Activity-in-Diagram: Examine System Architecture, Components, and Data Flows

CreatorTim Ramey

Description

To characterize the cyber-attack surface, the CyWG first identifiesall forms of communication, network connectivity, software, hardware, supply chain, and human interaction and creates an attack surface list to use when identifying key cyber terrain and potential attack vectors. In addition, the CyWG analyzes and decomposes the mission that the system performs to support follow-on attack surface analysis. The CyWG also identifies critical components and data (key terrain) that support Mission Essential Functions (MEFs).

Owning Diagram A21: Identify the Cyber-attack Surface

Decomposition

A211: Examine System Architecture, Components, and Data Flows

Input

system design

DoDAF Architecture Views

Control

catalog of cybersecurity requirements

Cheif Developmental Tester

Mechanism

Cybersecurity DT&E Technical Experts