Defense

Pentagon releases cyber implementation plan

Image of the Pentagon

The Defense Department CIO has released an "implementation plan" to help codify its increased attention to fundamental cybersecurity practices in recent months.

The DOD Cybersecurity Discipline Implementation Plan prioritizes identity authentication, reducing DOD networks' attack surface, device hardening and the alignment of computer network defenders with DOD IT systems and networks.

Inspection reports from recent network intrusions have "revealed department-wide, systemic shortfalls in implementing basic cybersecurity requirements," the plan states.

The document, which was amended in February and publicly released within the last week, goes hand-in-hand with a DOD cyber scorecard that grades various agencies' IT security and is reviewed monthly by Defense Secretary Ash Carter.

Whereas the scorecard is a more strategic, bird's eye view for Carter, the new implementation plan targets compliance further down the chain of command. Commanders and supervisors at all levels will report their implementation progress through the Defense Readiness Reporting System.

The initiative "forces awareness and accountability for these key tasks into the command chains and up to senior leadership, where resourcing decisions can be made to address compliance shortfalls," the plan states.

The implementation plan lays out a series of tasks for DOD officials, organized against the four aforementioned priorities. For example, officials are charged with making sure their internal web servers require official Public Key Infrastructure authentication; with ensuring proper configuration of physical and virtual servers; with disconnecting all Internet-facing web servers and web applications without "an operational requirement"; and with ensuring proper incident response plans are in place.

If officials determine it is not possible to comply with the document's requirements for operational reasons, they may be given an exception via a DOD risk management committee.

Officials like Deputy Secretary Robert Work have said that a great majority of intrusions into Pentagon networks are the result of human error, and the implementation plan is an effort to tighten the screws on compliance.

DOD CIO Terry Halvorsen has clamped down on poor cybersecurity practices within the department, kicking irresponsible users off of networks, according to his office.

Asked last October at a media roundtable if anyone at DOD had ever been fired for sloppy network use, Halvorsen said, "Absolutely."

The implementation plan follows another policy, the Cybersecurity Culture and Compliance Initiative, signed by Carter last September. That directive tasked Halvorsen's office with conducting realistic training for DOD network users to drive home the consequences of insecure practices.

About the Author

Sean Lyngaas is a former FCW staff writer.

Featured

  • Cybersecurity
    CISA chief Chris Krebs disusses the future of the agency at Auburn University Aug. 22 2019

    Shared services and the future of CISA

    Chris Krebs, the head of the Cybersecurity and Infrastructure Security Agency at DHS, said that many federal agencies will be outsourcing cyber to a shared service provider in the future.

  • Telecom
    GSA Headquarters (Photo by Rena Schild/Shutterstock)

    GSA softens line on looming EIS due date

    Think of the September deadline for agencies to award contracts under the General Services Administration's $50-billion telecommunications contract as a "yellow light," said GSA's telecom services director.

  • Defense
    Shutterstock photo id 669226093 By Gorodenkoff

    IC looks to stand up a new enterprise IT program office

    The intelligence community wants to stand up a new program executive office to help develop new IT capabilities.

Stay Connected

FCW INSIDER

Sign up for our newsletter.

I agree to this site's Privacy Policy.