-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathindex.html
47 lines (43 loc) · 11.6 KB
/
index.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
<!DOCTYPE html>
<html>
<head>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<meta http-equiv="X-UA-Compatible" content="ie=edge">
<meta name="x-clb" content="cedric LB">
<title>Cyber Security Domains</title>
<style>
* {
margin: 0;
padding: 0;
}
#mindmap {
display: block;
width: 100vw;
height: 100vh;
}
</style>
<link rel="stylesheet" href="style.css">
<script defer data-domain="securitydomains.cloud" src="https://plausible.io/js/script.js"></script>
</head>
<body>
<svg id="mindmap"></svg>
<script src="d3.min.js"></script><script src="index.js"></script><script src="index2.js"></script><script>(()=>{setTimeout(()=>{const{markmap:x,mm:K}=window,P=new x.Toolbar;P.attach(K);const F=P.render();F.setAttribute("style","position:absolute;bottom:20px;right:20px"),document.body.append(F)})})()</script><script>((b,L,T,D)=>{const H=b();window.mm=H.Markmap.create("svg#mindmap",(L||H.deriveOptions)(D),T)})(()=>window.markmap,null,{"content":"Cyber Security Domains","children":[{"content":"Security Architecture","children":[{"content":"Network Design","children":[{"content":"DDoS Prevention","children":[],"payload":{"tag":"li","lines":"11,12"}}],"payload":{"tag":"h3","lines":"10,11"}},{"content":"Security Engineering","children":[],"payload":{"tag":"h3","lines":"12,13"}},{"content":"Data Protection","children":[{"content":"Data Leakage Prevention","children":[],"payload":{"tag":"li","lines":"14,15"}}],"payload":{"tag":"h3","lines":"13,14"}},{"content":"Access Control","children":[{"content":"Identity Management","children":[{"content":"Privileged Access Management","children":[],"payload":{"tag":"li","lines":"17,18"}},{"content":"Identity & Access Management","children":[],"payload":{"tag":"li","lines":"18,19"}}],"payload":{"tag":"h4","lines":"16,17"}},{"content":"Federated Identity","children":[],"payload":{"tag":"h4","lines":"19,20"}},{"content":"MFA & SSO","children":[],"payload":{"tag":"h4","lines":"20,21"}}],"payload":{"tag":"h3","lines":"15,16"}},{"content":"Cloud Security","children":[],"payload":{"tag":"h3","lines":"21,22"}},{"content":"Secure System Build","children":[{"content":"Baseline Configuration","children":[],"payload":{"tag":"li","lines":"23,24"}},{"content":"Patch Management","children":[],"payload":{"tag":"li","lines":"24,25"}}],"payload":{"tag":"h3","lines":"22,23"}},{"content":"Cryptography","children":[{"content":"Key and Secret Management","children":[{"content":"Vaulting","children":[],"payload":{"tag":"li","lines":"27,28"}},{"content":"HSM","children":[],"payload":{"tag":"li","lines":"28,29"}}],"payload":{"tag":"h4","lines":"26,27"}},{"content":"Encryption Standards","children":[],"payload":{"tag":"h4","lines":"29,30"}},{"content":"Certificate Management","children":[],"payload":{"tag":"h4","lines":"30,31"}}],"payload":{"tag":"h3","lines":"25,26"}},{"content":"Endpoint Hygiene","children":[],"payload":{"tag":"h3","lines":"31,32"}},{"content":"Container Security","children":[],"payload":{"tag":"h3","lines":"32,33"}}],"payload":{"tag":"h2","lines":"9,10"}},{"content":"Security Operations","children":[{"content":"Security Operation Centers","children":[],"payload":{"tag":"h3","lines":"35,36"}},{"content":"Incident Response","children":[{"content":"Breach Notification","children":[],"payload":{"tag":"li","lines":"37,38"}},{"content":"Containment","children":[],"payload":{"tag":"li","lines":"38,39"}},{"content":"Eradication","children":[],"payload":{"tag":"li","lines":"39,40"}},{"content":"Investigation","children":[{"content":"Forensics","children":[],"payload":{"tag":"li","lines":"41,42"}}],"payload":{"tag":"li","lines":"40,42"}}],"payload":{"tag":"h3","lines":"36,37"}},{"content":"Blue Team","children":[],"payload":{"tag":"h3","lines":"42,43"}},{"content":"Red Team","children":[],"payload":{"tag":"h3","lines":"43,44"}},{"content":"Detection","children":[],"payload":{"tag":"h3","lines":"44,45"}},{"content":"SIEM","children":[{"content":"SOAR","children":[],"payload":{"tag":"li","lines":"46,47"}}],"payload":{"tag":"h3","lines":"45,46"}},{"content":"Vulnerability Management","children":[],"payload":{"tag":"h3","lines":"47,48"}},{"content":"Active Defense","children":[],"payload":{"tag":"h3","lines":"48,49"}},{"content":"Threat Hunting","children":[],"payload":{"tag":"h3","lines":"49,50"}}],"payload":{"tag":"h2","lines":"34,35"}},{"content":"Governance","children":[{"content":"Laws and Regulations","children":[{"content":"Regional","children":[{"content":"CCPA","children":[],"payload":{"tag":"li","lines":"54,55"}},{"content":"NYS-DFS 23 NYCRR 500","children":[],"payload":{"tag":"li","lines":"55,56"}}],"payload":{"tag":"h4","lines":"53,54"}},{"content":"Central Government","children":[{"content":"GDPR","children":[],"payload":{"tag":"li","lines":"57,58"}},{"content":"GLBA","children":[],"payload":{"tag":"li","lines":"58,59"}}],"payload":{"tag":"h4","lines":"56,57"}},{"content":"Industry Specific","children":[{"content":"PCI","children":[],"payload":{"tag":"li","lines":"60,61"}},{"content":"HIPAA","children":[],"payload":{"tag":"li","lines":"61,62"}}],"payload":{"tag":"h4","lines":"59,60"}}],"payload":{"tag":"h3","lines":"52,53"}},{"content":"Company's Written Policies","children":[{"content":"Policy","children":[],"payload":{"tag":"li","lines":"63,64"}},{"content":"Procedure","children":[],"payload":{"tag":"li","lines":"64,65"}},{"content":"Standard","children":[],"payload":{"tag":"li","lines":"65,66"}},{"content":"Guideline","children":[],"payload":{"tag":"li","lines":"66,67"}},{"content":"Compliance & Enforcement","children":[],"payload":{"tag":"li","lines":"67,68"}}],"payload":{"tag":"h3","lines":"62,63"}},{"content":"Executive Management Involvement","children":[{"content":"Reports and Scorecards","children":[{"content":"KPIs/KRIs","children":[],"payload":{"tag":"li","lines":"70,71"}}],"payload":{"tag":"h4","lines":"69,70"}},{"content":"Risk Informed","children":[],"payload":{"tag":"h4","lines":"71,72"}}],"payload":{"tag":"h3","lines":"68,69"}}],"payload":{"tag":"h2","lines":"51,52"}},{"content":"Risk Assessment","children":[{"content":"3rd Party Risk","children":[{"content":"4th Party Risk","children":[],"payload":{"tag":"li","lines":"75,76"}}],"payload":{"tag":"h3","lines":"74,75"}},{"content":"Penetration Test","children":[{"content":"Infrastructure (Network and Systems)","children":[],"payload":{"tag":"li","lines":"77,78"}},{"content":"Application Pen Tests","children":[],"payload":{"tag":"li","lines":"78,79"}},{"content":"Social Engineering","children":[],"payload":{"tag":"li","lines":"79,80"}},{"content":"DAST","children":[],"payload":{"tag":"li","lines":"80,81"}}],"payload":{"tag":"h3","lines":"76,77"}},{"content":"Vulnerability Scan","children":[],"payload":{"tag":"h3","lines":"81,82"}},{"content":"Assets Inventory","children":[],"payload":{"tag":"h3","lines":"82,83"}},{"content":"Risk Monitoring Services","children":[{"content":"Risk Score","children":[],"payload":{"tag":"li","lines":"84,86"}}],"payload":{"tag":"h3","lines":"83,84"}}],"payload":{"tag":"h2","lines":"73,74"}},{"content":"User Education","children":[{"content":"Training (new skills)","children":[],"payload":{"tag":"li","lines":"87,88"}},{"content":"Awareness (reinforcement)","children":[],"payload":{"tag":"li","lines":"88,89"}},{"content":"Cybersecurity table-top exercise","children":[],"payload":{"tag":"li","lines":"89,91"}}],"payload":{"tag":"h2","lines":"86,87"}},{"content":"Threat Intelligence","children":[{"content":"Internal","children":[],"payload":{"tag":"h3","lines":"92,93"}},{"content":"IOCs","children":[],"payload":{"tag":"h3","lines":"93,94"}},{"content":"Intel Sharing","children":[{"content":"External","children":[],"payload":{"tag":"h4","lines":"95,96"}},{"content":"Contextual","children":[],"payload":{"tag":"h4","lines":"96,97"}}],"payload":{"tag":"h3","lines":"94,95"}}],"payload":{"tag":"h2","lines":"91,92"}},{"content":"Career Development","children":[{"content":"Training","children":[],"payload":{"tag":"li","lines":"99,100"}},{"content":"Certifications","children":[],"payload":{"tag":"li","lines":"100,101"}},{"content":"Conferences","children":[],"payload":{"tag":"li","lines":"101,102"}},{"content":"Peer Groups","children":[],"payload":{"tag":"li","lines":"102,103"}},{"content":"Self Study","children":[],"payload":{"tag":"li","lines":"103,104"}},{"content":"Coaches and Role Models","children":[],"payload":{"tag":"li","lines":"104,106"}}],"payload":{"tag":"h2","lines":"98,99"}},{"content":"Frameworks and Standards","children":[{"content":"NIST Cybersecurity Framework","children":[],"payload":{"tag":"li","lines":"107,108"}},{"content":"ISO 27001 27017 27018","children":[],"payload":{"tag":"li","lines":"108,109"}},{"content":"OWASP Top 10 (WebApp & API)","children":[],"payload":{"tag":"li","lines":"109,110"}},{"content":"CIS Top 20 Controls","children":[],"payload":{"tag":"li","lines":"110,111"}},{"content":"CIS Benchmarks","children":[],"payload":{"tag":"li","lines":"111,112"}},{"content":"MITRE ATT&CK Framework","children":[],"payload":{"tag":"li","lines":"112,114"}}],"payload":{"tag":"h2","lines":"106,107"}},{"content":"Physical Security","children":[{"content":"IoT Security","children":[],"payload":{"tag":"li","lines":"115,117"}}],"payload":{"tag":"h2","lines":"114,115"}},{"content":"Enterprise Risk Management","children":[{"content":"Lines of Defense","children":[{"content":"Process Owners","children":[],"payload":{"tag":"li","lines":"119,120"}},{"content":"Risk Mgmt Group","children":[],"payload":{"tag":"li","lines":"120,121"}},{"content":"Audit","children":[],"payload":{"tag":"li","lines":"121,122"}}],"payload":{"tag":"h3","lines":"118,119"}},{"content":"Risk Treatment Actions","children":[],"payload":{"tag":"h3","lines":"122,123"}},{"content":"Risk Appetite","children":[],"payload":{"tag":"h3","lines":"123,124"}},{"content":"Cyber Insurance","children":[],"payload":{"tag":"h3","lines":"124,125"}},{"content":"BCP/DR","children":[],"payload":{"tag":"h3","lines":"125,126"}},{"content":"Crisis Management","children":[],"payload":{"tag":"h3","lines":"126,127"}},{"content":"Risk Acceptance Statement","children":[],"payload":{"tag":"h3","lines":"127,128"}},{"content":"Risk Register","children":[],"payload":{"tag":"h3","lines":"128,129"}}],"payload":{"tag":"h2","lines":"117,118"}},{"content":"Application Security","children":[{"content":"S-SDLC","children":[{"content":"\"Shift Left\"","children":[{"content":"CI/CD Integration","children":[],"payload":{"tag":"li","lines":"133,134"}}],"payload":{"tag":"h4","lines":"132,133"}}],"payload":{"tag":"h3","lines":"131,132"}},{"content":"Source Code Scan","children":[{"content":"Open Source Scan","children":[],"payload":{"tag":"li","lines":"135,136"}},{"content":"SAST","children":[],"payload":{"tag":"li","lines":"136,137"}}],"payload":{"tag":"h3","lines":"134,135"}},{"content":"Data-Flow Diagram","children":[],"payload":{"tag":"h3","lines":"137,138"}},{"content":"API Security","children":[],"payload":{"tag":"h3","lines":"138,139"}},{"content":"Security UX","children":[],"payload":{"tag":"h3","lines":"139,140"}},{"content":"Security QA","children":[],"payload":{"tag":"h3","lines":"140,141"}}],"payload":{"tag":"h2","lines":"130,131"}}]},{"colorFreezeLevel":2})</script>
<!-- Intégration de Turnstile -->
<div class="cf-turnstile"
data-sitekey="0x4AAAAAAA_h5xxp_zqLFuBU"
data-callback="onTurnstileSuccess"
data-error-callback="onTurnstileError">
</div>
<script src="https://challenges.cloudflare.com/turnstile/v0/api.js" async defer></script>
<script>
function onTurnstileSuccess(token) {
console.log("Utilisateur vérifié avec succès. Token :", token);
// Tu peux envoyer ce token à ton serveur si tu veux valider l'accès
}
function onTurnstileError() {
console.log("Erreur lors de la vérification Turnstile.");
}
</script>
</body>
</html>