pilot-001-security-in-depth-shared-infrastructure
Security in depth and shared infrastructure
Sources: ics-705-01.r0013, ic-tech-spec-v151.r0039, ic-tech-spec-v151.r0085
Rows published in v0.1 — the requirements walked deeply enough through expert review and the literature pass to record individual verdicts. Each row is a single source requirement judged against weight theft, secret theft, and sabotage. Expand a row to see per-category rationales, falsifiers, source excerpts, the multi-judge panel verdict, and the LLM-found literature for that requirement.
Showing rows 1–5 of 11
pilot-001-security-in-depth-shared-infrastructure
Sources: ics-705-01.r0013, ic-tech-spec-v151.r0039, ic-tech-spec-v151.r0085
pilot-002-construction-security-plan
Sources: ics-705-01.r0018, ic-tech-spec-v151.r0100, ic-tech-spec-v151.r0101
pilot-003-tempest-rf-shielding
Sources: ics-705-01.r0029, ics-705-01.r0075, ic-tech-spec-v151.r0144
pilot-004-perimeter-penetrations
Sources: ic-tech-spec-v151.r0211, ic-tech-spec-v151.r0212, ic-tech-spec-v151.r0218
pilot-005-intrusion-detection-and-continuity
Sources: ics-705-01.r0036, ic-tech-spec-v151.r0799, ic-tech-spec-v151.r0800, ic-tech-spec-v151.r0842, ic-tech-spec-v151.r0875