The program protection plan ppp is the milestone

This preview shows page 16 - 18 out of 39 pages.

The Program Protection Plan (PPP) is the milestone acquisition document that describes the plan,responsibilities, and decisions for all Program Protection activities. A PPP is required by DoDI 5000.02,Operation of the Defense Acquisition System, and DoDI 5200.39 Critical Program Information (CPI)Protection within the Department of Defense.IAW DoDI 5000 .02, the PPP will be submitted for MDA approval at each milestone review beginning withMilestone A. Additionally, IAW DoDI 5000.02, Program managers will submit the program's CybersecurityStrategy as part of every PPP.The PPP is "a risk-based, comprehensive, living plan (document) to protect CPI that is associated with aResearch, Development, and Acquisition (RDA) program. The PPP is used to develop tailored protectionguidance for dissemination and implementation throughout the program for which it is created. The
layering and integration of the selected protection requirements documented in a PPP provide for theintegration and synchronization of CPI protection activities throughout the Department of Defense.“The purpose of the PPP is to help programs ensure that they adequately protect their technology,components, and information. Cybersecurity is a critical component of this plan.Cyberspace is a global domain within the information environment consisting of the interdependentnetwork of information systems infrastructures including the Internet, telecommunications networks,computer systems, and embedded processors and controllers.DoD systems and networks are constantly under cyber-attack. Nearly all defense systems incorporateinformation technology (IT) in some form, and must be resilient from cyber adversaries. This means thatcybersecurity applies to weapons systems and platforms; Command, Control, Communications,Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) systems; and information systems andnetworks.Cybersecurity is a critical priority for DoD, and is a vital aspect of maintaining United States' technicalsuperiority.Cybersecurity is defined by DoD as the prevention of damage to, protection of, and restoration ofcomputers, electronic communications systems, electronic communications services, wirecommunication, and electronic communication, including information contained therein, to ensure itsavailability, integrity, authentication, confidentiality, and nonrepudiation.Effective Cybersecurity in DoD acquisition programs encompasses all of the necessary actions taken toensure the Confidentiality, Integrity and Availability (CIA) of a system’s information to enable warfightingoperations.Counterintelligence (CI) from a DoD policy perspective are those activities undertaken as part of anintegrated DoD and national effort to detect, identify, assess, exploit, penetrate, degrade, and counter orneutralize espionage, intelligence collection, sabotage, sedition, subversion, assassination, and terroristactivities conducted for or on behalf of foreign powers, organizations, persons, or their agents directed

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 39 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Fall
Professor
N/A
Tags
Project Management, acquisition strategy, product support, Firebird

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture