Roadmap for the MoD Cyber Test Range

Transcription

Roadmap for the MoD Cyber Test Range
Roadmap for the MoD Cyber Test Range
Date
Status
10 September 2012
Final
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Colophon
IT Agency Group
Operations
Van der Burchlaan 31
Postbus 90822
2509 LV Den Haag
Contact
M.P. Lindgreen
Projectmanager
M 06 516 423 79
[email protected]
Commisioned by
Author(s)
Delft TopTech
M.P. Lindgreen
No content of this thesis is to be used without the permission of the author.
The views expressed in this thesis are those of the author and do not
necessarily represent the views of the Netherlands Ministry of Defence.
Page 2 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Table of contents
Colophon ................................................................................................... 2
Preface ...................................................................................................... 5
Executive summary.................................................................................... 6
1
1.1
Introduction .................................................................................... 8
Problem area .................................................................................. 8
1.2
Research goal ................................................................................. 9
1.3
Research scope .............................................................................. 10
1.4
Results to be achieved .................................................................... 10
1.5
Research methodology .................................................................... 11
2.1
Cyber operations ........................................................................... 12
Introduction .................................................................................. 12
2.2
Context and terminology ................................................................. 12
2.3
Cyber operations in perspective ........................................................ 14
2.4
Developments in cyber test ranges ................................................... 18
2.5
Summary ...................................................................................... 23
3.1
MoD Cyber Test Range ................................................................... 24
Introduction .................................................................................. 24
3.2
Methodology .................................................................................. 24
3.3
Cyber Test Range business functions ................................................. 25
3.4
Cyber Test Range services ............................................................... 26
3.5
Cyber Test Range requirements ........................................................ 38
3.6
Summary ...................................................................................... 41
4.1
Roadmap for the Cyber Test Range ................................................ 42
Introduction .................................................................................. 42
4.2
Priority Cyber Test Range business functions ...................................... 42
4.3
Cyber Test Range maturity model ..................................................... 45
4.4
Cyber Test Range roadmap .............................................................. 53
4.5
Validation ...................................................................................... 56
4.6
Summary ...................................................................................... 57
5.1
Conclusions and recommendations ................................................ 58
Conclusions ................................................................................... 58
5.2
Recommendations .......................................................................... 60
2
3
4
5
6
Reflection ...................................................................................... 61
Page 3 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
7
Bibliography .................................................................................. 63
Appendix I.
Detailed overview CTR business functions ........................ 65
Appendix II.
Interview protocol ............................................................ 68
Appendix III.
Interviews expectations towards a cyber test range ...... 70
Appendix IV.
Calculations of priorities per CTR business function .......... 71
Appendix V.
Calculations of CTR requirements’ complexity ................... 73
Appendix VI.
Priority of CTR business functions ..................................... 74
Appendix VII.
Requirements for delivering business functions ............. 77
Page 4 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Preface
This master thesis is the last and main deliverable for the study Master of IT
Management at Delft Toptech, a subsidiary of the Delft University of Technology.
This thesis explores the phenomena of cyber test ranges in support of cyber
operations and the applicability of a cyber test range to the Netherlands Ministry of
Defence (MoD). Although cyber has been around for some time, it is my personal
belief that we are at the forefront and many more developments are to be expected.
The same applies to cyber test ranges. It is certainly a new topic for the MoD but it
is also a fairly new topic in general where much more research and development is
needed. Therefore, I am delighted to have been able to conduct research in such an
exciting area.
This research is the result of contributions, insights and fruitful discussions with
many professionals. I would like to take the opportunity to express my sincere
gratitude to Jan van den Berg, who is an associate professor at the Delft University
of Technology, for his time, suggestions and inspiring comments during the process
of research. These comments kept me motivated and craving to take this research
to a next level. Furthermore, I would like to thank Colonel Hans Folmer for
suggesting and granting the opportunity to research this topic and I also would like
to thank my colleagues at the MoD for taking the time to share their views on all
topics related to the cyber test range and for their essential information.
In alphabetical order:
Mr. R. Hinfelaar
Warrant Officer R. Hubertse
Lieutenant J. Kan
Lieutenant Colonel M. Verhagen
Major P. ‗t Hoen
Major G. Wens
Colleagues from the Military Intelligence and Security Service
Moreover, I would like to thank the following persons for reviewing this research and
offering suggestions.
In alphabetical order:
Mr. I. Lamit
Mrs E. Lindgreen
Last but certainly not least, I would like to thank my wife, Katelijn and my son,
Merlijn for their patience and support during the worktimes in the weekends and
evening hours.
Marko Lindgreen
Voorburg, September 2012
Page 5 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Executive summary
The Netherlands Ministry of Defence (MoD) is strengthening its ambition in the field
of digital resilience and cyber operations. The Cyber Test Range (CTR) will be one of
the functionalities that will support the new cyber operations. A CTR can be
considered as a ‗digital shooting range‘, comparable to a shooting range in the
physical world, wherein military personnel can conduct military exercises, train their
drills and test their skills.
Cyber operations is a relatively new topic for the MoD and will play an increasing
role in its future weapons arsenal. In the slipstream of these new developments
comes the CTR which is one of the functionalities that needs to be defined, designed
and subsequently implemented. Therefore, the following research goal is
formulated:
“The goal is to design a roadmap for the development of a cyber test range.”
The research methodology aims to (a) understand the context of cyber operations
and cyber test ranges, (b) perform an analysis in order to determine the business
functions and requirements applicable to the MoD CTR and (c) design a roadmap for
the CTR based on the outcome of the analysis phase.
Through cyber operations the military have the capability, along with other military
capabilities, to defend and/ or attack (or gather intelligence) in order to achieve
political or military objectives or effects. Cyber operations consist of offensive,
defensive and intelligence capabilities in which (a) cyber defense is aimed at
protecting its own networks and systems, (b) cyber attack is aimed at disrupting,
denying, degrading or destroying networks and systems and (c) cyber intelligence
enables intelligence collection through networks and systems.
CTR‘s are virtual environments that are used for research and development,
evaluation and training purposes within the cyber domain. From a military
perspective, cyber test ranges can be seen as an environment that offer
stakeholders the ability to - more effectively - defend and attack (or gather
intelligence regarding) critical infrastructures or military capabilities. Several
countries possess CTR‘s or are in the process of implementing cyber test ranges.
The MoD business expectations towards the CTR are categorized into CTR business
functions. The generic business functions are positioned on the level of cyber
operations. These business functions offer the ability to support daily operations and
research and development. To support daily operations, the CTR can deliver
business functions that (a) enable personnel to act in the cyber domain, (b) assess
the effectiveness of current capabilities and (c) respond to cyber attacks or to
conduct cyber attacks or intelligence. To enable research and development, the CTR
can deliver business functions that offer a platform to (a) conduct applied research
into future cyber solutions or to (b) research whether external solutions add value
to the MoD. The specific business functions are positioned at the level of cyber
operations capabilities, being defensive, offensive, or intelligence capabilities. The
specific business functions are specifically tailored to support one of the three
capabilities.
Page 6 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Through this approach, the CTR delivers an added value for each capability and for
each activity within a capability making it an important supporting instrument for
conducting cyber operations.
The delivery of CTR business functions depend on technical and organizational
requirements. Technical requirements include the ability to simulate ITenvironments with all its characteristics but also to be scalable in assets and flexible
in deploying configurations. Security is crucial and security requirements should be
high. The organizational requirements consist of the ability to maintain and
configure the CTR, to support training or exercises and to conduct experiments.
The roadmap offers a timeline for the CTR for the delivery of business functions and
the implementation of technical and organizational requirements during the next
five years.
1. The business functions that enable personnel to act in the cyber domain should
be the main priority. Implementation is proposed through a level 3 maturity that
evolves to a level 5 maturity, with a total lead-time between 2 and 3 years.
2. The second priority is seen for the business function that researches external
solutions to enhance cyber operations. The realization is also proposed through
a phased approach by reaching a level 3 maturity and subsequently a level 5
maturity. The aim is to achieve level 5 between 4 and 5 years.
3. The ability to support a response to cyber attacks or to prepare for performing
cyber attacks or intelligence is graded as a third priority. It is suggested to
achieve a level 5 maturity between 4 and 5 years.
4. The business functions that enable assessments of the current means and
conduct research into future cyber solutions are deemed least important. It is
suggested to set the ambition for this business functions to a maturity level 3,
to be achieved between 4 and 5 years.
The following main recommendations are provided:
1.
Establish an approach for the realization of the CTR under supervision of the
Taskforce Cyber within the NL MoD. Liaise with the UK MoD in regard of their
experience with their CTR and with NATO regarding possible developments in
the CTR area. Collaborate with knowledge institutions and partners in order to
validate the proposed CTR roadmap. Combine these views along with the
proposed roadmap as a baseline for the CTR approach within the MoD.
2.
Develop the CTR business function under the supervision of the Taskforce Cyber
and in cooperation with the three cyber operations capabilities. Liaise with the
NATO Cooperative Cyber Defence Centre of Excellence in regard of their
experience in cyber defense exercises supported by a cyber lab.
3.
Realize the requirements needed to deliver business functions. Acquire, through
the forthcoming Defence Cyber Expertise Centre, resources for conducting
trainings and exercises and research and development. Determine whether the
maintenance and configuration of the CTR will be conducted within the MoD or if
it is suitable for sourcing. Define research questions in order to research
complex technical requirements in cooperation with knowledge institutes and
businesses.
Page 7 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
1
Introduction
This chapter presents a brief overview of the problem area in which the cyber
developments within the Ministry of Defence (MoD) are described and the cyber test
range is introduced. Based on the problem area, the research goal is presented
along with its limitations and the results to be achieved. Lastly, an overview of the
research methodology is given.
1.1
Problem area
In April 2011 the Netherlands Ministry of Defence (MoD) revealed (1) its largest cost
cutting operation in its history. Despite the massive cost reduction, the MoD
announced its ambition in the field of digital resilience and cyber operations. An
estimated €50 million will be invested till 2015 in order to deploy cyber capabilities
that will supplement the kinetic weapon arsenal in 2016.
The MoD cyber strategy (2) presents the course for the forthcoming years. The
strategy consists of six objectives:
1. realize an cohesive approach within the MoD towards cyber;
2. strengthen the digital resilience of the MoD;
3. development of military capabilities to execute cyber operations;
4. strengthen the intelligence position in the cyber domain;
5. strengthen the knowledge position and innovative capability in the cyber
domain;
6. intensify international and national cooperation.
The future governance framework structure is revealed in a MoD study (3) into
cyber operations (see Figure 1). The first entity, a Cyber Command, will govern
cyber operations. The second entity consists of cyber operations capabilities with the
abilities to defend networks and systems of the MoD, to attack other networks and
systems and to gather intelligence through other networks and systems. The last
entity is a Cyber Expertise Centre. Its role is to enhance the strategic, tactical, and
operational knowledge and skills concerning cyber operations within the MoD. The
Cyber Expertise Centre will therefore support Cyber Command and the three cyber
operations capabilities with services in the field of knowledge development and
knowledge dissemination and will, in that context, provide a cyber test range (CTR).
Figure 1: MoD governance framework
Page 8 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
The CTR will be one of the functionalities that supports cyber operations. A CTR can
be considered as a ‗digital shooting range‘, comparable to a shooting range in the
physical world, wherein military personnel can conduct military exercises, train their
drills and test their skills.
The implementation of the CTR starts in 2013 and the functionalities delivered will
be gradually extended. The need for a CTR is first mentioned in a MoD policy paper
(3) in which the need for a CTR is briefly quoted but the CTR function is not further
elaborated in terms of goals, objectives or specifications.
Current IT test environments within the MoD are mainly used in support of primary
IT processes. In general, these environments are used for availability and capacity
testing purposes as part of ITIL processes (4), which is used to deliver IT-services.
Therefore, the current environments are hardly comparable to a future CTR used in
support of cyber operations, which in turn is deployed as a weapon.
Several countries possess CTR‘s or are in the process of implementing cyber test
range. However, it is difficult to understand the goals and possibilities of CTR‘s and
the progress in the realization. The information through open sources is limited. In
addition, it is difficult to compare these CTR‘s because they have different areas of
interest. Moreover, different terms are used to indicate a CTR functionality, e.g.
cyber testbed, cyber lab or cyber range. In general, it can be stated that the
development of CTR has started a few years ago, mainly in the United States and
the concept is still being developed and implemented in different countries.
1.2
Research goal
Cyber operations is a relatively new topic for the MoD and will play an increasing
role in its future weapons portfolio, as indicated in paragraph 1.1. Some parts of
cyber operations are in the development or implementation stage, others still have
to be designed. The CTR is one of the functionalities that has to be defined,
designed, and subsequently implemented. Therefore, the following research goal is
formulated:
“The goal is to design a roadmap for the development of a cyber test range.”
Derived from the research goal are the following sub goals:
1.
Create an understanding of cyber operations
The goal is to deliver the definition for cyber operations, its capabilities and to
establish the activities that are conducted within cyber operations capabilities.
2.
Describe the current state of CTRs
The goal is to acquire knowledge about the use and developments in cyber test
ranges and to provide CTR business functions.
3.
Define the MoD CTR business functions
This sub questions researches the MoD‘s expectations regarding the CTR from a
defensive, offensive and intelligence capabilities viewpoint. The goal is to
determine the CTR business functions that support offensive, defensive and
Page 9 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
intelligence capabilities. Business functions are seen as a series of logically
related services performed together to obtain a defined set of results.
1.3
4.
Define the necessary requirements for delivering CTR business functions
The goal is to identify the technical and organizational requirements for
delivering the CTR business functions.
5.
Design a roadmap for the development of a cyber test range
The goal is to design a timeline for the implementation of business functions and
the technical and organizational requirements needed to deliver business
functions. The roadmap delivers the necessary input for the change
management for the implementation of a CTR.
Research scope
NATO uses the acronym DOTMPLFI1 for building capabilities to indicate which
measures need to be implemented before a capability can acquire the status of
being fully operational. As stated in the problem area, there is limited (re)use of
current test environments in relation to the CTR which implies that: doctrine,
organization, training, material, leadership, and education, personnel, facilities and
interoperability surrounding the CTR have to be (re)defined, designed, developed
and implemented.
This study focuses primarily on organizational (including personnel) and technical
requirements (as part of material). The reason is that these requirements are a first
necessity for a CTR to operate. Without a solid IT-environment, there is no CTR.
Without the proper organization to maintain the CTR or to work with one there is no
CTR or CTR function.
The other measures are: doctrine, training, leadership, facilities and education and
interoperability are in this case supportive to the organization and technical
requirements. These measures are needed for a CTR to run effectively and
efficiently but are given, due to the initial phase of research into CTR‘s, a second
priority and thus not included in this research.
1.4
Results to be achieved
This research is aimed at determining which business functions can be incorporated
into the CTR during the next five years and what technical and organizational
requirements are necessary to deliver these functions.
The deliverable of this thesis is to provide a roadmap that offers a timeline for the
delivery of business functions and an implementation timeline of technical and
organizational requirements.
Based on the recommendations given through this thesis, it is possible to start
additional research into the design, development, and realization of the technical
and organizational requirements in order to be able to deliver all CTR business
functions.
1
Doctrine, organization, training, material, leadership and education, personnel, facilities and interoperability
Page 10 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
1.5
Research methodology
This paragraph gives an overview of the research methodology based on the
research goal and its sub goals. The research is conducted through the following
methodology:
1. Understand the context of cyber operations and cyber test ranges.
2. Perform an analysis in order to determine the business functions and
requirements applicable to the MoD CTR.
3. Design a roadmap for the CTR based on the outcome of the analysis phase.
This methodology is presented in Figure 2.
Introduction
- Chapter 1 Introduction
Research
methodology
Research goal
Context
- Chapter 2 What are cyber
operations?
What’s a Cyber Test
Range?
Desk research
Analysis
- Chapter 3 What are the expectations towards a Cyber
Test Range?
What are necessary requirements for
meeting the expectations?
Interview/ survey
Design and Validation
- Chapter 4 What is the roadmap for development
of the CTR?
Validate outcome
Conclusions and recommendations
- Chapter 5 Provide conclusions and
recommendations
CTR roadmap
Figure 2: Research methodology
Page 11 of 78
Workshop
Expert panel
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
2
Cyber operations
2.1
Introduction
The first step in order to design a CTR roadmap is to understand the context in
which the CTR will operate. This chapter therefore researches the context of cyber
operations and cyber test ranges. The goal is to provide:
1. The definition of cyber operations and its capabilities, so as to get an
understanding of the future users of the cyber test range;
2. The activities that are conducted within the cyber operations capabilities, so as
to get an understanding of the business conducted within these capabilities;
3. The characteristics and goals of cyber test ranges, so as to get an understanding
of the kind of cyber test ranges and its purposes.
2.2
Context and terminology
Cyber consists of many elements that in addition are being viewed differently (5). In
addition, some elements are not officially named and are labelled for the purpose of
this thesis. Therefore, this paragraph positions these ‗cyber elements‘ in a context
as applied in this thesis. This context is presented in the following figure. The
elements within the context are described in the subsequent paragraphs.
Figure 3: Cyber elements in context
Page 12 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
2.2.1
Cyber operations
Cyber operations are deployed in order to achieve a certain political or military
effect. This effect could for example be the degradation of the opponents‘ air
defences, or the disruption of the ability for the opponent to command and control
its forces, or the ability to assure the possibility for the MoD to command and
control its forces. Therefore, cyber operations support the ability to attack, to
defend, or to gather intelligence. For completeness, the deployment of cyber
operations is one of many options a military commander has in order to achieve a
certain effect. A commander can deploy land, air, or sea operations in order to, for
example degrade the opponent‘s air defences.
2.2.2
Cyber operations capabilities
Cyber operations consist of three capabilities that enable the ability to attack,
defend, and gather intelligence. Capabilities, in a military context, are used to
indicate that one possesses the ability or power to achieve a certain political or
military objective or effect. The three capabilities are:
1. A defensive capability to protect its networks and systems;
2. An offensive capability to disrupt, deny, degrade or destroy other networks
and systems;
3. An intelligence capability to enable intelligence collection of other networks
and systems in order to defend its own networks and systems or to support
the offensive capability.
The cyber operations capabilities are researched in paragraph 2.3.2.
2.2.3
Cyber operations activities
Within each of the three cyber operations capabilities, multiple activities are
performed that enable the delivery of a cyber operations capability. These activities
are dedicated to one capability. The cyber operations activities are researched in
paragraph 2.3.3.
2.2.4
Cyber test range
Cyber test ranges are virtual environments that simulate live environments and are
used in support of cyber operations. The key benefit of the CTR is the ability to test
and practice without the risk of damaging live networks or disruption of live
operations. Cyber test ranges are researched in paragraph 2.4.
2.2.5
Cyber test range business functions
The cyber test range delivers business functions. These business functions are seen
as a series of logically related services performed together to obtain a defined set of
results, such as the ability to train, research and develop or assess. By providing
these business functions, the CTR provides support to the defensive, offensive and
intelligence capabilities. The business functions can be generic which means that
these are aimed at supporting cyber operations or the business functions can be
specific which means that these are aimed at supporting cyber operations
capabilities. Cyber test range business functions are researched in paragraph 3.3.
2.2.6
Cyber test range services
Cyber test range business functions consist of cyber test range services. These
services focus on specific elements within the business function. Cyber test range
business services are researched in paragraph 3.4.
Page 13 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
2.2.7
Cyber test range requirements
Implemented cyber test range requirements provide a platform on which cyber test
range services can be delivered. Requirements can consist of requirements in the
field of doctrine, organization, training, material, leadership and education,
personnel, facilities and interoperability. This study focuses primarily on
organizational (including personnel) and technical requirements (as part of
material). Cyber test range requirements are researched in paragraph 3.5.
2.3
Cyber operations in perspective
This paragraph delivers the definition of cyber operations and its capabilities.
Additionally, it establishes the activities that are conducted within cyber operations.
2.3.1
Defining Cyber
Cyber is an expression that is widely used to form new internet-related
manifestations of existing concepts. But what does it all mean?
Cyber- is a prefix derived from "cybernetic," which comes from the Greek adjective
kybernetes meaning skilled in steering or governing (Liddell and Scott, GreekEnglish Lexicon). This word was introduced by Norbert Wiener (6) for his work in
electronic communication and control science.
William Gibson first used Cyberspace, as a noun, in a science fiction novel
Neuromancer. Gibson was quoted by Wired.com (7) in describing ―cyberspace‖ as an
―evocative and essentially meaningless‖ buzzword. However, cyberspace has
evolved from a catchy word to a term describing something that influences the
global society.
Many attempts have been made to define this concept so elusive but nevertheless
so present. As Dr Dan Kuehl (8) explains mankind used to operate in four physical
domains: ―land, sea, air, and space in which each of these four domains feature
radically different and unique physical characteristics, and they are usable only
through the use of technology to exploit those characteristics.‖ Cyberspace was
added as a fifth domain (9) and contrary to the other domains cyberspace is a virtual
domain and can reside simultaneously in both physical and virtual domains.
Although many have defined cyberspace, for the purpose of this study only the
definitions within the military context are presented. The US Department of Defence
(DoD) had a definition of cyberspace dating to the early 2000s (10) which evolved
over time. The current definition describes cyberspace (11) as: ―a global domain
within the information environment consisting of the interdependent network of
information technology infrastructures, including the Internet, telecommunications
networks, computer systems, and embedded processors and controllers.‖
Threats in cyberspace are diverse. The latest study into the status of cyber security
within the Netherlands (12) delivers a detailed overview of the actors that impose
threats. The most significant threats are carried out by states and criminals.
Although different studies indicate a high rise in incidents (13) (14), not many
studies are available regarding the impact and damage caused by those incidents
(15).
However, the general consensus is that the impact of cyber incidents poses threats
to the society or continuity of organizations. In the Chatman House Report ‗On
Cyber Warfare‘ (16), it is stated that: ―Cyber warfare is arguably at the most serious
Page 14 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
end of the spectrum of security challenges posed by – and within – cyberspace. Just
like the tools of conventional warfare, cyber technology can be used to attack the
machinery of state, financial institutions, the national energy and transport
infrastructure and public morale.‖ Moreover, the study argues that: ―the most
distinctive feature of cyber warfare (and cyber security more generally) is the
rapidity with which threats can evolve. The pace of change can be so abrupt as to
render the action/reaction cycle of traditional strategy out of date before it has
begun.‖
2.3.2
Cyber operations capabilities
In comparison to the other four domains, it is also possible to conduct military
activities within Cyberspace. The US DoD has labelled its cyberspace operations and
defined (17) it as: ―the employment of cyberspace capabilities where the primary
purpose is to achieve military objectives or effects in or through cyberspace.‖
Cyberspace operations are conducted through offensive, defensive and intelligence
capabilities. Capabilities, in a military context, are used to indicate that one
possesses the ability or power to achieve a certain political or military effect.
Both the US DoD (11) and NATO (18) use the same terminology and similar
definitions for these capabilities, in which ‗computer network‘ is nowadays often
replaced by ‗cyber‘.
NATO uses the following definitions to describe the capabilities within Cyber
Operations:
Computer Network Operations (CNO) - Computer Network Operations
(consisting of Computer Network Attack, Exploitation, and Protection) seek to
gain access to computer networks to disrupt, deny, degrade or destroy their
capability, or alternatively to intercept and utilize their capability, whilst
protecting the capability of the joint task force. Success in this aspect is directly
proportional to the adversary‘s dependence on such systems.
Computer network defense (CND) - Actions to protect against disruption, denial,
degradation, or destruction of information resident in computers and computer
networks and the networks themselves.
Computer network attack (CNA) - Action taken to disrupt, deny, degrade, or
destroy information resident in a computer and/or computer network, or the
computer and/or computer network itself.
Computer network exploitation (CNE) - Action taken to make use of a computer
or computer network, as well as the information hosted therein, in order to gain
advantage.
Terminology
The use of ‗computer network‘ is becoming limited in its meaning, i.e. it excludes
information-, control-, and weapon systems (12). Therefore, to indicate defensive,
offensive and intelligence capabilities, this research uses the following terminology:
Cyber Operations instead of Computer network operations (CNO);
Cyber Defense instead of Computer network defense (CND);
Cyber Attack instead of Computer network attack (CNA);
Cyber Intelligence instead of Computer network exploitation (CNE).
Page 15 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
2.3.3
Cyber operations activities
The previous paragraph described the capabilities within cyber operations. This
paragraph researches the activities performed within the three capabilities.
Frameworks provide an in-depth look into these activities performed within the
different cyber operations capabilities and their interdependence and relationships.
The most exhaustive frameworks exist for cyber defence and recently more research
is conducted for cyber attack. The activities for conducting cyber intelligence are in
general the same as the activities used for cyber attack (19). There is one major
difference; the activities are performed for another purpose. Wherein cyber attack is
focused on the deception, disruption, denial, degradation, or destruction of a target
system, cyber intelligence is aimed at creating a specific picture of the target
environment in preparation for a cyber attack or as a basis to refine cyber defense
capabilities. Therefore, the activities within cyber operations are researched through
defensive and offensive cyber frameworks.
2.3.3.1
Cyber attack and intelligence activities
D. Dreijer (20) and Grant, Burke and Van Heerden (21) have performed extensive
research into the activities for performing offensive cyber operations. In addition, J.
Andress and S. Winterfeld have described a cyber attack process in their work (22).
All these models are fairly comparable. The area in which Dreijer and Grant differ
from Andress and Winterfeld is the use of supporting processes such as composing
target lists or evaluations. Therefore, their frameworks are more comprehensive.
For this research, the identification of the core activities of a cyber attack is
sufficient and therefore the model of Andress and Winterfeld is used. They identify 8
phases in conducting an attack. Their model follows the steps in which specific
information is gathered from the system, an attempt is made to access the system,
the planned effect is achieved and along the way the tracks are covered, as shown
in Figure 4.
The eight activities within this framework are:
1.
Recon is the ability to gain specific information through which access to a target
system is allowed i.e. through social engineering. There is a relationship with
reconnaissance within cyber intelligence. The authors argue that the difference
lies between a general reconnaissance through cyber intelligence and a specific
reconnaissance through cyber attack.
2.
Scan is the ability to gain detailed insight into potential vulnerabilities of the
target system provided by information delivered from the recon.
3.
Access is the ability to gain access to the target system using a variety of tools
and methods.
4.
Escalate is the ability to exploit the initial access by gaining additional or
different privileges.
5.
Exfiltrate is the ability to find valuable information and exfiltrate to a location
that is accessible or move it to own systems.
6.
Assault is the ability to create the effect of a deception, disruption, denial,
degradation, or destruction within the target system.
Page 16 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
7.
Sustain is the ability to ensure the possibility of future access to the target
systems by creating multiple points of entry.
8.
Obfuscate is the ability to cover not only the methods that might be used to
cover up or erase evidence of the intrusion, but also to point any potential
investigators to another source entirely. Obfuscate is conducted throughout the
entire cyber attack process.
Figure 4: Cyber attack and intelligence activities. Source: Andress and Winterfeld
2.3.3.2
Cyber defense activities
Cyber defence is by definition one‘s first priority and has been around the longest.
Back in 2003, Carnegie Mellon University published the second edition of the
Handbook for CSIRTS (23). The goal was to provide guidance on forming and
operating a computer security incident response team (CSIRT) and it is still valid
today. NATO also drafted a cyber defence framework. Due to the fact that the NATO
frameworks aims to improve cooperation between member states by creating an
unambiguous language, the cyber defence activities within this thesis will be based
on the NATO framework.
In December 2010, NATO released the second version of their Cyber Defence
Capability Framework (24). The goal is ―to provide NATO and its Nations a
foundation for cyber defence in order to increase multinational cooperation in the
field of development of cyber defence capabilities, coordination of cyber defence
activities and establishing interfaces to address federated cyber defence‖.
The framework is based on four chronological activities that roughly follow the
lifecycle of an incident and two that are in fact preconditions for dealing with
incidents. Figure 5 gives an overview of the NATO framework.
The six activities within the NATO framework are:
1.
Malicious activity detection is the ability to detect malicious activity by collecting
sensor information, assessing entities and the situation, and providing
visualization of the entities and activities for human analysts.
2.
Attack termination/prevention/mitigation is the ability to terminate, prevent, or
mitigate an attack.
3.
Dynamic risk, damage, and attack assessment is the ability to assess risks to
the operation from the dependency on the CIS services, by projecting the
Page 17 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
current situation into the future, assess the damage incurred from an attack,
and improve the understanding of threats by assessing ongoing attacks.
4.
Cyber attack recovery is the ability to recover from an attack by restoring the
security properties and the original state of the system and the information.
5.
Timely decision-making is the ability to decide on the actions to be implemented
in a timely manner.
6.
Cyber defence information management is the ability to collect and share
information in a way that enables rapid and trusted information exchange with
various different sources.
Figure 5: Overview of the cyber defence capability breakdown. Source: NATO/ NC3A
2.4
Developments in cyber test ranges
This paragraph concludes the conceptual base by determining the characteristics
and goals of cyber test ranges.
2.4.1
Introduction
Cyber Test Ranges are virtual environments that are, for instance, used for research
and development, evaluation and training purposes within the cyber domain. From a
military perspective, soldiers are trained to hone their skills, participate in military
exercises, and to get acquainted with weapons or information and communications
systems. The same principle applies to (military) personnel that are involved in
cyber operations. Buxbaum (25) argues: ―They require a digital environment in
which to train, evaluate, and develop offensive and defensive capabilities. They, too,
wish to simulate attacks to assess information assurance capabilities, and measure
incident response procedures.‖ As Buxbaum explains: ―'Cyber ranges' are the virtual
environments which have been created for cyber-warfare training and exercises.
These constructs provide tools for strengthening the security, stability, and
performance of vital government, military, and intelligence cyber infrastructures.‖ In
addition, Sabo (26) offers another viewpoint of the purpose of a range, which is to:
―create a secure, flexible, seamless environment enabling Combatant Commanders
Page 18 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
to visualize non-kinetic weapons effects, thus achieving the same confidence and
expertise in employing Information Operations capabilities as with kinetic weapons.‖
Also from a military perspective but from a defensive viewpoint, Powell et al. (27)
state: ―the pervasive interconnectivity of the Global Information Grid (GIG) (28)
makes cyber attacks an increasingly attractive prospect for first, second, and third
generation threats and adversaries‖. Therefore: ―the Information Assurance range
provides DoD stakeholders with an avenue to strengthen the GIG security posture
by supporting operational exercises, training network defenders, and testing and
evaluating new information capabilities.‖
From military perspective, cyber test ranges can therefore be summarized as an
environment that offers stakeholders the ability to - more effectively - defend and
attack (or gather intelligence regarding) infrastructures or military capabilities.
Critical infrastructure and military capabilities
Live IT-environments
Energy
Water
Cyber
Transport
Banking
Land
Space
Telecommunicatio
ns
Sea
...
Infrastructures and capabilities
depend on systems. Systems are
supported through IT-environments
Air
Ability to - more effectively - defend and
attack (or gather intelligence regarding)
infrastructures or military capabilities
Live IT-environments are
simulated in the CTR
Cyber test range
Cyber operations
Cyber
Defense
Cyber
Intelligence
Cyber
Attack
CTR supports cyber operations
Figure 6: Cyber test range in context
As a result, the requirements for cyber test ranges are demanding. CTR‘s should be
able to replicate networks and computer systems and emulate business operations
and generate associated traffic to mimic real world situations (25) (29) in order to
conduct realistic tests or exercises without threatening real world environments.
Therefore, it needs to emulate configurations that consist of the components used in
the real world. Additionally, the test ranges‘ configuration needs to be adaptable
within a reasonable amount of time to conduct experiments or perform exercises
(29) (30). In case of large-scale experiments or exercises, the test range should be
able to extend to multiple other test ranges (30) (31). While conducting these
experiments the range should ensure that the underlying conditions are valid in
order to prevent false results (31). During experiments and exercises, both control
and safety need to be retained due to the possible disruptive nature of these
experiments or exercises i.e. releasing malicious software (31).
The difficulty with cyber test ranges lies in the ability to replicate a realistic
environment. To generate the appropriate traffic, test ranges were made up of
physical equipment. This is problematic for two reasons as research points out (32):
Page 19 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
―The equipment can be very expensive to acquire, configure, and maintain.
Instrumentation and experimentation can be very challenging. It is difficult to
correlate traffic events that move across the computer information systems and,
as a result, difficult to roll up studies and generate system-level information.‖
2.4.2
Case studies
A number of cyber test ranges are operational or being implemented. These CTR‘s
present an overview of current (or future) characteristics and goals and therefore,
contribute to a better understanding of the kind of cyber test ranges and its
purposes.
2.4.2.1
The United States
The US is in the phase of implementing a National Cyber Test Range (NCR). This
range (33) will provide ―the architecture and software tools for a secure, selfcontained testing capability to rapidly emulate large-scale complex networks that
match the depth and diversity of real-world networks.‖ The implementation started
in 2008 with the publication of a public tender (34). The range will service (35) both
researchers and operational users:
Experimental Researchers will have:
The ability to measure the
progress of their experiment in
detail
The appropriate classified or
unclassified environment
Experiments against realistic
threats
Assurance of timeliness and
accuracy
The use of scientific methodology
to track and trace experiments and
results
Operational users will have:
Proper test and evaluation of military
and government net-centric systems
to ensure current and future defense
from cyber attacks.
Rapid assessment of the Nation‘s
current and future cyber research
programs
Cyber security experimentation
technologies for all ranges and
communities
Decreased time/cost for experiments
In addition to the NCR, the development of an information operations (IO) range
started in 2006 (26). The goal is to deliver an ―environment composed of processes
and structures which establish a realistic test, training, and exercise environment for
developing and operationalizing IO capabilities and their associated tactics,
techniques, and procedures.‖ The IO range supports ―Combatant Commanders to
visualize non-kinetic weapons effects, thus achieving the same confidence and
expertise in employing IO capabilities as with kinetic weapons.‖ The IO range
therefore represents ―actual combat targets, systems, and situations, allowing users
to conduct technical and performance assurance testing for IO capability system
certification.‖
The Information Assurance (IA) range is a third range within the US DoD (27). The
IA range ―provides an operational representation of the Global Information Grid
(GIG) (28) in order to ―strengthen the GIG security posture by supporting
operational exercises, training network defenders, and testing and evaluating new
information capabilities.‖ The goal of the IA range is to:
―Improve cyber security workforce operational performance,
Validate capabilities and services provided by CND tools and mechanisms,
Validate and improve CND tactics, techniques, and procedures,
Page 20 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Validate acceptable level of service of Computer Network Defense Service
Providers (CNDSPs), and
Validate IA mitigation strategies for programs of record‖.
The NCR, IO, and IA range have different characteristics (36), as presented in the
following table.
Characteristics
NCR range
IO range
IA range
Classification
Multiple levels of
security
Multiple levels of security
Unclassified
Audience
Researchers
Combatant
Commanders, Services,
Interagency, Coalition
and test & evaluate
organizations
DoD IA and CND
practitioners
Environment
Tomorrow‘s
environment
Closed loop fully meshed
network and
management among
connected nodes
Today‘s Global
Information Grid
Provides a simulated,
emulated, and
replicated research
environment to
support experiments
Provides secure
connectivity, resource
allocation, event
coordination and access
to actual and modelled
tools and targets
Provides test, training,
and exercising
environment, modelled
after the GIG and joint
services architecture
Proof of concept for
Provides security,
Test and evaluate near-
emerging / future
capabilities
connectivity and network
management to event
participants capabilities
term tools; pilot shrinkwrapped products prior
to acquisition
Research of
tomorrow‘s cyber
issues and
capabilities focuses
at the national level
Access to IO tools and
targets to provide
exposure to and
validation of IO
capabilities in test,
training and exercises
Exercise and assess
personnel and tactics,
techniques and
procedures
Business
functions
Table 1: DOD Range initiatives. Source: Defense Information Systems Agency.
DETER2 (37) is a US research project aimed at ―developing the techniques and
methods for transforming experimental cyber security into a rigorous, scientifically
grounded research discipline.‖ Furthermore, DETER runs a cyber testbed (38) in
order ―to conduct rigorous, repeatable experiments with new security technologies,
and test their effectiveness in a realistic environment similar to the public and
private networks in which new cyber defenses are needed‖ and is ―used by
researchers to perform experiments on worm propagation, distributed denial of
service attacks, and routing and infrastructure attacks‖.
2 cyber-DEfense Technology Experimental Research
Page 21 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
2.4.2.2
NATO
NATO Cooperative Cyber Defence Centre of Excellence (NATO CCD COE) runs a
cyber lab, as stated by the Director of CCD COE in an email correspondence. The
cyber lab aimed at operational users in support of technical training courses (39)
and technical exercises (40).
2.4.2.3
The United Kingdom
The UK opened its cyber range in 2010 (41) that ―will be able to emulate large
infrastructures and global threats and evaluate how these networks, whether
military, civilian or commercial, respond to an attack in order to develop capabilities
that will make these networks more secure‖. Northrop Grumman delivers the test
range facilities (42). The cyber range has four common uses:
1. Training aimed at preventing falling victim to cyber attacks and response
training aimed at improving the handling of cyber attacks.
2. To getting and understanding of the robustness of the IT-architecture and to
understand the consequences of additions or changes to the IT-architecture.
3. To test and to benchmark IT-components.
4. Research and development.
This Federated Cyber Range (FCR), as it is called, is designed to allow
interoperability with other cyber ranges to enable large-scale experiments beyond
the scope of a single facility.
2.4.2.4
Suppliers
Northrop Grumman runs a commercial cyber test range facility (43) that is ―an
internet environment for emulating, attacking, and evaluating information
technology, network operations, and cyber security defense.‖ A Northrop Grumman
study (29) presents a picture for future use of cyber ranges for the military. This
study describes to possibilities to emulate Navy networks in a ―USS Millersville,‖
which is the location of the cyber test range in order for the Navy to ‗obtain
increased resiliency by first evaluating the current systems and personnel to
determine their effectiveness and combat readiness‘. BreakingPoint is another
supplier and delivers technology for replicating conditions across the internet in a
realistic closed environment (44).
Page 22 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
2.5
Summary
Cyber (space) operations are defined (17) as: ―the employment of cyberspace
capabilities where the primary purpose is to achieve military objectives or effects in
or through cyberspace.‖ Cyber operations are conducted through offensive,
defensive and intelligence capabilities in which:
Cyber defense is aimed at protecting own networks and systems.
Cyber attack is aimed at disrupting, denying, degrading, or destroying networks
and systems.
Cyber intelligence enables intelligence collection through networks and systems.
The activities performed within cyber attack and intelligence are similar and are
aimed at accessing the system and achieving a planned effect. These activities
consist of: recon, scan, access, escalate, exfiltrate, assault, sustain, and obfuscate.
The activities performed within cyber defense roughly follow the life cycle of an
incident and consist of: malicious activity detection, attack termination, -prevention,
-mitigation, dynamic risk damage and attack assessment, cyber attack recovery,
timely decision making, cyber defence information management.
Cyber Test Ranges are virtual environments that are used for research and
development, evaluation and training purposes within the cyber domain. The test
ranges are hereby aimed at reproducing real world situations without threatening
real world networks. From a military perspective, cyber test ranges can be seen as
an environment that offers stakeholders the ability to - more effectively - defend
and attack (or gather intelligence regarding) infrastructures or military capabilities.
The requirements for cyber test ranges are demanding. CTR‘s are expected to be
able to replicate networks and computer systems and emulate business operations
and generate realistic traffic in order to conduct tests or exercises without
threatening real world environments. In addition, they need to be flexible in order to
adapt their configuration or federated with other test ranges in order to support
large-scale experiments or exercises. When using the CTR both control and safety
need to be retained due to the possible disruptive nature of these experiments or
exercises, i.e. releasing malicious software.
Page 23 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
3
MoD Cyber Test Range
3.1
Introduction
The goal of the previous chapter was to understand the context in which the CTR
will operate in order to be able to determine the MoD CTR expectations. Based on
the context of the previous chapter, this chapter aims to determine the possibilities
of CTR‘s and their business functions. Subsequently, derive the CTR business
functions that are specifically tailored to the MoD. Lastly, identify the necessary
technical and organizational requirements to deliver MoD CTR business functions.
3.2
Methodology
The methodology for establishing the MoD business expectations and the necessary
technical and organizational requirements consists of two phases. The first phase is
to establish the CTR business functions. The second phase consists of determining
specific MoD business expectations towards the CTR and the necessary
requirements.
3.2.1
Process for determining CTR business functions
The process for determining the CTR business functions is displayed in Figure 7. This
process is based on three steps:
1. The case studies in paragraph 2.4.2 reveal the possibilities offered by CTR‘s and
provide an overview of the individual business functions, which are shown in
Appendix I.
2. Subsequently, similar business functions from the case studies were grouped
into similar categories. These similar categories presented the generic CTR
business functions. These generic CTR business functions provide an
understanding in the way, the CTR contributes to cyber operations. However,
these generic business functions are not specific enough to understand how the
CTR contributes to a specific cyber operations capability, whether it is cyber
defense, cyber offence or cyber intelligence.
3. Therefore, the generic CTR business functions were translated into specific
business functions that apply to defensive, offensive and intelligence cyber
capabilities.
Figure 7: Process for determining CTR business functions
Page 24 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
The results were subsequently validated through interviews that where held for
determining the MoD expectations.
3.2.2
Process for determining the CTR services
Interviews were held to research the expectations from the different cyber
capabilities‘ point of view and to determine the expected MoD cyber test range
business functions.
The interviews are based on a qualitative approach. This approach is chosen
because it offers the possibility to focus in-depth on the topic as it provides the
chance to ask follow up questions which is necessary due to the new and complex
nature of the CTR.
The information is provided by MoD representatives from the three cyber
capabilities. The number of interviewees is six. Every cyber capability is represented
by two interviewees in order to receive a more thorough view from one capability.
The total number is however small due to two reasons. The target group is still
rather small within the MoD, which creates a limited base of people with knowledge
of cyber. In addition, the fact that detailed interviews were held meant that the
research time was limited.
The objective of the interviews was to:
1. Validate the outcome from the desk research on the purposes of test ranges as
described in paragraph 3.3;
2. Determine to which extent the CTR should support the 8 activities of cyber
attack and cyber intelligence as described in paragraph 2.3.3.1;
3. Determine to which extent the CTR should support the 6 activities of cyber
defense as described in paragraph 2.3.3.2;
4. Identify the necessary technical and organizational consequences for meeting
the expectations.
The interview method by which the research is conducted is described in Appendix
II. The complete set of interviews is presented in Appendix III.
3.3
Cyber Test Range business functions
This paragraph delivers the CTR business functions that are applicable to cyber
defense, cyber attack and cyber intelligence. These business functions are used to
determine which possibilities are relevant to the MoD CTR. The results consist of
generic CTR business functions that apply to cyber operations independent of a
defensive, offensive or intelligence capability. In addition, the results consist of
specific CTR business functions that are aimed at one capability being a defensive,
offensive or intelligence capability. The result is presented in Table 2. Appendix I
provides a detailed overview of the individual CTR business functions.
The business functions of test ranges are segmented into two areas. Test ranges
can support operations by enabling personnel to act in the cyber domain, assess if
current means deployed by the organization are effective and additionally, used in
response to cyber attacks or in preparation for conducting cyber attacks or
intelligence.
Secondly, the test range can support research and development within the cyber
domain. This consists of applied research into future cyber solutions that are aimed
at developing solutions to enhance cyber operations through finding answers to
unsolved problems or development of new products, technologies or services.
Page 25 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Moreover, research can be conducted to assess if external solutions add value to the
MoD through enhancing cyber operations.
Each of the five business functions can be translated into specific business functions
that apply specifically to the defensive, offensive and intelligence capability.
Generic CTR
business functions
supporting operations
Business functions aimed at
1.
Enable personnel to act in
the cyber domain
Specific CTR
business functions
Train personnel to withstand cyber attacks
Train personnel to execute cyber attacks
Train personnel to gather intelligence through cyber
2.
Assess current means
deployed by own
organization
Assess if current defensive means are sufficient
Assess if current offensive means are sufficient
Assess if current intelligence means are sufficient
Respond to cyber attacks
3.
Respond to or conduct cyber
attacks or intelligence
Conduct cyber attacks
Conduct cyber intelligence
research and development
Business functions aimed at
1.
Applied research into future
cyber solutions
Applied research into future cyber defensive capabilities
Applied research into future offensive cyber capabilities
Applied research into future cyber intelligence capabilities
2.
Research external solutions
to enhance cyber operations
Research external solutions to enhance cyber defense
Research external solutions to enhance cyber attack
Research external solutions to enhance cyber intelligence
Table 2: Overview of CTR business functions
3.4
Cyber Test Range services
The goal of this paragraph is to research the MoD expectations, seen from the three
cyber operations capabilities, towards the CTR in order to determine the CTR
business functions that support offensive, defensive and intelligence capabilities.
This paragraph answers the sub research goal: ―Define the MoD business
expectations towards a CTR.‖
The business functions are presented on two levels, first a high-level overview from
all capabilities followed by specific expectations from each of the three cyber
capabilities.
Page 26 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
3.4.1
High level overview
The high-level overview presents the consolidated expectations from all cyber
operations capabilities. The high-level overview consists of three elements:
1. The generic business functions that represent the main purposes of the CTR.
The business functions are based on the conceptual base as described in
paragraph 3.3.
2. The business functions are further specified into CTR services and describe
which services are to be offered in support of activities within the cyber
operations capabilities. The services are derived from the output of interviews.
3. The target audience describes which capability uses the services. These are also
derived from the output of the interviews.
Cyber Test Range
Business functions
Cyber Test Range
Services
Cyber Test Range
Target audience
Train general competences
Perform exercises
Enable personnel to act in the
cyber domain
Assess current means deployed
by own organization
Cyber defense
Cyber attack
Cyber intelligence
Train cyber defense execution
Cyber defense
Cyber intelligence
Train cyber attack execution
Cyber attack
Cyber intelligence
Train cyber intelligence execution
Cyber intelligence
Train toolhandling
Cyber defene
Determine effectiveness or optimize
current defensive means
Cyber defense
Cyber intelligence
Determine effectiveness or optimize
offensive means
Cyber attack
Cyber intelligence
Determine effectiveness or optimize
intelligence means
Respond to or conduct cyber
attacks or intelligence
Analyze, assess and recover from
attacks
Cyber defense
Cyber intelligence
Assess most effective means to
attack a target system
Cyber attack
Cyber intelligence
Assess most effective means to
exploit a target system
Cyber intelligence
Research new means
Applied research into future
cyber solutions
Research areas for improvement
Research aimed at assessing
current external solutions
applicability to own organization
Determine added value of external
solutions for the MoD
Figure 8: high-level overview business expectations
Page 27 of 78
Cyber defense
Cyber attack
Cyber intelligence
Cyber attack
Cyber intelligence
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Support operations
The business functions that are aimed at supporting operations are deemed most
valuable. These business functions consist of enabling personnel to act in the cyber
domain, to assess current cyber means and to respond to or conduct cyber attacks.
1. Enable personnel to act in the cyber domain
This business function is aimed at readying personnel to perform activities within
cyber operations, whether it is defensive, offensive, or intelligence. The CTR can
support personnel in achieving or maintaining a general level of knowledge and
skills. The CTR is even employable to test the skills of potential personnel. In
addition, the CTR can be used to train personnel in the processes, procedures, and
methods surrounding cyber operations activities. These processes are aimed at
executing the specific activity or at the cooperation between different cyber
operations activities in order to work as one supply chain. Getting personnel
acquainted or improving their skills in tool handling is another opportunity for the
CTR. The last service consists of supporting cyber exercises. Exercises are an
important element in cyber operations as it combines every aspect of cyber
operations into a near real live activity. Every capability can be trained in their
respective specialty. Cyber defense can be trained in every aspect from detection to
cyber attack recovery. Personnel within the cyber attack and intelligence capabilities
can be trained in performing their missions. The three capabilities can also train
each other when taking part in an integral exercise with red teams (attackers) and
blue teams (defenders) (45).
Test skills &
competences
Maintain skills &
competences
Train processes &
Conduct
procedures
cyber exercises
‗Mission ready‘
‗Basic level‘
2. Assess current means deployed
The goal of assessing current means deployed is to answer the question, to what
extent are the means deployed by the organization sufficient and effective? Means
in this context are seen as instruments deployed by the organization, like hardware,
software, networks but also the standing operating procedures that are used to
execute an activity.
This business function can be used for every activity that is conducted within cyber
operations. For example from a cyber defense point of view, it can assess if the
intrusion detection systems deployed by the organization detect known and
unknown malicious activity. From a cyber attack or cyber intelligence point of view,
it can help to understand to what extent scanning activities are traceable and what
actions are risky in terms of getting compromised.
3. Respond to or conduct cyber attacks
The service ‗respond to or conduct operations‘ was added during the interviews. The
respondents indicated a need to use the CTR during defensive actions against cyber
attacks or in preparation for conducting cyber attacks or intelligence. When struck
by malware, the CTR offers the opportunity to research the malware to understand
its modus operandi, the impact on the IT-infrastructure and to develop solutions to
prevent (further) damage. From another perspective, the CTR offers the opportunity
to understand to what extent measures are traceable and what actions increase the
chance getting compromised prior to conducting cyber intelligence or cyber attack.
Page 28 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Research and development
The business functions, which are aimed at research and development, are deemed
valuable but not as valuable as the business functions that support operations.
The business functions consist of applied research into future cyber solutions and
research aimed at assessing current external solutions applicability to own
organization.
1. Applied research into future cyber solutions
This business function is aimed at developing solutions to unsolved problems or the
development of products, technologies, or services. This business function applies to
all three capabilities within cyber operations. From a defensive point of view, the
CTR can be used to develop for example a new type of intrusion detection system to
detect advanced persistent threats (43). From an attack or intelligence point of
view, the CTR can be used to develop new means to scan a target system while
obfuscating its activities.
2. Research external solutions to enhance cyber operations
This business function is aimed at determining if solutions offered by external
organizations or that are publicly available are useful to the MoD. The CTR offers a
platform to field test these external solutions whereby the MoD is able to decide if a
solution works as designed or has side effects on the current IT-infrastructure and if
so to what extent. This business function is mainly aimed at the defensive side of
cyber operations. In general, it is considered that the external solutions for cyber
attack and cyber intelligence are limited. The respondents deemed it more plausible
that these solutions will be developed in house.
3.4.2
Detailed overview
The detailed overview presents the specific expectations from each of the three
cyber operations capabilities. The structure of these expectations is based on the
same structure as presented in the high-level overview in the previous paragraph.
3.4.2.1
Cyber defense
This paragraph describes the expectations towards the CTR from a defensive point
of view. The detailed overview of the cyber defense expectations consists of three
elements.
1. The specific business functions aimed at supporting cyber defense.
2. A further specification of the specific business functions into CTR services aimed
at supporting cyber defense.
3. A breakdown of the CTR services into CTR service components aimed at
supporting cyber defense.
The figure below gives the graphic breakdown of the CTR expectations for cyber
defense.
Page 29 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Cyber Test Range
Cyber defense business functions
Cyber Test Range
Cyber defense services
Train general competences
Train cyber defense execution
Train personnel to withstand
cyber attacks
Develop necessary skills and knowledge
Maintain necessary skill and knowledge
Train ability to detect malicous activity
Train ability to stop an attack
Train attack assessments
Train risk assessments
Train damage assessments
Train recovery methods
Train forensic evidence collection
Train recovery procedures between organisation
Train decision making process
Train information dissemenation ability
Train toolhandling
Train detection toolhandling
Train attack termination and prevention toolhandling
Perform exercises
Train defensive skills and learn cyber attack methods
Train collaboration between defensive activities
Determine effectiveness of current
means
Assess if current defensive
means are effective
Optimize cyber defense process
Perform attack analysis
Determine effectiveness of detection means
Determine ability to stop an attack
Determine risks for the IT-environment
Determine ability to deliver assessments
Determine effectiveness of recovery means
Determine ability to test integrity
Determine ability to provide needed information
Identify information needs for decision making
Establish decision making process
Determine ability to deliver information
Determine methods of an attack
Determine impact of an attack
Determine mitigation means
Perform damage assessment
Determine mitigation means
Assess system integrity after an attack
Assess data integrity after an attack
Assess data loss after an attack
Determine impact after an attack
Perform attack recovery
Conduct system integrity recovery
Conduct information integrity recovery
Conduct service integrity recovery
Support decision making
Determine which decision should be made
Decide who should make decision
Determine the prioritization of decisions
Respond to cyber attacks
Research new means
Research new means to detect malicious activity
Research new means to mitigate attack patterns
Research new means for information
dissementation
Research areas for improvement
Establish areas for improving attack termination,
prevention and mitigation
Applied research into future
cyber defensive capabilities
Research external solutions
Cyber Test Range
Cyber defense service components
Determine added value of external
solutions for the MoD
Determine usability of external solutions
Determine quality of external solutions
Determine side effects of external solutions
Figure 9: Cyber defense expectations of the CTR
Support operations
The business functions within this category are aimed at training personnel to
withstand cyber attacks, to assess if defensive means are sufficient and to respond
to cyber attacks.
1. Train personnel to withstand a cyber attack
This business function is aimed at readying personnel to respond to cyber attacks in
order to prevent or limit damage sustained from cyber attacks. The CTR offers the
Page 30 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
possibility to develop and maintain the needed basic knowledge and skills based on
a hands-on approach in a simulated but safe realistic environment.
Once personnel are trained in the general competences, the personnel can be
trained for executing cyber defense activities. This is where the CTR delivers the real
added value by offering a platform in which real live networks are simulated.
Personnel can be confronted with real live situations in which they will have to put
theory into practice. Hereby personnel will be trained in executing every cyber
defense activity from ‗Malicious activity detection‘ to ‗Cyber defence information
management‘ as is presented in the following table.
Cyber defense activities
CTR services aimed at training personnel
1
Malicious activity detection
Train personnel‘s ability to detect and analyze malicious activity
and train personnel in responding on alerts
Train personnel in correlating multiple detection feeds into a
coherent understanding of an attack
2
Attack termination/
prevention/ mitigation
Determine the time needed by personnel to terminate, prevent or
mitigate cyber attacks
Train personnel‘s ability to mitigate the effects of an attack
3
Dynamic risk, damage, and
attack assessment
Train personnel‘s ability to assess the effects of cyber attacks
Train personnel‘s ability to recognize risks
Train the ability to draft an assessment which includes the effects
of an attack and its countermeasure
Train personnel‘s ability to prioritize their response to multiple
attacks based on the assumed risk of each attack (triage)
4
Cyber attack recovery
Train personnel‘s ability to conduct a system, service or
information integrity recovery after an attack
Train personnel‘s ability to conduct forensic evidence collection
after an attack
Train recovery procedures between the CERT and IT-organization
5
Timely decision making
Train personnel‘s ability to deliver the right information at the right
time to the right person
Train strategic, tactical and operational decision making
Determine the consequences of a decision or the consequences
when no decision is made
6
Cyber defence information
management
Train personnel‘s ability to collect and disseminate information
Table 3: CTR cyber defence training possibilities
In addition, personnel can be trained with handling tools that are deployed for cyber
defense. As technology evolves, new tools are becoming available and are deployed
as part of the cyber defense arsenal. The CTR offers the opportunity to get
acquainted with these tools by deploying them in a safe environment so that
personnel can experiment freely.
Lastly, the real proof of the pudding in withstanding cyber attacks is achieved
through exercises. Theoretical trainings are important but putting the knowledge
into practice by conducting exercises will enable personnel to defend as they are
taught. The CTR should support these exercises by offering simulated real-live
networks in a safe environment in order to test defensive skills and to learn the
methods and techniques used in a cyber attack through red and blue team exercise.
Page 31 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
2. Assess current defensive measures
This business function determines if the defensive measures taken by the
organization are sufficient and effective in order to withstand cyber attacks.
Measures are to be seen in a broad context. These include IT-security tools but also
standing operating procedures (processes, procedures, and methods) that are used
to execute an activity.
By simulating real world environments, the CTR offers the prospect to assess the
defensive means to a degree that is almost similar to live situations. Deploy
malware into the CTR and see if it is detected and if it is detected, is the
organization able to terminate the attack? Answering these questions will determine
if the measures taken are sufficient and effective.
However, the CTR offers more possibilities, it also helps to understand the risks to
the IT-environment. When using again the example of deploying malware into the
CTR, the organization will get an understanding of the extent to which the ITenvironment is affected and thus will learn the risks to the IT but, moreover, the
business will get an understanding of their dependency on the IT-environment for
their businesses processes (like conducting military operations). In addition, the
resilience can be determined. The CTR can simulate the breakdown of parts or of
the whole IT-environment in order to determine if recovery measures are effective,
to understand what needs to be done to recover from a cyber attack and the time
needed to recover to a the last correct stage.
In order to withstand or limit the effects of cyber attacks, timely decision-making is
crucial as cyber attacks can inflict damage on a large scale in a small amount of
time. By simulating real-live situations in a near-real environment, the decision
making process can be tested in practice. For example, given a specific situation,
how does the decision-making process look like and who will need to make a
decision? Moreover, what are the consequences if a decision is not taken, what are
the effects for the IT-environment? The CTR is therefore a platform that can support
the optimization of current processes or procedures.
The same holds for information dissemination, which is an important factor during
all phases of defending against cyber attacks. By testing real-live situations, the
organization is able to establish which information is needed for decision-making
and if the right information can be delivered on the right time, in the right format,
from the right source to the right person.
3. Respond to cyber attacks
This business function is used when the IT-environment is affected by a cyber attack
in order to minimize its effects. Due to the ability of the CTR to simulate real-live
networks, the CTR can be used to test or research cyber attacks and to develop
solutions which are first tested and decided upon in the CTR before committing it
into the live environment. These tests support every step in the life-cycle of an
incident.
Analysis is done by researching the malicious software in the CTR in order to
determine its modus operandi, its components, the impact on the IT-infrastructure
and possible solutions which the local IT staff can implement to prevent (further)
damage. If the malicious software is having an impact on the IT-environment then a
damage assessment is performed by ‗replaying‘ the malicious software in the CTR to
Page 32 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
determine the system and data integrity and to assess the loss or compromised key
data. In addition to the gained insight to the IT-environment, insight is provided into
the possible damage to the constituency both when the attack succeeds, as well as
when it is mitigated.
After the assessment is done, scenarios for recovering the various levels of the
system are tested and improved in the CTR to make sure the real-live recovery goes
as smooth as possible. Based on understanding the malware encountered, its
target, the damage it causes and the options for mitigation or recovery, the CTR is
able to support the decision making process. This is done by determining which
decision needs to be taken (and the priority amongst these decisions) and to
determine on which level decisions should be made based on assumed risk and
potential damage.
Research and development
The business functions within this category are aimed at researching, developing, or
testing new defensive means.
1. Applied research into future cyber defensive capabilities
This business function is aimed at developing solutions to enhance cyber defense
through finding answers to unsolved problems or developing new products,
technologies, or services.
The CTR should offer testbed capacity in which research and development can be
done. In relation to cyber defense there is a need to research new means to detect
malicious activity whether from an external or internal source. In addition, there is a
need to research new means to mitigate attack patterns or conduct research to
understand shortfalls in the ability to withstand a cyber attack and formulate
research goals aimed at improving this ability.
2.
Research aimed at assessing current external solutions applicability to enhance
defensive capabilities
This business function is aimed at determining if solutions intended to enhance
cyber defense are useful to the MoD. There are many solutions offered by (non)
profit organizations or freely available from which the MoD could benefit. Testing
these solutions can be done in the CTR. Deploying external products in a simulated
real-live environment offers the opportunity to determine if the solutions works as
designed within the MoD IT-landscape or if it has side effects and if so to what
extent and if the solution delivers the functionality which is sought by the MoD.
Hereby the MoD is able to determine if an external solution adds value to the cyber
defense toolkit.
3.4.2.2
Cyber attack
This paragraph describes the expectations towards the CTR from an offensive point
of view. The detailed overview of the cyber attack expectations consists of three
elements.
1. The specific business functions aimed at supporting cyber attacks.
2. A further specification of the specific business functions into CTR services aimed
at supporting cyber attacks.
3. A breakdown of the CTR services into CTR service components aimed at
supporting cyber attacks.
Page 33 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
The figure below gives the graphic breakdown of the CTR expectations from a cyber
attack perspective.
Cyber Test Range
Cyber attack business functions
Train personnel to execute cyber
attacks
Cyber Test Range
Cyber attack services
Train general competences
Develop necessary skills and knowledge
Maintain necessary skill and knowledge
Train cyber attack execution
Train ability to recon a target system
Train ability to scan a target system
Train ability to gain access
Train ability to gain additional privileges
Train ability to exfiltrate information
Train ability to execute an attack
Train ability to sustain access
Train ability to obfuscate
Train offensive skills
Train collaboration between offensive activities
Perform exercises
Assess if current offensive means
are effective
Conduct cyber attacks
Cyber Test Range
Cyber attack service components
Determine effectiveness of current
means
Support cyber attack process
Determine effectiveness of recon activities
Determine effectiveness of scanning activities
Determine effectiveness of access activities
Determine effectiveness of escalate activities
Determine effectiveness of exfiltrate activities
Determine effectiveness of assault activities
Determine effectiveness of sustaining activities
Determine effectiveness of obfuscating activities
Assess most effective means to recon a target system
Assess most effective means to access a target system
Determine vulnerabilities in a target system
Assess most effective means to gain access into a target system
Assess most effective means to escalate in a target system
Assess most effective means to exfiltrate information
Assess most effective means to assault a target system
Assess most effective means to sustain access
Assess most effective means to cover the tracks throughout the operation
Research new means to recon a target system
Research new means to scan a target system
Research new means to access a target system
Research new means to gain additional privileges
Research new means to exfiltrate information
Research new means to assault a target system
Research new means to sustain access
Research new means to obfuscate during an attack
Applied research into future
cyber attack capabilities
Research new means
Research external solutions
Determine added value of external
solutions for the MoD
Determine usability of external solutions
Determine quality of external solutions
Determine side effects of external solutions
Figure 10: Cyber attack expectations of the CTR
Support operations
The business functions within this category are aimed at training personnel to
perform cyber attacks, to assess if current offensive capabilities are effective and to
support cyber attack operations.
1. Train personnel to execute a cyber attack
This business function is aimed at readying personnel to perform cyber attacks in
order to achieve military objectives or effects. The CTR offers the necessary training
platform through simulated real world environments. This enables a hands-on
training approach.
Furthermore, personnel with basic skills receive advanced training in the execution
of cyber attacks. These trainings consist of technical aspects of a particular cyber
attack activity as well as the methods and procedures to conduct one. The CTR
supports these advanced trainings by offering a safe environment that is similar to
real live environments in which personnel can practice or simulate real events.
These specific training opportunities are presented in the following table.
Page 34 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Cyber attack activities
CTR services aimed at training personnel
1
Recon
Train personnel‘s ability to explore a target system using different
techniques without being discovered
Train personnel in using strategic or tactical reconnaissance information
supplied by cyber intelligence in order to perform operational
reconnaissance
Train procedural aspects of performing reconnaissance
2
Scan
Train personnel‘s ability into obtaining a more detailed overview of the
target systems hardware and software components
Train personnel‘s ability to detect known and unknown vulnerabilities in
a target system
Train procedural aspects for scanning systems
3
Access
Train personnel‘s ability in gaining access to a target system by
exploiting vulnerabilities
Train procedural aspects for accessing target systems
4
Escalate
Train or asses the personnel‘s ability to gain additional or different
privileges within a target system
Train procedural aspects for escalating privileges within a target system
5
Exfiltrate
Train personnel‘s ability to find valuable information and exfiltrate it to a
location that is accessible or move it to own systems including
procedural aspects
6
Assault
Train personnel‘s ability to create the effect of a deception, disruption,
denial, degradation or destruction of the target system
Train procedural aspects for assaulting systems
7
Sustain
Train personnel‘s ability to ensure the possibility of future access to the
8
Obfuscate
target systems by creating multiple points of entry
Train personnel‘s ability to cover not only the methods that might be
used to cover up or erase evidence of the intrusion, but also to point
any potential investigators to another source entirely
Table 4: CTR cyber attack training possibilities
Just as exercises are an important instrument for cyber defence, performing cyber
attack exercises are essential as well. The CTR should support these exercises by
offering simulated real-live networks in order to test offensive skills and to learn the
methods and techniques used by cyber defence through red and blue team
exercises in which the red team has to compromise or degrade the performance of a
system that is protected by a blue team (40).
2. Assess current means deployed
This business function determines if the offensive measures taken are sufficient and
effective in order to conduct cyber attacks. Measures include technical means but
also standing operating procedures (processes, procedures, and methods) to
execute an activity.
Taking advantage of simulating real world environments, the CTR offers the
opportunity to assess means used to conduct cyber attack activities. These means
can be tested in order to determine their effects, i.e. do they do what is expected of
them and do they achieve the desired effects. That is an important difference. The
first focuses on methodology. For example if malware is designed to alter ITcomponents, the test range can provide the ability to verify if the right ITcomponents are altered. Malware will be deployed for specific reasons and that is to
achieve an effect. The desired effect in deploying malware could for example be
Page 35 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
through altering IT-components to deny, destroy or disrupt the enemies command
and control capability. So, the test range can be used to determine if the desired
effect is achieved or that other (undesirable) effects are achieved as well, in military
terms speaking of a collateral damage estimate.
3. Support cyber attacks
The CTR can also be employed in support of cyber attacks. The main feature is to
determine the most effective means to achieve an intended effect. Using the target
systems configuration in the CTR, it offers an environment to test means before
they are actually deployed.
Testing also contributes to the decision making process regarding the deployment of
means. For example, when releasing specific malware you will want it to hit the
target and not a hospital. In case minimizing collateral damage is not possible then
it will support the decision making process. Knowing what the collateral damage
may be, it will offer the commander the opportunity to decide if the collateral
damage is acceptable in relation to the effect to be achieved when striking a target.
Research and development
The business functions within this category are aimed at researching, developing, or
testing of new offensive measures.
1. Applied research into future cyber offensive capabilities
This business function is aimed at developing solutions to enhance cyber offensive
through finding answers to unsolved problems or developing new products,
technologies, or services. This business function is of lesser importance compared to
the business functions that support operations. The research and development are
furthermore deemed more applicable to the cyber intelligence process than to the
cyber attack process with the exception of assaulting target system.
Generally speaking, the CTR could offer testbed capacity to build new means i.e. to
recon or scan target systems or to improve the current means i.e. to create the
effect of deception, disruption, denial, degradation or destruction within a target
system.
2. Research external solutions to enhance offensive capabilities
This business function is aimed at determining if external solutions are useful to be
used in cyber attacks. This business function is applicable to a limited number of
activities that support cyber attacks. This is because external parties who develop
offensive capabilities are limited. If these capabilities are developed by non-profit
organizations, it is not plausible that these capabilities are shared. Furthermore,
there are not many profit organizations that develop these capabilities. Then there
are security reasons that also limit the cooperation with external organizations.
These offensive capabilities may have a one-time use, once released these
capabilities are known so that limits the possibility of reuse. Therefore, to minimize
the chance of information regarding capabilities being leaked, strict security
regulations should be enforced, limiting the number of external organizations.
However, this function can be used for recon or scanning target system by testing
these solutions in the CTR.
Page 36 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
3.4.2.3
Cyber intelligence
This paragraph describes the expectations towards the CTR from an intelligence
point of view. The detailed overview of the cyber intelligence expectations consists
of three elements.
1. The specific business functions aimed at supporting cyber attacks.
2. A further specification of the specific business functions into CTR services aimed
at supporting cyber attacks.
3. A breakdown of the CTR services into CTR service components aimed at
supporting cyber attacks.
The figure below gives the graphic breakdown of the CTR expectations from a cyber
intelligence perspective.
Cyber Test Range
Cyber intelligence business functions
Train personnel to gather
intelligence through cyber
Assess if current intelligence
means are effective
Conduct cyber intelligence
Cyber Test Range
Cyber intelligence services
Cyber Test Range
Cyber intelligence service components
Train general competences
Develop necessary skills and knowledge
Maintain necessary skill and knowledge
Train cyber intelligence execution
Train ability to recon a target system
Train ability to scan a target system
Train ability to gain access
Train ability to gain additional privileges
Train ability to exfiltrate information
Train ability to sustain access
Train ability to obfuscate
Perform exercises
Train intelligence skills
Train collaboration between intelligence activities
Determine effectiveness of current
means
Determine effectiveness of recon activities
Determine effectiveness of scanning activities
Determine effectiveness of access activities
Determine effectiveness of escalate activities
Determine effectiveness of exfiltrate activities
Determine effectiveness of sustaining activities
Determine effectiveness of obfuscating activities
Support cyber intelligence process
Assess most effective means to recon a target system
Assess most effective means to access a target system
Determine vulnerabilities in a target system
Assess most effective means to gain access into a target system
Assess most effective means to escalate in a target system
Assess most effective means to exfiltrate information
Assess most effective means to sustain access
Assess most effective means to cover the tracks throughout the operation
Research new means to recon a target system
Research new means to scan a target system
Research new means to access a target system
Research new means to gain additional privileges
Research new means to exfiltrate information
Research new means to sustain access
Research new means to obfuscate during an attack
Applied research into future
cyber intelligence capabilities
Research new means
Research external solutions
Determine added value of external
solutions for the MoD
Determine usability of external solutions
Determine quality of external solutions
Determine side effects of external solutions
Figure 11: Cyber intelligence expectations of the CTR
Support operations
The business functions within this category are aimed at training personnel to
conduct cyber intelligence, to assess if current intelligence capabilities are effective
and to support cyber intelligence operations.
The possibilities for cyber intelligence share many similarities with cyber attack. The
differences are however that these activities are performed with a different purpose
and that emphasis is put on activities such as recon, scan, exfiltrate, rather than
assault. In general, the same activities can be trained, the same means can be
assessed, and the same role can be played during an operation. Therefore, the
Page 37 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
possibilities for cyber intelligence are not further elaborated but referred to
paragraph 3.4.2.2.
Research and development
The business functions within this category are aimed at researching, developing, or
testing of new intelligence measures.
In terms of research and development possibilities for cyber intelligence, these are
similar to cyber attack. Therefore, the possibilities for cyber intelligence are not
further elaborated but referred to paragraph 3.4.2.2.
3.5
Cyber Test Range requirements
3.5.1
Introduction
This paragraph researches the requirements needed for delivering business
functions. Interviews were held to research these requirements as part of the
interview to research the CTR services, see paragraph 3.2.2.
3.5.2
Technical requirements
a) First and foremost, the CTR will need to simulate live networks. Simulation is a
key requirement in order to provide realistic but safe environments for
delivering CTR business functions. The CTR should simulate own systems within
the MoD and target systems. These simulated environments should contain the
full spectrum of assets used in a live system, whether physical or virtual. Assets
can range from network components, hardware, and software. In addition, the
CTR should also generate the network traffic and human interaction to emulate
business operations. Furthermore, the test range should be able to simulate all
vulnerabilities that are present in an IT-environment. As a hypothetical
example, there can be vulnerabilities that are only present in the physical
components in an IT-environment. However, to simulate these IT-environments,
it is plausible that they will be virtualized, due to the fact that it is inefficient to
use large numbers of physical components. However, this can lead to a
drawback because unwittingly the vulnerabilities that are only present in
physical components are removed through the use of virtualized components.
Thus, from a cyber operations perspective the opportunity to detect or exploit
an unknown vulnerability is missed.
b) The CTR infrastructure should be scalable in terms of different assets and
number of assets. This requirement is necessary to be able to adapt to
developments. Real live environments are subject to change either because of
new technologies or new business developments which leads to a decrease or
increase in users. Therefore, the CTR should be able to adapt to new
developments by adding or removing assets.
c)
Changing the configuration to mimic a real live environment should be possible
at the push of a button and the maximum time required for a complex
configuration should be no more than 1 day. This important feature enables
flexible use of the CTR by different target groups to support different scenarios.
When a live network is attacked, it is important that the CTR is quickly prepared
so preventive or recovery actions can be simulated in the test range before
Page 38 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
committing these actions into real live environments. Therefore, it is advisable
to have preconfigured configurations of live environments so these
configurations can be loaded when necessary or applicable. From an offensive or
intelligence perspective, the load times differ and depend on the mission. On an
operational level, the timeframe should be short. In some situations, there is a
short window of opportunity to perform the intelligence activities or to execute
offensive activities, for example to assault a network. The time to market on a
strategic level can be long. The strategic level is focused on planning offensive
or intelligence activities prior to actually performing the activity, for example
accessing a system.
d) Target groups of the CTR can be scattered across large geographical locations.
Therefore, the CTR should be accessible from different locations reducing
overhead like travel time and stimulating the use of the CTR for different
situations. In addition, the cyber test range should support the ‗train as you
fight‘ principle. This implies that if an operation is executed in the field, the
cyber test range should extend its reach so it is also accessible from the area
where the operation is conducted.
e) In terms of federating with other cyber test ranges, to enable large-scale
experiments or exercises, the CTR should be able to federate with other CTR‘s in
order to support for example, red and blue teaming exercises. However, this
feature is viewed with some suspicion due to security concerns. Therefore, this
functionality should be able to be physically turned off at all times. The
realization of this requirement is also deemed less important or in some
situations even unwanted because of the security risks.
f)
Security is crucial and security requirements should be high. The systems
simulated can be own systems but also target systems and can hold sensitive
information. When compromised a blueprint of the system could be derived.
This is not desirable. In addition, cyber weapon may have a one-time use
principle, which means that when deployed it is out there to be analysed,
neutralized, or transformed for reuse. Moreover, through the CTR, vulnerabilities
within the MoD systems can be discovered or knowledge of the modus operandi
of the MoD can be gained. Therefore, measures need to be taken to prevent the
leakage of sensitive information. This implies that the security level of the test
range should have the same security level as the live networks. So if a classified
network is deployed in the test range, the test range should also be classified.
Therefore, personnel involved in the CTR must have a top-level screening.
Additionally to safeguard missions, the CTR must be able to allow compartments
based on different classification levels in which different target systems or MoD
systems are simulated.
g) The CTR will be used for conducting risky cyber experiments for example
deploying malware into the test range. As a result, the CTR should have no
external interfaces with live environments because of the risks of malware
jumping into a live environment. In addition, the configuration in the CTR should
be completely swiped in order to ensure that new configurations are clean of
any injected malware or other risks.
Page 39 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
3.5.3
Organizational requirements
h) In order to run a CTR, IT-operations should be appointed for the maintenance
and configuration of the CTR. Activities consist of designing the technical
infrastructure, installing, or changing IT-assets, maintaining the current
infrastructure with focusing on reliability and availability. When preparing the
CTR for use, IT-operations should be able to load the CTR with the configuration
of the simulated live environment. This may involve loading a preconfigured
configuration or in case a new configuration is to be loaded, IT-operations will
have to design an image that can be used to load a simulated live environment.
i)
Regarding the delivery of CTR services to train personnel, instructors should be
appointed for accompanying group exercises or individual training scenarios.
Activities consist of formulating training goals and development of CTR training
scenarios derived from the formulated training goals. For conducting exercises
and training scenarios, the instructors will need to accompany these exercises in
order to instruct the participant during their exercise or training scenario.
Instructors should also be appointed for observing trainings in order to evaluate
the results of personnel and to propose improvement possibilities for individuals
or groups. In addition, an analyst should be appointed for evaluating the results
from exercises and to propose improvements for current technical capabilities,
procedures, and policies used in cyber operations in order to enhance standing
operating procedures or technical means.
j)
Researchers should be appointed in order to conduct experiments. The activities
consist of formulating the research goals and developing experiments linked to
these goals. During these experiments, the researchers should analyze the
outcome in order to evaluate the results of measures or means and to make
recommendations for improving cyber operations. Researchers should be
focused on long-term research goals for the realization of strategic goals (for
example, enhancements in the development of cyber weapons or new detection
possibilities) or short-term research goals for the realization of operational goals
(for example, mission related goals).
k) The end-user should be able and available to hone their cyber skills and
knowledge. The users are primarily representatives from the cyber operations
capability.
Page 40 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
3.6
Summary
The MoD business expectations towards the CTR can be categorized into CTR
business functions. The CTR business functions consist of various levels in depth.
The first level positions CTR business functions in relation to cyber operations. In
other words, these functions support the execution of cyber operations. The second
level consists of specific business functions that support one of the capabilities
within cyber operations, being defensive, offensive, or intelligence capabilities. The
cohesion of the capabilities and the CTR business functions is shown in Figure 12.
Figure 12: Cohesion cyber operations capabilities and business functions
The generic business functions consist of business functions that support daily
operations and business functions that enable research and development. To
support operations the CTR can deliver business functions that enable personnel to
act in the cyber domain, to assess if current capabilities are effective in response to
a cyber attack or to conduct a cyber attack or intelligence. To enable research and
development, the CTR can deliver business functions that offer a platform to
conduct applied research into future cyber solutions or to research if external
solutions add value to the MoD.
The specific business functions are specifically tailored to support one of the three
capabilities. For example, a generic business function such as: ―Enable personnel to
act in the cyber domain― is, in the case of cyber defense, specified into: ―Train
personnel to withstand cyber attacks.‖ In addition, these specific business functions
are further specified into services and into CTR service components. The advantage
of this approach is that each activity within one of the three capabilities is supported
by the CTR. This means that CTR can deliver an added value for each capability and
for each activity within a capability making it an important supporting instrument for
conducting cyber operations.
The delivery of CTR business functions depends on technical and organization
requirements. Technical requirements include the ability to simulate ITenvironments with all its characteristics but also to be scalable in assets and flexible
in deploying configurations. Security is crucial and security requirements should
therefore be high. The organization requirements are focused on IT-staff to maintain
and configure the CTR, as well as staff to accompany trainings or experiments.
Page 41 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
4
Roadmap for the Cyber Test Range
4.1
Introduction
The goal of the previous chapter was to determine the MoD business functions that
are expected from the CTR and to identify necessary technical and organizational
requirements in order to deliver these functions. This chapter aims to determine
which business functions can be incorporated during the next five years into the CTR
and what technical and organizational requirements need to be implemented in time
to deliver these functions.
The methodology for establishing a roadmap for the CTR consists of two steps. The
first step is (a) to determine the priority for CTR business functions, as viewed from
the perspective of cyber operations capabilities. It is plausible that not all business
functions can be realized at the same time. Moreover, it is assumed there is no need
from the cyber operations capabilities to make use of all the business functions at
the same time. Therefore, additional information is required to determine which
business function has to be realized first. The second step is (b) to define a maturity
model in order to obtain a more detailed view of the business functions and the
requirements necessary to deliver these business functions. The business functions,
as described in paragraph 3.4, present the possibilities for an end-state of a certain
function. It is assumed that the realization of a business function aimed at an endstate is too complex. In addition, it is also assumed that not all business functions
need to obtain an end-state. Therefore, a maturity model is proposed that offers the
possibility for incremental development of a business function.
4.2
Priority Cyber Test Range business functions
This paragraph proposes the priorities, as seen by cyber operations capabilities, for
the realization of CTR business functions
4.2.1
Methodology
The methodology for establishing the priority level of CTR business functions is
based on two variables. The first variable is the need to use the business functions
(see par 3.4) quickly (which is indicated through
‗urgency‘). The second variable consists of the
requirements needed to deliver business functions
and
the
complexity
of
realizing
these
requirements
(which
is
indicated
through
‗complexity‘). The combination of these variables
presents the priorities for the realization of
business functions. The ideal situation is when a
business function has a high urgency and a low
complexity. These business functions should be
implemented first. Business functions with a low
urgency and a high complexity should be to
implemented last. A matrix is used to categorize
the possibilities based on the combination of
urgency and complexity.
Figure 13: Matrix for determining priorities
Page 42 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
The above-mentioned method to prioritize business functions is done per cyber
operations capability i.e. defensive, offensive and intelligence capabilities. All three
capabilities have different dynamics i.e. what is important to one capability can be
of lesser importance to the other capability. Therefore, prioritizing business
functions is done on the level of each of the three capabilities.
Interviews were held to determine the urgency of business functions and to gain
knowledge regarding the complexity of implementing the requirements. The results
are shown in Appendix IV and Appendix V. The interviews are based on a
quantitative approach. This approach is chosen because it offers the possibility to
calculate urgency and complexity. The information is provided by MoD
representatives from the three cyber capabilities. The number of interviewees is six.
Every cyber capability is represented by two interviewees in order to receive a more
thorough view from each capability. The total number is however small due to two
reasons. The target group is still rather small within the MoD, which creates a
limited base of people with knowledge of cyber.
Results
The priority for the CTR is to be able to support personnel in order to prepare them
for cyber operations, whether these are defensive, offensive or intelligence
activities, as shown in Figure 14. This priority is based on the highest score in
urgency, based on a scale from 5 (realization as soon as possible, within 1 year) to
1 (no direct need for realization) and the number of services within this business
function. The complexity of the requirements necessary to deliver business functions
varies little from one requirement to the next. Therefore, urgency and the amount
of services are the main distinctive variables to define a priority. The second and
third priorities are seen in the ability to research external solutions that may
enhance cyber operations and the ability to use the CTR in support of responding to
cyber attacks or to conduct cyber attacks or intelligence. The descriptions for both
the complexity and the urgency scale are presented in table 5.
Priority cyber operations CTR business functions
5
Low
Possible ‘low
hanging fruit’
otherwise avoid
4
Complexity
4.2.2
Applied research into future
cyber solutions
Most ideal
Assess current means
deployed by own
organization
3
Enable personnel to act in
the cyber domain
2
Adds value
but risky
Avoid
Research external solutions
to enhance cyber
operations
1
Respond to or conduct
cyber attacks or intelligence
High
0
0
Low
1
2
3
4
Urgency
Figure 14: Priority CTR business functions
Page 43 of 78
High
5
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
The business function ―Applied research into future cyber solutions‖ is not visible in
the above-mentioned graph due to similar results as the other business function,
which positions it behind the functions: ―Assess current means deployed by own
organization‖ and ―Respond to or conduct cyber attacks or cyber intelligence.‖
Appendix VI offers a more in-depth version of the graph that shows all business
functions.
The detailed overviews for the cyber attack, defense and intelligence capabilities do
not show huge differences. Therefore, these overviews are not separately described
but rather referred to in Appendix VI.
Legend
Complexity
Urgency
Scale
Description
Scale
Description
1
Very complex. Considerable financial efforts needed.
Long time to market. Chances of success uncertain
Complex. Financial efforts needed (but less compared
to 1). Long time to market (but less compared to 1).
Chances of success limited
Normal complexity. Realization through regular
projects. Normal chances of success.
Straightforward. Experience in this field and has been
performed frequently. High probability of success.
Effortless and seen as low hanging fruit. Very high
probability of success.
1
Very long-term need, realization
after 5 years
Long-term need, realization
between 3 and 5 years
2
3
4
5
Table 5: Description of complexity and urgency scales
Page 44 of 78
2
3
4
5
Medium-term need, realization
between 2 and 3 years.
Short-term need, realization
between 1 and 2 years.
Very short-term need, realization
within 1 year.
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
4.3
Cyber Test Range maturity model
This paragraph proposes a Cyber Test Range maturity model that consists of five
levels. This is the second step in building the CTR roadmap. A maturity model is
suggested because CTR business functions can be offered through a variety of
service levels ranging from very basic to very advanced. A maturity model creates
the opportunity to pinpoint the desired service level and plan the realization of the
desired service level in time.
The maturity model describes three elements:
1. A general description for each maturity level;
2. For every CTR business function, a description of the functionalities for each
maturity level;
3. For every CTR business function, the requirements to deliver the functionalities
at each maturity level.
4.3.1
Methodology
The methodology for defining a maturity model is based on the following:
1. The first step is to link the CTR requirements (paragraph 3.5) to the individual
CTR services (paragraph 3.4.2). This coupling offers insight into the necessary
requirements that have to be realized in order to deliver a specific CTR service.
2. The second step is to abstract the output from the first step to the level of CTR
business function, as the maturity model is based on business functions. This
creates an overview that is less detailed and therefore is easier to interpret. The
results are shown in Appendix VII.
3. The final step is to formulate the possible functionalities provided by business
functions based on different maturity levels. In addition, the CTR requirements
needed to deliver the functionalities on a particular maturity level were
formulated. This final step provides the CTR maturity model with different levels
for business functions and the necessary requirements for that level.
4.3.2
Description of CTR maturity levels
Level 1 Initial
CTR business functions are small-scale and focus on individuals or a single aspect
within a cyber operations activity. The level of service is basic with an ad-hoc
approach without business and IT support. The success of the business functions
depends on the competences and heroics of people in the organization.
Level 2 Managed
CTR business functions are still small-scale but in addition to level 1, the service
delivery is more controlled through activity planning, monitoring, and evaluating.
The business functions focus on individuals or single aspects within a cyber
operations activity.
Level 3 Defined
Technical analyses are more in-depth due to the possibility to simulate basic
configurations of live environments in the CTR. The CTR environment is managed
but new configurations are deployed in the CTR through projects. The business
functions are delivered for a single cyber operations activity.
Page 45 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Level 4 Integrated
The CTR is flexible in terms of deploying simulated live networks and contains a
wide-range of assets. Therefore, business functions provide thorough technical and
business opportunities for testing, training or research and development. Business
functions are delivered on the level of cyber operations capabilities. The CTR
environment is managed and new configurations are loaded through standardized
approaches.
Level 5 Near real-world
CTR business functions are aimed at supporting large scale and complex exercises,
tests, research and development projects. The CTR is able to simulate exact copies
of live networks including all its characteristics and is moreover capable of
federating with other CTR‘s in order to provide heterogeneous environments. The
CTR‘s configuration is fully automated and new configurations are deployed ‗at the
push of a button‘. Multiple simultaneous tests are available at different security
levels.
4.3.3
Enable personnel to act in the cyber domain
This paragraph describes the maturity levels for the business function: ‗Enable
personnel to act in the cyber domain‘.
Enable personnel to act in the cyber domain
Functionalities
Limited practical training
possibilities for developing basic
skills and knowledge needed to
perform an activity.
Provide small-scale and
straightforward exercises to a
single target audience.
Basic training for tool handling.
Requirements
Level 2
Additional to level 1.
Possibilities for developing and
expanding skills and knowledge.
Opportunities for training
procedures regarding a cyber
operation activity.
Additional to level 1.
Instructors available for formulating
training goals, developing training
scenarios, accompanying trainings
and evaluating results to identify
lessons learned.
Limited IT-support for the CTR by IToperations.
Level 3
Additional to level 2.
Provide trainings to practice
collaboration between different
activities within a cyber operations'
capability.
Opportunities for training
techniques regarding a cyber
operation activity.
Additional to level 2.
Simulate live networks with a basic
set of assets.
IT-operations maintains the CTR.
Level 4
Additional to level 3.
Red and blue team exercises are
available to test defensive,
offensive and intelligence skills and
to learn the opponents‘ methods
and techniques.
Decision making processes are
taken into account
Additional to level 3.
Simulate live networks, whether own
or target networks that contain an
extensive set of assets of the live
network.
These are scalable in terms of
diversity and numbers.
The CTR holds preconfigured
configurations of live networks.
The CTR simulates human interaction
and network traffic both in terms of
Level 1
Basic IT-infrastructure available
consisting of elementary assets.
Page 46 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
type and amount.
In addition, the CTR is accessible
from different locations.
IT-operations maintain and configure
the CTR.
Local staff facilities available for
support.
Level 5
4.3.4
Additional to level 4.
Large-scale exercise possibilities
with multi-level scenarios and
diverse target audience.
The CTR is able to deliver realistic
training scenarios for cyber
operation execution and tool
handling in simulated real live
environments that include the ITassets and characteristics.
Full integrated decision making
process
Additional to level 4.
The simulated networks contain a full
simulation of the assets of the live
network.
Different configurations of live
networks can be quickly deployed
into the CTR.
In addition, the CTR can federate
with different CTR's and is accessible
from different locations.
Integrated remote and local staff
facilities available for support.
Research external solutions to enhance cyber operations
This paragraph describes the maturity levels for the business function: ‗Research
external solutions to enhance cyber operations‘.
Research external solutions to enhance cyber operations
Level 1
Functionalities
Requirements
Basic technical testing of external
solutions to establish if it works as
Basic IT-infrastructure available
consisting of elementary assets.
designed.
Level 2
Additional to level 1.
External solutions are tested in
terms of quality and usability to
establish applicability for the own
organization.
Additional to level 1.
Researchers are available for
formulating research goals,
developing experiments and evaluate
results.
Limited IT-support for the CTR by IToperations.
Level 3
Additional to level 2.
External solutions are tested to
determine if it works as designed
when deployed in a live network.
Additional to level 2.
Simulate live networks with a basic
set of assets.
The simulated network has the same
security level as required for the live
network.
IT-operations maintains the CTR.
Level 4
Additional to level 3.
External solutions are tested to
determine if it adds value for a
cyber operations activity.
Additional to level 3.
In order to conduct experiments, the
CTR simulates live networks, whether
own or target networks.
These contain an extensive set of
assets of the live network that are
scalable in diversity and numbers.
The CTR simulates human interaction
and network traffic both in terms of
type and amount.
The CTR holds preconfigured
configurations of live networks and is
accessible from different locations.
IT-operations maintains and
configures the CTR.
Level 5
Additional to level 4.
External solutions are deployed in
Additional to level 4.
The simulated networks contain a full
Page 47 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
simulated live networks to conduct
complex real-live experiments to
determine added value and
necessary tactics, techniques and
procedures to fit within a cyber
operations activity.
4.3.5
simulation of the assets of the live
network.
Different configurations of live
networks can be quickly deployed
into the CTR.
The CTR federates with different
CTR's.
Integrated remote and local staff
facilities available for support.
Respond to or conduct cyber attacks or intelligence
This paragraph describes the maturity levels for the business function: ‗Respond to
or conduct cyber attacks or intelligence‘.
Respond to or conduct cyber attacks or intelligence
Level 1
Functionalities
Requirements
In response to cyber attacks.
Ability to perform attack analysis
in response to cyber attacks.
Basic IT-infrastructure available
consisting of elementary assets.
When conducting cyber attack or
intelligence.
Gain a limited understanding of
the effects of a cyber weapon.
Level 2
Additional to level 1.
Determine basic impact of
malicious activity.
Additional to level 1.
Researchers are available for
evaluating results to make
recommendations for mitigation.
Limited IT-support for the CTR by IToperations.
Level 3
Additional to level 2.
In response to cyber attacks.
Assess the methods,
consequences, and
countermeasures needed to repel
malicious activity or attack.
Additional to level 2.
Simulate live networks with a basic
set of assets.
Simulated network has the same
security level as required for the live
network.
IT-operations maintain the CTR.
Replay cyber events for analyses
To conduct cyber attack or intelligence.
Assess the most effective means
to achieve an intended effect.
Support decision making by
determining if the designated
effect is achieved or that other
(undesirable) effects are achieved
as well, when releasing a cyber
weapon.
Level 4
Additional to level 3.
In response to cyber attacks.
Determine system and data
integrity after an attack and
assess the loss or compromised
key data.
Test and train system and data
recovery
To conduct cyber attack or intelligence.
Perform research to discover
vulnerabilities in a target system.
Understand the ratio between the
time needed to execute an
offensive or intelligence activity
Additional to level 3.
Simulate networks, whether own or
target networks that contain an
extensive set of assets of the live
network.
Assets scalable in diversity and
numbers.
Preconfigured configurations of live
networks are available.
The CTR simulates human interaction
and network traffic both in type and
amount.
The CTR is accessible from different
locations.
Page 48 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
and the time given.
Determine risks of being
compromised when executing an
activity in relation to the returns.
Level 5
Additional to level 4.
In response to cyber attacks.
Test large-scale mitigation,
system, and data recovery prior to
actually recovering a live network.
Support decision making by
simulating major incidents in the
CTR in order to determine which
decision should be made, decide
who should make decision and
determine the prioritization of
decisions.
To conduct cyber attack or intelligence.
Assess the most effective means
to achieve an intended effect.
Perform research to discover
unknown vulnerabilities in a target
system.
Support decision making by
determining if the designated
effect is achieved or that other
(undesirable) effects are achieved
as well, when releasing a cyber
weapon.
4.3.6
IT-operations maintain and configure
the CTR.
Possibility to employ known
vulnerabilities in live networks for
training purposes
Local staff facilities available for
support.
Additional to level 4.
The simulated networks contain a full
simulation of assets of the live
network.
Different configurations of live
networks are quickly deployed into
the CTR.
The CTR offers different types of
configurations with different security
classifications within separate
compartments.
The CTR federates with other CTR's.
Decision making framework and
procedures.
Integrated remote and local staff
facilities available for support.
Applied research into future cyber solutions
This paragraph describes the maturity levels for the business function: ‗Applied
research into future cyber solutions‘.
Applied research into future cyber solutions
Level
1
Level
2
Level
3
Functionalities
Applied research on single asset or
small network.
Limited development of means to
detect and mitigate malicious
activity and recon and scan target
systems.
Additional to level 1Applied
research on simulated network
Limited development of means to
detect and mitigate malicious
activity and recon and scan target
systems.
Requirements
Additional to level 2.
Limited research and development
of new means to detect, terminate,
prevent, or mitigate damage from
malicious activity.
Additional to level 2.
Simulate live networks with a basic
set of assets.
Simulated network has the same
security level as required for the live
Basic IT-infrastructure available and
consisting of elementary assets.
Additional to level 1.
Researchers are available for
formulating research goals,
developing experiments and evaluate
results.
Limited IT-support for the CTR by IToperations.
Ad-hoc simulated networks in
accordance with the development
requirements
Page 49 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
To some degree, conduct research
into shortfalls of an ITenvironment.
Level
4
Additional to level 3.
Research and development of new
means to detect, terminate,
prevent, or mitigate damage from
malicious activity with general
testing possibilities.
Research shortfalls in the ITenvironments‘ ability to withstand
cyber attacks.
To conduct cyber attack or intelligence.
Research and development with
general testing possibilities of new
means to recon and scan target
systems.
Research new means to exfiltrate
information and the ability to
create the effect of deception,
disruption, denial, degradation, or
destruction within a target system.
Perform limited research to
discover unknown vulnerabilities
and develop exploits in order to
access a target system based on a
discovered vulnerability.
Level
5
Additional to level 4.
In response to cyber attacks.
Research and development of new
defensive means with rigorous
testing possibilities.
To conduct cyber attack or intelligence.
Research and development with
rigorous testing possibilities of
offensive and intelligence means.
Perform research to discover
unknown vulnerabilities and
develop exploits in order to access
a target system based on a
discovered vulnerability.
4.3.7
network.
IT-operations maintains the CTR.
Additional to level 3.
Simulate live networks, whether own
or target networks that contain an
extensive set of assets of the live
network.
These are scalable in terms of
diversity and numbers.
The CTR holds preconfigured
configurations of live networks.
The CTR simulates human interaction
and network traffic both in terms of
type and amount.
In addition, the CTR is accessible
from different locations.
IT-operations maintain and configure
the CTR.
Replay, capture, and monitoring
functions for research and
development purposes.
Local staff facilities available for
support.
Additional to level 4.
The simulated networks contain a full
simulation of the assets of the live
network.
Different configurations of live
networks are quickly deployed into
the CTR.
The CTR offers different types of
configurations with different security
classifications within separate
compartments.
The CTR federates with different
CTR's.
Integrated remote and local staff
facilities available for support.
Assess current means deployed by own organization
This paragraph describes the maturity levels for the business function: ‗Assess
current means deployed by own organization‘.
Assess current means deployed by own organization
Level 1
Functionalities
Requirements
In preparation for responding to cyber
attacks.
Assess ability to detect basic
malicious activity.
Basic IT-infrastructure available
consisting of elementary assets.
In preparation for conducting cyber
attacks or intelligence
Limited understanding to what
extent current offensive or
intelligence means are traceable
Page 50 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
and what actions increase the
chance of getting compromised.
Level 2
Additional to level 1.
In preparation for responding to cyber
attacks.
Understand if core defensive means
detect, terminate, and prevent
damage from malicious activity.
Determine if current means are
able to deliver basic assessments
and indicate general risks.
Additional to level 1.
Researchers are available for
formulating research goals,
developing experiments and evaluate
results.
Limited IT-support for the CTR by IToperations.
In preparation for conducting cyber
attacks or intelligence
Determine if the current tactics and
procedures for performing attack or
intelligence activities are effective.
Determine if personnel is able to
perform basic activities and
possess the needed skills and
knowledge.
Level 3
Additional to level 2.
In preparation for responding to cyber
attacks.
Assess if defensive means detect,
terminate, prevent or mitigate
damage from malicious activity and
are able to deliver assessments
and indicate risks.
Assess the effectiveness of the
decision making process by
simulating major breakdown of the
IT-environment.
Additional to level 2.
Simulate live networks with a basic
set of assets.
Simulated network has the same
security level as required for the live
network.
IT-operations maintain the CTR.
Monitoring and replay functions for
assessment and debrief functions.
Local staff facilities available for
support.
In preparation for conducting cyber
attacks or intelligence
Determine if the basic techniques
for performing attack or
intelligence activities are effective
and if personnel is able to perform
these activities.
Acquire basic understanding to
what extent attack or intelligence
means are traceable and what
actions increase the chance of
getting compromised.
General understanding of the ratio
between the times needed to
execute an attack or intelligence
activity and the time given.
Level 4
Additional to level 3.
In preparation to responding to cyber
attacks.
Basic understanding of the ITenvironments' resilience to
malicious activity and the recovery
time, procedures and
consequences in case the ITenvironment is struck by damaging
malicious activity.
Additional to level 3.
Simulate live networks, whether own
or target networks that contain an
extensive set of assets of the live
network.
These are scalable in terms of
diversity and numbers.
The CTR holds preconfigured
configurations of live networks.
The CTR simulates human interaction
and network traffic both in terms of
Page 51 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Level 5
In preparation to conducting cyber
attacks or intelligence.
Determine if the current tactics,
techniques, and procedures for
performing attack or intelligence
activities are effective and if
personnel is able to perform these
activities.
Understand to what extent current
means are traceable and what
actions increase the chance of
getting compromised.
Understand the ratio between the
time needed to execute an activity
and the time given.
Determine if cyber weapons do
what is expected of them, assess if
the designated effects are achieved
and understand the side-effects.
type and amount.
In addition, the CTR is accessible
from different locations.
IT-operations maintains and
configures the CTR.
Additional to level 4.
In preparation for responding to cyber
attacks.
Determine the IT-environment
resilience to malicious activity and
the recovery time, procedures and
consequences in case the ITenvironment is struck by damaging
malicious activity
Additional to level 4.
The simulated networks contain a full
simulation of the assets of the live
network.
Different configurations of live
networks are quickly deployed into
the CTR.
The CTR offers different types of
configurations with different security
classifications within separate
compartments.
The CTR federates with different
CTR's.
Integrated remote and local staff
facilities available for support.
In preparation for conducting cyber
attacks or intelligence
Determine deployment of offensive
and intelligence capabilities in near
real live situations
Determine command decision
structure in offensive capabilities
Determine full operational
capability and integration on
tactical, operational en strategically
levels
Page 52 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Cyber Test Range roadmap
This paragraph proposes the roadmap for the implementation of the identified CTR business functions and the necessary requirements to
deliver these functions. The roadmap is presented in Figure 15 and explained in the next pages.
Cyber test range roadmap
(4)
(2)
Assess current means deployed by own organization
Research external solutions to enhance cyber operations capability
Scope: maturity level 3
Design
Implement
Scope: maturity level 3
Scope: maturity level 5
Operate
Design
Design
Implement
Operate
Design
2. Organizational requirements
- Ensure availability of supporting personnel
4. Evaluate
1. Design and implement functionalities
2. Technical requirements
- Possibility to employ known vulnerabilities in live
networks for training purposes
4. Evaluate
1. Design and implement functionalities
2. Technical requirements
-Assure security of CTR
-Replay cyber events for analyses
Design Design
Implement
Operate
1. Design and implement functionalities
2. Technical requirements
- Able to simulate live environments
- Assure security of CTR
2. Technical requirements
- Able to simulate traffic in live environments
- Ability to scale CTR
- Ability to quickly deploy configurations
- Able to federate with different CTR’s
T+1
Applied research into future cyber solutions
Scope: maturity level 5
Scope: maturity level 3
Design
3. Organizational requirements
-Attain integrated and remote staff facilities for support
T+2
Figure 15: CTR roadmap
Page 53 of 78
T+3
Implement
Design
Operate
Implement
1. Design and implement functionalities
1. Design and implement functionalities
2. Technical requirements
- Offer different types of configurations with different
security classifications within separate compartments.
2. Organizational requirements
- Ensure availability of supporting personnel
3. Organizational requirements
- Ensure availability of supporting personnel
- Decision making framework and procedures.
T+4
4. Evaluate
Operate
1. Design and implement functionalities
3. Organizational requirements
- Attain instructors capacity
- Attain IT-maintenance
- Attain staff facilities for support
Respond to or conduct cyber attacks or intelligence
Scope: maturity level 5
4. Evaluate
Implement
3.
Evaluate
(5)
(3)
Enable personnel to act in the cyber domain
Scope: maturity level 3
Operate
3. Organizational requirements
- Ensure availability of supporting personnel
(1)
Design
Implement
1. Design and implement functionalities
3. Organizational requirements
- Attain researchers capacity
- Ensure availability of supporting personnel
4. Evaluate
4.4
T+5
Operate
3.
Evaluate
T+6 >
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
The roadmap consists of several elements, all surrounding the business functions.
These elements are as follows:
Elements
Description
This element presents the different CTR business function. Each
business function has its own colour, which matches the colours
used in paragraph 4.2.
This element presents the steps for the realization of a business
function. The steps consist of: design, implement, and operate.
This element presents the maturity level for the business
function that is strived to be realized. The maturity levels are
based on the levels in paragraph 4.3.
This element presents the necessary requirements that need to
be implemented in order to deliver a business function. The
requirements are based on the requirements in the maturity
model (par 4.3)
This element presents the timeframe in years. T stands for the
moments when the implementation of the CTR is started. T+1
represents the first year after the start.
Enable personnel to act in the cyber domain
Page 54 of 78
4. Evaluate
From a cyber operations
Enable personnel to act in the cyber domain
Scope: maturity level 3
Scope: maturity level 5
viewpoint, the business
function aimed at training
Design
Implement
Operate
Operate
Design Design Implement
personnel is deemed most
important (see par 4.2.2).
1. Design and implement functionalities
1. Design and implement functionalities
2. Technical requirements
2. Technical requirements
Therefore, this function is
- Able to simulate traffic in live environments
- Able to simulate live environments
- Ability to scale CTR
- Assure security of CTR
proposed to be realized
- Ability to quickly deploy configurations
3. Organizational requirements
- Able to federate with different CTR’s
- Attain instructors capacity
first. In addition, the need
3. Organizational requirements
- Attain IT-maintenance
-Attain
integrated and remote staff facilities for support
- Attain staff facilities for support
described by the cyber
operations capabilities
fits the functionality of maturity level 5 (see par 4.3.3). As a result, it is proposed to
achieve a level 5 maturity for this business function. The aim is to achieve level 5
between 2 and 3 years. The realization is suggested to take place in two phases,
one phase aimed at achieving maturity level 3, and the second aimed at level 5. The
reason for this is that all necessary requirements will have to be designed and
implemented for the first time. Therefore it is expected that these requirements will
be technically and organizationally challenging and require many financial and
human resources. Moreover, starting small enables to use lessons learned for
implementing the next maturity level. That is the reason why an incremental
development is suggested.
4. Evaluate
4.4.1
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
4.4.2
Research external solutions to enhance cyber operations
4.4.3
4. Evaluate
4. Evaluate
The
cyber
operations
Research external solutions to enhance cyber operations capability
capabilities indicated that
Scope: maturity level 3
Scope: maturity level 5
the business function in
Design
Implement
Operate
Operate
Design
Design Implement
which external solutions
are researched is the
1. Design and implement functionalities
1. Design and implement functionalities
second priority to be
2. Technical requirements
2. Technical requirements
-Assure security of CTR
- Possibility to employ known vulnerabilities in live
available through the CTR
-Replay cyber events for analyses
networks for training purposes
3.
Organizational
requirements
(see par 4.2.2). The level
3.
Organizational requirements
- Attain researchers capacity
- Ensure availability of supporting personnel
- Ensure availability of supporting personnel
of quality should also be
aimed at achieving a level
5 maturity (see par 4.3.4). This level is proposed to be achieved between 4 and 5
years. The realization follows the same path as the previous business function. The
requirements that are necessary for this business function to operate are the same
as the requirements for the previous business function. Therefore, this business
function can take advantage of the implementations done for the realization of the
function to train personnel. However, there are still specific requirements that have
to be realized for maturity levels 3 and 5.
Respond to or conduct cyber attacks or intelligence
4. Evaluate
The ability to support response to cyber
Respond to or conduct cyber attacks or intelligence
attacks or to prepare for performing
Scope: maturity level 5
cyber attacks or intelligence, is graded
as a third priority (see par 4.2.2). As
Design
Implement
Operate
this business function, directly support
the ability to perform cyber operations it
1. Design and implement functionalities
is suggested to achieve a maturity level
2. Technical requirements
5 between 4 and 5 years (see par
- Offer different types of configurations with different
security classifications within separate compartments.
4.3.5). This business function takes
3. Organizational requirements
advantage of the fact that most
- Ensure availability of supporting personnel
- Decision making framework and procedures.
requirements are implemented in order
to deliver the previous business
functions. Therefore, it is proposed to obtain a level 5. The ability to offer different
configurations types in the CTR which have different security classifications with
different compartments may prove technically challenging.
4.4.4
Assess current means deployed by own organization
The business function that enables the
assessment of the current means is graded to
be one of the least important business
functions to be realized (see par 4.2.2). With
the roadmap set at realizing business
functions within the forthcoming 5 years, it is
suggested to set the ambition for this
business function to a maturity level 3 (see
par 4.3.7). To achieve this level all
requirements should by now be implemented,
making the realization of level 3 maturity less
complicated.
Page 55 of 78
Assess current means deployed by own organization
Scope: maturity level 3
Design
Implement
1. Design and implement functionalities
2. Organizational requirements
- Ensure availability of supporting personnel
Operate
3.
Evaluate
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
4.4.5
Applied research into future cyber solutions
This last business function focuses on
conducting research into future cyber
solutions and follows the same path as the
business function for assessing current
means. The priority is seen as one of the
lowest by the cyber operations capabilities
(see par 4.2.2). It is also suggested to aim at
a maturity level 3 (see par 4.3.6). The
reasons is the timeframe of this roadmap, but
more importantly cyber operations can make
use of the industry‘s ability to conduct
research, limiting the need to acquire the
capacity to conduct applied research in house.
4.5
Applied research into future cyber solutions
Scope: maturity level 3
Design
Implement
1. Design and implement functionalities
2. Organizational requirements
- Ensure availability of supporting personnel
Operate
3.
Evaluate
Validation
The roadmap as presented in paragraph 4.4 is validated through the use of an
expert opinion. Major G. Wens was asked to validate the outcome. He is the staff
officer R&D within the Taskforce Cyber Operations; as such, he is responsible for the
development of the cyber test range within the MoD.
The priorities and the ambition levels of the business functions presented in the
roadmap match his perception, with two additions.
The business function for assessing current measures has a lower priority in
comparison to other business functions. This is striking. A lower priority is
understandable from a cyber attack point of view, as the research into this
capability is starting and thus, the need for assessment of current – cyber attack –
measures is expected necessary in a few years. However, cyber defense and cyber
intelligence are already operational. Therefore, one would expect there is an existing
need from these capabilities to be able to assess their current cyber defense and
intelligence measures, as this will improve the current effectiveness of both cyber
capabilities.
Developing, implementing and optimizing the cyber test range is a continual
process. Therefore, a roadmap should preferable present the same characteristics in
which there is an iterative method for the control and continuous improvement of
business functions and its ambition levels and requirements.
Page 56 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
4.6
Summary
A roadmap is proposed for establishing the delivery of business functions through
the CTR and the realization of the needed technical and organization requirements.
This roadmap is spread over the next five years.
The process for defining a roadmap consists of two steps. First, it has to be clear
which priorities are deemed most important by the cyber operations capabilities
towards the business functions offered by the CTR. The second step is to define the
different levels of functionalities within a business service along with the necessary
requirements.
The priorities are formulated through two variables. The first variable is the need to
use these business functions quickly (this is indicated through ‗urgency‘). The
second is the complexity for the realization of necessary requirements (which is
indicated through ‗complexity‘). The combination of these variables represents the
priorities for the realization of business functions. The business function that enables
personnel to act in the cyber domain, is deemed most important. This function is
followed by the ability to research external solutions to enhance cyber operations.
The possibility to use the CTR in response to cyber attacks or to use the CTR in
preparation for conducting cyber attacks or intelligence operations is seen as the
third priority. The business functions that assess current means and conduct
research into future cyber solutions are deemed least important.
A CTR maturity model is developed in order to be able to define different levels of
functionalities and differentiate the necessary requirements. The methodology for
defining a maturity model is based on three steps. The first step is to link the CTR
requirements to the individual CTR services. The second step is to abstract the
requirements coupled to CTR services to the level of business functions. The final
step is to split the requirements into different levels ranging and linking these
differentiated requirements to service levels for each business function. The
maturity model consists of 5 levels in which level 1 is the most basic and level 5 is
the most advanced. Each level has a general description. For each business
function, a description of the functionalities is given in each maturity level, along
with the requirements to deliver the functionalities in each maturity level.
The roadmap offers an overview of all the business functions and their timeframe.
For each business functions, an ambition level is proposed through a maturity level.
In addition, the roadmap offers an overview of the requirements that have to be
realized in order to be able to deliver the business functions based on its ambition
level.
Page 57 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
5
Conclusions and recommendations
This chapter ends the thesis with conclusions and recommendations of the research
that is done to design a roadmap for the development of a cyber test range. The
first section discusses the conclusions. The second section presents the
recommendations.
5.1
Conclusions
5.1.1
Understanding cyber operations
Through cyber operations the military have the capability, next to other military
capabilities, to defend and/ or attack (or gather intelligence) in order to achieve
political or military objectives or effects. Cyber operations are conducted through
offensive, defensive and intelligence capabilities in which (1) cyber defense is aimed
at protecting its own networks and systems, (2) cyber attack is aimed at disrupting,
denying, degrading or destroying networks and systems, (3) cyber intelligence
enables intelligence collection through networks and systems.
5.1.2
Current state of cyber test ranges
Cyber test ranges are virtual environments that are mostly used for research and
development, evaluation and training purposes within the cyber domain. CTR can
therefore be considered as a ‗digital shooting range‘ in which military personnel
conduct military exercises, train their drills, test their skills or test weaponry, which
is comparable to a shooting range in the physical world. CTR offers the military
stakeholder the ability to - more effectively - defend and attack (or gather
intelligence regarding) infrastructures or military capabilities (Figure 6, p19).
The requirements for cyber test ranges are demanding. The main requirement is the
ability to replicate networks and computer systems in order to conduct realistic
experiments or exercises without threatening real world environments.
5.1.3
Cyber test range business functions
The CTR delivers an added value for each cyber operations capability and for each
activity within a capability by offering tailor-made business functions. This makes
the CTR an important supporting instrument for conducting cyber operations.
The generic business functions (Figure 8, p27) deliver functionalities on the level of
cyber operations and support daily operations and research and development.
To support daily operations, the CTR can deliver business functions that (a) enable
personnel to act in the cyber domain, (b) to assess the effectiveness of current
capabilities and (c) to respond to cyber attacks or to conduct cyber attacks or
intelligence.
To enable research and development, the CTR can deliver business functions that
offer a platform to (a) conduct applied research into future cyber solutions or to (b)
research if external solutions add value to the MoD.
Page 58 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
The specific business functions are positioned on the level of cyber operations
capabilities, being defensive (Figure 9, p30), offensive (Figure 10, p34) or
intelligence capabilities (Figure 11, p37. The specific business functions are
specifically tailored to support one of the three capabilities.
5.1.4
Requirements for delivering CTR business functions
Technical requirements include the ability to simulate IT-environments with all its
characteristics. In addition, the CTR needs to be scalable in terms of different assets
and number of assets. Changing configurations of simulated live environments
should be possible by at the push of a button so as to support short times to
market. Moreover, the CTR should simulate different types of configurations
simultaneously with different security classifications within separate compartments.
Security is crucial and security requirements should be high.
The organization requirements include IT-staff to maintain and configure the CTR.
To support training or exercises, instructors should (a) formulate training goals, (b)
develop CTR training scenarios, as well as (c) accompany training or exercises and
(d) evaluate personnel, and (e) propose improvement possibilities for individuals or
groups. An analyst should propose improvements for current technical capabilities,
procedures, and policies used in cyber operations in order to enhance standing
operating procedures or technical means. To conduct experiments, researchers
should (a) formulate research goals, (b) develop experiments, and make (c)
recommendations for improving cyber operations.
5.1.5
Roadmap for the development of a cyber test range
The roadmap (Figure 15, p53) offers a timeline for the CTR for the delivery of
business functions and the implementation of technical and organizational
requirements during the next five years.
The business functions that enable personnel to act in the cyber domain should be
the main priority. Implementation is proposed through a level 3 maturity that
evolves to a level 5 maturity, with a total lead-time between 2 and 3 years.
The second priority is the business function that researches external solutions to
enhance cyber operations. The realization is also proposed through a phased
approach by reaching a level 3 maturity and subsequently a level 5 maturity. The
aim is to achieve level 5 between 4 and 5 years.
The ability to support response to cyber attacks or to prepare for performing cyber
attacks or intelligence operations is graded as a third priority. It is suggested to
achieve a maturity level 5 between 4 and 5 years.
The business functions that enable assessment of the current means and conducting
research into future cyber solutions are deemed least important. It is suggested to
set the ambition for these business functions to a maturity level 3, to be achieved
between 4 and 5 years.
Page 59 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
5.2
Recommendations
5.2.1
Roadmap for the development of a cyber test range
5.2.2
5.2.3
1.
Collaborate with knowledge institutions (as TNO) and partners (as NCSC) in
order to validate the proposed CTR roadmap as to obtain a unbiased view in
regard of the CTR. Combine these views along with the proposed roadmap as a
basis for the CTR approach within the MoD.
2.
Establish an approach under supervision of the Taskforce Cyber within the NL
MoD for the realization of a CTR.
3.
Collaborate with the UK MoD in connection with the Federated Cyber Range
(42). Validate the NL MoD approach towards the CTR in terms of business
functions, requirements, and roadmap and incorporate their lessons learned into
the NL MoD approach for the CTR.
4.
Liaise with NATO, as there are also developments in the realization of a ‗cyber
test range functionality‘ and examine potential cooperation possibilities.
Cyber test range business functions
5.
Collaborate with the Cooperative Cyber Defence Centre of Excellence in regard
of their experience in preparing, facilitating, and conducting cyber defense
exercises supported by a cyber lab (40).
6.
Develop under the supervision of the Taskforce Cyber and in cooperation with
the three cyber operations capabilities, the CTR business function based on the
descriptions (see paragraph 3.3) and in relation to the CTR maturity levels
(4.3).
Requirements for delivering CTR business functions
7.
Formulate and acquire through the forthcoming Defence Cyber Expertise Centre,
the resources, in terms of researchers and instructors, to conduct trainings and
exercises and research and development.
8.
Determine in cooperation with the Defence Material Organisation, whether the
maintenance and configuration of the CTR will be conducted within the MoD or if
it is suitable for sourcing.
9.
Define research questions in order to and in cooperating with knowledge
institutes and businesses to research: (a) the possibilities for replicating live
networks in terms of assets and characteristics, (b) the ability for configuring
live environments to be rapidly deployed within the CTR, (c) the needed security
requirements and measures to protect sensitive information, (d) risk
management due to the possible disruptive nature of experiments or exercises
within the CTR, (e) accessibility from different locations and (f) health
management in order to guarantee that results from the CTR are trustworthy.
10. Define, design, and develop the DOTMPLFI measures needed for delivering
cyber test range functionality.
Page 60 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
6
Reflection
This chapter looks back on the choices made during the research, the research
process and the ideas evolved by new insights.
A broad or narrow scope?
One of the choices that had to be made concerned the research approach. It was
clear that the research area would address the potential of a cyber test range for
the MoD, as this is a new topic within the MoD and decisions about the use and need
for a cyber test range need to be made. I found it therefore important to view the
CTR from a business perspective in contrast to taking a technical approach. A
business perspective meant in my opinion to first establish in which way the CTR
contributes to a more effective and efficient cyber operations. Once established the
technical matters can be researched. Taking a technical approach first held the risk
that the outcome of the thesis would not match the business needs.
Taking the business perspective as a starting point presented the choice in the
research scope. As the business perspective for a test range is represented by cyber
operations and its capabilities, there was a choice whether to have a broad and
comprehensive or a narrow but more detailed research. I chose to have a broad
research scope which meant that I wanted to include all three capabilities instead of
one capability. The reason is that the capabilities are intertwined which presented
the opportunity to develop integral CTR business functions. For example, by
developing a business function aimed at exercises, all three capabilities can train
simultaneous with one capability aimed at defending and the others at attacking or
gathering intelligence. This approach worked well and offers a foundation for further
research for the specific business functions. The disadvantage of the broad research
scope was the additional time that was required which had consequences for some
elements.
Path to the CTR roadmap
The research methodology worked well. The methodology is aimed at understanding
the context and looking into research done in this field and based on these findings
researching the MoD CTR. This methodology provided the approach through which
the roadmap was derived. These logical steps are usable when conducting similar
research. However, the challenge was the gathering of information for
understanding the context of cyber and the CTR. It was done through desk
research. On the one hand there was loads of information, this presented a problem
when trying to answer a straightforward question as: ‗what is cyber?‘. On the other
hand, information was limited, especially regarding a CTR. Information is mainly
available regarding the technical implementations but I found it limited for
describing the use and need for a CTR. In case further research is done, it is
advisable to gather this information through case studies (par 2.4.2.). The gathering
of information for researching the added value of a CTR for the MoD was done
through interviews. This approach delivered the desired information and worked
well. The positive outcome was that it helped the organization to view the cyber
capabilities through a different structured method, which delivered interesting
discussions. The drawback was that these interview were very time-consuming for
the interviewees. In a future situation the use of workshops can be considered when
time is limited.
Page 61 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
The interviewees were all from the MoD. The original plan was to interview experts
from technical institutes or other organisations operating in the cyber domain, next
to the MoD colleagues. The involvement of these external experts should have
contributed to a more comprehensive understanding regarding the possibilities of a
CTR. Unfortunately due to constraints in time these experts where not interviewed.
During the development of the roadmap I discovered that there was a need to apply
differentiation in the level of functionalities of business functions. There was not
always a need to possess a ‗full blown‘ business function and in some cases less
functionalities were also sufficient. This conclusion resulted into the development of
maturity levels in CTR business functions. Although this maturity model was not
planned and it required more time, it adds value to the roadmap and contributes to
a better discussion regarding the role of a CTR within the MoD.
The end result
The main question was aimed at researching the potential of the CTR and the added
value for the MoD. Looking back at the process I am pleased with the end result.
This thesis delivers new insights and lays a solid foundation for further research.
The development of CTR business functions based on business needs contributes to
a more future proof approach as these business needs, in my opinion, are more
structural. Therefore, the focus can be laid on the technical and organizational
requirements and to research the best solutions to deliver these business functions.
In addition, the development of a CTR maturity model offers the opportunity to
discuss, decide and implement the right ambition level as desired by the MoD. This
thesis was certainly challenging not only because of the time constraints but more
due to the fact that a cyber test range is a new subject matter in general and
specifically to the MoD and therefore new theories had to be developed. Through
this thesis, I hope to make a contribution in the development of cyber and the cyber
test range within the Netherlands Ministry of Defence.
Page 62 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
7
Bibliography
1. Ministry of Defence. Defensie na de kredietcrisis: een kleinere krijgsmacht in een
onrustige wereld. April 2011. BS2011011591.
2. —. Defensie Cyber Strategie. Juni 2012.
3. —. Uitwerking visie Cyber Operations. May 2011. BS2011017863.
4. Cartlidge, et al. The IT Infrastructure Library; An Introductory Overview of ITIL V3. s.l. :
itSMF, 2007.
5. Cyberspace: Definitions and Implications. Ottis, Rain and Lorents, Peeter. 5th
International Conference on Information Warfare and Security, Dayton OH, US : Cooperative
Cyber Defence Centre of Excellence, 2010.
6. Wiener, Norbert. Cybernetics: or Control and Communication in the Animal and the
Machine. Cambridge : The MIT Press, 1948.
7. Thill, Scott. March 17 1948: William Gibson , Father of Cyberspace. Wired.com. [Online]
March 2011. http://www.wired.com/thisdayintech/2011/03/0317cyberspace-author-williamgibson-born/.
8. Kuehl, Dr Dan. From Cyberspace to Cyberpower: Defining the Problem. [book auth.]
Stuart H. Starr, and Larry K. Wentz Franklin D. Kramer. Cyberpower and National Security.
s.l. : Potomac Books, Inc. , 2009, Vols. in Cyberpower and National Security, ed. Franklin D.
Kramer, Stuart H. Starr, and Larry K. Wentz,.
9. US Department of Defence. The National Military Strategy for Cyberspace Operations.
December 2006.
10. —. Joint Publication 1-02, DOD Dictionary of Military and Related Terms. April 12, 2001.
11. —. Joint Publication 1-02, Department of Defense Military and Associated Terms. [Online]
November 15, 2011. http://www.dtic.mil/doctrine/dod_dictionary.
12. Ministry of Security and Justice. Cyber Security Beeld Nederland. December June 2012.
CSBN-2.
13. RSA. The Current State of Cybercrime and What to Expect in 2012. 2012.
14. Symantec. 2011 State of Security. 2011.
15. AIV. Digitale Oorlogvoering, No 77, AIV/No 22, CAVV. December 2011.
16. Paul Cornish, David Livingstone, Dave Clemente and Claire Yorke. On Cyber
Warfare. s.l. : Chatham House, November 2010.
17. US Department of Defence. Joint Publication 3-0, Joint Operations. August 2011.
18. NATO. Allied Joint Doctrine for Information Operations. November 2009. AJP 3.10.
19. van Paassen, te Paske, Smulders. Een overzicht van cyber onderzoek voor Defensie.
s.l. : TNO, 2011. 35570.
20. Dreijer. Offensieve Cyberoperaties. s.l. : Nederlandse Defensie Academie, March 2011.
21. Grant, Burke and Heerden, Van. (forthcoming) Comparing Models of Offensive Cyber
Operations. 2011.
22. Andress and Winterfeld. Cyber Warfare; Techniques, Tactics and Tools for Security
Practitioners. s.l. : Elsevier, 2011. ISBN 978-1-59749-637-7.
23. West-Brown, et al. Handbook for Computer Security Incident Response Teams (CSIRTs).
s.l. : Carnegie Mellon University, April 2003. CMU/SEI-2003-HB-002.
24. NC3A. Cyber Defence Capability Framework. December 2010.
25. BuxBaum, Peter A. Building a Better 'Cyber Range'. August 2011.
26. Sabo, Robert P. Standing Up the Information Operations Range. 2006.
27. The Information Assurance Range. Powell, Robert, Holmes, Timoty K. and Pie, Cesar
E. ITEA Journal 2010; 31: 473–477, 2010.
Page 63 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
28. US Department of Defence. The Global Information Grid (GIG) 2.0; Concept of
Operations. March 2009. Version 1.1.
29. Watson. Combat Readiness through Resilience in Hostile Cyber Environments.
30. Welshans. History of Cyber Testing and Evaluation - A Voice From the Front Lines. ITEA
Journal. 2010, Vol. 31, pp. 449-452.
31. Benzel, et al. Current Developements in DETER Cybersecurity Testbed Technology. 2009.
32. Van Leeuwen, Urias, Eldridge, Villamarin, Olsberg. Performing Cyber Security
Analysis using LVC Testbeds. 2010.
33. DARPA. National Cyber Range. DARPA. [Online]
http://www.darpa.mil/Our_Work/STO/Programs/National_Cyber_Range_(NCR).aspx.
34. —. Broad Agency Announcement (BAA); National Cyber Range. May 2008. DARPA-BAA-0843.
35. VanPutte. National Cyber Range; The Future of Cyber Testing & Experimentation, Test
Week 2010: Track 4. July 2010.
36. Defense Information Systems Agency. Department of Defense Information Assurance
Range: A Venue for Test and Evaluation In Cyberspace. August 2011.
37. Mirkovic, Jelena, et al. The DETER Project; Advancing the Science of Cyber Security
Experimentation and Test. s.l. : IEEE, 2010. 978-1-4244-6048-9/10.
38. Design, Deployement and Use of the DETER Testbed. Benzel, et al. DETER Community
Workshop on Cyber-Security and Test, Boston : s.n., August 2007.
39. NATO Cooperative Cyber Defence Centre of Excellence. CCD COE Training Courses.
CCD COE. [Online] http://www.ccdcoe.org/236.html.
40. —. Baltic Cyber Shield Cyber Defence Exercise 2010; After Action Report. 2010.
41. UK Ministry of Defence. Defence Minister opens UK cyber security test range. Ministry of
Defence. [Online]
http://www.mod.uk/DefenceInternet/DefenceNews/DefencePolicyAndBusiness/DefenceMinister
OpensUkCyberSecurityTestRange.htm.
42. Northrop Grumman. Federated Cyber Range; Cases studies. 2010.
43. —. Cyber Test Range. Northrop Grumman. [Online]
http://www.northropgrumman.com/performance/pdf/cybersecurity/technology/cyber_test_ran
ge.pdf.
44. BreakingPoint. Accelerating the Deployment of the Evolved Cyber Range.
45. Command Five Pty Ltd. Advanced Persistent Threats: A Decade in Review. Juni 2011.
46. Ministry of Defence. Minister Hillen over digitale frontlinie van de toekomst. Ministerie
van Defensie. [Online] April 13, 2011. http://www.defensie.nl/actueel/nieuws/
2011/04/13/46180923/Minister_Hillen_over_digitale_frontlinie_van_de_toekomst.
47. Von Hinke Kessler Scholder. DIVA: Samenwerken in samenhang. Het wat, waarom en
hoe van de Bedrijfsvoering-, Informatievoorziening- en ICT-architectuur bij Defensie. October
2006.
48. Abcouwer, Maes en Truijens. Contouren van een Generiek Model voor InformatieManagement; een landkaart van de relatie tussen een organisatie en haar
informatievoorziening' Management & Informatie. Management & Informatie, 1997, Vol. 5, 3,
pp. 92-102.
49. Design, Deployment, and Use of the DETER Testbed. Benzel, Terry, et al. DETER
Community Workshop on Cyber-Secu rity and Test, Boston : s.n., August 2007.
Page 64 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Appendix I.
Detailed overview CTR business functions
Individual CTR business functions
NCR
Create a vision of the
future and derive
requirements for new
solutions
IO Range
IA Range
Basic and advanced research
and development (R&D)
Experimentation
Modelling and simulation
(M&S)
Developmental test and
evaluation (DT&E)
DETER
To conduct cyber
security experiments
such observation of
malware and
defenses, assessment
of defense
effectiveness, or
testing hypotheses
about a defense
CCD COE
Northrop
Grumman
UK Cyber range
Generic CTR
business functions
Research &
Development
Applied research into
future cyber defensive
capabilities
Applied research
into future cyber
solutions
future cyber intelligence
capabilities
Developmental test and evaluation
(DT&E)
Research external
solutions to
enhance cyber
operations
Page 65 of 78
Applied research into
future offensive cyber
capabilities
Applied research into
mechanism.
Test the applicability of
new ideas from the
research and
technology community
Specific CTR business
functions
Research external
solutions to enhance
cyber defense
Research external
solutions to enhance
cyber attack
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Research external
solutions to enhance
cyber intelligence
Confirm or deny
system meets
requirements for
integration into
today’s
enterprise.
Operational
demonstrations
for and training of
operators
Operational test and evaluation
(OT&E)
Validate capabilities and
services provided by
CND tools and
mechanisms
Validate and improve
CND tactics, techniques,
and procedures
Validate acceptable level
of service of Computer
Network Defense
Service Providers
(CNDSPs)
Increase resilience
by evaluating
current systems to
determine their
effectiveness and
combat readiness
Evaluating
Network
Architectures
Component
tests
Assess if current
defensive measure are
effective
Assess current
measure deployed
by own
organization
Assess if current
intelligence measure are
Validate IA mitigation
strategies for programs
of record.
Exercises
Training certification
Studies and analysis
Improve cyber security
workforce operational
performance
Assess if current offensive
measure are effective
effective
Support technical
training courses.
Aimed at
individuals.
Support technical
training exercises.
Aimed at groups
Increase resilience
by evaluating
personnel to
determine their
effectiveness and
combat readiness
Cyber Problem
Prevention
Training
Cyber Problem
Response
Training
Train personnel to
withstand a cyber attack
Enable personnel to
act in the cyber
domain
Train personnel to
execute a cyber attack
Train personnel to gather
intelligence through
cyber
Page 66 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Battle lab demonstrations
Targeting and battle damage
assessment (BDA)
development
Respond to or
conduct cyber
attacks or
intelligence
Assessments of unintentional
weapon effects
Tactics, Techniques, and
Procedures (TTP) development
Rules of engagement (ROE)
approvals and authorities
Legal reviews and assessments
Tool and weapon system
operations
Joint Munitions Effectiveness
Manual (JMEM)
validation
Proof of concept
Respond to cyber attacks
Conduct cyber attacks
Conduct cyber
intelligence
demonstration
Weapon/capability
performance characterization
Mission rehearsal
Page 67 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Appendix II.
Interview protocol
Goal
This interview protocol is intended to research the expectations from a defensive,
operational and intelligence capabilities viewpoint towards the CTR and formulates
the expected MoD cyber test range functions. Therefore interviews are held in which
the cyber capabilities activities which are derived from offensive and defensive
frameworks are mapped to the test range goals which are used by external ranges.
The information is provided by MoD representatives of defensive, operational and
intelligence capabilities. The number of participants is 6.
Result
The interview provides information on the following topics:
1. Validate the test range goals which are used by external ranges
2. Determine to which extent the CTR supports the 6 activities within the cyber
defense process;
3. Determine to which extent the CTR supports the 8 activities within the cyber
attack process from an attack and intelligence point of view;
4. Identify the necessary technical and organizational consequences for meeting
the expectations.
Method
A short introduction is given in advance to the interviewee onto the context of the
interview. In addition specific information is provided regarding the capability which
are represented by the interviewee (defensive, offensive or intelligence).
The interviewee is approached with the question whether the person wants to
participate. An appointment is made in which the context is explained. It is also
indicated that it is an open interview which lasts 1 hour. The draft report is
composed and presented to the interviewee to validate.
The security level of the thesis is unclassified.
The interview consists in three parts:
1. Introduction (15 min)
2. Open interview (30 min)
3. Completion (15 min)
The interview
Introduction
Get acquainted with each other
Appreciation for the cooperation
Check whether information is received prior to the appointment, check whether
context is clear.
Explain the interview process
Explain a draft report will be composed and presented to the interviewee
Check recording permission
Confidentiality. Classified topics will not be mentioned in the thesis and will be
adapted to be unclassified.
Page 68 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Questions
1. What is your view of the possibilities of a CTR from a broad perspective?
2. What is your view of the expectations of a CTR when these are mapped to cyber
defensive?
Possible follow-up questions:
Can you elaborate on the topic?
How will the cyber <…..> capability profit from a CTR?
What is the added value compared to the current situation?
Present the overview of CTR goals. Inform interviewee on the back ground and
check whether the goals as derived from the desk research include the possibilities
and expectations from question 1 and 2. Hereby validation of the desk research is
done.
Present the defensive or offensive or intelligence activities (which is applicable in the
specific interview).
3.
How will the specific activity profit from a CTR?
Discuss the 8 activities from the cyber attack or intelligence process: recon,
scan, access, escalate, exfiltrate, assault, sustain and obfuscate.
Discuss the 6 activities from the cyber defense process: malicious activity
detection, attack termination, -prevention, -mitigation, dynamic risk damage
and attack assessment, cyber attack recovery, timely decision making, cyber
defence information management.
Possible follow-up questions:
Can you elaborate on the topic?
Who will profit if the activity is supported by a CTR?
4.
5.
What are the technical consequences for implementing the specifications?
What are the organizational consequences for implementing the specifications?
Completion
Are there any relevant issues which have not been discussed?
Check possible confidentiality of information
Draft report will be send within 5 days for approval
Thank interviewee for cooperation
Page 69 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Appendix III.
Interviews expectations towards a cyber test range
Contact author for interviews
Page 70 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Appendix IV.
Calculations of priorities per CTR business function
This table presents the outcome of the interviews held to establish the urgency for
CTR business functions from a cyber attack and intelligence viewpoint. There were
four respondents. Two respondents represented cyber attack and two cyber
intelligence. The urgency is based on the average.
Cyber attack and intelligence
Cyber Test
Range Business
Functions
Respondents
Cyber Test Range Services
Average
urgency
1
2
3
4
4,5
5
4
4
5
4
4
4
5
4
3,5
3
4
3
5
3
3
3
1
3
3,5
3
4
4
3
3
3
3
1
2
3,5
4
3
5
4
Train general competences, such as: develop and
maintain necessary skills and knowledge
Train cyber attack execution, such as:
train ability to recon a target system
Train personnel
to execute cyber
attacks
train ability to scan a target system
train ability to gain access to a target system
train ability to execute an attack on a target system
Perform exercises, such as:
train offensive skills
train collaboration between offensive activities
Determine effectiveness of current means, such as:
determine effectiveness of recon activities
Assess if current
offensive means
are effective
determine effectiveness of scanning activities
determine effectiveness of access activities
determine effectiveness of escalate activities
Support cyber attack process, such as:
Conduct cyber
attacks
Assess most effective means to recon a target system
Assess most effective means to access a target system
Assess most effective means to attack a target system
Applied research
into new future
cyber offensive
capabilities
Research new means, such as:
Research new means to recon a target system
Determine added value of external solutions, such as:
Research
external
solutions
determine usability of external solutions
determine quality of external solutions
determine side effects of external solutions
Page 71 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
This table presents the outcome of the interviews held to establish the urgency for
CTR business functions from a cyber defense viewpoint. There were four
respondents. Two respondents represented cyber attack and two cyber intelligence.
The urgency is based on the average.
Cyber defense
Cyber Test
Range Business
Functions
Cyber Test Range Services
Respondents
Average
Urgency
1
2
Train general competences, such as: develop and maintain
necessary skills and knowledge
4,0
5
3
4,5
4
5
4,0
4
4
3,0
3
3
2,5
2
3
2,0
2
2
3,5
3
4
3,0
4
2
Train cyber defense execution, such as:
train ability to detect malicious activity
train ability to stop an attack
Train personnel
to withstand
cyber attacks
train ability to perform attack or risk assessments
Train toolhandling
train detection toolhandling
train attack termination and prevention toolhandling
Perform exercises, such as:
train defensive skills and learn cyber attack methods
train collaboration between defensive activities
Determine effectiveness of current means, such as:
determine effectiveness of detection means
determine ability to stop an attack
Assess if current
defensive means
are sufficient
determine ability to deliver assessments
Optimize cyber defense process, such as:
Identify information needs
Establish decision making process
Improve decision making process
Support defensive capability during an attack, such as:
Perform attack analysis
Respond to cyber
attacks
Perform damage assessment
Perform attack recovery
Support decision making
Research new means, such as:
Applied research
into new future
cyber defensive
capabilities
research new means to detect malicious activity
research new means to mitigate attack patterns
Research areas for improvement
Determine added value of external solutions, such as:
Research
external
solutions
determine usability of external solutions
determine quality of external solutions
determine side effects of external solutions
Page 72 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Appendix V.
Calculations of CTR requirements‘ complexity
This table presents the outcome of the interviews held to establish the complexity
for implementing the requirements necessary to deliver CTR business functions.
There were six respondents. Two respondents from per each cyber operations
capabilities.
Requirements
Average
The CTR should simulate own live systems
The CTR should simulate target systems
The CTR should contain a full simulation of the assets of the network
The CTR should simulate network traffic in terms of type and amount
The CTR should simulate human interaction in terms of of type and amount
The CTR should simulate different types of configurations within separate
compartments
The CTR should simulate different types of configurations with different security
classifications within separate compartments
The CTR should be scalable in terms of different assets
The CTR should be scalable in terms of number of assets
The CTR should be scalable in terms of number of users
The CTR should have preconfigured configurations of live networks
The CTR should be able to quickly deploy a configuration of a live network into
the test range
The CTR should be accessible from different locations
The CTR should be able to federate with other CTR’s
The CTR should be simple in use for the end-user
The CTR should be able to completely wipe previous configurations to ensure
that new configurations are clean of any injected malware or other risks
The security level should have the same security level of the live networks
The CTR should not have connections with live environments
Maintenance of the cyber test range must be easy
IT-operations must be able and available for maintaining and configuring the
cyber test range
An instructor should be able and available for formulating training goals and the
development of CTR scenarios which support the training goals
An instructor should be able and available to accompany training exercises
An instructor should be able and available for observing trainings in order to
evaluate the results of personnel and to identify lessons learned
A researcher should be able and available to formulate research goals and
develop experiments linked to these goals
A researcher should be able and available for analyzing experiments in order to
evaluate the results of measures or means and to make recommendations for
improvements
The end-user should be able and available to hone their cyber skills and
knowledge
Page 73 of 78
Respondents
complexity
1
2
3
4
5
6
3,2
4
3
3
4
2
3
2,2
4
1
4
1
2
1
2,3
4
1
3
2
2
2
3,0
4
2
3
2
4
3
2,7
4
1
3
2
3
3
3,2
3
3
3
4
3
3
2,8
3
2
3
4
3
2
3,0
3
3
3
4
3
2
3,2
3
3
3
4
3
3
3,2
3
3
4
3
3
3,2
4
2
3
4
3
3
3,0
4
2
3
4
2
3
3,5
4
3
3
4
4
3
2,8
4
4
3
3
2
1
3,8
5
4
3
4
3
-
3,7
2
4
3
5
4
4
4,3
4
4
4
5
5
4
4,3
5
4
2
5
5
5
3,5
5
4
3
3
3
3
3,8
5
4
3
5
3
3
3,6
3
3
4
4
4
-
3,6
3
4
3
4
4
-
3,2
3
3
3
4
3
-
3,4
4
3
3
4
-
3,5
4
3
4
4
3
3
2,8
1
3
2
4
4
3
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Appendix VI.
Priority of CTR business functions
This table and graph present the input on basis of which the priority for CTR
business functions is proposed. The average complexity and urgency are calculated
through received through interviews (appendix V and VI). The count of services is
calculated on basis of the CTR services that make a business function.
Average of
Average of
Count of
Row Labels
Complexity Urgency
services
Applied research into future cyber solutions
3,24
2,64
241
Assess current means deployed by own organization
3,29
2,65
364
Enable personnel to act in the cyber domain
3,23
4,17
781
Research external solutions to enhance cyber operations
3,26
3,63
165
Respond to or conduct cyber attacks or intelligence
3,29
2,82
492
Priority cyber operations CTR business functions
3,50
Applied research into
future cyber solutions
3,45
3,40
Assess current means
deployed by own
organization
Enable personnel to act in
the cyber domain
Complexity
3,35
3,30
3,25
Research external
solutions to enhance cyber
operations
Respond to or conduct
cyber attacks or
intelligence
3,20
3,15
3,10
3,05
3,00
0
1
2
3
Urgency
4
Page 74 of 78
5
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
This table presents the input on basis of which the priority for CTR specific business
functions per cyber operations capability is proposed. The average complexity and
urgency are calculated through received through interviews (appendix V and VI).
The count of services is calculated on basis of the CTR services that make a
business function.
Average of
Complexity
Row Labels
Average of
Urgency
Count of
Business
functions
Cyber Attack
Applied research into future cyber offensive capabilities
3,22
3,00
119
Assess if current offensive means are effective
3,24
3,00
128
Conduct cyber attacks
3,28
3,50
135
Research external solutions to enhance cyber attack
3,24
3,50
36
Train personnel to execute a cyber attack
3,21
3,79
323
Applied research into future cyber defensive capabilities
3,35
3,50
48
Assess if current defensive means are sufficient
3,40
2,91
117
Research external solutions to enhance cyber defense
3,29
3,00
72
Respond to cyber attacks
3,31
2,00
222
Train personnel to withstand a cyber attack
3,26
4,40
299
Applied research into future cyber intelligence capabilities
3,22
1,50
74
Assess if current intelligence means are sufficient
3,24
2,00
119
Conduct cyber intelligence
3,28
3,50
135
Research external solutions to enhance cyber intelligence
3,23
4,50
57
Train personnel to gather intelligence through cyber
3,21
4,50
159
Cyber Defense
Cyber Intelligence
Page 75 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
The follow three graphs present the priorities of the CTR specific business functions
per cyber operations capabilities.
Priority cyber attack CTR business functions
3,4
Applied research into future cyber
offensive capabilities
Complexity
3,3
3,3
Assess if current offensive means
are effective
3,3
Train personnel to execute a cyber
attack
3,3
Research external solutions to
enhance cyber attack
3,3
Conduct cyber attacks
3,2
0
1
2
3
Urgency
4
5
Priority cyber defense CTR business functions
Complexity
3,5
3,5
Applied research into future cyber
defensive capabilities
3,4
Assess if current defensive means
are sufficient
3,4
Train personnel to withstand a
cyber attack
3,3
Research external solutions to
enhance cyber defense
3,3
Respond to cyber attacks
0
1
2
3
Urgency
4
5
Priority cyber intelligence CTR business functions
3,3
Applied research into future cyber
intelligence capabilities
Complexity
3,3
3,3
Assess if current intelligence means
are sufficient
3,2
Train personnel to gather
intelligence through cyber
3,2
Research external solutions to
enhance cyber intelligence
3,2
Conduct cyber intelligence
3,2
0
1
2
3
Urgency
4
5
Page 76 of 78
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
Appendix VII.
Requirements for delivering business functions
This tables presents an overview of the technical and organization requirements
needed to deliver the CTR business functions. The values in the table present the
amount of requirements that are linked to the CTR services that exists within a CTR
business function.
Count of Consequences
Applied
research
into future
cyber
solutions
Row Labels
Organizational
A researcher should be able and available for analyzing
experiments in order to evaluate the results of measures or
means and to make recommendations for improvements
A researcher should be able and available to formulate
research goals and develop experiments linked to these goals
An instructor should be able and available for formulating
training goals and the development of CTR scenarios which
support the training goals
An instructor should be able and available to accompany
training exercises
An instructor should be able and available for observing
trainings in order to evaluate the results of personnel and to
identify lessons learned
IT-operations must be able and available for maintaining and
configuring the cyber test range
The end-user should be able and available to hone their cyber
skills and knowledge
Assess
current
means
deployed by
own
organization
Enable
personnel to
act in the
cyber
domain
Research
external
solutions to
enhance
cyber
operations
16
24
9
16
24
9
Respond to
or conduct
cyber
attacks or
intelligence
40
40
40
17
24
40
9
32
40
Technical
Maintenance of the cyber test range must be easy
The CTR should be able to completely wipe previous
configurations to ensure that new configurations are clean of
any injected malware or other risks
17
24
41
9
32
17
21
41
9
29
41
9
11
24
41
9
32
21
41
9
29
9
9
The CTR should be able to federate with other CTR’s
The CTR should be able to quickly deploy a configuration of a
live network into the test range
29
The CTR should be accessible from different locations
The CTR should be scalable in terms of different assets
17
The CTR should be scalable in terms of number of assets
3
The CTR should be scalable in terms of number of users
9
2
The CTR should be simple in use for the end-user
The CTR should contain a full simulation of the assets of the
network
The CTR should have preconfigured configurations of live
networks
15
24
3
41
9
32
17
18
41
9
29
18
41
9
29
The CTR should not have connections with live environments
The CTR should simulate different types of configurations
with different security classifications within separate
compartments
1
13
Page 77 of 78
15
41
29
41
29
FINAL | Roadmap for the MoD Cyber Test Range | 10 September 2012
The CTR should simulate different types of configurations
within separate compartments
The CTR should simulate human interaction in terms of of
type and amount
The CTR should simulate network traffic in terms of type and
amount
16
18
41
9
11
16
24
41
9
32
16
24
41
9
32
The CTR should simulate own live systems
17
16
23
7
14
The CTR should simulate target systems
The security level should have the same security level of the
live networks
13
15
25
5
18
17
24
9
32
Page 78 of 78