{"id":187,"date":"2013-02-25T17:17:52","date_gmt":"2013-02-25T22:17:52","guid":{"rendered":"https:\/\/risacher.org\/jfdi\/?p=187"},"modified":"2013-03-04T12:56:02","modified_gmt":"2013-03-04T17:56:02","slug":"the-90s-called-they-want-their-ca-process-back","status":"publish","type":"post","link":"https:\/\/risacher.org\/jfdi\/2013\/02\/the-90s-called-they-want-their-ca-process-back\/","title":{"rendered":"The &#8217;90s called, they want their C&#038;A process back"},"content":{"rendered":"<p><em><a href=\"https:\/\/risacher.org\/jfdi\/wp-content\/uploads\/2013\/02\/michael-douglas-wall-street.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-280\" alt=\"michael-douglas-wall-street\" src=\"https:\/\/risacher.org\/jfdi\/wp-content\/uploads\/2013\/02\/michael-douglas-wall-street.jpg\" width=\"260\" height=\"190\" \/><\/a>[This is <a title=\"Intelink-U post\" href=\"https:\/\/blogs.intelink.gov\/blogs\/drisacher\/?p=181\">mirrored on Intelink-U<\/a>]<\/em><\/p>\n<p>In a <a title=\"Systems vs Application\" href=\"https:\/\/risacher.org\/jfdi\/2013\/02\/system-vs-application-when-is-ca-required-in-dod\/\">previous post<\/a>, I traced through the various policy documents that describe the certification and accreditation processes for the Department of Defense, ultimately tracing back to <a title=\"OMB Circular A-130\" href=\"http:\/\/www.whitehouse.gov\/omb\/circulars_a130_a130trans4\">OMB Circular A-130<\/a>.\u00a0 In summary, &#8220;systems&#8221; need accreditation, while &#8220;applications&#8221; do not, and the distinction (per A-130) turns on the highly subjective decision of whether it is a &#8220;major&#8221; application.<\/p>\n<p>In tracing this definitional tangle, I unwittingly provided a roadmap for how to get your <del>system<\/del> &#8220;application&#8221; on a DoD network without a full-blown Approval To Operate (ATO).\u00a0 I was <em>not<\/em> trying to\u00a0 provide an easy-out for getting operational without being accredited &#8230; although the method is a well-trodden path with a lot of history.\u00a0 I&#8217;m <em>was <\/em>trying to show that our C&amp;A policy is at-least-slightly broken, and we generally don&#8217;t even understand it ourselves.<\/p>\n<p>Again, to summarize, this is what <em>not<\/em> to do:\u00a0 <!--more-->since network enclaves are &#8220;systems&#8221;, (which <em>do<\/em> require accreditation) you find a network that is already accredited.\u00a0 You then host your <del>system<\/del> application on that enclave, which generally means annotating the presence of your &#8220;application&#8221; in the security documentation for that network enclave.\u00a0 In many cases, this also means going through an &#8220;Approval To Connect&#8221; (ATC) process, which is generally defined by the owner\/operator of that network enclave.\u00a0 This is\u00a0 easier than a full ATO.\u00a0 If anyone ever asks questions, such as, &#8220;Do you have an ATO?&#8221; or &#8220;Who is your DAA?&#8221;\u00a0 You gleefully point to the Enclave ATO and the Enclave DAA, and say &#8220;Yep, right there.&#8221;<\/p>\n<p>A friend of mine (Hi, Alex) characterized this as &#8220;weasely.&#8221;\u00a0 Okay.\u00a0 Perhaps.<\/p>\n<p>When I became the IT Operations guy for the Office of the Director for <a title=\"CAPE\" href=\"http:\/\/www.pae.osd.mil\/\">Program Analysis &amp; Evaluation<\/a> &#8211; now Cost Analysis &amp; Program Evaluation (CAPE) &#8211; I inherited many such <del>systems<\/del> applications.\u00a0 I was responsible for hosting all the web-based &#8220;applications&#8221; that are used to collect the long-range budget proposals for the DoD (the POM), the data-warehousing and business intelligence tools used to analyze that data, and collection and reporting tools for ancillary reporting data.\u00a0 None of these <del>systems<\/del> applications had their own ATO &#8211; but the network enclave did.\u00a0 In my opinion, they all <em>should<\/em> have had an ATO, but it was impossible to make this happen.\u00a0 As the hosting provider, I couldn&#8217;t write the SSAA for the <del>system<\/del> application owners (because I didn&#8217;t have the information necessary), and I couldn&#8217;t simply disconnect the application servers without hosing over my own customers.<\/p>\n<p>Later, when I was responsible for something called the &#8220;DoD Storefront&#8221; project, I tried hard to get my system accredited.\u00a0 We were writing the SSAA, registering in VMS, eMASS&#8230;\u00a0 I wrote the designation memo to get my SES designated as the DAA, signed him up for DAA training, etc.\u00a0 The designation memo was to be signed by my boss&#8217;s boss &#8211; the DoD Deputy CIO, Mr. Dave Wennergren.\u00a0 I never got that far.<\/p>\n<p>I got stopped by Wennergren&#8217;s deputy &#8211; who asserted, &#8220;Why do you need an ATO?\u00a0 This isn&#8217;t really a &#8216;system&#8217;.\u00a0 I think it&#8217;s just an application.\u00a0 Go talk to the Director of the <a title=\"Defense-Wide Information Assurance Program\" href=\"https:\/\/acc.dau.mil\/CommunityBrowser.aspx?id=22234\">DIAP<\/a>(*) and see what she thinks.&#8221;\u00a0 (* Defense-Wide Information Assurance Program)<\/p>\n<p>So I march off to talk to the Director of the DIAP.\u00a0 She asks me a few questions.\u00a0 One of the first questions she asks is: &#8220;Are you buying any servers?&#8221;<\/p>\n<p>I say, &#8220;Of course not!\u00a0 Why, in the name of history, would I do that?!?\u00a0 That&#8217;s datacenter stuff.\u00a0 I mean, there will be servers &#8211; but <em>I&#8217;m<\/em> not gonna buy them.\u00a0 If I bought servers, where would I put them?\u00a0 I just want to be hosted somewhere.\u00a0 Datacenter guys buy the servers.&#8221;<\/p>\n<p>This puzzles her.\u00a0 She thinks for a moment and says, &#8220;You sound like you know how the world actually works.&#8221;\u00a0 This puzzles me&#8230;\u00a0 I&#8217;m not sure what to say about that: &#8220;I don&#8217;t know about that, ma&#8217;am.\u00a0 I&#8217;m just trying to get my system on the net.&#8221;<\/p>\n<p>She asks, &#8220;Could you go talk to Eustace King?\u00a0 He works for me.\u00a0 He&#8217;s responsible for re-writing the instruction on DIACAP.\u00a0 I&#8217;m a little concerned he doesn&#8217;t know how the world really works.&#8221;<\/p>\n<p>Which is how I ended up having a 2-hour long conversation with the author\/editor of DIACAP &#8211; which I&#8217;ve partly described <a title=\"System vs. Application: when is C&amp;A required in DoD?\" href=\"https:\/\/risacher.org\/jfdi\/2013\/02\/system-vs-application-when-is-ca-required-in-dod\/\">elsewhere<\/a>.\u00a0 Long-story-short, even though I really believed I needed an ATO &#8211; the author of DoDI 8510.01 told me Storefront was &#8220;just an application.&#8221;\u00a0 (With seven servers, it&#8217;s own firewalls, accessible to the entire Internet.)\u00a0 Suffice it to say, near the end of the conversation, I said something like, &#8220;You know, the world keeps on changing&#8230;&#8221;, and Eustace sighed, &#8220;Yeah, and I wish it wouldn&#8217;t.&#8221;<\/p>\n<p>Both the conversation with Eustace and the text of OMB Circular A-130 led me to believe that many of our C&amp;A concepts are rooted in an outdated view of how IT systems work.\u00a0 We expect &#8220;small systems&#8221; to be on a &#8220;LAN&#8221; and therefore low risk &#8211; and so the &#8220;enclave&#8221; will protect them.\u00a0 In the age of cloud computing and the web, this view is almost totally nonsensical.\u00a0 The problems with this approach go both ways &#8211; we over-protect some things, and under-protect others.\u00a0 In a &#8220;LAN mentality&#8221;, protecting the network boundary is really important, because the LAN is assumed &#8220;soft on the inside&#8221;, and we (reasonably) assume that if bad actors compromise one system, the whole network is compromised.\u00a0 But in the age of the &#8220;cloudy web&#8221;, we actually know how to isolate systems with significant efficacy.\u00a0 A well-designed DMZ isolates systems from the business network as well as from each other.\u00a0 On the other hand, being hosted on a secure &#8220;enclave&#8221; is meaningless if the firewall is configured to allow access from the entire enterprise, or worse, the entire Internet.<\/p>\n<p>Likewise, our C&amp;A processes don&#8217;t seem to have much provision for division of responsibility &#8230; an infrastructure service provider can be responsible for the security of the infrastructure, and the application service provider responsible for the application, but we require the ATO to address end-to-end risk.\u00a0 Hence the question, &#8220;Are you buying any servers?&#8221;\u00a0\u00a0 In the old days, if you were fielding a system, you would be buying servers&#8230; maybe routers, switches and firewalls too.\u00a0 Those things are commoditized today &#8211; the datacenter operator does not want your non-standard server that doesn&#8217;t fit in his racks or with his management software, and as an app provider, you don&#8217;t want to worry about that cruft.\u00a0\u00a0\u00a0 I do not want to ever know or care what kind of physical server my apps run on.\u00a0 (I&#8217;ve done that. It sucks.)<\/p>\n<p>In some future post, I&#8217;ll try to lay out a few of my ideas of how the policy <em>should<\/em> work.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[This is mirrored on Intelink-U] In a previous post, I traced through the various policy documents that describe the certification and accreditation processes for the Department of Defense, ultimately tracing back to OMB Circular A-130.\u00a0 In summary, &#8220;systems&#8221; need accreditation, while &#8220;applications&#8221; do not, and the distinction (per A-130) turns on the highly subjective decision [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13,5,12],"tags":[],"class_list":["post-187","post","type-post","status-publish","format-standard","hentry","category-ca","category-it","category-work"],"_links":{"self":[{"href":"https:\/\/risacher.org\/jfdi\/wp-json\/wp\/v2\/posts\/187","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/risacher.org\/jfdi\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/risacher.org\/jfdi\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/risacher.org\/jfdi\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/risacher.org\/jfdi\/wp-json\/wp\/v2\/comments?post=187"}],"version-history":[{"count":26,"href":"https:\/\/risacher.org\/jfdi\/wp-json\/wp\/v2\/posts\/187\/revisions"}],"predecessor-version":[{"id":285,"href":"https:\/\/risacher.org\/jfdi\/wp-json\/wp\/v2\/posts\/187\/revisions\/285"}],"wp:attachment":[{"href":"https:\/\/risacher.org\/jfdi\/wp-json\/wp\/v2\/media?parent=187"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/risacher.org\/jfdi\/wp-json\/wp\/v2\/categories?post=187"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/risacher.org\/jfdi\/wp-json\/wp\/v2\/tags?post=187"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}