<?xml version="1.0" encoding="UTF-8"?>
<StrategicPlan xmlns="" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:stratml="urn:ISO:std:iso:17469:tech:xsd:stratml_core"><Name>U.S. Department of Defense Cyber Strategy</Name><Description>This strategy presents an aggressive, specific plan for achieving change. For DoD to succeed in 
its mission of defending the United States and its interests in cyberspace, leaders from across 
the Department must take action to achieve the objectives outlined in this document. They must 
also hold their organizations accountable. Because of the nature of networks and computer 
code, no single organization can be relied upon to do this work. Success requires close 
collaboration across DoD, between agencies of the U.S. government, with the private sector, and 
with U.S. allies and partners. </Description><OtherInformation>We live in a time of growing cyber threats to U.S. interests. State and non-state actors threaten 
disruptive and destructive attacks against the United States and conduct cyber-enabled theft of 
intellectual property to undercut the United States’ technological and military advantage. We 
are vulnerable in cyberspace, and the scale of the cyber threat requires urgent action by leaders 
and organizations across the government and the private sector. 
Since developing its first cyber strategy in 2011, the Defense Department has made significant 
progress in building its cyber capabilities, developing its organizations and plans, and fostering 
the partnerships necessary to defend the country and its interests. More must be done. 
Stemming from the goals and objectives outlined in this strategy, appropriate resources must be 
aligned and managed to ensure progress...
The strategic environment can change quickly. That is especially true in cyberspace. We must be 
dynamic, flexible, and agile in this work. We must anticipate emerging threats, identify new 
capabilities to build, and determine how to enhance our partnerships and planning. As always, 
our women and men – both uniformed and civilian personnel – will be our greatest and most 
enduring strength and a constant source of inspiration. By working together we will help 
protect and defend the United States and its interests in the digital age.</OtherInformation><StrategicPlanCore><Organization><Name>U.S. Department  of Defense</Name><Acronym>DoD</Acronym><Identifier>_5e8dcfdc-5d6a-11df-839d-400e7a64ea2a</Identifier><Description/><Stakeholder StakeholderTypeType="Person"><Name>Ashton Carter</Name><Description>Secretary of Defense</Description></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>National Mission Teams</Name><Description>13 teams -- 

Defend the United States and its interests against cyberattacks of significant consequence.</Description></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cyber Protection Teams</Name><Description>68 teams -- 

Defend priority DoD networks and systems against priority threats.</Description></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Combat Mission Teams</Name><Description>27 teams -- 

Provide support to Combatant Commands by generating integrated cyberspace effects in support of operational plans and contingency operations.</Description></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Support Teams</Name><Description>25 teams -- 

Provide analytic and planning support to the National Mission and Combat Mission teams.</Description></Stakeholder></Organization><Vision><Description/><Identifier>_d447d854-679f-11e5-8193-20c88df7775b</Identifier></Vision><Mission><Description>To guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture.</Description><Identifier>_d447da66-679f-11e5-8193-20c88df7775b</Identifier></Mission><Value><Name/><Description/></Value><Goal><Name>Forces &amp; Capabilities</Name><Description>BUILD AND MAINTAIN READY FORCES AND CAPABILITIES 
TO CONDUCT CYBERSPACE OPERATIONS.</Description><Identifier>_d447db92-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>To operate effectively in cyberspace, DoD requires forces and personnel that are trained to the 
highest standard, ready, and equipped with best-in-class technical capabilities. In 2013 DoD 
initiated a major investment in its cyber personnel and technologies by initiating the CMF; now 
DoD must make good on that investment by training its people, building effective organizations 
and command and control systems, and fully developing the capabilities that DoD requires to 
operate in cyberspace. This strategy sets specific objectives for DoD to meet as it mans, trains, 
and equips its forces and personnel over the next five years and beyond.</OtherInformation><Objective><Name>Cyber Workforce</Name><Description>Build the cyber workforce. </Description><Identifier>_d447e146-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.A</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cyber Workforce</Name><Description/></Stakeholder><OtherInformation>To make good on DoD’s significant investment in cyber 
personnel, and to help achieve many of the objectives in this strategy, DoD’s first priority is 
to develop a ready Cyber Mission Force and associated cyber workforce. This workforce 
will be built on three foundational pillars: enhanced training; improved military and civilian 
recruitment and retention; and stronger private sector support. </OtherInformation></Objective><Objective><Name>Training</Name><Description>Maintain a persistent training environment.</Description><Identifier>_d447e42a-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.A.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>DoD requires an individual and collective 
training capability to achieve the goals outlined in this strategy and to meet future 
operational requirements. U.S. Cyber Command will work with other components, 
agencies, and military departments to define the requirements for and create a training 
environment that will enable the total cyber force to conduct joint training (including 
exercises and mission rehearsals), experimentation, certification, as well as the 
assessment and development of cyber capabilities and tactics, techniques, and 
procedures for missions that cross boundaries and networks. </OtherInformation></Objective><Objective><Name>Career Paths</Name><Description>Build viable career paths.</Description><Identifier>_d447e5ba-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.A.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Throughout the course of this strategy, and following the 
CMF decisions of 2013, DoD will continue to foster viable career paths for all military 
personnel performing and supporting cyber operations.</OtherInformation></Objective><Objective><Name>National Guard &amp; Reserve</Name><Description>Draw on the National Guard and Reserve.</Description><Identifier>_d447e7e0-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.A.iii</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>National Guard</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>National Reserve</Name><Description/></Stakeholder><OtherInformation>Throughout the course of this strategy, DoD 
will draw on the National Guard and Reserve Components as a resource for expertise 
and to foster creative solutions to cybersecurity problems. The Reserve Component 
offers a unique capability for supporting each of DoD’s missions, including for engaging 
the defense industrial base and the commercial sector. It represents DoD’s critical surge 
capacity for cyber responders.</OtherInformation></Objective><Objective><Name>Recruitment &amp; Retention</Name><Description>Improve civilian recruitment and retention. </Description><Identifier>_d447e9d4-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.A.iv</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Civilians</Name><Description/></Stakeholder><OtherInformation>In addition to developing highly-skilled 
military personnel, DoD must recruit and retain highly-skilled civilian personnel, 
including technical personnel for its total cyber workforce. Civilians must follow a well-developed career development and advancement track and be provided with best-in-class opportunities to develop and succeed within the workforce.</OtherInformation></Objective><Objective><Name>Exchange Programs</Name><Description>Develop and implement exchange programs with the private sector.</Description><Identifier>_d447eb5a-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.A.v</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>The Private Sector</Name><Description/></Stakeholder><OtherInformation>To supplement 
DoD’s civilian cyber workforce, DoD must be able to employ technical subject matter 
experts from the best cybersecurity and information technology companies in the 
country to perform unique engineering and analytic roles within DoD. The Defense 
Department will implement successful private sector exchange programs to bring 
measurable benefits to the Department of Defense through the design and development 
of new operational concepts for DoD’s cyberspace missions.</OtherInformation></Objective><Objective><Name>Cyberspace Education</Name><Description>Support the National Initiative for Cyberspace Education.</Description><Identifier>_d447ed80-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.A.vi</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>DoD will develop policies to 
support the National Initiative for Cybersecurity Education. Working with interagency 
partners, one or more educational institutions, as well as state and private sector
partners, DoD will continue to support innovative workforce development partnerships 
focused on both the technical and policy dimensions of cybersecurity and cyber defense. </OtherInformation></Objective><Objective><Name>Technical Capabilities</Name><Description>Build technical capabilities for cyber operations.</Description><Identifier>_d447ef88-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.B</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>President of the United States</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Secretary of Defense</Name><Description/></Stakeholder><OtherInformation>In 2013, DoD developed a model for 
achieving CMF readiness and for developing viable cyber military options to present to the 
President and Secretary of Defense. DoD must have the technical tools available to conduct 
operations in support of combatant command missions. Key initiatives include the 
following:</OtherInformation></Objective><Objective><Name>Unified Platform</Name><Description>Develop the Unified Platform.</Description><Identifier>_d447f10e-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.B.i</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name/><Description/></Stakeholder><OtherInformation>On the basis of planning requirements, DoD will 
develop the detailed requirements for integrating disparate cyber platforms and 
building an interoperable and extendable network of cyber capabilities. This Unified 
Platform will enable the CMF to conduct full-spectrum cyberspace operations in support 
of national requirements. </OtherInformation></Objective><Objective><Name>R&amp;D</Name><Description>Accelerate research and development.</Description><Identifier>_d447f348-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.B.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name/><Description/></Stakeholder><OtherInformation>The Defense Department will continue to 
accelerate innovative cyber research and development to build cyber capabilities. The DoD research and development community as well as established and emerging private 
sector partners can provide DoD and the nation with a significant advantage in 
developing leap-ahead technologies to defend U.S. interests in cyberspace. In addition to
supporting current and planned investments, DoD will focus its basic and applied 
research agenda on developing cyber capabilities to expand the capacity of the CMF and 
the broader DoD cyber workforce.</OtherInformation></Objective><Objective><Name>Command &amp; Control</Name><Description>Validate and continually refine an adaptive command and control mechanism for cyber operations.</Description><Identifier>_d447f53c-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.C</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name/><Description/></Stakeholder><OtherInformation>DoD has made significant progress in recent years in developing command and 
control for all three of its missions, but its command and control model must be finalized, 
resourced, and tested to ensure effectiveness. The command and control model must 
support USCYBERCOM and the combatant commands. It must be efficient and practical, 
and must promote unity of effort of effort across all three cyber missions.</OtherInformation></Objective><Objective><Name>Modeling &amp; Simulation</Name><Description>Establish an enterprise-wide cyber modeling and simulation capability.</Description><Identifier>_d447f6cc-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.D</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Intelligence Community</Name><Description/></Stakeholder><OtherInformation>DoD will work in 
collaboration with the intelligence community to develop the data schema, databases, 
algorithms, and modeling and simulation (M&amp;S) capabilities necessary to assess the 
effectiveness of cyber operations.</OtherInformation></Objective><Objective><Name>Capacity Assessment</Name><Description>Assess Cyber Mission Force capacity.</Description><Identifier>_d447f910-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.E</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cyber Mission Force</Name><Description/></Stakeholder><OtherInformation>Assess the capacity of the projected Cyber 
Mission Force to achieve its mission 
objectives when confronted with multiple 
contingencies.
</OtherInformation></Objective><Objective><Name>Metrics</Name><Description>Propose, collect, analyze, and report a set of appropriate metrics to measure the operational capacity of the CMF.</Description><Identifier>_d447fb0e-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>I.E.i</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>Principal Cyber Advisor</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Joint Staff</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>USCYBERCOM</Name><Description/></Stakeholder><OtherInformation>The Joint Staff, with support from 
USCYBERCOM and other DoD 
components, will propose, collect, 
analyze, and report a set of appropriate 
metrics to the Principal Cyber Advisor to 
measure the operational capacity of the 
CMF. These metrics will include updates 
on the status of USCYBERCOM 
contingency capabilities, to include 
capability development and proficiency as well as accesses and tools that may be 
required in a contingency. In response to this analysis, DoD will develop a plan for 
ensuring that the CMF has the appropriate capacity and flexibility available to respond 
to changes in the strategic environment.</OtherInformation></Objective></Goal><Goal><Name>Network, Data &amp; Risks</Name><Description>DEFEND THE DOD INFORMATION NETWORK, SECURE DOD DATA, AND MITIGATE RISKS TO DOD MISSIONS.</Description><Identifier>_d447fc9e-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>While DoD cannot defend every network and system against every kind of intrusion – DoD’s 
total network attack surface is too large to defend against all threats and too vast to close all 
vulnerabilities – DoD must take steps to identify, prioritize, and defend its most important 
networks and data so that it can carry out its missions effectively. DoD must also plan and 
exercise to operate within a degraded and disrupted cyber environment in the event that an 
attack on DoD’s networks and data succeeds, or if aspects of the critical infrastructure on which 
DoD relies for its operational and contingency plans are disrupted.
Finally, DoD must raise the bar on technology and innovation to stay ahead of the threat by 
enhancing its cyber defense capabilities, including by building and employing a more 
defendable network architecture in the Joint Information Environment (JIE). Outside of DoD 
networks, DoD must work with the private sector to help secure defense industrial base trade data, and be prepared to assist other agencies in hardening U.S. networks and data against 
cyberattacks and cyber espionage.</OtherInformation><Objective><Name>Joint Information Environment</Name><Description>Build the Joint Information Environment (JIE) single security architecture.</Description><Identifier>_d447fee2-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.A</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>USCYBERCOM</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Combatant Commands</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD Components</Name><Description/></Stakeholder><OtherInformation>The Defense 
Department will build DoD information networks to meet the JIE’s single security architecture. The single security architecture will adapt and evolve to mitigate cyber threats; 
it will help DoD to develop and follow best-in-class cybersecurity practices, and its small 
network footprint will allow USCYBERCOM, combatant commands, and DoD components 
to maintain comprehensive situational awareness of network threats and mitigations.</OtherInformation></Objective><Objective><Name>Enterprise Security</Name><Description>Enable a robust network defense and shift the focus from protecting service-specific networks and systems to securing the DoD enterprise in a unified manner.</Description><Identifier>_d44800f4-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.A.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>The JIE’s single security architecture will enable a robust network defense and shift the 
focus from protecting service-specific networks and systems to securing the DoD 
enterprise in a unified manner. The JIE’s single security architecture must be developed 
with enhanced cyber situational awareness, deployed in response to validated 
requirements, and able to accommodate future defensive measures. 
</OtherInformation></Objective><Objective><Name>New Techniques</Name><Description>Develop and integrate new defensive techniques into DoD’s cybersecurity architecture.</Description><Identifier>_d4480298-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.A.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>As a part of JIE planning DoD will develop a framework for developing and integrating 
new defensive techniques into DoD’s cybersecurity architecture, to include anomaly-based detection capabilities, data analytics to identify vulnerabilities and threats, and
advanced encryption methods.
</OtherInformation></Objective><Objective><Name>Joint Force Headquarters</Name><Description>Assess and ensure the effectiveness of the Joint Force Headquarters for DoD information network (DoDIN) operations.</Description><Identifier>_d4480522-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.B</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Joint Force Headquarters</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>USCYBERCOM</Name><Description/></Stakeholder><OtherInformation>Operating under USCYBERCOM, the Joint Force 
Headquarters-DoDIN will coordinate network defense and mitigate cyber risks to DoD 
operations and missions across the defense enterprise. DoD will assess, validate, and fully 
implement the Joint Force Headquarters-DoDIN concept to operate DoD networks securely, 
defend DoD networks, and mitigate cyber risks to DoD missions. </OtherInformation></Objective><Objective><Name>Vulnerabilities</Name><Description>Mitigate known vulnerabilities.</Description><Identifier>_d448070c-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.C</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name/><Description/></Stakeholder><OtherInformation>The Defense Department will implement a capability to 
mitigate all known vulnerabilities that present a high risk to DoD networks and data. In 
addition to zero-day vulnerabilities, one of the greatest threats to DoD networks and 
systems lies in known, high-risk vulnerabilities that potential adversaries can exploit. DoD 
often finds itself rushing to close vulnerabilities once an adversary has penetrated a system.
The DoD Chief Information Officer (CIO) will lead an effort to implement an automated 
patch management capability to distribute software and configuration patches, updates, and 
fixes to mitigate known, major vulnerabilities on DoD networks and systems against threats. </OtherInformation></Objective><Objective><Name>Cyber Defense Assessment</Name><Description>Assess DoD’s cyber defense forces.</Description><Identifier>_d44808c4-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.D</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cyber Protection Team</Name><Description/></Stakeholder><OtherInformation>The Defense Department will assess its cyber defense 
forces’ ability to conduct integrated, adaptive, and dynamic defensive operations.
Enterprise-level and Cyber Protection Team (CPT) network defenders must be able to 
discover, detect, analyze, and mitigate threats and vulnerabilities to defend the DoD 
information network.</OtherInformation></Objective><Objective><Name>Computer Network Defense Service Provider</Name><Description>Improve the effectiveness of the current DoD Computer Network Defense Service Provider (CNDSP) construct in defending and protecting DoD networks.</Description><Identifier>_d4480c0c-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.E</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>Computer 
network defense service providers deliver cybersecurity solutions for DoD networks, to 
include monitoring, detection, and protection capabilities. The Defense Department will 
determine whether current CNDSP processes are sufficient to defend networks against 
known and projected threats in cyberspace and whether current CNDSP forces are 
adequately trained and equipped to defend against advanced threats. Finally, DoD will determine whether its CNDSP forces can integrate into the broader cyberspace command 
and control construct and how that integrated construct will perform in the face of cyber 
threats that span CNDSP and CPT protected networks and data.</OtherInformation></Objective><Objective><Name>Network Defense &amp; Resilience</Name><Description>Plan for network defense and resilience. </Description><Identifier>_d4480e32-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.F</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>The Defense Department must identify and plan 
to defend the networks that support key DoD missions. The Department must make a 
careful assessment of the priority assets that it must defend in cyberspace to assure DoD 
missions and exercise to defend those assets effectively.</OtherInformation></Objective><Objective><Name>Mission Assurance</Name><Description>Integrate cyber into mission assurance assessments.</Description><Identifier>_d4480ff4-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.F.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>The Defense Department will 
integrate cybersecurity requirements and assessments into the DoD Mission Assurance 
program and update DoD policy appropriately. Currently DoD components take 
varying approaches to measuring and 
assessing cyber risks for mission 
assurance. DoD will develop a Joint 
Mission Assurance Assessment Program 
that includes the integration of 
cybersecurity assessments, cybersecurity 
requirements, and cyber operations’ 
requirements.</OtherInformation></Objective><Objective><Name>Capability Assessement</Name><Description>Assess Cyber Protection Team (CPT) capabilities. </Description><Identifier>_d448126a-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.F.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cyber Protection Teams</Name><Description/></Stakeholder><OtherInformation>DoD will complete an 
assessment of CPT capacity, capability, 
and employment model in regard to 
mission assurance priorities as set by 
combatant command requirements.</OtherInformation></Objective><Objective><Name>Weapons Systems</Name><Description>Improve weapons systems cybersecurity.</Description><Identifier>_d448149a-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.F.iii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>DoD will assess and initiate improvements to 
the cybersecurity of current and future weapons systems, doing so on the basis of 
operational requirements. For all future weapons systems that DoD will acquire or 
procure, DoD will mandate specific cybersecurity standards for weapons systems to 
meet. Acquisition and procurement policy and practice will be updated to promote 
effective cybersecurity throughout a system’s life cycle. </OtherInformation></Objective><Objective><Name>Continuity Plans</Name><Description>Build and exercise continuity plans.</Description><Identifier>_d4481670-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.F.iv</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD Components</Name><Description/></Stakeholder><OtherInformation>All DoD components will identify and build 
resiliency plans to maintain continuity of their most critical operations in the event of 
network disruption and degradation. Military campaign plans must fully incorporate 
the ability to operate in a degraded cyber environment; military forces must exercise and 
be able to conduct military campaigns in a degraded cyber environment where access to 
networks and data is uncertain. Components must balance cyber risks effectively to 
ensure that they can continue to carry out their missions in the physical world. </OtherInformation></Objective><Objective><Name>Red Teams</Name><Description>Red team DoD’s network defenses.</Description><Identifier>_d44818fa-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.G</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>The Defense Department has developed mature red 
team capabilities to test vital networks and mission systems for vulnerabilities and to better prepare its cyber defense forces. Going forward, DoD must focus its red team capabilities on 
priority networks and mission systems to assure DoD’s ability to carry out its most critical 
missions. As a part of this work, every major DoD exercise should include a cyber red team 
to test DoD's cyber defenses in a realistic scenario where the Department could have its 
operations disrupted by an adversary. Components will be audited regularly to ensure 
progress in incorporating red team findings and improving their cybersecurity posture.</OtherInformation></Objective><Objective><Name>Insider Threats</Name><Description>Mitigate the risk of insider threats.</Description><Identifier>_d4481b34-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.H</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>The nation's defense depends upon the fidelity of those 
entrusted with the nation's secrets. The Defense Department has invested in the 
technological and personnel solutions necessary to identify threats before they can impact 
U.S. national security. The Defense Department continues to deploy and implement these 
solutions through continuous network monitoring, improved cybersecurity training for the 
workforce, and improved methods for identifying, reporting, and tracking suspicious 
behavior.</OtherInformation></Objective><Objective><Name>Awareness, Anticipation, Detection &amp; Response</Name><Description>Create a culture of awareness to anticipate, detect, and respond to insider 
threats,</Description><Identifier>_d4481d0a-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.H.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>This work extends beyond information technology and includes matters of personnel 
and reliability. Mitigating the insider threat requires good leadership and accountability 
throughout the workforce. Beyond implementing policies and protocols, leaders will 
strive to create a culture of awareness to anticipate, detect, and respond to insider 
threats before they have an impact.</OtherInformation></Objective><Objective><Name>Civil Authorities</Name><Description>Exercise to provide Defense Support of Civil Authorities.</Description><Identifier>_d4481fa8-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.I</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Civil Authorities</Name><Description/></Stakeholder><OtherInformation>Under its existing and planned 
force structure, DoD will develop a framework and exercise its Defense Support of Civil 
Authorities (DSCA) capabilities in support of DHS and other agencies and with state and 
local authorities to help defend the federal government and the private sector in an 
emergency if directed.</OtherInformation></Objective><Objective><Name>Critical Infrastructure</Name><Description>Exercise for contingencies that may require emergency allocation of forces to 
help protect critical infrastructure.</Description><Identifier>_d4482200-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.I.i</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>DHS</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>FBI</Name><Description/></Stakeholder><OtherInformation>DoD‘s annual exercise program, to include Cyber Guard, will include exercising with 
DHS and the FBI for contingencies that may require emergency allocation of forces to 
help protect critical infrastructure, under 
partner agencies’ lead. This framework will 
describe how combatant commands and combat 
support agencies can partner with DHS and FBI 
and other agencies to improve integration, 
training and support.</OtherInformation></Objective><Objective><Name>National Guard</Name><Description>Define and refine the National Guard’s role in supporting law enforcement, 
Homeland Defense, and Defense Support of Civil Authorities missions.</Description><Identifier>_d44823ea-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.J</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>National Guard</Name><Description/></Stakeholder><OtherInformation>DoD will work 
with the National Guard to define the 
coordinate, train, advise, and assist (C/TAA) 
roles of the National Guard force and refine 
implementation through Cyber Guard 16-1. 
Under its existing and planned force structure, National Guard forces will exercise to coordinate, train, advise, and assist state and local 
agencies and domestic critical infrastructure and to provide support to law enforcement, 
Homeland Defense, and Defense Support of Civil Authorities activities in support of 
national objectives.</OtherInformation></Objective><Objective><Name>Data Protection</Name><Description>Improve accountability and responsibility for the protection of data across DoD and the DIB.</Description><Identifier>_d44826a6-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.K</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Defense Cyber Crime Center</Name><Description/></Stakeholder><OtherInformation>The Defense Department will ensure that policies and any associated federal rules or 
contract language requirements have been implemented to require DIB companies to report 
data theft and loss to the Defense Cyber Crime Center. </OtherInformation></Objective><Objective><Name>DFARS</Name><Description>Assess Defense Federal Acquisition Regulation Supplement (DFARS) rules and associated guidance to ensure they mature over time in a manner 
consistent with known standards for protecting data.</Description><Identifier>_d44828fe-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.K.1</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name/><Description/></Stakeholder><OtherInformation>DoD will continue to assess Defense Federal Acquisition Regulation Supplement 
(DFARS) rules and associated guidance to ensure they mature over time in a manner 
consistent with known standards for protecting data from cyber adversaries, to include 
standards promulgated by the National Institute of Standards and Technology (NIST). </OtherInformation></Objective><Objective><Name>Information Sharing</Name><Description>Expand companies' participation in threat information sharing programs.</Description><Identifier>_d4482ade-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.K.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Companies</Name><Description/></Stakeholder><OtherInformation>DoD will continue to expand companies' participation in threat information sharing 
programs, such as the Cyber Security/Information Assurance program. </OtherInformation></Objective><Objective><Name>Education &amp; Training</Name><Description>Expand education and training programs to include material for 
DoD personnel and DIB contractors to enhance their cyber threat awareness.</Description><Identifier>_d4482dae-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.K.iii</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Defense  Security Service</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD Personnel</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DIB Contractors</Name><Description/></Stakeholder><OtherInformation>As the certification authority for DIB cleared defense contractor sites, the Defense 
Security Service will expand education and training programs to include material for 
DoD personnel and DIB contractors to enhance their cyber threat awareness. </OtherInformation></Objective><Objective><Name>Acquisition &amp; Technology Programs</Name><Description>Review the sufficiency of current classification guidance for critical acquisition and technology programs.</Description><Identifier>_d4482ffc-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.K.iv</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Under Secretary of Defense for Intelligence</Name><Description/></Stakeholder><OtherInformation>In addition, the Office of the Under Secretary of Defense for Intelligence will review the sufficiency of current classification guidance for critical acquisition and technology 
programs to protect information on contractor networks.</OtherInformation></Objective><Objective><Name>Procurement &amp; Acquisition Cybersecurity</Name><Description>Strengthen DoD’s procurement and acquisition cybersecurity standards.</Description><Identifier>_d4483272-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.L</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name/><Description/></Stakeholder><OtherInformation>To defend DoD 
networks, DoD must strengthen the cybersecurity requirements of DoD’s network 
acquisition and procurement items by integrating cybersecurity standards into contract 
vehicles for research, development, and procurement. DoD will specify additional 
cybersecurity standards for industry to meet for components of any DoD procurement item.</OtherInformation></Objective><Objective><Name>Collaboration</Name><Description>Build collaboration between the acquisition, intelligence, counterintelligence, law 
enforcement, and operations communities to prevent, mitigate, and respond to data loss.</Description><Identifier>_d4483538-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.M</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Acquisition Community</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Intelligence Community</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Counterintelligence Community</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Law Enforcement Community</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Operations Community</Name><Description/></Stakeholder><OtherInformation>DoD will establish a Joint Acquisition Protection and Exploitation Cell (JAPEC) to link 
intelligence, counterintelligence, and law enforcement agents with acquisition program 
managers to prevent and mitigate data loss and theft. DoD will conduct comprehensive risk 
and damage assessments of cyber espionage and theft to inform requirements, acquisition, 
programmatic, and counterintelligence courses of action.</OtherInformation></Objective><Objective><Name>Information System Security Controls</Name><Description>Assess and update specific information system security controls that underpin the DFARs for defense contractors.</Description><Identifier>_d44837b8-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.M.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Defense Contractors</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>DoD CIO</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics</Name><Description/></Stakeholder><OtherInformation>The DoD CIO, in collaboration with the Office of the Under Secretary of Defense for 
Acquisition, Technology, and Logistics, will assess and update specific information 
system security controls that underpin the DFARs for defense contractors within the 
NIST and DFARS standards. </OtherInformation></Objective><Objective><Name>Alert Capabilities &amp; Cyber Defenses</Name><Description>Work with companies to develop alert capabilities and build layered cyber defenses.</Description><Identifier>_d44839ca-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.M.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Companies</Name><Description/></Stakeholder><OtherInformation>To safeguard critical programs and technologies DoD will work with companies to 
develop alert capabilities and build layered cyber defenses.</OtherInformation></Objective><Objective><Name>Risk &amp; Damage Assessment</Name><Description>Streamline risk and damage assessment processes to better inform decisions to 
maintain, modify, or cancel penetrated programs. </Description><Identifier>_d4483c86-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.M.iii</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Defense Cyber Crime Center</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Principal Cyber Advisor to the Secretary of Defense</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics</Name><Description/></Stakeholder><OtherInformation>Finally, the Defense Cyber Crime Center, the Principal Cyber Advisor to the Secretary of 
Defense, and the Office of the Under Secretary of Defense for Acquisition, Technology, 
and Logistics will collaborate with the Services' Damage Assessment Management 
Offices to streamline risk and damage assessment processes to better inform decisions to 
maintain, modify, or cancel penetrated programs. </OtherInformation></Objective><Objective><Name>Intrusions</Name><Description>Use DoD counterintelligence capabilities to defend against intrusions.</Description><Identifier>_d4483ef2-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.N</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>Principal Cyber Advisor</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Secretary of Defense</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Military Departments</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Under Secretary of Defense for Intelligence</Name><Description/></Stakeholder><OtherInformation>The Military Departments and the Under Secretary of Defense for Intelligence, in consultation with the 
Principal Cyber Advisor, will develop a strategy for the Secretary of Defense’s approval that 
maximizes the capabilities and authorities of the military departments’ counterintelligence 
agencies to identify, attribute, and defend against cyber intruders. </OtherInformation></Objective><Objective><Name>Cyber Espionage</Name><Description>Improve insight into and frustrate and defeat cyber espionage.</Description><Identifier>_d4484104-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.N.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Counterintelligence Authorities</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Intelligence Community</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Law Enforcement Community</Name><Description/></Stakeholder><OtherInformation>Counterintelligence authorities are uniquely positioned to improve our insight into and 
frustrate and defeat cyber espionage. The strategy will specify how DoD’s 
counterintelligence agencies will collaborate more effectively with the broader U.S. 
intelligence and law enforcement communities on investigations and human and 
technical operations to thwart cyber-enabled intellectual property theft against the 
United States and its allies and partners.</OtherInformation></Objective><Objective><Name>Intellectual Property</Name><Description>Counter intellectual property theft.</Description><Identifier>_d44843d4-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>II.O</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Government Agencies</Name><Description/></Stakeholder><OtherInformation>The Defense Department will continue to work with other agencies of the U.S. 
government to counter the threat posed by intellectual property theft through cyberspace.</OtherInformation></Objective></Goal><Goal><Name>Homeland &amp; Interests</Name><Description>BE PREPARED TO DEFEND THE U.S. HOMELAND AND U.S.
VITAL INTERESTS FROM DISRUPTIVE OR DESTRUCTIVE CYBERATTACKS OF 
SIGNIFICANT CONSEQUENCE.</Description><Identifier>_d4484654-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>The Department of Defense must work with its 
interagency partners, the private sector, and allied 
and partner nations to deter and if necessary defeat a 
cyberattack of significant consequence on the U.S. 
homeland and U.S. interests. The Defense 
Department must develop its intelligence, warning, 
and operational capabilities to mitigate sophisticated, 
malicious cyberattacks before they can impact U.S. 
interests. Consistent with all applicable laws and 
policies, DoD requires granular, detailed, predictive, 
and actionable intelligence about global networks 
and systems, adversary capabilities, and malware 
brokers and markets. To defend the nation, DoD 
must build partnerships with other agencies of the 
government to prepare to conduct combined cyber 
operations to deter and if necessary defeat aggression 
in cyberspace. The Defense Department is focused on 
building the capabilities, processes, and plans 
necessary to succeed in this mission. </OtherInformation><Objective><Name>Threats</Name><Description>Continue to develop intelligence and warning capabilities to anticipate threats.</Description><Identifier>_d4484866-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.A</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>To defend 
the nation against cyberattacks of significant consequence, DoD will work with the broader 
intelligence community to develop intelligence capabilities about adversary activities and 
prepare to disrupt cyberattacks before they can impact the U.S. homeland and U.S. interests. 
To meet combatant command contingency requirements, DoD will expand its intelligence of 
key adversary human and technical networks. To operate effectively in cyberspace DoD 
requires cyber intelligence and warning and shared situational awareness through all 
phases of a potential operation. All intelligence collection will follow the law and guidance 
outlined in executive orders.</OtherInformation></Objective><Objective><Name>Capabilities</Name><Description>Develop and exercise capabilities to defend the nation.</Description><Identifier>_d4484b68-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.B</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>National Mission Force</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD Components</Name><Description/></Stakeholder><OtherInformation>The National Mission Force and 
other relevant DoD components will train and partner with key interagency organizations to prepare to conduct cyber operations to defend the nation from cyberattacks of significant 
consequence. In addition, DoD will practice emergency procedures through regular 
exercises at all levels of the Department and support interagency exercises to practice
emergency and deliberate cyber action procedures.</OtherInformation></Objective><Objective><Name>Partnerships</Name><Description>Build partnerships to defend the nation.</Description><Identifier>_d4484df2-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.B.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>DoD will have a framework in place to 
cooperate with other government 
agencies to conduct defend the nation 
operations. DoD will work with FBI, CIA, 
DHS and other agencies to build 
relationships and integrate capabilities to 
provide the President with the widest 
range of options available to respond to a
cyberattack of significant consequence to 
the United States.</OtherInformation></Objective><Objective><Name>Annual Reviews</Name><Description>Conduct an annual comprehensive review of DoD’s defend the nation capabilities.</Description><Identifier>_d4485018-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.B.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>The Defense Department’s 
requirements and capabilities for its 
mission to defend the nation against 
cyberattacks of significant consequence 
will evolve over time. On an annual basis, DoD will conduct an in-depth review of the 
capabilities available and required for the mission. As a part of this review, DoD will 
validate new requirements and identify gaps and initiatives to pursue.</OtherInformation></Objective><Objective><Name>Critical Infrastructure</Name><Description>Develop innovative approaches to defending U.S. critical infrastructure.</Description><Identifier>_d448532e-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.C</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name/><Description/></Stakeholder><OtherInformation>DoD will work 
with DHS to improve the Enhanced Cybersecurity Services program and encourage 
additional critical infrastructure entities to participate, with a particular emphasis on 
increasing the number of defense critical infrastructure participants.</OtherInformation></Objective><Objective><Name>Information Sharing</Name><Description>Develop automated information sharing tools.</Description><Identifier>_d44855e0-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.D</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>DHS</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Government Agencies</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Congress</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>The Private Sector</Name><Description/></Stakeholder><OtherInformation>To improve shared situational awareness 
DoD will partner with DHS and other agencies to develop continuous, automated, 
standardized mechanisms for sharing information with each of its critical partners in the 
U.S. government, key allied and partner militaries, state and local governments, and the 
private sector. In addition, DoD will work with other U.S. government agencies and 
Congress to support legislation that enables information sharing between the U.S. 
government and the private sector.</OtherInformation></Objective><Objective><Name>Cyber Deterrence</Name><Description>Assess DoD’s cyber deterrence posture and strategy.</Description><Identifier>_d44858f6-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.E</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Defense Science  Board</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Task Force on Cyber Deterrence</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>U.S. Strategic Command</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Joint Staff</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Secretary of Defense</Name><Description/></Stakeholder><OtherInformation>Building off of the Defense Science 
Board’s Task Force on Cyber Deterrence, U.S. Strategic Command (USSTRATCOM), in 
coordination with the Joint Staff and the Office of the Secretary of Defense, will assess the 
Department of Defense’s ability to deter specific state and non-state actors from conducting 
cyberattacks of significant consequence on the U.S. homeland and against U.S. interests, to include loss of life, significant destruction of property, or significant impact on U.S. foreign 
and economic policy interests.</OtherInformation></Objective><Objective><Name>Capabilities &amp; Actions</Name><Description>Determine whether DoD is building the capabilities required for attributing and deterring key threats from conducting such attacks and recommend specific actions that DoD can take to improve its cyber deterrence posture.</Description><Identifier>_d4485c3e-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>III.E.i</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>USSTRATCOM</Name><Description/></Stakeholder><OtherInformation>In conducting its analysis, USSTRATCOM must determine whether DoD is building the 
capabilities required for attributing and deterring key threats from conducting such 
attacks and recommend specific actions that DoD can take to improve its cyber 
deterrence posture. Careful attention should be devoted also to deterring non-state 
actors that may fall outside of traditional deterrence frameworks but which could pose a 
considerable threat to U.S. interests.</OtherInformation></Objective></Goal><Goal><Name>Options</Name><Description>BUILD AND MAINTAIN VIABLE CYBER OPTIONS AND 
PLAN TO USE THOSE OPTIONS TO CONTROL CONFLICT ESCALATION AND TO 
SHAPE THE CONFLICT ENVIRONMENT AT ALL STAGES.</Description><Identifier>_d4485ee6-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>IV</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>President of the United States</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Combatant Commands</Name><Description/></Stakeholder><OtherInformation>During heightened tensions or outright hostilities, DoD must be able to provide the President 
with a wide range of options for managing conflict escalation. If directed, DoD should be able to
use cyber operations to disrupt an adversary’s command and control networks, military-related 
critical infrastructure, and weapons capabilities. As a part of the full range of tools available to 
the United States, DoD must develop viable cyber options and integrate those options into 
Departmental plans. DoD will develop cyber capabilities to achieve key security objectives with 
precision, and to minimize loss of life and destruction of property. To ensure unity of effort, 
DoD will enable combatant commands to plan and synchronize cyber operations with kinetic 
operations across all domains of military operations.</OtherInformation><Objective><Name>Options</Name><Description>Integrate cyber options into plans.</Description><Identifier>_d4486120-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>IV.A</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Allies</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Government Agencies</Name><Description/></Stakeholder><OtherInformation>To meet strategic end-states as defined by the Guidance 
for the Employment of the Force, combatant command plans, and other strategic guidance 
documents, DoD will work with agencies of the U.S. government as well as U.S. allies and 
partners to integrate cyber options into combatant command planning.</OtherInformation></Objective><Objective><Name>Requirements</Name><Description>Accelerate the integration of cyber requirements into plans.</Description><Identifier>_d4486454-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>IV.A.i</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Joint Staff</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>USSTRATCOM</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Chairman of the Joint Chiefs of Staff</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cyber Mission Forces</Name><Description/></Stakeholder><OtherInformation>The Defense Department
will accelerate the integration of cyber requirements into combatant command plans.
Plans must outline and define specific cyberspace effects against targets. To facilitate this work, the Joint Staff will work with USSTRATCOM to synchronize and integrate requirements into planning and provide recommendations to the Chairman of the Joint Chiefs of Staff on the alignment, allocation, assignment, and apportionment of Cyber Mission Forces.</OtherInformation></Objective></Goal><Goal><Name>Alliances &amp; Partnerships</Name><Description>BUILD AND MAINTAIN ROBUST INTERNATIONAL 
ALLIANCES AND PARTNERSHIPS TO DETER SHARED THREATS AND INCREASE
INTERNATIONAL SECURITY AND STABILITY.</Description><Identifier>_d4486706-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>All three of DoD’s cyber missions require close collaboration with foreign allies and partners. In 
its international cyber engagement DoD seeks to build partnership capacity in cybersecurity 
and cyber defense, and to deepen operational partnerships where appropriate. 
Given the high demand and relative scarcity of cyber resources, the Department of Defense 
must make hard choices and focus its partnership capacity initiatives on areas where vital U.S. 
national interests are stake. Over the next five years, in addition to ongoing partner capacity 
building efforts in other regions, DoD will focus its international engagement on: the Middle 
East, the Asia-Pacific, and key NATO allies. Through the course of this strategy DoD will 
constantly assess the international environment and develop innovative partnerships to 
respond to emerging challenges and opportunities.</OtherInformation><Objective><Name>Partner Capacity</Name><Description>Build partner capacity in key regions.</Description><Identifier>_d4486954-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.A</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Allies</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Partners</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>U.S. Government Agencies</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>U.S. Department of State</Name><Description/></Stakeholder><OtherInformation>Under its existing and planned force structure, DoD 
will work with key allies and partners to build partner capacity and help secure the critical 
infrastructure and key resources on which DoD missions and U.S. interests depend. The 
Defense Department will work regularly with other agencies of the U.S. government, to 
include the Department of State, in building partner capacity. Priority regions include the 
Middle East, Asia-Pacific, and Europe.</OtherInformation></Objective><Objective><Name>Middle Eastern Networks &amp; Systems</Name><Description>Support the hardening and resiliency of Middle Eastern allies’ and partners’ networks and systems.</Description><Identifier>_d4486ca6-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.A.i</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Middle Eastern Allies</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Middle Eastern Partners</Name><Description/></Stakeholder><OtherInformation>As a part of its cyber dialogue and partnerships, DoD will work with key 
Middle Eastern allies and partners to improve their ability to secure their military 
networks as well as the critical infrastructure and key resources upon which U.S. 
interests depend. Key initiatives include improved information sharing to establish a unified understanding of the cyber threat, an assessment of our mutual cyber defense 
posture, and collaborative approaches to building cyber expertise.</OtherInformation></Objective><Objective><Name>Asian Networks &amp; Systems</Name><Description>Support the hardening and resiliency of Northeast Asian allies’ networks and systems.</Description><Identifier>_d4486f80-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.A.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Northeast Asian Allies</Name><Description/></Stakeholder><OtherInformation>As a part of its broader cyber 
dialogue with Asian allies, DoD will work 
with key allies and partners to improve 
their ability to secure their military 
networks and critical infrastructure and 
key resources upon which U.S. and allied 
interests depend.</OtherInformation></Objective><Objective><Name>Asia-Pacific Region</Name><Description>Build new strategic partnerships in the Asia-Pacific region.</Description><Identifier>_d44871e2-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.A.iii</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name/><Description/></Stakeholder><OtherInformation>The Defense 
Department will work with key states 
across the Asia-Pacific to build cyber 
capacity and minimize risk to U.S. and 
allied interests, in a manner consistent 
with DoD’s International Cyberspace 
Security Cooperation Guidance.</OtherInformation></Objective><Objective><Name>NATO Allies</Name><Description>Work with key NATO allies to mitigate cyber risks to DoD and U.S. national interests.</Description><Identifier>_d448753e-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.A.iv</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>NATO Allies</Name><Description/></Stakeholder><OtherInformation>The Defense Department will develop these partnerships through the defense 
consultations that DoD holds with its key NATO allies.</OtherInformation></Objective><Objective><Name>Alliances &amp; Partnerships</Name><Description>Build alliances and partnerships to best respond to shifts in the strategic environment.</Description><Identifier>_d4487804-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.A.v</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name/><Description/></Stakeholder><OtherInformation>DoD will remain flexible and agile as it builds alliances and partnerships to best respond to shifts in the strategic environment.</OtherInformation></Objective><Objective><Name>Malware</Name><Description>Develop solutions to counter the proliferation of destructive malware.</Description><Identifier>_d4487a70-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.B</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name/><Description/></Stakeholder><OtherInformation>State and non-state 
actors seek to acquire destructive malware. The uncontrolled spread of destructive malware 
to hostile actors presents a significant risk to the international system. Working with the 
Department of State and other agencies of the U.S. government as well as U.S. allies and 
partners, the Defense Department will draw on best-practices to counter the proliferation of 
destructive malware within the international system. In addition to international regimes 
and best-practices, the U.S. government has a range of domestic export control regimes for 
governing dual-use technologies that can be used to prevent proliferation. </OtherInformation></Objective><Objective><Name>Planning &amp; Training</Name><Description>Work with capable international partners to plan and train for cyber operations.</Description><Identifier>_d4487dea-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.C</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name/><Description/></Stakeholder><OtherInformation>Throughout the course of this strategy, DoD will strengthen its international alliances and 
partnerships to develop combined capabilities to achieve cyber effects in support of 
combatant command plans.</OtherInformation></Objective><Objective><Name>Dialogue</Name><Description>Strengthen the United States cyber dialogue with China to enhance strategic stability.</Description><Identifier>_d448818c-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>V.D</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>China</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Cyber Working Group</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Russia</Name><Description>If and when U.S.-Russia military relations resume, as a part of broader interagency efforts DoD will seek 
to develop a military-to-military cyber dialogue with Russia to foster strategic stability in cyberspace. </Description></Stakeholder><OtherInformation>Through the course of this strategy, as part of the U.S.-China Defense Consultative Talks
and related dialogues, such as the Cyber Working Group, DoD will continue to hold 
discussions with China to bring greater understanding and transparency of each nation’s 
military doctrine, policy, roles and missions in cyberspace. The goal of this work is to reduce 
the risks of misperception and miscalculation that could contribute to escalation and 
instability. DoD will support U.S. government efforts to strengthen confidence-building 
measures to bring a greater level of trust to the U.S.-China relationship. In addition, DoD 
will continue to raise concerns about China’s cyber enabled theft of U.S. intellectual 
property, trade secrets, and confidential business information.</OtherInformation></Objective></Goal><Goal><Name>Management</Name><Description>Manage the strategy.</Description><Identifier>_d44883ee-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI</SequenceIndicator><Stakeholder><Name/><Description/></Stakeholder><OtherInformation>To achieve the goals and objectives outlined in this strategy will require hard choices regarding 
cyber forces and personnel, organizations, and capabilities. The financial choices that DoD 
makes in the course of implementing this strategy will have national and global implications for 
years to come, and DoD must operate in an effective and cost-efficient manner to guarantee the 
best return on its investments. To that end, DoD will pursue the following management 
objectives to govern its cyber activities and missions. </OtherInformation><Objective><Name>Principal Cyber Advisor</Name><Description>Establish the Office of the Principal Cyber Advisor to the Secretary of Defense.</Description><Identifier>_d448875e-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.A</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Principal Cyber Advisor</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Secretary of Defense</Name><Description/></Stakeholder><OtherInformation>In the
National Defense Authorization Act (NDAA) of 2014, Congress required the Defense 
Department to designate a Principal Cyber Advisor to the Secretary of Defense to review 
military cyberspace activities, cyber mission forces, and offensive and defensive cyber 
operations and missions. In addition, the Principal Cyber Advisor will govern the 
development of DoD cyberspace policy and strategy for the DoD enterprise.</OtherInformation></Objective><Objective><Name>Governance</Name><Description>Build an intradepartmental team to ensure effective governance of cyber issues within DoD.</Description><Identifier>_d4488a38-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.A.i</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>Principal Cyber Advisor</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Under Secretary of Defense for Policy</Name><Description>
</Description></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Under Secretary of Defense for Intelligence</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Under Secretary of Defense for Personnel and Readiness</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Principal Staff Assistants (PSA)</Name><Description>in the office of the  Secretary of Defense</Description></Stakeholder><OtherInformation>The 2014 NDAA also stipulated that this Principal Cyber Advisor integrate the cyber 
expertise and perspectives of key organizations to build an intradepartmental team of 
key players to ensure effective governance of cyber issues within DoD. The Principal 
Cyber Advisor responsibilities assigned by the FY14 NDAA shall not be interpreted to 
affect the existing responsibilities and authorities of the Under Secretary of Defense for 
Acquisition, Technology, and Logistics; the Under Secretary of Defense for Policy; the 
Under Secretary of Defense for Intelligence; the Under Secretary of Defense for 
Personnel and Readiness; or any other Principal Staff Assistant (PSA) in the office of the 
Secretary of Defense in cyber-related responsibilities and authorities.
</OtherInformation></Objective><Objective><Name>Cyber Management Review</Name><Description>Review DoD’s cyber management.</Description><Identifier>_d4488cae-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.A.ii</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>Principal Cyber Advisor</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>DoD  Components</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Generic_Group"><Name>Cyber Investment and Management Board (CIMB)</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Under Secretary of Defense for Acquisition, Technology, and  Logistics</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Joint Staff</Name><Description/></Stakeholder><OtherInformation>An intradepartmental team. The Principal Cyber Advisor will work with DoD 
components through the Cyber Investment and Management Board (CIMB) to review 
DoD’s cyber management. The CIMB will be a forum for synchronization, coordination, 
and project management. It will not replicate existing programmatic and budgetary 
mechanisms or interfere with previously defined Principal Staff Assistant roles and 
authorities, nor will it interfere in any way with the military chain of command; rather, it 
will provide a single forum to integrate cyber initiatives, it will manage projects through completion, and streamline DoD’s cyber governance structures. The PCA will work 
with the Office of the Under Secretary of Defense for Acquisition, Technology, and 
Logistics and the Joint Staff to build an intradepartmental team of DoD representatives 
to support the CIMB in this work.</OtherInformation></Objective><Objective><Name>Cyber Issue Coordination</Name><Description>Provide senior-level coordination on key cyber issues.</Description><Identifier>_d4489028-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.A.iii</SequenceIndicator><Stakeholder StakeholderTypeType="Organization"><Name>CIMB</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>OSD</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Joint Staff</Name><Description/></Stakeholder><OtherInformation>A senior executive forum. Subordinate and reporting to the CIMB, a senior executive 
forum will provide initial senior-level coordination on key cyber issues. The senior 
executive forum will recommend courses of action to the CIMB and will coordinate with 
other OSD and Joint Staff governance bodies to facilitate unity of effort and resolve 
management issues at appropriate levels.</OtherInformation></Objective><Objective><Name>Budgetary &amp; Financial Coordination</Name><Description>Coordinate budgetary and financial recommendations.</Description><Identifier>_d4489316-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.A.iv</SequenceIndicator><Stakeholder StakeholderTypeType="Generic_Group"><Name>Deputy’s Management Action Group</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>CIMB</Name><Description/></Stakeholder><OtherInformation>If and when a budgetary or financial matter comes into play during the Program and 
Budget Review process, the Principal Cyber Advisor will use the senior executive forum and the CIMB to coordinate recommendations for the Deputy’s Management Action Group or other financial and budgetary organizations, vetting options and alternatives through the issue teams as appropriate.</OtherInformation></Objective><Objective><Name>Cyber Budgetary Management</Name><Description>Improve cyber budgetary management. </Description><Identifier>_d44895a0-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.B</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>Under Secretary of Defense for Intelligence</Name><Description/></Stakeholder><OtherInformation>DoD will develop an agreed-upon method to more 
transparently and effectively manage the DoD cyber operations budget. Today cyber 
funding is spread across the DoD budget, to include the Military Intelligence Program 
(MIP), in multiple appropriations, budget lines, program elements, and projects. In addition, 
the Under Secretary of Defense for Intelligence, on behalf of DoD, ensures that all National 
Intelligence Program (NIP) investments are aligned to support DoD missions. The diffuse 
nature of the DoD cyber budget presents DoD with a challenge for effective budgetary 
management; DoD must develop a new method for 
managing cross-program funding to improve 
mission effectiveness and achieve management 
efficiencies.
</OtherInformation></Objective><Objective><Name>Operations &amp; Policy framework</Name><Description>Develop DoD’s cyber operations and cybersecurity policy framework. </Description><Identifier>_d448994c-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.C</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name/><Description/></Stakeholder><OtherInformation>Consistent with 
Presidential guidance, DoD will align and simplify 
its cyber operations and cybersecurity policy 
management and identified gaps, overlaps, seams, 
conflicts, and areas in need of revision in current 
documentation. This effort will help translate 
national and departmental guidance and policy into 
tactical operations. It is essential to clarifying 
conflicts in existing documentation that currently 
complicate cyber operations and cybersecurity 
governance.</OtherInformation></Objective><Objective><Name>Capability Assessement</Name><Description>Conduct an end-to-end assessment of DoD’s cyber capabilities.</Description><Identifier>_d4489c58-679f-11e5-8193-20c88df7775b</Identifier><SequenceIndicator>VI.D</SequenceIndicator><Stakeholder StakeholderTypeType="Person"><Name>Secretary of Defense</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Person"><Name>Principal Cyber Advisor to the Secretary of Defense</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>Office of the Director of Coast Assessment and Program Evaluation</Name><Description/></Stakeholder><Stakeholder StakeholderTypeType="Organization"><Name>USCYBERCOM</Name><Description/></Stakeholder><OtherInformation>U.S. Cyber Command
will lead a comprehensive operational assessment of its posture. In coordination with 
the Principal Cyber Advisor to the Secretary of Defense, the Office of the Under 
Secretary of Defense for Acquisition, Technology, and Logistics, and the Office of the 
Director of Coast Assessment and Program Evaluation, USCYBERCOM will provide 
short- and long-term recommendations through the CIMB to provide to the Secretary of Defense regarding organizational structure, command and control mechanism, rules of 
engagement, personnel, capabilities, tools, and potential operational gaps. The goal of 
this posture assessment will be to provide a clear understanding of the future 
operational environment; key stakeholder views; as well as strategic priorities, choices, 
and resources for planning and operations.</OtherInformation></Objective></Goal></StrategicPlanCore><AdministrativeInformation><StartDate>2015-04-30</StartDate><PublicationDate>2015-09-30</PublicationDate><Source>http://www.defense.gov/Portals/1/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf</Source><Submitter><GivenName>Owen</GivenName><Surname>Ambur</Surname><PhoneNumber/><EmailAddress>Owen.Ambur@verizon.net</EmailAddress></Submitter></AdministrativeInformation></StrategicPlan>