Datasets:

Modalities:
Text
Formats:
text
Languages:
English
Libraries:
Datasets
License:
CoCoHD_transcripts / data /CHRG-114 /CHRG-114hhrg20077.txt
erikliu18's picture
Upload folder using huggingface_hub
067e9f5 verified
<html>
<title> - [H.A.S.C. No. 114-117] HEARING ON NATIONAL DEFENSE AUTHORIZATION ACT FOR FISCAL YEAR 2017 AND OVERSIGHT OF PREVIOUSLY AUTHORIZED PROGRAMS BEFORE THE COMMITTEE ON ARMED SERVICES HOUSE OF REPRESENTATIVES ONE HUNDRED FOURTEENTH CONGRESS SECOND SESSION</title>
<body><pre>
[House Hearing, 114 Congress]
[From the U.S. Government Publishing Office]
[H.A.S.C. No. 114-117]
HEARING
ON
NATIONAL DEFENSE AUTHORIZATION ACT
FOR FISCAL YEAR 2017
AND
OVERSIGHT OF PREVIOUSLY AUTHORIZED PROGRAMS
BEFORE THE
COMMITTEE ON ARMED SERVICES
HOUSE OF REPRESENTATIVES
ONE HUNDRED FOURTEENTH CONGRESS
SECOND SESSION
__________
SUBCOMMITTEE ON EMERGING THREATS AND CAPABILITIES HEARING
ON
FISCAL YEAR 2017 INFORMATION
TECHNOLOGY AND CYBER PROGRAMS:
FOUNDATIONS FOR A SECURE WARFIGHTING NETWORK
__________
HEARING HELD
MARCH 22, 2016
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
U.S. GOVERNMENT PUBLISHING OFFICE
20-077 WASHINGTON : 2017
-----------------------------------------------------------------------
For sale by the Superintendent of Documents, U.S. Government Publishing
Office Internet: bookstore.gpo.gov Phone: toll free (866) 512-1800;
DC area (202) 512-1800 Fax: (202) 512-2104 Mail: Stop IDCC,
Washington, DC 20402-0001
SUBCOMMITTEE ON EMERGING THREATS AND CAPABILITIES
JOE WILSON, South Carolina, Chairman
JOHN KLINE, Minnesota JAMES R. LANGEVIN, Rhode Island
BILL SHUSTER, Pennsylvania JIM COOPER, Tennessee
DUNCAN HUNTER, California JOHN GARAMENDI, California
RICHARD B. NUGENT, Florida JOAQUIN CASTRO, Texas
RYAN K. ZINKE, Montana MARC A. VEASEY, Texas
TRENT FRANKS, Arizona, Vice Chair DONALD NORCROSS, New Jersey
DOUG LAMBORN, Colorado BRAD ASHFORD, Nebraska
MO BROOKS, Alabama PETE AGUILAR, California
BRADLEY BYRNE, Alabama
ELISE M. STEFANIK, New York
Kevin Gates, Professional Staff Member
Lindsay Kavanaugh, Professional Staff Member
Neve Schadler, Clerk
C O N T E N T S
----------
Page
STATEMENTS PRESENTED BY MEMBERS OF CONGRESS
Langevin, Hon. James R., a Representative from Rhode Island,
Ranking Member, Subcommittee on Emerging Threats and
Capabilities................................................... 2
Wilson, Hon. Joe, a Representative from South Carolina, Chairman,
Subcommittee on Emerging Threats and Capabilities.............. 1
WITNESSES
Halvorsen, Hon. Terry, Chief Information Officer, Department of
Defense........................................................ 3
Levine, Hon. Peter, Deputy Chief Management Officer, Department
of Defense..................................................... 3
APPENDIX
Prepared Statements:
Halvorsen, Hon. Terry........................................ 26
Levine, Hon. Peter........................................... 35
Wilson, Hon. Joe............................................. 25
Documents Submitted for the Record:
[There were no Documents submitted.]
Witness Responses to Questions Asked During the Hearing:
Mr. Ashford.................................................. 44
Mr. Lamborn.................................................. 44
Mr. Langevin................................................. 43
Ms. Stefanik................................................. 44
Questions Submitted by Members Post Hearing:
Mr. Kline.................................................... 52
Mr. Lamborn.................................................. 53
Mr. Langevin................................................. 51
Mr. Wilson................................................... 49
FISCAL YEAR 2017 INFORMATION TECHNOLOGY AND CYBER PROGRAMS: FOUNDATIONS
FOR A SECURE WARFIGHTING NETWORK
----------
House of Representatives,
Committee on Armed Services,
Subcommittee on Emerging Threats and Capabilities,
Washington, DC, Tuesday, March 22, 2016.
The subcommittee met, pursuant to call, at 3:43 p.m., in
room 2118, Rayburn House Office Building, Hon. Joe Wilson
(chairman of the subcommittee) presiding.
OPENING STATEMENT OF HON. JOE WILSON, A REPRESENTATIVE FROM
SOUTH CAROLINA, CHAIRMAN, SUBCOMMITTEE ON EMERGING THREATS AND
CAPABILITIES
Mr. Wilson. I call this hearing of the Emerging Threats and
Capabilities Subcommittee of the House Armed Services Committee
to order. I am pleased to welcome everyone here today for this
hearing on the fiscal year 2017 budget request for information
technology [IT] and cyber programs.
Lately the Secretary has been highlighting the need for
increased innovation in the Department of Defense [DOD] through
public-private partnerships--and I was grateful that Secretary
Ashton Carter was here yesterday on this issue, so it is right
on point--as well as the importance of generating new
capabilities to offset growing advantages of future potential
adversaries.
I believe that information technology and cyber will both
serve as key enablers and, at the same time, present key
challenges for the Department as it tries to realize its
vision.
In this time of fiscal constraint, I also believe it is
equally important to enforce management rigor to make sure that
we are squeezing the most out of every defense dollar where it
makes sense. We need to learn from industry and use the kinds
of business analytics and business intelligence methods that
work so well in the commercial sphere. That also means using
commercial tools to the maximum extent, especially in areas
like business systems and cloud computing.
We need to find better ways to foster and maintain our own
human capital to support the acquisition and management of
information technology and cyber systems. In looking through
this most recent budget request, I want to make sure the
Department is emphasizing these two complementary tracks--
increased innovation, as well as increased management
discipline.
I would like to welcome my distinguished panel of witnesses
and appreciate their perspectives on all of these issues. This
panel includes the Honorable Terry Halvorsen, Chief Information
Officer [CIO], Department of Defense, the Honorable Peter
Levine, the Deputy Chief Management Officer [DCMO], Department
of Defense.
I would like now to turn to my friend and ranking member,
Mr. Jim Langevin from Rhode Island, for any comments he would
like to make.
[The prepared statement of Mr. Wilson can be found in the
Appendix on page 25.]
STATEMENT OF JAMES R. LANGEVIN, A REPRESENTATIVE FROM RHODE
ISLAND, RANKING MEMBER, SUBCOMMITTEE ON EMERGING THREATS AND
CAPABILITIES
Mr. Langevin. Thank you, Mr. Chairman. Thank you for
convening this hearing. And I want to thank you to our
witnesses for testifying today on the President's fiscal year
2017 budget request for information technology and cyber
programs.
Last week, we heard about the cyber mission force build and
operations from Admiral Rogers, and today we will hear about
the infrastructure our warfighters operate within and defend
for the enterprise. Cyber Command [CYBERCOM] has advocated for
the ability to see the network in order to provide better
defense. The joint information environment, or JIE, is the
guiding effort for achieving this capability. And today I hope
to hear about the progress made under the JIE umbrella,
governance for this effort, and service contributions.
Another major undertaking I would like to discuss today is
implementing the Department's cloud strategy. The DOD's
migration to the cloud has slowed due to laborious
certification requirements and an acquisition system unable to
keep up with cloud services procurement. This also seems to
hinder any efficiency or cost savings that could otherwise be
achieved.
Finally, the DOD has been tasked with building and
maintaining the IT system for OPM's [Office of Personnel
Management's] new National Background Investigation Bureau.
While it makes sense the Department provide expertise on
building a secure system, I am concerned the DOD is assuming
all the risk by providing resources and assuming responsibility
for decisions made outside the Department.
As a long-term advocate for cybersecurity within this
subcommittee, I am glad we have taken the time to not only
discuss the build and operations, but also the infrastructure
our cyber warriors operate within every day over the last few
weeks.
Again, thank you, Mr. Chairman, and I want to thank our
witnesses for being here today to discuss this important topic.
And I yield back the balance of my time.
Mr. Wilson. Thank you, Mr. Langevin. And now welcome again
to our witnesses. Your written statements will be submitted for
the record, so we ask that you summarize your comments in 5
minutes or less, and then after that, each of the persons on
the subcommittee will go through a 5-minutes process and Kevin
Gates will make sure it is done correctly.
So we now begin with Mr. Halvorsen.
STATEMENT OF HON. TERRY HALVORSEN, CHIEF INFORMATION OFFICER,
DEPARTMENT OF DEFENSE
Mr. Halvorsen. Good afternoon, Mr. Chairman, Ranking
Member, and distinguished members of the subcommittee. Thank
you for this opportunity to testify before the subcommittee
today on the Department's information technology budget
request.
As the Department's CIO, I am the principal adviser to the
Secretary of Defense for information management, IT,
cybersecurity, communications, positioning, navigation, and
timing, spectrum management, senior leadership, nuclear command
control, and communications matters. Those latter
responsibilities are clearly unique to the DOD.
My imperative at the CIO in managing this broad and diverse
set of functions is to ensure that the Department has the
information and communications technology capabilities needed
to support the broad set of Department missions. This includes
supporting our deployed forces and cyber mission forces, as
well as business and warfighting support functions.
As Secretary Carter has stated, DOD must address strategic
challenges across all domains, not just air, land, and sea, but
increasingly in cyberspace. The Department's budget includes
funding to address these challenges, including IT and cyber
investments that are critical to the Department's warfighting,
intelligence, and business missions.
As the CIO, I am driving cultural, business, technical
improvements, and innovation into DOD's IT and cyber to better
support defense missions and operations. My written testimony
provides more detailed information on the Department's IT and
cyberspace budget and priorities.
I want to emphasize that these efforts require teamwork and
partnership within DOD, which includes DISA [Defense
Information Systems Agency], USD [Under Secretary of Defense]
AT&L [Acquisition, Technology, and Logistics] and Policy, U.S.
CYBERCOM, DCMO, and other partners.
External partnerships to DOD will also be critical, to
include Congress, industry, and our allies. I strongly believe
an expanded partnership with industry will be essential to
expanding and maintaining technology advantages, while
improving our fiscal accountability.
I thank you for your interest and support, and I look
forward to your questions.
[The prepared statement of Mr. Halvorsen can be found in
the Appendix on page 26.]
Mr. Wilson. Thank you, Mr. Halvorsen. We now proceed to Mr.
Levine.
STATEMENT OF HON. PETER LEVINE, DEPUTY CHIEF MANAGEMENT
OFFICER, DEPARTMENT OF DEFENSE
Mr. Levine. Thank you, Chairman Wilson, Ranking Member
Langevin, and members of the subcommittee.
I am Peter Levine, and I am the Deputy Chief Management
Officer of the Department of Defense. Two years ago, this
committee enacted legislation which will merge the offices of
the DCMO and CIO. However, that legislation does not take
effect until the beginning of the next administration, so until
that time, the CIO, Mr. Halvorsen, will remain the responsible
official within OSD [Office of the Secretary of Defense] for
IT, cybersecurity, and many of the other issues addressed in
your letter of invitation.
The DCMO's role, until such time as this merger takes
place, is limited to reviewing and approving of investments in
IT business systems. We do thank you in that regard for last
year's NDAA [National Defense Authorization Act], in which you
substantially streamlined and gave us more flexibility in the
way we do this. We intend to use this flexibility in several
ways.
First, we intend to change our focus from the discrete
review of each individual small investment and focus more on
portfolios, so we can be more forward-looking in our management
of business systems. Second, we plan to focus much more on
return on investment, so that we can ensure that when we invest
in business systems, we actually realize the benefits that we
should be able to get out of them, that we actually turn off
the legacy systems and reduce manning, where we can develop
more efficient and less manpower-intensive processes.
And finally, we are going to work to develop a streamlined
process for business systems where we can align our business
systems investment process, our CIO process, and our
acquisition process into a single process so that we don't have
to sequentially go through one after the other and put the
program manager through recurring hoops as we go forward.
We are firmly committed to working with you as we try to
make the business systems process more efficient and to improve
the Department's investment process and look forward to your
questions.
Thank you, Mr. Chairman.
[The prepared statement of Mr. Levine can be found in the
Appendix on page 35.]
Mr. Wilson. Thank you very much. And we will now proceed
with a 5-minute round. I want to commend Lindsay Kavanaugh and
Jim Langevin for achieving an extraordinary turnout today. So,
congratulations. You did good.
And I will begin with myself. And this is for both of you.
What do you see as the major budgetary challenges in this
year's President's budget request? Where are we accepting risk
based on current budget constraints?
Mr. Levine. I will give the gentle answer, which is not
enough money. And I will defer to Mr. Halvorsen as to the IT
budget specifically.
Mr. Halvorsen. I certainly echo Peter's first comment about
not enough money. I think in the IT area, we are taking some
risk in modernization. Some of it will slow. We are trying to
balance that and make sure that we don't take that risk in the
security side.
The other I think challenge that we are going to have in IT
may not be exactly in the budget, and it is going to be the
retention of the IT workforce. And frankly, that is going to
come down to an economic decision. I happened to be in the
valley [Silicon Valley] last week, and, you know, Google
announced they are raising the pay for cybersecurity by another
20 percent. That is going to keep impacting our ability to
attract talent.
If you ask me about the budget, what keeps me up more at
night, that is probably the answer, sir.
Mr. Wilson. And thank you very much. And, Mr. Halvorsen,
Chairman Mac Thornberry's most recent defense reform proposal
emphasizes prototyping experimentation. Can you tell us what
the Department is doing with regard to information technology
and cyber programs that highlight these approaches?
Mr. Halvorsen. Yes, thank you. I think a couple things that
we want to think about when we answer this question, much of
the innovation today being driven in the cyber and IT business
is coming from the commercial sector. We want to be closer tied
to the commercial sector, so thanks to some legislation last
year, I am able to now put people from DOD inside of business--
and we are doing that today--and also have business people on
my staff, which we are also doing today.
I think that partnership that we continue to strengthen is
a key to us getting the right innovation and getting it on
time.
Within the DOD, I want to focus our S&T [science and
technology] dollars around the areas the industry isn't going
to focus on, and that is going to be on the weapons systems and
top-level security systems, where there is not yet much play in
the commercial sector, and I think our budget reflects that
that is where our emphasis is and also reflects where we are
taking risk is around innovation dollars that we would have
that were inside the budget for commercial areas that we have
taken some risk and are not spending that much.
Mr. Wilson. And, again, I am impressed with the efforts by
Secretary Carter to work for public-private cooperation.
Additionally, Mr. Halvorsen, in the fiscal year 2017 budget
request, the Defense Information Systems Agency, the primary IT
provider for the Department, eliminated the S&T funding it had
to pursue innovation and technology demonstration. Please
explain the rationale for that decision and how this aligns
with the Secretary's emphasis on drawing in innovation from the
commercial sector.
Mr. Halvorsen. Yes, we certainly reduced DISA's S&T
funding. They still have some R&D [research and development]
money. But in the area we reduced it is aligned exactly--I
think what we have said before--today, where we are going to
get our information, and particularly true for most of DISA's
activities, which are supporting our business functions, is
from industry and commercial.
So in a constrained budget, in my opinion, that was where
we chose to take some risk, because I think I can get that same
innovation affect by strengthening our relationships with
commercial industry.
Mr. Wilson. Additionally, Mr. Halvorsen, section 901 of the
fiscal year 2015 NDAA mandated that the chief information
officer begin to exercise authority, direction, and control
over the Information Assurances Directorate of the National
Security Agency.
Recently, this subcommittee was made aware of a DOD
proposal to place that authority, direction, and control back
with the Under Secretary for Intelligence. Do you support the
Department's proposal? What are the pros and cons of keeping
that authority with the chief information officer?
Mr. Halvorsen. I don't know that the Department has made a
formal proposal yet. I know that it is being discussed.
Candidly, I would have some concerns about moving it away from
the DOD CIO, but more importantly what we are doing is working
with the intel side of the Department to form a governance
structure that will allow both CIO and intel equities in the IA
[information assurances] money to be addressed.
Mr. Wilson. Well, with your background, we would all
appreciate any input at any time as we consider these issues.
I now yield to Mr. Langevin.
Mr. Langevin. Thank you, Mr. Chairman. Again, I want to
thank both of our witnesses for being here and what you are
doing in the IT and cyber sphere.
So one of the questions I had--and, Terry, you talked about
it just a minute ago in terms of, well, the private sector
increasing what they are paying their cybersecurity folks, and
it is going to be particularly challenging now for us to
compete to get that top-end talent.
I know in the NDAA last year, we gave more flexibility to
the Department to try to take advantage of that IT talent. You
know, for example, allowing potentially--as I envision it--to
see private sector to be able to detail for maybe a year or two
these high-end individuals that, you know, it would be
challenging for us to both afford, attract, and keep for a long
period of time.
But, you know, companies have an interest in patriotic duty
and want to help secure the Nation in cyberspace. So we made
some progress in that with the NDAA, giving some flexibility to
the Department. Can you tell me, do you need additional
authorities to further take advantage of that talent so that we
have the cyber workforce that is as robust as possible and our
networks are as secure and as robust as possible?
Mr. Halvorsen. First, I would thank you for the NDAA last
year. That is helping some of the work we are able to do, the
excepted workforce in cyber, being able to bring the people in
from industry like we are doing now. I do think we will need
some legislation that probably changes slightly the rule sets
about what we are allowed to do with the industry people.
I think exactly what you stated. We really want to be able
to bring them in and have them sit in a position for a year,
being able to execute some decisions within the Department, and
then go back to industry, just like I think there is a market
space today for us to have some of our civilian employees go to
industry, and industry would like to have them--and I think we
will need to tweak some of the legislation so that could happen
more often.
I think we share the vision. In the end, we want more of an
in and out, back and forth. And you could really see the career
path in cyber IT changing so that it is not an all-civilian or
all-government career path, but a much more combined career
path. And I think that would serve the Nation well.
Mr. Langevin. Good. I mean, that is exactly where I hope
that we are going to be and that is what we want to get to.
Please, I hope you will work with us and tell us how we can be
of help in terms of additional legislation and language that
you need to get to that point.
So as I mentioned in my opening statement, I find it
appropriate the Department of Defense is involved in building a
new IT system for OPM's new National Background Investigation
Bureau [NBIB] that will house sensitive personnel information.
However, I am concerned that the DOD has been given
guidance and deadlines that are not realistic and is assuming
all responsibility for performance, when the decision-making
authority may be shared.
So my questions are, can you describe the Department of
Defense's role in building and maintaining a new IT system?
Specifically, what is the amount requested for fiscal year
2017, as well as in the out years? Was additional money added
to the top line for DISA's role in this effort? Or is it coming
out of hide?
What are the resources that are being provided for this
effort? Is the current workforce sufficient to meet the demand
or will additional personnel be billeted? Will the Department
have sole decision-making authority in building and maintaining
the system? Or is it shared with OPM and other communities? And
what timelines have been established for delivering the system?
And, Mr. Levine, if I could--Levine, I am sorry--what role
will you have in doing business process re-engineering to
change the way NBIB does business so it fits the IT system, not
the other way around? And if you need me to repeat any part of
that, I will be glad to. Sorry it is such a long list.
Mr. Halvorsen. So, sir, what I would like to do, because I
do think that question deserves a lot of matter, is I will make
some comments on it, but I will also like to take that for the
record and get back to you with some of the specific answers.
[The information referred to can be found in the Appendix
on page 43.]
Mr. Langevin. Fair enough.
Mr. Halvorsen. For 2017, it is $95 million. There was a
top-line increase to DOD for doing some of this. We will get
you the exact numbers across the FYDP [Future Years Defense
Program]. And then I would be foolish if I said there is not
some concern on DOD's part about how this is going to work, and
what I would assure you is from a standpoint of the build, we
are going to get the requirements from the group that is
looking at how we are going to redo the whole investigation
process.
When I have those requirements--and that group starts next
week, and we have members on it--we will build a system that
supports those requirements that also ensures security. If at
any time I think that that is not happening, I will be the
first to let you know.
I am comfortable right now that we have worked out a
governance process with OPM and OMB [Office of Management and
Budget] that makes DOD the decision maker for all of the
technical decisions and the security decisions, but I am still
concerned and we will have to see how that goes forward. And I
will get you more detail on the rest of the question.
Mr. Langevin. I would appreciate it, whatever additional
detail you could provide. And I would just assure we stand
ready to support you in this effort as you make the transition.
And Mr. Levine?
Mr. Levine. With regard to the business process re-
engineering, we definitely have less of a role in that than we
would have if the entire mission had been transferred to the
Department of Defense. However, it was never going to be
entirely the Department of Defense in any case because as you
know the DNI [Director of National Intelligence] establishes
security clearance policy, so we are always going to have to
work with outside agencies and reconcile differences with
outside agencies.
We are undertaking with the Under Secretary of Defense for
Intelligence to re-engineer the DOD part of the process. We are
looking at continuous evaluation. We are looking at other
measures to streamline our organization and streamline our part
of the process. And we do still have a piece--significant
pieces of the process. It is the investigation piece that OPM
has, but not the entirety of the process.
As we do that, we will see places where we are going to
want help, we are going to want changes in the OPM piece of the
process, and we will have to work that through the interagency,
because we don't control it, but we will work it through the
interagency process.
Mr. Langevin. Very good. Thank you. I yield back.
Mr. Wilson. Thank you, Mr. Langevin. We now proceed to
Congressman Doug Lamborn of Colorado.
Mr. Lamborn. Thank you. And I will get to the budget
implications of this in just a minute, but how active are we in
working with allies, NATO [North Atlantic Treaty Organization]
allies, Israel, et cetera, in combating cyber threats and cyber
attacks?
Mr. Halvorsen. Extremely active. A couple of the things
that we have done that I can talk about in this forum with the
Five Eye community,<dagger> we actually established last year a
CIO Five Eye group that meets physically every 6 months,
virtually every quarter. Our next meeting is in London, where
cybersecurity is certainly one of the big topics. We have had
visits to Israel, exchanging data. That continues.
---------------------------------------------------------------------------
<dagger> ``Five Eyes'' is an intelligence alliance involving
Australia, Canada, New Zealand, the United Kingdom, and the United
States.
---------------------------------------------------------------------------
I just came back from Korea and Japan, where that was a
major topic. I can tell you that the NATO partners, Korea,
Japan, Germany, have all adopted the DOD cybersecurity
scorecard as the basis for measuring how effective we are doing
cybersecurity basics across the board, which I think is a big
breakthrough.
So we can probably give you some more detail, and we will
take that for the record, but they are the major things that we
are doing to improve our information-sharing.
[The information referred to can be found in the Appendix
on page 44.]
Mr. Lamborn. Well, that is good to hear. And do you have
any recommendations in the budget on maybe making that even
stronger? Or, I mean, I know you have a good budget that you
are defending right now, but do you see any room for
improvement in that area in particular?
Mr. Halvorsen. You know, I do see room for improvement, but
I don't think right now that is a money issue for improvement.
I think it is more of getting all of us aligned to the right
principles and basics.
Today we have made good progress within NATO--and as I
said, Japan and Korea and Germany--there is some other work we
need to do with other partners.
I will be in Estonia in June working some of those issues.
And what I would like to do is when I come back from that, I
will have a better site picture, is maybe give you some more
answers on what I think we might need to do to go beyond some
of our traditional allies.
Mr. Lamborn. Okay. I appreciate that. I would like to
follow up on this conversation at another time. Thank you, Mr.
Chairman.
I yield back.
Mr. Wilson. Thank you, Mr. Lamborn. We now proceed to
Congressman Jim Cooper of Tennessee.
Mr. Cooper. Thank you, Mr. Chairman. First, the Santa Claus
question. Both of you mentioned that you would like to have
more money. How much? And for what?
Mr. Levine. I would say that as the DCMO, my responsibility
is finding efficiencies. I am not actually looking for more
money. The Department is looking for more money. I am trying to
identify efficiencies within the Department where I can free up
money so that we can invest more in the long-range science and
technology programs and force structure and things that we need
to keep our force ready to go today and ready to go in the
future. That is where I need more money.
I would defer to Mr. Halvorsen as to specific IT
investments.
Mr. Halvorsen. I think to upgrade some of our legacy
systems. And I can get back to you with a number on that. And
to tie back with Peter, I think some investment in the legacy
systems--and particularly some of the larger both HR [human
resources] personnel and pay systems--those investments would
do two things for us.
One, we would certainly improve security. There are some
issues we need to fix there. Secondly, I think we could improve
efficiency, and after we made those investments, I actually
think the return on investment would be pretty good. But I will
come back to you with a number, sir.
[The information referred to was not available at the time
of printing.]
Mr. Cooper. Thank you. Now the Scrooge question. Pentagon
is the least auditable of all government agencies. It has been
a risk factor for the GAO [Government Accountability Office]
for 20 years, the number one risk factor. Will your IT work
help the Pentagon get audited faster?
Mr. Levine. The answer is yes. Improved business systems,
improved financial management systems definitely make an
impact. We are much closer today to being auditable than we
were 10 years ago. A significant part of that is because of the
ERP [Enterprise Resource Planning] investment. But there are
many, many hurdles we have to get over that are not IT, and IT
can't solve it by itself.
We have policy issues that we have been kicking down the
road 10 years that now that we are facing a 2017 deadline, we
are finally getting people to be serious about and say, hey,
yeah, we actually have to make those decisions, we have to
figure out how we are going to go about that.
So the DCMO co-chairs the governance board, the FIAR
[Financial Improvement and Audit Readiness] governance board,
which is responsible for trying to drive the Department toward
audit with the Comptroller, with Mike McCord. And since I
arrived at the Department about 10 months ago, we have been
trying--we have set the Department on a program of identifying
what our key interim milestones are that we need to hit in
order to become auditable.
We have identified a lot of things that should have been
addressed 5 years ago or 10 years ago, but we are trying to
chip away at them one at a time, and we think that the deadline
is extremely constructive in pushing us toward that objective.
The Department seems to have an infinite ability to kick
things down the stream and facing a deadline that is 2 years
away really helps focus the attention.
Mr. Cooper. Well, some people would say 2017 is next year,
not 2 years away.
Mr. Levine. It is October 1, 2017. I guess we can--a year
and a half is what that is, yes, sir.
Mr. Cooper. Doesn't sound like you are very optimistic
about meeting the deadline.
Mr. Levine. When I came before the Senate Armed Services
Committee for my nomination hearing about almost exactly a year
ago, I testified that I had never been confident the Department
was going to meet the deadline, and I couldn't change my
position just because I was testifying for confirmation.
So I can't change my story now. I am skeptical that we will
have done everything we need to do. But I am going to push as
hard as I possibly can to get us there.
Mr. Cooper. Okay, now the long-awaited question of the
ghost of Christmas past. The Joint Chiefs hack, there was
apparently somebody who signed on to an e-mail, like the
equivalent from the Nigerian prince or something. Has that
person been identified who opened that foolish e-mail? And
would it help if they were identified, if they not been
identified previously?
Mr. Levine. I will say that the people that opened the e-
mail have been identified, and we have looked at the reasons
why, and in some cases, we did some remediation. In other
cases, they had followed the right procedures, up to a point,
and we needed to do some more training. That has been put in
place to do that, but I would also say that was also one that
was caught very quickly.
We had very limited exposure--still would like to do
better--but the system and when you look at the volume of e-
mail traffic that comes into DOD, how many we get, and the
number of people that click, great improvement. We are
certainly holding people accountable to a higher standard now.
We have signed out the cyber accountability culture
document that was signed by DEPSECDEF [Deputy Secretary of
Defense]. Myself, Frank Kendall, and Mike Rogers have signed
out the accountability procedures document to make it down to
the individual and command level, so I think we have made
progress in that area.
I don't think identifying any more individuals at any more
level would be helpful right now.
Mr. Cooper. I see my time has expired, Mr. Chairman.
Mr. Wilson. Thank you, Mr. Cooper. We now proceed to
Congresswoman Elise Stefanik, of New York.
Ms. Stefanik. Thank you, Mr. Chairman, and thank you to the
panelists for being here today. I have two questions. The first
one will be quite broad. The second one will be quite specific.
As you are well aware, the threats to the United States have
evolved dramatically in the last 10 years. State and non-state
adversaries have adapted to a new digital environment quite
well. And it is important that the United States invests in the
time, training, and infrastructure to counter the whole
spectrum of cyber threats.
So as we see in the news, cyber provocation against the DOD
infrastructure continues to increase, what is your assessment
of the DOD's ability to counter such intrusions today? And what
can I tell soldiers that I represent at Fort Drum in my
district what we are doing to ensure that they are protected?
And what have we learned about the enemy? And how has that
changed our approach? That is the first broad question.
Mr. Halvorsen. Again, I will make some comments on it, but
we will take that for the record, because I think it is a good
question and we owe you some better details on that.
[The information referred to can be found in the Appendix
on page 44.]
Mr. Halvorsen. We certainly have improved training across
the board in the cyber spectrum. The cybersecurity culture
issue is one that is on top of the Secretary's desk. We meet
every month on the cybersecurity scorecard, and a part of that
gets to what is the training of the individuals. The networks
themselves are much better today. They are not exactly where we
want them. We have got three major efforts to improve that.
The first one is, you are probably aware that the Secretary
has directed that this year we move as much of DOD as
possible--the ones that are on Windows operating systems--to a
Windows 10 baseline. I cannot stress the criticality of us
getting that done.
Right now, when you try to look at the visibility of the
networks, while we are making improvements, you are doing that
across multiple operational systems, multiple baselines. It is
impossible to do, do well.
Getting to a single baseline for Windows--and that is about
80 percent to 85 percent of the DOD--will give us the ability
to have better visibility. Windows 10 is the first operating
system that really thought about security right from the
beginning and has in-built features that we will take advantage
of.
It will also allow us to go to the next step, which is how
do you then start taking and really using cloud computing
technology to improve your security? So we are positioned to do
that. We have got things we have to get done, and the first one
is to get the Windows 10 done.
The other big initiative is to complete the joint regional
security stacks. In its simplest forms, what that does is lower
our footprint. Today, we have got 1,000 points that you can
come in. When the joint regional security stacks are done, we
will have less than 100 points. That is a lot easier to defend,
and we can focus more on it.
It also stops us from doing our own self-denial attacks,
which are also--happen when you are trying to keep aligned over
1,000 different firewalls. We will reduce the firewalls, have
better overall security and visibility into the networks. That
is what we are doing at the big end.
Ms. Stefanik. Okay, so the specific questions are actual
follow-ups to your answer. When you reference the cybersecurity
scorecard process, what is the scorecard exactly? Can you get
into more specifics? Can this information and will this
information be shared with Congress? Are there plans to expand
scorecards beyond cybersecurity? And how does a negative
scorecard rating of a DOD component, what is the consequence of
that?
Mr. Halvorsen. Again, we will give you some more details in
writing, but here is what I can tell you. The scorecard is
looking at what we have defined right now as basic areas that
we should be measuring. One of them is, is everybody using a
secure token to access DOD systems.
The advantage of that is, is immediate. If you are using
the token, A, we know exactly who logged in, when they logged
in, where they are at, and it is a lot harder to fake that
access. So it is an immediate improvement.
Ms. Stefanik. Can that information be shared with Congress?
Mr. Halvorsen. Actually, I am happy to give it to you. We
have actually shared it with other committees, and I am happy
to send one over when I get back, the current scorecard.
Ms. Stefanik. And the results of the scorecards that are
shared?
Mr. Halvorsen. The results is right on it. It will show you
where we are at. We are not where we want to be in all of the
areas. We are measuring ourselves to extremely high standards.
One of the things that I just want to say upfront, when you
look at cyber, you could hit 80 percent and a lot of people
would think that would be good. In cyber, that is not good
enough.
So when you see that we are in yellow and, in some cases,
red, it is because we are trying to get above in almost every
category 95 percent to be green.
Ms. Stefanik. And the last question is, you talked about
the Department's plans to move to the Windows 10 operating
system with a mandate to so by a certain date. What is the cost
of that transition?
Mr. Halvorsen. I don't know the exact cost yet. We will get
that to you. But what I could tell you, the cost not to do that
would be in the billions.
[The information referred to can be found in the Appendix
on page 45.]
Ms. Stefanik. Great, I would look forward to getting more
of that in writing afterwards. I yield back.
Mr. Wilson. And thank you, Congresswoman Stefanik. We now
proceed to Congressman Pete Aguilar of California.
Mr. Aguilar. Thank you, Mr. Chairman. Mr. Halvorsen, can
you talk to me broadly about in your testimony you talk about
cloud computing. Where will cloud computing be in 5 years and
in 10 years?
Mr. Halvorsen. In 5 years, I am hopeful that we will be in
an almost complete virtual cloud environment, and cloud defined
this way. We will have private clouds, which are completely
private within segments of DOD. We will have private clouds
that are just DOD, you know, inside it. And we will have
private clouds that are DOD and other parts of the Federal
Government. And then we will have hybrid public clouds.
Because of the size of DOD and the Federal Government, we
ought to be able to move into where we would have government
hybrid clouds hosted in commercial centers as opposed to some
of the things I talked about earlier, would be on premise, that
would give us the best combination of mission security and
value.
Mr. Aguilar. Is that what you mean when you talk about in
page 3 of your testimony mission partner environment, when you
are talking about commercially accessible, reconfigurable, and
secured data that can be shared with commanders?
Mr. Halvorsen. A little broader than that. The mission
partner environment would certainly use cloud technology, but
in that part of the testimony what I am really talking about is
how we would be able to support our COCOM [combatant command]
commanders as they partner with both traditional and non-
traditional allies to support whatever mission it is, to be
able to stand up virtual networks on the fly, to be able to do
that both at a secure level, at a speed level that we need, and
then to keep it fiscally responsible.
Mr. Aguilar. Can you talk a little bit about how you
envision that working and what our stakeholders and coalition
partners, what their role in that would be?
Mr. Halvorsen. So as we can move to cloud technology, one
of the things that we have got to recognize, we have got to
get--our MPE [mission partner environment] is going to have to
be commercial-based. We are not going to be able to do this at,
say, a U.S.-only based system. A, other pieces of our allies
couldn't afford that, and it is not what they are going to
agree to do.
So basing this on a commercial set of technology that also
uses commercial classified technology, would allow us to, in
the cloud, put together a virtual network that--let's say we
had a--this is a really good example, and I think it is in the
testimony--and we have done this--let's say we had a natural
disaster that had allies now--like the Chinese, the Cubans, us,
they are not traditional allies. We could actually stand up a
network, once we get some of the technologies in place, that
would allow data to be shared.
And let's say we want to share data with China, we want to
share data with Cuba, but not exactly the same data. We could
do that on a network with the right protections to protect the
data that we need using almost commercially available
technology today. There is a few pieces that have to be done,
but I am--no doubt they will be done by the end of this year.
Mr. Aguilar. Well, look forward to seeing that development
and our discussion about that moving forward. Thank you so
much.
I yield back, Mr. Chairman.
Mr. Wilson. Thank you, Congressman Aguilar. We now proceed
to Congressman Brad Ashford, all the way from Nebraska.
Mr. Ashford. It is a long trip every morning. Thank you,
Mr. Chairman, being able to get here.
Congressman Langevin raised the issue that I am trying to
understand further. And your answers were good. I want to
further understand it, though, a little bit, because we talk a
lot about employee exchanges with the private sector and the
need for additional authorities to do that.
It seems to me it is a critical part of the plan going
forward and with the talent out there and the demands on the
budget and being able to bring people in. And you have,
Congressman Langevin, hit it 100 percent, and you did, as well,
in your answers.
What do we have to do in order to--I mean, it seems to me
that is something we should be able to move on. And what sort
of authorities would we need in order to do that?
Mr. Halvorsen. Again, I would like to come back on record--
here is what I would tell you I think the first area. Today
there are some statutes that actually prohibit us from giving
decision authority to those type of positions. While we
certainly want to protect them and make sure that the
government is in the end responsible for the decision, if I
have got somebody industry--so let's take cloud.
The best cloud engineers today are not in the government.
They are not. We have some really good ones, but the best ones
today are in industry. We ought to be able to get some of those
in. I ought to be able to assign one of them, say, okay, you
are the lead cloud engineer for this year that you are doing
this work with us, and give them the authority to make
decisions, and with some oversight, expend dollars.
Today, under the current authorities, that is hard to do. I
need to do some work to figure out what that should look like,
and I will come back to you by the summer, if that is good,
with some recommendations.
[The information referred to can be found in the Appendix
on page 44.]
Mr. Ashford. That is really all I have. That is extremely
helpful. It seems to me that there are areas where, as you
suggest, the private sector or the nongovernmental sector have
those expertise. So thank you, Mr. Chairman. That is all I
have.
Mr. Wilson. And thank you, Congressman Ashford. And due to
how important these issues are, we will proceed with a second
round.
And, Mr. Levine, DOD doesn't have a stellar track record in
deploying business IT systems. What recommendations would you
have to make to improve our abilities to deploy business
systems? And, secondly, how can we improve or shape the
workforce to better configure, deploy, and manage these
business systems?
Mr. Levine. First, we don't just not have a stellar record.
We have a horrendous record of deploying business systems. I
think that of all the things that we do badly, that is one of
the ones we do the worst.
So there are a number of things that we need to do on our
side of the river to do better. One of the things that we need
to do is to recognize the business systems themselves are not
going to solve our problems, that what we need to look at is
the processes that we are automating, so that if you try to
automate an old process without looking at it and figuring out
how it works, you are doomed to failure.
We have tried many times to buy an off-the-shelf system and
then said to the users of the system--well, have the users of
the system come in and tell us, well, that is not exactly the
data we want. We want this other data, because that is what we
have actually used, and we start tearing apart the guts of an
off-the-shelf system. And before you know it, we have spent
five times as much to re-engineer the system and to rebuild the
system as the cost of the system itself.
We have to control our own appetite, and that is something
that we are working on within the Department. In terms of what
you could do to help us--so one thing that I would say that you
could do to help us, that I hope you will think about, is as we
look at the process that we have to go through for business
systems, right now, as I said, we are going to try to work with
the acquisition community to re-engineer that, because we have
a system where we go through an investment review process, we
identify a potential solution, and it may be like a $20 million
fix to a problem where you do a tinker with an existing system.
We then have to throw it over the threshold, over the
transom to the acquisition community that may set up a program
office that in itself would cost $20 million, and they will
come to us with a solution which is, let's build a whole new
system from scratch. Well, that is crazy.
So we are going to try to re-engineer that within the
Department. There may be places where we come to you for
assistance in doing that re-engineering. And there is one place
in particular I would point to, which is right now for what I
presume are historic reasons, we have one set of thresholds for
what are called major defense acquisition programs [MDAPs].
We have another set of thresholds for what are called major
automated information systems [MAIS] programs. MDAPs and
MAIS's. The MAIS thresholds are way, way lower, an order of--I
don't know, a couple of orders of magnitude lower than the
thresholds for MDAPs, but we treat them as the same thing.
What that means is, that when we have an IT--a business
system investment, we trigger a process on the acquisition side
which is as big and as clumsy as the process we have on the
acquisition side when we are buying an aircraft carrier or a
fighter aircraft or something like that. And if you are buying
a business system, I am not sure that makes sense.
And so I think if you would look at where you treat MAIS
systems and MDAPs the same and whether you need to treat them
in the same way in legislation, I think that is something
constructive that could help us in streamlining our own
internal processes.
Mr. Wilson. Well, thank you for being so candid. And
additionally, too, hey, technology changes overnight, and so I
know it is an extraordinary challenge, but we appreciate both
of you on what you are doing. Also, I am grateful--Mr.
Halvorsen, I notice your association with Rotary International,
your service as a Paul Harris fellow. I am happy to be with
you.
So a question, Mr. Halvorsen. Spectrum is a vital resource
for the Department. However, it is also one that we are in
increasing competition with the commercial sector. What
challenges do you see over the next 10 years when it comes to
the DOD's use of spectrum? What recommendations would you make
to improve the responsiveness of the regulatory process to
including national security concerns and economic priorities?
Mr. Halvorsen. So I think today we are in a good spot, hard
work with spectrum. We did well with the last auction. And the
money is there to change where DOD can move and share spectrum.
What I worry about right now is that the private demand for
spectrum is going to exceed our ability to keep pace. And we
could, if we are not careful, put some national systems at
risk.
Some of this takes time. And in this business, I get that
time is really valuable and it is money, but there is a
physical limitation to how fast we can move the DOD systems
either into the ability to share spectrum or out of some
spectrum. And I worry--maybe because we are victims of our own
success--we have done very well, and the legislation that has
been written and the sharing has all worked to date.
But what I hear from industry right now is, well, we want
to go faster. And I don't know that we can go much faster today
on how we look at spectrum, make the decisions where we can get
out, and how we would share.
I would also tell you that while I think industry is
starting to look at making their own investments in helping us
share, they are just starting that.
And I think one of the things we need to look at is, I am
happy to be measured on how DOD is making investments to
share--and we ought to think about some measurements that we
would give industry to say, how are you doing in making the
investments to--your contributions to helping us get to that
state?
Mr. Wilson. Well, thank you very much. And now Ranking
Member Jim Langevin.
Mr. Langevin. Thank you, Mr. Chairman. Again, thanks to our
witnesses for being here.
So yesterday I had the opportunity to have a sit-down with
Deputy National Security Adviser Avril Haines and the Homeland
Security Adviser, Lisa Monaco, to discuss the Comprehensive
National Cybersecurity Initiative [CNCI]. And I have certainly
been an advocate for many of the proposals under the CNCI for
some time, and specifically the appointment of an individual at
the executive level to oversee Federal cybersecurity
enterprise.
And it is one of the problems that I think previously on
the .gov side they really don't have anybody in charge with
both policy and budgetary authority that can reach across
government and compel departments and agencies to do what they
need to do in cyber. Hence, you have things like the OPM breach
that happened.
And I think DOD, by the way, is doing a much better job in
terms of defending the .mil network. And all of that, as
difficult and challenging as it is, it is important. And they
are doing good work. But can you describe how DOD fits into the
overall CNAP [Cybersecurity National Action Plan], as it is
called? And more specifically, how DOD will interact with the
new individual, the Federal Chief Information Security Officer
who will be appointed to coordinate cybersecurity policies and
activities?
Mr. Halvorsen. Today, and even before the legislation, we
partner extensively with the Federal CIO, Tony Scott. I mean,
Tony when he came in brought some new ideas to the Federal
side. We are certainly supportive of that, and we will continue
to do so.
As the areas that the Federal Government is looking at are
applicable to DOD, we will play, and we will play hard, and we
will support those. We will continue to advise Tony and the new
individual that is appointed on where we think there are things
that DOD is doing that should be applied to the rest of the
Federal Government, and we will take those things that are
really working and apply them within DOD.
I think the establishment of an individual to do that is
key to success inside the rest of the Federal Government. And I
think there are some opportunities for us to really set that
tone.
One of them is, as we rebuild the NBIB and we look at the
lessons learned, I know Tony and I have agreed today that we
ought to take those lessons learned and apply them across the
Federal Government at any place that we see that that is
applicable, we will do that.
Mr. Langevin. Okay. What progress has DOD made on cloud
computing, specifically integration of capabilities provided by
essential service providers, and are there enough certified to
create a competitive field? And how are security concerns being
addressed?
Mr. Halvorsen. As for the progress, two things I think I
would like to point. We say a lot of times that DOD is behind
in cloud. So I wanted to really know if that was true. So I
have asked my staff and some outside to take a look at, how
does DOD compare in the use of cloud with other Fortune 50 or
peer competitors?
We are actually slightly ahead of most of the Fortune 50 in
the use of cloud. We are now embarking on doing more, but I
don't think DOD is behind. If you look particularly at the
financial industry, which has some very strong security
similarities to us, they have done exactly what we have done.
They take some of their public-facing stuff and they put it
into cloud. We have done that with good success.
The next two things that we are doing--and we have now
gotten certifications, enough of them, to start being
competitive--is to look at how we bring industry into on-
premise cloud offerings. We do that right now very limitedly
through the NGEN [Next Generation Enterprise Network] contract
that the Navy put in place, where actually HP [Hewlett-Packard]
is running Navy data centers, to include Navy data centers at
the secure level, on-prem [premises], for the Navy.
We are using that model, and we are going to expand that
across the rest of DOD.
I will have a couple RFIs [requests for information] out
here in the next month. We have a couple contracts that we are
going to let that will allow four commercial entities to come
in at the Level 4 level in certification, which is right below
the classified data. And we have some work being done to allow
more companies to partake in the classified space, too. So I
actually think we are making good progress. We have got to stay
on top of that.
I hope this summer, if the Windows 10 thing goes well, the
next announcement that we will make will be that DOD has
decided to go to a more complete cloud environment, similar
to--and I just used this as an example--this is not a
decision--but similar to what a Windows 365 cloud environment
would do. You have to get to that next phase to really take
full advantage of the cloud across the board.
Mr. Langevin. Thank you. I just--I know my time is expired,
but I will say, I hope along with all of this we are paying
maximum attention to the security of the cloud. It does still
concern me that, you know, we have the crown jewels in some
ways all in one place. And my colleague, Jim Cooper, likes to
refer to the cloud as the acronym for Chinese Love Our Uploaded
Data. And so security can't be tight enough, as far as I am
concerned.
Mr. Halvorsen. So, Mr. Chairman, can I take one more
minute? We agree. And one of the reasons that we are where we
are with cloud, it is the same reason the financial industry is
where it is with cloud.
We do have some things we have to make sure, and security
is right. And one of them is, how do you achieve virtual
separation so that you don't get the effect of everything being
loaded in one spot and it can be exfiltrated? And if it does
get penetrated, how do you quickly shut that off and isolate
it? And we are spending a lot of time working with the industry
experts in how to do that.
Mr. Langevin. Thank you. Thank you very much.
Mr. Wilson. Thank you, Mr. Langevin, and thank you for your
expertise in acronyms. We now proceed to Congresswoman Elise
Stefanik, of New York.
Ms. Stefanik. Thanks, Mr. Chairman. My final question
relates to the personnel side of this issue. So one of the
challenges that I think we clearly face is ensuring that our
cyber, technical, and workforce capabilities can scale
economically. And a significant issue for the industry is the
clearance process.
Is there any thought being given to an approach for fast-
tracking clearance processing for critical skills position,
such as computer network operations programmers, to better
enable effective support as your mission requirements expand?
Mr. Levine. We have a problem with security clearances
across the Department of Defense and across the industry. And
the problem with prioritizing is how many competing priorities
we have. So, yes, that would be a priority, but I can't look
across the Department of Defense and say we don't have a dozen
other priorities that are at least equal to that. I mean, the
number of priorities we have is extraordinary.
The security clearance problem is a problem not only for IT
professionals, but also for contractors who are working on
weapons systems. It is a problem for the hiring process within
the Department of Defense.
That is why we are working to re-engineer our internal
processes and why we hope that we will be allowed to help re-
engineer some of the OPM processes, as well, as we go forward
with this. One of the things that we are very hopeful for is
continuous evaluation as a tool that will help speed things up
and lower the burdens.
But I have got to say, right now we are runnning continuous
evaluation as a pilot program, which means we are running it in
addition to all the other requirements. And we are hoping that
we can prove it out so it can be a substitute for some of the
requirements that we are going to expedite. We are not there
yet.
But it is a hard question, not just for this area, and I
don't think the Department can afford to solve it by carving
off one universe and treating them better, because the other
universes of people we need to get through the security
clearance process are also vital to our national security.
Ms. Stefanik. Mr. Halvorsen, do you have anything to add?
Mr. Halvorsen. No, I think Peter summed that up very well.
Ms. Stefanik. Okay, thank you very much. I yield back.
Mr. Wilson. And thank you, Congresswoman Stefanik, for your
insight, too. There being no further, we are adjourned.
[Whereupon, at 4:38 p.m., the subcommittee was adjourned.]
=======================================================================
A P P E N D I X
March 22, 2016
=======================================================================
PREPARED STATEMENTS SUBMITTED FOR THE RECORD
March 22, 2016
=======================================================================
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
=======================================================================
WITNESS RESPONSES TO QUESTIONS ASKED DURING
THE HEARING
March 22, 2016
=======================================================================
RESPONSE TO QUESTIONS SUBMITTED BY MR. LANGEVIN
Mr. Halvorsen. The funds for NBIB in DISA's FY17 budget and out
year plans were a top line add. The FY17 President's Budget submission
requested $20M of O&M and $75M of RDT&E. The initial out year funding
profile is presented in the following table:
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
No additional funds from outside of this line are expected to
be spent on DOD's effort to support the new IT system. In FY16, OPM
will reimburse DOD for initial pre-acquisition prototyping efforts and
legacy system support. Funding for these efforts is in the range of
$5M.
Forty additional FTEs were added to DISA for the Background
Investigations Information Technology (IT) System based on an analogous
estimate of the number of FTEs required to architect, design, acquire,
implement and sustain a new start IT system. The estimate was generated
using a review and analysis of historical programs with the closest
scopes and scales of capabilities, adjusted for the high level of
concurrency necessary for the rapid delivery of operational capability.
[GRAPHIC(S) NOT AVAILABLE IN TIFF FORMAT]
The organization structure, specific job descriptions/role, and
position grades have not yet been determined and will be confirmed by
July as we perform the pre-acquisition planning for the IT system.
The timeline for delivery of the IT system is in the planning
phase. A schedule will be developed as part of the pre-Acquisition
planning that is currently underway with an expectation to be approved
as part of an overall Acquisition Strategy in October 2017.
The DOD CIO is solely responsible for building and maintaining the
IT system based on NBIB requirements. The CIO is advised by the
Director of OPM and the Federal CIO as part of the NBIB IT Governance
Council. [See page 7.]
______
RESPONSE TO QUESTION SUBMITTED BY MR. ASHFORD
Mr. Halvorsen. The Department believes the NDAA FY17 House & Senate
provisions related to private industry exchanges and ITEP provide the
Department the flexibilities needed. We appreciate the support of
Congress on this matter. [See page 14.]
______
RESPONSE TO QUESTION SUBMITTED BY MR. LAMBORN
Mr. Halvorsen. The DOD CIO International engagement efforts have
grown exponentially in the last several years as cyber has emerged as a
domain. These objectives align with regional cooperation, information
sharing, and interoperability initiatives. Working closely with
OUSD(P), the Joint Staff, NSA, DISA, US STRATCOM, US CYBERCOM and
Regional Combatant Commands, and the interagency, DOD CIO has
established enduring and lasting relationships focused on increased
information sharing, promoting foreign disclosure and release, and
enhancing communication and collaboration with our allies and partners.
DOD CIO led efforts to continue key relationships with the Five Eye
(FVEY) partners through the establishment of coordination groups such
as the Defense CIO Forum, sharing information and developing
mitigations on key cyber issues such as access control, identity
management, supply chain security, and secure mobility. Successes in
other FVEY fora include information sharing at the classified and
unclassified level through the use of U.S. issued FVEY PKI
certificates, and exercising incident response information sharing. DOD
CIO continues the critical work of fostering objectives of regional
cooperation, information sharing, and interoperability across North
Atlantic Treaty Organization (NATO), Allies, and Partners. Additional
key focus areas include:
<bullet> Cybersecurity Posture of NATO: Align security initiatives
with NATO mission objectives; ensure that NATO information assets,
technologies and data are adequately protected and that NATO's CS
workforce is highly skilled and capable.
<bullet> Secure Interoperability in Coalition Operations: Ensure
the secure interoperability of shared systems between and among the
U.S. DOD and coalition partners; identify shared systems and apply the
NIST RMF, including developing baselines. Continue development of the
Mission Partner Environment (MPE) and continue exercising federated
environments with partners.
<bullet> Cyberspace Workforce Development: Engage in security
cooperation activities that assist coalition partners in developing
strategies and policies to build skilled and capable CS workforces. For
example recently extended training and exercise participation to
partners.
<bullet> Cybersecurity Posture of Critical Infrastructure owned by
Partner Nations: Engage in activities that assist collation partners in
developing strong CS postures of their national critical infrastructure
on which DOD missions may depend, including identifying critical
systems and applying the security policies.
<bullet> Asia Pacific Engagements: Longstanding regular senior
allied and partner nation consultations with DOD CIO counterparts in
Japan, the Republic of Korea, and Singapore to promote a wide range of
information exchange, sharing of best practices, and technical
discussions on improving interoperability. [See page 8.]
______
RESPONSES TO QUESTIONS SUBMITTED BY MS. STEFANIK
Q1. What is your assessment of the DOD's ability to counter cyber
threats?
Mr. Halvorsen. The DOD continues to improve its ability to secure
its information systems and networks from adversarial activity. In
addition to initiating the Cybersecurity Scorecard, transitioning to
Windows 10, and implementing the Joint Regional Security Stacks, the
Department is also engaged in protecting our Internet-facing systems,
identifying key terrain, and integrating cybersecurity into our
evaluation of readiness. In order to ensure the protection of our
service members, civilians, contractors, and other DOD personnel, the
Department is also engaged in an effort to secure all of its systems
that store personally identifiable information. In combination with
other ongoing orders and directives, the Department will continue to
assess and engage in any areas where we can improve our cybersecurity.
[See page 11.]
Q2. What can she tell Fort Drum Soldiers what the Department is
doing to ensure that are protected?
Mr. Halvorsen. As noted above, the Department of Defense is engaged
in multiple enterprise-wide efforts to counter cyberspace adversaries.
The interconnected nature of DOD systems means that we aim to enhance
the cybersecurity of the Department as a whole. We recognize that the
security of information systems at one DOD component may rely on the
security of information systems at another. Cybersecurity orders,
directives, and policies apply across the Department, including the
information systems at Fort Drum. The Department will continue to
ensure the protection of their information, as well as the information
of all our other personnel. [See page 11.]
Q3. What have we learned about the enemy?
Mr. Halvorsen. The DOD faces a number of cyberspace adversaries
ranging from malicious individuals, terrorist organizations, and
nation-states with a wide variety of skill levels, capabilities, and
resources. These adversaries aim to penetrate our information systems
and networks for a number of reasons, including to steal sensitive data
or to affect our ability to operate. We have learned that many of these
same actors also target a range of other organizations, including the
Federal Government, the Defense Industrial Base, and private sector
businesses. [See page 11.]
Q4. How has that changed our approach?
Mr. Halvorsen. The Department actively understands the types of
cyber actors that target the DOD. The DOD Cyber Strategy released in
April 2015 is driving how the Department is adapting its cyber forces
to respond to ever-evolving threats. The strategy guides multiple
cybersecurity lines of effort across the Department, including the
development of 133 cyber mission force teams by 2018 to strengthen our
cyber defense and deterrence postures. The DOD also recognizes the
critical need to maintain and improve its proactive, progressive, and
coordinated approach for detecting and responding to cyber events and
incidents. The DOD's Cyber Incident Handling Program ensures an
integrated capability to continually improve the DOD's ability to
rapidly identify and respond to cyber incidents that adversely affect
the DOD Information Network. It does so in a way that is consistent,
repeatable, quality driven, measureable, and understood across DOD
organizations. Lastly, to protect the interests of national security,
cyber incidents must be coordinated among and across DOD organizations
and sources outside the Department, including law enforcement, the
intelligence community, and critical infrastructure partners. For
example, the DOD interfaces with the Department of Homeland Security on
major cyber vulnerabilities via the Cyber Collaboration, Assessment,
and Response inter-agency sessions led by the National Cybersecurity
and Communications Integration Center. The Department also works
closely with the Defense Industrial Base to enhance their cybersecurity
capabilities by sharing unclassified and classified information on
cyber threats. [See page 11.]
Mr. Halvorsen. DOD Components maintain ``software assurance'' (SA)
on licenses for the Microsoft Windows operating system. In addition to
the product support and client access licenses that SA provides, SA
also includes the right to upgrade to the latest software versions at
no additional cost. Therefore, it is expected that DOD Components will
be able to upgrade to the Windows 10 operating system with little or no
additional expenditures for the operating system software. [See page
12.]
?
=======================================================================
QUESTIONS SUBMITTED BY MEMBERS POST HEARING
March 22, 2016
=======================================================================
QUESTIONS SUBMITTED BY MR. WILSON
Mr. Wilson. What is the Defense Department strategy for increasing
use of mobility tools, as well as increasing mobile security? What does
the DOD intend to do with regard to Bring Your Own Device (BYOD) and
BYOD policy?
Mr. Halvorsen. DOD is already integrating mobility tools in several
areas including developing Geospatial Intelligence logistics, and
targeting applications. In addition, DOD is establishing Wi-Fi networks
to improve coverage and performance. These investments enable improved
mobility capabilities for deployment across DOD's enterprise.
DOD is increasing mobile security by migrating to Secure Hash
Algorithm 2 (SHA-2), developing a mobile credentialing solution that
derives certificates from a DOD user's Common Access Card (CAC), and
streamlining the security approval process for devices and software.
Following nationally recognized practices enhances security, commercial
mobile products must be validated in accordance with National
Information Assurance Partnership (NIAP) Protection Profiles (PP) for
all parts of the mobile ecosystem (e.g., mobile devices, mobile device
management (MDM), mobile apps, wireless infrastructure). Commercial
mobile products that process classified information must be approved by
the NSA's Commercial Solutions for Classified (CSfC) program.
DOD is continuing to evaluate different private sector proposals to
determine if they satisfy Federal security and legal requirements.
Initially, a low risk approach of a BYOD implementation would make the
most sense for low threat unclassified environments where there would
be minimal impact if a data compromise did occur, such as training and
student environments. The Department of Navy is currently piloting
BYOD. DOD will evaluate lessons learned to determine adoption across
the Department.
Mr. Wilson. What activities does the Department have underway to
improve the agility of its spectrum-dependent systems? Do you see
commensurate activity in the commercial sector?
Mr. Halvorsen. The complex spectrum environment and evolving
threats that warfighters face compel DOD to constantly evaluate a broad
array of technology advancements to meet mission requirements. The
Department continues to foster efforts, throughout the Military
Departments, DARPA, and OSD, that improve agility for DOD's spectrum-
dependent systems, which also help military users share better with
other spectrum users.
The Department's continued investment in its Electromagnetic
Spectrum Strategy is geared toward addressing these needs. The
Department's leadership in other efforts such as the National Advanced
Spectrum and Communications Test Network, under the auspices of the
Commerce Department, its own new Spectrum Access Research and
Development Program, as well as the collaborative effort via the
National Spectrum Consortium are enabling complementary initiatives to
identify and foster development of innovative technologies and
techniques for greater agility and flexibility of DOD capabilities, but
also improve spectrum sharing and access.
With regard to commensurate activity in the commercial sector, DOD
believes that industry is starting to look at making investments to
help in their own ability to share with DOD, but they are just at the
beginning of that process. As expected of DOD, industry would also need
to be held accountable for their own investments in spectrum sharing
technologies and how they are contributing toward improved spectrum
access. The Department is hopeful that with balanced investment and
commitment by agencies and the commercial sector, these efforts will
bear lasting results in enabling flexible access to all users in all
spectrum bands.
Mr. Wilson. What suggestions do you have to improve coordination
and deconfliction for sharing spectrum bands with commercial entities?
Mr. Halvorsen. It is important to recognize the existing spectrum
management and governance mechanisms through the national regulators,
i.e., NTIA and the FCC regulatory processes, continue to effectively
facilitate shared use of spectrum among Federal users as well as
sharing between Federal and non-Federal users (i.e., including
commercial entities). Streamlined coordination and deconfliction
processes are critical for successful sharing once a national policy
decision is made to implement sharing in a band, noting that sharing
requirements differ depending on the band and use scenarios.
Technology, sound engineering, balanced policy and regulation, and
enforcement are keys tenets that enable successful sharing. Automated
coordination and deconfliction capabilities play a critical role, among
other necessary tools (e.g., direct human coordination for continued or
iterative risk and tradeoff evaluation) for sharing spectrum bands with
commercial entities. Continued investment and improvements to
automation capabilities would contribute to improved coordination and
deconfliction.
Mr. Wilson. You stated in your testimony that DOD shares the same
concerns with security in a commercial cloud environment as the
financial industry and that the challenge with off-premise commercial
cloud is ``how do you achieve virtual separation in the cloud so that
you don't get the effect of everything loaded in the one spot where it
can be removed, and if it does get infiltrated, how do we immediately
shut that off and isolate it?'' How have you worked with the leading
commercial cloud providers to better understand the security mechanisms
they use to achieve virtual isolation or physical separation in their
commercial offerings?
Mr. Halvorsen. DOD CIO continues to collaborate with industry
through the on-going updates to the DOD Cloud Computing Security
Requirements Guide and cybersecurity assessments in support of DOD and
FedRAMP provisional authorizations.
Identifying and understanding the threats in a multi-tenant cloud
environment remain an on-going challenge. Virtual separations rely on
the vendor's software to protect one customer from both malicious
attacks and unintentional impacts from other customers. While some
vendors have been willing to share information on their mechanism
supporting virtual separation, other vendors have been reluctant to
share detailed information as it represents the vendor's sensitive
intellectual property. Even when the details are shared, fully
evaluating these solutions is a significant challenge as each vendor
implements their own, proprietary solutions.
In addition to the software itself, weaknesses in the software's
configuration and on-going management can also create vulnerabilities.
When evaluating multi-tenant cloud services, the Department closely
evaluates the vendor's processes for configuration and operations
management. All of these factors are taken into account when issuing a
provisional authorization at a particular impact-level. Through the
Cloud Computing Security Requirements Guide, the Department has
implemented a risk management approach that allows Components to match
the security and cost of specific cloud services to their specific
cybersecurity needs.
Mr. Wilson. We understand that the Marine Corps has implemented a
successful ``Comply-to-Connect'' program that has helped it increase
its compliance during network inspection reviews. a. How are those
lessons being applied throughout the Department? b. Are requirements
for this Marine Corps system reflected in enterprise requirements for
network security? c. Are those requirements being integrated into
existing programs, like the Host Based Security System, or planned
future network defense tools?
Mr. Halvorsen. Comply-to-Connect (C2C) is a framework addressing
several key functions: network access control, deliberate and secure
orchestration with other cybersecurity tools (such as vulnerability
scanners, software patching tools, and trouble-ticket generation tools)
and continuous reporting for the purpose of managing risk. C2C
satisfies the asset management/asset detection problem and increases
the efficiency by which technical personnel are able to make decisions
as to whether an asset has `complied' with the local enclave/network's
security policy to initially connect and remained connect to the
network. C2C closes the asset management/asset detection gap in the
Department's Information Security Continuous Monitoring (ISCM) Program.
The US Marine Corps has successfully implemented C2C as part of a
three-year regional effort covering 3,000 end-points at Camp Lejeune
NC. During that period, the effort enabled USMC to meet the objectives
of DOD Command Cyber Readiness Inspections (CCRI) with a 90% compliance
rate when Marine Corps White Teams conducted a `no notice' pre-CCRI
inspection; and, 93% compliance rate during regularly scheduled
inspections executed by DISA. The Marine Corps has successfully enabled
the orchestration features of the C2C tools to automate the on-boarding
process of new assets ``out of the box,'' to scan and remediate
vulnerabilities upon discovery, harden the asset through integration
with the Host Based Security System, and register systems into the
network security information and event management tool (SIEM). These
major muscle movements, in most cases, were executed with minimal touch
labor.
The Marine Corps has recently formally validated C2C as a Service-
wide requirement and will implement a wider-pilot across Marine Corps
assets in the National Capitol Region in FY16. Eventually, the Marine
Corps will implement C2C globally on all Service assets. Comply-to-
Connect is endorsed by the Enterprise Cybersecurity Computer Network
Defense Senior Steering Group (ESSG). The ESSG is tracking C2C
implementation across several Combatant Command, Service and Agency
components. The ESSG has directed the development of a Comply-to-
Connect concept of operations with a guideline to standardize
implementation across component C2C implementations. Department
discussions consider C2C as an enhancement to overall cybersecurity
across DOD enclaves and networks. The full scope of C2C capabilities
have not yet been decomposed into an operational set of requirements.
C2C requirements will be considered as part of the Next Generation End
Point security strategy and future network defense tools as the
Department moves toward assisted automation.
Mr. Wilson. What do you see as the major challenges to improving
the management of the Department of Defense? Do you have the business
intelligence and business analytics capabilities to provide the same
type of support to the Secretary and Deputy Secretary that any CEO in
the private sector would have access to?
Mr. Levine. The major challenges to improving management of the
Department of Defense are threefold. First, the Department is working
toward getting the employees at all levels from senior management to
worker to understand that there remain ample opportunities for shared,
standard processes and procedures that cut across component boundaries.
This is particularly true for support activities within the Department.
Second, the Department must continue to work with external stakeholders
such as veteran support organizations; unions; the White House; and
Congress to allow new approaches to these support activities, even if
it means changing the structures and processes those stakeholders
currently understand and are comfortable with. Finally, in order to
provide a basis for both the internal and external engagements, the
Department must have a reasonable set of performance measures that show
both how the job is being performed today, but also shows at what cost
the job is accomplished.
The assessment above leads directly to the answer to the second
question. The Department has a robust set of performance information
that it can draw upon to make decisions. The DCMO is working with the
staff to make this information more readily visible to the senior
leadership. For example, the DCMO just provided a detailed progress
report on the various efficiency initiatives that Secretary Carter
approved in our plans for FY17-20. The DCMO also supported a detailed,
performance-based report on how the Department is doing on making
progress toward audit readiness. Both these reviews were done with
military department Under Secretaries; service vice chiefs of staff;
the OSD Under Secretaries; commanders of combatant commands; and the
Deputy Secretary of Defense and Vice Chairman, Joint Chiefs of Staff.
Comparing to what a CEO in private sector has accesss to, the
Department needs to improve these measures by providing a better means
to measure how much it costs the Department to achieve the performance
outcomes. The Department is working to that end. In fact, achieving an
auditable condition will help us move in the direction of measures that
show outcomes per dollar spent or per person involved.
Mr. Wilson. What are you doing to improve the quality of data
senior leaders have and use for management of the Department?
Mr. Levine. The DCMO has been working with the Joint Staff and OSD
components to identify performance measures that better describe the
major initiatives the Secretary and Deputy Secretary have set for the
Department. The DCMO will then use the Deputy's Management Advisory
Group (DMAG) to present focused progress reports based on those
measures to the military department Under Secretaries and Vice Chiefs;
the OSD Under Secretaries; and the Deputy Secretary of Defense and Vice
Chairman, Joint Chiefs of Staff. The DCMO and CIO just presented
detailed progress status on the various efficiency initiatives approved
by Secretary Carter for the FY17-20 period, including measured updates
on major headquarters efficiencies; services contracts efficiencies;
defense retail; and information technology efficiencies. Working with
the OSD Comptroller, we also provided data on Departmental progress
toward achieving audit readiness. DCMO is still working with Joint
Staff to ensure that progress on readiness is presented and reviewed
regularly to the same group.
______
QUESTIONS SUBMITTED BY MR. LANGEVIN
Mr. Langevin. Mr. Halverson, the Defense Threat Reduction Agency is
conducting research & development and prototyping for a Countering
Weapons of Mass Destruction (CWMD) Situational Awareness Information
System utilizing a cloud-based architecture called Constellation.
Constellation is intended to provide an information sharing platform
for the Department of Defense, interagency and international users to
be deployed on NIPRNET, SIPRNET, SUN NET and JWICS networks using
cross-domain solutions to transfer data across security domains.
What is the role of the Chief Information Officer and Defense
Information Systems Agency in Constellation research, development and
prototyping? Specifically, what was the role in establishing a security
plan to achieve an accredited cross-domain solution, including security
milestones and review of proposed security architecture? Has this
effort been reviewed in order to determine if architecture elements and
applications could be met with existing capabilities, to include
computing tools and architectures, or those already being developed? If
so, please describe the review and unique capability gaps identified.
Mr. Halvorsen. The Constellation program is presently in the
formative stages of development and prototyping activities needed to
identify and mature information technology capabilities to meet CWMD
Situational Awareness requirements
DISA and the DTRA Constellation program office are collaborating
via the TCRI (Tactical Cloud Reference Implementation) community since
the core of Constellation's architecture is DISA's Big Data Platform
(BDP), a component of the TCRI.
The Constellation program will eventually require the capability to
move data across multiple security domains and DTRA intends to use
existing, accredited cross-domain solutions to meet this requirements.
DTRA will not develop a new cross-domain solution. The DTRA program
office is collaborating with the Defense Intelligence Agency (DIA)
Enterprise Cross Domain Services (ECDS) to meet DOD Instruction 8540.01
``Cross Domain (CD) Policy'' requirements. Using an ECDS provider
allows Constellation to rely upon existing and proven computing tools
and architectures, while reducing initial cost and deployment time. The
program expects DIA's ECDS to meet Constellation's requirements to pass
information between NIPRNet, SIPRNet, and JWICS. Regarding the cross-
domain requirement between the public network (SUNet) and our NIPR DOD
network, DTRA expects to use Commercial Off the Shelf (COTS) products
to perform deep-content filtering and sanitization of public data prior
to ingestion into Constellation on the DOD networks.
Mr. Langevin. Can you provide an update on DOD's process for
completing the instruction manual for DOD Directive 8140 and when this
process might be completed? How is it being accepted by the services?
Mr. Halvorsen. DOD Directive 8140.01 will be supplemented by an
Instruction and at least one Manual. The Instruction will establish
policy and procedures and assign responsibilities for the DOD
Components to identify, code, track, and report on their respective
cyber workforces. A draft of the Instruction completed a first round of
informal coordination with DOD Components in December 2015. In the
interim, the Department will publish policy guidance to implement the
identification and coding requirements of the Cybersecurity Workforce
Assessment Act of 2015. The Instruction is scheduled to be completed in
2017 and will incorporate the interim policy guidance.
The Manual(s) will establish procedures, standards, and
requirements for qualifications of the DOD cyber workforce, as required
by DOD Directive 8140. In 2015, the Department commissioned a study to
identify the standards for qualification criteria across cyber work
roles. The study, completed in March 2016, provides an analysis of
current government, academia, and industry best practices in
recruiting, developing, professionalizing, and retaining cyber
personnel. In May 2016, the DOD CIO will convene subject matter expert
panels to develop specific qualification criteria for each respective
information technology and cybersecurity work role. The Manual(s) are
scheduled to be completed in 2018.
The Services and Defense Agencies have been involved in the
Department's transition to a holistic view of cyber from the onset and
continue to play an important role in shaping the policies and DOD
Cyber Workforce Framework that will govern and shape the Department's
cyber forces into the future.
______
QUESTIONS SUBMITTED BY MR. KLINE
Mr. Kline. What is your assessment of the impact of one service
acquiring commercial satellite communications on behalf of the
Department of Defense as required under section 1610 of the FY16 NDAA?
Mr. Halvorsen. In the past two years, the Department has realized
successes in the commercial satellite communications (COMSATCOM) domain
as a result of improved COMSATCOM planning, acquisition and management
reforms discussed in the responses to Senate Report 113-44, page 167,
accompanying S. 1197 of the NDAA for FY 2014 and Sections 1603 and 1605
of the FY 15 NDAA. Specifically, the cost of COMSATCOM services has
been declining, DISA's operational responsiveness has improved, and
DISA's SATCOM pathfinders are yielding efficiencies in the use of the
acquired services. Likewise, the Air Force pathfinders are providing
valuable lessons related to investments in COMSATCOM solutions that
will further drive acquisition and utilization efficiencies as part of
our Wideband SATCOM Plan. To the extent they can, these lessons learned
will be folded into the Wideband SATCOM Analysis of Alternatives
directed by Section 1611 of the FY 16 NDAA.
With that in mind, the Department is concerned that restructuring
this approach by assigning a single agent for acquisition of COMSATCOM
services and investment in COMSATCOM capability may ultimately result
in increased cost and decreased operational responsiveness for DOD
customers with no noticeable improvement in DOD's overall SATCOM
``planning, acquisition, and management'' processes and governance. To
that end and in response to Section 1610 of the FY 16 NDAA, my office
has tasked the Air Force to evaluate, and provide the cost estimates to
implement, alternative courses of action to satisfy the intent of
Section 1610. These plans and cost estimates will be evaluated and
coordinated with the Services and Combatant Commands with their inputs
incorporated in the DOD response to Section 1610.
Mr. Kline. Section 1610 of the FY16 NDAA requires the Department of
Defense to designate a single acquisition agent to acquire commercial
satellite communications. Have the major users (services and combatant
commanders) of commercial satellite communications provided input to
the Chief Information Officer regarding changes to commercial satellite
acquisition and management required in the FY16 NDAA?
Mr. Halvorsen. In response to Section 1610 of the FY 16 NDAA, DOD
CIO has tasked Air Force to evaluate, and provide the cost estimates to
implement, alternative courses of action to satisfy the intent of
Section 1610. These plans and cost estimates will be evaluated and
coordinated with the Services and COCOMs with their inputs incorporated
in the DOD response to Section 1610.
______
QUESTIONS SUBMITTED BY MR. LAMBORN
Mr. Lamborn. What is the status of the DOD Commercial Partnership
Data Distribution Center you mentioned in last year's testimony, and
when will you have a secure commercial cloud capability operating from
within a DOD data center facility?
Mr. Halvorsen. IBM's Cloud Managed Services for Government (IBM-
CMSG) is an Infrastructure as a Service cloud provided from the Navy's
Allegany Ballistics Laboratory (ABL) in West Virginia. It was granted a
DOD provisional authorization at level 5 (Unclassified-FOUO) for use by
the Defense Logistics Agency and Naval Sea Systems Command in February
2016.
Two additional acquisitions of a secure, on-premise clouds are
currently underway in the Army and the Defense Information Systems
Agency:
The Army's effort will assess the feasibility and value of an on-
premises, commercially owned/commercially operated cloud service
offering at Redstone Army Arsenal. The Army is taking a ``statement of
objectives'' approach to obtaining this capability in order to fully
partner with industry, learn from its experts and implement commercial
best practices for cloud migration and security. The intent of the
pilot is to produce a secure, commercial cloud capability by fiscal
year 2017 that meets all requirements for hosting sensitive National
Security Systems at information security impact levels 5 (FOUO) and 6
(Secret). The Army released a request for information in November 2015
and held an industry day on 21 January 2016 with interested parties.
DISA is also exploring the use of commercial infrastructure
services residing in DOD facilities to implement an ``on-premises
private'' infrastructure service for the DOD community and mission
partners. The initial phase of this effort is referred to as milCloud
2.0 Phase 1 (M2P1). DISA released an RFI (PL83220028) on February 12,
2016, to assess the marketplace's interest in providing on-premises
infrastructure services from within DOD data center facilities and to
get advice on refining the businesses model process. DISA is currently
reviewing RFI responses and refining their approach for a planned award
in first quarter FY17.
Mr. Lamborn. The DOD has access to a vast amount of data generated
by its own IT devices, networks, and equipment. How is the Department
leveraging this data to reduce costs, improve operations, and
strengthen cybersecurity?
Mr. Halvorsen. DOD leverages data from a wide array of DOD IT
devices, networks, and equipment to guide it in reducing costs,
improving operations and strengthening cybersecurity (CS) across the
department in support of warfighting and business mission areas. DOD is
committed to constant improvement in its data collection and analytic
efforts to ensure the best possible mission outcomes for our
warfighters and the most efficient use of taxpayer dollars.
DOD CIO led the development of the SECDEF Cybersecurity Scorecard
populated with internal DOD data against 11 key cyber measures. The
measures were informed by our understanding of how we are vulnerable to
adversary attacks as described in the 2015 DOD Cybersecurity Discipline
Implementation Plan. This management tool therefore allows the
Secretary to assess progress against goals which will tangibly reduce
vulnerability. Further, it focuses each of the Department's 46
component organizations and the Department as a whole on assessing and
addressing vulnerabilities. Most of the Scorecard data is pulled from
automated cybersecurity tools currently deployed across the Department
and we are actively working to build on this momentum to improve how
data is automatically collected, integrated, analyzed and reported
across the Department.
The SECDEF Cybersecurity Scorecard is one very visible element of
the Department's overall effort to use data to reduce costs, improve
operations, and strengthen cybersecurity. The Defense Information
Systems Agency (DISA), working with the Military Departments and
USCYBERCOM, is leading the effort to build a joint interoperable
(common) platform to collect and visualize vast amounts of data. This
capability is called the Big Data Platform (BDP).
The BDP's value is three-fold:
First, it is a computing information system infrastructure
(software) that can be easily shared. Sharing this infrastructure
enables the ability to create common visualization analytics that can
then be distributed across operational centers, ultimately reducing
work efforts, re-work and overall costs. Moreover, it leads to a common
way of operating, strengthening Tactics, Techniques and Procedures
(TTPs) to aid in the cybersecurity mission.
Second, the BDP is data agnostic. The platform can collect vast
amounts of data in any mission area (cyber, business, personnel, etc.).
The concept is that the data can be collected and queried (correlating
analytics) to answer an infinite amount of operational questions (use
cases/scenarios). Data drives situational awareness and an operational
use case drives what data should be collected and visualized. The BDP
inherently drives the DOD toward the development and implementation of
data standards. An example would be the Structured Threat Information
eXpression and Trusted Automated eXchange of Indicator Information
(STIX)/TAXII) efforts.
Third, the BDP is a critical part of an information ecosystem that
includes cybersecurity sensors, information sharing systems and
security and incident management (SIEM) capabilities. As the DOD
collectively consolidates security architectures and TTP's, the BDP is
being architected to support this consolidation. An example is the
design and implementation of the Joint Regional Security Stack (JRSS)
within Joint Information Environment (JIE) Framework.
Mr. Lamborn. Recently, the Secretary of the Air Force stated that
over time, the AF wants to transition more and more of network
operations and maintenance to the private sector. You also spoke of
leveraging the private sector as well, specifically as it relates the
use of cloud computing capabilities. Currently these potentially
outsourced functions are performed by military personnel as well as DOD
civilians. What happens to the thousands of civilians when this occurs?
Will they all get re-rolled to defensive operations? Do current legal
authorities permit the use of title 5 civilian personnel in title 10
defensive cyber activities? If not, what authorities would the Congress
need to change or add within the U.S. Code?
Mr. Halvorsen. The Air Force, like all DOD Components, is
responsible for deploying capabilities and aligning their workforce to
meet mission needs. Any military personnel or DOD Civilian efficiencies
realized as a result of transitioning network operations and
maintenance functions to the private sector will be available for the
Services and Agencies to repurpose. At the Department-level, DOD
Directive 8140.01 unites the management of all cyber skill areas under
a single governance construct. This construct is bolstered through the
use of the DOD Cyber Workforce Framework, which will be used to develop
qualification criteria for all cyber work roles. These qualification
criteria will provide the Components with the training requirements for
military and civilian personnel who will remain in cyber work roles.
DOD civilians currently serve across the Cyber Mission Forces (CMF) and
can, consistent with law and policy, participate in the CMF's Title 10
activities.
[all]
</pre></body></html>