1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the...
Transcript of 1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the...
![Page 1: 1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.](https://reader035.fdocuments.us/reader035/viewer/2022062619/551701be550346f5558b4ffb/html5/thumbnails/1.jpg)
1
Susan AlexanderChief Technology Officer for Information and Identity Assurance
Office of the Assistant Secretary of Defense, Networks and Information Integration/Chief Information Officer (OASD/NII) DOD/CIO
Power to the edge– not the adversary
IA for Net-centricity
September 17, 2008
Power to the edge– not the adversary
IA for Net-centricity
September 17, 2008
![Page 2: 1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.](https://reader035.fdocuments.us/reader035/viewer/2022062619/551701be550346f5558b4ffb/html5/thumbnails/2.jpg)
2
Governing Principles of Net-centric warfare
•
![Page 3: 1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.](https://reader035.fdocuments.us/reader035/viewer/2022062619/551701be550346f5558b4ffb/html5/thumbnails/3.jpg)
3
So what’s so different?
• Massively distributed enterprise of (mostly) non-replicated resources – integrity, availability
• Blurring of tactical and strategic, with every node a portal into the whole
• Notion that access will be based upon user’s need rather than originator’s permission – balancing confidentiality with availability
• Net-centric provisioning (including C2) for agility and flexibility
• Reliance upon remote and anonymous nodes - authenticity, integrity
In a Nutshell: the need for “Distributed Trust”
![Page 4: 1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.](https://reader035.fdocuments.us/reader035/viewer/2022062619/551701be550346f5558b4ffb/html5/thumbnails/4.jpg)
4
GOALS:• Evolve & Populate the NCE• Protect & Defend the NCE• Manage & Operate the NCE
Net Centric Environment (NCE): Objective, Goals & Description
Objective: All users, whether known or unanticipated, are able to easily discover, access, trust, and use the data/information that supports their mission objectives unconstrained by their location or time of day.
![Page 5: 1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.](https://reader035.fdocuments.us/reader035/viewer/2022062619/551701be550346f5558b4ffb/html5/thumbnails/5.jpg)
5
GIG as a combat systemIA imperatives
Aiming the gun: Information advantage for superior decision making
• Maximum accessibility of data for mission while denying knowledge to adversaries
• Seamless collaboration with mission partners
Shoots where I point: Trustworthy and robust platform for executing intent
• Command and control never subverted• Service is available
Works under fire • Attacks are prevented or deflected• Can recover from successful attacks • Operate through
![Page 6: 1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.](https://reader035.fdocuments.us/reader035/viewer/2022062619/551701be550346f5558b4ffb/html5/thumbnails/6.jpg)
6
Back-up Slides
Some of the technology under the hood
![Page 7: 1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.](https://reader035.fdocuments.us/reader035/viewer/2022062619/551701be550346f5558b4ffb/html5/thumbnails/7.jpg)
7
Security to the Edge Construct
Foundations
Applications
Enterprise Health
Trusting the edge
Security Mgmt Infrastructure
AISMobility
![Page 8: 1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.](https://reader035.fdocuments.us/reader035/viewer/2022062619/551701be550346f5558b4ffb/html5/thumbnails/8.jpg)
8
Security management infrastructure
• Attribute management– Identity, location, role, trustworthiness– Sensing, authenticating– Humans, non-humans
• Privilege management– Resource access, command and control
• Policy management– Global rules of engagement, local policy– Dynamic risk calculation
![Page 9: 1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.](https://reader035.fdocuments.us/reader035/viewer/2022062619/551701be550346f5558b4ffb/html5/thumbnails/9.jpg)
9
Trusting the edge
• Self-protecting in a hostile environment– Hardware– Software
• Remotely interrogable integrity– Measurement– Attestation
![Page 10: 1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.](https://reader035.fdocuments.us/reader035/viewer/2022062619/551701be550346f5558b4ffb/html5/thumbnails/10.jpg)
10
Assured Information Sharing
• Must support arbitrary policy and object granularity• Converges to one network• Supports augmentation with guest infrastructures• Guarantees integrity of information
![Page 11: 1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.](https://reader035.fdocuments.us/reader035/viewer/2022062619/551701be550346f5558b4ffb/html5/thumbnails/11.jpg)
11
• Worldwide access anytime, anywhere• One piece of gear • Location-specific behavior• Must not be overheard• Must not become a target
Mobility
![Page 12: 1 Susan Alexander Chief Technology Officer for Information and Identity Assurance Office of the Assistant Secretary of Defense, Networks and Information.](https://reader035.fdocuments.us/reader035/viewer/2022062619/551701be550346f5558b4ffb/html5/thumbnails/12.jpg)
12
Enterprise Health
• Availability is key to NCW• Though often overlooked, so is integrity• Adversary response vs. hygiene factors• Might pay to integrate with SMI• Huge problem– Good news is, everyone is working
on it!