SFIA View: Cybersecurity resilience
Cybersecurity resilience
Security operations SCAD
Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and operational integrity.
Identity and access management IAMT
Manages identity verification and access permissions within organisational systems and environments.
Continuity management COPL
Developing, implementing and testing a business continuity framework.
Incident management USUP
Coordinating responses to a diverse range of incidents to minimise negative impacts and quickly restore services.
Problem management PBMG
Managing the lifecycle of all problems that have occurred or could occur in delivering a service.
Change control CHMG
Assessing risks associated with proposed changes and ensuring changes to products, services or systems are controlled and coordinated.
Asset management ASMG
Managing the full lifecycle of assets from acquisition, operation, maintenance to disposal.
Vulnerability assessment VUAS
Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact.
Digital forensics DGFS
Recovering and investigating material found in digital devices.
Cybercrime investigation CRIM
Investigates cybercrimes, collects evidence, determines incident impacts and collaborates with legal teams to protect digital assets.
Offensive cyber operations OCOP
Plans, executes and manages offensive cybersecurity operations, including target selection, electronic target folders and post-operation analysis.