Skip to main content


Everyone must understand authority to operate processes so that they can better address security concerns as it pertains to their specific role.

Key stakeholders include:

  • Government IT leadership
  • Security professionals
  • Acquisition professionals
  • Audit and assessment personnel
  • Baseline authors
  • Tool developers
  • Policy authors
  • Bureaucracy hackers
  • Industry
  • Media