6.1.2—6.1.2
>Control Description
DoD Components develop access profile rules for mission/task and non- mission/task DAAS access using the data from the User, Data, Network & Environment, and Device pillars. The DoD Enterprise works with the Components to develop an Enterprise security profile rules using the existing Component security profiles to create a common access approach to DAAS. A phased approach can be used by Components to limit risk to mission/task critical DAAS access once the security profile(s) are created.
>Cross-Framework Mappings
Ask AI
Configure your API key to use AI features.