SFIA View: Cybersecurity
Cybersecurity
Information security SCTY
Defining and operating a framework of security controls and security management strategies.
Security operations SCAD
Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and operational integrity.
Incident management USUP
Coordinating responses to a diverse range of incidents to minimise negative impacts and quickly restore services.
Identity and access management IAMT
Manages identity verification and access permissions within organisational systems and environments.
Vulnerability assessment VUAS
Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact.
Penetration testing PENT
Testing the effectiveness of security controls by emulating the tools and techniques of likely attackers.
Threat intelligence THIN
Developing and sharing actionable insights on current and potential security threats to the success or integrity of an organisation.