Risk Management Framework Requirements
Can you provide a checklist of requirements that DoD agencies use to set up an Authority to Connect (ATC), Authority to Test (ATT), or Authority to Proceed (ATP)?
Example TIs are samples of the wide range of technical inquiries submitted by CSIAC members under our 4 free hours of information research support.
Can you provide a checklist of requirements that DoD agencies use to set up an Authority to Connect (ATC), Authority to Test (ATT), or Authority to Proceed (ATP)?
What is the state of cyber technical ranges, and what current software tools are used at each range?
Can you provide an overview on what IPv6 really is, its implications, and where tactical/strategic issues might arise?
What are the latest advances and applications of microelectronics architectures and applications that focus on chiplet-based architectures?
Has anyone ever labeled individual records in Zeek logs for attacks/exploits? If so, how did they do it?
What existing tools and techniques could be applied to modeling the linkages and dependencies between critical US infrastructure components?
Receive free information research on technical topics