Cybersecurity falls under Information Operations (IO) and is used to protect and defend information and information systems.
Definition: “Prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communications services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and nonrepudiation”. DoD Instruction 8500.01
Guide: PM Guidebook for Integrating Cybersecurity RMF into System Acquisition Lifecycle – Sep 2015
AcqNotes:
- Cybersecurity replaces the term information assurance
AcqLinks and References:
- Defense Acquisition Guidebook (DAG)
- DoD 8570.01-m “Information Assurance Workforce Improvement Program” – 10 Nov 15
- DoD Directive 8140.01 “Cyberspace Workforce Management” – 31 July 17
- DoD Instruction 8500.01 Cybersecurity – 14 Mar 2014
- DoD Instruction 8510.01 Risk Management Framework (RMF) for DoD Information Technology (IT) – 24 May 2016
- Old: DoD Instruction 8510.01 Risk Management Framework (RMF) for DoD Information Technology (IT) – 12 Mar 2014
- Guide: USAF System Security Engineering Cyber Guidebook v4.0 – 29 July 2021
- Guide: PM Guidebook for Integrating Cybersecurity RMF into System Acquisition Lifecycle – Sep 2015
- Guide: DoD CIO Cybersecurity Strategy Outline and Guidance – 10 Nov 15
- Cybersecurity and Acquisition Lifecycle Integration Tool (CALIT) Ver 2.02
- Cybersecurity Policy Chart – 27 Oct 2015
- Presentation: CMMC “Securing the DoD Supply Chain Overview – Nov 2019
- Website: Defense Information Agency (DISA)
- Website: DoD ISAE
Updated: 12/2/2019