SlideShare a Scribd company logo
Department of Defense
DIRECTIVE
NUMBER 8140.01
August 11, 2015
DoD CIO
SUBJECT: Cyberspace Workforce Management
References: See Enclosure 1
1. PURPOSE. This directive:
a. Reissues and renumbers DoD Directive (DoDD) 8570.01 (Reference (a)) to update and
expand established policies and assigned responsibilities for managing the DoD cyberspace
workforce.
b. Authorizes establishment of a DoD cyberspace workforce management council to ensure
that the requirements of this directive are met. The council will be comprised of representatives
from the Offices of the DoD Chief Information Officer (DoD CIO), Under Secretary of Defense
for Personnel and Readiness (USD(P&R)), Under Secretary of Defense for Policy (USD(P)),
Under Secretary of Defense for Intelligence (USD(I)), the Joint Staff, the Director, National
Security Agency/Chief, Central Security Service (DIRNSA/CHCSS), and other DoD
Components.
c. Unifies the overall cyberspace workforce and establishes specific workforce elements
(cyberspace effects, cybersecurity, and cyberspace information technology (IT)) to align, manage
and standardize cyberspace work roles, baseline qualifications, and training requirements. This
directive does not address operational employment of the work roles. Operational employment
of the cyberspace workforce will be determined by the Joint Staff, Combatant Commands, and
other DoD Components to address mission requirements.
2. APPLICABILITY. This directive applies to OSD, the Military Departments, the Office of
the Chairman of the Joint Chiefs of Staff (CJCS) and the Joint Staff, the Combatant Commands,
the Office of the Inspector General of the Department of Defense (IG DoD), the Defense
Agencies, the DoD Field Activities, and all other organizational entities within the DoD (referred
to collectively in this directive as the “DoD Components”).
DoDD 8140.01, August 11, 2015
2
3. POLICY. It is DoD policy that:
a. The DoD maintains a total force management perspective to provide qualified cyberspace
government civilian and military personnel to identified and authorized positions, augmented
where appropriate by contracted services support. These personnel function as an integrated
workforce with complementary skill sets to provide an agile, flexible response to DoD
requirements.
b. The appropriate mix of military and government civilian positions and contracted support
designated to perform cyberspace work roles is determined in accordance with DoD Instruction
(DoDI) 1100.22 (Reference (b)).
c. Civilian, military, and contracted support personnel assigned to perform cyberspace work
roles must meet qualification standards established in supporting issuances, in addition to other
existing workforce qualification and training requirements assigned to billets and position
requirements (e.g., acquisition, intelligence, communications). DoD Component contracting
officials apply subpart 239.71 of the Defense Federal Acquisition Regulation Supplement
(Reference (c)) for contracted support designated to perform cyberspace workforce work roles.
d. DoD Component compliance with this directive is monitored via authoritative manpower
and personnel systems as an element of mission readiness and as a management review item.
Compliance with requirements of this directive must be included in DoD and DoD Component-
level inspection programs and readiness reporting.
e. Nothing in this directive replaces or infringes the responsibilities, functions, or authorities
of the DoD Component heads or other OSD officials as prescribed by law or Executive order,
assigned in chartering DoDDs, or detailed in other DoD policy issuances or, as applicable, in
Director of National Intelligence policy issuances.
f. All authorized users of DoD IT receive initial cybersecurity and information assurance
awareness orientation as a condition of access, and thereafter must complete annual
cybersecurity and information assurance refresher awareness.
4. RESPONSIBILITIES. See Enclosure 2.
5. RELEASABILITY. Cleared for public release. This directive is available on the Internet
from the DoD Issuances Website at http://www.dtic.mil/whs/directives.
DoDD 8140.01, August 11, 2015
3
6. EFFECTIVE DATE. This directive is effective August 11, 2015.
Robert O. Work
Deputy Secretary of Defense
Enclosures
1. References
2. Responsibilities
Glossary
DoDD 8140.01, August 11, 2015
ENCLOSURE 14
ENCLOSURE 1
REFERENCES
(a) DoD Directive 8570.01, “Information Assurance (IA) Training, Certification, and
Workforce Management,” August 15, 2004, as amended (hereby cancelled)
(b) DoD Instruction 1100.22, “Policy and Procedures for Determining Workforce Mix,”
April 12, 2010
(c) Defense Federal Acquisition Regulation Supplement, Subpart 239.71, “Security and Privacy
for Computer Systems,” June 21, 2010, as amended
(d) DoD Directive 5144.02, “DoD Chief Information Officer (DoD CIO),” November 21, 2014
(e) DoD Directive 8000.01, “Management of the Department of Defense Information
Enterprise,” February 10, 2009
(f) DoD Directive 1100.4, “Guidance for Manpower Management,” February 12, 2005
(g) DoD Manual 8910.01, Volume 1, “DoD Information Collections Manual: Procedures for
DoD Internal Information Collections,” June 30, 2014
(h) U.S. Office of Personnel Management Memorandum for Chief Human Capital Officers,
“Fact Sheet on Certification and Certificate Programs,” August 13, 2008
(i) DoD Directive 5505.13E, “DoD Executive Agent (EA) for the DoD Cyber Crime Center
(DC3),” March 1, 2010
(j) Section 1702 of Title 10, United States Code
(k) DoD Directive 5134.01, “Under Secretary of Defense for Acquisition, Technology, and
Logistics (USD(AT&L)),” December 9, 2005, as amended
(l) DoD Directive 1322.18, “Military Training,” January 13, 2009
(m) DoD Instruction 3115.11, “DoD Intelligence Human Capital Management Operations,”
January 22, 2009, as amended
(n) DoD Instruction 3305.09, “DoD Cryptologic Training,” June 13, 2013
(o) DoD Directive 5111.1, “Under Secretary of Defense for Policy (USD(P)),” December 8,
1999
(p) DoD Instruction 1336.05, “Automated Extract of Active Duty Military Personnel Records,”
July 28, 2009, as amended
(q) DoD 7730.54-M, Volume 1, “Reserve Components Common Personnel Data System
(RCCPDS): Reporting Procedures,” May 25, 2011, as amended
(r) DoD Instruction 1444.02, Volume 4, “Data Submission Requirements for DoD Civilian
Personnel: Workforce and Address Dynamic Records,” November 5, 2013
(s) DoD Directive 7730.65, “Department of Defense Readiness Reporting System (DRRS),”
May 11, 2015
(t) DoD Instruction 8500.01, “Cybersecurity,” March 14, 2014
(u) Joint Publication 1-02, “Department of Defense Dictionary of Military and Associated
Terms,” current edition
(v) Committee on National Security Systems Instruction Number 4009, “National Information
Assurance (IA) Glossary,” April 26, 2010, as amended
(w) DoD Directive 5124.02, “Under Secretary of Defense for Personnel and Readiness
(USD(P&R)),” June 23, 2008
DoDD 8140.01, August 11, 2015
ENCLOSURE 25
ENCLOSURE 2
RESPONSIBILITIES
1. DoD CIO. In addition to responsibilities in section 9 of this enclosure, the DoD CIO:
a. Oversees management of DoD cyberspace IT and cybersecurity workforce elements of the
DoD cyberspace workforce in accordance with DoDDs 5144.02 (Reference (d)) and 8000.01
(Reference (e)).
b. In collaboration with the USD(P&R) and DoD Component heads, establishes appropriate
workforce management requirements and personnel qualifications standards for the DoD
cybersecurity and cyberspace IT workforce(s) pursuant to References (d) and (e) and in
accordance with DoDD 1100.4 (Reference (f)).
c. Collaborates with the USD(P&R), USD(P), USD(I), Secretaries of the Military
Departments, CJCS, and the DIRNSA/CHCSS to establish a DoD cyberspace workforce
management council.
d. Collaborates with the USD(P&R) and the DoD Component heads to establish metrics to
monitor and validate compliance with this directive as an element of mission readiness in
accordance with the procedures of Volume 1 of DoD Manual 8910.01 (Reference (g)).
e. Establishes criteria and processes for selecting certification programs as defined by the
Office of Personnel Management Memorandum (Reference (h)) for the cybersecurity and
cyberspace IT workforces in accordance with References (d) and (e).
f. In coordination with the CJCS, establishes academic programs at the National Defense
University’s Information Resources Management College to educate leaders in IT, information
resources management, and cybersecurity requirements and capabilities.
g. Collaborates with appropriate stakeholders to develop requirements and provide guidance
and oversight to DoD Cyber Crime Center (DC3) in support of training and qualification
development for digital forensics in accordance with DoDD 5505.13E (Reference (i)).
2. DIRECTOR, DEFENSE INFORMATION SYSTEMS AGENCY (DISA). In addition to
responsibilities in section 9 of this enclosure and under the authority, direction, and control of the
DoD CIO, the Director, DISA:
a. Provides access to current techniques, requirements, and knowledge resources to support
development of personnel performing work roles in DoD cybersecurity and cyberspace IT
workforces.
DoDD 8140.01, August 11, 2015
ENCLOSURE 26
b. Provides training materials, content, products, assessment tools, and methodologies
related to DoD IT and cybersecurity policies, concepts, procedures, tools, techniques, and
systems.
c. Provides shareable methodology and tools, to include timeline and implementation
guidance, to DoD Components to establish and measure effectiveness of cybersecurity awareness
and training programs.
d. Incorporates cyberspace IT workforce and cybersecurity workforce qualification and
management requirements into DoD and DoD Component inspection programs.
3. USD(AT&L). In addition to responsibilities in section 9 of this enclosure, the USD(AT&L):
a. In coordination with the DoD CIO and applicable DoD Component heads, establishes the
acquisition qualification requirements for work roles responsible for research, development, and
acquisition of DoD IT, information systems, platform IT, and cyberspace capabilities.
b. Supports integration of qualified cyberspace workforce personnel into DoD information
systems lifecycle development processes.
c. Provides guidance and oversight to the Defense Acquisition Workforce to incorporate the
requirements of this directive into contracts.
d. Establishes policies and procedures, in coordination with the USD(P&R), DoD CIO,
USD(I), USD(P), Secretaries of the Military Departments, and the CJCS, for the effective
management of the acquisition, technology, and logistics workforce supporting DoD cyberspace
programs in accordance with section 1702 of Title 10, United States Code (Reference (j)) and
DoDD 5134.01 (Reference (k)).
e. Provides direction and oversight of the Defense Acquisition University to ensure that
cybersecurity work role requirements are integrated into training, courses, and curriculum.
4. USD(P&R). In addition to the responsibilities in section 9 of this enclosure, the USD(P&R):
a. Establishes policy guidance to support military cyberspace training requirements in
accordance with DoDD 1322.18 (Reference (l)).
b. Provides, as appropriate, DoD Components with access to systems that identify and track
personnel, manpower, training, education, and qualifications to support cyberspace workforce
lifecycle management.
c. Supports the DoD Components in determining requirements for DoD military and civilian
manpower in accordance with Reference (f) and contract support needed to perform cyberspace
missions.
DoDD 8140.01, August 11, 2015
ENCLOSURE 27
d. Collaborates with the DoD CIO, USD(P), USD(I), Secretaries of the Military
Departments, CJCS, and the DIRNSA/CHCSS to establish a DoD cyberspace workforce
management council.
e. Supports identification of DoD Component cyberspace workforce reporting requirements.
5. USD(I). In addition to the responsibilities in section 9 of this enclosure, the USD(I):
a. Establishes and maintains workforce management requirements, qualification standards,
and certification programs for intelligence, counterintelligence (CI), security, law enforcement
(LE), sensitive activities, and other related positions and personnel required to operate in or
support the cyberspace domain. This is done in coordination with Defense intelligence, CI and
LE agencies, the Joint Staff, the Office of the USD(P&R), and the Military Departments.
b. Establishes and maintains, in coordination with the DoD CIO, appropriate workforce
management requirements and personnel qualification standards for digital forensics to support
DC3 curriculum development in accordance with Reference (i).
c. Implements this directive for personnel who support DoD intelligence, security, and LE
missions in the cyberspace domain.
d. Collaborates with the DoD CIO, USD(P&R), USD(P), Secretaries of the Military
Departments, CJCS, and the DIRNSA/CHCSS to establish a DoD cyberspace workforce
management council.
6. DIRNSA/CHCSS. In addition to the responsibilities in section 9 of this enclosure and under
the authority, direction, and control of USD(I), the DIRNSA/CHCSS:
a. Oversees development and maintenance of standards for cryptologic work roles related to
cyberspace operations, training, and personnel certifications in accordance with DoDI 3115.11
(Reference (m)) and DoDI 3305.09 (Reference (n)).
b. Develops and provides appropriate training and education standards for DoD personnel
who perform cryptologic work roles related to cyberspace operations.
c. Collaborates with the DoD CIO, USD(P&R), USD(P), USD(I), Secretaries of the Military
Departments, and the CJCS to establish a DoD cyberspace workforce management council.
7. USD(P). In addition to the responsibilities in section 9 of this enclosure, the USD(P):
DoDD 8140.01, August 11, 2015
ENCLOSURE 28
a. Collaborates with the DoD CIO, USD(P&R), USD(I), Secretaries of the Military
Departments, CJCS, and the DIRNSA/CHCSS to establish a DoD cyberspace workforce
management council.
b. Coordinates and maintains a cyberspace strategy and advises on implementing that
strategy in accordance with DoDD 5111.1 (Reference (o)).
c. Establishes and maintains, in coordination with the Joint Staff and Military Departments,
workforce management requirements and qualification standards for positions and personnel
required to perform cyberspace effects work roles.
d. Collaborates with the DoD CIO, USD(P&R), USD(I), Secretaries of the Military
Departments, and CJCS to establish metrics for the cyberspace effects workforce to monitor and
validate compliance as an element of mission readiness.
8. IG DoD. In addition to the responsibilities in section 9 of this enclosure, the IG DoD, at his
or her discretion, establishes and leverages qualification standards for personnel supporting and
performing audits and inspections in the cyberspace domain.
9. OSD AND DoD COMPONENT HEADS. The OSD and DoD Component heads:
a. Establish, resource, implement, and assess cyberspace workforce management programs
for all DoD Component personnel in accordance with this directive.
b. In addition to DoD mandated cybersecurity awareness training, provide DoD Component-
specific cybersecurity orientation, training, awareness, and reinforcement programs to authorized
users of information systems.
c. Identify total manpower required to perform cyberspace work roles in manpower
databases in accordance with Reference (f).
d. Identify, document, track, and report qualifications for military, DoD civilian, and
contractor support personnel who perform cyberspace work roles using authoritative personnel
databases in accordance with Reference (f) and DoDI 1336.05, Volume 1 of DoD 7730.54-M,
and Volume 4 of DoDI 1444.02 (References (p), (q), and (r)).
e. Specify workforce qualification requirements in contracts that include the acquisition of
personnel and services to perform cyberspace work roles. Contractor personnel performing such
work roles must have their qualifications documented in an authoritative verification system(s) in
accordance with Reference (f).
f. Require personnel who perform cyberspace work roles to meet qualification requirements
in accordance with issuances supporting this directive.
DoDD 8140.01, August 11, 2015
ENCLOSURE 29
g. Provide appropriate training for personnel who conduct assessments and inspections to
ensure organizations have a compliant cyberspace workforce management program, including
the verification of workforce qualifications.
h. Incorporate the cyberspace domain and operations in professional military education.
i. Coordinate with Defense intelligence, CI, and LE agencies, the Joint Staff, Military
Departments, and the Offices of the USD(P&R) and DoD CIO on the workforce management
requirements, qualification standards, and certification programs for positions and personnel
required to operate in or support the cyberspace domain.
j. Identify, establish, resource, implement, sustain, and assess additional Component-specific
cyberspace work role training, qualification, and standards for the Component cyberspace
workforce.
k. Include unit-based reporting of cyberspace workforce readiness status in the Defense
Readiness Reporting System in accordance with DoDD 7730.65 (Reference (s)).
10. SECRETARIES OF THE MILITARY DEPARTMENTS. In addition to the responsibilities
in section 9 of this enclosure, the Secretaries of the Military Departments will collaborate with
the DoD CIO, USD(P&R), USD(I), USD(P), CJCS, and the DIRNSA/CHCSS to establish a
DoD cyberspace workforce management council.
11. SECRETARY OF THE AIR FORCE. In his or her capacity as the DoD Executive Agent
for the DC3 in accordance with Reference (j), and in addition to responsibilities in sections 9 and
10 of this enclosure, the Secretary of the Air Force, through the Director, DC3:
a. Supports development of standards for digital forensics personnel training and
qualifications.
b. Coordinates with the DoD CIO, USD(I), and Secretaries of the other Military
Departments to integrate appropriate training and education for DoD personnel who perform
digital forensics.
12. CJCS. In addition to the responsibilities in section 9 of this enclosure, the CJCS:
a. Facilitates joint force development consistent with the overall responsibility of the CJCS
to integrate cyberspace capabilities. Includes applications into strategy, policy, doctrine,
concepts of operations, education, training, and exercises for DoD joint and combined operations
in the cyberspace domain.
b. Coordinates with the DoD CIO, USD(P), USD(I), and the Secretaries of the Military
Departments on qualifications requirements for cyberspace work roles, as appropriate.
DoDD 8140.01, August 11, 2015
ENCLOSURE 210
c. Identifies, documents, and tracks joint positions and personnel assigned to cyberspace
workforce positions in joint manpower and personnel system(s).
d. Facilitates coordination of work roles requirements assigned to positions at Combatant
Commands and their supporting Military Services when operating in the cyberspace domain.
e. Collaborates with the DoD CIO, USD(P&R), USD(I), USD(P), Secretaries of the Military
Departments and the DIRNSA/CHCSS to establish a DoD cyberspace workforce management
council.
f. Provides access to current techniques, requirements, and knowledge resources to support
development of personnel performing work roles in DoD cyberspace effects, cybersecurity, and
cyberspace IT workforces.
g. Provides training materials, content, products, assessment tools, and methodologies
related to DoD cyberspace effects, cybersecurity, and cyberspace IT policies, concepts,
procedures, tools, techniques, and systems.
DoDD 8140.01, August 11, 2015
GLOSSARY11
GLOSSARY
PART I. ABBREVIATIONS AND ACRONYMS
CI counterintelligence
CJCS Chairman of the Joint Chiefs of Staff
DC3 DoD Cyber Crime Center
DIRNSA/CHCSS Director, National Security Agency/Chief, Central Security Service
DISA Defense Information Systems Agency
DoD CIO DoD Chief Information Officer
DoDD DoD Directive
DoDI DoD Instruction
IG DoD Inspector General Department of Defense
IT information technology
USD(AT&L) Under Secretary of Defense for Acquisition, Technology, and Logistics
USD(I) Under Secretary of Defense for Intelligence
USD(P) Under Secretary of Defense for Policy
USD(P&R) Under Secretary of Defense for Personnel and Readiness
PART II. DEFINITIONS
Unless otherwise noted, these terms and their definitions are for the purposes of this directive.
authorized user. Defined in DoDI 8500.01 (Reference (t)).
certification. Defined in Reference (h).
cybersecurity. Defined in Reference (t).
cyberspace. Defined in Joint Publication 1-02 (Reference (u)).
cyberspace operations. Defined in Reference (u).
cyberspace workforce. Personnel who build, secure, operate, defend, and protect DoD and U.S.
cyberspace resources; conduct related intelligence activities; enable future operations; and
DoDD 8140.01, August 11, 2015
GLOSSARY12
project power in or through cyberspace. It is comprised of personnel assigned to the areas of
cyberspace effects, cybersecurity, cyberspace IT, and portions of the Intelligence workforces:
cybersecurity workforce. Personnel who secure, defend, and preserve data, networks, net-
centric capabilities, and other designated systems by ensuring appropriate security controls and
measures are in place, and taking internal defense actions. This includes access to system
controls, monitoring, administration, and integration of cybersecurity into all aspects of
engineering and acquisition of cyberspace capabilities.
cyberspace effects workforce. Personnel who plan, support, and execute cyberspace
capabilities where the primary purpose is to externally defend or conduct force projection in or
through cyberspace.
cyberspace IT workforce. Personnel who design, build, configure, operate, and maintain IT,
networks, and capabilities. This includes actions to prioritize portfolio investments; architect,
engineer, acquire, implement, evaluate, and dispose of IT as well as information resource
management; and the management, storage, transmission, and display of data and information.
intelligence workforce (cyberspace). Personnel who collect, process, analyze, and
disseminate information from all sources of intelligence on foreign actors’ cyber programs,
intentions, capabilities, research and development, and operational activities.
information assurance. Defined in Reference (u).
information system. Defined in Reference (v).
IT. Defined in Reference (e).
platform IT. Defined in Reference (t).
total force. Defined in Reference (w).
work role. The knowledge, skills, and abilities that a person must have to perform a set of
functions or tasks.

More Related Content

PDF
IT Position of Trust Designation
PDF
DoD Cyber Expected Service (CES) Personnel System
PDF
SECNAV M-5239.2
PDF
Directive-Type Memorandum (DTM) 09-026 - Responsible and Effective Use of Int...
PDF
Robert Carey, Principal Deputy CIO, DOD Insight session
PDF
NSA Information Assurance Policy
PDF
Uscybercom omnibus task order vendors
PPTX
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...
IT Position of Trust Designation
DoD Cyber Expected Service (CES) Personnel System
SECNAV M-5239.2
Directive-Type Memorandum (DTM) 09-026 - Responsible and Effective Use of Int...
Robert Carey, Principal Deputy CIO, DOD Insight session
NSA Information Assurance Policy
Uscybercom omnibus task order vendors
Ncma saguaro cyber security 2016 law & regulations asis phoenix dely fina...

Similar to 2015 dodd (20)

PDF
Army plan for Cyber Offensive Operations -- ESF 18
PPTX
Cyber Security.pptx
PPTX
What Is Dod Directive 8570 And How Does It Benefit Me?
DOCX
Christina Carson Resume 2016
PDF
Navy security enterprise secnav 5500-36
PDF
Defense Contract Management Agency Social Media Handbook
DOCX
Cyber+Incident+Response+-+Generic+Denial+of+Service+Playbook+v2.3.docx
PPTX
Robert Nichols: Cybersecurity for Government Contractors
PDF
5 feb 21, 2013 dod memo
PPTX
Cybersecurity Procedures Overview, DoDI 8500.01
PDF
Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4
PDF
Cyber Security Management.pdf
PDF
Hipaa checklist - information security
PDF
Misha Resume Nov 2016
PDF
Do d directive allowing the use of military force against american citizens i...
PPTX
CMMC rollout: How CMMC will impact your organization
PDF
Department of Defense Instruction 5143_DUSD Intelligence 24Oct14
DOCX
Project department of defense (do d) ready purposethis cours
PDF
DoD IA Training Products, Tools Integration, and Operationalization
Army plan for Cyber Offensive Operations -- ESF 18
Cyber Security.pptx
What Is Dod Directive 8570 And How Does It Benefit Me?
Christina Carson Resume 2016
Navy security enterprise secnav 5500-36
Defense Contract Management Agency Social Media Handbook
Cyber+Incident+Response+-+Generic+Denial+of+Service+Playbook+v2.3.docx
Robert Nichols: Cybersecurity for Government Contractors
5 feb 21, 2013 dod memo
Cybersecurity Procedures Overview, DoDI 8500.01
Lucier Resume 23OCT16 GS-2210-14 INFOSEC- DOI OCIO ISSO USAjobs Format v4
Cyber Security Management.pdf
Hipaa checklist - information security
Misha Resume Nov 2016
Do d directive allowing the use of military force against american citizens i...
CMMC rollout: How CMMC will impact your organization
Department of Defense Instruction 5143_DUSD Intelligence 24Oct14
Project department of defense (do d) ready purposethis cours
DoD IA Training Products, Tools Integration, and Operationalization
Ad

More from Rob Wilson (20)

PDF
Chapter36
PDF
Ch31 factsheet
PDF
Bulletin 2007-12-att7
PDF
Bulletin 2007-12
PDF
Bulletin 2004 09-infornmation_assurance_specialist(1)
PDF
Bulletin 2004 08-it_generalist_occupation
PDF
Veterans Program Letter
PDF
regional advisory council expectations
PDF
2016 Bullitain
PDF
2015 09-wioa-playbook-for-creating-effective-state-plans - copy
PDF
A resource-guide-to-employer-engagement-011315(3) - copy
PDF
2015 Internet Crime Report
PDF
Vocational Rehabilitation and Employment Longitudenal Study Report to Congress
PDF
22 1903 Contract for Education and Training
PDF
28 1904
PDF
RAVE WORKS
PDF
54E/B - STRENGTH AND NUMBERS
PDF
20 million cyber attacks per day
PDF
Bulletin 2007-12
PDF
National Information Technology Apprenticeship System
Chapter36
Ch31 factsheet
Bulletin 2007-12-att7
Bulletin 2007-12
Bulletin 2004 09-infornmation_assurance_specialist(1)
Bulletin 2004 08-it_generalist_occupation
Veterans Program Letter
regional advisory council expectations
2016 Bullitain
2015 09-wioa-playbook-for-creating-effective-state-plans - copy
A resource-guide-to-employer-engagement-011315(3) - copy
2015 Internet Crime Report
Vocational Rehabilitation and Employment Longitudenal Study Report to Congress
22 1903 Contract for Education and Training
28 1904
RAVE WORKS
54E/B - STRENGTH AND NUMBERS
20 million cyber attacks per day
Bulletin 2007-12
National Information Technology Apprenticeship System
Ad

Recently uploaded (20)

PPTX
Part I CSO Conference and AVP Overview.pptx
PPTX
11Sept2023_LTIA-Cluster-Training-Presentation.pptx
PPTX
dawasoncitcommunityroolingadsAug 11_25.pptx
PPT
The Central Civil Services (Leave Travel Concession) Rules, 1988, govern the ...
PDF
PPT Items # 6&7 - 900 Cambridge Oval Right-of-Way
PDF
Item # 2 - 934 Patterson Specific Use Permit (SUP)
PDF
The Detrimental Impacts of Hydraulic Fracturing for Oil and Gas_ A Researched...
PDF
PPT Item # 4 - 328 Albany St compt. review
PDF
PPT Item # 5 - 5307 Broadway St (Final Review).pdf
PDF
PPT - Primary Rules of Interpretation (1).pdf
PDF
Abhay Bhutada Foundation’s ESG Compliant Initiatives
PPTX
Portland FPDR Oregon Legislature 2025.pptx
PPTX
Quiz - Saturday.pptxaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
PDF
Item # 5 - 5307 Broadway St final review
PPTX
Developing_An_Advocacy_Agenda_by_Kevin_Karuga.pptx
PDF
Building Bridges (of Hope) over Our Troubled Waters_PART 1
PDF
PPT Item # 2 -- Announcements Powerpoint
PPTX
DFARS Part 253 - Forms - Defense Contracting Regulations
PPTX
Workshop-Session-1-LGU-WFP-Formulation.pptx
PPT
The Central Civil Services (Leave Travel Concession) Rules, 1988, govern the ...
Part I CSO Conference and AVP Overview.pptx
11Sept2023_LTIA-Cluster-Training-Presentation.pptx
dawasoncitcommunityroolingadsAug 11_25.pptx
The Central Civil Services (Leave Travel Concession) Rules, 1988, govern the ...
PPT Items # 6&7 - 900 Cambridge Oval Right-of-Way
Item # 2 - 934 Patterson Specific Use Permit (SUP)
The Detrimental Impacts of Hydraulic Fracturing for Oil and Gas_ A Researched...
PPT Item # 4 - 328 Albany St compt. review
PPT Item # 5 - 5307 Broadway St (Final Review).pdf
PPT - Primary Rules of Interpretation (1).pdf
Abhay Bhutada Foundation’s ESG Compliant Initiatives
Portland FPDR Oregon Legislature 2025.pptx
Quiz - Saturday.pptxaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
Item # 5 - 5307 Broadway St final review
Developing_An_Advocacy_Agenda_by_Kevin_Karuga.pptx
Building Bridges (of Hope) over Our Troubled Waters_PART 1
PPT Item # 2 -- Announcements Powerpoint
DFARS Part 253 - Forms - Defense Contracting Regulations
Workshop-Session-1-LGU-WFP-Formulation.pptx
The Central Civil Services (Leave Travel Concession) Rules, 1988, govern the ...

2015 dodd

  • 1. Department of Defense DIRECTIVE NUMBER 8140.01 August 11, 2015 DoD CIO SUBJECT: Cyberspace Workforce Management References: See Enclosure 1 1. PURPOSE. This directive: a. Reissues and renumbers DoD Directive (DoDD) 8570.01 (Reference (a)) to update and expand established policies and assigned responsibilities for managing the DoD cyberspace workforce. b. Authorizes establishment of a DoD cyberspace workforce management council to ensure that the requirements of this directive are met. The council will be comprised of representatives from the Offices of the DoD Chief Information Officer (DoD CIO), Under Secretary of Defense for Personnel and Readiness (USD(P&R)), Under Secretary of Defense for Policy (USD(P)), Under Secretary of Defense for Intelligence (USD(I)), the Joint Staff, the Director, National Security Agency/Chief, Central Security Service (DIRNSA/CHCSS), and other DoD Components. c. Unifies the overall cyberspace workforce and establishes specific workforce elements (cyberspace effects, cybersecurity, and cyberspace information technology (IT)) to align, manage and standardize cyberspace work roles, baseline qualifications, and training requirements. This directive does not address operational employment of the work roles. Operational employment of the cyberspace workforce will be determined by the Joint Staff, Combatant Commands, and other DoD Components to address mission requirements. 2. APPLICABILITY. This directive applies to OSD, the Military Departments, the Office of the Chairman of the Joint Chiefs of Staff (CJCS) and the Joint Staff, the Combatant Commands, the Office of the Inspector General of the Department of Defense (IG DoD), the Defense Agencies, the DoD Field Activities, and all other organizational entities within the DoD (referred to collectively in this directive as the “DoD Components”).
  • 2. DoDD 8140.01, August 11, 2015 2 3. POLICY. It is DoD policy that: a. The DoD maintains a total force management perspective to provide qualified cyberspace government civilian and military personnel to identified and authorized positions, augmented where appropriate by contracted services support. These personnel function as an integrated workforce with complementary skill sets to provide an agile, flexible response to DoD requirements. b. The appropriate mix of military and government civilian positions and contracted support designated to perform cyberspace work roles is determined in accordance with DoD Instruction (DoDI) 1100.22 (Reference (b)). c. Civilian, military, and contracted support personnel assigned to perform cyberspace work roles must meet qualification standards established in supporting issuances, in addition to other existing workforce qualification and training requirements assigned to billets and position requirements (e.g., acquisition, intelligence, communications). DoD Component contracting officials apply subpart 239.71 of the Defense Federal Acquisition Regulation Supplement (Reference (c)) for contracted support designated to perform cyberspace workforce work roles. d. DoD Component compliance with this directive is monitored via authoritative manpower and personnel systems as an element of mission readiness and as a management review item. Compliance with requirements of this directive must be included in DoD and DoD Component- level inspection programs and readiness reporting. e. Nothing in this directive replaces or infringes the responsibilities, functions, or authorities of the DoD Component heads or other OSD officials as prescribed by law or Executive order, assigned in chartering DoDDs, or detailed in other DoD policy issuances or, as applicable, in Director of National Intelligence policy issuances. f. All authorized users of DoD IT receive initial cybersecurity and information assurance awareness orientation as a condition of access, and thereafter must complete annual cybersecurity and information assurance refresher awareness. 4. RESPONSIBILITIES. See Enclosure 2. 5. RELEASABILITY. Cleared for public release. This directive is available on the Internet from the DoD Issuances Website at http://www.dtic.mil/whs/directives.
  • 3. DoDD 8140.01, August 11, 2015 3 6. EFFECTIVE DATE. This directive is effective August 11, 2015. Robert O. Work Deputy Secretary of Defense Enclosures 1. References 2. Responsibilities Glossary
  • 4. DoDD 8140.01, August 11, 2015 ENCLOSURE 14 ENCLOSURE 1 REFERENCES (a) DoD Directive 8570.01, “Information Assurance (IA) Training, Certification, and Workforce Management,” August 15, 2004, as amended (hereby cancelled) (b) DoD Instruction 1100.22, “Policy and Procedures for Determining Workforce Mix,” April 12, 2010 (c) Defense Federal Acquisition Regulation Supplement, Subpart 239.71, “Security and Privacy for Computer Systems,” June 21, 2010, as amended (d) DoD Directive 5144.02, “DoD Chief Information Officer (DoD CIO),” November 21, 2014 (e) DoD Directive 8000.01, “Management of the Department of Defense Information Enterprise,” February 10, 2009 (f) DoD Directive 1100.4, “Guidance for Manpower Management,” February 12, 2005 (g) DoD Manual 8910.01, Volume 1, “DoD Information Collections Manual: Procedures for DoD Internal Information Collections,” June 30, 2014 (h) U.S. Office of Personnel Management Memorandum for Chief Human Capital Officers, “Fact Sheet on Certification and Certificate Programs,” August 13, 2008 (i) DoD Directive 5505.13E, “DoD Executive Agent (EA) for the DoD Cyber Crime Center (DC3),” March 1, 2010 (j) Section 1702 of Title 10, United States Code (k) DoD Directive 5134.01, “Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)),” December 9, 2005, as amended (l) DoD Directive 1322.18, “Military Training,” January 13, 2009 (m) DoD Instruction 3115.11, “DoD Intelligence Human Capital Management Operations,” January 22, 2009, as amended (n) DoD Instruction 3305.09, “DoD Cryptologic Training,” June 13, 2013 (o) DoD Directive 5111.1, “Under Secretary of Defense for Policy (USD(P)),” December 8, 1999 (p) DoD Instruction 1336.05, “Automated Extract of Active Duty Military Personnel Records,” July 28, 2009, as amended (q) DoD 7730.54-M, Volume 1, “Reserve Components Common Personnel Data System (RCCPDS): Reporting Procedures,” May 25, 2011, as amended (r) DoD Instruction 1444.02, Volume 4, “Data Submission Requirements for DoD Civilian Personnel: Workforce and Address Dynamic Records,” November 5, 2013 (s) DoD Directive 7730.65, “Department of Defense Readiness Reporting System (DRRS),” May 11, 2015 (t) DoD Instruction 8500.01, “Cybersecurity,” March 14, 2014 (u) Joint Publication 1-02, “Department of Defense Dictionary of Military and Associated Terms,” current edition (v) Committee on National Security Systems Instruction Number 4009, “National Information Assurance (IA) Glossary,” April 26, 2010, as amended (w) DoD Directive 5124.02, “Under Secretary of Defense for Personnel and Readiness (USD(P&R)),” June 23, 2008
  • 5. DoDD 8140.01, August 11, 2015 ENCLOSURE 25 ENCLOSURE 2 RESPONSIBILITIES 1. DoD CIO. In addition to responsibilities in section 9 of this enclosure, the DoD CIO: a. Oversees management of DoD cyberspace IT and cybersecurity workforce elements of the DoD cyberspace workforce in accordance with DoDDs 5144.02 (Reference (d)) and 8000.01 (Reference (e)). b. In collaboration with the USD(P&R) and DoD Component heads, establishes appropriate workforce management requirements and personnel qualifications standards for the DoD cybersecurity and cyberspace IT workforce(s) pursuant to References (d) and (e) and in accordance with DoDD 1100.4 (Reference (f)). c. Collaborates with the USD(P&R), USD(P), USD(I), Secretaries of the Military Departments, CJCS, and the DIRNSA/CHCSS to establish a DoD cyberspace workforce management council. d. Collaborates with the USD(P&R) and the DoD Component heads to establish metrics to monitor and validate compliance with this directive as an element of mission readiness in accordance with the procedures of Volume 1 of DoD Manual 8910.01 (Reference (g)). e. Establishes criteria and processes for selecting certification programs as defined by the Office of Personnel Management Memorandum (Reference (h)) for the cybersecurity and cyberspace IT workforces in accordance with References (d) and (e). f. In coordination with the CJCS, establishes academic programs at the National Defense University’s Information Resources Management College to educate leaders in IT, information resources management, and cybersecurity requirements and capabilities. g. Collaborates with appropriate stakeholders to develop requirements and provide guidance and oversight to DoD Cyber Crime Center (DC3) in support of training and qualification development for digital forensics in accordance with DoDD 5505.13E (Reference (i)). 2. DIRECTOR, DEFENSE INFORMATION SYSTEMS AGENCY (DISA). In addition to responsibilities in section 9 of this enclosure and under the authority, direction, and control of the DoD CIO, the Director, DISA: a. Provides access to current techniques, requirements, and knowledge resources to support development of personnel performing work roles in DoD cybersecurity and cyberspace IT workforces.
  • 6. DoDD 8140.01, August 11, 2015 ENCLOSURE 26 b. Provides training materials, content, products, assessment tools, and methodologies related to DoD IT and cybersecurity policies, concepts, procedures, tools, techniques, and systems. c. Provides shareable methodology and tools, to include timeline and implementation guidance, to DoD Components to establish and measure effectiveness of cybersecurity awareness and training programs. d. Incorporates cyberspace IT workforce and cybersecurity workforce qualification and management requirements into DoD and DoD Component inspection programs. 3. USD(AT&L). In addition to responsibilities in section 9 of this enclosure, the USD(AT&L): a. In coordination with the DoD CIO and applicable DoD Component heads, establishes the acquisition qualification requirements for work roles responsible for research, development, and acquisition of DoD IT, information systems, platform IT, and cyberspace capabilities. b. Supports integration of qualified cyberspace workforce personnel into DoD information systems lifecycle development processes. c. Provides guidance and oversight to the Defense Acquisition Workforce to incorporate the requirements of this directive into contracts. d. Establishes policies and procedures, in coordination with the USD(P&R), DoD CIO, USD(I), USD(P), Secretaries of the Military Departments, and the CJCS, for the effective management of the acquisition, technology, and logistics workforce supporting DoD cyberspace programs in accordance with section 1702 of Title 10, United States Code (Reference (j)) and DoDD 5134.01 (Reference (k)). e. Provides direction and oversight of the Defense Acquisition University to ensure that cybersecurity work role requirements are integrated into training, courses, and curriculum. 4. USD(P&R). In addition to the responsibilities in section 9 of this enclosure, the USD(P&R): a. Establishes policy guidance to support military cyberspace training requirements in accordance with DoDD 1322.18 (Reference (l)). b. Provides, as appropriate, DoD Components with access to systems that identify and track personnel, manpower, training, education, and qualifications to support cyberspace workforce lifecycle management. c. Supports the DoD Components in determining requirements for DoD military and civilian manpower in accordance with Reference (f) and contract support needed to perform cyberspace missions.
  • 7. DoDD 8140.01, August 11, 2015 ENCLOSURE 27 d. Collaborates with the DoD CIO, USD(P), USD(I), Secretaries of the Military Departments, CJCS, and the DIRNSA/CHCSS to establish a DoD cyberspace workforce management council. e. Supports identification of DoD Component cyberspace workforce reporting requirements. 5. USD(I). In addition to the responsibilities in section 9 of this enclosure, the USD(I): a. Establishes and maintains workforce management requirements, qualification standards, and certification programs for intelligence, counterintelligence (CI), security, law enforcement (LE), sensitive activities, and other related positions and personnel required to operate in or support the cyberspace domain. This is done in coordination with Defense intelligence, CI and LE agencies, the Joint Staff, the Office of the USD(P&R), and the Military Departments. b. Establishes and maintains, in coordination with the DoD CIO, appropriate workforce management requirements and personnel qualification standards for digital forensics to support DC3 curriculum development in accordance with Reference (i). c. Implements this directive for personnel who support DoD intelligence, security, and LE missions in the cyberspace domain. d. Collaborates with the DoD CIO, USD(P&R), USD(P), Secretaries of the Military Departments, CJCS, and the DIRNSA/CHCSS to establish a DoD cyberspace workforce management council. 6. DIRNSA/CHCSS. In addition to the responsibilities in section 9 of this enclosure and under the authority, direction, and control of USD(I), the DIRNSA/CHCSS: a. Oversees development and maintenance of standards for cryptologic work roles related to cyberspace operations, training, and personnel certifications in accordance with DoDI 3115.11 (Reference (m)) and DoDI 3305.09 (Reference (n)). b. Develops and provides appropriate training and education standards for DoD personnel who perform cryptologic work roles related to cyberspace operations. c. Collaborates with the DoD CIO, USD(P&R), USD(P), USD(I), Secretaries of the Military Departments, and the CJCS to establish a DoD cyberspace workforce management council. 7. USD(P). In addition to the responsibilities in section 9 of this enclosure, the USD(P):
  • 8. DoDD 8140.01, August 11, 2015 ENCLOSURE 28 a. Collaborates with the DoD CIO, USD(P&R), USD(I), Secretaries of the Military Departments, CJCS, and the DIRNSA/CHCSS to establish a DoD cyberspace workforce management council. b. Coordinates and maintains a cyberspace strategy and advises on implementing that strategy in accordance with DoDD 5111.1 (Reference (o)). c. Establishes and maintains, in coordination with the Joint Staff and Military Departments, workforce management requirements and qualification standards for positions and personnel required to perform cyberspace effects work roles. d. Collaborates with the DoD CIO, USD(P&R), USD(I), Secretaries of the Military Departments, and CJCS to establish metrics for the cyberspace effects workforce to monitor and validate compliance as an element of mission readiness. 8. IG DoD. In addition to the responsibilities in section 9 of this enclosure, the IG DoD, at his or her discretion, establishes and leverages qualification standards for personnel supporting and performing audits and inspections in the cyberspace domain. 9. OSD AND DoD COMPONENT HEADS. The OSD and DoD Component heads: a. Establish, resource, implement, and assess cyberspace workforce management programs for all DoD Component personnel in accordance with this directive. b. In addition to DoD mandated cybersecurity awareness training, provide DoD Component- specific cybersecurity orientation, training, awareness, and reinforcement programs to authorized users of information systems. c. Identify total manpower required to perform cyberspace work roles in manpower databases in accordance with Reference (f). d. Identify, document, track, and report qualifications for military, DoD civilian, and contractor support personnel who perform cyberspace work roles using authoritative personnel databases in accordance with Reference (f) and DoDI 1336.05, Volume 1 of DoD 7730.54-M, and Volume 4 of DoDI 1444.02 (References (p), (q), and (r)). e. Specify workforce qualification requirements in contracts that include the acquisition of personnel and services to perform cyberspace work roles. Contractor personnel performing such work roles must have their qualifications documented in an authoritative verification system(s) in accordance with Reference (f). f. Require personnel who perform cyberspace work roles to meet qualification requirements in accordance with issuances supporting this directive.
  • 9. DoDD 8140.01, August 11, 2015 ENCLOSURE 29 g. Provide appropriate training for personnel who conduct assessments and inspections to ensure organizations have a compliant cyberspace workforce management program, including the verification of workforce qualifications. h. Incorporate the cyberspace domain and operations in professional military education. i. Coordinate with Defense intelligence, CI, and LE agencies, the Joint Staff, Military Departments, and the Offices of the USD(P&R) and DoD CIO on the workforce management requirements, qualification standards, and certification programs for positions and personnel required to operate in or support the cyberspace domain. j. Identify, establish, resource, implement, sustain, and assess additional Component-specific cyberspace work role training, qualification, and standards for the Component cyberspace workforce. k. Include unit-based reporting of cyberspace workforce readiness status in the Defense Readiness Reporting System in accordance with DoDD 7730.65 (Reference (s)). 10. SECRETARIES OF THE MILITARY DEPARTMENTS. In addition to the responsibilities in section 9 of this enclosure, the Secretaries of the Military Departments will collaborate with the DoD CIO, USD(P&R), USD(I), USD(P), CJCS, and the DIRNSA/CHCSS to establish a DoD cyberspace workforce management council. 11. SECRETARY OF THE AIR FORCE. In his or her capacity as the DoD Executive Agent for the DC3 in accordance with Reference (j), and in addition to responsibilities in sections 9 and 10 of this enclosure, the Secretary of the Air Force, through the Director, DC3: a. Supports development of standards for digital forensics personnel training and qualifications. b. Coordinates with the DoD CIO, USD(I), and Secretaries of the other Military Departments to integrate appropriate training and education for DoD personnel who perform digital forensics. 12. CJCS. In addition to the responsibilities in section 9 of this enclosure, the CJCS: a. Facilitates joint force development consistent with the overall responsibility of the CJCS to integrate cyberspace capabilities. Includes applications into strategy, policy, doctrine, concepts of operations, education, training, and exercises for DoD joint and combined operations in the cyberspace domain. b. Coordinates with the DoD CIO, USD(P), USD(I), and the Secretaries of the Military Departments on qualifications requirements for cyberspace work roles, as appropriate.
  • 10. DoDD 8140.01, August 11, 2015 ENCLOSURE 210 c. Identifies, documents, and tracks joint positions and personnel assigned to cyberspace workforce positions in joint manpower and personnel system(s). d. Facilitates coordination of work roles requirements assigned to positions at Combatant Commands and their supporting Military Services when operating in the cyberspace domain. e. Collaborates with the DoD CIO, USD(P&R), USD(I), USD(P), Secretaries of the Military Departments and the DIRNSA/CHCSS to establish a DoD cyberspace workforce management council. f. Provides access to current techniques, requirements, and knowledge resources to support development of personnel performing work roles in DoD cyberspace effects, cybersecurity, and cyberspace IT workforces. g. Provides training materials, content, products, assessment tools, and methodologies related to DoD cyberspace effects, cybersecurity, and cyberspace IT policies, concepts, procedures, tools, techniques, and systems.
  • 11. DoDD 8140.01, August 11, 2015 GLOSSARY11 GLOSSARY PART I. ABBREVIATIONS AND ACRONYMS CI counterintelligence CJCS Chairman of the Joint Chiefs of Staff DC3 DoD Cyber Crime Center DIRNSA/CHCSS Director, National Security Agency/Chief, Central Security Service DISA Defense Information Systems Agency DoD CIO DoD Chief Information Officer DoDD DoD Directive DoDI DoD Instruction IG DoD Inspector General Department of Defense IT information technology USD(AT&L) Under Secretary of Defense for Acquisition, Technology, and Logistics USD(I) Under Secretary of Defense for Intelligence USD(P) Under Secretary of Defense for Policy USD(P&R) Under Secretary of Defense for Personnel and Readiness PART II. DEFINITIONS Unless otherwise noted, these terms and their definitions are for the purposes of this directive. authorized user. Defined in DoDI 8500.01 (Reference (t)). certification. Defined in Reference (h). cybersecurity. Defined in Reference (t). cyberspace. Defined in Joint Publication 1-02 (Reference (u)). cyberspace operations. Defined in Reference (u). cyberspace workforce. Personnel who build, secure, operate, defend, and protect DoD and U.S. cyberspace resources; conduct related intelligence activities; enable future operations; and
  • 12. DoDD 8140.01, August 11, 2015 GLOSSARY12 project power in or through cyberspace. It is comprised of personnel assigned to the areas of cyberspace effects, cybersecurity, cyberspace IT, and portions of the Intelligence workforces: cybersecurity workforce. Personnel who secure, defend, and preserve data, networks, net- centric capabilities, and other designated systems by ensuring appropriate security controls and measures are in place, and taking internal defense actions. This includes access to system controls, monitoring, administration, and integration of cybersecurity into all aspects of engineering and acquisition of cyberspace capabilities. cyberspace effects workforce. Personnel who plan, support, and execute cyberspace capabilities where the primary purpose is to externally defend or conduct force projection in or through cyberspace. cyberspace IT workforce. Personnel who design, build, configure, operate, and maintain IT, networks, and capabilities. This includes actions to prioritize portfolio investments; architect, engineer, acquire, implement, evaluate, and dispose of IT as well as information resource management; and the management, storage, transmission, and display of data and information. intelligence workforce (cyberspace). Personnel who collect, process, analyze, and disseminate information from all sources of intelligence on foreign actors’ cyber programs, intentions, capabilities, research and development, and operational activities. information assurance. Defined in Reference (u). information system. Defined in Reference (v). IT. Defined in Reference (e). platform IT. Defined in Reference (t). total force. Defined in Reference (w). work role. The knowledge, skills, and abilities that a person must have to perform a set of functions or tasks.