Legal requirements to AD piloting and cyber security analysis

Summary
Legal constraints and requirements described here.