• Skip to main content
  • Skip to primary sidebar

ConvoCourses

Cyber Security Compliance and IT Jobs

  • Cyber Security Training
  • about me.
  • Information Assurance Jobs

dod cert

July 9, 2014 by Bruce Brown Leave a Comment

I have been trying to sort out what organization within the DoD is the actual “DoD CERT”.  Since the DoD changes so frequently in organizational structure in an attempt to satiate new heads of agencies and keep up with rapidly changing threats and socio-economic structures, its hard to follow the nuances even if you are IN the DoD.

Here is what I came up with, its no globalsecurity.org, but here is my take on it from an IT security/Risk Management perspective.

According to Air University (au.af.mil), the DoD Joint Task Force – Global Network Operations (JTF-GNO) used to be called DoD Computer Emergency Response Team (DOD CERT).  Actually, back when JTF-GNO was still called JTF Computer Network Operations (JTF-CNO), it had a division that was DoD CERT.

dod cert USSTRATCOM
“dod cert” function is under Cybercom which is under USSTRATCOM

JTF-GNO has been absorbed into United States Cyber Command (USCYBERCOM).  So CyberCommand now assumes all the “DoD CERT” responsibilities.  Each unit within each branch of the DoD has slight variations on how incident reporting is handled but many of the major security incidents find their way to USCYBERCOM.

USCYBERCOM is under United States Strategic Command (USSTRATCOM).  According to CJCSI 6510.01F, Information Assurance (IA) and Support to Computer Network Defense (CND) USSTRATCOM commander is to “Coordinate with and support as directed the National Cyber-Response Coordination Group (NCRCG) and U.S.-Computer Emergency Response Team (US-CERT)”.  Combat commanders are to “Conduct network defense crisis action and contingency planning in coordination with United States Cyber Command (USCYBERCOM)”.  So USCYBERCOM has pretty much taken the rols of DoD CERT.

All of the other units and branches of the DoD report to USCYBERCOM via their own “cyber command”:

  • Army Cyber Command (ARCYBER) controls Army Network Enterprise Technology Command / 9th Army Signal and And the Army Intelligence and Security Command which controls Army CERT Computer Network Operations.  ACERT – CNO –
  • ACERT dod cert
    patch for Army Computer Emergency Response Team (ACERT) dod cert

    The Army website for free virus software is the site for the U.S. Army Computer Emergency Response Team – Computer Network Operations, which can be found at:
    https://www.acert.1stiocmd.army.mil You will need your Army Knowledge Online user name and password or your Common Access Card to log on to the site and download fully licensed versions of professional-grade antivirus software at no cost.The site also offers other computer protection software such as anti-spyware programs. – ACERT Facebook page LIKE THEM HERE

  • Fleet Cyber Command  – With command of land, sea and air the US Navy Fleet Cyber is probably the most powerful communications military force in the history of mankind!  Their mission ..”Fleet Cyber Command is to serve as central operational authority for
    us fleet cyber command dod cert
    us fleet cyber command dod cert

    networks, cryptologic/signals intelligence, information operations, cyber, electronic warfare, and space capabilities in support of forces afloat and ashore” –navy.mil.  Beneath Fleet Cyber is are the following organizations.  

    • Navy Cyber Defense Operations Command – NCDOC probably has the closest thing to a “DoD Cert” type organization.
    • Naval Information Operation Commands
    • Combined Task Force
  • AFNOSC NSD (formerly AFCERT) ??? I am not sure about the Air Force.  Maybe 24th Air Force AFCYBER but I cannot pin it down.  USCYBERCOM.. I am not sure what they are doing..
    • 67th Network Warfare Wing
    • 688th Information Operations Wing
    • 689th Combat Communications Wing

 

 

Reference:

http://www.dtic.mil/cjcs_directives/cdata/unlimit/6510_01.pdf

http://www.dtic.mil/cjcs_directives/cdata/unlimit/6510_01.pdf

http://www.us-cert.gov/

 

 

Filed Under: Risk Management For DoD IT

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Social connect:

Primary Sidebar

search


This book is an overview of how the NIST SP 800-37 risk management framework works from the perspective of an information system security officer (ISSO).

also available on Amazon!

View Book

NIST RMF 800-37 templates
Free 800-37 templates

The NIST 800 Template download contains a .doc file template and xls templates for POAMs, Federal, State, cloud based and a legacy template as well as resources where you can find more on NIST 800-37 documents for your use.

View Book

Learn to Make 6 Figures in CyberSecurity

Cyber Security How to make up to 6 Figures
6 figures in Cyber Security

This course explains how I have been able to consistently make 6 figures doing cyber security. There is a method that I have used during my development in cyber security. I am presenting that method to you.

View Course

Teleworking - IT Remote Work
Teleworking – IT Remote Work

Teleworking is something I have been doing for the last 5 years. This is how I did it.

Find Teleworking IT Jobs

View Course

RMF ISSO Foundations Training
RMF ISSO Foundations Training

RMF ISSO Foundations

I was an Information System Security Officer (ISSO) doing Risk Management Framework (NIST SP 800-37) for over a decade. I am a Cybersecurity veteran and I can explain (in plain English) what you DO in the Risk Management Framework process as an ISSO.

View Course

NIST SP 800-37 Presentation
NIST SP 800-37 Presentation

View Course

login

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Posts

  • RMF / security compliance beginner reading list NIST 800-37 NIST 800-53 and NIST 800-12
  • IT to cybersecurity jobs
  • Access Control Family: What is NIST Access Control (part1)
  • RMF Security Controls when the operating system changes
  • Cybersecurity Convocourses: Control Correlation Identifier (CCI), CIS and STIGS

Meta

  • Register
  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

Recent Comments

  • http://Www.Finance.Ipt.Pw/ on SRG/STIG Applicability Guide and Collection Tool Update
  • Elsa7 on ConvoCourses podcast: Cyber Security day to day activity
  • Tony on STIG Update – DISA has released the Microsoft SQL Server 2016 STIG Version 1
  • horloge on SCAP Compliance Checker SCC)
  • 218 Information assurance Success Criteria – ITSECURITYSURVIVAL.COM on Information Assurance Vulnerability Alert

Tags

8140 8570 ArcSight c&a CISSP convocourses cyber cybersecurity cyber security DIACAP DIARMF diarmf - implement disa DISA STIG dodd 8140 dodd 8140 cyberspace workforce HBSS IA implement implementation info assurance information assurance information security ISSO it jobs it jobs in usa job jobs Linux mcafee network nist nist risk management framework nist risk management framework 800-37 podcast risk risk assessment risk management risk management framework rmf security STIG stigs unix windows

Copyright © 2022 · Author Pro on Genesis Framework · WordPress · Log in

Posting....