{"id":73741,"date":"2023-12-28T22:35:35","date_gmt":"2023-12-29T06:35:35","guid":{"rendered":"https:\/\/www.jamasoftware.com\/?post_type=resource-page&#038;p=73741"},"modified":"2023-12-28T22:35:35","modified_gmt":"2023-12-29T06:35:35","slug":"cybersecurity-in-the-air-addressing-modern-threats-with-do-326a","status":"publish","type":"resource-page","link":"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/","title":{"rendered":"Cybersecurity in the Air: Addressing Modern Threats with DO-326A"},"content":{"rendered":"<div id='av_section_1'  class='avia-section av-1xk07xh-bbbec7a78c99a3bc73edbd2023502169 main_color avia-section-default avia-no-border-styling  avia-builder-el-0  avia-builder-el-no-sibling  avia-bg-style-scroll container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><main  class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-73741'><div class='entry-content-wrapper clearfix'>\n<div class='flex_column_table av-1izwc3p-0dd97e9e1f6b6e68ec68b331b5ba7c20 sc-av_two_fifth av-equal-height-column-flextable'><div  class='flex_column av-1izwc3p-0dd97e9e1f6b6e68ec68b331b5ba7c20 av_two_fifth  avia-builder-el-1  el_before_av_three_fifth  avia-builder-el-first  first flex_column_table_cell av-equal-height-column av-align-middle  '     ><\/div><div class='av-flex-placeholder'><\/div><div  class='flex_column av-1dfyz5x-54808b3f45749ff6a22951230de9ef19 av_three_fifth  avia-builder-el-3  el_after_av_two_fifth  el_before_av_hr  flex_column_table_cell av-equal-height-column av-align-middle  '     ><p><br \/>\n<\/p><\/div><\/div><!--close column table wrapper. Autoclose: 1 -->\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-ljz2oc54-f4c32aef36da49fd259c264837168768\">\n#top .hr.hr-invisible.av-ljz2oc54-f4c32aef36da49fd259c264837168768{\nheight:30px;\n}\n<\/style>\n<div  class='hr av-ljz2oc54-f4c32aef36da49fd259c264837168768 hr-invisible  avia-builder-el-6  el_after_av_three_fifth  el_before_av_one_full '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<div  class='flex_column av-wga891-b5f28f812c6cab24bcc18bf3ef4b1f27 av_one_full  avia-builder-el-7  el_after_av_hr  avia-builder-el-last  first flex_column_div  '     ><section  class='av_textblock_section av-ljz0yqe6-e711d71884095728b0d3f8bbd256b9f5 '  ><div class='avia_textblock' ><p>Aviation cybersecurity has become a critical issue across the globe. Not only do millions of passengers depend on airlines to get them safely from point A to point B every day, but manufacturers, shipping services, and militaries rely on aircraft systems to support supply chains and execute missions.<\/p>\n<p>Known as the \u201cAirworthiness Security Process Specification,\u201d DO-326A (and its European counterpart, ED-202) is the aviation cybersecurity standard developed jointly by the Radio Technical Commission for Aeronautics (RTCA) and the European Organisation for Civil Aviation Equipment. The original edition, DO-326, was issued in 2010; its revised version, DO-326A, was issued in 2014.<\/p>\n<p><strong>In this whitepaper, we cover the seven steps of DO-326A compliance, and: <\/strong><\/p>\n<ul>\n<li><strong>How it differs from DO-178, ARP4754, and DO-254 <\/strong><\/li>\n<li><strong>Who and what DO-326A applies to <\/strong><\/li>\n<li><strong>How Jama Software can help teams meet compliance standards <\/strong><\/li>\n<\/ul>\n<\/div><\/section><\/div><\/div><\/div><\/main><!-- close content main element --><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap sidebar_right'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-small alpha units'><div class='post-entry post-entry-type-page post-entry-73741'><div class='entry-content-wrapper clearfix'>\n<input class=\"fooboxshare_post_id\" type=\"hidden\" value=\"73741\"\/>","protected":false},"excerpt":{"rendered":"","protected":false},"author":171,"featured_media":73744,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"resource_type":[887],"resource_industry":[898],"primary_topic":[913,925,920],"primary_challenge":[945,932],"competitors":[],"partners":[],"secondary_topic":[],"secondary_challenge":[],"class_list":["post-73741","resource-page","type-resource-page","status-publish","has-post-thumbnail","hentry","resource_type-whitepaper","resource_industry-aerospace-defense","primary_topic-compliance-regulation","primary_topic-cybersecurity","primary_topic-traceability","primary_challenge-mitigating-risk","primary_challenge-regulatory-compliance","sticky"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.0 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity in the Air: Addressing Modern Threats with DO-326A - Jama Software<\/title>\n<meta name=\"description\" content=\"In this eBook, we look at the importance of avionics cybersecurity and demonstrate how DO-326A provides compliance guidelines to address the vulnerabilities of avionics systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity in the Air: Addressing Modern Threats with DO-326A\" \/>\n<meta property=\"og:description\" content=\"In this eBook, we look at the importance of avionics cybersecurity and demonstrate how DO-326A provides compliance guidelines to address the vulnerabilities of avionics systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/\" \/>\n<meta property=\"og:site_name\" content=\"Jama Software\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.jamasoftware.com\/media\/2023\/12\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"272\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/\",\"url\":\"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/\",\"name\":\"Cybersecurity in the Air: Addressing Modern Threats with DO-326A - Jama Software\",\"isPartOf\":{\"@id\":\"https:\/\/www.jamasoftware.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.jamasoftware.com\/media\/2023\/12\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a-thumb.jpg\",\"datePublished\":\"2023-12-29T06:35:35+00:00\",\"description\":\"In this eBook, we look at the importance of avionics cybersecurity and demonstrate how DO-326A provides compliance guidelines to address the vulnerabilities of avionics systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/#primaryimage\",\"url\":\"https:\/\/www.jamasoftware.com\/media\/2023\/12\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a-thumb.jpg\",\"contentUrl\":\"https:\/\/www.jamasoftware.com\/media\/2023\/12\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a-thumb.jpg\",\"width\":500,\"height\":272},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.jamasoftware.com\/solutions\/home\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity in the Air: Addressing Modern Threats with DO-326A\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.jamasoftware.com\/#website\",\"url\":\"https:\/\/www.jamasoftware.com\/\",\"name\":\"Jama Software\",\"description\":\"Jama Connect\u00ae #1 in Requirements Management\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.jamasoftware.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity in the Air: Addressing Modern Threats with DO-326A - Jama Software","description":"In this eBook, we look at the importance of avionics cybersecurity and demonstrate how DO-326A provides compliance guidelines to address the vulnerabilities of avionics systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity in the Air: Addressing Modern Threats with DO-326A","og_description":"In this eBook, we look at the importance of avionics cybersecurity and demonstrate how DO-326A provides compliance guidelines to address the vulnerabilities of avionics systems.","og_url":"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/","og_site_name":"Jama Software","og_image":[{"width":500,"height":272,"url":"https:\/\/www.jamasoftware.com\/media\/2023\/12\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/","url":"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/","name":"Cybersecurity in the Air: Addressing Modern Threats with DO-326A - Jama Software","isPartOf":{"@id":"https:\/\/www.jamasoftware.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/#primaryimage"},"image":{"@id":"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/#primaryimage"},"thumbnailUrl":"https:\/\/www.jamasoftware.com\/media\/2023\/12\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a-thumb.jpg","datePublished":"2023-12-29T06:35:35+00:00","description":"In this eBook, we look at the importance of avionics cybersecurity and demonstrate how DO-326A provides compliance guidelines to address the vulnerabilities of avionics systems.","breadcrumb":{"@id":"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/#primaryimage","url":"https:\/\/www.jamasoftware.com\/media\/2023\/12\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a-thumb.jpg","contentUrl":"https:\/\/www.jamasoftware.com\/media\/2023\/12\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a-thumb.jpg","width":500,"height":272},{"@type":"BreadcrumbList","@id":"https:\/\/www.jamasoftware.com\/whitepaper\/cybersecurity-in-the-air-addressing-modern-threats-with-do-326a\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.jamasoftware.com\/solutions\/home\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity in the Air: Addressing Modern Threats with DO-326A"}]},{"@type":"WebSite","@id":"https:\/\/www.jamasoftware.com\/#website","url":"https:\/\/www.jamasoftware.com\/","name":"Jama Software","description":"Jama Connect\u00ae #1 in Requirements Management","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.jamasoftware.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/resource-page\/73741","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/resource-page"}],"about":[{"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/types\/resource-page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/users\/171"}],"version-history":[{"count":0,"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/resource-page\/73741\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/media\/73744"}],"wp:attachment":[{"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/media?parent=73741"}],"wp:term":[{"taxonomy":"resource_type","embeddable":true,"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/resource_type?post=73741"},{"taxonomy":"resource_industry","embeddable":true,"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/resource_industry?post=73741"},{"taxonomy":"primary_topic","embeddable":true,"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/primary_topic?post=73741"},{"taxonomy":"primary_challenge","embeddable":true,"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/primary_challenge?post=73741"},{"taxonomy":"competitors","embeddable":true,"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/competitors?post=73741"},{"taxonomy":"partners","embeddable":true,"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/partners?post=73741"},{"taxonomy":"secondary_topic","embeddable":true,"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/secondary_topic?post=73741"},{"taxonomy":"secondary_challenge","embeddable":true,"href":"https:\/\/www.jamasoftware.com\/wp-json\/wp\/v2\/secondary_challenge?post=73741"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}