2.3.12-1 Assess System Categorization |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-2 Assess Cybersecurity Control Selection |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-3 Assess Cybersecurity Requirements |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-4 Assess Cybersecurity Architecture |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-5 Assess Cybersecurity Design |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-6 Assess Cyber Application Security |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-7 Assess Cyber Operating System Security |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-8 Assess Cyber Network Security |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-9 Assess Cybersecurity Implementation and Unit Testing |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-10 Assess Cybersecurity Cryptographic Product Acquisition |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-11 Assess Cybersecurity Key Management Process |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-12 Assess Cybersecurity Verification Test Planning |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-13 Assess Cybersecurity Verification |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-14 Assess Cybersecurity System Authorization Activities |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-15 Assess Program Protection Planning |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-16 Assess Criticality Analysis Process and CPI and CC Identification Process |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-17 Assess Threat and Vulnerability Analysis |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-18 Assess Counter Measure Analysis Process |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-19 Assess Program Protection Risk Analysis |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-20 Assess Analysis of Foreign Involvement with Program |
Level 2 Tasks
|
NA
|
NA
|
2.3.12-21 Assess Program Protection Execution |
Level 2 Tasks
|
NA
|
NA
|