Difference between revisions of "Authority to Operate"
From MgmtWiki
m (Tom moved page Authorization to Use to Authority to Operate: terminology migrates) |
(→Context) |
||
Line 4: | Line 4: | ||
==Context== | ==Context== | ||
* The US military requires an ATO before code can be run on a FedRAMP computer. | * The US military requires an ATO before code can be run on a FedRAMP computer. | ||
− | * An ATO is also known as (aka) an Authorization to Use. | + | * An ATO is also known as (aka) an [[Authorization to Use]]. |
+ | |||
+ | ==Solutions== | ||
+ | * [https://icitech.org/devsecops-ato/ DevSecOps Public Sector Accelerated ATO Initiative] (2020-10-30) | ||
==Reference== | ==Reference== | ||
[[Category: Authorization]] | [[Category: Authorization]] |
Revision as of 18:02, 8 January 2022
Full Title or Meme
For secured systems an ATO must be obtained before code can be run on any secured computer.
Context
- The US military requires an ATO before code can be run on a FedRAMP computer.
- An ATO is also known as (aka) an Authorization to Use.
Solutions
- DevSecOps Public Sector Accelerated ATO Initiative (2020-10-30)