{"id":8921,"date":"2021-11-05T07:37:11","date_gmt":"2021-11-05T10:37:11","guid":{"rendered":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=8921"},"modified":"2021-11-05T07:37:11","modified_gmt":"2021-11-05T10:37:11","slug":"eeuu-reforzar-la-ciberseguridad-a-nivel-local","status":"publish","type":"post","link":"https:\/\/www.fie.undef.edu.ar\/ceptm\/?p=8921","title":{"rendered":"EEUU: Reforzar la ciberseguridad a nivel local."},"content":{"rendered":"<p>Actualmente, el Ej\u00e9rcito y la fuerza conjunta no est\u00e1n optimizados de manera integral para realizar operaciones de ciberseguridad. Esto se debe en gran parte a que existen distintos niveles de responsabilidades, est\u00e1ndares y tareas para los proveedores de servicios de ciberseguridad (CSSP), que b\u00e1sicamente act\u00faan como operadores y defensores de la red a nivel local o de instalaci\u00f3n. El Ej\u00e9rcito quiere establecer roles y responsabilidades en cada escal\u00f3n para los operadores de ciberseguridad que realmente poseen su propio control de red para que los equipos de protecci\u00f3n cibern\u00e9tica sean eficaces en la detecci\u00f3n de amenazas y la defensa, dentro del concepto de red unificada publicado recientemente.<\/p>\n<hr \/>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">BALTIMORE, Md. \u2014 The Army wants to improve the ability of its local network defenders, a move it believes will raise the entire level of the service\u2019s \u2013 and by extension, joint \u2013 cybersecurity posture.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Currently, the Army and joint force are not optimized holistically to conduct cybersecurity operations. This is largely because there are varying levels of responsibilities, standards and tasks for cybersecurity service providers (CSSPs), who essentially serve as the local or installation level network operators and defenders.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">This has led to the need to deploy the very high end and limited\u00a0<a href=\"https:\/\/www.c4isrnet.com\/cyber\/2021\/01\/29\/hand-to-hand-combat-on-computer-networks-how-cyber-threat-hunters-work\/\" target=\"_blank\" rel=\"noopener\">cyber protection teams<\/a>\u00a0the services provide to U.S. Cyber Command, which act as SWAT teams deploying to networks during significant breaches.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cWe need to up the game of the folks that are conducting cybersecurity operations,\u201d Lt. Gen. John Morrison, deputy chief of staff, G6, said during a presentation at TechNet Cyber Oct. 28.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">The Army wants to establish roles and responsibilities at each echelon for the cybersecurity operators that actually own their own network terrain in order to get cyber protection teams back to doing what they do best: Hunting on networks and being threat focused, said Morrison.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cThis is really about aligning all of our cyber defensive capabilities so we get after that notion of the folks that own the terrain are doing that broader area defense and we get our cyber protection teams back to being very, very threat focused and pinpointed on targets and hunting on our networks,\u201d Morrison said. \u201cRight now, we\u2019re a little out of balance in some regards with that.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">In the past, there have been incidents where these local network owners had to rely on cyber protection teams to conduct traditional incident response, something they weren\u2019t initially designed to do. Now, the military wants those mission owners conducting that first level.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">The military is working on establishing standards and baselines across the Department of Defense for these defenders so there is uniformity in what they do to make better use of the limited cyber protection teams and create a more holistic cyber defense posture.<\/p>\n<p class=\"heading__StyledHeading-sc-123v3ct-0 bPFQNZ\">Unified network<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Broadly speaking, this initiative falls beneath one of the lines of effort \u2013 security and survivability \u2013 established in the Army\u2019s\u00a0<a href=\"https:\/\/www.c4isrnet.com\/it-networks\/2021\/10\/11\/ausa-merging-worlds-the-us-army-is-creating-a-unified-network-to-ensure-the-force-has-global-connectivity\/\" target=\"_blank\" rel=\"noopener\">unified network plan<\/a>\u00a0released Oct. 8, and it aligns various modernization efforts to provide a network the service needs to share data from the enterprise to the tactical sphere in support of multi-domain operations.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cWithout putting this [Department of Defense Information Network] ops framework into place, the reality of the unified network will be challenging because we will be fragmented from an operational perspective,\u201d Morrison said. \u201cThat is why there is such tremendous energy inside the Army to get after this very, very complex problem.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">The Army will begin making certain personnel investments for these DoDIN operations to enhance how the service conducts operations in contested and congested environments.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cNow is the time to make sure we level set that as we all transition to fighting in a multi-domain environment,\u201d Morrison said.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">To get there, the Army will be placing a lot of attention on improving the abilities of these local defenders by addressing their organizational design, ensuring they have the right capabilities and providing them the requisite training.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">For the first time, the Army has established a unified network operations requirements document that will help standardize and outline requirements for operations, maintenance, security and defense of the network across all echelons traversing the tactical to global strategic portion. This oversight will also allow the Army to put personnel in a defensive overwatch position, which takes away complexity at the tactical edge and puts it at higher echelons that can handle it.<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">\u201cWhat do we want our brigade combat teams doing? We want them maneuvering. We want them fighting. We don\u2019t want them doing data analytics on the cyber threat,\u201d Morrison said. \u201cBut you may want that capability at the division level where they have time, where they can actually do that kind of analysis. You may want to move it all the way back to one of our regional cyber centers where they have lots of time.\u201d<\/p>\n<p class=\"Paragraph-sc-1tqpf5s-0 jQOUvm body-paragraph body-paragraph\">Morrison said if the Army can get these three items of organization, capabilities and training right, \u201cwe will get after the notion of the unified network because we will crush the technical barriers that put into place because we have been fragmented over time.\u201d<\/p>\n<div id=\"slot-wrapper-f0fgnA3kEmO274L\" class=\"AdWrapper-sc-1cwvedt-0 RtlVD  dfp-ad dfp-ad--in-article \" data-state=\"rendered\" data-last-reload-count=\"0\">\n<div class=\"ad-slot\">\n<div class=\"adunitContainer\">\n<div id=\"ad-slot-f0fgnA3kEmO274L\" class=\"adBox\" data-google-query-id=\"CNqNh5qDgfQCFaeKlQIdNRkIzQ\"><strong>Fuente:<\/strong> <a href=\"https:\/\/www.c4isrnet.com\/cyber\/2021\/10\/28\/the-army-wants-to-bolster-its-local-cybersecurity-defenders\/\" target=\"_blank\" rel=\"noopener\"><em>https:\/\/www.c4isrnet.com<\/em><\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Actualmente, el Ej\u00e9rcito y la fuerza conjunta no est\u00e1n optimizados de manera integral para realizar operaciones de ciberseguridad. Esto se debe en gran parte a&hellip; <\/p>\n","protected":false},"author":1,"featured_media":8922,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2,23,28],"tags":[],"_links":{"self":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/8921"}],"collection":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8921"}],"version-history":[{"count":1,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/8921\/revisions"}],"predecessor-version":[{"id":8923,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/posts\/8921\/revisions\/8923"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=\/wp\/v2\/media\/8922"}],"wp:attachment":[{"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.fie.undef.edu.ar\/ceptm\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}