Preface |
|
iii | |
|
|
vii | |
|
|
ix | |
Summary |
|
xi | |
Acknowledgments |
|
xix | |
Abbreviations |
|
xxi | |
|
|
1 | (6) |
|
Mitigating the Cyber Threat Through Rapid Acquisition |
|
|
1 | (2) |
|
|
3 | (3) |
|
Step 1a Documentation of Best Practices for Rapid Cyber Acquisition |
|
|
3 | (2) |
|
Step 1b Review of Current Policy, Guidance, and Memos Related to Cyber Acquisition |
|
|
5 | (1) |
|
Step 2 Identification and Assessment of Critical Paths in CND Acquisition |
|
|
5 | (1) |
|
Step 3 Actionable Recommendations for PMW 130 (Processes and Authorities to Achieve Effective Cyber Acquisition) |
|
|
5 | (1) |
|
Organization of This Report |
|
|
6 | (1) |
|
Chapter Two Testing (Certification and Accreditation): Challenges, Best Practices, and Recommendations |
|
|
7 | (10) |
|
|
7 | (6) |
|
CND Testing Time Requirements |
|
|
8 | (1) |
|
Historical IT Testing Cycle Time |
|
|
8 | (1) |
|
The Certification and Accreditation Process |
|
|
9 | (4) |
|
|
13 | (4) |
|
Chapter Three The Navy Modernization Process: Challenges, Best Practices, and Recommendations |
|
|
17 | (8) |
|
|
17 | (4) |
|
The Gap Between Processing Time and Actual Installation |
|
|
19 | (1) |
|
Programs That Have Navigated NMP in Under 30 Days |
|
|
20 | (1) |
|
|
21 | (4) |
|
Chapter Four Budgeting, Funding, and Contracts: Challenges, Best Practices, and Recommendations |
|
|
25 | (4) |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
26 | (3) |
|
|
26 | (1) |
|
|
27 | (2) |
|
Chapter Five Governance, Integration and Training, and Emerging Needs: Challenges, Best Practices, and Recommendations |
|
|
29 | (4) |
|
|
29 | (1) |
|
|
29 | (1) |
|
|
29 | (1) |
|
Process for Emerging Needs |
|
|
29 | (1) |
|
|
30 | (3) |
|
|
30 | (1) |
|
|
30 | (1) |
|
Acquisition for Emerging Needs |
|
|
31 | (2) |
|
Chapter Six Summary and Conclusions |
|
|
33 | (4) |
|
|
34 | (3) |
|
|
|
A Survey of Rapid Acquisition Processes |
|
|
37 | (4) |
|
B Navy Rapid Acquisition Options |
|
|
41 | (6) |
|
C Case Studies of Successful Rapid and IT Acquisition |
|
|
47 | (4) |
|
D JCIDS and Incremental Acquisition |
|
|
51 | (6) |
|
E Review of Cyber and IT Acquisition Literature |
|
|
57 | (8) |
|
F Air Force Cyber Acquisition |
|
|
65 | (4) |
|
|
69 | (4) |
Bibliography |
|
73 | |