DOT&E Cybersecurity Procedures DOT&E Cybersecurity Procedures
DOT&E Cybersecurity Procedures DOT&E Cybersecurity Procedures
DOT&E Cybersecurity Procedures DOT&E Cybersecurity Procedures
10 April 2015
6/12/2015-1
Background
6/12/2015-2
Goal: Improve DoD Cybersecurity Posture
6/12/2015-3
Procedures Summary
6/12/2015-4
Scope
6/12/2015-6
Phase 1: Cooperative Vulnerability
and Penetration Assessment
6/12/2015-7
Phase 2: Adversarial Assessment
6/12/2015-8
Phase 2: Adversarial Assessment (cont.)
6/12/2015-9
Timing and Data Sharing
6/12/2015-10
Mandatory Minimum Data Elements
Attachments A, B, and C of DOT&E Memo
• Adversarial Assessment:
– Adversarial activities
– Times to detect
– Defense activities
– System restoration activities
– Mission effects
6/12/2015-11
Mission Effects
6/12/2015-12
How to Evaluate Cybersecurity OT&E
6/12/2015-13
Summary