Click here
      Home    DAG Tutorial    Search    Available Downloads     Feedback
 
The DAG does not reflect the changes in the DoDI5000.02. Work is in progress to update the content and will be completed as soon as possible.
 
.

13.3 Critical Program Information (CPI) and Mission-Critical Functions and Components

Topic
Previous Page Next Page

13.3. Critical Program Information (CPI) and Mission-Critical Functions and Components

Critical Program Information (CPI) and mission-critical functions and components are the foundations of Program Protection. They are the technology, components, and information that provide mission-essential capability to our defense acquisition programs, and Program Protection is the process of managing the risks that they will be compromised.

13.3.1. Critical Program Information (CPI)

DoDI 5200.39 defines Critical Program Information (CPI) as “Elements or components of a research, development, and acquisition (RDA) program that, if compromised, could cause significant degradation in mission effectiveness; shorten the expected combat-effective life of the system; reduce technological advantage; significantly alter program direction; or enable an adversary to defeat, counter, copy, or reverse engineer the technology or capability. Includes information about applications, capabilities, processes, and end-items. Includes elements or components critical to a military system or network mission effectiveness. Includes technology that would reduce the US technological advantage if it came under foreign control.”

Metaphorically, CPI should be thought of as the technological “crown jewels” of the program. The United States gains military advantages from maintaining technology leads in key areas, so we must protect them from compromise in the development environment and on fielded systems.

CPI may include classified military information that is considered a national security asset that will be protected and shared with foreign governments only when there is a clearly defined benefit to the United States (see DoD Instruction 5200.39). It may also include Controlled Unclassified Information (CUI), which is official unclassified information that has been determined by designated officials to be exempt from public disclosure, and to which access or distribution limitations have been applied in accordance with national laws and regulations such as the International Traffic in Arms Regulations for U.S. Munitions List items and the Export Administration Regulations for commerce controlled dual-use items. In some cases (dependent on the PM's determination) a commercial-off-the shelf (COTS) technology can be designated CPI if the COTS element is determined to fulfill a critical function within the system and the risk of manipulation needs mitigation.

CPI requires protection to prevent unauthorized or inadvertent disclosure, destruction, transfer, alteration, reverse engineering, or loss (often referred to as "compromise").

CPI identified during research and development or Science and Technology should be safeguarded to sustain or advance the DoD technological lead in the warfighter's battle space or joint operational arena.

The CPI, if compromised, will significantly alter program direction; result in unauthorized or inadvertent disclosure of the program or system capabilities; shorten the combat effective life of the system; or require additional research, development, test, and evaluation resources to counter the impact of its loss.

The theft or misappropriation of U.S. proprietary information or trade secrets, especially to foreign governments and their agents, directly threatens the economic competitiveness of the U.S. economy. Increasingly, foreign governments, through a variety of means, actively target U.S. businesses, academic centers, and scientific developments to obtain critical technologies and thereby provide their own economies with an advantage. Industrial espionage, by both traditionally friendly nations and recognized adversaries, proliferated in the 1990s and has intensified with computer network attacks today.

Information that may be restricted and protected is identified, marked, and controlled in accordance with DoD Directives 5230.24 and 5230.25 or applicable national-level policy and is limited to the following:

CPI determination is done with decision aids and Subject Matter Experts (SMEs). As general guidance, PMs should identify an element or component as CPI if:

  • Critical technology components will endure over its lifecycle
  • A critical component which supports the warfighter is difficult to replace
  • A capability depends on technology that was adjusted/adapted/calibrated during testing and there is no other way to extrapolate usage/function/application
  • The component / element was identified as CPI previously and the technology has been improved or has been adapted for a new application
  • The component / element contains a unique attribute that provides a clear warfighting advantage (i.e. automation, decreased response time, a force multiplier)
  • The component / element involves a unique method, technique, application that cannot be achieved using alternate methods and techniques
  • The component / element’s performance depends on a specific production process or procedure
  • The component / element affords significant operational savings and/or lower operational risks over prior doctrine, organization, training, materiel, leadership and education, personnel, and facilities (DOTMLPF) methods
  • The Technology Protection and/or Systems Engineering (SE) Team recommends that the component/element is identified as CPI
  • The component / element will be exported through Foreign Military Sales (FMS)/Direct Commercial Sales (DCS) or International Cooperation

PMs should contact their Component research and development acquisition protection community for assistance in identifying CPI.

13.3.2. Mission-Critical Functions and Components

Mission-critical functions are those functions of the system being acquired that, if corrupted or disabled, would likely lead to mission failure or degradation. Mission-critical components are primarily the elements of the system (hardware, software, and firmware) that implement critical functions. In addition, the system components which implement protections of those inherently critical components, and other components with unmediated access to those inherently critical components, may themselves be mission-critical.

Mission-critical functions and components are equal in importance to Critical Program Information (CPI) with respect to their inclusion in comprehensive program protection, its planning (documented in the Program Protection Plan (PPP)), and its execution, including:

  • Trade-space considerations (including cost/benefit analyses)
  • Resource allocations (staffing and budget)
  • Countermeasures planning and implementation
  • Adjustment of countermeasures, as appropriate, for variations in the planned use or environment of inherited critical components
  • Summary of consequences if compromised
  • Residual risk identification after countermeasures are implemented, including follow-up mitigation plans and actions

Efforts to identify mission-critical functions and components and their protection must begin early in the lifecycle and be revised as system designs evolve and mature.

13.3.2.1. Criticality Analysis (CA)

What is a Criticality Analysis (CA)? CA is the primary method by which mission-critical functions and components are identified and prioritized. It is an end-to-end functional decomposition of the system which involves:

  • Identifying and prioritizing system mission threads;
  • Decomposing the mission threads into their mission-critical functions; and
  • Identifying the system components (hardware, software, and firmware) that implement those functions; i.e., components that are critical to the mission effectiveness of the system or an interfaced network.

Also included are components that defend or have unmediated access to mission-critical components.

The identified functions and components are assigned levels of criticality commensurate with the consequence of their failure on the system’s ability to perform its mission, as shown in Table 13.3.2.1.T1.

Table 13.3.2.1.T1. Protection Failure Criticality Levels

Level I – Total Mission Failure

Program protection failure that results in total compromise of mission capability

Level II – Significant/Unacceptable Degradation

Program protection failure that results in unacceptable compromise of mission capability or significant mission degradation

Level III – Partial/Acceptable

Program protection failure that results in partial compromise of mission capability or partial mission degradation

Level IV – Negligible

Program protection failure that results in little or no compromise of mission capability

When to perform a CA? The CA is an iterative process. To be effective, many CAs must be executed across the acquisition lifecycle, building on the growing system maturity, knowledge gained from prior CAs, updated risk assessment information, and updated threat and vulnerability data.

At each key decision point, system design changes may result in adding or removing specific items from the list of critical system functions and components. Guidance for the iterative performance of CAs includes:

  • Prior to Milestone A: Evaluate mission-threads, identify system functions, and analyze notional system architectures to identify mission-critical functions.
  • Prior to Milestone B: Refine the critical function list and identify critical system components and candidate subcomponents (hardware, software, and firmware).
  • Prior to CDR: Analyze the detailed design/architecture and update the list to identify all critical system components and subcomponents.

Who performs the CAs? The Government program office should perform an initial CA early in the lifecycle (pre-Milestone A). When contracts are awarded, the DoD contracting office should develop Requests for Proposals (RFPs) that require contractors to perform updated CAs periodically, based on earlier CAs (see Section 13.13.1.2 for guidance on what to include in the Statement of Work (SOW) requirements).

The CA should be led by systems engineers and mission/operator representatives; however, it is a team effort and mission-critical functions and components must be identified by a multi-disciplined group.

How is a CA performed? What is the process? While the Government should perform an initial CA during the Materiel Solution Analysis (MSA) phase, realize that it may only be possible to execute some of the steps in the CA process given below and/or to execute them at a “high level.” As noted previously, to be effective, Criticality Analyses (CAs) must be executed iteratively across the acquisition lifecycle, building on the growing system maturity, knowledge gained from prior CAs, updated risk assessment information, and updated threat and vulnerability data.

For example, the first pass through the CA process, together with assessments of vulnerabilities, threats, risks, and countermeasures, might take just a few days and provide a 30% solution. This CA might only involve Subject Matter Expert (SME) input during several work sessions (to address system and architecture), as opposed to detailed information collected from numerous program documents. For an early iteration, precision is not possible, as it takes several iterations to complete the initial Criticality Analysis (CA).

The detailed procedural steps in performing a CA are:

Identify Missions and Mission-Essential Functions

Sources of Information

1. Identify mission threads and principle system functions.

  • Derived first during pre-Milestone A and revised as needed for successive development milestones.

Joint Capabilities Integration Development System (JCIDS) Documents:  Initial Capabilities Documents (ICD), Capability Development Documents (CDD), Capability Production Documents (CPD)

Concept of Operations

2. If possible or necessary, group the mission capabilities by relative importance. Training or reporting functions may not be as important as core mission capabilities.

Operational Representative

Subject Matter Expertise (Integration Experts, Chief Engineers)

3. Identify the system’s mission-critical functions based on mission threads and the likelihood of mission failure if the function is corrupted or disabled. (Mission-critical functions may include navigating, targeting, fire control, etc.).

Activity Diagrams

Use Cases

Functional Decomposition

Potential Department of Defense Architecture Framework (DODAF) Sources

  • OV-5 (Operational Activity Model)
  • SV-4 (System Functionality Description)

Subject Matter Expertise

Identify Critical Subsystems, Configuration Items, and Components

4. Map the mission threads and functions to the system architecture and identify critical subsystems, Configuration Items, and sub-Cis (components).

Note: Focus on Configuration Items and components containing Information and Communications Technologies (ICT). Logic-bearing components have been singled out as often implementing critical functions and as susceptible to lifecycle corruption.

System/Segment Design Document

Architecture Description Document

Requirements Traceability/Verif. Matrix

Potential Department of Defense Architecture Framework (DODAF) Sources

  • SV-5a (Operational Activity to System Function Traceability Matrix)

5. Assign levels of criticality (I, II, III, IV) to the identified Configuration Items or components. Factors or criteria may include:

  • Frequency of component use across mission threads
  • Presence of redundancy – triple-redundant designs can indicate critical functions.
  • Subject matter expertise

Subject Matter Expertise

  • Systems Engineer
  • Operators Representative
  • Program Office

6. Identify any Configuration Items or components that do not directly implement critical functions, but either have unmediated communications access (i.e., an open access channel) to one or more critical functions or protect a critical function.

  • Which components give or receive information to/from this the critical components?

Note: a non-critical component may communicate with a critical function in a way that exposes the critical function to attack. In some cases, the architecture may need to include defensive functions or other countermeasures to protect the critical functions.

Architecture Diagrams

Subject Matter Expertise

Data Flow Diagram

Initial Start Conditions

7. Identify critical conditions/information required to initialize the system to complete mission-essential functions.

  1. What information is needed to successfully execute capabilities? How is this information obtained, provided, or accessed by the system?
  2. How quickly must information be received to be useful?
  3. Does the sequence in which the system initializes itself (power, software load, etc.) have an impact on performance?

Data Flow Diagram

Information Support Plan

8. Based on the answers to the questions above, identify these functions or components to be included in Program Protection risk management.

Operating Environment

9. Identify the system functions or components required to support operations in the intended environment. This may include propulsion (the system has to roll, float, fly, etc.), thermal regulation (keep warm in space, keep cool in other places, etc.) or other environmentally relevant subsystems that must be operational before the system can perform its missions.

Architecture Diagrams

10. Identify the Information and Communications Technologies (ICT) implementing those system functions and any associated vulnerabilities with the design and implementation of that Information and Communications Technologies (ICT).

Critical Suppliers

11. Identify suppliers of critical configuration items or  Information and Communications Technologies (ICT) components.

Manufacturing Lead

Note: Repeat this process as the system architecture is refined or modified, such as at SETRs and major acquisition milestone decision points

  • Design changes may result in adding or removing specific Configuration Items and sub-Configuration Items from the list of critical functions and components

Important considerations in carrying out the CA process described above include:

  • Document the results of each step
    • Include rationale
  • Use SE tools to support the analysis; for example:
    • Fault-tree analysis can be useful in determining critical components (see Section 13.7.6 for further details)
    • What information is needed to successfully execute capabilities?
    • How is this information obtained, provided, or accessed by the system?
    • How quickly must information be received to be useful?
    • Does the sequence in which the system initializes itself (power, software load, etc.) have an impact on performance?
    • Example: These may include propulsion (the system has to roll, float, fly, etc.), thermal regulation (keep warm in space, keep cool in other places, etc.), or other environmentally relevant subsystems that must be operational before the system can perform its missions.
  • Use available artifacts to inform the CA; for example:
    • SE artifacts such as architectures/designs and requirements traceability matrices
    • Available threat and vulnerability information
    • Residual vulnerability risk assessments to inform follow-up CAs
  • In isolating critical functions/components, identify critical conditions/information required to initialize the system to complete mission-critical functions
  • Identify the subsystems or components required to support operations in the intended environment

What is the CA output? The expected output of an effective CA process is:

  • A complete list of mission-critical functions and components
  • Criticality Level assignments for all items in the list
  • Rationale for inclusion or exclusion from the list
  • Supplier information for each critical component
  • Identification of critical elements for inclusion in a Defense Intelligence Agency (DIA) Threat Assessment Center (TAC) Request (See Section 13.4)

The identification of critical functions and components and the assessment of system impact if compromised is documented in the Program Protection Plan (PPP) as discussed in Appendix C (Table C-1) of the PPP Outline.

The prioritization of Level I and Level II components for expending resources and attention will be documented in the PPP as discussed in Appendix C (Table C-2) of the PPP Outline.

Why is the CA performed? The level I and selected level II components from the CA are used as inputs to the threat assessment, vulnerability assessment, risk assessment, and countermeasure selection. The following sections describe these activities.

Previous and Next Page arrows

List of All Contributions at This Location

No items found.

Popular Tags

Browse

https://acc.dau.mil/UI/img/bo/minus.gifWelcome to the Defense Acquisition...
https://acc.dau.mil/UI/img/bo/plus.gifForeword
https://acc.dau.mil/UI/img/bo/plus.gifChapter 1 -- Department of Defense...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 2 -- Program Strategies
https://acc.dau.mil/UI/img/bo/plus.gif2.0 Overview
https://acc.dau.mil/UI/img/bo/plus.gif2.1. Program Strategies—General
https://acc.dau.mil/UI/img/bo/plus.gif2.2. Program Strategy Document...
https://acc.dau.mil/UI/img/bo/plus.gif2.3. Program Strategy Relationship to...
https://acc.dau.mil/UI/img/bo/plus.gif2.4. Relationship to Request for...
https://acc.dau.mil/UI/img/bo/plus.gif2.5. Program Strategy Classification...
https://acc.dau.mil/UI/img/bo/plus.gif2.6. Program Strategy Document Approval...
https://acc.dau.mil/UI/img/bo/plus.gif2.7. Acquisition Strategy versus...
https://acc.dau.mil/UI/img/bo/plus.gif2.8. Technology Development...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 3 -- Affordability and...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 4 -- Systems Engineering
https://acc.dau.mil/UI/img/bo/plus.gifChapter 5 -- Life-Cycle Logistics
https://acc.dau.mil/UI/img/bo/minus.gifChapter 6 -- Human Systems Integration...
https://acc.dau.mil/UI/img/bo/plus.gif6.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif6.1. Total System Approach
https://acc.dau.mil/UI/img/bo/plus.gif6.2 HSI - Integration Focus
https://acc.dau.mil/UI/img/bo/plus.gif6.3. Human Systems Integration Domains
https://acc.dau.mil/UI/img/bo/plus.gif6.4. Human Systems Integration (HSI)...
https://acc.dau.mil/UI/img/bo/plus.gif6.5. Manpower Estimates
https://acc.dau.mil/UI/img/bo/plus.gif6.6. Additional References
https://acc.dau.mil/UI/img/bo/minus.gifChapter 7 -- Acquiring Information...
https://acc.dau.mil/UI/img/bo/plus.gif7.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif7.1. Introduction
https://acc.dau.mil/UI/img/bo/plus.gif7.2. DoD Information Enterprise
https://acc.dau.mil/UI/img/bo/plus.gif7.3. Interoperability and Supportability...
https://acc.dau.mil/UI/img/bo/plus.gif7.4. Sharing Data, Information, and...
https://acc.dau.mil/UI/img/bo/plus.gif7.5. Information Assurance (IA)
https://acc.dau.mil/UI/img/bo/plus.gif7.6. Electromagnetic Spectrum
https://acc.dau.mil/UI/img/bo/plus.gif7.7. Accessibility of Electronic and...
https://acc.dau.mil/UI/img/bo/plus.gif7.8. The Clinger-Cohen Act (CCA) --...
https://acc.dau.mil/UI/img/bo/plus.gif7.9. Post-Implementation Review (PIR)
https://acc.dau.mil/UI/img/bo/plus.gif7.10. Commercial Off-the-Shelf (COTS)...
https://acc.dau.mil/UI/img/bo/plus.gif7.11. Space Mission Architectures
https://acc.dau.mil/UI/img/bo/minus.gifChapter 8 -- Intelligence Analysis...
https://acc.dau.mil/UI/img/bo/plus.gif8.0. Introduction
https://acc.dau.mil/UI/img/bo/plus.gif8.1. Threat Intelligence Support
https://acc.dau.mil/UI/img/bo/plus.gif8.2. Signature and other Intelligence...
https://acc.dau.mil/UI/img/bo/plus.gif8.3. Support to the Intelligence...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 9 -- Test and Evaluation (T&E)
https://acc.dau.mil/UI/img/bo/plus.gifChapter 10 -- Decisions Assessments and...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 11 -- Program Management...
https://acc.dau.mil/UI/img/bo/plus.gif11.0. Overview
https://acc.dau.mil/UI/img/bo/plus.gif11.1. Joint Programs
https://acc.dau.mil/UI/img/bo/plus.gif11.2. International Programs
https://acc.dau.mil/UI/img/bo/plus.gif11.3. Integrated Program Management
https://acc.dau.mil/UI/img/bo/plus.gif11.4. Knowledge-Based Acquisition
https://acc.dau.mil/UI/img/bo/plus.gif11.5. Technical Representatives at...
https://acc.dau.mil/UI/img/bo/plus.gif11.6. Contractor Councils
https://acc.dau.mil/UI/img/bo/plus.gif11.7 Property
https://acc.dau.mil/UI/img/bo/plus.gif11.8. Modeling and Simulation (M&S)...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 12 - Defense Business System...
https://acc.dau.mil/UI/img/bo/minus.gifChapter 13 -- Program Protection
https://acc.dau.mil/UI/img/bo/plus.gif13.0 Overview
https://acc.dau.mil/UI/img/bo/plus.gif13.1 The Program Protection Process
https://acc.dau.mil/UI/img/bo/plus.gif13.2 The Program Protection Plan (PPP)
https://acc.dau.mil/UI/img/bo/minus.gif13.3 Critical Program Information (CPI)...
https://acc.dau.mil/UI/img/bo/plus.gif13.4. Intelligence and...
https://acc.dau.mil/UI/img/bo/plus.gif13.5. Vulnerability Assessment
https://acc.dau.mil/UI/img/bo/plus.gif13.6. Risk Assessment
https://acc.dau.mil/UI/img/bo/plus.gif13.7. Countermeasures
https://acc.dau.mil/UI/img/bo/plus.gif13.8. Horizontal Protection
https://acc.dau.mil/UI/img/bo/plus.gif13.9. Foreign Involvement
https://acc.dau.mil/UI/img/bo/plus.gif13.10. Managing and Implementing PPPs
https://acc.dau.mil/UI/img/bo/plus.gif13.11. Compromises
https://acc.dau.mil/UI/img/bo/plus.gif13.12. Costs
https://acc.dau.mil/UI/img/bo/plus.gif13.13. Contracting
https://acc.dau.mil/UI/img/bo/plus.gif13.14. Detailed System Security...
https://acc.dau.mil/UI/img/bo/plus.gif13.15. Program Protection Plan (PPP)...
https://acc.dau.mil/UI/img/bo/plus.gif13.16. Program Protection Plan (PPP)...
https://acc.dau.mil/UI/img/bo/plus.gifChapter 14 -- Acquisition of Services
https://acc.dau.mil/UI/img/bo/plus.gifDoD Directive 5000.01
https://acc.dau.mil/UI/img/bo/plus.gifDoD Instruction 5000.02
https://acc.dau.mil/UI/img/bo/plus.gifRecent Policy and Guidance
https://acc.dau.mil/UI/img/bo/minus.gifCurrent JCIDS Manual and CJCSI 3170.01 I
https://acc.dau.mil/UI/img/bo/plus.gifDefense Acquisition Guidebook Key...
ACC Practice Center Version 3.2
  • Application Build 3.2.9
  • Database Version 3.2.9