DoD 8570.01-Manual, Information Assurance Workforce Improvement Program evolves into Department of Defence 8140 Cyberspace Work force

DoD 8140, Cyberspace workforce is replacing DoD 8570. But both both are used for the Defense Information Assurance workforce and it is split up into category, specialty, level, and function to for much better protection of confidentiality, integrity and availability of DoD information, information systems, and networks.

The 8570 had various levels:

IA Management Level I

IAM Level I personnel are responsible for the implementation and operation of an Information System (IS) inside their CE. Personnel make certain that Security related Information System are functional and secure inside the computing environment (CE).

IA Management Level II

IAM Level II personnel are in charge of the Information Assurance program of the Information Systeminside the Network Environment. Personnel in these positions perform a various Security related tasks, including the development and implementation of system information security standards and procedures. They ensure that IS are functional and secure inside the NE.

IA Management Level III

IAM Level III staff is responsible for ensuring that all enclave IS are functional and secure. They determine the enclaves' long-term Information Assurance systems needs and acquisition requirements to complete operational objectives. They also develop and implement information security standards and operations from the certification and accreditation process.

IA Technical Level I

IAT Level I personnel increase the risk for CE less vulnerable by correcting flaws and implementing Information Assurance Technical controls in the hardware or software installed of their operational systems.

IA Technical Level II

IAT Level II personnel provide network environment (NE) and advanced level CE support. They pay special awareness of intrusion detection, finding and fixing unprotected vulnerabilities, and making sure remote access points are well secured. These positions give attention to threats and vulnerabilities and increase the security of systems. IAT Level II personnel have mastery regarding the functions with the Information Assurance Technical Level I position.

IA Technical Level III

IAT Level III personnel focus on the enclave environment and support, monitor, test, and troubleshoot software and hardware IAT problems associated with the CE, NE, and enclave environments. IAT Level III personnel have mastery with the functions of both the IAT Level I and Level II positions.

CND-SP Analyst (CND-A)

CND-A personnel use data collected from your range of Computer Network Defence (CND) tools (including intrusion detection system alerts, firewall and network traffic logs, and host system logs) to evaluate events that occur making use of their environment.

CND-SP Infrastructure Support (CND-IS)

CND-IS personnel test, implement, deploy, maintain, and administer the infrastructure systems that are required to effectively manage the CND-SP network and resources. This could include, but is not restricted to routers, firewalls, intrusion detection/prevention systems, as well as other Computer Network Defense tools as deployed within the NE or enclave.

CND-SP Incident Responder (CND-IR)

CND-IR personnel investigate and analyze all response activities related to cyber incidents within the NE or Enclave. These tasks include, but are not limited to: creating and maintaining incident tracking information; planning, coordinating, and directing recovery activities; and incident analysis tasks, including examining all available information and supporting evidence or artifacts related to an incident or event.

CND-SP Auditor (CND-AU)

CND-AU personnel perform assessments of systems and networks within the NE or enclave and identify where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. CND-AUs achieve this through passive evaluations (compliance audits) and active evaluations (penetration tests and/or vulnerability assessments).

CND-SP Manager (CND-SPM)

CND-SPMs oversee the CND-SP operations within their organization. CND-SPMs are responsible for producing guidance for their NE or enclave, assisting with risk assessments and risk management for organizations within their NE or enclave, and are responsible for managing the technical classifications within their organization.

IASAE I

Applies knowledge of IA policy, procedures, and structure to design, develop, and implement CE system(s), system components, or system architectures.

IASAE II

Applies knowledge of IA policy, procedures, and workforce structure to design, develop, and implement a secure NE.

IASAE III

Responsible for the design, development, implementation, and/or integration of a DoD IA architecture, system or system component for use within CE, NE, and enclave environments

General User

A user who is granted use of Government Information Systems (IS) and access to Government networks. This is not an IA position.

Power User

Personnel with limited administrative privileges to their PC only. This is not an IA position.

DoD 8570 material is being replaced with DoDD 8140, Cyberspace workforce.

DoDD 8140 will have 7 high level categories that have been developed under a National Initiative for Cybersecurity Education framework:

Security Provision, Maintain and Operate, Protect & Defend,Analyze, Operate & collect, Oversight & Development, Investigate

These categories have sub categories that offer a total of 31 tasks. It absolutely was said to be released in 2013, but there is actually no telling when it should come out (maybe its out with this very minute).

8140, Cyberspace workforce will replace DoD 8570 because the guide for choosing the personnel while using right certifications, skills and experience.

8140 - Cyberspace has 7 high level categories beneath a National Initiative for Cybersecurity Education (NICE) framework:

Security Provision, Maintain and Operate, Protect & Defend, Analyze, operate & collect, Oversight & Development and Investigate.

These categories are broken down further into a sum total of 31 tasks. It was supposed to be released in 2013, but there is actually no telling when it will come out.

8140 Operate & Maintenance

Data Administration, Information System Security Management, Knowledge management, Customer & Tech Support, Network Services, System Administration, Systems Security Analysis

Protect & Defend

Computer Network Device (CND), Incident Response, CND Infrastructure Support, Security Program Management, Vulnerability Assessment & Management

Security Provision

IA Assurance Compliance, Software, Enterprise Architecture, Technology Demonstration, System Requirement Planning, Test & Evaluation, System Development

Operate & collect

Collection Operations, Cyber Operational Planning, Cyber Operations

Oversight & DevelopmentLegal counsel & Advocacy, Strategic Planning & Policy, Education & Training

Investigate

Investigation, Digital Forensics

Analyze

Cyber Threat Analysis, Exploitation Analysis, All-source Analysis, Targets