Air Force Test Center

Similar documents
The Perfect Storm Cyber RDT&E

Avionics Cyber T&E Examples Testing Cyber Security Resilience to support Operations in the 3rd Offset Environment

Test and Evaluation Methodology and Principles for Cybersecurity

T&E Workforce Development

Cyberspace T&E Drivers and Initiatives

Air Force Test Center

Dr. Steven J. Hutchison Principal Deputy Developmental Test and Evaluation

The Operational Test & Evaluation Cybersecurity Terrain

Shift Left: Putting the Process Into Action

April 25, 2018 Version 2.0

Test & Evaluation/Science & Technology (T&E/S&T) Cyberspace Test Technology (CTT) Project Overview. 2nd Annual ITEA Cyber Security Workshop

Cybersecurity Test and Evaluation Achievable and Defensible Architectures

Cyber T&E Standards Panel

Cybersecurity is one of the most important challenges for our military today. Cyberspace. Cybersecurity. Defending the New Battlefield

Data Management & Test Scenarios Exercise

CENTRAL TEST AND EVALUATION INVESTMENT PROGRAM (CTEIP) PE D FY 1998 FY 1999 FY 2000 FY 2001 FY 2002 FY 2003 FY 2004 FY 2005

Naval Surface Warfare Center,

US Air Force Initiative to Enhance Hypersonic Test Capabilities

Cybersecurity Test and Evaluation at the National Cyber Range

PCTE Program Management Update. Liz Bledsoe Acting Product Manager Cyber Resiliency and Training

Joint Mission Environment Test Capability (JMETC)

UNCLASSIFIED FY 2016 OCO. FY 2016 Base

DOE and Test Automation for System of Systems T&E

Planning and Executing an Integration Test Strategy for a Complex Aerospace System

New DoD Approach on the Cyber Survivability of Weapon Systems

Test Resource Management Center Directed Energy T&E Conference A Joint DEPS ITEA Event

6/18/ ACC / TSA Security Capabilities Workshop THANK YOU TO OUR SPONSORS. Third Party Testing Program Overview.

Cybersecurity Testing

Cybersecurity vs. Cyber Survivability: A Paradigm Shift

2 nd Cybersecurity Workshop Test and Evaluation to Meet the Advanced Persistent Threat

Cybersecurity Test and Evaluation

Cybersecurity T&E and the National Cyber Range Top 10 Lessons Learned

ISA 201 Intermediate Information Systems Acquisition

to-end System Test Architecture

THE UNDER SECRETARY OF DEFENSE 3010 DEFENSE PENTAGON WASHINGTON, DC ACQUISITION, TECHNOLOGY AND LOGISTICS January 11, 2017

Program Protection Implementation Considerations

Implementing a Modular Open Systems Approach (MOSA) to Achieve Acquisition Agility in Defense Acquisition Programs

Re-Forming the DoD Acquisition Process. A Systems Engineering Approach

48 th Annual NDIA Conference Targets, UAVs & Range Operations Symposium & Exhibition. Boeing QF-16 Program

Configuration Security (ConSec) Proposers Day

General Framework for Secure IoT Systems

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

PROVIDING THE WARFIGHTER S EDGE

UAS Operation in National Air Space (NAS) Secure UAS Command and Control

Directed Energy Test & Evaluation Capability 10 Years Later

Cybersecurity Planning Lunch and Learn

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

Looking Forward: USACE MILCON Cybersecurity Integration

Marine Corps Tactical System Support Activity

TEL2813/IS2621 Security Management

Advanced Cyber Risk Management Threat Modeling & Cyber Wargaming April 23, 2018

JOINT MISSION ENVIRONMENT TEST CAPABILITY (JMETC)

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #18

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

DoD Strategy for Cyber Resilient Weapon Systems

Systems Engineering for Test: Providing the Right Testing at the Right Time

Cyber Threat Assessment and Mitigation for Power Grids Lloyd Wihl Director, Application Engineering Scalable Network Technologies

UNCLASSIFIED. FY 2016 Base FY 2016 OCO

Department of Defense Fiscal Year (FY) 2014 IT President's Budget Request Defense Advanced Research Projects Agency Overview

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

NDIA SE Conference 2016 System Security Engineering Track Session Kickoff Holly Dunlap NDIA SSE Committee Chair Holly.

UNCLASSIFIED. R-1 Program Element (Number/Name) PE D8Z / Software Engineering Institute (SEI) Applied Research. Prior Years FY 2013 FY 2014

I n t e g r i t y - S e r v i c e - E x c e l l e n c e

DoD Software Assurance (SwA) Update

AMRDEC CYBER Capabilities

UNCLASSIFIED R-1 ITEM NOMENCLATURE. FY 2014 FY 2014 OCO ## Total FY 2015 FY 2016 FY 2017 FY 2018

Risk Assessments, Continuous Monitoring & Intrusion Detection, Incident Response

Introducing Cyber Resiliency Concerns Into Engineering Education

A Supply Chain Attack Framework to Support Department of Defense Supply Chain Security Risk Management

Space and Naval Warfare Systems Center Atlantic Information Warfare Research Project (IWRP)

Achieving DoD Software Assurance (SwA)

CompTIA Security+ Study Guide (SY0-501)

Rethinking Cybersecurity from the Inside Out

Tactical Microgrid Standardization Update to the EGSA Government Relations Committee

Aerospace Systems Directorate

Integrated C4isr and Cyber Solutions

Cybersecurity and Program Protection

OPUC Workshop March 13, 2015 Cyber Security Electric Utilities. Portland General Electric Co. Travis Anderson Scott Smith

Assessing the impacts of Amended Toxic Substances Control Act (TSCA) to the DoD Mission and the Defense Industrial Base (DIB)

Title: Cybersecurity as it Applies to the Survivability Key Performance Parameter

DEPARTMENT OF THE NAVY CHIEF INFORMATION OFFICER (DON CIO) CYBERSECURITY STRATEGY TEMPLATE

Cybersecurity in Acquisition

Security by Default: Enabling Transformation Through Cyber Resilience

White Sands Missile Range (WSMR) Telemetry Modernization

How to Underpin Security Transformation With Complete Visibility of Your Attack Surface

Navy Cyber Resilience

Net-Centric Systems Design and Requirements Development in today s environment of Cyber warfare

Air Virtual At Sea (VAST) Platform Stimulation Analysis

OFFICE OF THE SECRETARY OF DEFENSE DEFENSE PENTAGON WASHINGTON, DC MEMORANDUM FOR MEMBERS OF THE ACQUISITION WORKFORCE

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

INFORMATION ASSURANCE DIRECTORATE

Cybersecurity T&E and the National Cyber Range

U.S. Army Cyber Center of Excellence and Fort Gordon

INFORMATION ASSURANCE DIRECTORATE

UNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO

Program Review for Information Security Management Assistance. Keith Watson, CISSP- ISSAP, CISA IA Research Engineer, CERIAS

Cyber, Command, Control, Communications, and Computers Assessments Division (C5AD)

Test and Evaluation. The Key to Successful Acquisition Outcomes. Steve Hutchison. 3 October Director Office of Test and Evaluation

Transcription:

Air Force Test Center Avionics Cyber Range (ACR) Mark Erickson 46 TS/OGE 26 January 2017 DISTRIBUTION STATEMENT A: Approved for public release: distribution is unlimited. 96TW-2017-0005 1

What is the Avionics Cyber Range DoD test facility(s) capable of conducting cyber testing compatible with unique interfaces & signal types of aircraft avionics & airborne systems Connected with National Cyber Range and other aircraft & weapons cyber test facilities End state infrastructure will be automated, repeatable, continuous, scalable and responsive to system and threat evolution Facilities will support virtual systems, interfaces to physical LRUs, remote connectivity to Special Facilities/SILs and Multi-Level Security Capabilities will support full spectrum T&E of aircraft and munitions 2

Operations Maintenance Example Aircraft Test Scenario The aircraft s internal communication bus is compromised by malware injected through the maintainer equipment On-Aircraft Expanding Focus Beyond Potential Vulnerabilities Within System Boundary Must Consider All Interactions and Impact on Mission Assurance 3

6-Step RMF 6 Phase CST&E AF DT&E & OT&E Process DoD 5000.02 Program Phases Integrated AF T&E Model MDD A Development RFP Release Decision CDD Validation B C FRP or FDD Decision FDD Decision for Incrementally Deployed Software Materiel Solution Analysis PDD Technology Maturation & Risk Reduction PDR Engineering and Manufacturing Development CDR LRIP Proceed to Initial OT Production & Deployment FRP Operations & Support Early Tester Involvement Planning Provisioning Execution Air Force DT&E Closeout Planning Air Force OT&E E x e c u t i o n Closeout 1. Understand Cybersecurity Requirements 2. Characterize Cyber Attack Surface 3. Cooperative Vulnerability Identification 4. Adversarial Cybersecurity DT&E 5. Vulnerability & Pen Assessment 6. Adversarial Assessment 1. Categorize System 2. Select Security Controls 3. Implement Security Controls 4. Assess Security Controls 5. Authorize IATT System ATO 6. Monitor AF Controls Cyber survivability & resiliency assessments inform key acquisition decisions starting at TMRR 4

5 Vision: Create the Cyber Test and Evaluation Infrastructure (CT&EI) Avionics Cyber Range The CT&EI is composed of existing non-kinetic Cyber test capabilities integrated with representations of kinetic and C2 systems (e.g., hardware-in-the-loop (HWIL) facilities, system integration labs (SILs), and software-in-the-loop (SWIL) facilities) via network connectivity, enabling testing those systems in a realistic combat, including cyber and interoperability, environment. We have to integrate these existing facilities in a cyber environment with low risk of damage.

ACR T&E Range 6

Avionics Cyber Range Requirements 1. Ability to stimulate avionics components to put them in flight modes 2. Ability to provide standard interfaces for avionics busses, radars, data links, radios, mission planning systems, software loaders, maintenance systems, weapons, IR/UV sensors, etc. 3. Ability to work with actual aircraft/weapons, real subsystems, emulations, or re-hosted software (requires flight line access) 4. Ability to stimulate sensors through direct injection, or through system apertures (requires anechoic chamber) 5. Test tools capable of penetrating avionics components and returning them to pre-test conditions 6. Realistic threat emulation 7. Multi-level security environment 8. Mobile test tools/procedures for testing in other HITLs 9. Available to support experimentation, development and test 7

Avionics Cyber Range Maintenance/Support Equipment Anechoic Chamber Physical Systems Flightline Access Supports full-spectrum Cyber T&E Includes: Virtualized and physical components & subsystems Hardware-in-the-Loop testing Real-time distributed testing Weapons Integration Avionics Components Strategic C2 Tactical C2 Logistics/Support Systems 8

Test Resource Management Center (TRMC) Coordination Incorporate CTEIP-like milestones, to include recurring coordination requirements with TRMC as project matures Near-term tasks: Forming the multi-disciplinary team Drafting Test Capabilities Requirements Document (TCRD) Drafting Program Management Plan (PMP) Kickoff meeting with TRMC March, 2017 New Start Briefing Review initial draft TCRD, including CONOPS, Use cases, Key performance parameters, Initial requirements Review initial draft Program Management Plan (PMP) Will not duplicate tools or capabilities currently being developed under TRMC T&E investment programs, including the National Cyber Range 9

Questions/Discussion? 10