEDULE & COST Challenges: we are breaking new ground Not a fully closed environment access to other networks Certification by Defense Intelligence Agency (DIA) Acceptance by the SAP community Transition Schedule IOC expected in late 1Q FY14 Initial sites driven by DOT&E cyber requirements FOC expected 12-24 months later Transition all existing sites (currently 75 with 16 planned) Establish peering back to legacy infrastructure to maintain connectivity during transition Cost: JMETC intends to cover all transition costs for existing sites Non-Recurring Costs (e.g., hardware, installation, etc.) Annual Recurring Costs (e.g., operations, maintenance, IA, etc.) 16 13 Nov 2013 GET CONNECTED to LEARN, SHARE, and ADVANCE 16