Training systems can benefit enormously with the integration of mobile architecture into the accreditation boundary as Warfighters are immediately familiar with the user interface. This enables the system developer to tap into a wealth of built-in functionality that would otherwise take years to develop. One of the latest Information Assurance (IA) challenges training systems face in today's continually evolving cyber threat environment is the secure integration of mobile architecture to ensure the continued protection of data and adherence with constantly evolving regulations. Our paper will discuss the significant issues Government Project Managers (PM) now face integrating mobile architecture into their initial system designs, as well as Configuration Management and Information Assurance Vulnerability Management (IAVM) processes.
We will address the many IA issues to integrating a mobile architecture in a training system to include technical security challenges, current and expanding IA requirements, industry best practices and using a risk management approach to ensure the system successfully completes the Certification and Accreditation (C&A) process and receives an Authorization to Operate (ATO). We will outline the numerous IA requirements currently governing mobile architecture, and the upcoming requirements DoD is proposing for the future.
To better train the Warfighter, industry and Government are rapidly progressing with the innovation that mobile architecture facilitates, enabling solutions that previously would never be possible. IA requirements and solutions must keep pace with innovation to ensure the way in which we train and fight is protected and secure. Finally, we will discuss a number of use cases within training and simulation systems that are currently undergoing the process of integrating mobile architecture into their accreditation boundary and lessons learned from those use cases.