OPNAV 5239.4 海军作战司令部网络安全计划

VIP文档

ID:55629

阅读量:2

大小:0.11 MB

页数:12页

时间:2023-05-14

金币:10

上传者:战必胜
DEPARTMENT OF THE NAVY
OFFICE OF THE CHIEF OF NAVAL OPERATIONS
2000
NAVY PENTAGON
W
ASHINGTON DC 20350-2000
OPNAVINST 5239.4
N2N6
14 Sep 2018
OPNAV INSTRUCTION 5239.4
From: Chief of Naval Operations
Subj: CHIEF OF NAVAL OPERATIONS CYBERSECURITY SAFETY PROGRAM
Ref: (a) SECNAVINST 5239.22
(b) DoD Instruction 5000.02 of 7 January 2015
(c) DoD Instruction 5200.44 of 5 November 2012
(d) IATA-STD-004-DFIA-V3.0, Defense-in-Depth Functional Implementation
Architecture (DFIA) Standard
(e) National Institute of Standards and Technology, Framework for Improving
Critical Infrastructure Cybersecurity, Version 1.1, 16 April 2018
(f) Committee on National Security Systems Instruction No. 4009, Committee
on National Security Systems Glossary of 6 April 2015
(g) IATA-STD-CSGC-011R0 V1.0, Navy Cybersecurity Safety (CYBERSAFE) Grading
Criteria Standard
(h) IATA-STD-CSGR-012R0 V1.0, Navy Cybersecurity Safety (CYBERSAFE) Grade
Requirements Standard
(i) SECNAVINST 5400.15C
(j) OPNAVINST 5239.1D
(k) IATA-STD-017-CSC-V1.0, Navy Cybersecurity Safety (CYBERSAFE) Certification
Standard
(l) IATA-STD-018-CSAU-V1.0, Navy Cybersecurity Safety (CYBERSAFE) Audit
Standard
(m) IATA-STD-TSN-015-V1.0, Trusted Systems and Networks Standard
(n) SECNAVINST 5000.2E
1. Purpose. The purpose of cybersecurity safety (CYBERSAFE) is to best position the U.S.
Navy to fight and win with speed and agility in the increasingly contested and connected cyber-
dominated battlespace by providing maximum reasonable assurance of resiliency for mission
critical industrial control systems, platform information technology (PIT), and information
technology (IT) systems.
2. Background. As directed by reference (a), this instruction establishes CYBERSAFE policy,
governance, and implementation management for the Navy CYBERSAFE Program. In addition
to the mitigations required by reference (b), enclosure (14), CYBERSAFE implements the
Department of Defense (DoD) trusted systems and networks strategy by identifying and
protecting mission critical items (i.e., safety critical) as described in references (c) and (d). The
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭