CreatorTim Ramey
Description
To characterize the cyber-attack surface, the CyWG first identifiesall forms of communication, network connectivity, software, hardware, supply chain, and human interaction and creates an attack surface list to use when identifying key cyber terrain and potential attack vectors. In addition, the CyWG analyzes and decomposes the mission that the system performs to support follow-on attack surface analysis. The CyWG also identifies critical components and data (key terrain) that support Mission Essential Functions (MEFs).Owning Diagram A21: Identify the Cyber-attack Surface
catalog of cybersecurity requirements