SFIA View: Security services
Security services
Identity and access management IAMT
Manages identity verification and access permissions within organisational systems and environments.
Security operations SCAD
Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and operational integrity.
Vulnerability assessment VUAS
Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact.
Digital forensics DGFS
Recovering and investigating material found in digital devices.
Cybercrime investigation CRIM
Investigates cybercrimes, collects evidence, determines incident impacts and collaborates with legal teams to protect digital assets.
Offensive cyber operations OCOP
Plans, executes and manages offensive cybersecurity operations, including target selection, electronic target folders and post-operation analysis.
Penetration testing PENT
Testing the effectiveness of security controls by emulating the tools and techniques of likely attackers.