SBN

The DoD IAT Level 2

The Department of Defense (DoD) Directive 8570 can be specifically defined as follows: “. . . . guidance and procedures for the training, certification, and management of the DoD workforce conducting Information Assurance functions in assigned duty positions. It also provides guidance on reporting metrics.” (SOURCE: 1)

It is important to note that the DoD workforce, in general, includes the following:

  1. Military employees (active or reserve);
  2. Civilian employees;
  3. Contractors (or any other affiliated 3rd parties.

The specific DoD departments that are impacted by this Directive is examined in the next section. This article focuses on Level 2, which emphasizes networking.


At present, there are three levels of the DoD Directive 8570, and Level 2 (this also requires mastery of the knowledge base that is required in Level 1) currently focuses upon the network environment infrastructure at the DoD, if it involves, in particular, the following job functions:

  • Providing end user support (such as difficulties or any issues that are involved with accessing shared resources either directly at the place of work or remotely).
  • Managing end-user accounts (for example, this would involve creating the usernames and passwords for both the Federal Government employees and any contractors; establishing the appropriate permissions to access the network resources; making sure that the Virtual Private Networks are fully functional and securing the established lines of network communications in order to safeguard the data packets; creating the appropriate permissions for those employees who are remote, etc).
  • Analyzing system performance (this would include examining the performance of the various servers and making sure that they are operating at peak levels of performance; making sure that all required software upgrades and patches are installed onto them; ascertaining network throughput when employees access the shared resources on the various drives are both optimal and safe levels; detecting any anomalies (Read more...)

*** This is a Security Bloggers Network syndicated blog from InfoSec Resources authored by Ravi Das (writer/revisions editor). Read the original post at: http://feedproxy.google.com/~r/infosecResources/~3/PvKfKxXX6AQ/

Secure Guardrails