Memorize Flashcards
DSM (regarding data)
Data Services Management
SOAR
Security Orchestration, Automation, Response
SIEM
Security Information and Event Management
FPE (data protection)
Format Preserving Encryption
VRF (networking)
Virtual Routing and Forwarding
FTD
Firepower Threat Defense
ISE
Identity Services Engine
AIA
Authority Information Access
DRS (re: data)
Designated Record Set
ISL
Integration Services Library
CRI-O
an implementation of the Kubernetes CRI (Container Runtime Interface) to enable using OCI (Open Container Initiative compatible runtimes).
FISMA
Federal Information Security Modernization Act
Enacted in 2002 - mandates a process to security posture of federal government.
Name change from management to modernization in 2014.
Codifies DHS authority to develop and oversee implementation of binding operational directives
CISA
Cybersecurity & Infrastructure Security Agency
Federal agency
NIST SP 800-190
Application Container Security Guide
FISMA compliance most often refers to?
meeting controls identified in SP 800-53
NIST SP 800-37
describes Risk Management Framework
SMART Goals
Specific Measurable Attainable Relevant Time-bound
5 functions in CSF
Identify
Protect
Detect
Respond
Recover
Layers of CSF (levels of hierarchy)
Function (5)
Category (23)
Subcategory (108)
ID.AM-1
Physical devices and systems within the organization are inventoried
ID.AM-2
Software platforms and applications within the organization are inventoried
ID.AM-3
Organizational communication and data flows are mapped
ID.AM-4
External information systems are catalogued
ID.AM-5
Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their classification, criticality, and business value
ID.AM-6
Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established
CSF: Categories of Identify
Asset Managment
Business Environment
Governance
Risk Assessment
Risk Management Strategy
Supply Chain Risk Management
HIPAA
Health Insurance Portability and Accountability Act
VPC
Virtual Private Cloud
ARN
Amazon Resource Name
ECS
Elastic Container Service
ELB
Elastic Load Balancer
CORS
Cross-Origin Resource Sharing
SGT
Security Group Tag
ADM (re: architecture framework)
Architecture Development Method
The core of TOGAF
Proven way of developing an architecture
Iterative
ACF (RE: architecture frameworks)
Architecture Content Framework
Deliverables, artifacts, building blocks
The Enterprise Continuum
The Architecture Repository