Information Assurance (IA) has changed the simulation business for Department of Defense (DoD) simulator suppliers. IA impacts our system architecture design, engineering practices, engineering scope, subcontractor management, and changes the profile of our Contractor Operation and Maintenance Services (COMS) support. We must broaden our industry to become defenders of the valuable services our products provide to the war fighter. Building a simulator from scratch that is robust enough (as defined in DoD regulations) to withstand the threats of Mother Nature, internal espionage, accidental destruction, and cyber-warfare is feasible. Building a robust simulator that is also operationally effective and efficient takes introspection, understanding, investment, and discipline. Retrofitting a simulator with integrity, availability, and confidentiality controls (as defined in DoD regulations) is like a river of negotiations between DoD regulation requirements and budgetary constraints. The contractor, subcontractors, acquisitions group, user base, and accreditation authority must embrace the spirit of the regulations to both empower and defend the war fighter. Maintaining a simulator’s Certification and Accreditation (C&A) profile, as well as maintaining the operational integrity of the trainer, requires an adaptation of the Contractor Operation and Maintenance Services (COMS) personnel skill set and duties. Intrusion Detection/Prevention Systems (IDS/IPS), firewalls, Access Control List
To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.