State-of-the-Art Reports (SOARs)

SOARs are CSIAC publications that provide in-depth analysis of current technologies, research, and the latest technical information available on a topic within any of the CSIAC technical focus areas.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Cloud Computing for the Government Sector

Department of Defense (DoD) organizations often process sensitive data that cannot be entrusted to 3rd party organizations without precautions and protections. The Defense Information Systems Agency (DISA) is in the process of defining these protections…

Cloud Computing in the Government

Cloud computing is currently one of the biggest trends in the information technology (IT) industry. Over the past several years, cloud computing has gained significant momentum to be the cost effective and efficient alternative to…

Use of Mobile Technology for Information Collection & Dissemination

Mobile technology is increasingly being utilized as a tool for information dissemination and collection. Numerous agencies including the Department of Defense (DoD), Department of Homeland Security (DHS), Intelligence community, and law enforcement are utilizing mobile…

Security Risk Management for the Off-the-Shelf (OTS) Information and Communications Technology (ICT) Supply Chain

This SOAR provides a comprehensive examination of the current state-of-the-art in addressing supply chain risk management (SCRM) as it pertains to ICT. This includes how ICT SCRM emerged as a major concern in DOD, the…

Measuring Cyber Security and Information Assurance

The rapid growth of connections, processing, bandwidth, users, and global dependence on the Internet has greatly increased vulnerabilities of information technology (IT) infrastructure to increasingly sophisticated and motivated attacks. Despite significantly increased funding for research,…

The Insider Threat to Information Systems

The Insider Threat provides comprehensive examination of the current state-of-the-art in addressing the insider threat as it pertains to information technology systems. This SOAR provides an overview of how the insider threat is defined and…

Enhancing the Development Life Cycle to Produce Secure Software

Enhancing the Development Life Cycle to Produce Secure Software answers the questions of why software security is important, why so much software is not secure, and the risks posed to systems that contain non-secure software….

A Business Case for Software Process Improvement (2007 Update), Measuring Return on Investment from Software Engineering and Management

The purpose of this revised State-of-the-Art Report (SOAR) is to provide new insights into the details necessary to demonstrate from a business perspective the benefits of improved software management using software process improvement (SPI) techniques….

Software Project Management for Software Assurance

This report presents information on how the need for software assurance affects software project management. The impact of software assurance on the tasks and concerns of a project manager are addressed, first in terms of…

Software Security Assurance

This State-of-the-Art Report (SOAR) describes the current state of software security assurance. It provides an overview of the current state of the environment in which defense and national security software must operate and then surveys…

Department of Defense (DoD) Information Assurance (IA) and Computer Network Defense (CND) Strategies

The purpose of this State-of-the-Art (SOAR) Report, is to provide an objective, summarized depiction, across a number of published and draft strategies, plans, roadmaps, initiatives, and reference-capabilities documents, of DoD’s technical-capability needs, challenges, and solutions…

Embedded Software Maintenance

The goal of this report is to describe the state-of-the-art of embedded software maintenance and provide a glimpse of state-of-the-practice embedded maintenance practices. Section 2 introduces the area of embedded software based on embedded systems,…