Argo’s Cyber Assurance helps ensure the success of the mission (or value chain) objectives and the protection of the system’s related capabilities regardless of the threatscape throughout the lifecycle. Key activities are executed to ensure that cybersecurity characteristics and elements are incorporated into the planning, design, development, implementation, deployment, sustained operation, and decommissioning of those systems and related components (software, hardware, infrastructure) used to collect, generate, process, store, display, transmit, or receive, mission / business critical data - as part of the operational management of the asset or system.
Argo’s Cyber Assurance activities achieve:
Argo’s Cyber Assurance activities include an “all source” identification of Threats that are handled differently than what is currently done. These threats are associated to threat Categories (not fully pictured in the above figure). Credible Threat vectors are then associated to capabilities, elements, entities, security elements and characteristics as defined in the Mission/Value Chain (M/VC) and in CIA impacts. Since this is an all source, holistic, and mission design based assurance, these threat categories therefore become more robust than developed during traditional intelligence identification and security impact assessment activities - i.e., identification of degradations of specific capabilities, elements, entities, functions, hardware and software components, and enclaves that have not been - historically speaking - consistently and comprehensively traced to mitigation on the design side of security risk mitigation planning. The resulting protection plan then shifts to more mission/business oriented considerations, with subsequent adjustments in the system’s solution and protection strategies, security architecture/design, System Security Plan, security relevant requirements, testing, etc.
Argo’s Cyber Assurance framework includes a description of essential methods (i.e. techniques). These ‘methods’ are not a description of general best practices - meaning one can not merely take a vulnerability snapshot to continuously understand the security risks that are relevant to protecting the system’s capabilities in achieving mission objectives during the system’s entire life cycle and within the context of an ever evolving ThreatScape.
But a robust implementation of Argo’s Cyber Assurance framework will result in the appropriate and correct implementation of continuously evolving protection strategies for a M/VC, system(s), and solution against a complete set of threats (i.e., current, anticipated, and the emerging threatscape) as per the accepted mission based risk tolerance.
© 2021 Argo Navis Technologies (304) 566-9481 Contact Us