AADL

file

Visible to the public Cyber-Resilient Architectural Patterns

Cyber vulnerabilities are often discovered during penetration testing of new systems. Even worse, they may be discovered after a system has been fielded, necessitating extremely expensive and time-consuming remediation. This is not a sustainable development model. Experience shows that this approach is both ineffective (due to the incomplete nature of testing) and results in long and expensive rework cycles.