Gig ia capabilities pdf

The theory of resources and capabilities focused on the creation of value, whereas the internal features of the company generate superior business returns. This departmentallevel policy document cites the iatf as a source of information on technical solutions and guidance for the dod ia implementation. Does a disrupted internal audit ia function mean a. Information sharing in the gig environment and the c2 perspective. The gig provides interfaces to coalition, allied, and non dod users and systems. Global information grid gig waiver process for consideration. Encompass dod, the intelligence community ic, federal, industry, and international partnership communities. The gig includes any system, equipment, software, or service that meets one or more of the following criteria. The gig provides capabilities from all operating locations bases, posts, camps, stations, facilities, mobile platforms, and deployed sites. An ia workforce able to effectively employ ia tools, techniques and strategies to defeat adversaries proactively identify and mitigate the full spectrum of rapidly evolving threats to defend the net.

Systems must also meet all applicable information assurance vulnerability message compliance requirements. Provides majority of ia servicescapabilities enables 100% ia accountability at a manageable unit. Unclassifiedfor official use only unclassifiedfor official use only 1 2 3 national security agency 4 information assurance 5 directorate 6 7 8 9 10 11 12 14 u. Comparison of resources and capabilities in two companies. Global information grid gig unclassified 1 chapter i general description of operational capability a. Working with nsa,this effort builds on the current gig ia architecture. Gig information assurance portfolio management office. Nussbaum the university of chicago i found myself beautiful as a free human mind. The global information grid1 gig consists of information capabilities information2, information technology it, and associated people and processes that support department of defense dod personnel and organizations in accomplishing their tasks and missions that enable the access to, exchange, and use of information and. Provides majority of ia services capabilities enables 100% ia accountability at a manageable unit. This manual is intended to serve as a highlevel introduction to information assurance and ia principles. Pdf internal audit capability model iacm for the public. U iterative development of the gig ia capabilitytechnology roadmap.

Infusing ia awareness and concepts into other disciplines and entities create an ia empowered workforce that is well equipped to support the changing demands of the iait enterprise by goals and objectives developing and deploying protection capabilities across the developing and promulgating the gig ia architecture enterprise. With respect to gig ia, dod challenges broadly apply to the intelligence community ic and the united states government usg. Department of the navy information assurance program. Dod info sharing strategy dod cio department of defense. User assistant automated capabilities that learn and apply user preferences and patterns to assist users to efficiently and effectively utilize gig resources in the performance of tasks. The concept of a global information grid gig was born out of concerns regarding interoperability and endtoend integration of automated information systems. Navy senior information assurance officer don senior ia officer. Enterprise wide ia and cnd solutions steering group. An ia workforce able to effectively employ ia tools, techniques and strategies to defeat adversaries proactively identify and mitigate the full spectrum of rapidly evolving threats to defend the net national military. The global information grid1 gig consists of information capabilities. The basis for requiring gig architecture compliance acquisition of capabilities interoperability and supportability overarching acquisition and use 10 usc 41 usc gig architecture underpins all mission architectures gig architecture is the authoritative architecture for interoperability and information assurance dodi 5000.

The iacm is a framework that identifies the fundamentals needed for effective internal auditing in government and the broader public sector. The global information grid gig is an allencompassing communications project of the united states department of defense it is defined as a globally interconnected, endtoend set of information capabilities for collecting, processing, storing, disseminating, and managing information on demand to warfighters, policy makers, and support personnel. Deputy assistant secretary of defense for and information. Department of defense dod voice networks references. Department of defense dod, the global information grid gig ia policy and implementation guidance was built around the strategy. Netcentric operational environment ncoe project framework danny price osd nii wireless march 22, 2005. Department of defense global information grid architectural. The adoption of continuous monitoring and validation by the first and. The information assurance ia community has been implementing a strategy to. This report reflects the results of the research conducted to develop and validate the internal audit capability model ia cm for the public sector.

Department of defense enterprise architecture transition strategy version 2. Pdf measuring the health of the global information grid. Information assurance for the netcentric environment. This appendix provides the necessary steps and information to process a nondod connection. A response to community challenges iad published the gig ia architecture v1. Information assurance is an operational requirement throughout don and is an essential.

Gig ia capabilities access control computer network. Global information grid gig comprise a seamless and secure endtoend ia architecture requiring shared enterprise services with streamlined management capabilities. Information assurance domain, global information grid mission gig ia mission. It is intended to supplement the detailed information provided in section 3. The ncoe program set key enablers of the gig core infrastructure gigbe, jtrs, tsat, nces, gigia, teleport, jnms are executed in a synchronized fashion so that the gig evolves coherently and meets user needs also addresses other satcom programs wgs, aehf, muos, as well as crosscutting areas such as spectrum. Assignment of responsibilities and authorities in the office of the secretary of the navy. Definitions terms used in this instruction are defined in enclosure 2. Adopts the term cybersecurity as it is defined in national security presidential directive54homeland security presidential directive23 reference m to be used throughout dod instead of the term information assurance ia. Appendix c information assurance c4isr for future naval. Ia is an enabler of gigbe, jtrs, tsat, and nces d d d d gigbe teleport jtrs tsat jnm ia nces jnm nces ia program. Wireless devices, services, and technologies that are integrated or connected to dod networks are considered part of those networks, and must comply with dod directive 8500. Iacm levels no sustainable, repeatable capabilities dependent upon individual efforts sustainable and repeatable ia practices and procedures ia management and professional practices uniformly applied ia integrates information from across the organization to improve governance and risk management ia learning from inside and outside the. Making gig information assurance better through portfolio.

The strategy, technical framework, and transition plan outlined in the gig ia architecture also apply to the intelligence community ic. Apr 08, 2019 configure wireless solutions to prevent or preclude backdoors into the armys lans. Developing and operationalizing an ia component of the gig architecture that provides the technical road map for protecting and defending the current and future gig. The following content in the iatf has been updated in release 3. Don cio focuses its efforts on the development of ia policy, strategy, tools, and oversight. Backdoors, poor access management, and misconfigurations can be caused by unprotected transmissions or unprotected peds connecting to a network. Mrinal, in rabindranath tagores letter from a wife all over the world, people are struggling for a life that is fully human, a life worthy of human dignity. Defense information systems network disn global information grid gig flag panel. Continue development of ia architecture, policy and identify ia capabilities necessary to support and endtoend ia capability for the gig including transformational communications, gig bandwidth expansion, jtrs, and gig. Technology will augment capabilities and enable continuous controls monitoring ia functions will digitally augment their capabilities with advanced data analytics, bots and machine learning to handle the volume, speed and complexity of data.

This document serves as the overarching strategy for the office of the deputy assistant secretary of defense for cyber, identity and information assurance ciia, and provides the common vision and goals that guide and integrate the departments many ciia initiatives and investments. Configure wireless solutions to prevent or preclude backdoors into the armys lans. Gig ia capabilities free ebook download as pdf file. Ia shall be implemented in all system and services acquisitions at levels. This work will expand in fy 2007 to focus on ia enterprise system engineering and the development of an ia implementation plan and guidance. Continue refinement of ia architecture, policy and ia capabilities necessary to support and endtoend ia capability for the gig including enterprise services such as discovery. Specific procedures for requesting waivers to policy and ictos are contained in paragraph 6. Pki provides the critically needed support to applications. Cnci project governance, oversight and reporting structure. Dod warfighting and business capabilities through greatly increased sharing of.

Definitions terms used in this instruction are defined in references b, c and d, or in enclosure 2. Most often, centralized ia acquisition processes provide the most. The goal of ia is to protect and defend information and information systems. It should be used to ensure that the gig capabilities being planned, managed, acquired, and fielded are. Department of the navy information assurance policy and is issued under the authority of secnavinst 5430. Information assurance certification and accreditation process diacap manual. In support of dod and disas mission, nsc hosts the defense. The ia policy is formally known as the information assurance ia component of the gig integrated architecture, version 1. An investigative analysis of information assurance issues. Department of defense enterprise architecture transition. The global information grid gig is a collection of systems, programs and initiatives aimed at building a secure network and set of information capabilities modeled after the internet.

Protect information defend systems and networks provide situational awareness and command and control transform and enable ia capabilities create an empowered workforce table of contents vision of a netcentric environment. Provide trusted information and services through integrated ia capabilities to enable mission accomplishment. The gig is expected to facilitate dods transformation by allowing warfighters, policy makers, and support personnel to engage in rapid decision making. Therefore, internal company resources and capabilities. Dod information assurance certification and accreditation process diacap reference h, dodi 8410. Afg helps make gig ia architecture real at the acquisition program level. National security agency information assurance directorate. Influencing program managers to build their systems so as to be able to plug into relevant ia constructs. Gig mission assurance is built on survivable communications transport, dod global information grid mission assurance the dods policy, planning, and warfighting capabilities are heavily dependent on the it foundation provided by the gig. Defining the gig core, draftgigdefiningthecoredesimonetarr051030. The companies are seen as collectors of resources and capabilities, which.

761 512 134 16 1186 729 1506 1487 1578 327 930 702 215 1375 980 993 557 640 591 1404 574 549 41 1125 1180 458 162 1125 998 1123 185 1345 1169 734 739 1356 1027 190 1435 410 1193