Sufficient cyber security scrutiny to operate securely

 The U.S. military often relies on RMF to ensure that U.S. military systems go through sufficient cybersecurity scrutiny to operate securely on U.S. military networks. Because the RMF process applies to many different types of systems -- from enterprise to small embedded systems -- there are many possible controls that systems designers must analyze and document that may not apply to embedded systems. For instance, there are RMF controls related to awareness and training (AT family) and personnel security (PS family) that may apply to the overall program but unlikely to apply to the embedded system itself. 

Still, it takes time to analyze, document, verify, and monitor the embedded system to ensure that none of the assumptions change. It's also important not only to prevent any backdoors into the system but also to understand that additional work may be necessary to secure entry level computer science jobs approval for these sorts of systems.

The RMF was developed with the understanding that it applies across a wide variety of systems. This resulted in designing the concept of overlays to help address this concern. An overlay is a selection of controls specific to a particular type of system.


Comments

Popular posts from this blog

Collaborative and sociable endeavour

Two founding signatories leave Architects Declare

National Security Directive on the Telecommunication Sector