Vehicle and transportation systems provide a challenging use case for security, where physical and virtual access is virtually unlimited, and its relatively easy to procure replacement parts, components, and even whole vehicles to continue attacking a system. Given these challenges in the vehicle deployment model, the goal shifts from denying an attacker access, to limiting the damage an attacker can do once access is achieved. Specifically, the integrity and availability of the system (vehicle) must be maintained even after a successful compromise. Historically embedded devices, and platforms such as ground vehicles, have functioned in isolation, deployed to environments minimally connected to the outside world. However, with the emergence of ubiquitous connectivity paradigms like the Global Information Grid (GIG), and multiple battlefield communications, networks and radio systems, today’s cyber threat landscape is rapidly evolving.