briefing slides

Cyber Superiority
Weapon System Normalization Update
AFCEA Luncheon Jan 2015
Colonel Aaron Smith
HQ AFSPC/A5I
Chief, Cyberspace Superiority
Overview
• A5/8 Organization
• Where We Were/Are
• Way Forward
•
•
•
•
Challenges
Operational Context
Priorities
Cyber Requirements
• Summary
2
A5/8, Directorate of Strategic Plans and Requirements
A5/8
STRATEGIC PLANS &
REQUIREMENTS
A5E
EXECUTIVE SERVICES
A5C
A5F
A5I
A5M
A5R
A5X
SPACE SUPERIORITY
GLOBAL WARNING AND
DEFENSE
CYBER SUPERIORITY
SATCOM AND PNT
LAUNCH AND REQUIREMENTS
OFFICE
STRATEGIC PLANS AND
REQUIREMENTS
A5CF
A5FG
A5IC
A5MP
A5XC
FUTURE REQUIREMENTS
GROUND BASED WARNING
CYBER OPERATIONS
POSITIONING, NAVIGATION
AND TIMING
CONCEPTS AND
PROCESSES
A5CN
A5FS
A5IM
A5MS
A5XI
COMMAND AND CONTROL
SPACE BASED WARNING
CYBER MISSION
ASSURANCE
SATELLITE
COMMUNICATIONS SPACE
BASING & INTERNATIONAL
AFFAIRS
A5CS
A5FW
A5IW
A5MT
A5XP
SPACE SITUATIONAL
AWARENESS
ENVIRONMENTAL
MONITORING
CYBER WARFARE
SATELLITE
COMMUNICATIONS
TERMINALS
STRATEGIC PLANS
A5CY
A5XR
DEFENSIVE SPACE
CONTROL OFFENSIVE
SPACE CONTROL
STRATEGIC REQUIREMENTS
A5XY
A5I
New
STRATEGIC ANALYSIS
3
Where We Were
Cyber WS Capability Production Documents
Draft
AFRRG
AFROC
Cyberspace Vulnerability Assessment / Hunter
Cyberspace Defense Analysis
Air Force Cyberspace Defense
Cyber Command and Control Mission System
Air Force Intranet Control
Cyber Security and Control System
Challenges
• Differing views of the “As Is” capability fielded at the operational units
• Definition of “Good Enough”
• Lengthy coordination processes
Baselining the As-IS Capabilities of CSAF-Approved Weapon Systems
JROC
Where We Are Today
DoDIN Ops
Cyber “Weapon Systems” in Sustainment
Cyber Security Control Sys
Air Force Intranet Control
Cyber Warfare
AF Cyberspace Defense
Cyber C2 Mission System
Cyberspace Defense Analysis
Cyberspace Vulnerability
Assessment/Hunter
Network Attack System
Baselined the As-IS Capabilities of CSAF-Approved Weapon Systems
5
Way Forward -- Challenges
AF Cyber Mission Forces
•
Unique Capabilities to CMTs and NMTs?
•
Future of CPTs – Joint Solution?
•
N/CSTs – RTO&I / Trainers / Range?
AF Environment in JIE
•
Move from AF Gateways to Joint Gateways
•
Transition to commercial & milCloud
•
Impact to AF Cyber Weapon Systems?
6
Way Forward - Operational Context
USCYBERCOM/J3 Cyberspace Operations Environment
7
Way Forward - Priorities
AFSPC/CC Cyberspace Activities
1. Defensive Counter Cyberspace (Recon/Counter Recon)
2. Offensive Counter Cyberspace for Global Reach & Access
3. Cyberspace ISR & Situational Awareness
4. Proactive Defense
5. Persistent Network Operations
6. Data Confidentiality & Integrity Systems (DCIS)
7. Network Extension & Resiliency
8. Cyberspace Command & Control
8
Way Forward - Cyber Requirements
•
•
Utilize JCIDS Information Systems (IS) Methodology
•
Introduced in most recent JCIDS guidance
•
Greater flexibility to incorporate evolving technologies
•
Fewer iterations validating documents through JCIDS process streamlines
cyber capabilities development
Accelerates delivery from concept to capability
•
Delivers early and continuous capability; maturity
iteration with operator feedback
•
Embraces changing/refining requirements (not scope)
•
Frequent communication and collaboration across stakeholders
Normalized Requirements and Acquisition Processes Can Be
Exploited To Deliver Sustainable Future Capabilities To The Warfighter
9
Way Forward – Today & Tomorrow
• Tomorrow
• Today
• Unified Platform IS-CDD
• In-progress
• Cyber Protection Team CBA
• AFIN Ops CBA
• Cyber C2/SA CBA
• In-Progress
• AF Cyber Range CBA
• In-Progress
• Defensive Cyber Operations CBA
• Kickoff Feb/Mar 15
Capability Based Approach to Requirements Generation
Functional Area Analysis – Functional Need Analysis – Functional Solution Analysis
10
Summary
• What we’ve done
•
•
Normalized our Cyber Weapon Systems
AFSPC/CC reprioritized cyberspace activities
• What do we need from you?
•
•
Understand process to modify weapon-systems in sustainment
Help us identify dynamic and agile technologies to meet AF and Joint
operational needs
• Then what?
•
•
New cyber requirements documents enable continuous development and
delivery of capabilities
Identify what we need from industry and science and technology
11
Questions?
12
What We’re Doing
AFNet Migration to JIE Pillars
Connect – Normalize Network Transport
Single
gateway/base
Protect – Single Security Architecture
•
boundary
•
Next-gen
directory
•
MPLS
•
consolidation
Common Store – Core Computing & Data Centers
•
Regional
w/Army-DISA
•
Single CNDSP
JIE Inc 1 CDC
& application
security
NW core
services
Single AFNet
Enterprise Services
•
migration
•
Application
rationalization
Unified
capabilities
•
NIPR e-mail
•
SIPR DEE
C2 – Enterprise Ops Centers
•
JIE
•
Unified
NetOps
•
Unified
service desk
•
Global net
mgmt
13