The centerpiece of Pentagon modernization plans is an ubiquitous network called the Joint All-Domain Command and Control system–JADC2. It’s a way of providing all warfighters with robust, reliable information enabling optimum responses to threats. However, because JADC2 contains so much vital information, it is essential that malicious actors not be able to gain access. The mechanism for sorting out who should be admitted and who should not is a software system called Identity, Credential and Access Management, or ICAM. Without a rigorous application of ICAM, JADC2 could become a threat to combat success rather than an enabler of victory. The Senate Armed Services Committee is rightly calling for more emphasis on access controls. I have written a commentary for Forbes here.
Find Archived Articles: