DOD policy targets weak link in information security

New rules would protect supply chain data on unclassified networks

The Defense Department has issued a new policy to protect military information that travels between unclassified networks administered by contractors and the government, reports Jason Miller at Federal News Radio.

The new directive contains several major policy initiatives and sets forth new operating guidance to coordinate and manage an information sharing partnership with the private sector. The directive concerns information sharing outside the core DOD information networks, sources said.


Related Story

DOD to establish safe haven outside the Internet


The directive was signed by Cheryl Roby, who is acting DOD chief information officer and principal deputy assistant secretary of Defense for Networks and Information. Its purpose is to plug a long-standing security gap involving the DOD supply chain.

The memo requires DOD and the Defense Industrial Base to:

  • Create an information-sharing environment for threat information.
  • Develop best practices.
  • Establish a standard for reporting and responding to cyber attacks or threats.
  • Develop an approach for vendors to perform self-assessments of the security of their networks.

The memo also tasks various DOD components with initiatives to improve or maintain Defense Industrial Base information security. As part of the effort, the Defense Security Service will ensure contractors receiving classified information have programs that meet the military’s cybersecurity requirements, the National Security Agency will offer support as needed to analyze cyber intrusion damage, and the Defense Cyber Crime Center will serve as the focal point for threat sharing and policy and standards implementation.

Furthermore, the DOD Undersecretary for Acquisition, Technology and Logistics will update its acquisition regulations to address the protection of unclassified information on contractor networks and also develop a policy to assess cyber intrusion damage for Defense Industrial Base systems.

About the Author

William Welsh is a freelance writer covering IT and defense technology.

Featured

  • FCW PERSPECTIVES
    sensor network (agsandrew/Shutterstock.com)

    Are agencies really ready for EIS?

    The telecom contract has the potential to reinvent IT infrastructure, but finding the bandwidth to take full advantage could prove difficult.

  • People
    Dave Powner, GAO

    Dave Powner audits the state of federal IT

    The GAO director of information technology issues is leaving government after 16 years. On his way out the door, Dave Powner details how far govtech has come in the past two decades and flags the most critical issues he sees facing federal IT leaders.

  • FCW Illustration.  Original Images: Shutterstock, Airbnb

    Should federal contracting be more like Airbnb?

    Steve Kelman believes a lighter touch and a bit more trust could transform today's compliance culture.

Stay Connected

FCW Update

Sign up for our newsletter.

I agree to this site's Privacy Policy.