Security Capabilities And Gaps – Current Overview - Group
Go Back
Control not effective/ No Control Control Partially Effective Control Is Effective
Protect & Prevent
Data Protection
Data Loss Prevention Data Security Governance
Endpoint Device Encryption Database Encryption
Secure File Transfer Database Monitoring
Data Classification Data Masking
Cloud Security
Cloud Security & Compliance
IOT Security
Device Control Device Identity
Device Access Secure Communication
Trust Center
Key Management Certificate Management
PKI Secure Cryptographic Devices
Physical Security Integration
Physical and Logical Access Integration Physical Security controls Data Centre Security
Identity & Access Management
IAM Framework RBAC & SOO
3rd Party Access Access Governance
Authentication PAM
Monitor & Detect
Security Monitoring & Data Reciliency
Threat Modelling SIEM UEBA
SOAR Pen Test Threat Intelligence
Data Classification
Host and Endpoint Protection
EDR, Advanced Anti-malware MDM & MAM
Vulnerability Management BYOD control
Patch Management File Integrity Monitoring
Email Security Host and Endpoint Hardening
Network Security
Perimeter IPS Network Access Control Third Party Connectivity Firewall Rules Management
Anti-DDOS Threat Detection/ behaviour analytics Network Inventory management IP Address Management
Datacentre & Cloud workload protection Perimeter Hardening Network IPS Secure network communications
Respond & Recover
Incident Management
Red/Blue/Purple Tests
Security Incident Response Process
Service Continuity
Security aspects of BCM
Cyber Liability Insurance
Backup Assurance
Plan, Govern, Comply, Educate
Infosec Management
InfoSec Strategy InfoSec Management System – P1 InfoSec Governance framework
Security Awareness Security/ Architecture Policies, Standards Processes
Risk Management Infosec Compliance