Defending the cyberspace domain

by 2nd Lt. Justin Anderson
86th Communications Squadron

The Command Cyber Readiness Inspection scheduled for  Dec. 1 to 5 is a Defense Information Systems Agency-led inspection of the security posture of Ramstein’s network.

This assessment takes an in-depth look at the policies, procedures and technical capabilities in place on Ramstein, ensuring classified and sensitive information created, transmitted and stored is protected from unauthorized disclosure. Repercussions for failing a CCRI can include disconnection from the Department of Defense Information Network and the isolation of all government computers on an installation.

In the cyberspace domain, the U.S. Air Force is always operating in a forward facing environment of trusted relationships where a single weak link can endanger the entire DOD. Readiness is essential to ensure cyber attacks are held at bay and, due to the literal light speed of intrusion attempts, it is essential to be ready now.

The 86th Airlift Wing’s primary mission is to provide combat airlift and operate the Air Force’s premier installation to enable and assure strategic capabilities, but did you know it also operates as a power projection platform in cyberspace as well? At the northernmost tip of Ramstein you’ll find the “third runway,” where operations are supported daily via both terrestrial and satellite links.

While the 86th Communications Squadron takes a leading role in authorizing administrators, operating and maintaining base infrastructure, and serving the vast majority of customers in the KMC, the 86th Airlift Wing is not the only unit inspected under the CCRI.

The KMC is home to 13 different full-time communication units, including the enterprise hub for the majority of the U.S. Air Forces in Europe’s information technology services, as well as numerous organizations with IT personnel dedicated to operating and maintaining discrete mission-enabling systems.

In addition, there are four internal domains that reside within the greater Ramstein network that receive a full concurrent CCRI on their own and get tied to the overall Ramstein score. All this adds up to an inspection of a cyber-footprint larger than all U.K. Air Force bases combined.

Do Airmen know they are the first line of defense when it comes to the security of Ramstein’s network?
Contrary to conventional belief, attacks on the U.S. do not have to take the form of large coordinated government-funded efforts. It’s as easy as getting an Airman to decide that he or she wants to hear more about weight loss pills.

Below are some tips on how users can do their part to keep Ramstein secure.

• Secure Internet Protocol Router Uptime — users must have their Tactical Local Area Network Encryptions keyed and workstation powered on every Tuesday from 8 a.m. to noon. This allows the system to receive patches and will allow us to scan for vulnerabilities.

• Log out and restart Nonsecure Internet Protocol Router computers at the end of the day, but do not power them down.

• Only plug authorized USB storage devices into government computers. USB drives are a vector for malicious logic and can expose the Air Force Network to intrusion.

• Do not leave Common Access Cards unattended. Violators may be held accountable for illicit activity originating from computers accessed using their CACs.

• Get to know the unit information assurance officer. They’re responsible for opening trouble tickets and acting as a focal point for all cyber security matters.

The 86th Communications Squadron is working hard to do its part to ensure the base network is configured properly and compliant with DOD policies, but every Airman — big “A” — plays a role in keeping Ramstein’s network secure.

Now armed with these tips and an understanding of the role the 86th AW plays in cyber preparedness, Team Ramstein’s challenge is to do its part in keeping Ramstein secure.