Cybersecurity Domains Map Rev3.1

Fuente: The Map of Cybersecurity Domains Henry Jiang | March 2021 | REV 3.1


Application Security

  • SSDLC
  • Shift Left
    • CI/CD
  • Security UX
  • Security QA
  • API Security
  • Data-Flow Diagram
  • Source Code Scan
  • SAST
  • Open Source Scan

Risk Assessment

  • Vulnerability scan
  • Assets Inventory
  • 3rd Party Risk
  • 4th Party Risk
  • Penetration test
  • Infrastructure (Network and Systems)
  • Social Engineering
  • DAST
  • Application Pen Tests
  • Risk Monitoring Services (Risk score)

Enterprise Risk Management

  • Risk Treatment Actions
  • Risk Acceptance Statement
  • Cyber Insurance
  • Lines of Defense
  • 1.Process Owners
  • 2.Risk Mgmt Group
  • 3.Audit
    • SOC1/SOC2
  • Risk Register
  • Risk Appetite
  • Crisis Management
  • BCP/DR

Governance

  • Laws and Regulations
  • Industry Specific
    • PCI
    • HIPAA
  • Central Government
    • GDPR
    • GLBA
  • Regional
    • CCPA
    • NYS-DFS 23 NYCRR 500
  • Executive Management Involvement
  • Risk Informed
  • Reports and Scorecards
    • KPIs/KRIs
  • Company's Written Policies
  • Policy
  • Procedure
  • Standard
  • Compliance & Enforcement
  • Guideline

Threat Intelligence

  • External
  • Contextual
  • Internal
  • IOCs
  • Intel. Sharing

User Education

  • Training (new skills)
  • Awareness (reinforcement)
  • Cyber security table-top exercise

Security Operation

  • Vulnerability Management
  • Threat Hunting
  • SIEM
  • SOAR
  • Active Defense
  • Security Operation Centers
  • Incident Response
  • Breach Notification
  • Containment
  • Eradication
  • Blue Team
  • Red Team
  • Investigation
    • Forensics
  • Detection

3## Physical Security

  • IoT Security

Carrer Deployment

  • Certifications
  • Training
  • Coaches and Role Models
  • Peer Groups
  • Self Study
  • Conferences

Security Architecture

  • Network Design
  • DDoS Prevention
  • Data Protection
  • Data Leakage Prevention
  • Endpoint Hygiene
  • Container Security
  • Cloud Security
  • Access Control
  • MFA & SSO
  • Identity Management
    • Privileged Access Management
    • Identity & Access Management
  • Security Engineering
  • Cryptography
  • Certificate Management
  • Encryption Standards
  • Key and Secret Management
    • Vaulting
    • HSM
  • Secure System Build
  • Patch Management
  • Baseline Configuration

Frameworks and Standards

  • NIST Cybersecurity Framework
  • CIS Top 20 Controls CIS Benchmarks
  • ISO 27001 27017 27018
  • OWASP Top 10 (WebApp & API)
  • ASVS & MASVS
  • MITRE ATT&CK Framework





rhnux :: | | :: Made with MkDocs + Simple Blog