UNCLASSIFIED Navy NetOps – Aligning for the Future CAPT Doug Swanson 3 Mar 2011 UNCLASSIFIED 1 UNCLASSIFIED Roadmap • • • • • What’s driving us? Where we’ve been Where we are Where we’re going How we’re getting there – NGEN – NETOPS Alignment • RNOSCs • GNOC Merger – ITIL – Inspections – Shared SA • Challenges Ahead UNCLASSIFIED 2 UNCLASSIFIED Information as a Weapon “We must maintain our preeminence in networks, intelligence, and information. There is no other Service or nation that is as good as we are.” “Aligning intelligence and operations and optimizing the network in many ways takes priority over the platform. If we don’t get the intelligence and information right, then the platform is sub-optimized. Therefore we need to elevate the priority of information. Since we already think and operate this way, it’s time aligned organizationally to sustain it … to achieve prominence and dominance” UNCLASSIFIED Admiral Gary Roughead Chief of Naval Operations 17 July and 23 October 2009 3 UNCLASSIFIED A Nation at Risk Mike McConnell Former Director of National Intelligence UNCLASSIFIED “The cyber threat to our country is real and growing. We are surrounded by foreign adversaries, terrorists, and criminal elements that are able to steal, alter or destroy vast amounts of sensitive government and private sector information --- perhaps most of it --- and to do so at will. In addition, many of our adversaries have or are seeking the knowledge, skills, technology and resources to infiltrate the networks used throughout our country.” 4 UNCLASSIFIED Evolution and Organization 2010 CYBERFOR NNWC Split 2009 USCYBERCOM FLTCYBERCOM 2008 FLT EW Center FLT Readiness Division FLT Readiness Division FLT Readiness Division 2006 FLT Intel TYCOM FLT Intel TYCOM FLT Intel TYCOM 2005 NCDOC NAVCIRT + Navy Task Force CNO NCDOC NAVCIRT + Navy Task Force CNO NCDOC NAVCIRT + Navy Task Force CNO NCDOC NAVCIRT + Navy Task Force CNO Cryptology/ Signals Intel Cryptology/ Signals Intel Cryptology/ Signals Intel Cryptology/ Signals Intel Cryptology/ Signals Intel FLEET C5I Modernization FLEET C5I Modernization FLEET C5I Modernization FLEET C5I Modernization FLEET C5I Modernization USFF N6/CIO USFF N6/CIO USFF N6/CIO USFF N6/CIO USFF N6/CIO USFF N6/CIO NCMS NCMS NCMS NCMS NCMS NCMS NCMS NMSC NMSC NMSC NMSC NMSC NMSC NMSC FIWC FIWC FIWC FIWC FIWC FIWC FIWC COMNAVCOM TELCOM COMNAVCOM TELCOM COMNAVCOM TELCOM COMNAVCOM TELCOM COMNAVCOM TELCOM COMNAVCOM TELCOM Naval Space UNCLASSIFIED Naval Space Command Naval Space Command Naval Space Command Naval Space Command Naval Space Command 2002 NETWARCOM Networks, IA, Space, COMMS, INFO OPS, CNO, COMSEC, IO Command 2004 FLEET C5I Modernization FLT EW Center COMNAVCOM TELCOM Naval Space Command 5 UNCLASSIFIED Common Model Administrative Operational CNO STRATCOM USCYBERCOM COMPACFLT USFF FLTCYBERCOM COM 10th FLT CYBERFOR N6 NNWC NCDOC NCDOC NCTAMS LANT / PAC NIOCs NAVSOC NCMS NCTAMS LANT NNWC NCTAMS PAC NIOCs NAVSOC NMSC UNCLASSIFIED 6 UNCLASSIFIED NETWARCOM Mission & Goals Mission Statement Naval Network Warfare Command/ Task Force 1010 commands and controls Navy Networks and leverages Joint Space capabilities to deliver Information Dominance for Navy and Joint operations. Goal 1 - Achieve C2 Achieve effective Navy Network command and control (C2) through optimal organizational alignment, common architecture, mature processes and functions, and standard terminology. Goal 2 - Enhance Security Posture Enhance security posture, improve IT services and prepare for the future Naval Networking Environment by eliminating legacy networks. Goal 3 - Deliver Space Products Deliver enhanced Space products (Satellite Communications, Precision Navigation & Timing, Missile Warning, Intelligence Surveillance and Reconnaissance , and Meteorological Information) to Operating Forces by leveraging DOD, National, commercial, and international Space capabilities. Goal 4 - Optimize Navy Networks Optimize Navy Networks by articulating and prioritizing operational requirements and issuing direction and guidance that implements Navy IM/IT policy. Goal 5 - Achieve NetOps Mission Assurance UNCLASSIFIED Achieve NetOps mission assurance (Network availability and security) through accreditation, operational inspection and 7 certification, and uniform standards and metrics. Updated 24-Sep-10 UNCLASSIFIED Evolution of Navy Networks NNE ASHORE NMCI ONE-NET Commonality ONE-NET Excepted Legacy Excepted NGEN MCEITS MCEN CANES Combat Systems •Services •Gold Disk •Security Settings •Common Client Hardware •Enterprise Software Licensing •Common Application Approval AFLOAT ISNS / IT21 CENTRIX-M SCI Networks SubLAN UNCLASSIFIED Since Dec 2006, Navy has reduced the number of networks from 1300 to 350 with 120 additional scheduled for termination by Oct 2011 8 8 UNCLASSIFIED Operational Alignment As determined during Operation BUCKSHOT YANKEE, NETWARCOM and its subordinate commands are not optimally aligned to exercise C2 of NetOps across all dimensions of warfare and all network enclaves. Objectives: Implement NETWARCOM Direction • Establish C2: Standardized policies, procedures, processes and tools to operationalize NetOps. Facilitate NNE Implementation • Need a Consistent Framework: Provide a framework that aligns all NetOps programs under one strategic umbrella (Starting with NGEN). Meet Warfighter Demands • Provide Predictive Operational Support: Shared SA, codified relationships and authorities, and solid reporting requirements. Improved Resource Alignment • Justified Resourcing: Deliver consistent POM/PR submittals, SMRD reviews, and DRRS-N requirements, aligned to NetOps strategy. Desired Effect: A More Responsive, Agile, Secure, and Transparent NetOps Organization That Delivers Information Dominance to the Warfighter UNCLASSIFIED 9 UNCLASSIFIED Global Enterprise, Regionally Managed C10F (CTF 1010) CTF 1020 C3F/C7F PACFLT NIOCs, CND C2F/USFF C4F/NAVSO DCO C6F CNE/NAVAF DCO RNOSC PAC NIOCs, CND C5F NAVCENT DCO RNOSC LANT PR NOC NGEN NOCs NCTSs NIOCs, CND DCO RNOSC EUR UAR NOC NGEN NOC NCTSs NIOCs, CND RNOSC CENT ECR NOC ONENET-EU IOR NOC ONENET-ME NCTSs NCTSs ONENET-FE NetOps Control Center Service Lines Sample Catalog Command Control Coordinate Communications Services Svc Desk Support UNCLASSIFIED Change Mgmt Tactical Network Services Enterprise Network Services Field Services Data Center Ops Standard Operations Dept. Alignment – Services-Based Messaging Services Disaster Recovery Tech Supt. (T3) Voice & Video Services Asset Mgmt Config. Mgmt Security Mgmt 10 UNCLASSIFIED Aligning for C2 UNCLASSIFIED 30 APR 11 Global NetOps Alignment CTF 1010 / C10F 28 JAN 11 NGEN IT-21 Excepted Excepted ONE-Net Networks COSC Strengthen the Region RNOSC IOC GNOC Merger & NNWC Realignment 60% Enterprise View Integrate/ Aggregate 30 SEP 11 NGEN/ CANES Unified C2 2014+ 11 UNCLASSIFIED Standardizing NETOPS Service Delivery through ITIL V3 UNCLASSIFIED 12 UNCLASSIFIED Cyber Security Inspection and Certification Program Continual Service Improvement • Answers “Where are we now?” • Feeds the “Check” stage of the Deming Cycle • Drives accountability, responsibility, and authority for cyber security • Uncovers gaps in our cyber doctrine, procedures, and processes • Finds best cyber operators in order to inspect and train the rest UNCLASSIFIED 13 UNCLASSIFIED Afloat Assessments Culture Conduct 45 40 35 T3 30 25 Findings Capability T2 • USB Devices • Patches • Malware • Unauthorized Software • Root Level Access • Weak / No Access Control Lists • Unnecessary Open Ports • Weak / Default Passwords 20 15 10 T4 5 T1 0 T1 T2 T3 T4 5 35 43 14 UNCLASSIFIED Same Problems Ashore 14 Significant Findings for Shore Installations UNCLASSIFIED Installation Location Enclave COMPACFLT Oahu, HI NMCI C3F HQ San Diego, CA NMCI, Legacy NCTAMS PAC Oahu, HI IT-21 NCTS San Diego, CA IT-21 NCTS Yokosuka, Japan ONE-Net NCTS Guam ONE-Net Note: Not all installations had all of the findings listed below •Extensive USB device usage •Malware present •Unauthorized software installed on workstations •Unnecessary services running on workstations •Unnecessary open ports on network hosts •Weak / Default passwords on system devices and privileged accounts •Improper configuration of file system permissions UNCLASSIFIED 1515 UNCLASSIFIED New Cyber Security Cycle Three year cycle tied to Network Authority to Operate (ATO) process with an annual drumbeat… • Admin Program Review (ADMAT) • Unit Level Training and Assessment Ready to Train Stage 1 Ready to Operate Stage 2 • External Inspection Certified to Operate Stage 3 EXPECT WHAT YOU INSPECT UNCLASSIFIED 16 UNCLASSIFIED The Cyber COP What’s happening in Cyberspace of concern? What is the scope of the attack? Intelligence Understanding networks UNCLASSIFIED What are we detecting? Who are the victims? National rules How are we postured? Window to get information Can we detect malicious activity? Cognizance Situational Awareness What do we need to do? Who needs to be informed? Roles and Responsibilities 17 UNCLASSIFIED Challenges • Converging strategy for C2 with emerging technology trends • Negotiating/codifying regional C2 relationships and authorities • Implementing an industry model in Navy • Workforce transition • Network instrumentation to support C2/SA/COP • Risk Assessment • Resources UNCLASSIFIED 18 UNCLASSIFIED Questions Naval Network Warfare Command 2465 Guadalcanal Road Virginia Beach VA 23459-3228 (757) 417-6700 www.netwarcom.navy.mil UNCLASSIFIED 19 UNCLASSIFIED Backups UNCLASSIFIED 20 UNCLASSIFIED 7 Step ITIL CSI Process Identify • Vision • Strategy • Tactical Goals • Operational Goals 1. Define what you should measure 2. Define what you can measure 7. Implement corrective action 6. Present and use the information to answer “Did we get there?” and to determine next steps UNCLASSIFIED 5. Analyze the data – are there relationships? Trends? Were targets met? Were plans followed? Is corrective action needed? Goals 4. Process the data – align and rationalize data from disparate sources 3. Compile available data – not only what is done, but when, how, and by whom 21 UNCLASSIFIED Questions “Our Sailors must be empowered to operate and fight in a vast array of environments that range from failing states and ungoverned spaces to the most technologically advanced nations, virtual worlds and cyberspace.” Statement of CNO to HASC, 1 March 2006 UNCLASSIFIED 22 UNCLASSIFIED C10F CTF 1010 C3F/C7F PACFLT C2F/USFF C4F/NAVSO C6F CNE/NAVAF NIOCs, CND RNOSC PAC NIOCs, CND RNOSC LANT RNOSC EUR NIOCs, CND RNOSC CENT ONENET-EU UAR NOC PR NOC C10F C2 (CTF 1010) C5F NAVCENT NIOCs, CND ONENET-ME ECR NOC NGEN NOCs NCTSs San Diego NGEN NOCs IOR NOC NCTSs NCTSs ONENET-FE Djibouti C10F (CTF 1010) CHAT/VOICE • Comply w/Global Orders • Impact limited to AOR • Report to CTF 1010 ASAP ** Ops Urgency Prevails Component & Numbered FLT CDRs DCO CONOPS CHAT/VOICE CTF 1020 CTF 10xx Regional NIOC UNCLASSIFIED SCI CHAT CONOPS RNOSC CND Command – lawful command authority over subordinates by assignment or rank Control – non-command authority exercised over activities of organizations Coordinate – delegated authority for coordinating specific functions or activities 23 UNCLASSIFIED Alignment Plan Timeline Objectives: Establish Command and Control (C2) Provide Predictive Operational Support Facilitate NNE Implementation Gain NNWC Leadership Approval for Way Ahead 3/10 Gain FLTCYBER/ C10F Leadership Approval for Way Ahead Form Overarching and Core IPTs 4/10 8/10 Execute Phase I: Mature and Consistent C2 8/10 Assume C2 of NMCI/ COSC 10/10* Complete Phase I. 7/12 Commence Transition to RNOSCs Achieve RNOSC Interim Operational Capability (IOC) Achieve RNOSC Full Operational Capability (FOC) 10/10 4/11 10/12 * Initiate Exercise C2 over Critical Services FOC expected 1 OCT 2011 UNCLASSIFIED 24 UNCLASSIFIED FOUO Defensive Cyberspace Operations • DCO WO • Coordinate and execute regional DCO missions • Incident Handling • Respond to network defense events and incidents • Vulnerability Management • Vulnerability assessment, tracking and reporting • Indications & Warning (I&W) • Identifies cyber threats • Correlates with AS&W reporting • Recommends countermeasures • Attack Sensing and Warning (AS&W) • Identifies malicious changes • Detects, correlates and characterizes • Executes and validates countermeasures • Forensics • Low priority incident triage analysis • Comprehensive malware and hard drive analysis UNCLASSIFIED FOUO 25 FY09/10 Significant CND EventsUNCLASSIFIED with NETOPS Implications 1. Culture 2. Conduct 3. Capability 2008 2009 2010 Afloat Roles/ Responsibilities UNCLASSIFIED N6/N39? 26 UNCLASSIFIED Solutions • Culture – – – – Accountability Commander’s “Daily View” Focus on 1000s of Threats Damage Control, Force Protection • Conduct – – – – – – – Enterprise C2 One Network, One Fight Inspection Mentality Proactive OPREP 3 Physical Security Compliance • Capability – – – – – – – Network Visibility Information Assurance TYCOM Dynamic Defense Automation Physical Security PORs UNCLASSIFIED 27 UNCLASSIFIED Building the NetOps Workforce • Transition to ITSM organizational and business model – – – – UNCLASSIFIED ITIL-based Reassessment of workforce skill sets Competition with industry INSERT ITIL TRAINING DATA HERE 28 UNCLASSIFIED Our Global Presence NETWARCOM Presence NETWARCOM UNCLASSIFIED 29 UNCLASSIFIED Evolution of Navy Networks Existing Networks De-centralized control with decentralized execution Naval Networking Environment (NNE) Government controlled standardized Architecture & managed (Engineered) Interfaces ASHORE NMCI ONE-Net Excepted One-Net Commonality Excepted NGEN MCEITS Legacy MCEN CANES Combat Systems •Services •Gold Disk •Security Settings •Common Client Hardware •Enterprise Software Licensing •Common Application Approval AFLOAT ISNS/IT-21 CENTRIX-M SCI Networks Navy has significantly reduced the number of networks SubLAN UNCLASSIFIED 30 UNCLASSIFIED NetOps Command and Control (Starting with NGEN) • Synergy between: – Visibility into health and status of the network – SA of threat environment – SA of operational environment – Focus on mission priorities and Commander’s intent • Authority, People, Processes, and Tools to direct appropriate actions on the network Shared SA + Authority + People + Processes + Tools = NetOps C2 UNCLASSIFIED 31 UNCLASSIFIED Realignment Objectives • Exercise command & control of Navy NETOPS • Provide shared situational awareness and security posture to meet warfighter demands • Deliver a consistent NETOPS framework for the future • Foster a culture of accountability in NETOPS • Improve resource alignment (people, tools, and finances) UNCLASSIFIED 32 UNCLASSIFIED Challenge: Dynamic Threat Attack Sophistication versus Intruder Knowledge Compression of the Discovery-Attack Life Cycle • Has the situation improved or worsened since these graphs were produced? • New exploits since 2003 – Code Red, Slammer/Blaster, BotNets, Phishing & Spear Phishing, Cybercrime “for hire” • What’s next? Can you help the Navy stay ahead? UNCLASSIFIED From Eschelbeck, G., Do you feel the force?, July 2003 http://www.scmagazine.com/scmagazine/2003_07/cover/ 33 UNCLASSIFIED Solutions • Culture – – – – Accountability – everybody has a role Commander’s “Daily View” Focus on 1000s of Threats Damage Control, Force Protection • Conduct – – – – – Enterprise C2 One Network, One Fight Inspection Mentality Proactive Operational rigor & reporting • Capability – Network Visibility – Information Assurance – Type Commander to focus on Man, Train & Equip functions – Dynamic Defense – Automation UNCLASSIFIED 34 UNCLASSIFIED Transformation Strategy Jul 10 NetOps Alignment Plan Oct 10 N-Code Standardization Jan 11 CSICP Jan 11 GNOC Det Merger Apr 11 RNOSC IOC Oct 11 RNOSC Build Out MOC – RNOSC Construct Synchronized Plan 1.RNOSC IOC → FOC 2.C10F C2/SA 3.CTF 1010 /C10F 4.COSC → NGEN → NNE Codified C2 Mutually Supportive Unity of Effort CTF 1010 /C10F C10F C2/SA NGEN C2 Implementation UNCLASSIFIED 35 UNCLASSIFIED Continual Service Improvement Notional CYBERFOR Fleet Reqs PMW Reqs •Plan •Requirements Design •Builds Capability •Gap Analysis NEIRP UNCLASSIFIED C10F / NNWC NetOps CSI Gaps •Control •Measure •Design •Prioritize •Coordinate •Improve •Test •Implement •Execute Measure 36 UNCLASSIFIED Standardizing NETOPS Service Delivery through ITIL V3 • Desired Results: – Standardized, repeatable processes and procedures for supporting and maintaining NETOPS services – Establish policy to guide process development and continual improvement – Common lexicon – Clearly defined roles and responsibilities – Establish tool standards that will enable “single source of information” for collaboration and coordination of daily activities • Operational Objectives – Navy Networks integrated within an effective NetOps C2 construct -centralized, global and authoritative C2, regionally managed – SOPs to capture standardized network operations tactics, techniques and procedures – Standardized NetOps capabilities that enable visibility and control processes, procedures, tools and core competencies – Accurate and timely information shared awareness enabling NetOps C2 UNCLASSIFIED 37 OWNER: NNWC CIO OWNER & MANAGER: NETOPS-1 MANAGER: NETOPS-2 Access Mgmt Info Security Mgmt Incident Mgmt OWNER: NCF N4/7 MANAGER: NETOPS-3 Event Mgmt Problem Mgmt NetOps Directorate ACOS/Deputy/Admin/LCPO NetOps-2 IA DiviDir&Deputy IA/Compliance/IA Watch/ DMZ/MOC/COI/Data Conf/CTO(s) NetOps-1 Network Ops DivDir&Deputy BWC-ABWC/NetOps C2 Service Operation Trans/EntOps/Change(ASI) Network Performance CSI CSI NetOps-3 Enterprise Mgmt DivDir & Deputies Transport GTSE/RF Mgmt Pier/Bdry/C2I BAN-LAN/WAN Services Web/Messaging Apps/DB-ESD/OS CSI VOX-VID/File/COI NetOps-5 Plans/policy/Exercise Future Ops/Process & Analysis/CSI/Future Plans/Exercise-COOP Continual Service Improvement (CSI) UNCLASSIFIED NetOps - Command and Control Network Command and Control equates to shared Situational Awareness and Unified C2 UNCLASSIFIED 39 UNCLASSIFIED Information Dominance Warfare PQS • Officer PQS – Approved by N2/N6 and Community Leaders, the IDC PQS is in final stages of preparation for NETC publication as NAVEDTRA 43360 – Individual community PQSs are undergoing review/update • Information Warfare: Complete • Information Professional Basic PQS working group held in Jun • Intel PQS update conference planned tentatively for Aug/Sep • Space Cadre PQS working group planned for Aug • Enlisted PQS – Common Core assigned NAVEDTRA 43365 – 4 Command specific PQS completed: NCDOC, NIOC, NCTAMS, ONI – Common Core PQS currently being Beta tested and rolled out to all commands UNCLASSIFIED 40 UNCLASSIFIED C10F Standing Task Organization Headquarters CTF 1000 CTF 1030 CTF 1090 CO NIOC Norfolk CO NIOC Suitland C10F CTG 1000.9 C10F D/COM NIOD Yakima CTG 1000.1 CTG 1000.3 CTG 1000.5 CTG 1000.7 NIOC Menwith Hill Station NIOC Misawa NIOC Georgia NIOC Hawaii CTG 1000.2 CTG 1000.4 CTG 1000.6 CTG 1000.8 CTG 1000.10 CTG 1030.2 NIOC Sugar Grove NIOC Texas NIOC Maryland NIOC Colorado NIOD Alice Springs NIOC San Diego CTG 1030.1 R &D NIOC Norfolk CTG 1030.3 Service Cryptologic Component Operations NIOC Whidbey Island Information Operations CTF 1010 CTF 1020 CTF 1040 CTF 1050 CTF 1060 CTF 1070 CTG 1080.1 COMNNWC BWC CO NCDOC CO NIOC Texas CO NIOC Georgia CO NIOC Maryland CO NIOC Hawaii NIOC Colorado CTG 1010.1 CTG 1020.1 CTG 1040.1 CTG 1050.1 CTG 1060.1 CTG 1070.1 CTF 1080 NCTAMS LANT NCDOC NIOC Texas NIOC Georgia NIOC Maryland NIOC Hawaii CO NIOC Colorado CTG 1020.2 CTG 1050.2 CTG 1060.2 CTG 1070.2 NIOC Pensacola NIOC Bahrain FIOC UK NIOC Yokosuka CTG 1010.2 NCTAMS PAC CTG 1010.3 CTG 1070.3 NAVSOC NIOC Misawa NetOps/SpaceOps Computer Network Defense Network Operations & Defense Group UNCLASSIFIED Fleet and Theater Operations 41 UNCLASSIFIED NETWARCOM Organization Commander Deputy and Chief of Staff Cyber Asset Reduction & Security UNCLASSIFIED Network Operations Space Operations Navy Operational Designated Approving Authority Network Assurance & Command Information Office Office of Compliance and Assessment 42 UNCLASSIFIED Big 7 ITIL Process Owners & Managers NAVNETWARCOM NAVYCYBERFOR O M IT Request Fulfillment NCF N8 IT Service Continuity NCF N8 O M Problem Management Event Mgmt – NetOps-1 O M Man, Train, Equip UNCLASSIFIED OM Incident Mgmt – NetOps-1 O M Problem Mgmt – NetOps-3 M Access Management - CIO O Access Mgmt – NetOps-2 M Info Security Mgmt - CIO O Info Scty Mgmt – NetOps-2 M Operate 43 UNCLASSIFIED Cyber Security Inspection and Certification Program (CSICP) COMFLTCYBERCOM FT GEORGE G MEADE MD 282138Z JAN 11 “ THIS IS A COORDINATED COMPACTFLT, USFF, AND COMFLTCYERCOM MESSAGE TO IMPLEMENT A CNO DIRECTED THREE-STAGE ENTERPRISE CYBER SECURITY INSPECTION AND CERTIFICATION PROGRAM (CSICP). THIS PROGRAM WILL ENSURE THE HEALTH AND SECURITY OF NAVY NETWORKS AND CONNECTED COMBAT SYSTEMS, AND FORMALIZE A PROCESS THAT PROVIDES CONTINUING OVERSIGHT AND ACCOUNTABILITY……. NAVY NETWORKS ARE A COMBAT SYSTEM AND WILL ADHERE TO THE SAME INSPECTION AND CERTIFICATION RIGOR AS ALL OTHER COMBAT SYSTEMS.” UNCLASSIFIED 44 UNCLASSIFIED Our Global Presence NETWARCOM Presence NETWARCOM UNCLASSIFIED For Official Use Only 45 4