30 septembre 2020 | International, C4ISR, Sécurité

The DoD needs data-centric security, and here’s why

Drew Schnabel

The U.S. Department of Defense is set to adopt an initial zero-trust architecture by the end of the calendar year, transitioning from a network-centric to a data-centric modern security model.

Zero trust means an organization does not inherently trust any user. Trust must be continually assessed and granted in a granular fashion. This allows defense agencies to create policies that provide secure access for users connecting from any device, in any location.

“This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July.

How does the Pentagon's AI center plan to give the military a battlefield advantage?

The Pentagon's artificial intelligence hub is working on tools to help in joint, all-domain operations as department leaders seek to use data to gain an advantage on the battlefield.

Andrew Eversden

To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats.

Evolving DoD information security

The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures.

Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location.

“This paradigm shift from a network-centric to a data-centric security model will affect every arena of our cyber domain, focusing first on how to protect our data and critical resources and then secondarily on our networks,” Vice Adm. Nancy Norton, director of the Defense Information Systems Agency and commander of the Joint Force Headquarters-Department of Defense Information Network, said at a virtual conference in July.

To understand how the DoD will benefit from this new zero-trust security model, it's important to understand the department's current Joint Information Environment, or JIE, architecture; the initial intent of this model; and why the JIE can't fully protect modern networks, mobile users and advanced threats.

Evolving DoD information security

The JIE framework was developed to address inefficiencies of siloed architectures. The goal of developing a single security architecture, or SSA, with JIE was to collapse network security boundaries, reduce the department's external attack surface and standardize management operations. This framework helped ensure that defense agencies and mission partners could share information securely while reducing required maintenance and continued infrastructure expenditures.

Previously, there were more than 190 agency security stacks located at the base/post/camp/station around the globe. Now, with the JIE architecture, there are just 22 security stacks centrally managed by the Defense Information Systems Agency to provide consistent security for users, regardless of location.

Initially, the JIE was an innovative concept that took the DoD from a highly fragmented architecture, in which each agency managed its own cybersecurity strategy, to an architecture in which there is a unified SSA.

However, one of the early challenges identified for the JIE was managing cloud cybersecurity as part of the SSA. The components in the JIE — the Joint Regional Security Stacks family's internet access points and cloud access points — have traditionally focused on securing the network, rather than the data or user.

As more DoD employees and contractors work remotely and data volumes increase, hardware cannot scale to support them. This has created ongoing concerns with performance, reliability, latency and cost.

A cloud-first approach

In response, the DoD leverages authorized solutions from the Federal Risk and Authorization Management Program, and it references the Secure Cloud Computing Architecture guidance for a standard approach for boundary and application-level security for impact Level 4 and 5 data hosted in commercial cloud environments.

The purpose of the SCCA is to provide a barrier of protection between the DoD Information Services Network and the commercial cloud services that the DoD uses while optimizing the cost-performance trade in cybersecurity.

Defense agencies are now exploring enterprise-IT-as-a-service options to move to cloud, and reduce the need for constant updates and management of hardware. Through enterprise-IT-as-a-service models, defense agencies will be able to scale easily, reduce management costs and achieve a more competitive edge over their adversaries.

Before the pandemic hit, defense agencies were already moving to support a more mobile workforce, where employees can access data from anywhere on any device. However, a cyber-centric military requires security to be more deeply ingrained into employee culture rather than physical protection of the perimeter.

The next evolution to secure DISA and DoD networks is to embrace a secure access edge model with zero-trust capabilities. The SASE model moves essential security functions — such as web gateway firewalls, zero-trust capabilities, data loss prevention and secure network connectivity — all to the cloud. Then, federal employees have direct access to the cloud, while security is pushed as close to the user/data/device as possible.

SP 800-27, zero-trust guidance from the National Institute of Standards and Technology, provides a road map to migrate and deploy zero trust across the enterprise environment. This guidance outlines the necessary tenants of zero trust, including securing all communication regardless of network location, and granting access on a per-session basis. This creates a least-privilege-access model to ensure the right person, device and service have access to the data they need while protecting high-value assets.

As the DoD transforms the JIE architecture to an as-a-service model with zero-trust capabilities, defense agencies will experience cost savings, greater scalability, better performance for the end user and war fighter, improved visibility, and control across DoD networks — and ultimately a stronger and more holistic cybersecurity capability moving forward.

https://www.c4isrnet.com/opinion/2020/09/29/the-dod-needs-data-centric-security-and-heres-why/

Sur le même sujet

  • New Futures Command chief shifts main effort to designing Army of 2040

    8 février 2023 | International, Terrestre, C4ISR

    New Futures Command chief shifts main effort to designing Army of 2040

    The command is now focused on what the service should look like in 2040 and beyond to outpace China.

  • SpaceX, L3 to provide hypersonic tracking satellites for Space Development Agency

    7 octobre 2020 | International, C4ISR

    SpaceX, L3 to provide hypersonic tracking satellites for Space Development Agency

    Nathan Strout WASHINGTON — SpaceX and and L3 Harris will contribute satellites to track hypersonic weapons to the Space Development Agency's planned mega-constellation, with the nascent agency announcing Oct. 5 it has selected the two companies to build its first wide field of view satellites. Under the contracts, each company will design and develop four satellites equipped with wide field of view (WFOV) overhead persistent infrared (OPIR) sensors. Operating in low Earth orbit, the sensors will make up the inaugural tranche of the SDA's tracking layer — the Pentagon's new effort to track hypersonic weapons from space. “This SDA tracking layer is going to consist of a proliferated, heterogeneous constellation of WFOV space vehicles that provide persistent global coverage and custody capability. That's going to combine with activities in the Missile Defense Agency as they build toward their Hypersonic and Ballistic Tracking Space Sensor (HBTSS) medium field of view (MFOV) space vehicles,” Acting Deputy Undersecretary for Research and Engineering Mark Lewis told C4ISRNET. Per the announcement, SpaceX will receive $149 million, while L3 Harris will receive $193 million. According to SDA Director Derek Tournear, the awards were the result of a full and open competition, with the selection based purely on technical merit. SpaceX has made waves with its Starlink constellation — a series of satellites built to provide commercial broadband from low Earth orbit — and the Department of Defense has tested using Starlink to connect various weapon systems. However, the company does not have a history building OPIR sensors. According to Tournear, the company will work with partners to develop the sensor, which it will then place on a bus it is providing. SpaceX already has a production line in place to build a bus based on its Starlink technologies, added Tournear. “SpaceX had a very credible story along that line — a very compelling proposal. It was outstanding,” he said. “They are one of the ones that have been at the forefront of this commercialization and commodification route.” L3 Harris will develop an OPIR solution based on decades of experience with small satellites, small telescopes and OPIR technologies. “They had an extremely capable solution. They have a lot of experience flying affordable, rapid, small satellite buses for the department,” noted Tournear. “They had the plant and the line in place in order to produce these to hit our schedule.” Tracking hypersonic weapons The contracts are the latest development as the SDA fleshes out its National Defense Space Architecture (NDSA), a new constellation to be comprised of hundreds of satellites primarily operating in low Earth orbit. These satellites are expected to make up tranche 0 of the SDA's tracking layer, which will provide global coverage for tracking hypersonic threats. The glue that holds the NDSA together will be the transport layer, a space-based mesh network made up of satellites connected by optical intersatellite links. Like most planned SDA satellites, WFOV satellites will plug directly into that network. “The idea is it connects to the National Defense Space Architecture — the NDSA transport layer — via optical intersatellite links,” said Lewis. “And that will enable low latency dissemination for missile warning indications. It will provide track directly to the joint war fighters.” SDA issued two contracts in August for its first 20 transport layer satellites. York Space Systems was awarded $94 million to build its 10 satellites, while Lockheed Martin was awarded $188 million for its 10 systems. That transport layer capability is essential to the tracking layer's mission. Because they are so much closer to the Earth's surface than the U.S. Space Force's missile tracking satellites in geosynchronous orbit, the WFOV sensors will naturally have a much more limited field of vision. In order to track globe traversing hypersonic missiles, the WFOV satellites will have to work together. Once the first satellite picks up a threat, it will begin tracking it until it disappears over the horizon. During that time, it is expected to transmit its tracking data to other WFOV satellites over the transport layer. So as the first satellite loses sight of the threat over the horizon, the next WFOV is ready to pick it up, and so on and so forth. From there, the WFOV satellites will pass the tracking data — either directly or via the transport layer — on to the medium field of view satellites being developed by the Missile Defense Agency as their HBTSS. “SDA is developing the low cost proliferated WFOV space vehicles that provide the missile warning and the tracking information for national defense authorities, as well as tracking and cueing data for missile defense elements,” explained Lewis. “Meanwhile, the Missile Defense Agency is developing the high resolution HBTSS MFOV space vehicles — those can receive cues from other sources including the WFOV system — and they'll provide low latency fire control quality tracking data.” “The MFOV HBTSS satellites will then be able to hone in and actually be able to calculate the fire control solution for that missile, send those data to the transport satellites with a laser [communication] system ... and then the transport system will disseminate that to the weapons platform as well as back to" the continental United States, where MDA can broadcast that information, added Tournear. MDA issued $20 million contracts to Northrop Grumman, Leidos, Harris Corporation and Raytheon to develop HBTSS prototypes in Oct. 2019. Tournear noted that proposals for HBTSS “are being written as we speak.” Together, HBTSS and the SDA's tracking layer are meant to provide the data needed to take out hypersonic threats — which Congress is increasingly concerned by. “It's part of an integrated DoD OPIR strategy. So the wide field of view sensors and the medium field of view sensors are really integral to this whole NDSA system and legacy strategic missile warning capability,” said Lewis, praising MDA and SDA for working together to build a heterogeneous solution. Spiral development Of course, this initial tranche won't provide global coverage up front. As part of its spiral development approach, SDA plans to continuously add satellites to its mega-constellation in two-year tranches, with each tranche including more advanced technology. The tracking layer is not expected to reach global coverage until 2026, said Tournear. But as the constellation is built out, the more limited initial capabilities will be used to help integrate the space-based assets with war fighters. “We call tranche 0 our war fighter immersion tranche,” said Tournear. “What that means is, its goal is to provide the data in a format that the war fighters are used to seeing on tactical timelines that they can be expected to see once we actually become operational. The whole purpose of tranche 0 is to allow the war fighters to start to train and develop tactics, techniques and procedures so that they can create operational plans for a battle where they would actually incorporate these data.” With tranche 1 in 2024, the tracking and transport layers will essentially reach initial operating capability, said Tournear. That will include persistent regional coverage. According to Tournear, the tranche 0 satellites are set to launch in September 2022. Tournear told C4ISRNET his agency is planning to issue a separate solicitation for launch services later this week. That solicitation will cover all of the tranche 0 satellites, including the 20 transport layer satellites the agency ordered in August, the eight WFOV satellites and the HBTSS satellites. https://www.c4isrnet.com/battlefield-tech/space/2020/10/05/space-development-agency-orders-8-hypersonic-weapon-tracking-satellites/

  • The Drop in Ransomware Attacks in 2024 and What it Means

    8 avril 2024 | International, Sécurité

    The Drop in Ransomware Attacks in 2024 and What it Means

    Q1 2024 had 22% less ransomware attacks than Q4 2023. Why is that and is it a trend that will continue?

Toutes les nouvelles