Research Article

Security Evaluation Framework for Military IoT Devices

Table 9

Example of potentially inheritable security controls from UAV and above.

SCDescriptionSCDescription

AC-1Access Control Policy and ProceduresPE-9Power Equipment and Cabling
AC-2Account ManagementSC-1System and Communications Protection Policy and Procedures
AU-1Audit and Accountability Policy and ProceduresSC-7Boundary Protection
AU-2Audit EventsSC-8Transmission Confidentiality and Integrity
PE-1Physical and Environmental Protection Policy and ProceduresSC-12Cryptographic Key Establishment and Management
PE-2Physical Access AuthorizationsSC-13Cryptographic Protection
PE-3Physical Access ControlSC-20Secure Name /Address Resolution Service
PE-6Monitoring Physical AccessSC-38Operations Security