Research Article
Security Evaluation Framework for Military IoT Devices
Table 9
Example of potentially inheritable security controls from UAV and above.
| SC | Description | SC | Description |
| AC-1 | Access Control Policy and Procedures | PE-9 | Power Equipment and Cabling | AC-2 | Account Management | SC-1 | System and Communications Protection Policy and Procedures | AU-1 | Audit and Accountability Policy and Procedures | SC-7 | Boundary Protection | AU-2 | Audit Events | SC-8 | Transmission Confidentiality and Integrity | PE-1 | Physical and Environmental Protection Policy and Procedures | SC-12 | Cryptographic Key Establishment and Management | PE-2 | Physical Access Authorizations | SC-13 | Cryptographic Protection | PE-3 | Physical Access Control | SC-20 | Secure Name /Address Resolution Service | PE-6 | Monitoring Physical Access | SC-38 | Operations Security |
|
|