Defensive Cyberspace Personnel Study Plan and TOR

advertisement
UNCLASSIFIED/FOUO
(**DRAFT**)
Defensive Cyberspace Workforce
Study Plan,
Terms of Reference,
and Plan of Action and Milestones
v 0.90
March 4, 2010
FY 10 Analytic Agenda
Information Dominance
OPNAV N81F
UNCLASSIFIED/FOUO
1
UNCLASSIFIED/FOUO
Study Plan
1. Purpose. The purpose of the Defensive Workforce study is to inform key resourcing
decisions determining the Navy manpower requirement for Network Operations
(NETOPS), Computer Network Defense (CND), and Information Assurance (IA). This
study plan will guide and synchronize the efforts of participants. It outlines the
objectives,
methodology,
analytical
processes,
organization,
governance,
responsibilities, timeline, and products required. Although we will not address
Computer Network Attack (CNA) or Computer Network Exploitation (CNE) in regards to
personnel in this study, we will consider how those two disciplines impact NETOPS,
CND and IA. The study will be scenario-driven, and will consider requirements ranging
from steady-state to various surge operations.
2. Background. State, non-state actors, and individuals all operate within cyberspace,
and the Navy must operate, defend, and attack on the same platform as its adversaries.
Public, high profile adversary successes will breed additional actors using means that
are inexpensive, anonymous, and effective. As a result, cyber operations require a
dedicated force that lives on the network, providing a global cyber common operational
picture with a predictive cyber threat/response capability, and integrated NETOPS,
Defense, Exploitation, and Offensive operations. In response to this dynamic threat
environment, the Secretary of Defense released a memo in June 2009 that directed
U.S. Strategic Command (USSTRATCOM) to establish U.S. Cyber Command
(USCYBERCOM). As the Navy component of USCYBERCOM, the Navy established
U.S. Fleet Cyber Command (FLTCYBERCOM) and re-commissioned 10th Fleet (C10F)
in January 2010.
3. Objectives. The objectives of this study are:
a. Document the Navy requirements for defending cyberspace in the functional
areas of Network Operations (NETOPS), Computer Network Defense (CND), and
Information Assurance (IA)
b. Document where the requirements should be done.
c. Identify the roles, competencies, processes and activities performed by each role
in support of NETOPS, CND and IA.
d. Determine how much one person can do as a functional skill; and longevity 1 at
each location for each requirement.
1
Longevity refers to length of time at an organization
UNCLASSIFIED/FOUO
2
UNCLASSIFIED/FOUO
e. Show how new approaches or planned technologies can reduce personnel
required.
f. Make recommendations for the number and type of cyberspace defenders the
Navy needs required by the Navy (military, civilian, and contractor).
4. Scope. This study will focus on Navy NETOPS, CND, and IA manpower
requirements, excluding CNA and CNE. NETOPS is defined as the DoD-wide
operational, organizational, and technical capabilities for operating and defending the
Global Information Grid (GIG)2. NETOPS includes, but is not limited to, enterprise
management3, net assurance4, and content management5. Since this study is focused
on Navy’s defensive cyber manpower, only the Net Assurance functions of NETOPS
are considered. Computer Network Defense (CND) and Information Assurance (IA) are
functions within Net Assurance. According to JP 1-02, CND consists of actions taken to
protect, monitor, analyze, detect, and respond to unauthorized activity within DoD
information systems and computer networks. IA includes measures that protect and
defend information and information systems by ensuring their availability, integrity,
authentication, confidentiality, and non-repudiation. This includes providing for
restoration of information systems by incorporating protection, detection, and reaction
capabilities.
5. Assumptions. The following are the key assumptions for this study plan:
a. The Navy will provide access to an integrated manpower information system
database that will allow capability-based manpower requirements to determine billet-torole mapping.
b. This study will require unity of effort across institutional boundaries to enhance
the analysis and support understanding of manpower, personnel, training and education
2
DoD Net-Ops Strategic Vision, December 2008
Enterprise Management is the set of functional capabilities and operational processes necessary to
monitor, manage, and control the availability, allocation, and performance within and across the GIG. It
includes Enterprise Services Management, Applications Management, Computing Infrastructure
Management, Network Management, Satellite Communications Management, and Electromagnetic
Spectrum Management.
4 Net Assurance is the set of functional capabilities and operational processes necessary to protect and
defend the GIG. This includes the operational responsibilities for information assurance, computer
network defense (to include Computer Network Defense Response Actions), and critical infrastructure
protection in defense of the GIG.
5 Content Management is the set of functional capabilities and operational processes necessary to
manage, and facilitate the visibility and accessibility of information within and across the GIG
3
UNCLASSIFIED/FOUO
3
UNCLASSIFIED/FOUO
requirements; NETOPS, CND, and IA processes; and NETOPS, CND, and IA system
functions.
c. This study will use and assess existing navy NETOPS, CND, and IA structures
and organizations.
d. This study will determine current (i.e. as-is) Navy NETOPS, CND, and IA
manpower requirements.
6. Approach. This study will use an integrated methodology approach to describe how
Navy’s NETOPS, CND, and IA manpower meets DoD, Joint, and Navy defensive cyber
capabilities (and desired effects) and objectives. These manpower requirements are
linked directly to Mission Essential Tasks (METs) in order to understand the effect of
manpower decisions on6 Navy’s ability to defend against attacks against its networks or
information systems.
To realize this end state, this study will identify all Navy organizations, both at the
National and regional levels, with personnel that perform a cyber defense role.
Associated with the cyber defense roles are the requisite knowledge, skills, and abilities
(KSAs), or competencies, required to perform that role7 to a specified standard.
Manpower requirements analysts will then be able to understand the workload and
worker requirements of each role as expressed by the task process/task relevance,
importance, frequency, and duration; and the relevance, importance, and level of each
competency8.
This study plan will be executed in four phases:
1.
Phase I. Data Collection (3 weeks)
2. Phase II. Understanding the Problem: Scenario Process, Role/Competency
Development, and Survey Development (4 weeks)
3.
Phase III. Manpower Analysis and Game-Changing Technologies (4 weeks)
4.
Phase IV. Final Analysis (3 weeks)
6
Capability Based Competency Assessment (CBCA) Concept, 13 May 2009, p. 4
Ibid, p. 12
8 Ibid, p. 5
7
UNCLASSIFIED/FOUO
4
UNCLASSIFIED/FOUO
Phase I. Data Collection
1. Methodology Development Meeting.
2. Develop Study Plan.
3. Conduct Literature Review.
4. Conduct Strategy-to-Task (STT) Analysis. Map strategic guidance down to
operational tasks that are required to achieve the desired effects. This will involved a
literature review of key national DoD and Navy guidance. These tasks will then be
associated to NETOPS, CND, and IA roles.
5. Collect Baseline Manpower Data. Research current data/information available
for key nodes, pulling from Activity Manning Documents (AMDs), the Total Manpower
Management Service System (TWMS), and the current Capability Based Competency
Assessment (CBCA) framework, NETOPS, CND, and IA roles.
6. Identify SMEs. Identify SMEs based upon the scope of the population
researched, taking into account geographic location, and predetermined criteria (see
Enclosure 1: Terms of Reference).
7. Write Scenarios. Develop three scenarios based on real-world events that cover
increasing threat levels.
8. Develop Role Framework. Identify established roles for NETOPS, CND, and IA
from existing doctrine. These roles will be vetted and refined through the IPT (including
protocol, terminology, and role-to-task integration).
9. IPT Review of Study Plan and STT.
Phase II. Understanding the Problem: Scenario Process, Role/Competency, and
Survey Development
1. Develop OV-4.
relationships.
Define key NETOPS, CND, and IA organizations and
2. Review Role Framework (Virtual Review).
3. Develop OV-6c Diagrams.
Develop event trace description based upon
scenarios to assess NETOPS, CND, and IA tasks.
4. IPT Workshop: Competencies / Skills. Identify roles and associated processes
and tasks, determine competencies for each role, and align to previously identified
roles. Identify experiences, and map to roles. Identify training courses for mapping to
UNCLASSIFIED/FOUO
5
UNCLASSIFIED/FOUO
competencies. Conduct one workshop consisting of two groups, with each group
conducted simultaneously. Each workshop will identify associated processes, activities,
and competencies for each previously identified role. Training courses and experiences
will also be identified during this workshop. Last, participants will identify current
NETOPS, CND and IA systems that are required for proficiency in identified roles.
5. Map Formal Training to Competencies. Gather course data (syllabi, etc) from
training courses identified in IPT workshop. Create tool/template to aid
instructors/graduates to map competencies to course objectives.
6. Review / Finalize Core Competency Data. Consolidate data obtained from
workshops and lead SMEs to review and validate data gathered.
7. Survey Development. Finalize core data gathered from workshops/IPT and
compile in survey format. Provide instructions to survey participants and administrator
via VTC. Develop an online survey comprised of questions to collect participant
demographic data, workload based on time and frequency, networks utilized and
required experience. Survey will be based on the role and competency data gathered
from workshops/IPT. Ensure survey results are captured in alignment with TWMS.
Provide instructions to survey participants and administrator via VTC.
8. IPT Workshop: OV-6c Review. Technical SME review of Navy cyber tasks and
roles processes used within the scenario.
Phase III. Manpower Analysis and Game-Changing Technologies
1. Administer Survey.
Administer survey to predetermined government POC.
Survey will be emailed to participants for a one-day turn around based on the
predetermined availability of staff, and will include a short VTC instruction period.
2. Revise OV-6c Diagrams. The core study team will update the OV-6c diagrams
based on recommendations from Technical SMEs at the IPT Workshop.
3. Workshop: Identify Game-Changing Technologies. This will be a 2-3 hour
workshop that will identify future systems that could change workload requirements for
cyber roles, and also identify the vulnerabilities of future systems. Participants should
include Technical SMEs from SPAWAR and PMW-160.
4. Review / Process Survey Results. Core study team manpower analysts will
process survey data to create an analytic ready dataset and conduct descriptive
statistics analyses on the survey data.
5. Generate Initial Manpower Requirements. Study team manpower analysts will
identify initial manpower requirements based on the workload data collected in the
survey.
UNCLASSIFIED/FOUO
6
UNCLASSIFIED/FOUO
6. Map Game-Changing Impacts to Roles. This mapping will be based upon the
Game-Changing Technologies Workshop.
7. Workshop: Validate Manpower Requirements. Validate manpower requirements
based on roles and tasks described within the scenarios; review gap/excess analysis
based upon AMDs and associated Unit Identification Codes (UICs); review gamechanging impact analysis.
Phase IV. Final Analysis
1. Revise Manpower Requirements. Manpower requirements will be revised based
on workshop recommendations.
2. Develop Final Manpower Deliverables. Final manpower deliverables are: a Final
Report and Final Brief-out to the IPT. Final Report required inputs are: Database, Key
Survey Findings, and manpower gaps/excesses.
3. Integrate Results into Final Report. Methodology, analysis, and results from
each phase will be integrated into a final report.
4. Prepare for TWMS Submission. Prepare documentation in appropriate format for
TWMS submission.
5. IPT Final Brief-out. The final out-brief will be presented to the IPT and include
the comprehensive Navy defensive cyber manpower requirements.
7. Organization, Responsibilities, and Governance. The Defense Cyberspace Workforce
Study will be conducted by an Integrated Product Team (IPT) drawn from OPNAV and
Navy Cyber Organizations at national and regional levels, and augmented by a Core
Study Team consisting of contractor support to N81.
a. Leadership. OPNAV N81 will serve as lead for the study, and will have approval
authority over scope, methodology, and timeline as well as deliverables.
b. Core Study Team. The Core Study Team will consist of Booz Allen staff
including Navy / cyber SMEs and analysts. The team will develop and present the study
deliverables to the IPT or Technical IPT for refinement and further development.
c. Integrated Product Team. The IPT members will be a group of military, civilian,
and contractor study stakeholders and NETOPS, CND and IA subject matter experts
drawn from: OPNAV (N1, N2/N6, and N81), USFF, USSTRATCOM, USCYBERCOM,
FLTCYBERCOM, C10F, NNWC, NCDOC, CID, NOCs, NIOCs, NCTAMS, CNRFC,
Naval War College, NSA, OSD, SECNAV, DoN CIO, PEO C4I, SPAWAR, and
UNCLASSIFIED/FOUO
7
UNCLASSIFIED/FOUO
augmented by the Core Study Team. The IPT’s primary task is to keep members’
respective leadership apprised of study progress, milestones, or issues that may impact
their organization. The IPT will meet once a month or as required.
d. Technical IPT. This is a sub-set of the IPT that consists of qualified Navy
enlisted, civilian and contractor personnel in Cryptology and Information Technology as
well as officers in the Information Warfare (IW) and Information Professional (IP)
communities. Their technological expertise and operational experience should cover
protecting the enterprise through patching the network and implementing various
protective measures in accordance with standard operating procedures. Battle Watch
Captains (BWC) and Computer Network Defense Officers (CNDO) should also have
experience identifying and mitigating adverse actions on the network such as Intrusion
Detection and Incident Handling.
The Technical IPT will review draft study deliverables, and provide assistance to the
Core Study Team as required to refine these products. IPT members will represent
their organizations during scheduled workshops and serve as conduits for additional
SME support required from their organizations. These meetings and workshops will
require a significant level of effort from the Technical SMEs. For example, this study
currently plans for three workshops, one of which is up to three days in duration; other
meetings will occur on a bi-weekly basis. Technical SMEs from OPNAV and other
stakeholder organizations provide specific expertise (without reachback) to the study in
the areas of NETOPS, CND, IA and Navy manpower, personnel, training and education.
8. Communication.
a. Surveys. Surveys will be released via NIPRNet or SIPRNet email depending on
classification.
b. Recurring Updates. OPNAV N81 leadership will receive status updates on a
recurring weekly basis. These meetings will be conducted via VTC/ teleconferencing or
in-person when available.
c. Workshops, Conferences.
Invitations will be disseminated for each
workshop/conference to be conducted via VTC/ teleconferencing or in-person when
available.
UNCLASSIFIED/FOUO
8
UNCLASSIFIED/FOUO
9. Risks. The following risks are associated with the successful completion of this study:
a. Participation by technical SMEs is critical to successful completion of this study.
This includes SMEs within the Navy and at the national level, but also at regional and
geographic organizations. Technical SMEs are required at each step of the process,
from role identification to manpower surveys. To ensure maximum participation, N81
will communicate study objectives, timeline, and events to leadership of stakeholder
organizations.
b. This study incorporates some aspects of the CBCA methodology that requires a
number of sequenced SME-driven workshop as well as stakeholder feedback;
IPTs/workshops also build on each other. If identified technical SMEs do not attend
these events or do not provide timely feedback, the study schedule will be at risk.
c. The manpower survey is a critical component to generating workload
requirements. This study is scheduled to be conducted in April. There are several
command level exercises planned for the month of April which may impact the
availability of SMEs to participate in the survey.
d. The manpower and workload survey is a critical component to generating
workforce requirements and requires rapid analysis. If the survey is administered on a
classified network such as SIPRNet, the restricted accessibility will impact the ability to
conduct the required analysis and data development as described in the study plan.
Recommend that the survey event in this workforce study be conducted at the
unclassified level as much as possible to ensure project milestones are met.
e. This study requires baseline manpower documentation. If this is not provided,
the core study team will not be able to conduct a gap analysis. Results will then be
based only on identified manpower requirements.
10. Relevant References. The following documents and efforts will be used to
determine the Navy’s NETOPS, CND, and IA integrated manpower requirements. This
list is not all-inclusive, and will include other sources discovered during the course of
this study.
a. USSTRATCOM Cyber Command Implementation Plan.
This document
describes the process and steps for the establishment of USCYBERCOM. It addresses
the roles, responsibilities, reporting relationships, authorities, and initial operational
capability (IOC)/full operational capability (FOC) phasing requirements. The
Implementation Plan emphasizes how missions, functions, and manpower will transition
from JTF-GNO, JFCC-NW, NSA, and DISA without loss of operational continuity or
capabilities. In addition to a phased stand-up, the plan includes a recommendation to
stand up a Joint Intelligence Operations Center (JIOC) as a USCYBERCOM subUNCLASSIFIED/FOUO
9
UNCLASSIFIED/FOUO
activity. Relevant annexes to the plan are A (Mission, Roles, and Organization
Structure) and E (Personnel).
b. USSTRATCOM Operational Concept for Cyberspace. The Concept addresses
the need to connect and operate militarily across the Electro-Magnetic Spectrum (EMS)
and control that spectrum; deny and mitigate adversary use of the spectrum (addressed
in Classified OPORD); develop and establish DOTMLPF to enhance spectrum’s
capabilities; identify, build, and secure the information infrastructure; mature with the
technology.
The Concept recommends establishment of applicable Rules of
Engagement (ROE) and lines of authority within Areas of Responsibility (AOR). Lastly,
the Concept provides risk, assumption, and implication assessment to achieve
Cyberspace superiority.
c.
U.S. Fleet Cyber Command/Commander 10th Fleet Implementation Plan. The
CNO established FLTCYBERCOM/C10F in a 23 July 2009 memo that also delineated
the mission, roles, and responsibilities. It established the Command and Control,
Reporting, and support relationships across Navy and with USCYBERCOM. Lastly, it
provided initial manpower, facilities, and resource requirements. An early focus area for
C10F is dynamic network defense operations that are integrated with national defense
operations. Other early focus areas are dynamic cyberspace operations, operational
employment of cyber forces, an assessment of the NETOPS reporting system, and
partnering with C2F and C3F in certification of cyberspace and EW operations.
Operationalizing cyber focuses on the ability to operate, defend, exploit, and attack
networks. Cyber crosses the following Joint Functional Areas: C2, Intelligence, Fires,
Movement & Maneuver, Protection, and Sustainment. It is centered around the following
nodes: Afloat, NIOC, NCDOC, and NNWC.
d. DoD Information Assurance Workforce Improvement Program Manual. The IA
WIP is a reference document describing the Categories, Specialties, Levels, and
functions/certification requirements associated with the IA Workforce. There are two
general categories (IA Technical, IA Management) and two Specialties (IA Workforce
System Architect & Engineer, CND – Service Provider). IAT, IAM, and IASAEs are
broken up into three levels having the three responsibilities. The CND-SP specialty has
five positions with varying skill sets mapped to required certifications. There is also a
Designated Approving Authority (DAA) which is an official appointed for each
Information System operating within or on behalf of the DoD. They have the authority to
formally assume responsibility for operating a system at an acceptable level of risk.
This is foundational data for identifying key roles and competencies associated with
CND.
e. N81 Cyberspace Defense Study. The purpose of this study was to determine the
Navy’s ability to provide required network support to a carrier in a major combat
operation under attack or exploitation from most likely Red CNE and CNA CoAs. The
main goals were to understand the adversary’s long-term capabilities and to determine
UNCLASSIFIED/FOUO
10
UNCLASSIFIED/FOUO
the most cost-effective countermeasures. The study recommended a balanced mix of
tools/technology and personnel for potential reduction in penetration likelihood. The
Defensive Cyberspace Workforce Analysis Study is the follow-on to this study to
specifically look at CND manpower requirements.
f. N1 Cyber Manpower Brief. This briefing recommended a Total Force approach to
manpower to generate the optimum mix of a work force. The briefing recommended
military for CNA/CNE, civilian for NETOPS, and a mix of military and civilian for CND.
The Navy will phase in Cyber Warfare Engineer (1820), develop the Cyber Warrant
Officer will be out of NEC 9308, and develop Select Reserve (SELRES) focus at four
NIOCs located in close proximity to large civilian sector cyber markets. Accessions at
current pace are insufficient to support Cyber Warrant Officer growth.
g.
Final Report for Cyberspace Operations (Manning) Limited Objective Experiment
(LOE). The purpose of the LOE was to apply analytical, systematic, and repeatable
approach to determine appropriate cyberspace forces to conduct CNA/CNE. The LOE
did not include CND/NETOPS manpower requirements, but concluded that
CND/NETOPS manning numbers must be included to accurately portray the total
cyberspace manning requirement. The LOE assessed that no separate surge forces are
required from day-to-day manning; the surge would be handled by reprioritization of
daily manning with some augmentation from guard/reserve personnel. Services will not
create discrete MOS/NEC/AFSC for each of the roles; manning will be multi-functional.
h. USSTRATCOM and NSA/CSS Cyber DOTMLPF Change Recommendation
(DCR). USSTRATCOM and NSA/CSS conducted a gap analysis to identify shortfalls in
cyber capabilities, and then identified non-materiel (DOTMLPF) recommendations to
mitigate the shortfalls. This document focused on computer network attack (CNA) and
computer network exploitation (CNE).
i.
OPNAV N6 Study: Health of the Network. This study provided CNO a
comprehensive review of Navy’s operational and tactical networks. It addressed near
and short term security and reliability, a modernization plan to include migration and
consolidation recommendations, network shortfalls, and methods to maintain and
improve health of the network. One challenge is the lack of integration and
standardization of networks to conduct C2, business processes, and provide real-time
network security and capability information to the warfighter. The majority of networks
were also found to have a medium to high level of risk in the following areas: C2,
operations, and defense. The study identified a near and long term way ahead for the
network, but did not include changes to personnel or processes.
j.
FLTCYBERCOM/COMTENTHFLT OPORD 2000. This document directs Navy
cyberspace operations globally to achieve military operations through cyber space. It
directs applying a trained Navy Cryptological community in conjunction with Numbered
Fleet Naval assets globally to execute NETOPS, ensure Information Assurance, and
UNCLASSIFIED/FOUO
11
UNCLASSIFIED/FOUO
defend the Global Information Grid (GIG) as directed by USSTRATCOM. The OPORD
outlines the roles and responsibilities of the organizations which operate under and
within the FFC/10th FLT enterprise.
k.
Navy Mission Essential Task List (NMETLS). This provides justification for
training NIOC and NCDOC personnel in the IO community tasked with providing global
force commitment, availability, and readiness to affect operational planning and
resourcing. This document helps identify tasks that apply to initiatives to build a
community of personnel trained to identify threats, mitigate threats to ensure the
availability, integrity, authentication, confidentiality, and non-repudiation of Navy
information and information systems.
UNCLASSIFIED/FOUO
12
UNCLASSIFIED/FOUO
Enclosure 1. Terms of Reference
Role - People perform roles within operational teams that work together in a process to
accomplish the mission. The level of effort needed to perform a role determines the
number of people required to execute the tasks within operational processes. Since a
person may perform more than one role, several roles may be related to one billet in
order to capture the total workload for one person. The total billets required form the
“quantity” manpower requirement for a given mission. Also associated with the role are
the tools and technologies (systems) that provide functions needed to accomplish the
tasks and have a tremendous impact on level of effort.
In an operational architecture, the capability producing nodes are roles (not billets).
Roles are related to systems/equipment through processes and activities. In an
operational construct these tasks in turn produce warfighting capability. From a good
understanding of roles (competencies and workload), billets can be derived.
Competency – A characteristic of a human being most often defined as an aggregate
of knowledge, skills, abilities, and behaviors. The competency framework provides the
link from education-to-billet-to-capability-to-readiness. Once those links are understood,
mission essential competencies are prioritized and the total outcome constructs a
manpower strategy that produces sailors ‘ready for work.’ Work in this context is
defined as the combination of organizational processes and role based understandings
(mapped to systems) able to produce the desired effects intended by the operational
command.
Capability – The ability to achieve a desired effect under specified standards and
conditions through combinations of means and ways across the doctrine, organization,
training, materiel, leadership and education, personnel, and facilities (DOTMLPF) to
perform a set of tasks to execute a specified course of action9.
Task – A clearly defined and measurable action, activity, or event (derived from an
analysis of the mission and concept of operations) assigned to an individual or
organization to provide a capability.10
OV-6C – DoDAF product known as the Operational Event-Trace Description. This is
one of three products used to describe operational activity sequencing and timing. It
identifies business process responses to events (i.e. scenarios).
OV-4 – DoDAF product known as the Organizational Relationships Chart. It depicts
relationships within or between organizations.
9
CJCSI 3170.01G, 1 March 2009
CJCSI 3500.02, Universal Joint task List (UJTL) Policy and Guidance for the Armed forces of the
United States, 01 Feb 08.
10
UNCLASSIFIED/FOUO
13
UNCLASSIFIED/FOUO
Integrated Product Team (IPT) – A group of Navy stakeholders whose role is to
provide comment, recommendation and feedback to the study. IPT members will keep
their respective leadership apprised of study progress, milestones, or issues that may
impact their organization.
Technical IPT – This is a sub-set of the IPT that consists of technical SMEs (military,
contractor and civilian) from OPNAV and other stakeholder organizations that provide
specific expertise (without reachback) to the study in the areas of NETOPS, CND, IA,
and Navy manpower, personnel, training and education.
Workshop – Similar to a Technical IPT review but with greater emphasis on operational
requirements driven by specific missions; longer in duration and with a specific
purpose/objective. Workshops will be used during this study to define NETOPS, CND,
and IA roles, processes and determine competencies for each respective role.
Technical Subject Matter Expert (SME) – An individual who attends Technical IPTs
and workshops, reviews and provides inputs to study products, and with requisite
experience as defined as:
-
Four years work and one year supervisory experience in areas directly related to
NETOPS/CND/IA Occupational Expert (OE).
Occupational experts are
considered qualified to define competencies necessary within a particular area of
study.
-
Defensive Cyberspace Manpower SMEs should have expert knowledge and skill
in the missions, operations, and tasks of the OE (or one of the OEs within the
cluster) under study. Expert knowledge may include training, evaluation, or
supervisory experience.
-
Knowledgeable in the following cyber related documents (or draft documents):
DODD 8500.1, DODD O-8530.1, DODI 8500.2, DODI O-8530.2, CJCSM
6510.01, Joint Concept of Operations (CONOPS) for the GIG NETOPS, NWP 363, NTTP 3-32.1, CJCSM 6510.01E, CJCSM 6510.01A, DODD 8500.01E,
DODD 8100.01, 43357-1C, 43358A, 43469.
-
Recommended by their command for their expertise and have the ability to assist
others in developing skills needed to accomplish operational mission tasks
related to the organizational element/cluster to be studied.
-
In order to eliminate potential, unintentional bias by just including Fleet active
duty personnel, SMEs will be sought within reserve augmentation commands,
government civilians, academia, and contractors. A Navy total manpower mix of
SMEs is highly encouraged. SME selection should also include NETOPS, CND,
and IA system and software engineers.
UNCLASSIFIED/FOUO
14
UNCLASSIFIED/FOUO
NETOPS – The DoD-wide operational, organizational, and technical capabilities for
operating and defending the Global Information Grid (GIG). NETOPS includes, but is
not limited to, enterprise management, net assurance, and content management. Since
this study is focused on Navy’s defensive cyber manpower, only the Net Assurance
functions of NETOPS are within scope. 11
-
Enterprise Management is the set of functional capabilities and operational
processes necessary to monitor, manage, and control the availability, allocation,
and performance within and across the GIG. It includes Enterprise Services
Management, Applications Management, Computing Infrastructure Management,
Network Management, Satellite Communications Management, and
Electromagnetic Spectrum Management.
-
Net Assurance is the set of functional capabilities and operational processes
necessary to protect and defend the GIG. This includes the operational
responsibilities for information assurance, computer network defense (to include
Computer Network Defense Response Actions), and critical infrastructure
protection in defense of the GIG.
-
Content Management is the set of functional capabilities and operational
processes necessary to manage, and facilitate the visibility and accessibility of
information within and across the GIG.
Computer Network Defense – CND consists of actions taken to protect, monitor,
analyze, detect, and respond to unauthorized activity within DoD information systems
and computer networks.12
Information Assurance – IA includes measures that protect and defend information
and information systems by ensuring their availability, integrity, authentication,
confidentiality, and non-repudiation. This includes providing for restoration of
information systems by incorporating protection, detection, and reaction capabilities.13
11
DoD Net-Ops Strategic Vision, December 2008
JP 1-02
13 Ibid
12
UNCLASSIFIED/FOUO
15
UNCLASSIFIED/FOUO
Enclosure 2. Plan of Action and Milestones
Event
Phase I: Data Collection / Framework Development
Methodology Development Meeting
Study Plan/TOR Development
Conduct Literature Review
Conduct Strategy-to-Task Analysis (STT)
Collect Baseline Manpower Data
Identify SMEs
Write Scenarios
Develop Role Framework
IPT Review of Study Plan and STT
Phase II: Understanding Problem: Scenario Process,
Role/Competency, and Survey Development
Develop OV-4
Virtual Review of Role Framework
Competency Workshop Rehearsal
Develop Draft OV-6c Diagrams
IPT/Workshop #1: Roles/Competencies/Skills (3 Days)
Map Training to Competencies
Review/Finalize Core Competency Data
Survey Development
IPT/Workshop #2: OV-6c Review (Full-Day)
Phase III: Manpower Analysis and Game-Changing Technologies
Administer Survey (Includes short VTC instruction period)
Revise OV-6c Diagrams
IPT: Identify Game-Changing Technologies (2-3 Hours)
Review/Process Survey Results
Generate Initial Manpower Requirements
Map Game-Changing Impacts to Roles
IPT/Workshop #3: Validate Manpower Requirements (Full-Day)
Phase IV: Final Analysis
Revise Manpower Requirements
Develop Manpower Deliverables for Final Report
Integrate Results into Final Report
Request TWMS Submission
IPT Final Brief-out: Comprehensive Navy Cyber Manpower Requirements
UNCLASSIFIED/FOUO
16
Due Date
Early March
2/15/2010
2/15/2010
2/19/2010
2/25/2010
2/26/2010–ongoing
2/26/2010
3/2/2010
3/2/2010
3/4/2010
Early April
3/10/2010
3/11/2010
3/16/2010
3/23/2010
3/23–25/2010
3/29/2010
3/30/2010
4/1/2010
4/1/2010
Early May
4/7/2010
4/14/2010
4/15/2010
4/21/2010
4/28/2010
4/29/2010
5/5/2010
Late May
5/12/2010
5/14/2010
5/21/2010
5/24/2010
5/27/2010
Download