2.3.12 - Cyber Security

Tasks

Tasks Sub-Tasks Description References
2.3.12-1 Assess System Categorization Level 2 Tasks NA NA
2.3.12-2 Assess Cybersecurity Control Selection Level 2 Tasks NA NA
2.3.12-3 Assess Cybersecurity Requirements Level 2 Tasks NA NA
2.3.12-4 Assess Cybersecurity Architecture Level 2 Tasks NA NA
2.3.12-5 Assess Cybersecurity Design Level 2 Tasks NA NA
2.3.12-6 Assess Cyber Application Security Level 2 Tasks NA NA
2.3.12-7 Assess Cyber Operating System Security Level 2 Tasks NA NA
2.3.12-8 Assess Cyber Network Security Level 2 Tasks NA NA
2.3.12-9 Assess Cybersecurity Implementation and Unit Testing Level 2 Tasks NA NA
2.3.12-10 Assess Cybersecurity Cryptographic Product Acquisition Level 2 Tasks NA NA
2.3.12-11 Assess Cybersecurity Key Management Process Level 2 Tasks NA NA
2.3.12-12 Assess Cybersecurity Verification Test Planning Level 2 Tasks NA NA
2.3.12-13 Assess Cybersecurity Verification Level 2 Tasks NA NA
2.3.12-14 Assess Cybersecurity System Authorization Activities Level 2 Tasks NA NA
2.3.12-15 Assess Program Protection Planning Level 2 Tasks NA NA
2.3.12-16 Assess Criticality Analysis Process and CPI and CC Identification Process Level 2 Tasks NA NA
2.3.12-17 Assess Threat and Vulnerability Analysis Level 2 Tasks NA NA
2.3.12-18 Assess Counter Measure Analysis Process Level 2 Tasks NA NA
2.3.12-19 Assess Program Protection Risk Analysis Level 2 Tasks NA NA
2.3.12-20 Assess Analysis of Foreign Involvement with Program Level 2 Tasks NA NA
2.3.12-21 Assess Program Protection Execution Level 2 Tasks NA NA