This process allows planners to prioritize critical assets, create a Critical Asset List, determine which assets should be defended, develop a Defended Asset List, and then identify key terrain in relation to these assets and mission objectives.
Defended Asset List: A listing of those assets from the critical asset list prioritized by the joint force commander to be defended with the resources available.
Reverse breach planning, defensive planning, defended asset list
planning, engagements, route reconnaissance, and area security must be addressed.
We focus on identifying and defending those interfaces that are essential to mission success--Gen Keith Alexander, commander of US Cyber Command, would call this capability "recon/counter-recon." A key facet of this defensive effort is identifying and focusing on a commander's prioritized "defended asset list," those critical areas that must be able to operate through a contested environment or attack.
Vautrinot: It's what I referred to as the defended asset list but at a discrete level instead of an enterprise level.
There is a great deal of attention being focused on the development of two lists for the integration of protection--the critical asset list and the defended asset list
. With limited protection assets, these lists can help commanders focus and prioritize protection assets.
The successful allocation of resources to support BCT survivability efforts depends on the agreed-upon defended asset list
. This list is a compilation of the survivability needs that BCT leaders decided to act upon, based on the limited number of blade assets and time available.