{"id":12902,"date":"2023-08-11T16:40:23","date_gmt":"2023-08-11T19:40:23","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=12902"},"modified":"2023-08-11T16:40:23","modified_gmt":"2023-08-11T19:40:23","slug":"tres-estrategias-para-administrar-la-red-del-ejercito-de-eeuu","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=12902","title":{"rendered":"Tres estrategias para administrar la red del Ej\u00e9rcito de EEUU"},"content":{"rendered":"<p>El \u00e9xito de este esfuerzo de modernizaci\u00f3n continua a gran escala requerir\u00e1 un enfoque de todas las \u00e1reas para garantizar que la nueva combinaci\u00f3n de tecnolog\u00edas dispares y anteriormente separadas funcione sin problemas y de forma segura, ahora y en el futuro. El Ej\u00e9rcito puede emplear tres estrategias para enfrentar con \u00e9xito estos desaf\u00edos de manera efectiva.<\/p>\n<hr \/>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The U.S. Army\u2019s ambitious plan to consolidate its Program Executive Office for Enterprise Information Systems with the Program Executive Office for Command, Control, and Communications Tactical into a\u00a0<a href=\"https:\/\/defensescoop.com\/2023\/03\/15\/the-army-is-consolidating-all-network-activity-into-single-program-executive-office\/\" target=\"_blank\" rel=\"noopener\">unified network<\/a>\u00a0will provide warfighters with better and more dependable network access and services.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The success of this large-scale, continuous modernization effort will require an all-hands approach to ensure the new combination of disparate and previously separate technologies operates smoothly and securely\u2014now and in the future.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Here are three strategies the Army can employ to manage these challenges effectively.<\/p>\n<p class=\"heading__StyledHeading-sc-123v3ct-0 iKlOni a-heading2\"><strong>Gain complete observability<\/strong><\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">As the PEO EIS and PEO C3T have grown, so have the number of tools they support. For example, the PEO EIS has the technology to support more than\u00a0<a href=\"https:\/\/www.eis.army.mil\/sites\/default\/files\/2020-12\/PEO%20EIS%20HQ%20Fact%20Sheet%20FINAL.pdf\" target=\"_blank\" rel=\"noopener\">24.2 million daily business system transactions<\/a>\u00a0for one million soldiers.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Upon consolidation, the Army will need to monitor an exponentially vast number of tools and identify redundancies, such as underperforming or redundant tools, to prevent toolset creep.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Instead of traditional network monitoring tools, the Army should consider implementing network-wide observability to gain insights into the tools being used on the unified network. Observability differs from conventional monitoring because it can allow the Army to identify conditions affecting the network in real-time, including the number of tools used at any moment. On the other hand, monitoring focuses more on the health of the network and its assets.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Observability isn\u2019t just for toolset monitoring. It\u2019s also beneficial for quickly identifying potential issues, such as malfunctioning devices or applications. When paired with AI, it helps administrators predict possible problems or threats before they happen\u2014a key benefit for troops working in hostile environments.<\/p>\n<p class=\"heading__StyledHeading-sc-123v3ct-0 iKlOni a-heading2\"><strong>Enforce zero trust through identity credentialing<\/strong><\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">A unified network will not only combine technologies\u2014it will meld different user groups. Many of these users will theoretically have access to information they otherwise would not be privy to. As such, the Army has stated\u00a0<a href=\"https:\/\/www.army.mil\/article\/264179\/unified_network_operations_underpins_armys_digital_transformation\" target=\"_blank\" rel=\"noopener\">identity credentialing and access management<\/a>\u00a0(ICAM) will play a significant role in maintaining zero trust security across the network.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">After the Army establishes the appropriate user permissions, it will need a way to monitor and enforce them with minimal manual effort. Implementing a system built to give administrators full visibility into everyone\u2019s access rights\u2014across the entire unified network\u2014will be essential to maintaining a zero-trust posture.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Automating user access rights and permissions will be critical, too. The Army\u2019s unified network will be expansive, making it challenging for administrators to track who has access to what and when. Automating the onboarding and offboarding of new users will allow administrators to focus on more mission-critical tasks while ensuring effective ICAM.<\/p>\n<p class=\"heading__StyledHeading-sc-123v3ct-0 iKlOni a-heading2\"><strong>Expand network monitoring to the edge<\/strong><\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The Army is investing heavily not only in 5G but advanced\u00a0<a href=\"https:\/\/www.c4isrnet.com\/battlefield-tech\/it-networks\/2022\/08\/03\/remember-5g-pentagon-backs-6g-hub-tied-to-army-research-lab\/\" target=\"_blank\" rel=\"noopener\">6G networks<\/a>\u00a0designed to deliver reliable, real-time communications and information to warfighters in any environment. Whether 5G or 6G, the Army must account for the myriad of widely distributed devices, systems, and applications on its unified network. It must monitor them and the traffic they generate like a traditional centralized network. However, since most of the activity occurs at the edge, it can be difficult to gauge performance and security.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The Army will need to expand network monitoring to the edge and require a different kind of monitoring approach. Monitoring must occur inside and outside the network perimeter and extend to the unified network\u2019s many endpoints and devices, which will be critical to ensuring troops\u2019 communications remain secure.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">Keeping apprised of the network\u2019s overall health and reliability is also essential. It\u2019s all too easy to lose contact because of a wireless dead zone or excessive network traffic. But loss of contact could result in loss of mission or even life. The Army must consider robust wireless monitoring options to ensure neither occurs.<\/p>\n<p class=\"heading__StyledHeading-sc-123v3ct-0 iKlOni a-heading2\"><strong>The bottom line<\/strong><\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The initial consolidation on October 1, 2023, is only the first step. Inevitably, the network will continue to grow and expand over time. The Army will need to be highly agile to avoid any possible issues and employ flexible technologies to meet the organization\u2019s evolving needs and objectives.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 kEzXdV body-paragraph body-paragraph\">The consolidated network will undoubtedly create an effective framework to help the Army meet its primary objective: improving its tactical and strategic advantages over adversaries. In turn, the Army should consider implementing these strategies and tactics to help administrators manage the expanded network\u2014and improve its odds of success.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/opinion\/2023\/08\/10\/three-strategies-for-managing-the-us-armys-consolidated-network\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El \u00e9xito de este esfuerzo de modernizaci\u00f3n continua a gran escala requerir\u00e1 un enfoque de todas las \u00e1reas para garantizar que la nueva combinaci\u00f3n de&hellip; <\/p>\n","protected":false},"author":1,"featured_media":12903,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/12902"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12902"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/12902\/revisions"}],"predecessor-version":[{"id":12904,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/12902\/revisions\/12904"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/12903"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12902"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12902"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12902"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}