Partner with leaders in technology protection

Learn more about our services

The Issue

More and more, contract language requires the contractor to conduct a Criticality Analysis (CA) or Critical Functions Analysis (CFA).  Determining the mission, Mission Critical Functions (MCF), Critical Components (CC), and mapping the CC suppliers. It often requires forming working groups and digging deep into the subject matter. These requirements are difficult to understand for those unaccustomed. 

The Solution

Thrive Analysis Group specializes in meeting and exceeding these requirements. We know what is expected, because it’s our niche; what we do. You could say that we “thrive” doing what we do best.

Let us help you.

 

Don’t Settle For Less

Partner with us for Criticality Analysis (CA) needs

More and more contractors are required to conduct Criticality Analysis (CA). We use a detailed process grounded in DoD and Army requirements to accomplish and document the following:

  • Define system mission
  • Determine System Mission Critical Functions (MCF)
  • Determine Critical Components (CC)
  • Assign Criticality Levels to each CC
  • Map the CC supply Chain

Charge Forward

Tailored efforts for CA requirements

The CA is the solution that meets DoD and Army guidance to assess risk from the supply chain that acquired it.

Our process aligns your organization to better meet Milestone and test requirements as found in:

  • Program Protection Planning Outline and Guidance
  • DoDI 5000.02 – Operation of the Defense Acquisition System
  • DoDI 5000.83 – Technology and Program Protection to Maintain Technological Advantage
  • DoDI 5200.39 – CPI Identification and Protection Within RDT&E
  • DAG Chapter 9
  • DoDI 5200.44 – Protection of Mission Critical Functions to Achieve Trusted Systems and Networks (TSN)
  • AR 70-77- Research, Development, and Acquisition Program Protection
  • DoD Report to Congress – Framework to Enhance Cybersecurity of the United States Defense Industrial Base Office of the Under Secretary of Defense for Acquisition & Sustainment

Services

What We Can Do For You

Our specialty is our capability to interpret requirements and how they should be implemented for your unique situation. We apply program protection, write and tailor processes, procedures and policies so that they will fit within the constraints of your enterprise.

Your enterprise is made up of many moving parts and business units, but none should stand alone. We believe each requirement should be part of the corporate body and not a stove piped solution. We conduct analyses for entity wide application so that burden and opportunities are shared:

  • Corporate Policy
  • Program Protection Planning
  • Supply Chain Risk Management
  • Criticality Analysis
  • OPSEC Analysis
  • Security Classification Guidance
  • NISPOM Compliance

Program Protection Planning

Supply Chain Risk Management (SCRM)

Criticality Analyses

NISPOM Compliance

Processes and Procedures

Cyber-SCRM