COTS for Military Applications MIL-STD-810

COTS for Military Applications
COTS for military applications MIL-STD-810
Photo By: Air Force Airman 1st Class Devlin Bishop

COTS for Military Applications

The Defense Department is integrating more Commercial Off the Shelf (COTS) products for military applications including mission critical systems.  While this is a fantastic opportunity for businesses to gain access to a lucrative market, it also poses some serious challenges.

Once approved for a military application the manufacturer of the COTS must ensure that the products are designed to meet requirements for harsh environmental applications and stringent EMI/EMC limits.  This will often require extensive Developmental Test and Evaluation and probably a certain amount of design modification.

MIL-STD-810 Testing for COTS

MIL-STD-810 is the primary tool for Developmental Test and Evaluation for the environmental effects on military equipment.  This standard, currently in revision H, is comprised of twenty-nine methods for climatic and dynamic testing.  Climatic methods include High Temperature, Immersion, Fungus, Humidity, and Rain.  Dynamic methods include dozens of types of shock and vibration.

MIL-STD-810 does not rely on procedures with set parameters and severities.  Instead it requires an assessment of the critical environmental profiles likely to be encountered by the materiel in its life cycle.

This assessment involves a management and engineering process known as tailoring.  This is a critical decision-making process as the conditions a COTS in a military application would face on an aircraft would be entirely different than those in a shipboard application.  Added to this are consideration of all modes of transit likely to be encountered, both logistical and tactical.

MIL-STD-461 and Electrical Compatibility for Military Applications

MIL-STD-461 is the EMI/EMC standard for military components.  As such it often poses the greatest challenges to COTS transitioning into the military market.  Though requirements vary as determined by the intended platform (e.g. Army Ground, Aircraft Navy) they are generally more stringent for emissions and susceptibility than commercial items.

There are a number of standards that apply to electrical and electronic equipment for electrical compatibility.   The applicable standard is determined by the intended platform the equipment is to be installed in.

MIL-STD-1275 is used for 28 Volt DC powered items that are installed in military vehicles.  It includes methods to simulate the expected surges, ripples, limits, and starting disturbances found on these vehicles.

For equipment intended for use on aircraft, MIL-STD-704 is specified.  These methods include simulations of disturbances on various two phase, three phase, and DC power distribution networks found on military aircraft.

MIL-STD-1399 covers a wide range of power configurations found on shipboard power distribution systems.  These tests can be very involved and require significant time to complete.

CVG Strategy

CVG Strategy has expertise and experience in assisting companies adapt their products from the commercial marketplace to military applications.  Our experts can determine requirements and tailor environmental criteria to create effective Developmental Test and Evaluation programs.  Furthermore, our test and evaluation team can manage evaluation programs, write test plans, witness testing, and create test report summaries.  We have decades of experience in environmental and EMI/EMC testing in both commercial and military applications.

CVG Strategy is a consultancy offering coaching, mentoring, training and program development focused on areas including Business Process Improvement, ITAR and Export Compliance, Cyber Security and Quality Management Systems.

Capital One Cyberattack Effects 106 Million Card Holders

Capital One Cyberattack
Capital One Cyberattack
Photo by Snapwire

Capital One Cyberattack

The Capital One cyberattack is a concern for small businesses.  Capital One said that the personal information of approximately 106 million card customers and applicants had been compromised.  This is one of the largest cyberattacks on a big bank.

The information of customers and applicants compromised included small businesses.  It was reported that the information accessed from the Capital One cyberattack involved persons or businesses that had applied for credit cards from 2005 to early 2019.  It included addresses, names, dates of birth and self-reported income.

The Cost of Cyberattacks

The alleged source of the cyberattack was a former employee of Amazon Web Services Inc., who had worked at a cloud-computing company.  Capital One said it is unlikely the stolen information had yet to be disseminated or used for fraud.  The investigation is continuing however.  The incident is expected to cost approximately $100 million to $150 million.  Estimates for losses to the U.S. economy in 2018 to cyberattacks were between $57 and $109 billion but the real cost to a company’s reputation and intellectual properties is beyond dollar estimates.

Beyond the Capital One Cyberattack

Often businesses focus their cybersecurity efforts on IT solutions.  The Capital One cyberattack much like the Equifax breach in 2017 illustrate how short sighted this approach can be.  Every business shares valuable information with entities it does business with.  Therefore, businesses today need a management-oriented structure to access threats, create processes to deal with them, and conduct regular reviews and audits of those processes to be effective.

ISO-27001

ISO-27001 is such a solution.  It includes all stakeholders and is flexible to demands of any size of business.  ISO 27001 can not only protect your business from cyberattacks it can help your credibility with potential customers.  This is because certification in an Information Security Management System (ISMS) shows your intent to protect their information as well.

In conclusion, in today’s world nobody is exempt from having their information compromised.  Even Capital One, the world’s fifth largest credit card company can be a victim of cyberattack.  Maintaining a viable ISMS like ISO 27001 ensures your business is maintaining a viable mitigation of this threat.

CVG Strategy

CVG Strategy ISO 27001 consulting services help organizations plan, create, upgrade, and certify a robust and effective Information Security Management System (ISMS).  Our team of experts bring extensive experience and deep information security process control expertise (including certifications as Exemplar Global Lead Auditor ISO/IEC 27001:2013 Lead Auditor) to ensure that you achieve ISO/IEC 27001 certification on time and on budget.