DOD lays out cyber implementation plan

DOD lays out cyber implementation plan

To support its efforts to secure DOD networks, the Defense Department has released an "implementation plan" for its cybersecurity requirements.

Released by the CIO’s Office, the DOD Cybersecurity Discipline Implementation Plan covers identity authentication, reducing DOD networks' attack surface, device hardening and the alignment of computer network defenders with DOD IT systems and networks.

The implementation plan lays out a series of tasks for DOD officials, organized against the four priorities. For example, officials are charged with making sure their internal web servers require official public key infrastructure authentication, ensuring proper configuration of physical and virtual servers, disconnecting all Internet-facing web servers and web applications without "an operational requirement"  and ensuring proper incident response plans are in place.

The document, which was amended in February and publicly released in early March, goes hand in hand with a DOD cyber scorecard that grades agencies' IT security and is reviewed monthly by Defense Secretary Ash Carter.

Whereas the scorecard provides a more strategic, bird's eye view for Carter, the new implementation plan targets compliance further down the chain of command. Commanders and supervisors at all levels will report their implementation progress through the Defense Readiness Reporting System.

Officials like Deputy Secretary Robert Work have said that a great majority of intrusions into Pentagon networks are the result of human error, and the implementation plan is an effort to tighten the screws on compliance.

DOD CIO Terry Halvorsen has clamped down on poor cybersecurity practices within the department, kicking irresponsible users off of networks, according to his office. Asked last October at a media roundtable if anyone at DOD had ever been fired for sloppy network use, Halvorsen said, "Absolutely."

The implementation plan follows another policy, the Cybersecurity Culture and Compliance Initiative, signed by Carter last September. That directive tasked Halvorsen's office with conducting realistic training for DOD network users to drive home the consequences of insecure practices.

This article originally appeared on FCW, a sister site to GCN.

About the Author

Sean Lyngaas is a former FCW staff writer.


  • Records management: Look beyond the NARA mandates

    Pandemic tests electronic records management

    Between the rush enable more virtual collaboration, stalled digitization of archived records and managing records that reside in datasets, records management executives are sorting through new challenges.

  • boy learning at home (Travelpixs/

    Tucson’s community wireless bridges the digital divide

    The city built cell sites at government-owned facilities such as fire departments and libraries that were already connected to Tucson’s existing fiber backbone.

Stay Connected