Network Capabilities And Gaps – Current Overview - Group
Go Back
Control not effective/
No Control
Control Partially
Effective
Control Is
Effective
Network Infrastructure
Network Framework 1
Data Loss
Prevention
Data Security
Governance
Endpoint Device
Encryption
Database
Encryption
Secure File
Transfer
Database
Monitoring
Data
Classification
Data Masking
Network Framework 2
Cloud Security & Compliance
Network Framework 3
Device Control
Device Identity
Device Access
Secure
Communication
Systems Security
Network Framework 4
Physical and Logical
Access Integration
Data Centre
Security
Physical and Logical
Access Integration
Data Centre
Security
Physical and Logical
Access Integration
Physical Security
controls
Network Framework 5
IAM Framework
RBAC & SOO
3rd Party Access
Access
Governance
Authentication
PAM
Data Centre
Security Monitoring & Data Reciliency
Threat
Modelling
SIEM
UEBA
SOAR
Pen Test
Threat
Intelligence
Data Classification
Host and Endpoint Protection
EDR, Advanced
Anti-malware
MDM & MAM
Vulnerability
Management
BYOD control
Patch
Management
File Integrity
Monitoring
Email Security
Host and Endpoint
Hardening
Systems Security
Network Security
Perimeter IPS
Network Access
Control
Third Party
Connectivity
Firewall Rules
Management
Anti-DDOS
Threat Detection/
behaviour analytics
Network Inventory
management
IP Address
Management
Datacentre & Cloud
workload protection
Perimeter
Hardening
Network IPS
Secure network
communications
Systems Administrations
Incident Management
Red/Blue/Purple
Tests
Security Incident Response Process
Service Continuity
Security aspects of BCM
Cyber Liability Insurance
Backup Assurance
Systems Security
Infosec Management
InfoSec Strategy
InfoSec Management
System – P1
InfoSec Governance
framework
Security
Awareness
Security/
Architecture
Policies, Standards
Processes
Risk Management
Infosec Compliance