DOD lays out cyber implementation plan

DOD lays out cyber implementation plan

To support its efforts to secure DOD networks, the Defense Department has released an "implementation plan" for its cybersecurity requirements.

Released by the CIO’s Office, the DOD Cybersecurity Discipline Implementation Plan covers identity authentication, reducing DOD networks' attack surface, device hardening and the alignment of computer network defenders with DOD IT systems and networks.

The implementation plan lays out a series of tasks for DOD officials, organized against the four priorities. For example, officials are charged with making sure their internal web servers require official public key infrastructure authentication, ensuring proper configuration of physical and virtual servers, disconnecting all Internet-facing web servers and web applications without "an operational requirement"  and ensuring proper incident response plans are in place.

The document, which was amended in February and publicly released in early March, goes hand in hand with a DOD cyber scorecard that grades agencies' IT security and is reviewed monthly by Defense Secretary Ash Carter.

Whereas the scorecard provides a more strategic, bird's eye view for Carter, the new implementation plan targets compliance further down the chain of command. Commanders and supervisors at all levels will report their implementation progress through the Defense Readiness Reporting System.

Officials like Deputy Secretary Robert Work have said that a great majority of intrusions into Pentagon networks are the result of human error, and the implementation plan is an effort to tighten the screws on compliance.

DOD CIO Terry Halvorsen has clamped down on poor cybersecurity practices within the department, kicking irresponsible users off of networks, according to his office. Asked last October at a media roundtable if anyone at DOD had ever been fired for sloppy network use, Halvorsen said, "Absolutely."

The implementation plan follows another policy, the Cybersecurity Culture and Compliance Initiative, signed by Carter last September. That directive tasked Halvorsen's office with conducting realistic training for DOD network users to drive home the consequences of insecure practices.

This article originally appeared on FCW, a sister site to GCN.

About the Author

Sean Lyngaas is a former FCW staff writer.


  • automated processes (Nikolay Klimenko/

    How the Army’s DORA bot cuts manual work for contracting professionals

    Thanks to robotic process automation, the time it takes Army contracting professionals to determine whether prospective vendors should receive a contract has been cut from an hour to just five minutes.

  • Russia prying into state, local networks

    A Russian state-sponsored advanced persistent threat actor targeting state, local, territorial and tribal government networks exfiltrated data from at least two victims.

Stay Connected