Use of Concept: Authorization to Operate (ATO)
Creator
Description
Authorization to Operate (ATO)
Owning Diagram
A0: Assess Cybersecurity Risk
ICOM Details:
Tunneled Concept in Diagram.
Input on Activity
A5 Phase 5: Assess Vulnerabilities and Penetration
.
Input on Activity
A4 Phase 4: Test & Evaluate Adversarial Impact on Critical Functions
.
Control on Activity
A6 Phase 6: Assess Adversary Impact on Missions
.