-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathcybersecurity-domains-extended.json
152 lines (152 loc) · 6.48 KB
/
cybersecurity-domains-extended.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
{
"Cybersecurity Domains": {
"Security Architecture": {
"Network Design": ["DDoS Prevention", "Segmentation", "ZTNA Architecture"],
"Security Engineering": ["Secure Systems Integration", "Infrastructure Hardening"],
"Data Protection": ["Data Loss Prevention", "Data Masking", "Backup and Recovery"],
"Access Control": {
"Identity Management": [
"Privileged Access Management",
"Identity and Access Management",
"Biometric Authentication"
],
"Federated Identity": ["OAuth", "OpenID Connect", "SAML"],
"MFA and SSO": ["Adaptive Authentication"]
},
"Cloud Security": [
"Cloud Workload Protection",
"CASB",
"Cloud IAM",
"Cloud Compliance"
],
"Secure System Build": [
"Baseline Configuration",
"Patch Management",
"Configuration Drift Detection"
],
"Cryptography": {
"Key and Secret Management": ["Vaulting", "HSM", "Cloud KMS"],
"Encryption Standards": ["AES", "RSA", "Post-Quantum Cryptography"],
"Certificate Management": ["PKI", "Certificate Automation"]
},
"Endpoint Hygiene": [
"Antivirus/EDR",
"Device Control",
"BYOD Security"
],
"Container Security": ["Kubernetes Security", "Image Scanning", "Runtime Protection"]
},
"Security Operations": {
"Security Operations Centers (SOC)": ["SOC 1, 2, 3", "24/7 Monitoring"],
"Incident Response": {
"Breach Notification": ["Legal Obligations", "Stakeholder Communication"],
"Containment": ["Network Isolation", "Incident Playbooks"],
"Eradication": ["Malware Removal", "Remediation"],
"Investigation": ["Forensics", "Root Cause Analysis"]
},
"Blue Team": ["Defensive Testing", "Log Analysis"],
"Red Team": ["Adversary Simulation", "Penetration Testing"],
"Detection": ["Behavioral Analysis", "Anomaly Detection"],
"SIEM": ["SOAR", "Log Management"],
"Vulnerability Management": ["Patch Management", "Remediation Prioritization"],
"Active Defense": ["Deception Technology", "Honeypots"],
"Threat Hunting": ["Proactive Threat Identification", "Hypothesis-Based Detection"]
},
"Governance": {
"Laws and Regulations": {
"Regional": ["CCPA", "NYS-DFS 23 NYCRR 500"],
"Central Government": ["GDPR", "GLBA", "CLOUD Act"],
"Industry Specific": ["PCI", "HIPAA", "FISMA"]
},
"Corporate Written Policies": [
"Policy",
"Procedure",
"Standard",
"Guideline",
"Compliance and Enforcement"
],
"Management Involvement": {
"Reporting and Dashboards": ["KPIs/KRIs", "Compliance Metrics"],
"Risk-Based": ["Board-Level Briefings"]
}
},
"Risk Assessment": {
"Third-Party Risk": ["Fourth-Party Risk", "Supply Chain Risk"],
"Penetration Testing": [
"Infrastructure (Network and Systems)",
"Application Testing",
"Social Engineering",
"DAST",
"Red Team"
],
"Vulnerability Analysis": ["Dynamic Analysis", "External/Internal"],
"Asset Inventory": ["Critical Asset Mapping"],
"Risk Monitoring Services": ["Risk Score", "Threat Feeds"]
},
"User Education": [
"Training (new skills)",
"Awareness (reinforcement)",
"Cybersecurity Tabletop Exercises",
"Phishing Simulations",
"Gamified Training"
],
"Threat Intelligence": {
"Internal": ["Insider Threat Detection"],
"IOC": ["TTPs", "Indicators of Attack"],
"Information Sharing": {
"External": ["ISACs", "Information Sharing Agreements"],
"Contextual": ["Enhanced Intelligence"]
}
},
"Career Development": [
"Training",
"Certifications",
"Conferences",
"Peer Groups",
"Self-Learning",
"Coaching and Mentorship"
],
"Frameworks and Standards": [
"NIST Cybersecurity Framework",
"ISO 27001 27017 27018",
"OWASP Top 10 (WebApp & API)",
"CIS Top 20 Controls",
"CIS Benchmarks",
"MITRE ATT&CK Framework",
"MITRE D3FEND",
"NIST 800 Series"
],
"Physical Security": [
"IoT Security",
"Access Control Systems",
"Video Surveillance",
"Environmental Controls"
],
"Enterprise Risk Management": {
"Lines of Defense": ["Process Owners", "Risk Management Group", "Audit"],
"Risk Treatment Actions": ["Mitigation", "Transfer", "Avoidance"],
"Risk Appetite": ["Risk Thresholds"],
"Cyber Insurance": ["Claims Management"],
"BCP/DR": ["Disaster Recovery Testing", "Crisis Simulations"],
"Crisis Management": ["Emergency Response Plans"],
"Risk Acceptance Declaration": ["Management Approvals"],
"Risk Register": ["Ongoing Risk Reviews"]
},
"Application Security": {
"S-SDLC": {
"\"Shift Left\"": ["CI/CD Integration", "Static Analysis in the Pipeline"]
},
"Source Code Analysis": ["Open Source Analysis", "SAST", "Dependency Analysis"],
"Data Flow Diagramming": ["Threat Modeling"],
"API Security": ["OAuth Security", "API Gateway Configurations"],
"Security UX": ["Secure Design Principles"],
"Security QA": ["Automated Security Testing"]
},
"Emerging Techs": {
"AI Security": ["AI Threat Detection", "Adversarial AI"],
"Quantum Computing Risks": ["Post-Quantum Cryptography"],
"Blockchain Security": ["Smart Contract Audits", "Consensus Algorithm Attacks"],
"5G Security": ["Network Slice Security", "IoT Integration"]
}
}
}