Stakeholders
Everyone must understand authority to operate processes so that they can better address security concerns as it pertains to their specific role.
Key stakeholders include:
- Government IT leadership
- Security professionals
- Acquisition professionals
- Audit and assessment personnel
- System and component developers
- Policy authors
- Bureaucracy hackers
- Industry