1 NASA (GSFC) Security Practices NOTE: Intent is to provide enough detail to compare & contrast various the various Agency practices in order understand.

Slides:



Advertisements
Similar presentations
National Aeronautics and Space Administration Presentation to the NASA Goddard Academy 2. Constellation Overview Ken Davidian Lead, Commercial.
Advertisements

15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
NIH Security, FISMA and EPLC Lots of Updates! Where do we start? Kay Coupe NIH FISMA Program Coordinator Office of the Chief Information Officer Project.
NASA Mission Directorates. 0 NASA's mission is to pioneer future space exploration, scientific discovery, and aeronautics research. NASA’s Mission.
Agenda COBIT 5 Product Family Information Security COBIT 5 content
Prepared for: DISA September 17, 2003 Establishing a Government Information Security System Presented to the IT AND COMMUNICATIONS SYSTEMS SECURITY CONFERENCE.
The Interplanetary Transport Network: Space Transportation Architecture for the 21st Century 5 May 2004 Shane Ross Everhart Lecture Series Control & Dynamical.
Security Controls – What Works
Federal Information Processing Standard (FIPS) 201, Personal Identity Verification for Federal Employees and Contractors Tim Polk May.
PIV Data Model Testing Ketan Mehta March 3, 2006.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
NASA AGENCY REPORT Dr. Eric J. Lindstrom Physical Oceanography Program Scientist Earth Science Division Science Mission Directorate MARCH 12, 2007.
National Aeronautics and Space Administration The Future of Space Exploration Orion, Ares and Beyond.... AIAA / NSC / JPL Town Hall Meeting 26 April 2007.
1 IT Security Awareness, Training and Education Trends Dan Costello Policy Analyst OMB.
The solar system by Evan. What is it? The solar system has planets, the moon and other objects moving around the sun Earth is one of 8 planets orbiting.
Astronomy Tools and The Moon UNIT 11 STANDARDS: NCES 1.1.1, 1.1.2, 1.1.3, 1.1.4, 1.1.5, LESSON 2.
NASA Personal Identity Verification (PIV) NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop.
Complying With The Federal Information Security Act (FISMA)
Educator Resources in Space Sciences Caitlin Nolby North Dakota Space Grant Consortium.
Day 8. Handout and any questions for Jim? Take 10.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil March 20, 2015 UNCLASSIFIED Industrial Security.
Security Control Families Management Class.
Spacecraft Instruments. ► Spacecraft instrument selection begins with the mission description and the selected primary and secondary mission objectives.
Space Exploration USA & SPACE "I believe this nation should commit itself to achieving the goal, before this decade is out, of landing a man on.
OFFICE OF THE UNDER SECRETARY OF DEFENSE FOR INTELLIGENCE CI & SECURITY DIRECTORATE, DDI(I&S) Valerie Heil August 12, 2014 UNCLASSIFIED NISPOM Update.
NASA IT Governance Overview Gary Cox August 18, 2010.
NMS Certification and Accreditation (C&A) Removal of Material Weakness for NMS Security and Access Controls Jim Craft USAID ISSO.
June 2004 SIW-4 - IP in Space Implementation Guide 1 Handbook for Using IP Protocols for Space Missions James Rash - NASA/GSFC Keith Hogie, Ed Criscuolo,
NASA By: Chimera & Tiffany. What is NASA? Executive branch of the US government It is responsible for the space programs and aeronautics/aerospace research.
UNITED STATES POSTAL INSPECTION SERVICE J. J. Rowan Acting Chief Postal Inspector MTAC May 16, 2002.
THEMIS FDMO Review Management Topics − 1 October 5, 2004 Management Topics Manfred Bester.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
Disaster Recover Planning & Federal Information Systems Management Act Requirements December 2007 Central Maryland ISACA Chapter.
Now More Than Ever Why we should settle the solar system and what we can do about It National Space Society.
1 © Material United States Department of the Interior Federal Information Security Management Act (FISMA) April 2008 Larry Ruffin & Joe Seger.
HSPD-12 and the Personal Identity Verification (PIV) System Procurement Briefing by Corrine Irwin January 2008.
Seeking a National Standard for Security: Developing a Systematic Crosswalk of the Final HIPAA Security Rule, the NIST SP , NIST SP Security.
Stellar Stars: Reflections of a Center CIO James F. Williams Ames Research Center August 15, 2011.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
PMC Update on Cyber Sprint June 18, Overview: 30-Day Cyber Sprint 1.Interagency Cyber Sprint Team: Launched June 11 and executing against the.
Science Mission Directorate Understanding and Protecting Our Home Planet: NASA and Earth Science Cheryl Yuhas Suborbital Science Program Manager.
NASA’s Goddard Space Flight Center Lunar Reconnaissance Orbiter Ground System Requirements.
24b - 1 NASA’s Goddard Space Flight Center LRO Safety Dave Bogart Code 302 August 16-17, 2005.
Adrian Gardner, NASA GSFC CIO August 16, 2011 Strategic Computing Strategy for Goddard Space Flight Center.
NIST HIPAA Security Rule Toolkit Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology.
Educator Resources in Space Sciences Caitlin Nolby North Dakota Space Grant Consortium.
FISMA 101.
SRR and PDR Charter & Review Team Linda Pacini (GSFC) Review Chair.
1 June 10, 2004 Gary L. Wentz, Jr. Deputy Manager, MSFC Office of Exploration Systems MSFC Office for Exploration Systems.
Educator Resources in Space Sciences Caitlin Nolby North Dakota Space Grant Consortium.
Missions in SPACE!. Before we start…. reports/ /# reports/ /#
Ground Control AERSP 401A. Ground System’s Basic Elements Mission Elements –Control the space segment or handle mission data, and includes: Ground Stations.
OMB Status 03/31/05 Monday, June 6, 2005 OMB Progress 03/31/05 Vicki Novak Tom Luedtke Gwen SykesPat DunningtonGwen Sykes Best in Government! Steps to.
OFFICE OF VA ENTERPRISE ARCHITECTURE VA EA Cybersecurity Content Line of Sight Report April 29, 2016.
AE Satellites. AE The German Astronomer, Johannes Kepler.
NIST SP800 53R4 WMISACA Conferance April 2016 By Dean E Brown CISSP, ISSMP, CSSLP, MCSD Owner – ITSecurityAxioms.com 262 Barrington Cir Lansing, MI
NASA and Amateur Radio Space Communication Will Marchant, UC Berkeley And
Goddard Contractor Association Meeting
Computer Security Division Information Technology Laboratory
SIS-DTN WG Wednesday Afternoon
KNOW YOUR EARTH PROJECT 2014 QUIZ COLLECTION
Welcome to the Sciences and Exploration Directorate!
Matthew Christian Dave Maddox Tim Toennies
History of Space Exploration
NASA Satellite Laser Ranging Moblas 4 Monument Peak, CA LRO and HPWREN Scott Wetzel NASA Satellite Laser Ranging Program Near Earth Networks Programs.
Place this in the proper place Vocab quiz Thursday. Study
NASA Personal Identity Verification (PIV) High Level System Overview Tice F. DeYoung, PhD 14th Fed/Ed Workshop December 14, 2006.
Public Engagement Lead LRO and SAM
Apollo and Beyond cont..
Presentation transcript:

1 NASA (GSFC) Security Practices NOTE: Intent is to provide enough detail to compare & contrast various the various Agency practices in order understand where differences lie and eventually determining how to create standards DRAFT

2 AGENDA Agency Background Overall Agency Security Policies Mission Specific Security Practices – Ground segment – Space segment

3 Types of Mission Earth, Moon, Mars and beyond – Man » Mercury, Gemini, » Apollo (Moon), » SpaceLab, » Shuttle, » ISS

4 AGENCY BACKGROUND (Cont) – Unmanned » Earth/Climate science (proving remote sensing) Polar Orbiting – Terra, Aqua, Aura, ICEsat, LandSat, NPOESS LEO – TRMM, QuickScat, Sorce, UARS, ERBS, Topex GeoStationary – GOES – TDRSS » Solar Science SOHO, SDO, WIND, Polar » Lunar LRO

5 » Planetary MRO, Mars Rovers, Cassini, Kepler, Voyager » Deep Space HST, XTE, MAP, FAST/SWAS, Femmi(GLAST) – Ground Network » WFF, PF, MGS, Hawaii, Mila, Malindi » DSN (Goldstone, Madrid, Canberra) » Commercial (USN, Norway, – Space Network TDRS-WSC (WSGT/STGT/Guam), Specialties – TDRSS, DSN, FDF

6 OVERALL AGENCY SECURITY POLICIES Physical security – HSPD-12, Personnel Identification Validation (PIV) – NPR , NASA Security Program Procedural Requirements (Guards, Badges, Personnel Screening, Keys, Keycards) – NPD NASA Security Policy – NPR Physical Security Vulnerability Risk Assessments – NPR Physical Security Requirements for NASA Facilities and Property – NPD NASA Counterintelligence (CI) Policy – NPR , Counterintelligence (CI)/Counterterrorism (CT) Procedural Requirements

7 Enterprise It Security Enterprise IT security – Enterprise Architecture » Goddard Directives Management System (GDMS) » Common Badging and Access Control System (CBACS) implements PIV-2 badges) » NASA Account Management System (NAMS) » NASA Application Tracking Tool (NAT) » IdMAX (Validate ID/Personnel Screening) » NASA Operational Messaging & Directory Services (NOMAD) MAJOR PLANNED NOMAD OUTAGE - April 25 & 26, 2009 (NoMail) » R2D2 » Security Operation Center (SOC) at ARC

8 Mission systems security practices Ground segment – NPR (NPR is not mission IT) – NPD 2810 (IT Security Policy Directive) – NPR A (IT Security Policy Requirements) – Federal » OMB Circular A-130 Appendix III » FISMA 2002 Categorization, Risk Assessment, Security Plans, Security Controls (NIST SP ), Information Security Agreements, Plan of Actions & Milestones.

9 Mission systems security practices Space segment – GPD A GSFC Space Assess Protection Policy » Payload classification (NPR ) » Center Management shall… (1-3) » Mission Management Shall… (1-7) » Space Protection Systems Mission Office shall, (1- 14

10 MISSION SPECIFIC SECURITY PRACTICES (1) Ground Segment – Access controls » Role? » Person? » Console? – Security services employed » Confidentiality » Authentication » Integrity » Key management – Network interconnection » Air-gapped? » Interconnected with enterprise?

11 MISSION SPECIFIC SECURITY PRACTICES (2) Space Segment – Security services employed: » Confidentiality » Authentication » Integrity » Emergency commanding » Key management » Access controls » Denial of Service protection Frequency hopping? Spread spectrum? Others?