{"id":7090,"date":"2025-07-31T14:41:43","date_gmt":"2025-07-31T21:41:43","guid":{"rendered":"https:\/\/objectsecurity.com\/?p=7090"},"modified":"2025-10-02T14:41:26","modified_gmt":"2025-10-02T21:41:26","slug":"dodi_5200-52","status":"publish","type":"post","link":"https:\/\/objectsecurity.com\/dodi_5200-52\/","title":{"rendered":"DoDI 5200.50: What Program Offices and Prime Contractors Must Know"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1872px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p><strong>The Department of Defense\u2019s new DoDI 5200.50 (effective June 27, 2025) mandates that all microelectronics used in defense systems be trusted, risk\u2011assessed, and evidence\u2011backed throughout their lifecycle &#8211; a direct response to the security challenges of today\u2019s globalized supply chains. For DoD program offices and prime contractors, this shifts microelectronics procurement toward risk\u2011based, evidence\u2011driven decision\u2011making, with RFPs and program reviews demanding documented proof of compliance. ObjectSecurity\u2019s SCRAMS (Supply Chain Risk Analysis &amp; Management Solution) automates this process, turning bulk procurement data into actionable intelligence and audit\u2011ready evidence at scale.<\/strong><\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\"><h3><strong>What the New Instruction Mandates<\/strong><\/h3>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-3\"><p data-start=\"361\" data-end=\"785\">The Department of Defense\u2019s new DoDI 5200.50, which took effect on June 27, 2025, marks a significant shift in how the Pentagon approaches assured access to trusted microelectronics. For program offices and prime contractors, this is more than a policy update &#8211; it signals the start of an era in which every microelectronics sourcing decision must be backed by risk\u2011based reasoning and defensible evidence.<\/p>\n<p data-start=\"787\" data-end=\"1488\">Under 5200.50, the Department is making it clear that microelectronics procurement must follow a structured, risk\u2011driven process. Whenever possible, acquisition teams are expected to use DMEA\u2011accredited trusted suppliers to ensure the integrity of critical components. When that isn\u2019t feasible, the policy calls for evidence\u2011based assurance or an approved risk\u2011based method to justify sourcing decisions. This means program managers and their industry partners will need to demonstrate that they have actively considered threats such as counterfeit components, supply chain vulnerabilities, and obsolescence risks &#8211; known in the acquisition world as DMSMS &#8211; throughout the system life cycle.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-flex-start\" style=\"--awb-bg-color:rgba(37,150,190,0.16);--awb-bg-color-hover:rgba(37,150,190,0.16);--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-4 fusion-text-no-margin\" style=\"--awb-margin-top:20px;--awb-margin-right:10px;--awb-margin-bottom:10px;--awb-margin-left:10px;\"><p style=\"text-align: left;\"><strong>DoDI 5200.50 requirements include:<\/strong><\/p>\n<ul>\n<li><strong>Employ risk\u2011based assessments<\/strong> to inform all microelectronics decisions.<\/li>\n<li><strong>Use DMEA\u2011accredited trusted suppliers<\/strong> whenever possible; otherwise, apply <strong>evidence\u2011based assurance<\/strong> or <strong>approved risk\u2011based methods<\/strong>.<\/li>\n<li><strong>Safeguard sensitive information<\/strong>, including <strong>CUI<\/strong> and <strong>classified material<\/strong>, throughout the ME life cycle.<\/li>\n<li><strong>Actively manage DMSMS<\/strong> risks and obsolescence, supporting sustainment and technology refresh planning.<\/li>\n<li><strong>Maintain records<\/strong> supporting your risk assessments, sourcing decisions, and evidence files per DoDI 5015.02.<\/li>\n<li><strong>Incorporate verification measures<\/strong>, such as testing, validation, counterfeit prevention, and supplier status checks, into program documentation.<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-5\"><p>The instruction also reinforces the need to safeguard sensitive information, including controlled unclassified and classified data, and to retain clear records that document how every microelectronics decision was reached. In practical terms, this translates to an increasing expectation that primes and subcontractors will be ready to produce auditable, well\u2011organized evidence packages during program reviews, milestone decisions, and in response to RFP requirements.<\/p>\n<p>In practical terms, this means program managers and primes must provide <strong>auditable justification<\/strong> for every microelectronics sourcing decision, showing that risks have been considered and mitigated.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><h3><strong>The Challenge<\/strong><\/h3>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-7\"><p>Yet meeting these requirements can be daunting. Complying with 5200.50 at scale is data\u2011intensive. A single defense program might involve tens of thousands of parts sourced from multiple suppliers, with procurement data scattered across ERP systems, spreadsheets, and subcontractor reports. Manually reviewing this volume of information and producing the documentation needed for 5200.50 compliance is time\u2011consuming and error\u2011prone.<\/p>\n<p>Program teams and capture managers need a way to scale the evidence\u2011generation process without spending months buried in spreadsheets.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-flex-start\" style=\"--awb-bg-color:rgba(37,150,190,0.16);--awb-bg-color-hover:rgba(37,150,190,0.16);--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-8 fusion-text-no-margin\" style=\"--awb-margin-top:10px;--awb-margin-right:10px;--awb-margin-bottom:10px;--awb-margin-left:10px;\"><p><strong>DoDI 5200.50 Challenges Include:<\/strong><\/p>\n<ul>\n<li><strong>Thousands of parts, vendors, and shipments<\/strong> across multiple programs.<\/li>\n<li><strong>Bulk procurement records<\/strong> spread across ERP systems, spreadsheets, and subcontractor reports.<\/li>\n<li><strong>Evidence requirements<\/strong> for program milestone reviews and audits.<\/li>\n<li>Manually tracking, analyzing, and packaging this data for evidence\u2011based assurance is time\u2011consuming and prone to gaps.<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-9\"><h3><strong>How SCRAMS Supports 5200.50 Compliance<\/strong><\/h3>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-10\"><p data-start=\"2508\" data-end=\"3258\">This is where <a href=\"https:\/\/objectsecurity.com\/scrams\"><strong data-start=\"2522\" data-end=\"2583\">SCRAMS (Supply Chain Risk Analysis &amp; Management Solution)<\/strong><\/a> offers a practical advantage. Rather than promising perfect, end\u2011to\u2011end traceability across every sub\u2011tier of the supply chain, SCRAMS focuses on speed, simplicity, and evidence packaging. It ingests bulk procurement data &#8211; everything from ERP exports to board\u2011level BOMs &#8211; and quickly surfaces risk indicators such as pricing anomalies, suspicious vendor activity, CAGE code irregularities, geographic exposures, and even potential counterfeit flags. Teams can then drill down into the data to focus on the highest\u2011risk parts and suppliers, while also generating exportable reports that align directly with 5200.50\u2019s evidence\u2011based assurance expectations.<\/p>\n<p data-start=\"3260\" data-end=\"3820\">By approaching microelectronics assurance in this way, SCRAMS turns a compliance burden into a manageable workflow. It allows primes and program offices to demonstrate that they have performed risk\u2011based assessments across their supply chain, that trusted suppliers were used whenever possible, and that all evidence is audit\u2011ready and properly retained.<\/p>\n<p data-start=\"3260\" data-end=\"3820\">The result is a defensible story for contracting officers and program managers &#8211; one that satisfies the Department\u2019s new policy without requiring teams to reinvent their entire procurement process.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_2 1_2 fusion-flex-column fusion-flex-align-self-flex-start\" style=\"--awb-bg-color:rgba(37,150,190,0.16);--awb-bg-color-hover:rgba(37,150,190,0.16);--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-11 fusion-text-no-margin\" style=\"--awb-margin-top:10px;--awb-margin-right:10px;--awb-margin-bottom:10px;--awb-margin-left:10px;\"><p><strong>Key SCRAMS capabilities for contractors and PMs:<\/strong><\/p>\n<ul>\n<li><strong>Practical, scalable approach<\/strong> to meet the instruction\u2019s expectations without over\u2011promising unrealistic sub\u2011tier omniscience.<\/li>\n<li><strong>Bulk procurement data ingestion:<\/strong> Upload ERP exports, spreadsheets, and BOMs in one step.<\/li>\n<li><strong>Automated risk indicators:<\/strong> Quickly identify pricing anomalies, vendor\/CAGE issues, geo\u2011event exposures, and counterfeit flags.<\/li>\n<li><strong>Drill\u2011down and filtering:<\/strong> Focus on high\u2011risk parts and suppliers, saving analyst time for critical checks\/<\/li>\n<li><strong>Evidence packaging:<\/strong> Export reports aligned with <strong>evidence\u2011based assur<\/strong>ance expectations &#8211; ready for program reviews, RFP responses, and audits.<\/li>\n<li><strong>Microelectronics support:<\/strong> Identify component\u2011level anomalies in board\/BOM data to inform testing and sourcing decisions.<\/li>\n<li><strong>Doesn\u2019t promise perfect sub\u2011tier visibility<\/strong>. Instead, it gives you rapid, actionable insight from your real procurement data, enriched with open\u2011source and commercial risk signals-producing defensible, audit\u2011ready evidence.<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-12\"><p>In short, DoDI 5200.50 makes evidence the currency of microelectronics assurance. With SCRAMS, that evidence can be generated <strong data-start=\"3952\" data-end=\"3991\">quickly, consistently, and at scale<\/strong>, giving program teams a clear path to compliance and freeing analysts to focus on the highest\u2011value assurance activities. For organizations facing upcoming RFPs or program reviews, running a pilot with SCRAMS can turn weeks of manual effort into a ready\u2011to\u2011deliver evidence package in just days.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:right;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:50px;\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/objectsecurity.com\/scrams\" target=\"_self\" aria-label=\"scrams2\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"1220\" height=\"404\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams2.png?resize=1220%2C404&#038;ssl=1\" alt class=\"img-responsive wp-image-5199\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams2.png?resize=200%2C66&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams2.png?resize=300%2C99&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams2.png?resize=400%2C132&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams2.png?resize=500%2C166&amp;ssl=1 500w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams2.png?resize=600%2C199&amp;ssl=1 600w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams2.png?resize=700%2C232&amp;ssl=1 700w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams2.png?resize=768%2C254&amp;ssl=1 768w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams2.png?resize=800%2C265&amp;ssl=1 800w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams2.png?resize=1024%2C339&amp;ssl=1 1024w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams2.png?resize=1200%2C397&amp;ssl=1 1200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams2.png?fit=1220%2C404&amp;ssl=1 1220w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 1200px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-13 fusion_builder_column_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"text-align:left;--awb-margin-right:20px;--awb-margin-left:50px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:20px;\"><a class=\"fusion-no-lightbox\" href=\"https:\/\/objectsecurity.com\/scrams\" target=\"_self\" aria-label=\"scrams-visual\"><img data-recalc-dims=\"1\" decoding=\"async\" width=\"825\" height=\"303\" src=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams-visual.png?resize=825%2C303&#038;ssl=1\" alt class=\"img-responsive wp-image-5216\" srcset=\"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams-visual.png?resize=200%2C73&amp;ssl=1 200w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams-visual.png?resize=300%2C110&amp;ssl=1 300w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams-visual.png?resize=400%2C147&amp;ssl=1 400w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams-visual.png?resize=500%2C184&amp;ssl=1 500w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams-visual.png?resize=600%2C220&amp;ssl=1 600w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams-visual.png?resize=700%2C257&amp;ssl=1 700w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams-visual.png?resize=768%2C282&amp;ssl=1 768w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams-visual.png?resize=800%2C294&amp;ssl=1 800w, https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2024\/05\/scrams-visual.png?fit=825%2C303&amp;ssl=1 825w\" sizes=\"(max-width: 1075px) 100vw, (max-width: 640px) 100vw, 825px\" \/><\/a><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-14 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-13\"><h3><strong>The Payoff for Primes and PMs<\/strong><\/h3>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-15 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-14\"><p>DoDI\u00a05200.50 turns microelectronics assurance into an <strong>evidence exercise<\/strong>. SCRAMS lets you <strong>scale that evidence generation &#8211; <\/strong>without months of manual spreadsheet work.<\/p>\n<p>By integrating SCRAMS into your supply chain risk workflow, you can:<\/p>\n<ul>\n<li>Document a <strong>risk\u2011based assessment<\/strong> across your entire procurement population.<\/li>\n<li>Show <strong>clear justification<\/strong> for trusted supplier usage or risk\u2011based assurance.<\/li>\n<li>Generate <strong>audit\u2011ready evidence artifacts<\/strong> that meet DoDI 5200.50 retention and compliance expectations.<\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-16 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-15\"><h3><strong>Call to Action<\/strong><\/h3>\n<p>If you\u2019re preparing for an <strong>RFP<\/strong> or <strong>program review<\/strong> under 5200.50, ObjectSecurity SCRAMS can <strong>ingest a sample of your procurement data<\/strong> and generate a <strong>pilot evidence package<\/strong> in days, helping you stay ahead of new compliance requirements.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-17 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-1 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/contact-us\/\"><span class=\"fusion-button-text\">Contact Us<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-18 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-2 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/objectsecurity.com\/scrams\/\"><span class=\"fusion-button-text\">SCRAMS<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-19 fusion_builder_column_1_3 1_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat button-xlarge button-default fusion-button-default button-3 fusion-button-span-yes fusion-button-default-type\" target=\"_self\" href=\"https:\/\/www.dau.edu\/sites\/default\/files\/webform\/documents\/30811\/DoDI%205200.50%20Assured%20Access%20to%20Trusted%20Microelectronics.pdf\"><span class=\"fusion-button-text\">DoDI 5200.52<\/span><\/a><\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":7091,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[93,90,70,39],"tags":[],"class_list":["post-7090","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dod-gov","category-education","category-general","category-ot-ics-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DoDI 5200.50: What Program Offices and Prime Contractors Must Know - ObjectSecurity<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/objectsecurity.com\/dodi_5200-52\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/dodi_5200-52\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/dodi_5200-52\\\/\"},\"author\":{\"name\":\"Dan Mathews\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"headline\":\"DoDI 5200.50: What Program Offices and Prime Contractors Must Know\",\"datePublished\":\"2025-07-31T21:41:43+00:00\",\"dateModified\":\"2025-10-02T21:41:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/dodi_5200-52\\\/\"},\"wordCount\":13324,\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/dodi_5200-52\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/SCRAMS-Post.png?fit=600%2C337&ssl=1\",\"articleSection\":[\"DoD\\\/gov\",\"Education\",\"General\",\"OT\\\/ICS Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/dodi_5200-52\\\/\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/dodi_5200-52\\\/\",\"name\":\"DoDI 5200.50: What Program Offices and Prime Contractors Must Know - ObjectSecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/dodi_5200-52\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/dodi_5200-52\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/SCRAMS-Post.png?fit=600%2C337&ssl=1\",\"datePublished\":\"2025-07-31T21:41:43+00:00\",\"dateModified\":\"2025-10-02T21:41:26+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/dodi_5200-52\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/objectsecurity.com\\\/dodi_5200-52\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/dodi_5200-52\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/SCRAMS-Post.png?fit=600%2C337&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/objectsecurity.com\\\/wp-content\\\/uploads\\\/2025\\\/07\\\/SCRAMS-Post.png?fit=600%2C337&ssl=1\",\"width\":600,\"height\":337},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/dodi_5200-52\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/objectsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DoDI 5200.50: What Program Offices and Prime Contractors Must Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/objectsecurity.com\\\/\",\"name\":\"ObjectSecurity\",\"description\":\"OT\\\/ICS Asset Binary Vulnerability Analysis and Reporting\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/objectsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/objectsecurity.com\\\/#\\\/schema\\\/person\\\/14b868388b1a079ff39642a078cea62d\",\"name\":\"Dan Mathews\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g\",\"caption\":\"Dan Mathews\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DoDI 5200.50: What Program Offices and Prime Contractors Must Know - ObjectSecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/objectsecurity.com\/dodi_5200-52\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/objectsecurity.com\/dodi_5200-52\/#article","isPartOf":{"@id":"https:\/\/objectsecurity.com\/dodi_5200-52\/"},"author":{"name":"Dan Mathews","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"headline":"DoDI 5200.50: What Program Offices and Prime Contractors Must Know","datePublished":"2025-07-31T21:41:43+00:00","dateModified":"2025-10-02T21:41:26+00:00","mainEntityOfPage":{"@id":"https:\/\/objectsecurity.com\/dodi_5200-52\/"},"wordCount":13324,"image":{"@id":"https:\/\/objectsecurity.com\/dodi_5200-52\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/07\/SCRAMS-Post.png?fit=600%2C337&ssl=1","articleSection":["DoD\/gov","Education","General","OT\/ICS Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/objectsecurity.com\/dodi_5200-52\/","url":"https:\/\/objectsecurity.com\/dodi_5200-52\/","name":"DoDI 5200.50: What Program Offices and Prime Contractors Must Know - ObjectSecurity","isPartOf":{"@id":"https:\/\/objectsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/objectsecurity.com\/dodi_5200-52\/#primaryimage"},"image":{"@id":"https:\/\/objectsecurity.com\/dodi_5200-52\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/07\/SCRAMS-Post.png?fit=600%2C337&ssl=1","datePublished":"2025-07-31T21:41:43+00:00","dateModified":"2025-10-02T21:41:26+00:00","author":{"@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d"},"breadcrumb":{"@id":"https:\/\/objectsecurity.com\/dodi_5200-52\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/objectsecurity.com\/dodi_5200-52\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/objectsecurity.com\/dodi_5200-52\/#primaryimage","url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/07\/SCRAMS-Post.png?fit=600%2C337&ssl=1","contentUrl":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/07\/SCRAMS-Post.png?fit=600%2C337&ssl=1","width":600,"height":337},{"@type":"BreadcrumbList","@id":"https:\/\/objectsecurity.com\/dodi_5200-52\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/objectsecurity.com\/"},{"@type":"ListItem","position":2,"name":"DoDI 5200.50: What Program Offices and Prime Contractors Must Know"}]},{"@type":"WebSite","@id":"https:\/\/objectsecurity.com\/#website","url":"https:\/\/objectsecurity.com\/","name":"ObjectSecurity","description":"OT\/ICS Asset Binary Vulnerability Analysis and Reporting","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/objectsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/objectsecurity.com\/#\/schema\/person\/14b868388b1a079ff39642a078cea62d","name":"Dan Mathews","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b06577e2636149f9ca4ada40c7d935744591ec4ec49be5865e3f0180e5d38b15?s=96&d=mm&r=g","caption":"Dan Mathews"}}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/objectsecurity.com\/wp-content\/uploads\/2025\/07\/SCRAMS-Post.png?fit=600%2C337&ssl=1","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/7090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/comments?post=7090"}],"version-history":[{"count":15,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/7090\/revisions"}],"predecessor-version":[{"id":7107,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/posts\/7090\/revisions\/7107"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media\/7091"}],"wp:attachment":[{"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/media?parent=7090"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/categories?post=7090"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/objectsecurity.com\/wp-json\/wp\/v2\/tags?post=7090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}