DEPARTMENT OF THE AIR FORCE - static.e-publishing.af.mil

instructions when determining the classification of cyber security incidents and vulnerability documents. (T-1). (ADD) 1.19.2. Authorized and unauthorized uses. End users must have the ability to distinguish between authorized and unauthorized uses. (ADD) 1.19.2.1. Authorized uses must be vetted through a formal cyber security assessment ................
................