What cybersecurity standards should we consider early on in our architecture design?
The cybersecurity requirement does not have to be implemented in the solution in Stages 2 and 3. For your architecture design or Stage 1 description, you may consider hardware, software, or systems solutions with hardening mechanisms, such as encryption (storage or in-transit), authentication, identity verification systems (of the drone, pilot interfaces, and delivery points), or malware and intrusion detection. While many of these methodologies are implemented by default in many UAS solutions, bringing awareness and understanding of these features to potential users is important. Conceptualize yourself as a consultant or salesperson, describing how cybersecurity is used in your solution for a potential first responder customer. Think of how you can reassure them that your solution is secure. Consider how it remains secure after the sale with ongoing solution maintenance.