The taxonomy below consists of a subset of nodes from the C3 Taxonomy version 3.1 released on Jul 4, 2019. The tree have been extended with a User defined subtree describing nodes which have not yet been added to the C3 Taxonomy.
Each node in the tree is prefixed with a number describing the level of the node in the tree (i.e. the distance from the root node).
Each node may also be postfixed with a tuple with three values, indicating:
- The number of times a mandatory standard references a node in the taxonomy
- The number of times a candidate standard references a node in the taxonomy
- The number of times a taxonomy node is referenced from a service profile
- [0] C3 Taxonomy (0, 141, 15)
- [1] Operational Context
- [2] Missions and Operations
- [3] Policy and Guidance
- [4] Strategic Concept
- [4] Political Guidance
- [5] Comprehensive Political Guidance
- [5] Declaration on Alliance Security
- [5] 2012 Chicago Summit Declaration
- [5] Political Guidance 2011
- [5] 2005 Brussels Summit Statement
- [5] 2014 Wales Summit Declaration
- [5] 2004 Istanbul Summit Declaration
- [5] 2009 Strasbourg-Kehl Summit Declaration
- [5] 2010 Lisbon Summit Declaration
- [5] 2006 Riga Summit Declaration
- [5] 2002 Prague Summit Declaration
- [5] 2008 Bucharest Summit Declaration
- [4] Military Guidance
- [4] Allied Publications
- [4] Policies and Directives
- [5] C3 Policies and Directives
- [6] NATO Directive for the Use of Internet Services
- [6] NATO Directive for the Implementation of the NATO PKI
- [6] NATO Policy for the Implementation of a PKI for NATO CIS
- [6] NATO Software Management Policy
- [6] NATO PKI Certificate Policy
- [6] NATO PKI Certificate Policy Addendum 1
- [6] NATO Information Management Policy
- [6] Enhanced NATO Policy on Cyber Defence
- [6] NATO Policy on Cyber Defence
- [6] Primary Directive on Information Management
- [6] NATO Directive for NATO PKI Interoperability with the Nations
- [6] NATO Policy for the Use of Internet Services
- [5] Security Policies and Directives
- [6] NATO Directive on Physical Security
- [6] NATO Directive on Industrial Security
- [6] NATO Directive on Personnel Security
- [6] NATO Policy on Public Disclosure of NATO Information
- [6] INFOSEC Management Directive for CIS
- [6] Management of Non-Classified NATO Information
- [6] Primary Directive on CIS Security
- [6] NATO Security Policy
- [6] NATO Directive on Public Disclosure of NATO Information
- [6] NATO Directive on the Security of Information
- [5] Standardization Policies and Directives
- [5] Other Policies and Directives
- [6] Directive on the Handling of Records During the Closure of a NATO Civil or Military Body
- [6] Policy on the Retention and Disposition of NATO Information
- [6] NATO Geospatial Policy
- [6] NATO Records Policy
- [6] NATO Interoperability Policy
- [6] Directive on the Management of Records Generated on Operational Deployment
- [5] C3 Policies and Directives
- [3] Mission Types and Tasks
- [4] Mission Type - Collective Defence (CD)
- [4] Mission Type - Consequence Management (CM)
- [4] Mission Type - Counter Insurgency (COIN)
- [4] Mission Type - Counter Terrorism (CT)
- [4] Mission Type - Peacekeeping (PK)
- [4] Mission Type - Peace Enforcement (PE)
- [4] Mission Type - Conflict Prevention (CP)
- [4] Mission Type - Peacemaking (PM)
- [4] Mission Type - Peacebuilding (PB)
- [4] Mission Type - Support to Humanitarian Assistance (SHA)
- [4] Mission Type - Support to Disaster Relief (DR)
- [4] Mission Type - Support of Non-Combatant Evacuation Operations (NEO)
- [4] Mission Type - Extraction Operation (EOP)
- [4] Mission Type - Military Aid/Support to Civil Authorities (SCA)
- [4] Mission Type - Enforcement of Sanctions and Embargoes (ESE)
- [4] Mission Type - Permanent Tasks
- [3] Policy and Guidance
- [2] Operational Capabilities
- [3] Capability Hierarchy
- [3] Business Processes (0, 0, 3)
- [4] Govern
- [5] Maintain Strategic Situational Awareness
- [5] Direct military operations at the strategic level
- [5] Define defence policy
- [5] Develop defence industry
- [5] International Partnering
- [5] Define Concepts and long-term Vision
- [5] Develop Strategy
- [5] Execute and measure Strategic Initiatives
- [5] Develop and maintain Business Models
- [4] Generate
- [5] Defence Planning
- [5] Research and Innovation
- [5] Standardization
- [5] Evaluation
- [6] Operational Readiness Evaluation
- [6] Technology Readiness Assessment
- [6] Test
- [7] Assess Testability
- [7] Plan Test
- [7] Execute Test
- [7] Analyze Test Results
- [7] Report Test Results
- [4] Operate
- [5] Prepare Operations
- [6] Prepare Forces
- [6] Prepare Battlespace
- [6] Prepare C2
- [6] Prepare Sustainment
- [6] Prepare Medical Support
- [6] Prepare Detention
- [6] Refine Plans
- [6] Rehearse Operations
- [5] Command and Control Operations
- [6] Sensing
- [6] Processing
- [6] Sensemaking
- [6] Deciding
- [6] Acting
- [7] Execute Operations
- [7] Exercise command
- [6] Assessing
- [6] Connecting
- [5] Domain-specific Operations
- [6] Air Operations
- [7] Airborne ISR Collections Provision Processes
- [7] ASC Airspace Control Processes
- [7] Air Strategy Development Processes
- [7] Air and Missile Defence Operations Processes
- [7] Air C2 Processes
- [6] Maritime Operations
- [6] Land Operations
- [7] Land C2 Processes
- [7] Land Operations Planning Processes
- [7] Land Operations Preparation
- [7] Land Operations Execution Processes
- [7] Land Operations Assessment Processes
- [6] Space Operations
- [6] Cyberspace Operations
- [6] Air Operations
- [5] Function-specific Operations
- [6] Strategic Communications Processes
- [6] Military Engineering Support Processes
- [7] Understand and Assess Military Engineering Operational Environment
- [7] Plan Military Engineering Support
- [8] MILENG Contribution to MRO Development Process
- [8] MILENG Contribution to MRO Analysis Process
- [8] MILENG Support to Strategic CONOPS Development Process
- [8] MILENG Support to Operational CONOPS Development Process
- [8] MILENG Support to Strategic OPLAN and Force Development Process
- [8] MILENG Support to Operational OPLAN Development Process
- [8] Tactical Level Support to Operational Planning Process
- [7] Execute Military Engineering Support to Operations
- [7] Transition Military Engineering Support
- [6] Time Sensitive Target Processes
- [6] Joint Targeting Processes
- [7] Joint Target Development Process
- [7] Joint Target Validation Process
- [7] Joint Target Nomination Process
- [7] Joint Target Prioritization Process
- [7] Joint Targeting Capabilities Analysis Process
- [7] Joint Targeting Force Planning and Assignment Process
- [7] Joint Targeting Mission Planning and Execution Process
- [7] Joint Targeting Combat Assessment Process
- [6] Joint ISR Processes
- [7] JISR Tasking Process
- [7] JISR Collection Process
- [7] JISR Processing Process
- [7] JISR Exploitation Process
- [7] Disseminate JISR Products (0, 0, 3)
- [6] Joint Fire Support Processes
- [6] Intelligence Processes
- [6] Medical Support Processes
- [7] Medical Support Planning Processes
- [8] Medical Evaluation Management Processes
- [9] Evaluation Campaign and Medical Evaluation Team Initiation Process
- [9] Medical Evaluation Self-Assessments Process
- [9] Medical Evaluation Self-Assessments Review Process
- [9] Record Interviews Process
- [9] FIR Development Process
- [9] FIR Response Process
- [9] FER Development Process
- [9] Observations and Feedback Process
- [9] Operational Medical Support Assessment Process
- [9] Reference Data Management Process
- [9] Evaluation Campaign Tracking Process
- [8] Casualty Rate Estimation Processes
- [8] CBRN Casualty Rate Estimation Processes
- [8] Medical Support Operations Planning Processes
- [9] Medical Contribution to Situational Awareness Process
- [9] Medical Contribution to Strategic Assessment Process
- [9] Medical Contribution to MRO Development Process
- [9] Medical Contribution to the Strategic CONOPS Development Process
- [9] Medical Contribution to Strategic OPLAN Development and Force Generation Process
- [9] Medical Contribution to Initial Situation Awareness of a Potential or Actual Crisis Process
- [9] Medical Contribution to the Operational Appreciation of the Strategic Environment Process
- [9] Medical Contribution to the Operational Estimate and Mission Analysis Process
- [9] Medical Contribution to the Operational Estimate and COA Development Process
- [9] Medical Contribution to the Operational CONOPS Development Process
- [9] Medical Contribution to the Operational OPLAN Development Process
- [8] Medical Capability Management Processes
- [8] Medical Support Simulation Processes
- [8] Medical Evaluation Management Processes
- [7] Medical Mission Management Processes
- [7] Clinical Support Processes
- [7] Health Surveillance Processes
- [8] Force Health Status Monitoring Processes
- [9] National Prophylaxis Library Process
- [9] Biological Warfare Countermeasures Library Process
- [9] Operational Unit Prophylaxis Data Capture Process
- [9] FHS Reference Information Library Maintenance Process
- [9] National Prophylaxis Library Query Process
- [9] Report Readiness by Operation Process
- [9] FHS Lookup Data Maintenance Process
- [8] Force Health Status Monitoring Processes
- [7] Medical Evacuation Process
- [7] Medical Intelligence Processes
- [7] Medical Support Planning Processes
- [6] Personnel Recovery Processes
- [6] Counter IED Processes
- [6] Force Protection Processes
- [6] Electromagnetic Operations Processes
- [7] Electronic Surveillance Processes
- [7] Plan Electromagnetic Operations Processes
- [7] Execute EMO Process
- [7] Monitor and Report EM Operations
- [7] Electronic Attack Processes
- [7] Recognized Electromagnetic Picture Management
- [6] Special Operations Processes
- [7] Special Operations Planning Processes
- [8] Special Operations Situational Awareness Process
- [8] Special Operations Planning Appreciation Process
- [8] Special Operations Planning Orientation Process
- [8] Special Operations CONOPS Development Process
- [8] Special Operations Plan Development Process
- [8] Special Operations Execution and Assessment Process
- [8] Special Operations Transition Planning Process
- [7] Special Operations Targeting Process
- [7] Special Operations Planning Processes
- [6] Communication and Information Systems Support
- [6] Psychological Operations Processes
- [6] CIMIC Support
- [5] Prepare Operations
- [4] Enable
- [5] Personnel Support Processes
- [6] Manpower Process
- [7] Organisational Design and Change of Military Manpower
- [7] Managing Manpower in Peacetime Establishments
- [7] Generate the Annual Manpower Plan
- [7] Manage Manpower Post Categories, the Manpower Mix and Manning Responsibilities
- [7] Manpower Planning
- [7] Manage Military Personnel
- [7] Manage Change for Military Personnel Organisation
- [7] Use Intgerated Resource Management
- [7] Manage Crisis Establishments
- [7] Manage Voluntary National Contributions for Interm Posts
- [6] Human Resources Process
- [6] Manpower Process
- [5] Business Relationship Management Process
- [5] CIS Support Processes
- [6] CIS Security Processes
- [7] CIS Security Prevention Processes
- [8] CIS Protection Process
- [8] Data Protection Process
- [8] Identity and Access Management Processes
- [8] CIS Asset and Configuration Management Process
- [7] CIS Security Defence Processes
- [7] CIS Security Assessment Processes
- [7] CIS Security Sustainment Processes
- [7] CIS Security Information Sharing Processes
- [7] CIS Security Prevention Processes
- [6] SMC Processes (2, 0, 1)
- [7] SMC Service Strategy Processes
- [7] SMC Service Design Processes
- [8] SMC Design Coordination Process
- [8] SMC Capacity Management Processes
- [8] SMC Availability Management Process
- [8] SMC IT Service Continuity Management Process
- [8] SMC Service Level Management Process
- [8] SMC Compliance Management Process
- [8] SMC Service Catalogue Management Process
- [8] SMC Architecture Management Process
- [7] SMC Service Transition Processes
- [8] SMC Change Management Process
- [8] SMC Change Evaluation Process
- [8] SMC Release and Deployment Management Process
- [8] SMC Application Development Process
- [8] SMC Service Validation and Testing Process
- [8] SMC Transition Planning and Support Process
- [8] SMC Service Asset and Configuration Management Process
- [7] SMC Service Operation Processes
- [7] SMC Continual Service Improvement Processes
- [7] Service Knowledge Management Process
- [6] CIS Security Processes
- [5] Analytical Support Processes
- [6] Define Problem
- [6] Acquire Data
- [6] Prepare Data
- [6] Analyse Data
- [6] Present Findings
- [5] Financial Support Processes
- [5] Supplier Management Process
- [5] Task Management Process
- [5] Information Management Processes
- [6] Information Management Planning Process
- [6] Information Collection, Creation, or Generation Process
- [6] Information Organization Process
- [6] Information Retrieval and Dissemination Process
- [6] Information Storage and Protection Process
- [6] Information Disposition Process
- [6] Registry Process
- [6] IKM Entity Management Processes
- [6] Activity Management Process
- [6] Information Exploitation Process
- [5] Personnel Support Processes
- [4] Govern
- [3] Information Products (1, 0, 2)
- [4] Personnel and Administration
- [5] Personnel
- [5] Administration
- [4] Intelligence
- [4] Operations
- [4] Logistics
- [5] Supply
- [5] Materiel
- [5] Movement and Transport
- [5] Maintenance
- [5] Logistic Services
- [5] Engineering
- [5] Medical
- [4] Planning
- [5] Intelligence Planning'
- [5] Operations Planning
- [5] Logistics Planning'
- [5] CIS Planning
- [5] ETEE Planning
- [4] CIS
- [5] IT Service Management
- [5] CIS Security
- [5] Signals
- [5] Communications
- [4] Training and Exercises
- [5] Education and Training
- [5] Exercises
- [5] Test and Evaluation
- [4] Resources and Finance
- [4] Civil-Military Cooperation
- [4] Personnel and Administration
- [2] Missions and Operations
- [1] CIS Capabilities (1, 141, 1)
- [2] User-Facing Capabilities
- [3] User Applications
- [4] CIS Security Applications
- [5] CIS Security Prevention Applications
- [6] Cyber Deception Application
- [6] Identity and Access Management Applications
- [6] Information Labeling Application
- [6] Crypto Key Management Application
- [6] CIS Security Prevention Under Review Applications
- [6] Redaction and Sanitization Application
- [5] CIS Security Defence Applications
- [6] CIS Security Defence Under Review Applications
- [6] Cyber Analysis Application
- [6] Cyber Collection Management Application
- [6] Cyber Incident Management Application
- [6] Cyber Attack Support Application
- [6] Cyber Damage Assessment Application
- [6] Recognized Cyber Picture Application
- [6] Malware Analysis Application
- [6] Cyber Attack/Fault Recovery Application
- [6] Cyber Course of Action Application
- [5] CIS Security Assessment Applications
- [5] CIS Security Sustainment Applications
- [6] CIS Security Documentation Application
- [6] Security Design and Implementation Management Application
- [6] CIS Security Evaluation and Optimization Support Application
- [6] Security Requirements Management Application
- [6] CIS Security Training Support Application
- [6] CIS Security Research Management Application
- [5] CIS Security Information Sharing Applications
- [5] CIS Security Prevention Applications
- [4] SMC Applications
- [5] Service Management Domain Applications (0, 0, 1)
- [6] Service Desk Application
- [6] Service Portfolio Management Application
- [6] Service Inventory Management Application
- [6] SLA Management Application
- [6] Configuration Management Application
- [6] Service Problem Management Application
- [6] Service Performance Management Application
- [6] Change Management Application
- [6] Architecture Management Application (1, 0, 8)
- [6] Service Test Management Application
- [6] Incident Management Application
- [6] Service Quality Management Application
- [6] Service Availability Application
- [5] Resource Management Domain Applications
- [5] Service Management Domain Applications (0, 0, 1)
- [4] Joint Applications (6, 0, 1)
- [5] Targeting Applications
- [5] Operations Planning Applications
- [6] ORBAT Management Application
- [6] Mission Analysis and Orientation Application
- [6] Courses of Action Application
- [6] CONOPS Application
- [6] CJSOR Application
- [6] Plan Development Application
- [6] Joint Coordination Order Application
- [6] Force Generation and Activation Application
- [6] Cyber Ops Planning Application
- [6] POL-MIL Consultation Application
- [6] NATO Crisis Response System Application
- [6] Operations Planning Portal Application
- [6] Troops-to-Action Analysis Application
- [6] CIS Planning Application
- [5] Order and Tasking Applications
- [5] Reporting Applications
- [5] Situational Awareness Applications
- [5] C2 Reference Data Source Applications
- [5] Operations Assessment Applications
- [4] Air Applications
- [5] Air Operations Planning and Tasking Applications
- [5] Air Operations Execution and Monitoring Applications
- [6] Air Surveillance Applications
- [6] Air Execution Applications
- [7] Air Tasking and Scrambling Application
- [7] Threat Evaluation and Engageability Application
- [7] Mission Rehearsal / Fly Out Application
- [7] Joint Air Mission Status and Reporting Application
- [7] Air Intercept Mission Control Application
- [7] Intercept Monitoring Applications
- [7] SAW Mission Control Application
- [7] SAW Mission Monitoring Application
- [7] Air Mission Change Application
- [7] Air Execution Management Application
- [6] Reporting and Assessment Applications
- [5] Air Logistics Applications
- [5] Air Base Management Applications
- [5] Personnel Recovery C2 Application
- [4] Land Applications
- [4] Maritime Applications
- [5] Maritime Situational Awareness Applications
- [6] Maritime Operational Object Management Applications
- [6] Maritime Information Management Applications
- [7] Maritime Dataset Application
- [7] Person of Maritime Interest Application
- [7] Lloyd's MIU Application
- [7] Maritime Detention List Application
- [7] Merchant Ship Characteristics Application
- [7] World Port Index Application
- [7] Shipping Routes Network Application
- [7] Maritime Internet Searching Application
- [7] Maritime Country Code Handling Application
- [7] Maritime ORBAT Application
- [7] Maritime Information Exchange Application
- [6] Maritime Picture Management Applications
- [5] Maritime Operational Support Applications
- [5] Maritime Warfare Area Applications
- [6] Maritime Anti Air Warfare Application
- [6] Maritime Subsurface Warfare Application
- [6] Naval Mine Warfare Applications
- [6] Maritime Surface Warfare Application
- [6] Maritime Electronic and Acoustic Warfare Application
- [6] Maritime Amphibious Warfare Application
- [6] Maritime Power Projection Ashore Application
- [5] Maritime System Management Applications
- [5] Maritime Messaging and Communication Application
- [5] Maritime Training and Exercise Applications
- [5] Maritime Operational Planning and Execution Applications
- [6] Maritime Operation Management Application
- [6] Maritime Task Organization Management Application
- [6] Maritime Area of Interest Management Application
- [6] Maritime ROE Application
- [6] Maritime Planning Support Applications
- [6] Subsurface Mission Space Management Application
- [6] Maritime OPLAN Application
- [6] Maritime COMPLAN Application
- [6] Maritime Operational Tasking Application
- [6] Maritime Operational Reporting Application
- [6] Maritime Operation Monitoring Application
- [6] Maritime Operation Assessment Application
- [6] Maritime Targeting Application
- [6] Maritime COA Analysis Application
- [6] Maritime SAR Application
- [6] Maritime Patrol Aircraft Planning Application
- [6] Maritime Logistics and Support Application
- [5] Maritime Situational Awareness Applications
- [4] Space Applications
- [4] Special Operations Applications
- [4] JISR Applications
- [5] JISR Direction Applications
- [5] JISR Collection Applications
- [5] JISR Processing Applications
- [6] JISR Exploitation Applications
- [7] JISR Single Source Exploitation Applications
- [8] IMINT Applications
- [8] Signals Exploitation Application
- [8] MTI Exploitation Application
- [8] Geo-Physical Exploitation Application
- [8] Radio Exploitation Application
- [8] Radar Exploitation Application
- [8] Electro-Optic Exploitation Application
- [8] Nuclear Exploitation Application
- [8] Multi and Hyper Spectral Exploitation Application
- [8] Material Exploitation Application
- [7] JISR Multi Source Exploitation Applications
- [7] JISR Single Source Exploitation Applications
- [6] JISR Analysis Applications
- [6] JISR Exploitation Applications
- [5] JISR Dissemination Application
- [4] Logistics Applications
- [5] Logistics C2 Coordination Applications
- [5] Supply and Services Applications
- [6] Strategic Stockpile Planning Application
- [6] Request Processing Application
- [6] Asset Tracking Application
- [6] Sustainment Planning Application
- [6] Logistics Simulation Application
- [6] Ammunition Management Information Application
- [6] Warehousing/Storage and Stock Management Application
- [6] Host Nation Support Application
- [6] Electronic Customer Information Management Application
- [5] Maintenance and Repair Application
- [5] Movement and Transportation Applications
- [5] Infrastructure Engineering Support Applications
- [5] Contractor Logistics Support Application
- [5] Budget and Finance Applications
- [4] Medical Applications
- [4] Electronic Warfare Applications
- [5] Electronic Order of Battle Application
- [5] Electronic Surveillance Application
- [5] Navigation Warfare Application
- [5] NATO Emitter Database Application
- [5] Electronic Defence Application
- [5] Emitter TECHINT Application
- [5] RC-IED Application
- [5] Electronic Attack Application
- [5] Electromagnetic Operations Planning Application
- [5] Recognized Electromagnetic Picture Application
- [4] Environmental Applications
- [4] Missile Defence Applications
- [4] CIMIC Applications
- [4] CBRN Applications
- [5] CBRN Detection, Identification and Monitoring Application
- [5] CBRN Warning and Reporting Application
- [5] CBRN Physical Protection Application
- [5] CBRN Hazard Management Application
- [5] CBRN Medical Countermeasures and Support Application
- [5] CBRN Cross-Sectional Applications
- [6] CBRN Common Operational Picture Application
- [6] CBRN Force Preparation Application
- [6] CBRN Threat Assessment Application
- [6] CBRN Vulnerability Assessment Application
- [6] CBRN Risk Assessment Application
- [6] CBRN Lessons Learnt Application
- [6] CBRN Plans Development Application
- [6] CBRN Simulation Application
- [6] CBRN Reach-Back Application
- [6] CBRN Logistic Database Application
- [6] CBRN Incident Historical Database Application
- [6] CBRN Intelligence Database Application
- [4] ETEE Applications
- [5] ETEE Management Application
- [5] Education and Individual Training Application
- [5] Collective Training and Exercises Applications
- [6] CTE Program Management Applications
- [6] CTE Event Planning and Management Applications
- [6] CTE Setting and Scenario Applications
- [6] CTE Modelling and Simulation Applications
- [6] CTE Training Audience Interaction Applications
- [7] CTE Generic Interaction Application
- [7] CTE Joint Interaction Application
- [7] CTE Air Interaction Application
- [7] CTE Land Interaction Application
- [7] CTE Maritime Interaction Application
- [7] CTE CBRN Interaction Application
- [7] CTE Special Operations Interaction Application
- [7] CTE JISR Interaction Application
- [7] CTE Logistics Interaction Application
- [7] CTE EW Interaction Application
- [7] CTE Psychological Operations Interaction Application
- [6] CTE Analysis Applications
- [5] Evaluation Applications
- [4] StratCom Applications
- [4] Modelling and Simulation Applications
- [4] Legal Applications
- [4] Nuclear Applications
- [4] Human Resources Applications
- [4] Information Management Applications
- [4] Geospatial Applications (1, 0, 1)
- [4] Office Automation Applications (4, 0, 4)
- [5] Analytics Application
- [5] Presentation Application
- [5] Spreadsheet Application
- [5] Customer Relationship Management Application
- [5] Database Application
- [5] Word Processing Application
- [5] Report Generation Application
- [5] Workflow Application
- [5] Calendaring and Scheduling Application
- [5] Project Portfolio Management Application
- [5] Project Management Application
- [5] Enterprise Search Application
- [5] Browser Application (0, 0, 1)
- [5] Multimedia Application
- [5] Vocabulary and Translation Application
- [5] Mind Mapping Application
- [5] Remote Desktop Application
- [4] Communication and Collaboration Applications
- [5] Telephony Application
- [5] Fax Application
- [5] Email Application
- [5] Military Messaging Application
- [5] Instant Messaging Application
- [5] Conferencing Application
- [5] Social Networking Application
- [5] Collaborative Workspace Application
- [5] Wiki Application
- [5] Blog Application
- [5] Unified Communication Application
- [4] CIS Security Applications
- [3] User Equipment (1, 0, 1)
- [4] Desktop Equipment
- [4] Portable Equipment
- [5] Handheld Equipment
- [6] Tactical Personal Radio
- [6] Mobile Phone
- [7] Smart Phone
- [6] Digital Camera
- [5] Manpack Equipment
- [5] Wearable Equipment
- [5] Laptop Computer
- [5] Tablet Computer
- [5] Handheld Equipment
- [4] Vehicle Mounted Equipment
- [4] User Identification Equipment
- [5] Identity Card
- [5] Hardware Security Token
- [3] User Applications
- [2] Back-End Capabilities (0, 141, 0)
- [3] Technical Services (0, 141, 0)
- [4] Community Of Interest (COI) Services (1, 10, 1)
- [5] COI-Specific Services
- [6] Joint Domain Services
- [6] Air Domain Services (7, 0, 1)
- [7] Recognized Air Picture Services (4, 0, 3)
- [7] Aeronautical Information Services
- [7] ACO Services
- [7] Air Asset List Services
- [7] ATO Services
- [7] Airspace Management Services
- [7] Airspace Structure Management Services
- [7] Airlift Services
- [7] Air Threat Analysis Services
- [7] Air Weapon Matching Services
- [7] Air Mobility Analysis Services
- [6] Maritime Domain Services
- [6] Land Domain Services
- [6] Cyberspace Domain Services
- [6] Intelligence and ISR Functional Services
- [6] Electronic Warfare Functional Services
- [7] Recognized Electromagnetic Picture Services
- [7] Electromagnetic Operations Planning Services
- [7] Emitter TECHINT Services
- [7] Emitter Analysis Services
- [7] Restricted Frequency List Services
- [7] Electronic Surveillance Services
- [7] EW Intelligence Preparation Services
- [7] Electronic Attack Services
- [7] Electronic Defence Services
- [7] Emitter Services
- [7] Electronic Order of Battle Services
- [6] Environmental Functional Services
- [7] Recognized Environmental Picture Services
- [7] Geography Services
- [7] Meteorology Services (38, 0, 1)
- [7] Oceanography Services
- [7] Hydrography Services
- [7] Space Weather Services
- [6] Logistics Functional Services
- [6] Medical Functional Services
- [6] CIMIC Functional Services
- [6] ETEE Functional Services
- [6] CIS Functional Services
- [5] COI-Enabling Services (6, 10, 1)
- [6] Situational Awareness Services (5, 3, 5)
- [7] Recognized Picture Services
- [7] Symbology Services (4, 3, 3)
- [7] Overlay Services
- [6] Operations Planning Services
- [6] Tasking and Order Services (1, 0, 1)
- [6] Operations Information Services (0, 5, 0)
- [7] Battlespace Event Services (0, 0, 2)
- [7] Battlespace Object Services (0, 0, 3)
- [7] Track Management Services (9, 5, 8)
- [7] Track Distribution Services (0, 0, 4)
- [7] Data Exchange Monitoring Services
- [6] Modeling and Simulation Services (7, 2, 1)
- [6] Situational Awareness Services (5, 3, 5)
- [5] COI-Specific Services
- [4] Core Services (5, 78, 1)
- [5] Business Support Services (0, 16, 0)
- [6] Business Support CIS Security Services (6, 2, 1)
- [7] Business Support Guard Services (1, 0, 1)
- [6] Business Support SMC Services
- [6] Communication and Collaboration Services (9, 2, 1)
- [7] Informal Messaging Services (3, 0, 18)
- [7] Fax Services (2, 1, 1)
- [7] Calendaring and Scheduling Services (0, 0, 2)
- [7] Video-based Communication Services (2, 0, 13)
- [7] Audio-based Communication Services (4, 0, 21)
- [7] Text-based Communication Services (0, 0, 17)
- [7] Whiteboarding Services
- [7] Presence Services (0, 0, 3)
- [7] Application Sharing Services (1, 0, 1)
- [6] ERP Services
- [6] Geospatial Services (13, 4, 3)
- [7] Geospatial Catalog Services
- [7] Geospatial Web Map Services (0, 0, 3)
- [7] Geospatial Web Feature Services (0, 0, 2)
- [7] Geospatial Web Coverage Services (1, 1, 1)
- [7] Geospatial Web Map Tile Services (0, 0, 3)
- [7] Geospatial Network Analysis Services
- [7] Geospatial Coordinate Services (0, 1, 1)
- [7] Geospatial Terrain Analysis Services
- [6] Information Management Services (0, 8, 1)
- [7] Content Management Services (0, 0, 13)
- [7] Formal Messaging Services (8, 7, 1)
- [7] Workflow Services
- [7] Unit Conversion Services
- [7] Search Services (2, 0, 1)
- [7] Language Support Services
- [7] Archiving Services (0, 0, 11)
- [6] Data Science Services (3, 0, 1)
- [6] Business Support CIS Security Services (6, 2, 1)
- [5] Platform Services (7, 45, 2)
- [6] Platform CIS Security Services (2, 10, 1)
- [7] Platform Guard Services (2, 0, 1)
- [7] Security Token Services (6, 2, 1)
- [7] Policy Enforcement Point Services
- [7] Policy Decision Point Services (1, 8, 1)
- [7] Information Labeling Services (0, 0, 11)
- [7] Policy Administration Point Services
- [6] Platform SMC Services (10, 12, 3)
- [7] SMC Policy Enforcement Services
- [7] Service Discovery Services (5, 5, 1)
- [7] Platform Logging Services
- [7] Platform Monitoring Services
- [7] Platform Metering Services
- [6] Message-Oriented Middleware Services (2, 1, 2)
- [7] Direct Messaging Services (0, 0, 1)
- [7] Message Brokering Services
- [7] Message Routing Services
- [7] Message Proxying Services
- [7] Message Queueing Services
- [7] Message Caching Services
- [6] Web Platform Services (14, 4, 2)
- [7] Web Hosting Services (3, 0, 24)
- [7] Web Presentation Services (1, 1, 1)
- [6] Information Platform Services (0, 5, 0)
- [7] Information Discovery Services (0, 1, 1)
- [7] Information Access Services (3, 3, 3)
- [7] Information Aggregation Services
- [7] Metadata Repository Services (1, 1, 1)
- [7] Information Annotation Services (0, 0, 11)
- [7] Business Rules Services
- [6] Database Services (0, 1, 0)
- [7] Directory Services (1, 1, 5)
- [7] Non-relational Database Services
- [7] Relational Database Services (2, 0, 1)
- [6] Composition Services (0, 1, 0)
- [7] Orchestration Services
- [7] Choreography Services (0, 1, 1)
- [7] Transaction Services
- [6] Mediation Services (1, 2, 1)
- [7] Protocol Transformation Services
- [7] Data Format Transformation Services (0, 1, 2)
- [6] Platform CIS Security Services (2, 10, 1)
- [5] Infrastructure Services (23, 17, 1)
- [6] Infrastructure CIS Security Services (0, 0, 2)
- [7] Digital Identity Services
- [7] Credentialing Services
- [7] Authentication Services (0, 0, 2)
- [7] Privilege Management Services
- [7] Authorization and Access Services
- [7] Digital Certificate Services (0, 0, 5)
- [7] Intrusion Detection Services
- [7] Malware Detection Services
- [7] Infrastructure Guard Services
- [7] Infrastructure Cryptography Services (0, 0, 2)
- [6] Infrastructure SMC Services
- [6] Infrastructure Processing Services (2, 0, 1)
- [7] Operating System Services
- [7] Virtualized Processing Services (1, 0, 2)
- [7] Distributed Processing Services
- [6] Infrastructure Storage Services
- [7] Block-Level Storage Services
- [7] Virtualized Storage Services (1, 0, 1)
- [7] File System Storage Services (1, 0, 1)
- [7] Blob Storage Services
- [6] Infrastructure Networking Services (0, 13, 1)
- [7] Caching Services
- [7] Proxying Services
- [7] Scanning Services
- [7] Printing Services
- [7] Virtualized Networking Services
- [7] Host Configuration Services (0, 2, 1)
- [7] Network Load Balancing Services
- [7] Data Transfer Services (0, 1, 1)
- [7] Domain Name Services (0, 4, 4)
- [7] Location Awareness Services
- [7] Distributed Time Services (2, 1, 3)
- [7] Remote Access Services
- [6] Infrastructure CIS Security Services (0, 0, 2)
- [5] Business Support Services (0, 16, 0)
- [4] Communications Services (23, 53, 3)
- [5] Communications Access Services (11, 16, 1)
- [6] Communications Access CIS Security Services
- [7] Communications Security Services
- [7] Network Access Control Services (0, 0, 2)
- [7] Network Firewall Services
- [6] Communications Access SMC Services
- [6] Analogue Access Services
- [6] Digital Access Services
- [6] Message-based Access Services (0, 9, 0)
- [7] Tactical Messaging Access Services (23, 9, 1)
- [7] Short Messaging Access Services
- [6] Packet-based Access Services (4, 2, 1)
- [7] IPv4 Routed Access Services (0, 1, 8)
- [7] IPv6 Routed Access Services (0, 1, 1)
- [7] VPN Access Services
- [6] Frame-based Access Services
- [6] Circuit-based Access Services
- [7] Native Circuit-based Access Services (1, 0, 1)
- [7] Emulated Circuit-based Access Services
- [6] Multimedia Access Services
- [7] Voice Access Services (1, 0, 1)
- [7] Video Access Services
- [7] VTC Access Services
- [6] Communications Access CIS Security Services
- [5] Transport Services (29, 19, 1)
- [6] Transport CIS Security Services (0, 0, 4)
- [6] Transport SMC Services
- [6] Edge Services (0, 2, 0)
- [7] Packet-based Transport Services (5, 2, 10)
- [7] Frame-based Transport Services
- [7] Circuit-based Transport Services (1, 0, 1)
- [7] Link Emulation Transport Services
- [6] Transit Services (0, 2, 0)
- [7] Packet Routing Services (1, 2, 5)
- [7] Frame Switching Services
- [7] Link Switching Services
- [6] Aggregation Services (0, 1, 0)
- [6] Broadcast Services (0, 1, 0)
- [7] Packet-based Broadcast Services (0, 1, 1)
- [7] Frame-based Broadcast Services
- [7] Link-based Broadcast Services
- [5] Transmission Services (3, 3, 1)
- [6] Transmission CIS Security Services
- [6] Transmission SMC Services
- [6] Wired Transmission Services (1, 0, 1)
- [7] Wired Local Area Transmission Services (1, 0, 1)
- [7] Wired Metropolitan Area Transmission Services (1, 0, 1)
- [7] Wired Wide Area Transmission Services (1, 0, 1)
- [6] Wireless LOS Static Transmission Services
- [6] Wireless LOS Mobile Transmission Services (1, 3, 1)
- [7] Wireless LOS Mobile Narrowband Transmission Services (4, 1, 1)
- [7] Wireless LOS Mobile Wideband Transmission Services (1, 1, 1)
- [6] Wireless BLOS Static Transmission Services
- [6] Wireless BLOS Mobile Transmission Services (4, 0, 1)
- [5] Communications Access Services (11, 16, 1)
- [4] Community Of Interest (COI) Services (1, 10, 1)
- [3] Information Systems Equipment (1, 0, 1)
- [4] Server
- [4] Rack
- [4] Media Access Device
- [5] Disk Drive
- [5] Optical Disk Drive
- [5] Tape Device
- [4] Security Equipment
- [5] Access Control Equipment
- [6] Identity Card Reader
- [6] Identity Card Printer
- [6] Biometrics Readers
- [7] Fingerprint Reader
- [7] Iris Reader
- [7] Hand Geometry Reader
- [6] Digital Signature Pad
- [5] Surveillance Equipment
- [6] Remote Camera
- [6] Motion Detector
- [5] Hardware Security Module
- [5] Trusted Platform Module
- [5] Access Control Equipment
- [4] Crypto Equipment
- [3] Communications Equipment
- [4] Transponder
- [4] Antenna
- [4] Telecommunications Cable
- [4] Navigational Equipment (2, 0, 1)
- [4] Router
- [4] Network Switch
- [4] Network Emulator
- [3] Technical Services (0, 141, 0)
- [2] User-Facing Capabilities
- [1] Operational Context