SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS 
 

DISA CCRI Background 
Command Cyber Readiness Inspections (CCRIs) replaced Enhanced Compliance Validations (ECVs) in October
2009 as the mechanism by which Commanders would begin being held accountable for their respective network and
enclave security posture.
Phase I of the CCRI program implemented a rigorous new grading criteria which provided greater objectivity and
analytical measurements of a site's security posture by reviewing technology areas, vulnerability scan results,
compliance with US Cyber Command (previously Joint Task Force-Global Network Operations) issued Computer
Network Defense (CND) Directives, and non-technical aspects of an information assurance (IA) program (culture,
conduct, and capability).
Phase II of the CCRI program, implemented May 2011, implements changes to the CCRI grading methodology
derived from lessons learned from Phase I, and also begins process changes to shift the CCRI methodology from
strictly a compliance based inspection toward an operational readiness inspection.

DISA CCRI Overview 
CCRI is a technical and operational inspection program that ensures compliance with information assurance (IA)
and computer network defense (CND) policies. The inspection is also a technical evaluation of a site’s compliance
with the configuration standards for various technologies as set forth in the DISA Security Technical
Implementation Guides (STIGs). During 2010, the CCRI program underwent a major transformation to formalize
the inspection process and institute a grading structure based on objective, measurable, and repeatable processes.
This formal grading criterion went into effect on Jan. 24, 2010. During this same period, the CCRI team also
pioneered a USCYBERCOM directed “no notice” inspection. These “no notice” inspections are directed from
USCYBERCOM and may be announced to a site from two weeks before to as short as the very same morning. An
immediate benefit of the CCRI program is that sites and program managers are now motivated to review their
network defenses on a continual basis with clearly-defined objectives and are keeping their senior leaders informed.
This emphasis decreases the window of opportunity for vulnerabilities. In addition, the involvement of senior
leaders is emphasized in a formal inspection notification process and through the use of Hot Wash sessions at the
conclusion of each inspection. Another dimension of the CCRI program provides metrics used by USCYBERCOM
to issue communications tasking orders and cyber alerts.
A CCRI determines compliance with Defense Information Systems Agency (DISA) Security Requirements Guides
(SRG), Security Technical Information Guides (STIG), Security Readiness Review (SRR) Scripts, STIG
Benchmarks, USCYBERCOM warning and tactical directives/orders (e.g., Fragmentary Orders [FRAGO],
Information Assurance Vulnerability Management [IAVM] notifications [i.e., Information Assurance Vulnerability
Alerts {IAVA}, Information Assurance Vulnerability Bulletins {IAVB} and Technical Advisories {TA} and
Communications Tasking Orders {CTO}], as well as Computer Network Directives [CND]).
SRGs provide general security compliance guidelines. SRGs serve as source guidance documents for STIGs. As
DOD prepares for conversion from the DOD 8500 IA controls to the more widely accepted NIST Special
Publication SP 800-53 Revision 3 security controls (NIST published NIST SP 800-53 Revision 4 on April 25,
2013), and to facilitate efforts to automate the STIGs, Field Security Operations (FSO) expresses the 800-53
controls into a set of technical and operational control correlation identifiers (CCI). Each 800-53 control is broken
down into a single, actionable statement, written with a technology neutral position. The CCIs serve as the unique
identifiers that will trace all future STIG development efforts back to the NIST controls and as a reference
framework to pull together the SCAP results.
FSO is developing four security requirement guides (SRGs): one for operating systems, one for network devices,
one for applications, and one to address the operational policy controls. The SRGs group the CCIs into more
applicable, specific technology areas and bridges the gap between overarching policy, CCIs, and STIGs. FSO will

Author: https://www.linkedin.com/jderienzo 

1 
A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS 
 
use the SRGs as the base requirements for all product STIGs, and the SRGs may be used as a guide by product
vendors to build a more secure products, which address DOD requirements.
STIGs document applicable DOD policies and security requirements for specific technical products, as well as best
practices and configuration guidelines. DISA FSO transformed STIGs from the static Portable Document Format
(PDF) to the Extensible Markup Language (XML) format. When a browser application such as Internet Explorer
opens these XML files they closely resemble the form and content of the legacy PDF STIGs thanks to the
accompanying EXtensible Stylesheet Language Transformation (XSLT) file. XML facilitates the use of the STIG
content as input to various automated processes. For example, it is now possible to populate spreadsheets and
databases with STIG content in a way not possible with the PDF versions. FSO provides the STIG Viewer Version
1.1.3 (beta), a Java application for rendering the STIG XCCDF XML content into a STIG checklist that can be
uploaded to the U.S. Department of Defense (DOD) Vulnerability Management System (VMS).
STIGs contain vulnerability data by Vulnerability Key, STIG ID, Severity, Short Name, Long Name, Condition,
Vulnerability Discussion, Default Finding Details, Checks, Fixes and much more. A java tool called “The STIG
Viewer,” offers several options for exporting Reviewer checks (e.g., Not a Finding) into VMS. For instance, the
STIG Viewer can either: 1). “Create an Import file for VMS”; 2). “Export a Custom STIG Checklist as CSV”; 3).
“Export a Short-form Checklist as HTML”; 4) “Export a Checklist as XML”. Some Reviewers prefer using the
STIG Viewer to build their Custom STIG checklist for import into VMS; others prefer working directly inside
VMS. The STIG Viewer requires the installation of the JAVA Virtual Machine on the workstation. The Import File
will be merged into VMS as long as the IP Address, MAC Address and Description field are manually added to the
Import File using WordPad (ask your CCRI instructor or Senior Reviewer for a demonstration). The asset has to be
pre-registered in VMS either by the System Administrator or the CCRI Reviewer based on equipment type,
Software/Firmware Version and Asset Role (e.g., perimeter router, perimeter firewall, infrastructure L2 switch).
After the Import file has been merged into VMS, the reviewer can check the FOUO IAVA notices for the operating
system associated with the network device. IAVAs may require additional research to determine if a vulnerability
applies to a specific operating system version. If the feature associated with the IAVA is not being used (e.g., PKI
certificates), this would be Not Applicable (N/A).
Most STIGs are published as (U) Unclassified and (FOUO) For Official Use Only. Both are Unclassified, but only
the (U) STIG is publicly available. The FOUO version contains the DISA Information Assurance Vulnerability
Alert (IAVA) ID associated with the vulnerability. All users can retrieve the Unclassified STIG, but only DOD
Points of Contact (POC) with a Common Access Card (CAC) can download the FOUO version to removable media.
Non-DOD users must contact their DOD POC to request a copy of the FOUO STIG version (e.g., IAVM STIG).
The DISA IASE does not accept ECAs for access to the PKI-protected content on the IASE. The PKI-protected
content is for use by DoD Military, Civilian, and Contractors, provided they possess a DoD CAC, as a result of
access to a DoD-owned information system. If a contractor needs access to PKI-protected content on the IASE, they
should contact their DoD Government sponsor to obtain the information required to fulfill their contract.
While SRR Scripts test software products for STIG compliance, runtime requirements can introduce new
vulnerabilities to the system (e.g., administrator access, installation of application components, and the inability of
the operating system to authenticate a script prior to execution); therefore, DISA currently provides SRR Scripts for
the Unix operating system, as well as database and web applications. DISA is in the process of replacing all SRR
Scripts with STIG OVAL Benchmarks. The Open Vulnerability and Assessment Language (OVAL) standardizes
the assessment and reporting of the machine state of computer systems. In combination with the Extensible
Configuration Checklist Description Format (XCCDF), OVAL allows Security Content Automation Protocol
(SCAP) validated tools such as DISA’s HBSS Policy Auditor and SCAP Compliance Checker (SCC), to run
automated STIG checks. Currently, DISA publishes STIG Benchmarks for Windows platforms, UNIX platforms
and Windows applications (i.e., IE8, IE9).
The STIG Benchmarks do NOT fully automate compliance validation for all STIG requirements. The "truly
manual" requirements will always be manual, especially with Policy STIGs, but as SCAP evolves, FSO plans to

Author: https://www.linkedin.com/jderienzo 

2 
A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS 
 
"automate" the reporting of the manual policy type requirements utilizing OCIL (Open Checklist Interactive
Language).
Besides STIG compliance, CCRI compliance involves many other aspects of cyber security such as policy
adherence, cyber security training and awareness, traditional security and facility security. Based on the results from
the network scans and changes to the assets, updates to the Authorization and Accreditation (A&A) process may be
required. Vulnerabilities that require risk mitigation are documented in a Plan of Action and Milestones (POA&M).
As an adjunct to the POA&M process, DISA provides the Vulnerability Management System (VMS), an online
repository that monitors and reports the mitigation of known Information Assurance Vulnerability Alerts (IAVAs).
VMS streamlines automation of vulnerability tracking through a relational database and online web views that
provide a centralized repository for vulnerability status information and policy compliance information for both
Non-Classified Internet Protocol Router Network (Low-side) and Secure Internet Protocol Router Network (Highside) clients. VMS information is used for many purposes, from practical vulnerability remediation to Approval to
Operate (ATO). Scan results are uploaded to the VMS for tracking, inventory, and Situational Awareness purposes.
In some cases a great deal of manual reporting is required to be input into VMS.
DISA requires CCRI candidates to complete a combination of instructor-led, independent study and hands-on
training. After the candidates pass a background investigation, they must complete a prescribed set of Security
Awareness computer-based training (CBT) curriculum, as well as VMS and DISA technical CBTs. The candidate
must complete a four day instructor-led training course followed by a five hour Security Readiness Review (SRR)
Walk-through exam in their subject matter area, namely: CCRI Team Lead, Networks and Network Devices,
Vulnerability Assessments, UNIX, Windows, DNS and Physical Security (Traditional). After passing the Walkthrough exam, the candidate submits an application requesting a “MyVMS” account. The CCRI candidate must
request a Low-side or a High-side account to access VMS and receive FOUO IAVM messages, Communications
Tasking Orders (CTO), Information Assurance Vulnerability Alerts (IAVA) and Information Assurance
Vulnerability Bulletins (IAVB). The CCRI Reviewer requires a Common Access Card (CAC) and a Low-side
computer to download the FOUO version of the STIGs to copy them to removable media. Or a DOD designated
sponsor can do this on their behalf.
Once the candidate becomes familiar with VMS and passes the VMS FedVTE training course, the next step is to
complete two mandatory training trips: an On the Job Training (OJT) trip and a Check-ride trip, preferably within 90
days of passing the Walkthrough exam. The OJT trip provides the opportunity for the candidate to observe a Senior
Security Reviewer in action. The candidate is expected to participate by asking relevant questions. The Check-ride
trip provides the opportunity for a CCRI Senior Reviewer to observe the candidate in action. A Senior Reviewer
grades the candidate and the CCRI Team Lead determines if the candidate is ready or requires an additional trip.
CCRI Reviewers must complete four (4) CCRI reviews each year to maintain their CCRI Reviewer status. A CCRI
Reviewer must repeat this process in each subject matter area and retake the Walkthrough exam for each discipline
on an annual basis. Annual refresher training is optional, as many CCRI Reviewers decide to test out of the training
class and just take the Walkthrough exam. Recently, the DISA waived the annual Walkthrough exam requirement.
As of January 2013, in accordance with Department of Defense Directive 8570 (DODD 8570), Information
Assurance Technical (IAT Level I, II, III) personnel must maintain a vendor certification in their area of expertise
(e.g., Microsoft Certified Systems Administrator [MCSA] vendor certification for Microsoft Windows reviews;
Tenable Certified Network Associate [TCNA] for Nessus vulnerability assessments; Cisco Certified Network
Associate for network security reviews of Cisco equipment; and, CompTIA Linux+ certification for Red Hat
Enterprise Linux reviews). See Appendix I for more information.

Author: https://www.linkedin.com/jderienzo 

3 
A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS 
 
The Defense Information Assurance Security Accreditation Working Group (DSAWG) recommends all Mission
Partners read and be familiar with the following DOD Information Assurance (IA) Policy:
• DOD Directive 8000.01, Management of the Department of Defense Information Enterprise
• DOD Directive 8500.01E, Information Assurance (IA)
• DOD Directive O-8530.1, Computer Network Defense (CND)
• DOD Directive 8570.01, Information Assurance (IA) Training, Certification, and Workforce Management
• DOD Instruction 8110.1, Multinational Information Sharing Networks Implementation
• DOD Instruction 8410.02, NETOPS for the Global Information Grid (GIG)
• DOD Instruction 8500.02, Information Assurance (IA) Implementation
• DOD Instruction 8510.01, DOD Information Assurance Certification and Accreditation Process (DIACAP)
• DOD Instruction 8520.02, Public Key Infrastructure (PKI) and Public Key (PK) Enabling
• DOD Instruction O-8530.2, Support to Computer Network Defense (CND)
• DOD Instruction 8551.1, Ports, Protocols, and Services (PPSM)
• DOD Instruction 8552.01, Use of Mobile Code Technologies in DOD Information Systems
• DOD Information System Certification and Accreditation Reciprocity, 23 July 2009
• Department of Defense Mobile Device Strategy, 8 June 2012

A Proposed CCRI Conceptual Framework 
To visualize the CCRI methodology better, a conceptual framework with four distinct phases is being proposed.
The four phases are: SCOPE (define constraints), INSPECT (assets), DOCUMENT (observations) and REPORT
(findings). See Figure 1: below.

SCOPE
(DEFINE CONSTRAINTS)

INSPECT 

REPORT 
(FINDINGS)

(ASSETS)

DOCUMENT 
(OBSERVATIONS)
Figure 1: The CCRI Conceptual Framework 

Author: https://www.linkedin.com/jderienzo 

4 
A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS 
 
SCOPE 

The CCRI Team Lead establishes a clear scope of effort prior to the on-site inspection by providing the Network
Reviewer with a list of equipment types and network environments that will be inspected. A Reviewer should be
familiar with the DISA Network STIGs, the IAVM STIGs, the Security Readiness Guides (SRG), any guidelines
and whitepapers, as well as the operational aspects of an information assurance (IA) program (culture, conduct, and
capability).
A typical CCRI Network SRR will include the inspection of at least eight network devices (e.g., premise router,
firewall, infrastructure L2 Switch and network policy and procedures). The Network/Perimeter list below contains
the most relevant STIGs, SRGs, Guides and Whitepapers. Network/Perimeter STIGs and Checklists that fall out of
scope--subject to change--are at the end of the list.


Network/Perimeter
o

o

STIGs








SRGs






(FOUO) CISCO IOS IAVM, Version 1, Release 1
(U) Network Firewall - Version 8, Release 14.
(U) Network IDS/IPS - Version 8, Release 14.
(U) Network Infrastructure Router L3 Switch - Version 8, Release 14.
(U) Network L2 Switch STIG Version 8 Release 14.
(U) Network Other Devices - Version 8, Release 14.
(U) Network Perimeter Router L3 Switch - Version 8, Release 14.
(U) Network Policy - Version 8, Release 14.

(U) Firewall SRG, Version 1.
(U) Firewall SRG, Version 1 Release Memo.
(U) Intrusion Detection and Prevention System (IDPS) SRG Version 1.
(U) Intrusion Detection and Prevention System (IDPS) SRG Version 1 Release
Memo.
(U) Network SRG

o

Guides
 (FOUO) Cisco Router Procedure Guide - Version 2, Release 2.

o

Whitepapers (Supplements of Network Infrastructure STIG, V8R1)
 (U) IDS/IPS Systems White Paper
 (U) Network Access Control White Paper
 (U) Network Management White Paper
 (U) VLAN Provisioning White Paper

o

Out of Scope
 Android 2.2 (Dell) - Release Memo.
 Android 2.2 (Dell) STIG, Version 1, Release 1.
 Backbone Transport Services STIG - Version 2, Release 2.
 BlackBerry (OS7 and BES5) STIG - Version 2, Release 3.
 BlackBerry 10 OS STIG Release Memo.
 BlackBerry 10 OS STIG Version 1.
 BlackBerry Device Service STIG Release Memo.
 BlackBerry Device Service STIG Version 1.
 BlackBerry PlayBook OS v2.1 STIG Release Memo.
 BlackBerry PlayBook OS v2.1 STIG Version 1.

Author: https://www.linkedin.com/jderienzo 

5 
A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS 
 

























































BlackBerry STIG - Version 2, Release 2.
BlackBerry STIG - Version 2, Release Memo.
DoD Bluetooth Requirement Specifications.
CMD Management Server Policy Version 2 Release 2 Manual STIG.
CMD Policy Version 2 Release 3 Manual STIG.
DATMS Checklist - Version 1, Release 1.
DATMS STIG - Version 1, Release 1.
Defense Switched Network (DSN) Checklist - Version 2, Release 3.5.
Defense Switched Network (DSN) STIG - Version 2, Release 3.
DOD Data Spill Procedures Guide for BlackBerry Smartphones.
DoD Enterprise DMZ Checklist - Version 1, Release 1.
DoD Internet DMZ Increment 1 - Phase 1 STIG Memo.
DoD Internet-Low-side DMZ STIG - Version 2, Release 1.
DoD Secure Telecommunications and DRSN Checklist - Ver 1, Rel 2.2.
DoD Secure Telecommunications and DRSN STIG - Ver 1, Rel 2 .
DoD Wireless Smartphone Security Requirements Matrix, Version 3.5.
Domain Name System (DNS) Security Requirements Guide (SRG).
DNS SRG Release Memo.
Domain Name System (DNS) STIG, Version 4, Release 1.14.
Enclave Security Checklist - Version 4, Release 5.
Enclave STIG - Version 4, Release 3.
Draft Enclave Test and Development STIG Version 1.
Draft Enclave Test and Development STIG Version 1 - Comment Matrix.
Draft Enclave Test and Development STIG Version 1 - Memo.
Enclave Zone A Checklist - Version 4, Release 5.
Enclave Zone B Checklist - Version 4, Release 5.
Enclave Zone C Checklist - Version 4, Release 5.
Enclave Zone D Checklist - Version 4, Release 5.
General Mobile Device (Non-Enterprise Activated) STIG Release Memo.
General Mobile Device (Non-Enterprise Activated) STIG Version 1, Release 2.
IPSEC VPN Gateway STIG - Version 1, Release 5.
IPSEC VPN Gateway STIG Memo.
Juniper Router Procedure Guide - Version 2, Release 2.
Medical Devices STIG - Version 1 Release 1.
Medical Devices STIG Memo.
Mobile OS SRG - Release Memo.
Mobile OS SRG, Version 1, Release 2.
Mobile Policy SRG Version 1 Release Memo.
Mobile Policy SRG, Version 1, Release 1.
REL DMZ Checklist - Version 1, Release 1.
REL LAN STIG - Version 1, Release 4.
Samsung Knox Android 1.0 STIG Release Memo.
Samsung Knox Android 1.0 STIG Version 1.
Sharing Peripherals Across the Network (SPAN) STIG, Version 2, Release 4.
SME PED STIG Version 2, Release 1 .
Video Tele-Conference Checklist - Version 1, Release 1.2.
Video Tele-Conference STIG - Version 1, Release 1.
Voice and Video over Internet Protocol (VVoIP) Release Memo - Ver 3, Rel 1.
Voice and Video over Internet Protocol (VVoIP) STIG - Version 3, Release 2.
Windows 7 IAVM Version 1, Release 1.
Windows 7 STIG - Applies to any installation of Windows 7 and tablet computers.
Windows 7 STIG - Version 1, Release 11.
Windows 7 STIG Benchmark Version 1, Release 15.
Windows 7 STIG Release Memo.
Windows 7 STIG, Version 1, Release 10.
Windows 8 IAVM Version 1, Release 1.

Author: https://www.linkedin.com/jderienzo 

6 
A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS 
 


Network/Perimeter (continued…)
o

Out of Scope (continued)…
 Windows 8 STIG Version 1 - Release Memo.
 Windows 8 STIG Version 1, Release 1.
 Windows Mobile 6-5 STIG Version 1, Release 2.
 Wireless STIG - Version 6, Release 6.Domain Name System (DNS) Security
Requirements Guide (SRG)

The DISA STIG Master List, http://iase.disa.mil/stigs/a-z.html, contains a list of all available (U) STIGs, SRGs,
Checklists, Guides and Whitepapers. You must request For Official Use Only (FOUO) STIGs from a DOD POC.
The DISA Information Assurance Support Environment (IASE) public website provides an Excel or XML table
containing IAVM to Common Vulnerability Exposure (CVE) mappings. An individual IAVM may have multiple
CVE Numbers associated with it.
The CCRI Reviewer will receive information from the CCRI Team Lead about the network environment and the
types of network devices to be inspected a few weeks prior to the inspection date. High-side allows for the flow of
classified material, which can include sensitive missions.
The Facility Security Officer shall prepare the following network artifacts in advance for availability upon arrival:
1) Network Topology Maps (e.g., product name, host name, available interfaces [e.g., Gi, Fa, Se], circuit
types [e.g., Fast Ethernet, WAN circuit], IP Address/CIDR)
2) Premise Router configuration files in ASCII format
3) Infrastructure L2 Switch configuration files in ASCII format
4) Firewall configuration files in ASCII format
5) Organizational Network Policies and Procedures

INSPECT 

Prior to the CCRI site visit, the Network Security Reviewer reviews the network assets in VMS to develop a
situational awareness. This assumes: (1) The CCRI Reviewer is granted the appropriate VMS privileges to view the
Site’s network assets prior to arrival; (2) The Program Manager of the Site creates and maintains a current
hierarchical organizational structure of network assets within VMS.
The Network Security Reviewer manually inspects each network device configuration file against the appropriate
DISA STIG. The DISA STIG assigns a Severity Code to each system IA security weakness to indicate (1) the risk
level associated with the IA security weakness and (2) the urgency with which the corrective action must be
completed. Severity codes are expressed as “CAT I, CAT II or CAT III,” where CAT I is the indicator of greatest
risk and urgency. A CAT I Severity Code is assigned to findings that allow primary security protections to be
bypassed, allowing immediate access by unauthorized personnel or unauthorized assumption of super-user
privileges, and usually cannot be mitigated. A CAT II Severity Code is assigned to findings that have a potential to
lead to unauthorized system access or activity. CAT II findings can usually be mitigated and will not prevent an
ATO from being granted. A CAT III Severity Code is assigned to recommendations that will improve IA posture
but are not required for an authorization to operate. CAT I weaknesses receive the highest priority for correction or
mitigation. CAT I weakness in a component part of a system (e.g., a workstation or server) may be off-set or
mitigated by other protections within hosting enclaves such that the overall risk to the system is reduced to a CAT II.
CAT I weaknesses must be corrected before an Authorization to Operate (ATO) is granted. A system can operate
with a CAT I weakness only when the system is critical and failure to deploy or allow continued operation for
deployed systems will preclude mission accomplishment.

Author: https://www.linkedin.com/jderienzo 

7 
A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS 
 
Only the Component CIO can authorize operation of a system with a CAT I weakness, and this can only be done
through an Interim Authorization to Operate (IATO). CAT II weaknesses must be corrected or satisfactorily
mitigated before an ATO can be granted. If CAT II weaknesses cannot be corrected or satisfactorily mitigated
within the time limitation imposed in the IATO, the DAA must certify in writing that continued system operation is
critical to mission accomplishment or terminate system operation. A copy of the authorization to continue system
operation with supporting rationale shall be provided to the DOD Component CIO. CAT III weaknesses, if
corrected, will improve the system’s IA posture but do not preclude an authorization to operate. The DAA will
determine if these weaknesses will be corrected or the risk accepted.

GIG Monitoring (Out of Scope) 
There are network Intrusion Detection Systems (IDSs) located on the GIG that monitor standard security policy. The
GIG network IDSs, monitored by Global Network Security Center (GNSC), is (are) known as the Joint Intrusion
Detection System (JIDS). The GNSC monitors all JIDS on the GIG within the CONUS. There are various other
centers located around the world and all centers feed into a DoD Global Network Operations Center (GNOC). This
group identifies any information threat on an isolated, regional, or global basis. The GNSC notifies all parties of any
type of potential unauthorized attack or access, and works with the managing CCC and site Information Assurance
(IA) staff to help identify, isolate, investigate, and remediate potential threats.

CS Enclave Perimeter Monitoring (Out of Scope) 
All CS enclave perimeters have a layered defense that consists of Access Control Lists (ACLs) on the perimeter
router, firewalls, and a network IDS. The security staff located in the CCCs develops the security profiles for the
enclave perimeter router, perimeter firewall and perimeter network IDSs and monitor their respective reports and
audit logs for unauthorized access or activities. This is for the entire CONUS-based CS network. The security staffs
located at DECCs Europe and Pacific perform the same tasks locally for their respective enclave perimeter devices.
Suspected incidents are investigated in concert with trusted agents from the customer base or data owners to
determine the legitimacy of the incidents. If the suspected incident cannot be validated as authorized, they are
reported to the Liaison Officer (LNO) and to the GNSC. The GNSC then directs all actions for this incident and
closes it or turns it over to the appropriate investigative agency for action. The Computing Service Cell (CSC)
reports the incident to CS Issue Center within the CS Operations Division.

FSO Monitoring (Out of Scope) 
The FSO conducts external vulnerability scanning once a year for the Non-Classified Internet Protocol Router
Network (LOW-SIDE) and Secret Internet Protocol Router Network (HIGH-SIDE) connections at all sites. If the
scan does not penetrate or identify a weakness in the enclave perimeter, the scan is terminated. If the scan does
identify a weakness in the enclave perimeter, the scan continues to further identify weaknesses. The results are
entered into VMS and are briefed to the site director and senior staff. 

DOCUMENT 

Initially each network device goes through an Assessment and Authorization (A&A) process, previously referred to
as Certification and Accreditation (C&A). The A&A process spans a 3 year cycle; however the conventional A&A
process is being replaced with a Risk Management Framework (RMF) allows each organization to develop a
mission-focused Risk Management Approach (RMA).
After assets go through an A&A, asset changes require manual updates to the original A&A documentation.
CCRI evaluations of the network configurations can involve weeks of preparation by network administrators.
Based on the results from the network manual checks, changes are made to the assets. Updates to A&A
documentation may be required.

Author: https://www.linkedin.com/jderienzo 

8 
A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS 
 
Results are uploaded to the DOD Vulnerability Management System (VMS) for tracking, inventory and Situational
Awareness purposes. VMS is a DoD vulnerability management system for Information Assurance Vulnerability
Management (IAVM) and STIG compliance. The IAVM portion is used to track acknowledgement and compliance
with alerts, bulletins, and technical advisories as directed by Chairman of Joint Chiefs of Staff Instruction 6510-01D,
“Information Assurance (IA) and Computer Network Defense.” Information for all assets is registered in VMS:
system details, operating systems, owner, and managing site.

VMS: 
CCRI Reviewers should be prepared to perform VMS functions such as:









System/Enclave creation
Work with the DISA STIG Viewer to generate an Import File for VMS. Ability to change the XML header
information so the IP Address, Host Name and Description match VMS.
VMS Reports
Plan of Action and Milestones (POA&M) entry
Designated Approving Authority (DAA) Risk Acceptance (DRA) entry
Update findings to proper status (Fixed, Open, Not a Finding, Not Applicable, Not Reviewed, etc.)
This is defined as interpreting database STIG requirements
VMS also notifies the managing System Administrators (SAs) via email of any newly released IAVMs.
The STIG portion identifies vulnerabilities, and tracks remediation of those vulnerabilities.

Vulnerability Scanning: 



Providing US Cyber Command (USCC) Communications Tasking Order (CTO) mandated vulnerability
scan results to partners for resolution.
In accordance with Compliance Task Order (CTO) 08-005, internal scan results are imported into VMS on
a monthly basis.

Patching: 






An Information Assurance Vulnerability Alert (IAVA) mandates updates to the configuration of an asset.
The IAVAs are distributed to system administrators dictating fixes that need to be made to systems based
on newly identified vulnerabilities.
The system administrator has the responsibility of checking to see which IAVAs are relevant.
Often times the response to a particular IAVA is to patch installed software. The system administrator
must download and install patch information from the patch server.
The CCRI Reviewer determines if IAVAs are properly implemented.

Author: https://www.linkedin.com/jderienzo 

9 
A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS 
 
REPORT 

IAVA results are manually reported into VMS. The system administrator (SA) must patch the systems or make
desired configuration changes as per the IAVA, or develop a Plan of Action & Milestones (POA&M) when the
desired changes will be completed. For instance, if the SA is unable to comply with the notice, a POA&M is
prepared and submitted (including implementation timelines) prior to the time specified in the IAVM notice (usually
21days). Submitted POA&Ms must be reviewed and approved by the DAA prior to the IAVM notice mitigation
date.
The CCRI Reviewer may need to create the hierarchical organizational structure for a site’s asset within VMS in
cases where the site has failed to do this beforehand.
The IAVM Coordinator acknowledges receipt of IAVA and IAVB notices in VMS by the specified
acknowledgement date. The CCRI Reviewer checks IAVA and IAVB notices in VMS for situational awareness
purposes.
The IAVM Coordinator, the SA or the CCRI Reviewer revises VMS organizational structure as necessary.
There are specific grading criteria that represent the overall information assurance/computer network defense
compliance, measured on a 100-point scale. The CCRI grading criteria includes IAVA and directives compliance
checks as well as review operational readiness elements supporting the information assurance readiness posture. If a
unit scores less than 70 percent, it is subject to re-inspection. If poor performance continues, the network may be
disconnected from the Global Information Grid (GIG) until that organization corrects its security deficiencies.
Inspectors grade in three categories: category one, the most severe threat; category two, a situation that may
threaten; and category three, which represents a vulnerability that may impact mission integrity. The inspectors
grade for communication areas, contributing factors and traditional security.
An on-site inspection takes about a week and includes mission briefing, reviews of components and methodologies,
and system scans for vulnerabilities. The on-site inspection includes daily after action reviews known as a Hot
Wash, followed by an Out-Brief session on the last day of the inspection.

 

 

Author: https://www.linkedin.com/jderienzo 

10 
A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS 
 

Appendix I – Information Assurance Technical Workforce Requirements 
A DISA accredited CCRI Security Readiness Reviewer (SRR) must satisfy U.S. Department of Defense (DOD)
8570 Baseline Information Assurance pre-requisites (see Table 1 below); pass a five (5) hour walkthrough exam
proctored by DISA Field Security Operations (FSO) personnel; demonstrate a proficiency with the DOD
Vulnerability Management System (VMS); exhibit a proficiency using DISA Security Technical Information Guides
(STIGs) (a Network Reviewer is expected to know the Network Policy STIG, the Network Perimeter STIGs and the
Network Infrastructure STIGs); demonstrate expertise in one or more subject matter areas: network and network
devices, vulnerability assessments (ACAS, SCCVI, The SCAP Compliance Checker, Policy Auditor), Host Based
Security Systems (HBSS), Domain Name System (DNS), Windows, Unix or the physical environment (Traditional);
pass an over-the-shoulder review (On-the-Job Training [OJT]); pass an over-your-shoulder review (Check-ride); and
maintain their CCRI accreditation status by participating in a minimum of four (4) CCRI reviews per calendar year.
A CCRI Reviewer must also be familiar with the following DOD acronyms and definitions:
• Communications Tasking Order (CTO): CTO is used to coordinate and direct defensive measures to mitigate or
eliminate threats to the DISN.
• Computer Network Directive (CND): CND focuses on protecting the Global Information Grid (GIG) network
and hardware. For example, many defense organizations have restrictions on USB memory sticks and peer-topeer (P2P) applications.
• Fragmentary Order (FRAGO): A FRAGO is a change to an existing Operations Order (OPORD) and addresses
only elements that have changed (e.g., mission, execution).
• Information Assurance Vulnerability Alert (IAVA): IAVA addresses severe network vulnerabilities that pose a
threat to the network.
• Information Assurance Vulnerability Bulletin (IAVB): IAVB addresses new vulnerabilities that do not pose an
immediate threat or risk.
• Information Assurance Vulnerability Management (IAVM): IAVM notification provides positive control of
vulnerability notification, corrective action, and IAVA visibility status.
• Technical Advisory (TA): TA addresses new vulnerabilities that are generally low risk.

Author: https://www.linkedin.com/jderienzo 

11 
A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS 
 
Table 1: IA Technical Workforce Requirements 

Civilian, Military, Contractor* (Including
Civilian or Contractor LNs)

IAT Level I - III
(Foreign National and LN Levels I & II only)

Initial Training **
IA Certification
(from approved list)

Yes
Yes
(within 6 months)

Initial On the Job Practical Evaluation

Yes
(for initial position)

CE Certification

Yes

Maintain Certification Status

Yes
(as required by certification)

Continuous Education or
Sustainment Training

Yes
(as required by certification [e.g.,
International Information
Security Certification Consortium {ISC 2}
requires 120 hours within 3 years for the
CISSP])

Background Investigation

As required by IA level and Reference (b)

Sign Privileged Access Statement

Yes

*Contractor category, level, and certification requirements to be specified in the contract
**Classroom, distributive, blended, government, or commercial provider

IATs with privileged access MUST OBTAIN APPROPRIATE COMPUTING ENVIRONMENT (CE)
CERTIFICATIONS for the operating system(s) and/or security related tools/devices they support as required by
their employing organization. If supporting multiple tools and devices, an IAT should obtain CE certifications for all
the tools and devices they are supporting. At a minimum the IAT should obtain a certification for the tool or device
he or she spends the most time supporting. For example, if an IAT is spending most of his or her time supporting
security functions on a CISCO router, the IAT should obtain a CE certification for that equipment.
(*DOD 8570.01-M, Information Assurance Workforce Improvement Program, Incorporating Change 2, 02/2510)

 

 

Author: https://www.linkedin.com/jderienzo 

12 
A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS 
 
Table 2: IAT Level III Position Requirements

Experience
• Normally has at least seven years experience in IA technology or a related area.
System Environment
• Enclave Environment, advanced NE, and advanced CE.
Knowledge
• Expert in all functional requirements functions of both IAT Level I and IAT Level II positions.
• Applies extensive knowledge of a variety of the IA field’s concepts, practices, and procedures
to ensure the secure integration and operation of all enclave systems.
Supervision
• Works independently to solve problems quickly and completely.
• May lead and direct the work of others.
• Typically reports to an enclave manager.
Other
• Relies on extensive experience and judgment to plan and accomplish goals for the enclave
environment.
• Supports, monitors, tests, and troubleshoots hardware and software IA problems pertaining to
the enclave environment.
• Must be a U.S. Citizen.
IA Certification & Operating System Certification
• Within six 6 months of assignment to position

Author: https://www.linkedin.com/jderienzo 

13 
A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS 
 
Table 3: IAT‐3 Functions

01.
02.
03.
04.
05.
06.
07.
08.

09.
10.
11.
12.
13.
14.
15.
16.
17.
18.
19.

20.
21.
22.
23.
24.

Mastery of IAT Level I and IAT Level II CE/NE knowledge and skills.
Recommend and schedule IA related repairs within the enclave environment.
Coordinate and ensure end user support for all enclave applications and operations.
Lead teams to quickly and completely solve IA problems for the enclave environment.
Formulate or provide input to the enclave's IA/IT budget.
Plan and schedule the installation of new or modified hardware, operating systems, and software
applications ensuring integration with IA security requirements for the enclave.
Determine whether a security incident is indicative of a violation of law that requires specific
legal action.
Direct the implementation of appropriate operational structures and processes to ensure an
effective enclave IA security program including boundary defense, incident detection and
response, and key management.
Provide direction to system developers regarding correction of security problems identified during
testing.
Evaluate functional operation and performance in light of test results and make recommendations
regarding certification and accreditation C&A.
Examine enclave vulnerabilities and determine actions to mitigate them.
Monitor and evaluate the effectiveness of enclave IA security procedures and safeguards.
Analyze IA security incidents and patterns to determine remedial actions to correct
vulnerabilities.
Develop the enclave termination plan to ensure that IA security incidents are avoided during
shutdown and long term protection of archived resources is achieved.
Develop and apply effective vulnerability countermeasures for the enclave.
Develop and manage IA customer service performance requirements.
Develop IA related customer support policies, procedures, and standards.
Write and maintain scripts required to ensure security of the enclave environment.
Design perimeter defense systems including intrusion detection systems, firewalls, grid sensors,
etc., enhance rule sets to block sources of malicious traffic, and establish a protective net of
layered filters to prevent, detect, and eradicate viruses.
Schedule and perform regular and special backups on all enclave systems.
Establish enclave logging procedures to include: important enclave events; services and proxies;
log archiving facility.
Provide OJT for IAT Level I and II DOD personnel.
Analyze IAVAs and Information Assurance Vulnerability Bulletins for enclave impact and take
or recommend appropriate action.
Obtain and maintain IA certification appropriate to position.

Author: https://www.linkedin.com/jderienzo 

14 

Contenu connexe

En vedette

Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...Vivastream
 
Solve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems TodaySolve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems TodayStephen Foskett
 
Renesas RL78 The True Low Power Microcontroller Platform
 Renesas RL78 The True Low Power Microcontroller Platform Renesas RL78 The True Low Power Microcontroller Platform
Renesas RL78 The True Low Power Microcontroller PlatformRenesas Electronics Corporation
 
An Introduction to Faye
An Introduction to FayeAn Introduction to Faye
An Introduction to FayeDarren Oakley
 
How to refill canon color cartridge 241
How to refill canon color cartridge 241How to refill canon color cartridge 241
How to refill canon color cartridge 241printerfillingstation
 
Summary -Fish
Summary -FishSummary -Fish
Summary -FishGMR Group
 
Intermediate Colors
Intermediate ColorsIntermediate Colors
Intermediate Colorsartoutman
 
How to Make the Inc 500 List
How to Make the Inc 500 ListHow to Make the Inc 500 List
How to Make the Inc 500 ListHubSpot
 
Analytics Solutions from SAP
Analytics Solutions from SAPAnalytics Solutions from SAP
Analytics Solutions from SAPSAP Analytics
 
Friendship’s coupons
Friendship’s couponsFriendship’s coupons
Friendship’s couponsClarice J
 
American Greetings interview questions and answers
American Greetings interview questions and answersAmerican Greetings interview questions and answers
American Greetings interview questions and answersroggerring
 
Establishing a Strategy for Data Quality
Establishing a Strategy for Data QualityEstablishing a Strategy for Data Quality
Establishing a Strategy for Data QualityDatabase Answers Ltd.
 

En vedette (14)

Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
Integrated Lifecycle Marketing Workshop: Emerging Channels for Email List Bui...
 
Solve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems TodaySolve 3 Enterprise Storage Problems Today
Solve 3 Enterprise Storage Problems Today
 
Ambienti di virtualizzazione
Ambienti di virtualizzazioneAmbienti di virtualizzazione
Ambienti di virtualizzazione
 
Renesas RL78 The True Low Power Microcontroller Platform
 Renesas RL78 The True Low Power Microcontroller Platform Renesas RL78 The True Low Power Microcontroller Platform
Renesas RL78 The True Low Power Microcontroller Platform
 
Enterprise TEPPCO Pipeline System Map
Enterprise TEPPCO Pipeline System MapEnterprise TEPPCO Pipeline System Map
Enterprise TEPPCO Pipeline System Map
 
An Introduction to Faye
An Introduction to FayeAn Introduction to Faye
An Introduction to Faye
 
How to refill canon color cartridge 241
How to refill canon color cartridge 241How to refill canon color cartridge 241
How to refill canon color cartridge 241
 
Summary -Fish
Summary -FishSummary -Fish
Summary -Fish
 
Intermediate Colors
Intermediate ColorsIntermediate Colors
Intermediate Colors
 
How to Make the Inc 500 List
How to Make the Inc 500 ListHow to Make the Inc 500 List
How to Make the Inc 500 List
 
Analytics Solutions from SAP
Analytics Solutions from SAPAnalytics Solutions from SAP
Analytics Solutions from SAP
 
Friendship’s coupons
Friendship’s couponsFriendship’s coupons
Friendship’s coupons
 
American Greetings interview questions and answers
American Greetings interview questions and answersAmerican Greetings interview questions and answers
American Greetings interview questions and answers
 
Establishing a Strategy for Data Quality
Establishing a Strategy for Data QualityEstablishing a Strategy for Data Quality
Establishing a Strategy for Data Quality
 

Similaire à Information Assurance, A DISA CCRI Conceptual Framework

Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSIRJET Journal
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresIJRES Journal
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slidesSteve Arnold
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixHCLSoftware
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability ManagementIRJET Journal
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life CycleMaurice Dawson
 
Application Security Guide for Beginners
Application Security Guide for Beginners Application Security Guide for Beginners
Application Security Guide for Beginners Checkmarx
 
Web Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery PipelinesWeb Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery PipelinesAvi Networks
 
Piacere general presentation
Piacere general presentationPiacere general presentation
Piacere general presentationPIACERE
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET Journal
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsBen Rothke
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnNUS-ISS
 
VAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdfVAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdfSamehMostafa33
 
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
Tonight, March 5th – Class 7 (last class)   your test” on ICS.docxTonight, March 5th – Class 7 (last class)   your test” on ICS.docx
Tonight, March 5th – Class 7 (last class) your test” on ICS.docxturveycharlyn
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryAshley Zupkus
 
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionWeb Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionIRJET Journal
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assessBirodh Rijal
 

Similaire à Information Assurance, A DISA CCRI Conceptual Framework (20)

Effective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaSEffective Information Flow Control as a Service: EIFCaaS
Effective Information Flow Control as a Service: EIFCaaS
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresGeneric Security Framework for Multiple Heterogeneous Virtual Infrastructures
Generic Security Framework for Multiple Heterogeneous Virtual Infrastructures
 
security_assessment_slides
security_assessment_slidessecurity_assessment_slides
security_assessment_slides
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
 
A Study on Vulnerability Management
A Study on Vulnerability ManagementA Study on Vulnerability Management
A Study on Vulnerability Management
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
 
Application Security Guide for Beginners
Application Security Guide for Beginners Application Security Guide for Beginners
Application Security Guide for Beginners
 
Web Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery PipelinesWeb Application Security for Continuous Delivery Pipelines
Web Application Security for Continuous Delivery Pipelines
 
Piacere general presentation
Piacere general presentationPiacere general presentation
Piacere general presentation
 
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
IRJET- Bug Hunting using Web Application Penetration Testing Techniques.
 
How PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applicationsHow PCI And PA DSS will change enterprise applications
How PCI And PA DSS will change enterprise applications
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk MunnSupply Chain Security for Containerised Workloads - Lee Chuk Munn
Supply Chain Security for Containerised Workloads - Lee Chuk Munn
 
VAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdfVAL-210-Computer-Validati-Plan-sample.pdf
VAL-210-Computer-Validati-Plan-sample.pdf
 
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
Tonight, March 5th – Class 7 (last class)   your test” on ICS.docxTonight, March 5th – Class 7 (last class)   your test” on ICS.docx
Tonight, March 5th – Class 7 (last class) your test” on ICS.docx
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industry
 
Web Development in Advanced Threat Prevention
Web Development in Advanced Threat PreventionWeb Development in Advanced Threat Prevention
Web Development in Advanced Threat Prevention
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assess
 

Plus de James W. De Rienzo

Nist sp 800_r5_baselines_&_attributes
Nist sp 800_r5_baselines_&_attributesNist sp 800_r5_baselines_&_attributes
Nist sp 800_r5_baselines_&_attributesJames W. De Rienzo
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417James W. De Rienzo
 
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)James W. De Rienzo
 
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...James W. De Rienzo
 
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwdJob aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwdJames W. De Rienzo
 
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...James W. De Rienzo
 
NIST NVD REV 4 Security Controls Online Database Analysis
NIST NVD REV 4 Security Controls Online Database AnalysisNIST NVD REV 4 Security Controls Online Database Analysis
NIST NVD REV 4 Security Controls Online Database AnalysisJames W. De Rienzo
 
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...James W. De Rienzo
 
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804James W. De Rienzo
 
(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...
(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...
(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...James W. De Rienzo
 
(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...
(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...
(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...James W. De Rienzo
 
(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804
(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804
(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804James W. De Rienzo
 
(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...
(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...
(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...James W. De Rienzo
 
RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)
RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)
RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)James W. De Rienzo
 
Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...
Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...
Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...James W. De Rienzo
 
Rmf step-3-control-selection-nist-sp-800-53r4
Rmf step-3-control-selection-nist-sp-800-53r4Rmf step-3-control-selection-nist-sp-800-53r4
Rmf step-3-control-selection-nist-sp-800-53r4James W. De Rienzo
 
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6a
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6aCritical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6a
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6aJames W. De Rienzo
 
Information Security Fundamentals
Information Security FundamentalsInformation Security Fundamentals
Information Security FundamentalsJames W. De Rienzo
 

Plus de James W. De Rienzo (20)

Nist sp 800_r5_baselines_&_attributes
Nist sp 800_r5_baselines_&_attributesNist sp 800_r5_baselines_&_attributes
Nist sp 800_r5_baselines_&_attributes
 
NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417NIST CSD Cybersecurity Publications 20160417
NIST CSD Cybersecurity Publications 20160417
 
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
NIST Policy Mapped to 800-53-800-53A-controls-and-objectives (Legal Size)
 
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
FedRAMP 2.0 Control-Implementation-Summary (CIS) v2 1 cross-matrixed with Fed...
 
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwdJob aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
Job aid framework-for-improving-critical-infrastructure-cybersecurity-core-jwd
 
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...
Risk Management Framework (RMF) STEP 4- Access Security Controls - NIST SP 80...
 
NIST NVD REV 4 Security Controls Online Database Analysis
NIST NVD REV 4 Security Controls Online Database AnalysisNIST NVD REV 4 Security Controls Online Database Analysis
NIST NVD REV 4 Security Controls Online Database Analysis
 
SEI CERT Podcast Series
SEI CERT Podcast SeriesSEI CERT Podcast Series
SEI CERT Podcast Series
 
CNDSP Assessment Template
CNDSP Assessment TemplateCNDSP Assessment Template
CNDSP Assessment Template
 
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...
Map Critical Security Controls (CSC) v5.0 to NIST SP 800-53 Revision 4 (Summa...
 
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
(4) NIST SP 800-53 Revision 4 (security control enhancements omitted) 20140804
 
(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...
(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...
(3) Map Council on CyberSecurity's Critical Security Controls (CSC) Version 5...
 
(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...
(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...
(1a) map csc 5 to nist sp 800 53 rev 4 (security control table portrait) 2014...
 
(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804
(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804
(2) map csc 5 to nist sp 800 53 rev 4 (controls & enhancements) 20140804
 
(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...
(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...
(1b) Map CSC v5.0 to NIST SP 800 53 Revision 4 (security control table landsc...
 
RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)
RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)
RMF Step 4: ASSESS (NIST SP 800-53A Rev.1)
 
Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...
Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...
Policy. FedRAMP Security Assessment Plan (SAP) Template, Policy and Procedure...
 
Rmf step-3-control-selection-nist-sp-800-53r4
Rmf step-3-control-selection-nist-sp-800-53r4Rmf step-3-control-selection-nist-sp-800-53r4
Rmf step-3-control-selection-nist-sp-800-53r4
 
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6a
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6aCritical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6a
Critical Security Controls v4 1 Mapped to NIST SP 800-53 Rev.4-final r6a
 
Information Security Fundamentals
Information Security FundamentalsInformation Security Fundamentals
Information Security Fundamentals
 

Dernier

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 

Dernier (20)

Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 

Information Assurance, A DISA CCRI Conceptual Framework

  • 1. A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS    DISA CCRI Background  Command Cyber Readiness Inspections (CCRIs) replaced Enhanced Compliance Validations (ECVs) in October 2009 as the mechanism by which Commanders would begin being held accountable for their respective network and enclave security posture. Phase I of the CCRI program implemented a rigorous new grading criteria which provided greater objectivity and analytical measurements of a site's security posture by reviewing technology areas, vulnerability scan results, compliance with US Cyber Command (previously Joint Task Force-Global Network Operations) issued Computer Network Defense (CND) Directives, and non-technical aspects of an information assurance (IA) program (culture, conduct, and capability). Phase II of the CCRI program, implemented May 2011, implements changes to the CCRI grading methodology derived from lessons learned from Phase I, and also begins process changes to shift the CCRI methodology from strictly a compliance based inspection toward an operational readiness inspection. DISA CCRI Overview  CCRI is a technical and operational inspection program that ensures compliance with information assurance (IA) and computer network defense (CND) policies. The inspection is also a technical evaluation of a site’s compliance with the configuration standards for various technologies as set forth in the DISA Security Technical Implementation Guides (STIGs). During 2010, the CCRI program underwent a major transformation to formalize the inspection process and institute a grading structure based on objective, measurable, and repeatable processes. This formal grading criterion went into effect on Jan. 24, 2010. During this same period, the CCRI team also pioneered a USCYBERCOM directed “no notice” inspection. These “no notice” inspections are directed from USCYBERCOM and may be announced to a site from two weeks before to as short as the very same morning. An immediate benefit of the CCRI program is that sites and program managers are now motivated to review their network defenses on a continual basis with clearly-defined objectives and are keeping their senior leaders informed. This emphasis decreases the window of opportunity for vulnerabilities. In addition, the involvement of senior leaders is emphasized in a formal inspection notification process and through the use of Hot Wash sessions at the conclusion of each inspection. Another dimension of the CCRI program provides metrics used by USCYBERCOM to issue communications tasking orders and cyber alerts. A CCRI determines compliance with Defense Information Systems Agency (DISA) Security Requirements Guides (SRG), Security Technical Information Guides (STIG), Security Readiness Review (SRR) Scripts, STIG Benchmarks, USCYBERCOM warning and tactical directives/orders (e.g., Fragmentary Orders [FRAGO], Information Assurance Vulnerability Management [IAVM] notifications [i.e., Information Assurance Vulnerability Alerts {IAVA}, Information Assurance Vulnerability Bulletins {IAVB} and Technical Advisories {TA} and Communications Tasking Orders {CTO}], as well as Computer Network Directives [CND]). SRGs provide general security compliance guidelines. SRGs serve as source guidance documents for STIGs. As DOD prepares for conversion from the DOD 8500 IA controls to the more widely accepted NIST Special Publication SP 800-53 Revision 3 security controls (NIST published NIST SP 800-53 Revision 4 on April 25, 2013), and to facilitate efforts to automate the STIGs, Field Security Operations (FSO) expresses the 800-53 controls into a set of technical and operational control correlation identifiers (CCI). Each 800-53 control is broken down into a single, actionable statement, written with a technology neutral position. The CCIs serve as the unique identifiers that will trace all future STIG development efforts back to the NIST controls and as a reference framework to pull together the SCAP results. FSO is developing four security requirement guides (SRGs): one for operating systems, one for network devices, one for applications, and one to address the operational policy controls. The SRGs group the CCIs into more applicable, specific technology areas and bridges the gap between overarching policy, CCIs, and STIGs. FSO will Author: https://www.linkedin.com/jderienzo  1 
  • 2. A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS    use the SRGs as the base requirements for all product STIGs, and the SRGs may be used as a guide by product vendors to build a more secure products, which address DOD requirements. STIGs document applicable DOD policies and security requirements for specific technical products, as well as best practices and configuration guidelines. DISA FSO transformed STIGs from the static Portable Document Format (PDF) to the Extensible Markup Language (XML) format. When a browser application such as Internet Explorer opens these XML files they closely resemble the form and content of the legacy PDF STIGs thanks to the accompanying EXtensible Stylesheet Language Transformation (XSLT) file. XML facilitates the use of the STIG content as input to various automated processes. For example, it is now possible to populate spreadsheets and databases with STIG content in a way not possible with the PDF versions. FSO provides the STIG Viewer Version 1.1.3 (beta), a Java application for rendering the STIG XCCDF XML content into a STIG checklist that can be uploaded to the U.S. Department of Defense (DOD) Vulnerability Management System (VMS). STIGs contain vulnerability data by Vulnerability Key, STIG ID, Severity, Short Name, Long Name, Condition, Vulnerability Discussion, Default Finding Details, Checks, Fixes and much more. A java tool called “The STIG Viewer,” offers several options for exporting Reviewer checks (e.g., Not a Finding) into VMS. For instance, the STIG Viewer can either: 1). “Create an Import file for VMS”; 2). “Export a Custom STIG Checklist as CSV”; 3). “Export a Short-form Checklist as HTML”; 4) “Export a Checklist as XML”. Some Reviewers prefer using the STIG Viewer to build their Custom STIG checklist for import into VMS; others prefer working directly inside VMS. The STIG Viewer requires the installation of the JAVA Virtual Machine on the workstation. The Import File will be merged into VMS as long as the IP Address, MAC Address and Description field are manually added to the Import File using WordPad (ask your CCRI instructor or Senior Reviewer for a demonstration). The asset has to be pre-registered in VMS either by the System Administrator or the CCRI Reviewer based on equipment type, Software/Firmware Version and Asset Role (e.g., perimeter router, perimeter firewall, infrastructure L2 switch). After the Import file has been merged into VMS, the reviewer can check the FOUO IAVA notices for the operating system associated with the network device. IAVAs may require additional research to determine if a vulnerability applies to a specific operating system version. If the feature associated with the IAVA is not being used (e.g., PKI certificates), this would be Not Applicable (N/A). Most STIGs are published as (U) Unclassified and (FOUO) For Official Use Only. Both are Unclassified, but only the (U) STIG is publicly available. The FOUO version contains the DISA Information Assurance Vulnerability Alert (IAVA) ID associated with the vulnerability. All users can retrieve the Unclassified STIG, but only DOD Points of Contact (POC) with a Common Access Card (CAC) can download the FOUO version to removable media. Non-DOD users must contact their DOD POC to request a copy of the FOUO STIG version (e.g., IAVM STIG). The DISA IASE does not accept ECAs for access to the PKI-protected content on the IASE. The PKI-protected content is for use by DoD Military, Civilian, and Contractors, provided they possess a DoD CAC, as a result of access to a DoD-owned information system. If a contractor needs access to PKI-protected content on the IASE, they should contact their DoD Government sponsor to obtain the information required to fulfill their contract. While SRR Scripts test software products for STIG compliance, runtime requirements can introduce new vulnerabilities to the system (e.g., administrator access, installation of application components, and the inability of the operating system to authenticate a script prior to execution); therefore, DISA currently provides SRR Scripts for the Unix operating system, as well as database and web applications. DISA is in the process of replacing all SRR Scripts with STIG OVAL Benchmarks. The Open Vulnerability and Assessment Language (OVAL) standardizes the assessment and reporting of the machine state of computer systems. In combination with the Extensible Configuration Checklist Description Format (XCCDF), OVAL allows Security Content Automation Protocol (SCAP) validated tools such as DISA’s HBSS Policy Auditor and SCAP Compliance Checker (SCC), to run automated STIG checks. Currently, DISA publishes STIG Benchmarks for Windows platforms, UNIX platforms and Windows applications (i.e., IE8, IE9). The STIG Benchmarks do NOT fully automate compliance validation for all STIG requirements. The "truly manual" requirements will always be manual, especially with Policy STIGs, but as SCAP evolves, FSO plans to Author: https://www.linkedin.com/jderienzo  2 
  • 3. A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS    "automate" the reporting of the manual policy type requirements utilizing OCIL (Open Checklist Interactive Language). Besides STIG compliance, CCRI compliance involves many other aspects of cyber security such as policy adherence, cyber security training and awareness, traditional security and facility security. Based on the results from the network scans and changes to the assets, updates to the Authorization and Accreditation (A&A) process may be required. Vulnerabilities that require risk mitigation are documented in a Plan of Action and Milestones (POA&M). As an adjunct to the POA&M process, DISA provides the Vulnerability Management System (VMS), an online repository that monitors and reports the mitigation of known Information Assurance Vulnerability Alerts (IAVAs). VMS streamlines automation of vulnerability tracking through a relational database and online web views that provide a centralized repository for vulnerability status information and policy compliance information for both Non-Classified Internet Protocol Router Network (Low-side) and Secure Internet Protocol Router Network (Highside) clients. VMS information is used for many purposes, from practical vulnerability remediation to Approval to Operate (ATO). Scan results are uploaded to the VMS for tracking, inventory, and Situational Awareness purposes. In some cases a great deal of manual reporting is required to be input into VMS. DISA requires CCRI candidates to complete a combination of instructor-led, independent study and hands-on training. After the candidates pass a background investigation, they must complete a prescribed set of Security Awareness computer-based training (CBT) curriculum, as well as VMS and DISA technical CBTs. The candidate must complete a four day instructor-led training course followed by a five hour Security Readiness Review (SRR) Walk-through exam in their subject matter area, namely: CCRI Team Lead, Networks and Network Devices, Vulnerability Assessments, UNIX, Windows, DNS and Physical Security (Traditional). After passing the Walkthrough exam, the candidate submits an application requesting a “MyVMS” account. The CCRI candidate must request a Low-side or a High-side account to access VMS and receive FOUO IAVM messages, Communications Tasking Orders (CTO), Information Assurance Vulnerability Alerts (IAVA) and Information Assurance Vulnerability Bulletins (IAVB). The CCRI Reviewer requires a Common Access Card (CAC) and a Low-side computer to download the FOUO version of the STIGs to copy them to removable media. Or a DOD designated sponsor can do this on their behalf. Once the candidate becomes familiar with VMS and passes the VMS FedVTE training course, the next step is to complete two mandatory training trips: an On the Job Training (OJT) trip and a Check-ride trip, preferably within 90 days of passing the Walkthrough exam. The OJT trip provides the opportunity for the candidate to observe a Senior Security Reviewer in action. The candidate is expected to participate by asking relevant questions. The Check-ride trip provides the opportunity for a CCRI Senior Reviewer to observe the candidate in action. A Senior Reviewer grades the candidate and the CCRI Team Lead determines if the candidate is ready or requires an additional trip. CCRI Reviewers must complete four (4) CCRI reviews each year to maintain their CCRI Reviewer status. A CCRI Reviewer must repeat this process in each subject matter area and retake the Walkthrough exam for each discipline on an annual basis. Annual refresher training is optional, as many CCRI Reviewers decide to test out of the training class and just take the Walkthrough exam. Recently, the DISA waived the annual Walkthrough exam requirement. As of January 2013, in accordance with Department of Defense Directive 8570 (DODD 8570), Information Assurance Technical (IAT Level I, II, III) personnel must maintain a vendor certification in their area of expertise (e.g., Microsoft Certified Systems Administrator [MCSA] vendor certification for Microsoft Windows reviews; Tenable Certified Network Associate [TCNA] for Nessus vulnerability assessments; Cisco Certified Network Associate for network security reviews of Cisco equipment; and, CompTIA Linux+ certification for Red Hat Enterprise Linux reviews). See Appendix I for more information. Author: https://www.linkedin.com/jderienzo  3 
  • 4. A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS    The Defense Information Assurance Security Accreditation Working Group (DSAWG) recommends all Mission Partners read and be familiar with the following DOD Information Assurance (IA) Policy: • DOD Directive 8000.01, Management of the Department of Defense Information Enterprise • DOD Directive 8500.01E, Information Assurance (IA) • DOD Directive O-8530.1, Computer Network Defense (CND) • DOD Directive 8570.01, Information Assurance (IA) Training, Certification, and Workforce Management • DOD Instruction 8110.1, Multinational Information Sharing Networks Implementation • DOD Instruction 8410.02, NETOPS for the Global Information Grid (GIG) • DOD Instruction 8500.02, Information Assurance (IA) Implementation • DOD Instruction 8510.01, DOD Information Assurance Certification and Accreditation Process (DIACAP) • DOD Instruction 8520.02, Public Key Infrastructure (PKI) and Public Key (PK) Enabling • DOD Instruction O-8530.2, Support to Computer Network Defense (CND) • DOD Instruction 8551.1, Ports, Protocols, and Services (PPSM) • DOD Instruction 8552.01, Use of Mobile Code Technologies in DOD Information Systems • DOD Information System Certification and Accreditation Reciprocity, 23 July 2009 • Department of Defense Mobile Device Strategy, 8 June 2012 A Proposed CCRI Conceptual Framework  To visualize the CCRI methodology better, a conceptual framework with four distinct phases is being proposed. The four phases are: SCOPE (define constraints), INSPECT (assets), DOCUMENT (observations) and REPORT (findings). See Figure 1: below. SCOPE (DEFINE CONSTRAINTS) INSPECT  REPORT  (FINDINGS) (ASSETS) DOCUMENT  (OBSERVATIONS) Figure 1: The CCRI Conceptual Framework  Author: https://www.linkedin.com/jderienzo  4 
  • 5. A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS    SCOPE  The CCRI Team Lead establishes a clear scope of effort prior to the on-site inspection by providing the Network Reviewer with a list of equipment types and network environments that will be inspected. A Reviewer should be familiar with the DISA Network STIGs, the IAVM STIGs, the Security Readiness Guides (SRG), any guidelines and whitepapers, as well as the operational aspects of an information assurance (IA) program (culture, conduct, and capability). A typical CCRI Network SRR will include the inspection of at least eight network devices (e.g., premise router, firewall, infrastructure L2 Switch and network policy and procedures). The Network/Perimeter list below contains the most relevant STIGs, SRGs, Guides and Whitepapers. Network/Perimeter STIGs and Checklists that fall out of scope--subject to change--are at the end of the list.  Network/Perimeter o o STIGs         SRGs      (FOUO) CISCO IOS IAVM, Version 1, Release 1 (U) Network Firewall - Version 8, Release 14. (U) Network IDS/IPS - Version 8, Release 14. (U) Network Infrastructure Router L3 Switch - Version 8, Release 14. (U) Network L2 Switch STIG Version 8 Release 14. (U) Network Other Devices - Version 8, Release 14. (U) Network Perimeter Router L3 Switch - Version 8, Release 14. (U) Network Policy - Version 8, Release 14. (U) Firewall SRG, Version 1. (U) Firewall SRG, Version 1 Release Memo. (U) Intrusion Detection and Prevention System (IDPS) SRG Version 1. (U) Intrusion Detection and Prevention System (IDPS) SRG Version 1 Release Memo. (U) Network SRG o Guides  (FOUO) Cisco Router Procedure Guide - Version 2, Release 2. o Whitepapers (Supplements of Network Infrastructure STIG, V8R1)  (U) IDS/IPS Systems White Paper  (U) Network Access Control White Paper  (U) Network Management White Paper  (U) VLAN Provisioning White Paper o Out of Scope  Android 2.2 (Dell) - Release Memo.  Android 2.2 (Dell) STIG, Version 1, Release 1.  Backbone Transport Services STIG - Version 2, Release 2.  BlackBerry (OS7 and BES5) STIG - Version 2, Release 3.  BlackBerry 10 OS STIG Release Memo.  BlackBerry 10 OS STIG Version 1.  BlackBerry Device Service STIG Release Memo.  BlackBerry Device Service STIG Version 1.  BlackBerry PlayBook OS v2.1 STIG Release Memo.  BlackBerry PlayBook OS v2.1 STIG Version 1. Author: https://www.linkedin.com/jderienzo  5 
  • 6. A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS                                                            BlackBerry STIG - Version 2, Release 2. BlackBerry STIG - Version 2, Release Memo. DoD Bluetooth Requirement Specifications. CMD Management Server Policy Version 2 Release 2 Manual STIG. CMD Policy Version 2 Release 3 Manual STIG. DATMS Checklist - Version 1, Release 1. DATMS STIG - Version 1, Release 1. Defense Switched Network (DSN) Checklist - Version 2, Release 3.5. Defense Switched Network (DSN) STIG - Version 2, Release 3. DOD Data Spill Procedures Guide for BlackBerry Smartphones. DoD Enterprise DMZ Checklist - Version 1, Release 1. DoD Internet DMZ Increment 1 - Phase 1 STIG Memo. DoD Internet-Low-side DMZ STIG - Version 2, Release 1. DoD Secure Telecommunications and DRSN Checklist - Ver 1, Rel 2.2. DoD Secure Telecommunications and DRSN STIG - Ver 1, Rel 2 . DoD Wireless Smartphone Security Requirements Matrix, Version 3.5. Domain Name System (DNS) Security Requirements Guide (SRG). DNS SRG Release Memo. Domain Name System (DNS) STIG, Version 4, Release 1.14. Enclave Security Checklist - Version 4, Release 5. Enclave STIG - Version 4, Release 3. Draft Enclave Test and Development STIG Version 1. Draft Enclave Test and Development STIG Version 1 - Comment Matrix. Draft Enclave Test and Development STIG Version 1 - Memo. Enclave Zone A Checklist - Version 4, Release 5. Enclave Zone B Checklist - Version 4, Release 5. Enclave Zone C Checklist - Version 4, Release 5. Enclave Zone D Checklist - Version 4, Release 5. General Mobile Device (Non-Enterprise Activated) STIG Release Memo. General Mobile Device (Non-Enterprise Activated) STIG Version 1, Release 2. IPSEC VPN Gateway STIG - Version 1, Release 5. IPSEC VPN Gateway STIG Memo. Juniper Router Procedure Guide - Version 2, Release 2. Medical Devices STIG - Version 1 Release 1. Medical Devices STIG Memo. Mobile OS SRG - Release Memo. Mobile OS SRG, Version 1, Release 2. Mobile Policy SRG Version 1 Release Memo. Mobile Policy SRG, Version 1, Release 1. REL DMZ Checklist - Version 1, Release 1. REL LAN STIG - Version 1, Release 4. Samsung Knox Android 1.0 STIG Release Memo. Samsung Knox Android 1.0 STIG Version 1. Sharing Peripherals Across the Network (SPAN) STIG, Version 2, Release 4. SME PED STIG Version 2, Release 1 . Video Tele-Conference Checklist - Version 1, Release 1.2. Video Tele-Conference STIG - Version 1, Release 1. Voice and Video over Internet Protocol (VVoIP) Release Memo - Ver 3, Rel 1. Voice and Video over Internet Protocol (VVoIP) STIG - Version 3, Release 2. Windows 7 IAVM Version 1, Release 1. Windows 7 STIG - Applies to any installation of Windows 7 and tablet computers. Windows 7 STIG - Version 1, Release 11. Windows 7 STIG Benchmark Version 1, Release 15. Windows 7 STIG Release Memo. Windows 7 STIG, Version 1, Release 10. Windows 8 IAVM Version 1, Release 1. Author: https://www.linkedin.com/jderienzo  6 
  • 7. A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS     Network/Perimeter (continued…) o Out of Scope (continued)…  Windows 8 STIG Version 1 - Release Memo.  Windows 8 STIG Version 1, Release 1.  Windows Mobile 6-5 STIG Version 1, Release 2.  Wireless STIG - Version 6, Release 6.Domain Name System (DNS) Security Requirements Guide (SRG) The DISA STIG Master List, http://iase.disa.mil/stigs/a-z.html, contains a list of all available (U) STIGs, SRGs, Checklists, Guides and Whitepapers. You must request For Official Use Only (FOUO) STIGs from a DOD POC. The DISA Information Assurance Support Environment (IASE) public website provides an Excel or XML table containing IAVM to Common Vulnerability Exposure (CVE) mappings. An individual IAVM may have multiple CVE Numbers associated with it. The CCRI Reviewer will receive information from the CCRI Team Lead about the network environment and the types of network devices to be inspected a few weeks prior to the inspection date. High-side allows for the flow of classified material, which can include sensitive missions. The Facility Security Officer shall prepare the following network artifacts in advance for availability upon arrival: 1) Network Topology Maps (e.g., product name, host name, available interfaces [e.g., Gi, Fa, Se], circuit types [e.g., Fast Ethernet, WAN circuit], IP Address/CIDR) 2) Premise Router configuration files in ASCII format 3) Infrastructure L2 Switch configuration files in ASCII format 4) Firewall configuration files in ASCII format 5) Organizational Network Policies and Procedures INSPECT  Prior to the CCRI site visit, the Network Security Reviewer reviews the network assets in VMS to develop a situational awareness. This assumes: (1) The CCRI Reviewer is granted the appropriate VMS privileges to view the Site’s network assets prior to arrival; (2) The Program Manager of the Site creates and maintains a current hierarchical organizational structure of network assets within VMS. The Network Security Reviewer manually inspects each network device configuration file against the appropriate DISA STIG. The DISA STIG assigns a Severity Code to each system IA security weakness to indicate (1) the risk level associated with the IA security weakness and (2) the urgency with which the corrective action must be completed. Severity codes are expressed as “CAT I, CAT II or CAT III,” where CAT I is the indicator of greatest risk and urgency. A CAT I Severity Code is assigned to findings that allow primary security protections to be bypassed, allowing immediate access by unauthorized personnel or unauthorized assumption of super-user privileges, and usually cannot be mitigated. A CAT II Severity Code is assigned to findings that have a potential to lead to unauthorized system access or activity. CAT II findings can usually be mitigated and will not prevent an ATO from being granted. A CAT III Severity Code is assigned to recommendations that will improve IA posture but are not required for an authorization to operate. CAT I weaknesses receive the highest priority for correction or mitigation. CAT I weakness in a component part of a system (e.g., a workstation or server) may be off-set or mitigated by other protections within hosting enclaves such that the overall risk to the system is reduced to a CAT II. CAT I weaknesses must be corrected before an Authorization to Operate (ATO) is granted. A system can operate with a CAT I weakness only when the system is critical and failure to deploy or allow continued operation for deployed systems will preclude mission accomplishment. Author: https://www.linkedin.com/jderienzo  7 
  • 8. A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS    Only the Component CIO can authorize operation of a system with a CAT I weakness, and this can only be done through an Interim Authorization to Operate (IATO). CAT II weaknesses must be corrected or satisfactorily mitigated before an ATO can be granted. If CAT II weaknesses cannot be corrected or satisfactorily mitigated within the time limitation imposed in the IATO, the DAA must certify in writing that continued system operation is critical to mission accomplishment or terminate system operation. A copy of the authorization to continue system operation with supporting rationale shall be provided to the DOD Component CIO. CAT III weaknesses, if corrected, will improve the system’s IA posture but do not preclude an authorization to operate. The DAA will determine if these weaknesses will be corrected or the risk accepted. GIG Monitoring (Out of Scope)  There are network Intrusion Detection Systems (IDSs) located on the GIG that monitor standard security policy. The GIG network IDSs, monitored by Global Network Security Center (GNSC), is (are) known as the Joint Intrusion Detection System (JIDS). The GNSC monitors all JIDS on the GIG within the CONUS. There are various other centers located around the world and all centers feed into a DoD Global Network Operations Center (GNOC). This group identifies any information threat on an isolated, regional, or global basis. The GNSC notifies all parties of any type of potential unauthorized attack or access, and works with the managing CCC and site Information Assurance (IA) staff to help identify, isolate, investigate, and remediate potential threats. CS Enclave Perimeter Monitoring (Out of Scope)  All CS enclave perimeters have a layered defense that consists of Access Control Lists (ACLs) on the perimeter router, firewalls, and a network IDS. The security staff located in the CCCs develops the security profiles for the enclave perimeter router, perimeter firewall and perimeter network IDSs and monitor their respective reports and audit logs for unauthorized access or activities. This is for the entire CONUS-based CS network. The security staffs located at DECCs Europe and Pacific perform the same tasks locally for their respective enclave perimeter devices. Suspected incidents are investigated in concert with trusted agents from the customer base or data owners to determine the legitimacy of the incidents. If the suspected incident cannot be validated as authorized, they are reported to the Liaison Officer (LNO) and to the GNSC. The GNSC then directs all actions for this incident and closes it or turns it over to the appropriate investigative agency for action. The Computing Service Cell (CSC) reports the incident to CS Issue Center within the CS Operations Division. FSO Monitoring (Out of Scope)  The FSO conducts external vulnerability scanning once a year for the Non-Classified Internet Protocol Router Network (LOW-SIDE) and Secret Internet Protocol Router Network (HIGH-SIDE) connections at all sites. If the scan does not penetrate or identify a weakness in the enclave perimeter, the scan is terminated. If the scan does identify a weakness in the enclave perimeter, the scan continues to further identify weaknesses. The results are entered into VMS and are briefed to the site director and senior staff.  DOCUMENT  Initially each network device goes through an Assessment and Authorization (A&A) process, previously referred to as Certification and Accreditation (C&A). The A&A process spans a 3 year cycle; however the conventional A&A process is being replaced with a Risk Management Framework (RMF) allows each organization to develop a mission-focused Risk Management Approach (RMA). After assets go through an A&A, asset changes require manual updates to the original A&A documentation. CCRI evaluations of the network configurations can involve weeks of preparation by network administrators. Based on the results from the network manual checks, changes are made to the assets. Updates to A&A documentation may be required. Author: https://www.linkedin.com/jderienzo  8 
  • 9. A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS    Results are uploaded to the DOD Vulnerability Management System (VMS) for tracking, inventory and Situational Awareness purposes. VMS is a DoD vulnerability management system for Information Assurance Vulnerability Management (IAVM) and STIG compliance. The IAVM portion is used to track acknowledgement and compliance with alerts, bulletins, and technical advisories as directed by Chairman of Joint Chiefs of Staff Instruction 6510-01D, “Information Assurance (IA) and Computer Network Defense.” Information for all assets is registered in VMS: system details, operating systems, owner, and managing site. VMS:  CCRI Reviewers should be prepared to perform VMS functions such as:         System/Enclave creation Work with the DISA STIG Viewer to generate an Import File for VMS. Ability to change the XML header information so the IP Address, Host Name and Description match VMS. VMS Reports Plan of Action and Milestones (POA&M) entry Designated Approving Authority (DAA) Risk Acceptance (DRA) entry Update findings to proper status (Fixed, Open, Not a Finding, Not Applicable, Not Reviewed, etc.) This is defined as interpreting database STIG requirements VMS also notifies the managing System Administrators (SAs) via email of any newly released IAVMs. The STIG portion identifies vulnerabilities, and tracks remediation of those vulnerabilities. Vulnerability Scanning:    Providing US Cyber Command (USCC) Communications Tasking Order (CTO) mandated vulnerability scan results to partners for resolution. In accordance with Compliance Task Order (CTO) 08-005, internal scan results are imported into VMS on a monthly basis. Patching:       An Information Assurance Vulnerability Alert (IAVA) mandates updates to the configuration of an asset. The IAVAs are distributed to system administrators dictating fixes that need to be made to systems based on newly identified vulnerabilities. The system administrator has the responsibility of checking to see which IAVAs are relevant. Often times the response to a particular IAVA is to patch installed software. The system administrator must download and install patch information from the patch server. The CCRI Reviewer determines if IAVAs are properly implemented. Author: https://www.linkedin.com/jderienzo  9 
  • 10. A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS    REPORT  IAVA results are manually reported into VMS. The system administrator (SA) must patch the systems or make desired configuration changes as per the IAVA, or develop a Plan of Action & Milestones (POA&M) when the desired changes will be completed. For instance, if the SA is unable to comply with the notice, a POA&M is prepared and submitted (including implementation timelines) prior to the time specified in the IAVM notice (usually 21days). Submitted POA&Ms must be reviewed and approved by the DAA prior to the IAVM notice mitigation date. The CCRI Reviewer may need to create the hierarchical organizational structure for a site’s asset within VMS in cases where the site has failed to do this beforehand. The IAVM Coordinator acknowledges receipt of IAVA and IAVB notices in VMS by the specified acknowledgement date. The CCRI Reviewer checks IAVA and IAVB notices in VMS for situational awareness purposes. The IAVM Coordinator, the SA or the CCRI Reviewer revises VMS organizational structure as necessary. There are specific grading criteria that represent the overall information assurance/computer network defense compliance, measured on a 100-point scale. The CCRI grading criteria includes IAVA and directives compliance checks as well as review operational readiness elements supporting the information assurance readiness posture. If a unit scores less than 70 percent, it is subject to re-inspection. If poor performance continues, the network may be disconnected from the Global Information Grid (GIG) until that organization corrects its security deficiencies. Inspectors grade in three categories: category one, the most severe threat; category two, a situation that may threaten; and category three, which represents a vulnerability that may impact mission integrity. The inspectors grade for communication areas, contributing factors and traditional security. An on-site inspection takes about a week and includes mission briefing, reviews of components and methodologies, and system scans for vulnerabilities. The on-site inspection includes daily after action reviews known as a Hot Wash, followed by an Out-Brief session on the last day of the inspection.     Author: https://www.linkedin.com/jderienzo  10 
  • 11. A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS    Appendix I – Information Assurance Technical Workforce Requirements  A DISA accredited CCRI Security Readiness Reviewer (SRR) must satisfy U.S. Department of Defense (DOD) 8570 Baseline Information Assurance pre-requisites (see Table 1 below); pass a five (5) hour walkthrough exam proctored by DISA Field Security Operations (FSO) personnel; demonstrate a proficiency with the DOD Vulnerability Management System (VMS); exhibit a proficiency using DISA Security Technical Information Guides (STIGs) (a Network Reviewer is expected to know the Network Policy STIG, the Network Perimeter STIGs and the Network Infrastructure STIGs); demonstrate expertise in one or more subject matter areas: network and network devices, vulnerability assessments (ACAS, SCCVI, The SCAP Compliance Checker, Policy Auditor), Host Based Security Systems (HBSS), Domain Name System (DNS), Windows, Unix or the physical environment (Traditional); pass an over-the-shoulder review (On-the-Job Training [OJT]); pass an over-your-shoulder review (Check-ride); and maintain their CCRI accreditation status by participating in a minimum of four (4) CCRI reviews per calendar year. A CCRI Reviewer must also be familiar with the following DOD acronyms and definitions: • Communications Tasking Order (CTO): CTO is used to coordinate and direct defensive measures to mitigate or eliminate threats to the DISN. • Computer Network Directive (CND): CND focuses on protecting the Global Information Grid (GIG) network and hardware. For example, many defense organizations have restrictions on USB memory sticks and peer-topeer (P2P) applications. • Fragmentary Order (FRAGO): A FRAGO is a change to an existing Operations Order (OPORD) and addresses only elements that have changed (e.g., mission, execution). • Information Assurance Vulnerability Alert (IAVA): IAVA addresses severe network vulnerabilities that pose a threat to the network. • Information Assurance Vulnerability Bulletin (IAVB): IAVB addresses new vulnerabilities that do not pose an immediate threat or risk. • Information Assurance Vulnerability Management (IAVM): IAVM notification provides positive control of vulnerability notification, corrective action, and IAVA visibility status. • Technical Advisory (TA): TA addresses new vulnerabilities that are generally low risk. Author: https://www.linkedin.com/jderienzo  11 
  • 12. A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS    Table 1: IA Technical Workforce Requirements  Civilian, Military, Contractor* (Including Civilian or Contractor LNs) IAT Level I - III (Foreign National and LN Levels I & II only) Initial Training ** IA Certification (from approved list) Yes Yes (within 6 months) Initial On the Job Practical Evaluation Yes (for initial position) CE Certification Yes Maintain Certification Status Yes (as required by certification) Continuous Education or Sustainment Training Yes (as required by certification [e.g., International Information Security Certification Consortium {ISC 2} requires 120 hours within 3 years for the CISSP]) Background Investigation As required by IA level and Reference (b) Sign Privileged Access Statement Yes *Contractor category, level, and certification requirements to be specified in the contract **Classroom, distributive, blended, government, or commercial provider IATs with privileged access MUST OBTAIN APPROPRIATE COMPUTING ENVIRONMENT (CE) CERTIFICATIONS for the operating system(s) and/or security related tools/devices they support as required by their employing organization. If supporting multiple tools and devices, an IAT should obtain CE certifications for all the tools and devices they are supporting. At a minimum the IAT should obtain a certification for the tool or device he or she spends the most time supporting. For example, if an IAT is spending most of his or her time supporting security functions on a CISCO router, the IAT should obtain a CE certification for that equipment. (*DOD 8570.01-M, Information Assurance Workforce Improvement Program, Incorporating Change 2, 02/2510)     Author: https://www.linkedin.com/jderienzo  12 
  • 13. A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS    Table 2: IAT Level III Position Requirements Experience • Normally has at least seven years experience in IA technology or a related area. System Environment • Enclave Environment, advanced NE, and advanced CE. Knowledge • Expert in all functional requirements functions of both IAT Level I and IAT Level II positions. • Applies extensive knowledge of a variety of the IA field’s concepts, practices, and procedures to ensure the secure integration and operation of all enclave systems. Supervision • Works independently to solve problems quickly and completely. • May lead and direct the work of others. • Typically reports to an enclave manager. Other • Relies on extensive experience and judgment to plan and accomplish goals for the enclave environment. • Supports, monitors, tests, and troubleshoots hardware and software IA problems pertaining to the enclave environment. • Must be a U.S. Citizen. IA Certification & Operating System Certification • Within six 6 months of assignment to position Author: https://www.linkedin.com/jderienzo  13 
  • 14. A PROPOSED CONCEPTUAL FRAMEWORK FOR THE DISA CCRI PROCESS    Table 3: IAT‐3 Functions 01. 02. 03. 04. 05. 06. 07. 08. 09. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 21. 22. 23. 24. Mastery of IAT Level I and IAT Level II CE/NE knowledge and skills. Recommend and schedule IA related repairs within the enclave environment. Coordinate and ensure end user support for all enclave applications and operations. Lead teams to quickly and completely solve IA problems for the enclave environment. Formulate or provide input to the enclave's IA/IT budget. Plan and schedule the installation of new or modified hardware, operating systems, and software applications ensuring integration with IA security requirements for the enclave. Determine whether a security incident is indicative of a violation of law that requires specific legal action. Direct the implementation of appropriate operational structures and processes to ensure an effective enclave IA security program including boundary defense, incident detection and response, and key management. Provide direction to system developers regarding correction of security problems identified during testing. Evaluate functional operation and performance in light of test results and make recommendations regarding certification and accreditation C&A. Examine enclave vulnerabilities and determine actions to mitigate them. Monitor and evaluate the effectiveness of enclave IA security procedures and safeguards. Analyze IA security incidents and patterns to determine remedial actions to correct vulnerabilities. Develop the enclave termination plan to ensure that IA security incidents are avoided during shutdown and long term protection of archived resources is achieved. Develop and apply effective vulnerability countermeasures for the enclave. Develop and manage IA customer service performance requirements. Develop IA related customer support policies, procedures, and standards. Write and maintain scripts required to ensure security of the enclave environment. Design perimeter defense systems including intrusion detection systems, firewalls, grid sensors, etc., enhance rule sets to block sources of malicious traffic, and establish a protective net of layered filters to prevent, detect, and eradicate viruses. Schedule and perform regular and special backups on all enclave systems. Establish enclave logging procedures to include: important enclave events; services and proxies; log archiving facility. Provide OJT for IAT Level I and II DOD personnel. Analyze IAVAs and Information Assurance Vulnerability Bulletins for enclave impact and take or recommend appropriate action. Obtain and maintain IA certification appropriate to position. Author: https://www.linkedin.com/jderienzo  14