Documents/DISA/4: Sharing and defending information

4: Sharing and defending information

Enable sharing of information while staunchly protecting it

Other Information:

A warfighter’s ability to leverage the right information at the right time is the difference between mission success and mission failure. We will provide state-of-the-art capabilities and services that enable sharing of information through an assured, accessible net-centric environment. These capabilities and services will enhance planning and execution of joint military and coalition operations in a responsive, agile, and cost effective manner. We will enable transition from a culture of need-toknow to one of need-to-share, while ensuring that the Department can still keep a secret when necessary. New sharing relationships will be built virtually and instantly. We will aggressively develop and implement measures to manage and defend the GIG to ensure warfighting forces, including partners and allies, can deploy and connect globally, and share timely, trusted, and accurate information needed for their missions. We will design, implement, operate, and sustain the GIG for maximum mission assurance in the face of kinetic or cyber attack. We will propose policy and implement instructions for security certification and accreditation supporting the fast paced, often ad hoc, on demand nature of net-centric operations and warfare. We must be able to add capabilities and services to the network at Internet speed.

Objective(s):