briefing slides
Transcription
briefing slides
Cyber Superiority Weapon System Normalization Update AFCEA Luncheon Jan 2015 Colonel Aaron Smith HQ AFSPC/A5I Chief, Cyberspace Superiority Overview • A5/8 Organization • Where We Were/Are • Way Forward • • • • Challenges Operational Context Priorities Cyber Requirements • Summary 2 A5/8, Directorate of Strategic Plans and Requirements A5/8 STRATEGIC PLANS & REQUIREMENTS A5E EXECUTIVE SERVICES A5C A5F A5I A5M A5R A5X SPACE SUPERIORITY GLOBAL WARNING AND DEFENSE CYBER SUPERIORITY SATCOM AND PNT LAUNCH AND REQUIREMENTS OFFICE STRATEGIC PLANS AND REQUIREMENTS A5CF A5FG A5IC A5MP A5XC FUTURE REQUIREMENTS GROUND BASED WARNING CYBER OPERATIONS POSITIONING, NAVIGATION AND TIMING CONCEPTS AND PROCESSES A5CN A5FS A5IM A5MS A5XI COMMAND AND CONTROL SPACE BASED WARNING CYBER MISSION ASSURANCE SATELLITE COMMUNICATIONS SPACE BASING & INTERNATIONAL AFFAIRS A5CS A5FW A5IW A5MT A5XP SPACE SITUATIONAL AWARENESS ENVIRONMENTAL MONITORING CYBER WARFARE SATELLITE COMMUNICATIONS TERMINALS STRATEGIC PLANS A5CY A5XR DEFENSIVE SPACE CONTROL OFFENSIVE SPACE CONTROL STRATEGIC REQUIREMENTS A5XY A5I New STRATEGIC ANALYSIS 3 Where We Were Cyber WS Capability Production Documents Draft AFRRG AFROC Cyberspace Vulnerability Assessment / Hunter Cyberspace Defense Analysis Air Force Cyberspace Defense Cyber Command and Control Mission System Air Force Intranet Control Cyber Security and Control System Challenges • Differing views of the “As Is” capability fielded at the operational units • Definition of “Good Enough” • Lengthy coordination processes Baselining the As-IS Capabilities of CSAF-Approved Weapon Systems JROC Where We Are Today DoDIN Ops Cyber “Weapon Systems” in Sustainment Cyber Security Control Sys Air Force Intranet Control Cyber Warfare AF Cyberspace Defense Cyber C2 Mission System Cyberspace Defense Analysis Cyberspace Vulnerability Assessment/Hunter Network Attack System Baselined the As-IS Capabilities of CSAF-Approved Weapon Systems 5 Way Forward -- Challenges AF Cyber Mission Forces • Unique Capabilities to CMTs and NMTs? • Future of CPTs – Joint Solution? • N/CSTs – RTO&I / Trainers / Range? AF Environment in JIE • Move from AF Gateways to Joint Gateways • Transition to commercial & milCloud • Impact to AF Cyber Weapon Systems? 6 Way Forward - Operational Context USCYBERCOM/J3 Cyberspace Operations Environment 7 Way Forward - Priorities AFSPC/CC Cyberspace Activities 1. Defensive Counter Cyberspace (Recon/Counter Recon) 2. Offensive Counter Cyberspace for Global Reach & Access 3. Cyberspace ISR & Situational Awareness 4. Proactive Defense 5. Persistent Network Operations 6. Data Confidentiality & Integrity Systems (DCIS) 7. Network Extension & Resiliency 8. Cyberspace Command & Control 8 Way Forward - Cyber Requirements • • Utilize JCIDS Information Systems (IS) Methodology • Introduced in most recent JCIDS guidance • Greater flexibility to incorporate evolving technologies • Fewer iterations validating documents through JCIDS process streamlines cyber capabilities development Accelerates delivery from concept to capability • Delivers early and continuous capability; maturity iteration with operator feedback • Embraces changing/refining requirements (not scope) • Frequent communication and collaboration across stakeholders Normalized Requirements and Acquisition Processes Can Be Exploited To Deliver Sustainable Future Capabilities To The Warfighter 9 Way Forward – Today & Tomorrow • Tomorrow • Today • Unified Platform IS-CDD • In-progress • Cyber Protection Team CBA • AFIN Ops CBA • Cyber C2/SA CBA • In-Progress • AF Cyber Range CBA • In-Progress • Defensive Cyber Operations CBA • Kickoff Feb/Mar 15 Capability Based Approach to Requirements Generation Functional Area Analysis – Functional Need Analysis – Functional Solution Analysis 10 Summary • What we’ve done • • Normalized our Cyber Weapon Systems AFSPC/CC reprioritized cyberspace activities • What do we need from you? • • Understand process to modify weapon-systems in sustainment Help us identify dynamic and agile technologies to meet AF and Joint operational needs • Then what? • • New cyber requirements documents enable continuous development and delivery of capabilities Identify what we need from industry and science and technology 11 Questions? 12 What We’re Doing AFNet Migration to JIE Pillars Connect – Normalize Network Transport Single gateway/base Protect – Single Security Architecture • boundary • Next-gen directory • MPLS • consolidation Common Store – Core Computing & Data Centers • Regional w/Army-DISA • Single CNDSP JIE Inc 1 CDC & application security NW core services Single AFNet Enterprise Services • migration • Application rationalization Unified capabilities • NIPR e-mail • SIPR DEE C2 – Enterprise Ops Centers • JIE • Unified NetOps • Unified service desk • Global net mgmt 13