Department of Defense: Instruction
Department of Defense: Instruction
Department of Defense: Instruction
INSTRUCTION
NUMBER 8500.01
March 14, 2014
DoD CIO
SUBJECT:
Cybersecurity
2. APPLICABILITY
a. This instruction applies to:
(1) OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of
Staff (CJCS) and the Joint Staff, the Combatant Commands, the Office of the Inspector General
of the DoD, the Defense Agencies, the DoD Field Activities, and all other organizational entities
within the DoD (referred to collectively in this instruction as the DoD Components).
(2) Security posture, from individual device or software object to aggregated systems of
systems, is sensed, correlated, and made visible to mission owners, network operators, and to the
DoD Information Enterprise consistent with DoDD 8000.01 (Reference (r)).
(3) Whenever possible, technology components (e.g., hardware and software) have the
ability to reconfigure, optimize, self-defend, and recover with little or no human intervention.
Attempts made to reconfigure, self-defend, and recover should produce an incident audit trail.
c. Integration and Interoperability
(1) Cybersecurity must be fully integrated into system life cycles and will be a visible
element of organizational, joint, and DoD Component IT portfolios.
(2) Interoperability will be achieved through adherence to DoD architecture principles,
adopting a standards-based approach, and by all DoD Components sharing the level of risk
necessary to achieve mission success.
(3) All interconnections of DoD IT will be managed to minimize shared risk by ensuring
that the security posture of one system is not undermined by vulnerabilities of interconnected
systems.
d. Cyberspace Defense. Cyberspace defense will be employed to protect, detect,
characterize, counter, and mitigate unauthorized activity and vulnerabilities on DoD information
networks. Cyberspace defense information will be shared with all appropriately cleared and
authorized personnel in support of DoD enterprise-wide situational awareness.
e. Performance
(1) Implementation of cybersecurity will be overseen and governed through the
integrated decision structures and processes described in this instruction.
(2) Performance will be measured, assessed for effectiveness, and managed relative to
contributions to mission outcomes and strategic goals and objectives, in accordance with
Sections 11103 and 11313 of Title 40, United States Code (U.S.C.) (Reference (s)).
(3) Data will be collected to support reporting and cybersecurity management activities
across the system life cycle.
(4) Standardized IT tools, methods, and processes will be used to the greatest extent
possible to eliminate duplicate costs and to focus resources on creating technologically mature
and verified solutions.
f. DoD Information. All DoD information in electronic format will be given an appropriate
level of confidentiality, integrity, and availability that reflects the importance of both information
sharing and protection.
g. Identity Assurance
(1) Identity assurance must be used to ensure strong identification, authentication, and
eliminate anonymity in DoD IS and PIT systems.
(2) DoD will public key-enable DoD ISs and implement a DoD-wide Public Key
Infrastructure (PKI) solution that will be managed by the DoD PKI Program Management Office
in accordance with DoDI 8520.02 (Reference (t)).
(3) Biometrics used in support of identity assurance will be managed in accordance with
DoDD 8521.01 (Reference (u)).
h. Information Technology
(1) All IT that receives, processes, stores, displays, or transmits DoD information will be
acquired, configured, operated, maintained, and disposed of consistent with applicable DoD
cybersecurity policies, standards, and architectures.
(2) Risks associated with global sourcing and distribution, weaknesses or flaws inherent
in the IT, and vulnerabilities introduced through faulty design, configuration, or use will be
managed, mitigated, and monitored as appropriate.
(3) Cybersecurity requirements must be identified and included throughout the lifecycle
of systems including acquisition, design, development, developmental testing, operational
testing, integration, implementation, operation, upgrade, or replacement of all DoD IT supporting
DoD tasks and missions.
i. Cybersecurity Workforce
(1) Cybersecurity workforce functions must be identified and managed, and personnel
performing cybersecurity functions will be appropriately screened in accordance with this
instruction and DoD 5200.2-R (Reference (v)), and qualified in accordance with DoDD 8570.01
(Reference (w)) and supporting issuances.
(2) Qualified cybersecurity personnel must be identified and integrated into all phases of
the system development life cycle.
j. Mission Partners
(1) Capabilities built to support cybersecurity objectives that are shared with mission
partners will be consistent with guidance contained in Reference (r) and governed through
integrated decision structures and processes described in this instruction.
Teresa M. Takai
DoD Chief Information Officer
Enclosures
1. References
2. Responsibilities
3. Procedures
Glossary
CONTENTS
GLOSSARY ..................................................................................................................................52
PART I. ABBREVIATIONS AND ACRONYMS ................................................................52
PART II. DEFINITIONS ........................................................................................................55
FIGURE
1. Three-Tiered Approach to Risk Management ....................................................................28
2. DoD Information Technology.............................................................................................38
CONTENTS
(a)
(b)
(c)
DoD Directive 8500.01, Information Assurance (IA), October 4, 2002 (hereby cancelled)
DoD Directive 5144.02, DoD Chief Information Officer (DoD CIO), April 22, 2013
DoD Instruction 8500.2, Information Assurance (IA) Implementation, February 6, 2003
(hereby cancelled)
(d) DoD Directive C-5200.19, Control of Compromising Emanations (U), May 16, 1995
(hereby cancelled)
(e) DoD Instruction 8552.01, Use of Mobile Code Technologies in DoD Information
Systems, October 23, 2006 (hereby cancelled)
(f) Assistant Secretary of Defense for Networks and Information Integration/DoD Chief
Information Officer Memorandum, Disposition of Unclassified DoD Computer Hard
Drives, June 4, 2001 (hereby cancelled)
(g) Assistant Secretary of Defense for Networks and Information Integration/DoD Chief
Information Officer Memorandum, Certification and Accreditation Requirements for
DoD-wide Managed Enterprise Services Procurements, June 22, 2006 (hereby cancelled)
(h) Assistant Secretary of Defense for Networks and Information Integration/DoD Chief
Information Officer Memorandum, Use of Peer-to-Peer (P2P) File-Sharing Applications
Across DoD, November 23, 2004 (hereby cancelled)
(i) Assistant Secretary of Defense for Networks and Information Integration/DoD Chief
Information Officer Memorandum, Department of Defense (DoD) Guidance on Protecting
Personally Identifiable Information (PII), August 18, 2006 (hereby cancelled)
(j) Assistant Secretary of Defense for Networks and Information Integration/DoD Chief
Information Officer Memorandum, Encryption of Sensitive Unclassified Data At Rest on
Mobile Computing Devices and Removable Storage Media, July 3, 2007 (hereby
cancelled)
(k) Assistant Secretary of Defense for Networks and Information Integration/DoD Chief
Information Officer Memorandum, Protection of Sensitive Department of Defense (DoD)
Data at Rest On Portable Computing Devices, April 18, 2006 (hereby cancelled)
(l) Directive-type Memorandum 08-060, Policy on Use of Department of Defense (DoD)
Information Systems Standard Consent Banner and User Agreement, May 9, 2008, as
amended (hereby cancelled)
(m) National Security Presidential Directive-54/Homeland Security Presidential Directive-23,
Cybersecurity Policy, January 8, 2008 1
(n) Executive Order 12333, United States Intelligence Activities, as amended
(o) National Institute of Standards and Technology Special Publication 800-39, Managing
Information Security Risk: Organization, Mission, and Information System View, current
edition
(p) Committee on National Security Systems Policy 22, Policy on Information Assurance
Risk Management for National Security Systems, January 2012, as amended
1
Document is classified TOP SECRET. To obtain a copy, fax a request to the Homeland Security Council
Executive Secretary at 202-456-5158 and the National Security Councils Senior Director for Records and Access
Management at 202-456-9200.
ENCLOSURE 1
(ag)
(ah)
(ai)
(aj)
(ak)
(al)
(am)
(an)
2
DoD Instruction 8510.01, Risk Management Framework (RMF) for DoD Information
Technology (IT), March 12, 2014
DoD Directive 8000.01, Management of the Department of Defense Information
Enterprise, February 10, 2009
Title 40, United States Code
DoD Instruction 8520.02, Public Key Infrastructure (PKI) and Public Key (PK)
Enabling, May 24, 2011
DoD Directive 8521.01E, Department of Defense Biometrics, February 21, 2008
DoD 5200.2-R, Personnel Security Program, January 1, 1987, as amended
DoD Directive 8570.01, Information Assurance (IA) Training, Certification, and
Workforce Management, August 15, 2004
Directive-type Memorandum 12-004, DoD Internal Information Collections, April 24,
2012, as amended
DoD 8910.1-M, DoD Procedures for Management of Information Requirements,
June 30, 1998
DoD Instruction 5025.01, DoD Directives Program, September 26, 2012, as amended
Title 44, United States Code
DoD Directive 5230.11, Disclosure of Classified Military Information to Foreign
Governments and International Organizations, June 16, 1992
DoD Directive 8115.01, Information Technology Portfolio Management, October 10,
2005
DoD Instruction 5205.13, Defense Industrial Base (DIB) Cyber Security/Information
Assurance (CS/IA) Activities, January 29, 2010
DoD Directive 3020.40, DoD Policy and Responsibilities for Critical Infrastructure,
January 14, 2010, as amended
Deputy Secretary of Defense Memorandum, Delegation of Authority to Negotiate and
Conclude International Agreements on Cooperation in Information Assurance and
Computer Network Defense, March 5, 2002 2
DoD Directive 5530.3, International Agreements, June 11, 1987, as amended
Joint DoD/Intelligence Community memorandum, Establishment of a Department of
Defense (DoD)/Intelligence Community (IC) Unified Cross Domain Management Office
(UCDMO), July 15, 2006
Unified Cross Domain Management Office Charter, March 21, 2007
Assistant Secretary of Defense for Networks and Information Integration/DoD Chief
Information Officer Memorandum/Commander, U.S. Strategic Command Memorandum,
Establishment of the Department of Defense Enterprise-wide Information Assurance and
Computer Network Defense Solutions Steering Group, September 11, 2003
National Security Directive 42, National Policy for the Security of National Security
Telecommunications and Information Systems, July 5, 1990
Office of Management and Budget Circular A-130, Management of Federal Information
Resources, as amended
Chairman of the Joint Chiefs of Staff Instruction 6211.02, Defense Information System
Network (DISN) Responsibilities, current edition
DoD Instruction 8551.1, Ports, Protocols, and Services Management (PPSM), August 13,
2004
ENCLOSURE 1
Available at http://www.dote.osd.mil/pub/policies/2009/20090121Procedure_forOTEofIAinAcqPrograms.pdf.
Avalable at http://www.dote.osd.mil/pub/policies/2010/20101104Clarification_ofProcedures_forOTE_ofIA_inAcq
Progs.pdf.
10
ENCLOSURE 1
11
ENCLOSURE 1
12
ENCLOSURE 1
Available at http://dodcio.defense.gov/dodaf20.aspx.
13
ENCLOSURE 1
cybersecurity policies and capabilities are aligned with and mutually supportive of personnel,
physical, industrial, information, and operations security policies and capabilities.
g. Coordinates with NIST in development of cybersecurity-related standards and guidelines.
h. Maintains a formal coordination process with the Intelligence Community (IC) Chief
Information Officer (CIO) to ensure proper protection of IC information within DoD, reciprocity
of IS authorization and cybersecurity risk management processes, and alignment of
cybersecurity.
i. Coordinates with the Under Secretary of Defense for Acquisition, Technology, and
Logistics (USD(AT&L)) to ensure that cybersecurity responsibilities are integrated into
processes for DoD acquisition programs, including research and development.
14
ENCLOSURE 2
15
ENCLOSURE 2
2. DIRECTOR, DISA. Under the authority, direction, and control of the DoD CIO and in
addition to the responsibilities in section 13 of this enclosure, the Director, DISA:
a. Develops, implements, and, in coordination with Commander, U.S. Strategic Command
(USSTRATCOM), manages cybersecurity for the DISN, consistent with this instruction and its
supporting guidance.
b. Develops and maintains control correlation identifiers (CCIs), security requirements
guides (SRGs), security technical implementation guides (STIGs), and mobile code risk
categories and usage guides that implement and are consistent with DoD cybersecurity policies,
standards, architectures, security controls, and validation procedures, with the support of the
NSA/CSS, using input from stakeholders, and using automation whenever possible.
c. Develops or acquires solutions that support cybersecurity objectives for use throughout
DoD via the ESSG process in accordance with Reference (aj).
d. Establishes and maintains the IA Support Environment (IASE) in accordance with
16
ENCLOSURE 2
17
ENCLOSURE 2
18
ENCLOSURE 2
19
ENCLOSURE 2
9. DIRNSA/CHCSS. Under the authority, direction, and control of the USD(I), and in addition
to the cybersecurity-related responsibilities in DoDD 5100.20 (Reference (bf)) and the
responsibilities in section 13 of this enclosure, the DIRNSA/CHCSS:
a. Supports the DoD CIO by providing cybersecurity architecture and mechanisms to
support Defense military, intelligence, and business functions, including but not limited to
cryptography, PKI, and IS security engineering services.
b. Evaluates or validates security implementation specifications described in this instruction.
c. Provides cybersecurity support to the DoD Components in order to assess threats to, and
vulnerabilities of, information technologies.
d. Engages the cybersecurity industry and DoD user community to foster development,
evaluation, and deployment of cybersecurity solutions that satisfy the guidance in this
instruction.
e. Provides SSE services to the DoD Components, including describing information
protection needs, properly selecting and implementing appropriate security controls, and
assessing the effectiveness of system security.
f. Supports the development of NIST publications and provides engineering support and
other technical assistance for their implementation within DoD.
g. Develops SSE training and qualification programs and oversees continuing education
requirements for all trained IS security engineers and cybersecurity architects throughout DoD
in accordance with Reference (ba).
h. Serves as the DoD focal point for the National IA Partnership and establishes criteria and
processes for evaluating and validating all IA and IA-enabled products in accordance with
CNSSP 11 (Reference (bg)).
i. Develops and issues security implementation specifications for the configuration of IAand IA-enabled products (e.g., security configuration guides) and supports DISA in the
development of SRGs and STIGs.
20
ENCLOSURE 2
10. DIRECTOR, DEFENSE SECURITY SERVICE (DSS). Under the authority, direction, and
control of the USD(I) and in addition to the responsibilities in section 13 of this enclosure, the
Director, DSS, monitors and oversees IS security practices of DoD contractors and vendors
processing classified DoD information in accordance with DoD 5220.22M (Reference (bj)), and
DoDD O-8530.1 (Reference (bk)), and DoDI O-8530.2 (Reference (bl)).
21
ENCLOSURE 2
22
ENCLOSURE 2
23
ENCLOSURE 2
24
ENCLOSURE 2
(1) Hold commanders, IS owners (ISOs), AOs, information system security managers
(ISSMs) (formerly known as IA managers), information system security officers (ISSOs),
program managers (PMs), project and application leads, supervisors, and system administrators
responsible and accountable for the implementation of DoD security requirements in accordance
with this instruction, References (v), (bo), (bp), (bs), and (bw), DoDM 5200.01, Volume 2
(Reference (by)), DoD 5220.22-R (Reference (bz)), and supplemental DoD Component
guidance. Personnel filling positions with privileged access must be qualified and sign a
Statement of Acceptance of Responsibilities in accordance with Reference (ba).
(2) Ensure that military and civilian personnel are considered for administrative or
judicial sanctions if they knowingly, willfully, or negligently compromise, damage, or place at
risk DoD information by not ensuring implementation of DoD security requirements in
accordance with this instruction, other DoD 8500 series directives and instructions, DoD 5200
series instructions and publications, and supplemental DoD Component policies and procedures.
z. Ensure that requirements of CNSSP 300 (Reference (ca)), CNSSI 7000 (Reference (cb)),
and other DIRNSA/CHNSS-issued guidance on compromising emanations (i.e., TEMPEST) are
funded and implemented.
aa. Implement cybersecurity and cyberspace defense capabilities responsive to DoD
requirements in accordance with Reference (bk) and (bl).
ab. Ensure that maintenance and disposal of information on DoD IT complies with the
provisions of DoDD 5015.2 (Reference (cc)).
14. CJCS. In addition to the responsibilities in section 13 of this enclosure, the CJCS:
a. Provides advice and assessment on joint military requirements for cybersecurity assisted
by the Joint Requirements Oversight Council in accordance with References (au) and (av).
b. Supports international cybersecurity and cyberspace defense activities of the DoD CIO.
c. Develops, coordinates, and promulgates cybersecurity policy, doctrine, and guidance for
joint and combined operations consistent with this instruction, as required.
d. Appoints a PAO for DoD ISs and PIT systems governed by the Warfighting Mission Area
as described in Reference (ac).
25
ENCLOSURE 2
26
ENCLOSURE 2
1. INTRODUCTION
a. The purpose of the Defense cybersecurity program is to ensure that IT can be used in a
way that allows mission owners and operators to have confidence in the confidentiality, integrity,
and availability of IT and DoD information, and to make choices based on that confidence.
b. The Defense cybersecurity program supports DoDs vision of effective operations in
cyberspace where:
(1) DoD missions and operations continue under any cyber situation or condition.
(2) The IT components of DoD weapons systems and other defense platforms perform
as designed and adequately meet operational requirements.
(3) The DoD Information Enterprise collectively, consistently, and effectively acts in
its own defense.
(4) DoD has ready access to its information and command and control channels, and
its adversaries do not.
(5) The DoD Information Enterprise securely and seamlessly extends to mission
partners.
c. In accordance with DoDD 5105.53 (Reference (cg)), the Director of Administration and
Management is responsible for providing policy, oversight, direction, and control, including
exercise of the authorities of the Secretary of Defense pursuant to chapter 159 of Reference (bh),
for the management, operation, security, protection, safety, renovation, construction, and IT of
the Pentagon Reservation and supported DoD facilities and space in the National Capital Region,
including the Raven Rock Mountain Complex and alternate sites.
2. RISK MANAGEMENT
a. Cybersecurity Risk Management. Managing cybersecurity risks is a complex,
multifaceted undertaking that requires the involvement of the entire organization, from senior
leaders planning and managing DoD operations, to individuals developing, implementing, and
operating the IT supporting those operations. Cybersecurity risk management is a subset of the
overall risk management process for all DoD acquisitions as defined in Reference (av), which
includes cost, performance, and schedule risk associated with the execution of all programs of
record, and all other acquisitions of DoD. The risk assessment process extends to the logistics
support of fielded equipment and the need to maintain the integrity of supply sources.
27
ENCLOSURE 3
(1) DoD will use NIST SP 800-37 (Reference (ch)), as implemented by Reference (q), to
address risk management, including authorization to operate (ATO), for all DoD ISs and PIT
systems.
(2) DoD IS and PIT systems will transition to CNSSI 1253 (Reference (ci)), NIST SP
800-53 (Reference (cj)), and Reference (ch) in accordance with transition guidance provided in
Reference (q).
b. Integrated Organization-Wide Risk Management. Risk management can be viewed as a
holistic activity that is fully integrated into every aspect of the organization as described in
Reference (o). Figure 1 illustrates a three-tiered approach to risk management that addresses
risk-related concerns at the organization level, the mission and business process level, and the IS
level.
Figure 1. Three-Tiered Approach to Risk Management
STRATEGIC RISK
- Traceability and Transparency of
Risk-Based Decisions
- Organization-Wide
Risk Awareness
TIER 1
ORGANIZATION
TIER 2
TIER 3
INFORMATION SYSTEMS
TACTICAL RISK
ENCLOSURE 3
(2) Tier 2 addresses risk from a mission and business process perspective and is guided
by the risk decisions at Tier 1, and informed and influenced by risk decisions made in Tier 3.
(a) The activities at Tier 2 begin with the design, development, and implementation
of the mission and business processes defined at Tier 1.
(b) The PAOs for each DoD MA provide the Tier 2 governance for their respective
MAs.
(3) Tier 3 addresses risk from an IS and PIT system perspective and is guided by the risk
decisions at Tiers 1 and 2.
(a) Though the need for specific protections is identified at Tiers 1 and 2, it is at Tier
3 where the information protections are applied to the system and its environment of operation
for the benefit of successfully enabling mission and business success.
(b) Information protection requirements are satisfied by the selection and
implementation of appropriate security controls in Reference (cj). Security controls are
implemented at Tier 3 by common control providers, system managers (SMs), or PMs, and riskbased authorization decisions are granted by AOs.
c. Risk Management in the System Development Life Cycle
(1) Risk management tasks begin early in the system development life cycle and are
important in shaping the security capabilities of the IS. If these tasks are not adequately
performed during the initiation, development, and acquisition phases of the system development
life cycle, the tasks will, by necessity, be undertaken later in the life cycle and will be more
costly and time consuming to implement, and could negatively impact the performance of the IS.
(2) Cybersecurity risk management is planned for and documented in a cybersecurity
strategy (formerly known as IA strategy) in accordance with References (at) and (av), and
included in the PPP for all acquisition programs. Periodic reviews of the PPP and associated
systems engineering documents should evaluate the status of cybersecurity solutions as part of
the larger systems development.
(3) Risk management must continue during operations and sustainment. This may
include the application of new or revised security controls prior to the integration of new IT
services or products into an existing operational IS in order to maintain the security of the
operational IS.
d. DoD ISRMC. The DoD ISRMC, supported by the DSAWG, is the DoD risk executive
function as described in References (o) and (ch).
e. Risk Management Framework (RMF). DoD uses Reference (ch) as implemented by
Reference (q), and is applicable to all DoD ISs and PIT systems. The RMF provides a
disciplined and structured process that combines IS security and risk management activities into
29
ENCLOSURE 3
30
ENCLOSURE 3
31
ENCLOSURE 3
32
ENCLOSURE 3
(2) Semantic, technical, and policy interoperability will be used to integrate disparate
cybersecurity products into a net-centric enterprise that can work together to create new
intelligence and make and implement decisions at network speed.
(3) Semantic, technical, and policy interoperability support products are designed to
provide security for communications between different IT systems. Interoperable
communications must be consistent with approved cryptographic design and current system
implementation standards. The objective is to ensure the seamless and secure exchange of
classified or sensitive information that is critical to the success of DoD mission goals and
objectives.
d. Standards-Based Approach. The DoD cybersecurity and cyberspace defense data strategy
will enable semantic, technical, and policy interoperability through a standards-based approach
that has been refined by many in industry, academia, and government. It is an information
oriented approach (see for example the security content automation protocol (SCAP) discussion
in NIST SP 800-126 (Reference (cp)).
e. DoD Architecture Principles. Interoperability and effective management of security
content will be achieved through adherence to DoD cybersecurity architectures as issued. All
DoD Components must commit to these architectures to facilitate sharing of information
necessary to achieve mission success while managing the risk inherent in interconnecting
systems.
f. Knowledge Repositories. These contain a broad collection of best practices, benchmarks,
standards, templates, checklists, tools, guidelines, rules, principles, and the like. Examples
include the National Vulnerability Database (http://nvd.nist.gov/), the Open Vulnerability and
Assessment Language Repository (http://oval.mitre.org/repository), and the DoDs KS as
defined in Reference (q). In many respects, knowledge repositories serve as the cybersecurity
and cyberspace defense community memory and they enable policy or process interoperability
and should be used to share information and answer questions.
33
ENCLOSURE 3
6. PERFORMANCE
a. Organizations will implement processes and procedures to accommodate three conditions
necessary to realize effective cybersecurity that is consistently implemented across DoD:
(1) Organization Direction. This includes organizational mechanisms for establishing
and communicating priorities and objectives, principles, policies, standards, and performance
34
ENCLOSURE 3
7. DoD INFORMATION
a. The DoD Information Security Program is described in DoDI 5200.01 (Reference (cz)).
All classified information and CUI must be protected in accordance with References (bs), (by),
(bo), and (bp).
b. DoDs information sharing policies and procedures are defined in DoDD 8320.02
(Reference (da)) and DoD 8320.02-G (Reference (db)). Information sharing actions and
activities will be aligned with the DoD Information Sharing Operational Strategy and Guidance
(see www.dodcio.defense.gov). A security clearance held is an attribute of any identified DoD
person, and that attribute should be discovered and considered when a decision is made to share
classified information. If the information intended to be shared is not classified, then other
attributes associated with the identity of the sharing recipient may need to be discovered before
the sharing is executed.
c. The Defense cybersecurity program provides the mechanisms to measure, monitor, and
enforce information security and sharing policies and procedures as they relate to information in
an electronic form, primarily through the implementation of security controls.
d. Information systems must protect classified information and CUI from unauthorized
access by requiring authentication in accordance with Reference (ct) prior to making an access
decision.
35
ENCLOSURE 3
8. IDENTITY ASSURANCE
a. Identity assurance ensures strong identification and authentication, and eliminates
anonymity in DoD ISs so that entities access and access behavior are visible, traceable, and
36
ENCLOSURE 3
9. INFORMATION TECHNOLOGY
a. IT. Cybersecurity applies to all IT that receives, processes, stores, displays, or transmits
DoD information, as shown in Figure 2.
37
ENCLOSURE 3
38
ENCLOSURE 3
39
ENCLOSURE 3
40
ENCLOSURE 3
(b) IT services are net-centric and may be provided over service oriented or cloud
computing architectures and may be Internet-based.
(c) An internal IT service is implemented within DoD. The DoD entity providing the
service is responsible for the application of appropriate security controls and for ensuring that ISs
supporting service delivery are assessed and authorized in accordance with Reference (q).
Service-level agreements (SLAs) will be executed for internal services.
(d) An external IT service is implemented outside DoD. The DoD entity using the
external service will:
1. Ensure that interagency agreements or government statements of work for
external services incorporate requirements in accordance with this instruction. Requirements for
external services must include the application of appropriate security controls to the IT
supporting the external service delivery in accordance with Reference (q). Requests for
proposals will include sufficient information on which to evaluate each offerors proposed
approach to satisfying the security control requirements.
2. Ensure that processes, roles, and responsibilities are established between
program management office and network operations entities for continued assessment.
3. Ensure that all security relevant and operational status changes are reported
through the organizations network operations chain of command to the Commander,
USSTRATCOM.
4. DoD enterprise-level agreements for services should be used when possible.
(4) IT Product
(a) Unified capability products will receive unified capability certification for
cybersecurity in accordance with Reference (ao).
(b) Products that protect classified information must comply with Reference (bg).
(c) Products must meet security configuration guidance in accordance with Chapter
113 of Reference (s) and comply with the connection approval process established in Reference
(am).
(d) Products will comply with the requirements of Reference (bm), as applicable.
b. IT Considerations. These are general considerations that apply to IT.
(1) All acquisitions of DoD IS will comply with Reference (at) and USD(AT&L)
Memorandum (Reference (di)).
41
ENCLOSURE 3
42
ENCLOSURE 3
43
ENCLOSURE 3
44
ENCLOSURE 3
45
ENCLOSURE 3
ENCLOSURE 3
k. Coordinates with the DOT&E to ensure cybersecurity testing and evaluation is integrated
into the DoD acquisition process in accordance with References (bc), (bd), and other DOT&E
policies and guidance.
l. Coordinates with USD(P) to ensure cybersecurity policies related to disclosure of
classified military information to foreign governments and international organizations is in
accordance with Reference (af) and (ab).
m. Provides recommended updates and additions to NIST for security controls that are
published in Reference (cj) and for supporting validation procedures published in Reference (ck)
with direct support from NSA/CSS and DISA, and input from the other DoD Components.
n. Provides recommended updates and additions to the security control baselines and
overlays that are published in Reference (ci) and used by DoD with direct support from
NSA/CSS and DISA, and input from the other DoD Components.
o. Develops DoD-specific assignment values, implementation guidance, and validation
procedures for Reference (cj) security controls and publishes them in the KS at
https://diacap.iaportal.navy.mil with direct support from NSA/CSS and DISA, and input from the
other DoD Components.
p. Ensures that organization-wide solutions that support cybersecurity objectives acquired
and developed via the ESSG process in accordance with Reference (aj) are consistent with DoD
architecture, policy, and guidance developed by the DoD CIO to ensure solutions acquired or
developed meet organizational requirements.
q. Manages international cybersecurity and cyberspace defense activities and represents
DoD in carrying out assigned international cybersecurity and cyberspace defense responsibilities
and functions through the International Cybersecurity Program.
r. Manages and executes DoD DIB Cybersecurity and IA Program activities in accordance
with Reference (ad).
47
ENCLOSURE 3
14. DoD RISK EXECUTIVE FUNCTION. The risk executive function, as described in
Reference (ch), is performed by the DoD ISRMC. The DoD risk executive:
a. Ensures risk-related considerations for individual ISs and PIT systems, including
authorization decisions, are viewed from a DoD-wide perspective with regard to the overall
strategic goals and objectives of DoD in carrying out its missions and business functions.
b. Ensures that management of IT-related security risks is consistent across DoD, reflects
organizational risk tolerance, and is considered along with other organizational risk in order to
ensure mission or business success.
48
ENCLOSURE 3
49
ENCLOSURE 3
e. Monitor compliance with cybersecurity policy, as appropriate, and review the results
of such monitoring.
f. Ensure that cybersecurity inspections, tests, and reviews are synchronized and coordinated
with affected parties and organizations.
g. Ensure implementation of IS security measures and procedures, including reporting
incidents to the AO and appropriate reporting chains and coordinating system-level responses to
unauthorized disclosures in accordance with Reference (bo) for classified information or
Reference (bp) for CUI, respectively.
h. Ensure that the handling of possible or actual data spills of classified information resident
in ISs, are conducted in accordance with Reference (bo).
i. Act as the primary cybersecurity technical advisor to the AO for DoD IS and PIT systems
under their purview.
j. Ensure that cybersecurity-related events or configuration changes that may impact DoD
IS and PIT systems authorization or security posture are formally reported to the AO and other
affected parties, such as IOs and stewards and AOs of interconnected DoD ISs.
k. Ensure the secure configuration and approval of IT below the system level (i.e., products
and IT services) in accordance with applicable guidance prior to acceptance into or connection to
a DoD IS or PIT system.
50
ENCLOSURE 3
51
ENCLOSURE 3
AO
ASD(NII)
ATO
authorizing official
Assistant Secretary of Defense for Networks and Information
Integration
authorization to operate
BIOS
BMA
CCI
CD
CDS
CI
CIO
CJCS
CJCSI
CNSS
CNSSI
CNSSP
COMSEC
CSS
CUI
DASD(DT&E)
GLOSSARY
EIEMA
ESSG
FN
foreign national
GIG
IA
IASE
IC
IO
IS
ISO
ISSM
ISSO
IT
information assurance
information assurance support environment
Intelligence Community
information owner
information system
information system owner
Information System Security Manager
Information System Security Officer
information technology
JWICS
KS
Knowledge Service
53
GLOSSARY
law enforcement
law enforcement and counterintelligence
MA
mission area
NIPRNet
NIST
NSA
NSS
OT&E
PAO
PIA
PII
PIT
PKI
PM
PPP
RMF
SAP
SAPCO
SCAP
SCI
SIPRNet
SISO
SITR
SLA
SM
SP
SRG
SSE
STIG
54
GLOSSARY
T&E
TPM
TRANSEC
TRMC
TSN
UCDMO
U.S.C.
USD(AT&L)
USD(I)
USD(P)
USD(P&R)
USSTRATCOM
55
GLOSSARY
56
GLOSSARY
57
GLOSSARY
58
GLOSSARY
SISO. See Senior (Agency) Information Security Officer definition in Reference (ch). The
SISO role, as described in law (Reference (aa)) and by NIST, should not be confused with
information security roles and responsibilities within References (bo), (bp), (bs), (by), and (cz).
SRG. Compilation of CCIs grouped in more applicable, specific technology areas at various
levels of technology and product specificity. Contain all requirements that have been flagged as
applicable from the parent level regardless if they are selected on a DoD baseline or not.
SSE. See IS security engineering definition in Reference (dz).
stand-alone system. System that is not connected to any other network and does not transmit,
receive, route, or exchange information outside of the systems authorization boundary.
STIG. Based on DoD policy and security controls. Implementation guide geared to a specific
product and version. Contains all requirements that have been flagged as applicable for the
product which have been selected on a DoD baseline.
supply chain risk. Defined in Reference (bm).
system development life cycle. Defined in Reference (dz).
technical interoperability. The ability for different technologies to communicate and exchange
data based on well-defined and widely adopted interface standards.
TEMPEST. Defined in Reference (dz).
TRANSEC. Defined in Reference (dz).
TPM. The TPM is a microcontroller that stores keys, passwords, and digital certificates. It
typically is affixed to the motherboard of computers. It potentially can be used in any computing
device that requires these functions. The nature of this hardware chip ensures that the
information stored there is made more secure from external software attack and physical theft.
The TPM standard is a product of the Trusted Computing Group consortium. For more
information on the TPM specification and architecture, refer to
www.trustedcomputinggroup.org/groups/tpm.
UCDMO CDS Baseline List. A list managed by the UCDMO that identifies CDSs that are
available for deployment within the DoD and IC.
UCDMO CDS Sunset List. A list managed by the UCDMO that identifies CDSs that are or have
been in operation but are no longer available for additional deployment and need to be replaced
within a specified period of time.
59
GLOSSARY