Other commenters suggested that FHWA involve overall performance benchmarks mandating minimal requirements for cybersecurity instead that choosing any particular protocols or solutions. Proposed effectiveness criteria included ways to assure functioning system software is authenticated during the First phase of turning on or else shut down, guarant