recommended reading

DISA charged with securing networks for all but two agencies

The Defense Information Systems Agency has been tapped to tighten up network security of all branches of the federal government except the State Department and the FBI, which have their own systems. The move is in response to the unauthorized release of hundreds of thousands of pages of Pentagon and State classified documents in 2010 and 2011 by the website WikiLeaks, the agency said.

Defense Secretary Leon Panetta on July 20 hinted at Pentagon assistance to other federal agencies to beef up security for their networks. DISA obliquely disclosed Monday in contract documents that it will function as the common service provider for the new public key infrastructure hardware tokens, certificates and services for federal classified and secret networks except those belonging to State and the FBI.

DISA made clear that the fallout from WikiLeaks’ disclosure of classified Defense Department documents and State cables is the reason for its broad new governmentwide network security role.

“In response to WikiLeaks, the Office of Management and Budget and the [21 agency] Committee for National Security Systems determined that all federal agencies that operate on the federal classified [or] Secret networks must implement a hardware-based PKI solution to protect their information and networks. The objective is to remove anonymity and improve the overall security of the federal Secret networks,” DISA said.

The agency added, “there is a sense of urgency to have all federal agencies using hardware tokens to access their networks and information as quickly as possible. Since DoD is already well on their way to implementing the DoD PKI SIPRNET [Secret Internet Protocol Router Network] token capability, it was decided that DoD would leverage its existing infrastructure to stand up a common service provider capability to all federal agencies except for Department of State and FBI, which already had their own systems. Because DISA is the operator of the DoD PKI, DISA will be the CSP for the federal agencies.”

DISA buried this information in a sole source justification document appended to a contract award, obscurely titled DISA PEO-MA Common Service Provider, posted on the Federal Business Opportunities website Monday.

The agency said it tapped Tangible Software Inc. of McLean VA, the Defense PKI contractor, to support PKI tokens and related security services governmentwide, as it is the only contractor with the requisite knowledge, experience and skills to accomplish the job. DISA awarded the company a contract valued at $8.9 million for one base year and two option years.

In its new role as the common security for most federal departments and agencies, DISA said, “token management capability and certificate authorities need to be significantly changed to reflect federal naming standards, add additional profiles and configurations for the other federal agencies, and provide the separation of the agencies within the registration and issuance process.”

As federal network common services provider, DISA said it will be responsible for operating the infrastructure to provide certificate life-cycle management to participating agencies, registration authorities services to support certificate issuance, overall management for smaller agencies, training and help desk support.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • It’s Time for the Federal Government to Embrace Wireless and Mobility

    The United States has turned a corner on the adoption of mobile phones, tablets and other smart devices, outpacing traditional desktop and laptop sales by a wide margin. This issue brief discusses the state of wireless and mobility in federal government and outlines why now is the time to embrace these technologies in government.

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • A New Security Architecture for Federal Networks

    Federal government networks are under constant attack, and the number of those attacks is increasing. This issue brief discusses today's threats and a new model for the future.

  • Going Agile:Revolutionizing Federal Digital Services Delivery

    Here’s one indication that times have changed: Harriet Tubman is going to be the next face of the twenty dollar bill. Another sign of change? The way in which the federal government arrived at that decision.

  • Software-Defined Networking

    So many demands are being placed on federal information technology networks, which must handle vast amounts of data, accommodate voice and video, and cope with a multitude of highly connected devices while keeping government information secure from cyber threats. This issue brief discusses the state of SDN in the federal government and the path forward.

  • The New IP: Moving Government Agencies Toward the Network of The Future

    Federal IT managers are looking to modernize legacy network infrastructures that are taxed by growing demands from mobile devices, video, vast amounts of data, and more. This issue brief discusses the federal government network landscape, as well as market, financial force drivers for network modernization.


When you download a report, your information may be shared with the underwriters of that document.