The Department of Defense has delivered a report to Congress outlining the Pentagon's cyber security policy in accordance with the National Defense Authorization Act.
An excerpt of the report's introduction is as follows:
Cyberspace is a critical enabler to Department of Defense (DoD) military, intelligence, business and, potentially, civil support operations. While the development and integration of cyber technologies have created many high leverage opportunities for DoD, our increasing reliance upon cyberspace also creates vulnerabilities for both DoD and the Nation.
To more holistically capture these dynamic challenges and opportunities, the Department published the Department of Defense Strategy for Operating in Cyberspace (available at www.defense.gov/news/d20110714cyber.pdf), which identifies five distinct, but interrelated strategic initiatives to support DoD’s cyberspace operations and its national security mission:
- Treat cyberspace as an operational domain to organize, train, and equip so that DoD can take full advantage of cyberspace’s potential in its military, intelligence, and business operations;
- Employ new defense operating concepts, including active cyber defense, to protect DoD networks and systems;
- Partner closely with other U.S. Government departments and agencies and the private sector to enable a whole-of-government strategy and a nationally integrated approach to cybersecurity;
- Build robust relationships with U.S. Allies and international partners to enable information sharing and strengthen collective cybersecurity; and
- Leverage the Nation’s ingenuity by recruiting and retaining an exceptional cyber workforce and enabling rapid technological innovation.
Section 1: Description of Policy and Legal Issues
Section 2: Decisions of the SECDEF
Section 3: National Military Strategy for Cyberspace Operations
Section 4: Current Use of Modeling and Simulation
A special thanks to Lt. Col. Mark Coffin, Deputy Director for the Network Warfare Center and Team Lead for Full Spectrum Penetration Testing for the U.S. Army, for providing Infosec Island with a copy this important report.
The full report is available here: