DOD policy targets weak link in information security

New rules would protect supply chain data on unclassified networks

The Defense Department has issued a new policy to protect military information that travels between unclassified networks administered by contractors and the government, reports Jason Miller at Federal News Radio.

The new directive contains several major policy initiatives and sets forth new operating guidance to coordinate and manage an information sharing partnership with the private sector. The directive concerns information sharing outside the core DOD information networks, sources said.

Related Story

DOD to establish safe haven outside the Internet

The directive was signed by Cheryl Roby, who is acting DOD chief information officer and principal deputy assistant secretary of Defense for Networks and Information. Its purpose is to plug a long-standing security gap involving the DOD supply chain.

The memo requires DOD and the Defense Industrial Base to:

  • Create an information-sharing environment for threat information.
  • Develop best practices.
  • Establish a standard for reporting and responding to cyber attacks or threats.
  • Develop an approach for vendors to perform self-assessments of the security of their networks.

The memo also tasks various DOD components with initiatives to improve or maintain Defense Industrial Base information security. As part of the effort, the Defense Security Service will ensure contractors receiving classified information have programs that meet the military’s cybersecurity requirements, the National Security Agency will offer support as needed to analyze cyber intrusion damage, and the Defense Cyber Crime Center will serve as the focal point for threat sharing and policy and standards implementation.

Furthermore, the DOD Undersecretary for Acquisition, Technology and Logistics will update its acquisition regulations to address the protection of unclassified information on contractor networks and also develop a policy to assess cyber intrusion damage for Defense Industrial Base systems.

About the Author

William Welsh is a freelance writer covering IT and defense technology.

inside gcn

  • analytics (Wright Studio/

    3 data strategies to help crackdown on internal corruption

Reader Comments

Mon, Feb 22, 2010 Lawrence

I thought the CNN broadcast of a Cyber Attack was very usefull in showing administrative conflicks which can slow response times. My concern is that Cyber Warfare will be like Hammas, and Hezbollha, both trained and financed by Iran, but offers Iran denial in it's actions, (they wear no National Patches). Cyber Hackers, backed by Nations can also use this ruse to keep deniability. We need a strong response to Cyber Attackers, and the International means of solidly producing facts pinpointing the Atackers. Thanks, Mac Friesner Cyber Intel Analyst

Wed, Feb 17, 2010 oracle2world

Encrypt the data with TruCrypt or steganography, using a strong p/w, and be done with it. Even though NSA might be a little unhappy they can't read the mail. All these special processes and networks end up being useless in an emergency.

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group