25
Shore Triad Cyber Summit NAVFAC Cyber Strategy Update 4 March 2016 Brandon T. Jones NAVFAC CIO (Acting)

Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

Shore Triad Cyber Summit

NAVFAC Cyber Strategy Update

4 March 2016

Brandon T. Jones

NAVFAC CIO (Acting)

Page 2: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

2

Six-Step RMF Process

Cyber Secure Definitions

Protect

Detect

React

(Mitigate)

Recover

Interim Secure (Mission Assurance):

Initial actions taken to address Control

System vulnerabilities as quickly as

possible.

Fully Secure: Following the six-step

RMF process to completion and

receiving an ATO for respective system.

For the FEC, it means:

PE and N-UMCS have been deployed

Accomplished Facility Control System

Assessments

Developed Accreditation Packages

Developed & Installed Facility

Equipment

Connected Facilities to PE & N-UMCS

Actively monitoring the Control

Systems

Page 3: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

3

Cyber Strategy Accomplishments

Notable cyber accomplishments and milestones include:

Successful CYBERSAFE Audit: NAVFAC CIO worked with OPNAV to perform and pass

a functional audit of policies and procedures to certify the CYBERSAFE Program Office.

Interim secure tasks in Hawaii: Operational technology (OT) resources have completed

interim secure tasks for Hawaii installations.

PE Deployed: Performed initial deployment of Platform Enclave (PE) in support of

operational technology cyber security architecture in Hawaii, Mid-Lant, Southwest,

Southeast, Marianas, EURAFSWA. Far East will be complete in March 2016.

Tri-Service TEM and Navy TEM: NAVFAC hosted and facilitated a Tri-Service (1st of it’s

kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security.

Fleet R3B Brief: Communicated and partnered with Fleet Audience led by FFC Exec

Director

Fleet FCRC Brief: Communicating the risk of shore facilities to Fleet Commanders ADM

Davidson and ADM Swift

PDASN EIE Brief: Update to Mr. Iselin on the State of Control Systems

Page 4: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

4

Capabilities FY16 FY17 FY18 FY19 FY20

Cyber Security

ICS-PE

(Installed)

AMI

(Installed)

N-UMCS

(Installed)

TCA (PRI1)

SICA (PRI2)

EIB (PRI3)

ATFP

CYBERSAFE

Functional Audit

Categorize

Systems

Assign Grade

Cyber Hygiene Ongoing

RMF AO/SCA

NAVFAC Cybersecurity

Resourcing (IT Staff only)

High Level Timeline for NAVFAC Cyber Initiatives

MilestonePlan & Implement Activities Ongoing Activities

100 FTE

Authorized

81 FTE

Authorized

70 FTE

Authorized46 FTE Hired

(31 DEC)

Assessed, interim secure, RMF started

Assessed, interim secure, RMF started

Assessed, interim secure, RMF started

Assessed, interim secure, RMF started

Page 5: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

5

Commanding Officer Accountability

Each CO will be responsible for completion of the following priority activities.

This will require coordination between CNIC and NAVFAC.

Activity Description

Cyber Hygiene System Inventory

Update hardware and software

Change default passwords

Inventory Leverage existing resources to begin inventory process (Maximo, DCIP if available;

POC ISSM)

Conduct manual inventory of buildings and assets with CIO4, PW6 and ISSM

Criticality Assessment Group mission capabilities by relative importance

Decompose mission capabilities into critical functions

Map missions and critical functions to critical components

Identify and include components that do not directly implement critical functions but

have unmediated access to or protect critical functions

Assign Criticality Levels to the identified critical components

CYBERSAFE Assign CS Levels 1-4

Assign Grades A/B/C

Assign Conditions of Readiness X/Y/Z

RMF Categorize Information Systems

Select Security Controls

Implement Security Controls

Assess Security Controls

Receive ATO

Monitor Security Controls

Remove unused accounts

Train administrators and operators

Page 6: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

6

Cybersecurity Enterprise Dashboard

Page 7: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

7

CYBERSAFE- SYSCOM Office Certification

Supply Chain Risk

Mgmt

NAVSUPSYSCOM

15-16 Mar2016

Lessons Learned

ADNSSPAWAROPNAV

2-6 Nov2015

SSDS NAVSEA12-14 Jan

2016

ICS Platform Enclave

NAVFAC26-28 Jan

2016

H60 & Unmanned

VehicleNAVAIR

8-10 Feb2016

GATORMARCORSYSCOM

TBD

Lessons Learned

Lessons Learned

Lessons Learned

Lessons Learned

Implementation Test-

Drives will serve as a

certifying event for

CYBERSAFE processes at

each SYSCOM

HQMC Lead

Page 8: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

8

Functional Audit Objectives

Assess NAVFAC CS management processes are compliant with the

Draft CS Instruction V.06

Conduct tabletop process review of NAVFAC CS Program to assess

end-to-end program compliance

This audit did NOT focus on technical assessment of Industrial

Control System Platform Enclave

Page 9: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

9

Functional Audit Outbrief

Evident that this is a Commander’s priority– Mr. McLaurin 9-month detail to OPNAV CYBERSAFE Office & Navy Cybersecurity Division (formally TFCA);

Ms. Deb Jordan was TFCA Deputies participant

Two major findings– Designation Letter for NAVFAC CYBERSAFE Program Director

• COMPLETED

– Designation Letter for CYBERSAFE ICS-PE Program

• COMPLETED

Improvements – People – capacity for execution

– Processes – sufficient and maturing while we learn

– Authorities - documentation revisions

NAVFAC and ICS-PE Program commitment list– Regular progress updates

SECNAV/OPNAV Instructions

Provided lessons learned for future audits– NAVAIR: February 2016

– NAVSUP: March 2016

Final Report upon completion of all audits

Purpose: To assess if NAVFAC’s CYBERSAFE (CS) management

processes are compliant with the Draft CS Instruction v0.6

Page 10: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

10UNCLASSIFIED/FOUO

Audience:

Air Force, Army, Marine Corps,

Navy, DLA, National Labs, CYBERCOM,

and OSD

Speakers:

NAVFAC, Air Force, Army, Navy, Office of

Naval Research, SPAWAR, NAVSEA,

USACE, AFCEC, DOD, National Labs

Over 90 attendees over the course of the 4-day conference

Attendees included 18 SES, 1 Flag Officer, and 4 Senior Officers

Attendee feedback was collected on a scale of 1-5 (unsatisfied to very satisfied) via survey for a

series of questions; overall satisfaction analyzed for Days 1-3 fell in the satisfied to very

satisfied range

Audience Metrics

Organizations Present

Tri-Service TEM Metrics

4.79

4.48 4.424.15

4.74

1

2

3

4

5

Day One Day Two Day Three Day Four Overall

Rating

RESPONDENT OVERALL SATISFACTION

Page 11: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

11UNCLASSIFIED/FOUO

1

TEM Day 1

Facility Commands

Cyber Overviews:

NAVFAC

Air Force

USACE

Enterprise Cyber

Security:

Holistic Approach to

Cybersecurity

The Unique Challenges

to Secure Control

Systems

Navy’s Task Force

Cyber Awakening

Air Force’s Task Force

Cyber Secure

2

TEM Day 2

Cyber Security

Science:

Delivery Secure

Facilities

Planning Secure

Facilities

Johns Hopkins

University/Applied

Physics Lab

Cyber Security Policy:

Navy: OPNAV N2/N6

Air Force: AFCYBER

ARCYBER/2nd Army

OSD: Overview of

Efforts

3

TEM Day 3

Technical Discussion:

Navy’s Platform Enclave

New Instruction:

Cyber UFC and UFGS

DoD Guidance:

Risk Management

Framework:

Fundamentals, Process,

and Issues

4

TEM Day 4

Roundtable

Discussions:

Outcome of Army’s

Systematic CS

Inspection

Update on Control

System Inventory

Configuration

Management Control

Workforce

Development Plan

Strategy to Cyber

Secure Facilities

Navy Control Systems

Test Bed

Tri-Service TEM Agenda

Page 12: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

12UNCLASSIFIED/FOUO

Overarching Tri-Service TEM Themes

The following themes were reiterated throughout the TEM:

3. Differentiate Compliance vs. Residual Risk

4. Reach Reciprocity through Inheritance

5. Consolidate Assessments

2. Address Policy Gaps

1. Train the Workforce

Provide training for the workforce which allows them to be successful given new requirements

Consider the following trainings: control systems, cybersecurity, facility engineering, etc.

Consolidate existing assessments to one that meets varying needs

Reduce level of effort to collect required information

Create DOD-level policy to provide standard direction across services

Develop cradle to grave guidance which can be used to cyber secure facilities (RFP through build and

maintenance)

Risk Management Framework is used as a compliance tool but should be leveraged to determine overall risk to the

mission and to the shore domain

Compliance does not equate to security

Leverage service specific accreditations across DOD to reduce duplication of effort for similar systems

Risk Management Framework process maximizes inheritance within the systems

Page 13: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

13UNCLASSIFIED/FOUO

Audience:

SPAWAR, NAVSUP, NAVSEA, NAVFAC,

Navy Information Forces, DOE,

NAVMETOCCOM, ONI, OPNAV N46,

CNIC, NAVMED, PNNL

Speakers: CNIC, DISA, NAVAIR,

NAVFAC, NAVMED, NAVMETOCCOM,

NAVSUP, OPNAV, SPAWAR,

USCYBERCOM, PNNL

Over 80 attendees over the course of the 4-day conference

Attendees included 13 SES, 2 Flag Officers, and 4 Senior Officers

Attendee feedback was collected on a scale of 1-5 (unsatisfied to very satisfied) via survey for a

series of questions; overall satisfaction analyzed for Days 1-3 fell in the satisfied to very

satisfied range

Audience Metrics

Organizations Present

Navy Ashore TEM Metrics

4.65 4.65 4.59 4.43 4.56

0

1

2

3

4

5

Day One Day Two Day Three Day Four Overall

Rating

RESPONDENT OVERALL SATISFACTION

Page 14: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

14UNCLASSIFIED/FOUO

Navy Ashore TEM Agenda

1

TEM Day 1

Navy Cyber Overview

NAVFAC’s Cyber Role Ashore

NAVSUP Cyber Overview

2

TEM Day 2

Navy’s Cybersecurity

Landscape

Navy Exchange Service

Command Information

Technology Overview

Supply Chain Cyber Landscape

Securing Power to the Navy

3

TEM Day 3

Cybersecurity

Architecture

Shore Control Systems Test Bed

Zoning and Anomaly Detection in

a Low Entropy Environment

IA / TA Update

4

TEM Day 4

Command Cybersecurity

Overview

NAVSEA

SPAWAR

NAVAIR

NAVFAC’s Role as Shore AO /

SCA

Components of

Cybersecurity

IoT Vulnerability Research,

Cyber Talent Gaps, and the

Global CSIRT Community

NAVFAC’s Security Architecture

Cyber Engineering Best

Practices

Cyber Hygiene

Cyber UFC and UFGSCybersecurity Technology

in Action

Cyber in Medical Technology

Cybersecurity for the Naval

Meteorology and Oceanography

Comment

Breaking Down Barriers and

Modernizing Cyber in the Navy

Ashore Environment

Securing Building and Utility

Systems

Tri-Service TEM Summary

and Highlights

Cybersecurity Strategic

Approach

Securing the Security Systems

PSNet for Secure Transport

Enabling the Fleet

Cybersecurity Workforce

Development

1

TEM Day 1

Navy Cyber Overview

NAVFAC’s Cyber Role Ashore

NAVSUP Cyber Overview

2

TEM Day 2

Navy’s Cybersecurity

Landscape

Navy Exchange Service

Command Information

Technology Overview

Supply Chain Cyber Landscape

Securing Power to the Navy

3

TEM Day 3

Cybersecurity

Architecture

Shore Control Systems Test Bed

Zoning and Anomaly Detection in

a Low Entropy Environment

IA / TA Update

4

TEM Day 4

Command Cybersecurity

Overview

NAVSEA

SPAWAR

NAVAIR

NAVFAC’s Role as Shore AO /

SCA

Components of

Cybersecurity

IoT Vulnerability Research,

Cyber Talent Gaps, and the

Global CSIRT Community

NAVFAC’s Security Architecture

Cyber Engineering Best

Practices

Cyber Hygiene

Cyber UFC and UFGSCybersecurity Technology

in Action

Cyber in Medical Technology

Cybersecurity for the Naval

Meteorology and Oceanography

Comment

Breaking Down Barriers and

Modernizing Cyber in the Navy

Ashore Environment

Securing Building and Utility

Systems

Tri-Service TEM Summary

and Highlights

Cybersecurity Strategic

Approach

Securing the Security Systems

PSNET for Secure Transport

Enabling the Fleet

Cybersecurity Workforce

Development

Page 15: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

15UNCLASSIFIED/FOUO

Overarching Navy Ashore TEM Themes

The following themes were reiterated throughout the TEM:

3. Educate on Risk Management Framework

4. System Inter-relationships Ashore

2. Train the Workforce

1. Fleet: One Team, One Fight

Users must understand that cybersecurity is no longer an option, it’s the ‘way of life’

Cross-SYSCOM team working with Fleet, OPNAV, FCC and other stakeholders

Provide training for the workforce which allows them to be successful given new requirements

Understand the differences between HQ and Echelon personnel

Workforce retention and insourcing inherently government roles is critical

Risk Management Framework offers a systems-engineering based approach to managing security controls

Compliance does not equate to security; what risk is being assumed

Selection of security controls presents an opportunity for inheritance

Recognize complexity of shore systems with other SYSCOMs back to NAVFAC

Collaboration is paramount to accurately assess and secure control systems against adversaries

Page 16: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

16

Workforce Development

Gaps realized with the need to cyber secure control systems:–Business Systems security process is well defined and appropriately staffed; not

applicable to control systems under old requirements

–Control Systems were installed without regard to cybersecurity; supported by facility

engineers and last for decades with little change

–Traditional cyber staff lack control system experience and process knowledge

–Facility Operational personnel prioritize availability, not cybersecurity

–Accreditation: business focused; ashore control systems not required

Solution to begin workforce development:–Insert cyber into each step of Facility Life Cycle

–Train & Team with SME process owners

–Develop cyber criteria, specs, and guidance

–Take on SYSCOM TA role and AO/SCA mission

–Leverage SYSCOM partners’ courses

–Increase awareness with every opportunity

Training dedicated cybersecurity staff onboard and along existing staff to become cyber-smart || Control System

Cyber Boot Camps DEC 15 and MAR/JUN 16 || Standards, Guidance & Processes being created and updated

Page 17: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

17

Workforce Training

The following actions are being taken to develop workforce:

Explore control system cyber security certification programs

Increase Validator, Information Assurance training

Obtain forensic, monitoring, and ethical hacking expertise

Build expertise for IT and SCADA product programs

Gain training on cyber security tools and supporting suite

Partner with DoD Cyber Range and leverage National Labs

0

50

100

FY14 FY15 FY16 FY17 FY18

1133

4611

43

70 81100

Hired Authorized

Provide internal training (i.e. NAVFAC ICS

Boot Camp Dec ’15):

–Security Architecture, Threat, Control

Systems, Substation, ICS OPS Center,

Strategy

–Participation with NAVFAC Functional,

OSD, Air Force, SECNAV, CNIC, USMC

Utilize global cybersecurity support staff

– 9 Regions, Dev Lab and Test Bed

NAVFAC Cybersecurity Staff

Page 18: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

18UNCLASSIFIED/FOUO

Current Challenges

Risk Management Framework Knowledge gap of experience exists- makes the transition from DIACAP to RMF seem very

daunting

The application of RMF is not clearly defined; must identify shore critical assets in addition

to TCAs

There is disagreement surrounding how to measure risk vs. compliance

Workforce Education and Training Agility is something to insource

Differences in training approaches in the cyber workforce, about cyber hygiene,

and between the fleet vs. echelon staff

Coordination within and between Organizations Looking for more buy-in and support from external organizations

Furthering partnerships within Navy, DoD, National Labs

Continuing momentum with process after the TEM has concluded

1

2

3

NAVFAC also recognizes there are current challenges that may prevent organizations

from reaching their ideal cybersecurity end state.

Unified Presence and Stance Implementation of CYBERSAFE across the supply chain and all of Command IT ashore

Standardized definitions and requirements

Set expectations from Command to Users- one team, one fight

Contradicting perspectives of “secure” systems between non-DOD government leaders,

who follow industry convention, and the DoD intelligence community

4

Page 19: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

19

RMF for IS and PIT Systems

Step 1 Categorize Systems

Step 2 Select Controls

Step 3 Implement Security Controls

Step 4Assess Security

Controls

Step 5 Authorize System

Step 6 Monitor Security

Controls

Categorize the systems in

accordance with the CNSSI

1253

Initiate the Security Plan

Register the system with DoD

Component Cybersecurity

Program

Assign qualified personnel to

RMF roles

Common control identification

Select security controls

Develop system-level continuous

monitoring strategy

Review and approve the security

plan and continuous monitoring

strategy

Apply overlays and tailor

Implement Controls Solutions

consistent with DoD component

cybersecurity architectures

Document security control

implementation in the security

plan Develop and approve security

assessment plan

Assess security controls

SCA prepares security assessment

report (SAR)

Conduct initial remediation actions

Determine impact of changes to the

system and environment

Assess selected controls annually

Conduct needed remediation

Update security plan, SAR and POA&M

Report security station to AO

AO reviews reported status

Implement system decommissioning

strategy

Prepare the POA&M

Submit Security Authorization

Package to AO

AO conducts final risk

determination

AO makes authorization decision

Risk Management

Framework (RMF) for

DoD IT replaces

previous DIACAP

framework in providing

DoD Information

Assurance.

The RMF POA&M for

Operational

Technology is

currently being

developed by

NAVFAC with an

expected

implementation start

date in 2017.

FEC cybersecurity

team members will

use the RMF POA&M

to implement controls

based on the

assessments and

grading done during

CYBERSAFE.

Page 20: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

20

ICS-PE / N-UMCS Relationship

Base A

Base B

Base C

Page 21: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

21

Appendix

Page 22: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

22

CYBERSAFE Assessment Components

Cyber System Level Cyber Condition

Y

Z

X FULL NET

• --------------

• --------------

• --------------

• --------------

TE

CH

NIC

AL

CA

PA

BIL

ITIE

S

CYBERSAFE Grade

NO NET

SEMI NET

• --------------

• --------------

CSL 1: Platform Safety

CSL 2: Platform Combat

CSL 3: Networked Combat

CSL4: Sustained Combat

Grade A:

Mission Critical

Grade B:

Mission Essential

Material Grade C:

Non-Mission Essential

Operate

Operating mode of platform based on likelihood of cyber attack

Design

Functionality Hierarchy of system to end-to-end mission

Procure, Design & Build

Level of cyber protection incorporated into system design

CYBERSAFE is the assessment of assets to determine criticality categorization and

grade in preparation for controls assignment.

The assessment consists of the following three components:

− Cyber System Levels

− CYBERSAFE Grades

− Cyber Conditions of Readiness

Page 23: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

23

NAVFAC CYBERSAFE Prioritization Approach

NAVFAC will leverage existing Mission Assurance (MA) efforts and lessons

learned from these efforts to execute CYBERSAFE across the command.

NAVFAC will prioritize all assets to determine the order they will be

assessed for CYBERSAFE compliance utilizing the following approach:

Priority 1: Task Critical Assets.

Priority 2: Supporting Infrastructure Critical Assets.

Priority 3: Other priority assets as identified by CNIC’s Commander and

Combatant Commands.

Priority 4: All remaining assets.

FEC cybersecurity teams will contribute to CYBERSAFE categorization,

grading, and documentation.

Page 24: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

24

FEC CYBERSAFE Process

NAVFAC System Categorized process begins with FEC level system

categorization.

FEC cybersecurity teams will:

Categorize the system using Navy’s CYBERSAFE and RMF standards and

guides.

Assign CYBERSAFE grade using CYBERSAFE grade criteria and AO

standards.

Conduct criticality analysis.

Assign CYBERSAFE controls based on grade.

Tailor controls based on RMF Process.

Document and justify security controls for RMF and CYBERSAFE.

Documents generated at the ECH IV level will be reviewed and approved

by ECH III and NAVFAC CYBERSAFE PMO.

NAVFAC approved documents will be distributed to OPNAV,

FFC/CPF/FCC, TYCOMS, and IDFOR.

Page 25: Shore Triad Cyber Summit NAVFAC Cyber Strategy Update Cyber... · kind) and a Navy Technical Exchange Meeting (TEM) for Cyber security. ... Agility is something to insource Differences

25

CYBERSAFE Audit Team Members

OPNAV N2/N6 (Theresa Everette, CDR Low, Paula Jackson)

NAVFAC (Mike Kilcoyne, Marrio McLaurin, James Kim, Craig St. John)

CNIC (Wendy McFadden, Kim Ellis)

NAVSEA (Pat Hoff)

SPAWAR (Charlie Nolan)

IDFOR (CDR Fernandez, LCDR Fisher)

MARCORSYSCOM (Erin Valliere)

NAVAIR (Kafayat Kelani)

NAVSUP (Steve Kozick)

FCC (Alan Rickman)