02.08.2013 Views

Department of Energy FY 2012 Congressional ... - The FIRE Place

Department of Energy FY 2012 Congressional ... - The FIRE Place

Department of Energy FY 2012 Congressional ... - The FIRE Place

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Detailed Justification<br />

(dollars in thousands)<br />

<strong>FY</strong> 2010<br />

Actual<br />

Approp<br />

<strong>FY</strong> 2011<br />

Request<br />

<strong>FY</strong> <strong>2012</strong><br />

Request<br />

Infrastructure Program 99,838 97,849 107,618<br />

<strong>The</strong> infrastructure program supports the cyber security operations and activities at NNSA M&O<br />

sites. <strong>The</strong> cyber security operations and infrastructure program is built around a defense-in-depth<br />

approach for achieving cyber security in a highly networked environment. <strong>The</strong> defense-in-depth<br />

approach is a combination <strong>of</strong> known best practices and cost strategy that relies on the intelligent<br />

application <strong>of</strong> techniques and technologies which exist today. <strong>The</strong> defense-in-depth approach<br />

consists <strong>of</strong> three major components: people, processes and technology. This approach<br />

recommends a balance between the protection capability and cost, performance, and operational<br />

considerations. <strong>The</strong> implementation <strong>of</strong> this approach will enable maintenance <strong>of</strong> a cyber security<br />

posture that complies with all DOE and NNSA policies and processes, while addressing the<br />

increasing number and complexity <strong>of</strong> cyber security threats, vulnerabilities and risks.<br />

For <strong>FY</strong> <strong>2012</strong>, the request will provide for the implementation <strong>of</strong> enhanced cyber security<br />

capability, daily operations, cyber security infrastructure, and risk management as outlined under<br />

the newly implemented risk management approach for cyber security. During <strong>FY</strong> <strong>2012</strong>, the Cyber<br />

Security program will ensure the development and deployment <strong>of</strong> cyber security technologies for<br />

enhancement in incident management, infrastructure protection and the reduction <strong>of</strong> insider threat<br />

capabilities. During this period, Cyber Security funding will support research, development and<br />

deployment <strong>of</strong> the following capabilities enterprise-wide:<br />

• Cyber Tracer – This will provide the department with the capability to handle cyber security<br />

incidents enterprise-wide. <strong>The</strong> developed technology will provide each site with the capability<br />

to share incident information in real time within that site and allow for enterprise-wide<br />

corrective actions to take place.<br />

• Insider Threat Capability – This develops an insider threat solution that integrates monitoring,<br />

investigation, and forensics capabilities that protect against insider threats. This tool is an<br />

agent-based insider threat protection that provides visibility and control <strong>of</strong> desktops and<br />

laptops, whether connected to the network, at home, or completely <strong>of</strong>fline.<br />

• Data Leakage Capability – This is a two-tiered architecture that consists <strong>of</strong> multiple policy<br />

sensors placed around the network to detect and/or prevent data leakage, and a central<br />

management console to distribute policies and collect/organize alerts.<br />

• Data Loss Prevention Capability – This provides the capability to quickly discover exposed<br />

confidential data wherever it is stored, with the broadest coverage <strong>of</strong> enterprise data<br />

repositories, and web content and applications.<br />

• Continuous Monitoring – Cyber Security will seek to implement a continuous monitoring<br />

program at the enterprise level for all critical cyber security assets by September 30, <strong>2012</strong>.<br />

Weapons Activities/<br />

Cyber Security Page 306<br />

<strong>FY</strong> <strong>2012</strong> <strong>Congressional</strong> Budget

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!