18 mars 2020 | International, C4ISR, Sécurité

The Pentagon is handling cyber vulnerabilities inconsistently

Mark Pomerleau

The Department of Defense has not consistently mitigated cyber vulnerabilities identified in a 2012 report, according to the department's inspector general.

The DoD IG issued a follow-on report to its 2012 report, issued March 13 and made public March 17, that determined cyber red teams didn't report the results of assessments to organizations and components didn't effectively correct or mitigate the identified vulnerabilities.

The new report discovered that components didn't consistently mitigate or include unmitigated vulnerabilities identified in the prior audit and during this audit by red teams during combatant command exercises, operational testing assessments and agency-specific assessments in plans of action and milestones.

“Ensuring DoD Components mitigate vulnerabilities is essential to achieve a better return on investment,” the report stated. “In addition, we determined that the DoD did not establish a unified approach to support and prioritize DoD Cyber Red Team missions. Instead, the DoD Components implemented Component-specific approaches to staff, train and develop tools for DoD Cyber Red Teams, and prioritize DoD Cyber Red Team missions.”

The report found that DoD didn't establish a unified approach because it didn't assign an organization with responsibility to oversee and synchronize red team activity based on priorities, it didn't assess the resources needed for each red team and identify requirements to train them to meet priorities and it didn't develop baseline tools to perform assessments.

“Without an enterprisewide solution to staff, train and develop tools for DoD Cyber Red Teams and prioritize their missions, DoD Cyber Red Teams have not met current mission requests and will not meet future requests because of the increased demands for DoD Cyber Red Team services,” the report said. “Until the DoD assigns an organization to assess DoD Cyber Red Team resources, it will be unable to determine the number of DoD Cyber Red Teams and staffing of each team to support mission needs, which will impact the Do D's ability to identify vulnerabilities and take corrective actions that limit malicious actors from compromising DoD operations.”

The DoD IG issued seven recommendations the secretary of defense assign an organization responsibility for. They include:

  • Review and assess red team reports for systemic vulnerabilities and coordinate the development and implementation of enterprise solutions to mitigate them;
  • Ensure components develop and implement a risk-based process to assess the impact of identified vulnerabilities and prioritize funding for corrective actions for high-risk vulnerabilities;
  • Ensure components develop and implement processes for providing reports with red team findings and recommendations to organizations with responsibility for corrective actions;
  • Develop processes and procedures to oversee red team activities, including synchronizing and prioritizing red team missions, to ensure activities align with priorities;
  • Perform a joint DoD-wide mission-impact analysis to determine the number of red teams, minimum staffing levels of each team, the composition of the staffing levels needed to meet current and future mission requests;
  • Assess and identify a baseline of core and specialized training standards, based on the three red team roles that team staff must meet for the team to be certified and accredited; and
  • Identify and develop baseline tools needed by red teams to perform missions.

https://www.fifthdomain.com/dod/2020/03/17/the-pentagon-is-handling-cyber-vulnerabilities-inconsistently/

Sur le même sujet

  • Czech Republic to boost spending on land weapons in 2019

    28 novembre 2018 | International, Terrestre

    Czech Republic to boost spending on land weapons in 2019

    By: Jarosław Adamowski WARSAW, Poland — Czech Defence Minister Lubomir Metnar has announced the ministry's acquisition plans for 2019. Next year, the country aims to purchase 210 infantry fighting vehicles, multi-purpose helicopters, and mobile air defense radars (MADRs), among other systems. Metnar said that in 2018 the ministry managed to conclude deals to purchase weapons and military equipment worth more than 14.5 billion koruna (US $635 million). There is a consensus across the country's political spectrum that the country's defense spending must be further increased in the coming years, the minister said, as reported by local daily Denik. The planned acquisitions are largely focused on replacing the military's Soviet-designed gear with new equipment made by Western allies and Czech manufacturers. The region-wide trend has accelerated following Russia's military intervention in eastern Ukraine and its annexation of the Crimean peninsula in 2014. Meanwhile, Lt. Gen. Ales Opata, the Chief of the General Staff of the Czech Armed Forces, said at a joint press conference with Metnar that the key to military modernization was the upgrade of the country's land forces. “I don't only mean [acquisitions of] tanks or infantry fighting vehicles, but also robot systems, reconnaissance and combat unmanned vehicles,” Opata said. https://www.defensenews.com/global/europe/2018/11/21/czech-republic-to-boost-spending-on-land-weapons-in-2019

  • The Navy is moving forward on its next-gen jamming pod

    29 octobre 2018 | International, C4ISR

    The Navy is moving forward on its next-gen jamming pod

    By: Mark Pomerleau The Navy has selected a company to demonstrate existing technologies for the second increment of the service's multiphase approach to replacing an aging jamming pod. Northrop Grumman has been awarded a $35.1 million, 20-month contract for the Next Generation Jammer (NGJ) Low Band, part of the jamming pods that will be outfitted onto EA-18 Growler aircraft to replace the legacy ALQ-99 jammer. The Navy is splitting the upgrade into three pods to cover respective parts of the electromagnetic spectrum. The order of development for the pods is “Mid-Band (Increment (Inc) 1), Low-Band (Inc 2), and the future High-Band (Inc 3),” which “was determined based on criticality of current and emergent threats,” a Navy spokesmen previously told C4ISRNET in response to written questions. “The NGJ full system capability is comprised of these three standalone programs ... each of which covers a different frequency band and addresses a variety of adversary systems.” Northrop's contract award is part of a demonstrator that will help inform the Navy of how to continue to mature the program for the low-band jammer. “Northrop Grumman will deliver a mature, low-risk and exceedingly capable solution for Next Generation Jammer Low Band that outpaces evolving threats and enables the Navy's speed-to-fleet path,” said Thomas Jones, vice president and general manager, airborne C4ISR systems, Northrop Grumman. “Our NGJ-LB pod provides multimission capability for electromagnetic maneuver warfare. We stand ready to demonstrate advancements in this mission area and deliver ahead of schedule.” The low-band capability will “deliver significantly improved radar and communications jamming capabilities with Open Systems Architecture that supports software and hardware updates to rapidly counter improving threats” contributing “across the spectrum of missions defined in the Defense Strategic Guidance to include strike warfare, projecting power despite anti-access/area denial challenges, and counterinsurgency/irregular warfare,” Navy budget documents have stated. Raytheon is currently on contract for the mid-band portion, which has been dubbed AN/ALQ-249(V)1 by the Navy. https://www.c4isrnet.com/electronic-warfare/2018/10/26/the-navy-is-moving-forward-on-its-next-gen-jamming-pod

  • New Threat Actor 'Void Arachne' Targets Chinese Users with Malicious VPN Installers

    19 juin 2024 | International, Sécurité

    New Threat Actor 'Void Arachne' Targets Chinese Users with Malicious VPN Installers

    Discover the latest cybersecurity threat targeting Chinese-speaking users with malicious VPN installers and AI-driven malware campaigns.

Toutes les nouvelles