Information assurance and cybersecurity should be developed as fundamental elements of new systems. By Steve Hawkins (Editor’s Note: The Cyber 1.2 event, being held in conjunction with the National Space Symposium in April, will focus on the intersection of cyberspace and space. Participants in several government and industry panels on cyberspace policies were scheduled to include Steve Hawkins, vice president,
As a community, we invest large amounts of money to develop, deploy, operate and maintain the most advanced intelligence and space systems. At Raytheon, our emphasis is not only providing new technology, but also developing information assurance and cybersecurity as fundamental elements of these systems, and the networks and nodes that support them. Protecting these complex systems requires the most robust, full-spectrum, advanced cybersecurity capabilities available today within the intelligence community and Department of Defense. These integrated cybersecurity solutions protect the confidentiality, integrity and availability of critical information and infrastructures with the objective of total mission assurance. Mission-critical intelligence and space systems are vulnerable to various levels of threat from terrorists and nation state attacks. There are many ways to protect these systems from cyber-attack, and the more techniques used in a layered defense the more difficult it becomes for a sophisticated attacker to penetrate these systems. However, there is no cyber-defense that will prevent the eventual penetration of these systems by a dedicated and persistent attacker. They will get in. Finding them once they are in, controlling their ability to exfiltrate sensitive information and architecting systems to be resilient to denial of service attacks is critical to mission assurance. Cybersecurity developers must think like an attacker and develop not only solutions to block the cyber-threat from entering intelligence and space systems, but also implement monitoring capabilities and responsive, adaptive architectures to operate through a cyber-attack and accomplish the intended mission.
Closing the Gap This cannot be accomplished with simply the integration of the best available commercial cybersecurity technologies. It requires technologies to close the gap against this severe threat. These technologies can only be provided by companies that work on the leading edge of cybersecurity as well as have an understanding of the mission requirements and system architecture of our nation’s most critical intelligence and space systems. It’s also important to note that cybersecurity threats are not always external. Increasingly, we face risks to critical networks and systems from trusted employees, whether the incident is www.GIF-kmi.com
Information Security Solutions, Raytheon, who recently responded to the following question posed by GIF: “What unique cybersecurity challenges are facing intelligence and space programs, and what can government and industry to address them?”)
malicious or accidental. Raytheon’s insider risk management approach involves a continuous process of monitoring, risk assessment, policy definition for mitigating those risks, situation analysis and remediation of problems that occur. Insider threat protection solutions proactively defend against internal threats, constantly monitorSteve Hawkins ing and protecting against breach, fraud, data and intellectual property leaks, theft and sabotage. Cybersecurity provisions are critical, but this must also be accomplished in a way that the mission can still be completed as well. A specific challenge facing intelligence and space programs is protecting and improving the sharing of information between government agencies and mission partners while sustaining necessary separation of information at various levels of security. For example, many ground systems operate in classified environments and require access to unclassified resources or distribute their resulting mission products to users at multiple levels of security. Raytheon has successfully incorporated new technologies to move security services such as trusted cross-domain and multiple domain information sharing solutions into an embedded infrastructure. Through partnership with intelligence and space system developers to develop a cross-domain solution, we can ensure that data maintains its designated sensitivity level throughout the information sharing and transmission processes. In summary, the challenges of protecting our complex and critical intelligence and space systems are compounded by the need to balance affordability with providing mission capability. It is essential that as we develop new systems, we build the information assurance in from the ground up. The cost of an unprotected system being taken down is significant—it’s incalculable in its potential impact to national security. O
For more information, contact GIF Editor Harrison Donnelly at firstname.lastname@example.org or search our online archives for related stories at www.gif-kmi.com.
GIF 10.3 | 9
Geospatial Intelligence Forum, Volume 10 Issue 3, April 2012