The global skills and competency framework for the digital world

CyBOK SFIA mapping

This page maps the Cyber Security Body of Knowledge (CyBOK) knowledge areas to the Skills Framework for the Information Age (SFIA)

References to CyBOK © Crown Copyright, The National Cyber Security Centre 2021, licensed under the Open Government Licence: http://www.nationalarchives.gov.uk/doc/opengovernment-licence/.

The Cyber Security Body Of Knowledge (CyBOK) is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

  • The CyBOK project aims to bring cyber security into line with the more established sciences by distilling knowledge from major internationally-recognised experts to form a Cyber Security Body of Knowledge that will provide much-needed foundations for this emerging topic.

On this page:

  1. Background to the SFIA-CyBOK Mapping
  2. Introduction to SFIA for CyBOK Users
  3. SFIA Levels of Responsibility
  4. Progression in SFIA levels is about responsibility accountability and impact
  5. Knowledge types and SFIA level application
  6. Diagrams and illustrations
  7. Mapping CYBOK and SFIA
  8. The mapping of the 21 CyBOK Knowledge Areas to SFIA skills

Background to the SFIA-CyBOK Mapping

Introduction

This document maps the Cyber Security Body of Knowledge (CyBOK) knowledge areas to the Skills Framework for the Information Age (SFIA) to help both academic and industry audiences connect theoretical/foundational cyber security knowledge with professional competencies in practice.

For industry professionals using SFIA

  • SFIA provides structured professional competencies across seven levels of responsibility, from following procedures to setting enterprise strategy.
  • This mapping shows how the knowledge areas outlined in CyBOK can deepen understanding of why certain practices work, enabling more effective application of SFIA skills, particularly at responsibility levels where judgment and adaptation are crucial.

For academics and educators familiar with CyBOK

  • CyBOK organises cyber security knowledge into structured knowledge areas designed primarily to codify “the foundational knowledge in cyber security for education and professional training”.
  • This mapping demonstrates how that conceptual knowledge supports measurable professional competencies in industry roles, showing the practical application of theoretical concepts across different levels of organisational responsibility.

The integration value

  • Combining CyBOK's theoretical depth with SFIA's structured competency framework helps develop professionals who can both execute effectively and make sound strategic judgments
  • The theoretical understanding enables better adaptation of standard practices and communication of why certain practices are needed

Introduction to SFIA for CyBOK Users

SFIA Foundation and the SFIA community

  • Global adoption – SFIA is used in 200+ countries, with cyber security applications in the UK, US, Canada, Australia, NZ and beyond.
  • Trusted governance – stewarded by the not-for-profit SFIA Foundation, with updates driven by a design authority and international consultation.
  • Diverse contributors – community includes governments, universities, professional bodies, employers, and practitioners.
  • Open and accessible – free for individuals and most employers, with translations into 11 languages and supporting resources.
  • Practical support – guidance notes, example role profiles, mappings to standards and other frameworks

Understanding SFIA Skill Structure

Before examining the mapping, it's important to understand how SFIA skills are defined. Unlike simple skill lists, each SFIA skill provides:

  • Detailed guidance explaining the scope of activities and typical responsibilities
  • Level descriptions showing progression from basic assistance to strategic leadership
  • Collaboration context identifying which other skills typically work together
  • Business integration showing how technical skills connect to organisational outcomes

This structure means SFIA skills describe comprehensive professional competencies that integrate technical knowledge, business understanding, and leadership capabilities.

Structure and content of the SFIA Framework

  • Seven levels of responsibility – a progression from following instructions (Level 1) to setting strategy (Level 7).
  • Over 140 professional skills – covering not only cybersecurity but also business, data, digital, and organisational skills that cyber roles depend on.
  • Includes definitions and of business skills/behavioural factors such as communication, decision-making, collaboration, leadership, problem-solving
  • Task/activity/competency orientation – skills are described as tasks and outcomes at each level, not just as knowledge statements.
  • Reusability across contexts – the same SFIA skill can apply in cyber, software, data, or business settings, making cross-domain mobility clear. This supports secure-by-design responsibilities.
  • Integration with knowledge; CyBOK = knowledge, SFIA = competency; they reinforce each other rather than duplicate. The mapping of SFIA skills and CyBOK knowledge areas to the UK Cyber Security Council’s specialisms provides an illustration of this.

SFIA Levels of responsibility

SFIA provides a structured approach to defining and developing professional skills and competencies. At its core, SFIA uses a seven-level structure to describe both professional skills and generic attributes, creating a consistent framework for assessing and developing capabilities. Full details at How SFIA works - Levels of responsibility and skills.

The seven levels of responsibility range from Level 1 (the lowest) to Level 7 (the highest). Each level represents increasing expertise and responsibility in professional roles.

Each level is carefully defined to be:

  • Progressive (Building on the previous level's requirements),
  • Distinct (Clearly differentiated from adjacent levels), and
  • Consistent (Using uniform criteria across all skills).

The levels are characterised by specific behaviours, values, knowledge and characteristics that indicate an individual's operational capability at that level. The concise essence statements provide a distilled view of the unique characteristics of each level. They help users easily distinguish between levels and understand progression without needing to dive into detailed descriptions.

Generic attributes

SFIA defines how professionals operate at each level through:

  • Autonomy: Level of independence and accountability
  • Influence: Reach and impact of decisions and actions
  • Complexity: Range and intricacy of responsibilities
  • Business Skills: e.g. Communication, planning, problem-solving, collaboration
  • Knowledge: Depth and breadth of understanding required

Progression in SFIA levels is about responsibility accountability and impact

We can illustrate this by looking at one of the SFIA skills@

  • The full skill description is here  Information security (SCTY)
  • The short description of this SFIA skill is "Defining and operating a framework of security controls and security management strategies"
  • The table below summarises the responsibility and impact at each level of the Information security skill - from SFIA level 2 to level 7.
  • Note how the progression moves from implementing existing controls to setting enterprise strategy. A Level 7 professional doesn't necessarily know more technical details about specific security techniques than a Level 4 specialist - they apply broader judgment about organisational risk and strategy.

SFIA level

Focus of responsibility

Typical impact

2 – Assist

Supports the implementation and monitoring of defined security controls under supervision.

Contributes to consistent, reliable execution of established security procedures.

3 – Apply

Applies and maintains specific controls, identifying and escalating security risks when needed.

Maintains safe and effective security operations through competent, independent application of controls.

4 – Enable

Guides others in applying controls and conducts security risk and impact analysis.

Strengthens team performance and assurance through expert advice and proactive risk management.

5 – Ensure, advise

Leads the development and application of security strategies, policies, and architectures to manage identified risks.

Delivers organisation-wide security outcomes by combining strategic guidance with active oversight of complex operations.

6 – Initiate, influence

Shapes corporate security policy and aligns it with business strategy.

Integrates security into strategic planning, driving organisational alignment and capability.

7 – Set strategy, inspire, mobilise

Directs enterprise information security strategy and governance.

Builds organisational resilience through strategic leadership and alignment of security with business vision.

Seven Levels of Responsibility

SFIA levels represent increasing organisational responsibility and strategic impact:

  • Levels 1-3: Follow, Assist, Apply - executing established procedures and practices
  • Levels 4-5: Enable, Ensure and Advise - guiding others and ensuring effectiveness
  • Levels 6-7: Initiate and Influence, Set Strategy - organisational leadership and strategic direction

Critical understanding: Higher SFIA levels are about broader organisational responsibility and impact, not deeper technical expertise. E.g. A Level 7 professional sets enterprise strategy and mobilises resources; they don't need to know more technical details than a Level 4 specialist.


How SFIA levels differ from Bloom’s taxonomy

Although both SFIA and Bloom’s taxonomy describe levels of progression, they serve fundamentally different purposes:

1. Focus and intent

  • Bloom’s taxonomy classifies learning outcomes — it describes how deeply a learner understands or can engage with knowledge (e.g. remembering, understanding, analysing, evaluating, creating).

  • SFIA levels, by contrast, describe responsibility, autonomy, and impact in a professional work context — how individuals apply knowledge and skills to deliver outcomes in real-world work.

2. Basis of progression

  • Bloom’s levels are hierarchical within the cognitive domain of learning — they describe increasing sophistication of thinking.

  • SFIA’s seven levels progress through increasing autonomy, influence, and business impact — from following instructions (Level 1) to setting organisational strategy (Level 7).

3. Application versus acquisition

  • Bloom’s is used to design and assess education and training programmes.

  • SFIA is used to describe and assess professional capability and performance in the workplace.

4. Relationship between the two

They are complementary rather than equivalent: learning (Bloom’s) develops the knowledge and cognitive abilities that enable someone to perform effectively at a given SFIA level — but SFIA expresses how that learning is applied in real-world work.

  • A graduate may demonstrate high levels of cognitive mastery within Bloom’s taxonomy but still be operating at an early SFIA level.
  • This is not a limitation set by the employer but a reflection of the role context — early-career roles are designed with defined oversight while individuals develop professional judgement and organisational awareness.  
  • Bloom's is, perhaps, best considered as a model orthogonal to the SFIA levels - each of Bloom's levels can be applied to each SFIA level.

Understanding CyBOK structure for SFIA users

CyBOK is primarily intended as a guideline for curriculum developers, not as a direct learning resource for practitioners. Key structural elements include:

Knowledge areas vs. Professional skills

  • CyBOK organises theoretical knowledge into domains such as "Risk Management & Governance" or "Software Security." These describe what needs to be understood conceptually, not how that understanding is applied in professional roles. 
  • SFIA skills such as "Information Security (SCTY)" describe professional competencies that draw upon multiple CyBOK knowledge areas.

Academic vs. Industry focus

  • CyBOK emphasises theoretical foundations, research findings, and conceptual frameworks.
  • SFIA emphasises professional application, business integration, and organisational impact. The mapping shows how theoretical depth supports practical competency.

Curriculum design tool

  • CyBOK helps educators design comprehensive cyber security curricula.
  • Although some industry professionals may reference specific knowledge areas for deep understanding, it is professional education and certification programs that are most influenced by CyBOK's knowledge organization.

Knowledge types and SFIA level application

→ more details in this "Briefing' for Employers"


Most cybersecurity roles require a mix of knowledge types:

  1. Procedural knowledge: knowing how to follow steps, use tools, and perform defined tasks.
  2. Declarative or conceptual knowledge: knowing about systems, frameworks, and principles — the “why” that sits behind procedures.
  3. Conditional knowledge: knowing when and why to act, making decisions, using judgment in context.

The relationship between CyBOK knowledge domains and SFIA competencies varies by responsibility level:

Procedural knowledge

  • What it involves: Following established procedures, implementing standard practices, applying known solutions and tools
  • Knowledge sources: Organisational procedures, vendor tool training, entry-level certifications, on-the-job learning
  • CyBOK relevance: The content of the CyBOK knowledge areas should not be expected to cover procedural knowledge. The scope of each CyBOK Knowledge area can help in identifying what conceptual understanding may be useful to provide context to procedures and practices, but detailed theoretical knowledge is often not required. 
  • Example: Following incident response playbooks, implementing configured security controls, using SIEM tools

Conceptual knowledge

  • What it involves: Understanding principles, adapting practices to context, explaining why approaches work
  • Knowledge sources: Professional certifications, university education, industry frameworks - often influenced by CyBOK knowledge areas
  • CyBOK relevance: Knowledge domains provide theoretical foundations that enable effective adaptation and guidance
  • Example: Customising risk frameworks for organisational context, designing security architectures for specific requirements

Judgment/Decision-making knowledge

  • What it involves: Strategic decisions, knowing when standard approaches don't apply, organisational adaptation
  • Knowledge sources: Professional experience, mentoring, executive education, cross-industry exposure
  • CyBOK Relevance: Theoretical frameworks help recognise when and why adaptations are needed, but judgment primarily comes from experiential learning
  • Example: Setting enterprise security strategy, making risk appetite decisions, designing governance structures

How knowledge sources support SFIA skills

The knowledge required for effective performance of SFIA skills can come from multiple sources:

Formal Education and Professional Development

  • University degrees with curricula often influenced by CyBOK knowledge areas
  • Industry certifications (CISSP, CISM, Security+) covering both theoretical and practical aspects
  • Professional training on specific frameworks and standards
  • CyBOK knowledge areas – used as a reference for identifying theoretical understanding needed

Industry standards and frameworks

  • Technical standards (ISO 27001, NIST Cybersecurity Framework, industry-specific requirements, NICE cybersecurity work roles, UKCSC specialisms)
  • Best practice frameworks (ITIL, TOGAF, COSO) for integration with broader organisational practices
  • Regulatory requirements (GDPR, HIPAA, sector-specific compliance)

Organisational context

  • Business knowledge (strategy, processes, financial constraints, stakeholder expectations)
  • Technical environment (current infrastructure, planned changes, vendor relationships)
  • Cultural factors (risk appetite, change readiness, communication preferences)

Professional experience

  • Practical implementation experience with various technologies and approaches
  • Cross-functional collaboration with legal, finance, operations, and other business areas
  • Leadership and communication skills for influencing stakeholders and driving change

 We can apply the SFIA levels to typical career levels found in the cyber security domain.

Image displaying an Illustration of career levels in the cyber security domain


 We can also apply the SFIA levels to typical industry roles - e.g. the diagram below shows SFIA levels mapped to the UK Cyber Security council (UKCSC) specialisms. The actual roles and levels will be dependent on the employer and the nature of their business and operating model.


Because SFIA is a broad-based framework it includes skills for  specialist cyber security roles but also adjacent roles and specialisms who apply secure working practices within their roles. 


SFIA is a neutral and agnostics skills framework. It can be applied to a wide range of role frameworks. We have mappings of SFIA skills to the roles defined in all the major cybersecurity frameworks including UKCSC, NICE and ENISA.


CyBOK and SFIA are complementary.



Mapping CyBOK Knowledge Areas to SFIA skills

Key Principles of the Mapping

CyBOK as theoretical foundation

CyBOK knowledge areas provide conceptual depth that enhances professional judgment but don't define professional competencies. The theoretical understanding helps professionals know when and why to adapt standard practices, communicate more effectively with other disciplines, and make sound decisions in novel situations.

SFIA as professional application

SFIA skills describe how theoretical knowledge manifests in professional roles, integrating technical understanding with business context, stakeholder management, and organisational leadership. Higher SFIA levels require broader judgment informed by theoretical principles but applied to organisational dynamics.

Multiple knowledge sources required

Effective professional performance requires integration of theoretical knowledge (which may be influenced by CyBOK KAs), industry standards, regulatory requirements, organisational context, and professional experience. Learning based on CyBOK KAs provides one important component but not a complete foundation.

Progression from procedure to decision-making and judgment

Lower SFIA levels primarily require procedural knowledge and standard practice application. Higher levels increasingly require conceptual understanding and judgment capabilities that benefit from theoretical depth, whether gained through formal education, professional development, or study of knowledge domains outlined in CyBOK.

Using this mapping

For professional development planning

  • Identify which CyBOK knowledge areas provide theoretical foundation for your target SFIA skills
  • Understand what additional business and interpersonal skills are needed beyond technical knowledge
  • Recognise when and how theoretical depth supports progression to higher responsibility levels

For curriculum design

  • See how academic knowledge areas translate to industry-relevant professional competencies
  • Understand what business context and professional skills complement theoretical knowledge
  • Design programs that prepare students for specific SFIA professional skills and responsibility levels

For organisational capability assessment

  • Assess whether staff have sufficient theoretical foundation for their SFIA responsibility level
  • Identify professional development needs that combine technical depth with business skills
  • Understand collaboration patterns between different SFIA skills and knowledge domains

For career planning

  • Understand how academic preparation relates to industry role requirements
  • Identify knowledge gaps that may limit progression to higher responsibility levels
  • Plan professional development that combines theoretical depth with practical business skills

The mapping of CyBOK Knowledge Areas to SFIA skills

  1. Risk Management & Governance
  2. Law & Regulation
  3. Human Factors
  4. Privacy & Online Rights
  5. Malware & Attack Technologies
  6. Adversarial Behaviours
  7. Security Operations & Incident Management
  8. Forensics
  9. Cryptography
  10. Operating Systems & Virtualisation Security
  11. Distributed Systems Security
  12. Formal Methods for Security
  13. Authentication, Authorisation & Accountability
  14. Software Security
  15. Web & Mobile Security
  16. Secure Software Lifecycle
  17. Applied Cryptography
  18. Network Security
  19. Hardware Security
  20. Cyber-Physical Systems Security
  21. Physical Layer & Telecommunications Security

Short description of this knowledge area

Security management systems and organisational security controls, including standards, best practices, and approaches to risk assessment and mitigation.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Information security

Defining and operating a framework of security controls and security management strategies.

SCTY

2 - 7

Governance

Defining and operating frameworks for decision-making, risk management, stakeholder relationships and compliance with organisational and regulatory obligations.

GOVN

6 - 7

Risk management

Planning and implementing processes for managing risk across the enterprise, aligned with organisational strategy and governance frameworks.

BURM

2 - 7

Information assurance

Protecting against and managing risks related to the use, storage and transmission of data and information systems.

INAS

2 - 7

Audit

Delivering independent, risk-based assessments of the effectiveness of processes, the controls and the compliance environment of an organisation.

AUDT

2 - 7

Continuity management

Developing, implementing and testing a business continuity framework.

COPL

2 - 6

Short description of this knowledge area

International and national statutory and regulatory requirements, compliance obligations, and security ethics, including data protection and developing doctrines on cyber warfare.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Information and data compliance

Implementing and promoting compliance with information and data management legislation.

PEDP

4 - 6

Artificial intelligence (AI) and data ethics

Implementing and promoting ethical practices in the design, development, deployment and use of AI and data technologies.

AIDE

3 - 6

Governance

Defining and operating frameworks for decision-making, risk management, stakeholder relationships and compliance with organisational and regulatory obligations.

GOVN

6 - 7

Risk management

Planning and implementing processes for managing risk across the enterprise, aligned with organisational strategy and governance frameworks.

BURM

2 - 7

Short description of this knowledge area

Usable security, social & behavioural factors impacting security, security culture and awareness as well as the impact of security controls on user behaviours.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

User research

Identifying users' behaviours, needs and motivations using observational research methods.

URCH

2 - 6

User experience analysis

Understanding the context of use for systems, products and services and specifying user experience requirements and design goals.

UNAN

2 - 5

User experience design

Producing design concepts and prototypes for user interactions and experiences of a product, system or service.

HCEV

2 - 6

User experience evaluation

Validating systems, products or services against user experience goals, metrics and targets.

USEV

2 - 6

Learning design and development

Designing and developing resources to transfer knowledge, develop skills and change behaviours.

TMCR

2 - 5

Learning delivery

Transferring knowledge, developing skills and changing behaviours using a range of techniques, resources and media.

ETDL

2 - 5

Organisational change management

Planning, designing and implementing activities to transition the organisation and people to the required future state.

CIPM

2 - 6

Organisational change enablement

Facilitates cultural and behavioural change by enabling individuals and teams to embed new ways of working and adapt to changes.

OCEN

4 - 6

Stakeholder relationship management

Systematically analysing, managing and influencing stakeholder relationships to achieve mutually beneficial outcomes through structured engagement.

RLMT

4 - 7

Short description of this knowledge area

Techniques for protecting personal information, including communications, applications, and inferences from databases and data processing. It also includes other systems supporting online rights touching on censorship and circumvention, covertness, electronic elections, and privacy in payment and identity systems.

SFIA skills – click links for full skill description including levels

Comments

Looking at the Privacy & Online Rights Knowledge Area, this represents a different pattern from both Human Factors and Law & Regulation. This KA is much more technically specialised and targets a narrower audience.

“The goal of this knowledge area is to introduce system designers to the concepts and technologies that are used to engineer systems that inherently protect users’ privacy. We aim to provide designers with the ability to identify privacy problems, to describe them from a technical perspective, and to select adequate technologies to eliminate, or at least, mitigate these problems”.

 From Privacy & Online Rights knowledge area, CyBOK

SFIA Skill name

SFIA skill description

Code

Levels

Systems design

Designing systems to meet specified requirements and agreed systems architectures.

DESN

2 - 6

Software design

Architecting and designing software to meet specified requirements, ensuring adherence to established standards and principles.

SWDN

2 - 6

Data management

Developing and implementing plans, policies and practices that control, protect and optimise the value and governance of data assets.

DATM

2 - 6

Information assurance

Protecting against and managing risks related to the use, storage and transmission of data and information systems.

INAS

2 - 7

Identity and access management

Manages identity verification and access permissions within organisational systems and environments.

IAMT

1 - 6

Short description of this knowledge area

Technical details of exploits and distributed malicious systems, together with associated discovery and analysis approaches.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Security operations

Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and operational integrity.

SCAD

1 - 6

Penetration testing

Testing the effectiveness of security controls by emulating the tools and techniques of likely attackers.

PENT

2 - 6

Threat intelligence

Developing and sharing actionable insights on current and potential security threats to the success or integrity of an organisation.

THIN

2 - 6

Vulnerability research

Conducting applied research to discover, evaluate and mitigate new or unknown security vulnerabilities and weaknesses.

VURE

2 - 6

Offensive cyber operations

Plans, executes and manages offensive cybersecurity operations, including target selection, electronic target folders and post-operation analysis.

OCOP

2 - 6

Short description of this knowledge area

The motivations, behaviours, & methods used by attackers, including malware supply chains, attack vectors, and money transfers.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Security operations

Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and operational integrity.

SCAD

1 - 6

Penetration testing

Testing the effectiveness of security controls by emulating the tools and techniques of likely attackers.

PENT

2 - 6

Threat intelligence

Developing and sharing actionable insights on current and potential security threats to the success or integrity of an organisation.

THIN

2 - 6

Vulnerability research

Conducting applied research to discover, evaluate and mitigate new or unknown security vulnerabilities and weaknesses.

VURE

2 - 6

Offensive cyber operations

Plans, executes and manages offensive cybersecurity operations, including target selection, electronic target folders and post-operation analysis.

OCOP

2 - 6

Short description of this knowledge area

The configuration, operation and maintenance of secure systems including the detection of and response to security incidents and the collection and use of threat intelligence.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Security operations

Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and operational integrity.

SCAD

1 - 6

Threat intelligence

Developing and sharing actionable insights on current and potential security threats to the success or integrity of an organisation.

THIN

2 - 6

Vulnerability assessment

Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact.

VUAS

2 - 5

Incident management

Coordinating responses to a diverse range of incidents to minimise negative impacts and quickly restore services.

USUP

1 - 6

Problem management

Managing the lifecycle of all problems that have occurred or could occur in delivering a service.

PBMG

2 - 5

Data analytics

Enabling data-driven decision making by extracting, analysing and communicating insights from structured and unstructured data.

DAAN

2 - 7

Machine learning

Developing systems that learn from data and experience, improving performance, accuracy and adaptability in dynamic environments.

MLNG

2 - 6

Business intelligence

Developing, producing and delivering regular and one-off management information to provide insights and aid decision-making.

BINT

2 - 5

Data engineering

Designing, building, operationalising, securing and monitoring data pipelines, stores and real-time processing systems for scalable and reliable data management.

DENG

2 - 6

Short description of this knowledge area

The collection, analysis, & reporting of digital evidence in support of incidents or criminal events.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Digital forensics

Recovering and investigating material found in digital devices.

DGFS

2 - 6

Cybercrime investigation

Investigates cybercrimes, collects evidence, determines incident impacts and collaborates with legal teams to protect digital assets.

CRIM

2 - 6

Incident management

Coordinating responses to a diverse range of incidents to minimise negative impacts and quickly restore services.

USUP

1 - 6

Problem management

Managing the lifecycle of all problems that have occurred or could occur in delivering a service.

PBMG

2 - 5

Short description of this knowledge area

Core primitives of cryptography as presently practised & emerging algorithms, techniques for analysis of these, and the protocols that use them.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Information assurance

Protecting against and managing risks related to the use, storage and transmission of data and information systems.

INAS

2 - 7

Vulnerability research

Conducting applied research to discover, evaluate and mitigate new or unknown security vulnerabilities and weaknesses.

VURE

2 - 6

Numerical analysis

Creating, analysing, implementing, testing and improving algorithms for numerically solving mathematical problems.

NUAN

4 - 7

Short description of this knowledge area

Operating systems protection mechanisms, implementing secure abstraction of hardware, and sharing of resources, including isolation in multiuser systems, secure virtualisation, and security in database systems.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

System software administration

Installing, managing and maintaining operating systems, data management, office automation and utility software across various infrastructure environments.

SYSP

2 - 5

Identity and access management

Manages identity verification and access permissions within organisational systems and environments.

IAMT

1 - 6

Database administration

Installing, configuring, monitoring, maintaining databases and data stores, ensuring performance and security and adapting to evolving technologies.

DBAD

2 - 5

Systems and software lifecycle engineering

Establishing and deploying an environment for developing, continually improving and securely operating software and systems products and services.

SLEN

3 - 7

Storage management

Provisioning, configuring and optimising on-premises and cloud-based storage solutions, ensuring data availability, security and alignment with business objectives.

STMG

2 - 6

Short description of this knowledge area

Security mechanisms relating to larger-scale coordinated distributed systems, including aspects of secure consensus, time, event systems, peer-to-peer systems, clouds, multitenant data centres, & distributed ledgers.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Data management

Developing and implementing plans, policies and practices that control, protect and optimise the value and governance of data assets.

DATM

2 - 6

Database administration

Installing, configuring, monitoring, maintaining databases and data stores, ensuring performance and security and adapting to evolving technologies.

DBAD

2 - 5

Infrastructure design

Designing technology infrastructure to meet business requirements, ensuring scalability, reliability, security and alignment with strategic objectives.

IFDN

2 - 6

Infrastructure operations

Provisioning, deploying, configuring, operating and optimising technology infrastructure across physical, virtual and cloud-based environments.

ITOP

1 - 5

Network design

Designing communication networks to meet business requirements, ensuring scalability, reliability, security and alignment with strategic objectives.

NTDS

2 - 6

Non-functional testing

Assessing systems and services to evaluate performance, security, scalability and other non-functional qualities against requirements or expected standards.

NFTS

1 - 6

Information assurance

Protecting against and managing risks related to the use, storage and transmission of data and information systems.

INAS

2 - 7

Short description of this knowledge area

Formal specification, modelling and reasoning about the security of systems, software and protocols, covering the fundamental approaches, techniques and tool support.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Systems design

Designing systems to meet specified requirements and agreed systems architectures.

DESN

2 - 6

Software design

Architecting and designing software to meet specified requirements, ensuring adherence to established standards and principles.

SWDN

2 - 6

Programming/software development

Developing software components to deliver value to stakeholders.

PROG

2 - 6

Safety assessment

Assessing safety-related software and hardware systems to determine compliance with standards and required levels of safety integrity.

SFAS

4 - 6

Safety engineering

Applying appropriate methods to assure safety during all lifecycle phases of safety-related systems developments.

SFEN

2 - 6

Short description of this knowledge area

All aspects of identity management and authentication technologies, and architectures and tools to support authorisation and accountability in both isolated and distributed systems.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Identity and access management

Manages identity verification and access permissions within organisational systems and environments.

IAMT

1 - 6

Systems design

Designing systems to meet specified requirements and agreed systems architectures.

DESN

2 - 6

Short description of this knowledge area

Known categories of programming errors resulting in security bugs, & techniques for avoiding these errors—both through coding practice and improved language design—and tools, techniques, and methods for detection of such errors in existing systems.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Software design

Architecting and designing software to meet specified requirements, ensuring adherence to established standards and principles.

SWDN

2 - 6

Programming/software development

Developing software components to deliver value to stakeholders.

PROG

2 - 6

Real-time/embedded systems development

Designing and developing reliable real-time software typically within embedded systems.

RESD

2 - 6

Non-functional testing

Assessing systems and services to evaluate performance, security, scalability and other non-functional qualities against requirements or expected standards.

NFTS

1 - 6

Functional testing

Assessing specified or unspecified functional requirements and characteristics of products, systems and services through investigation and testing.

TEST

1 - 6

Systems integration and build

Planning, implementing and controlling activities to integrate system elements, subsystems and interfaces to create operational systems, products or services.

SINT

2 - 6

Deployment

Transitioning software from development to live usage, managing risks and ensuring it works as intended.

DEPL

2 - 6

Systems and software lifecycle engineering

Establishing and deploying an environment for developing, continually improving and securely operating software and systems products and services.

SLEN

3 - 7

Data engineering

Designing, building, operationalising, securing and monitoring data pipelines, stores and real-time processing systems for scalable and reliable data management.

DENG

2 - 6

Penetration testing

Testing the effectiveness of security controls by emulating the tools and techniques of likely attackers.

PENT

2 - 6

Methods and tools

Leads the adoption, management and optimisation of methods and tools, ensuring effective use and alignment with organisational objectives.

METL

2 - 6

Short description of this knowledge area

Issues related to web applications and services distributed across devices and frameworks, including the diverse programming paradigms and protection models.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Systems design

Designing systems to meet specified requirements and agreed systems architectures.

DESN

2 - 6

Systems integration and build

Planning, implementing and controlling activities to integrate system elements, subsystems and interfaces to create operational systems, products or services.

SINT

2 - 6

Deployment

Transitioning software from development to live usage, managing risks and ensuring it works as intended.

DEPL

2 - 6

Short description of this knowledge area

The application of security software engineering techniques in the whole systems development lifecycle resulting in software that is secure by default.

SFIA skills – click links for full skill description including levels

 

SFIA Skill name

SFIA skill description

Code

Levels

Systems and software lifecycle engineering

Establishing and deploying an environment for developing, continually improving and securely operating software and systems products and services.

SLEN

3 - 7

Methods and tools

Leads the adoption, management and optimisation of methods and tools, ensuring effective use and alignment with organisational objectives.

METL

2 - 6

Software design

Architecting and designing software to meet specified requirements, ensuring adherence to established standards and principles.

SWDN

2 - 6

Systems design

Designing systems to meet specified requirements and agreed systems architectures.

DESN

2 - 6

Systems integration and build

Planning, implementing and controlling activities to integrate system elements, subsystems and interfaces to create operational systems, products or services.

SINT

2 - 6

Deployment

Transitioning software from development to live usage, managing risks and ensuring it works as intended.

DEPL

2 - 6

Configuration management

Planning, identifying, controlling, accounting for and auditing of configuration items (CIs) and their interrelationships.

CFMG

2 - 6

Short description of this knowledge area

The application of cryptographic algorithms, schemes, and protocols, including issues around implementation, key management, and their use within protocols and systems.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Security operations

Manages and administers security measures, using tools and intelligence to protect assets, ensuring compliance and operational integrity.

SCAD

1 - 6

Identity and access management

Manages identity verification and access permissions within organisational systems and environments.

IAMT

1 - 6

Information assurance

Protecting against and managing risks related to the use, storage and transmission of data and information systems.

INAS

2 - 7

Offensive cyber operations

Plans, executes and manages offensive cybersecurity operations, including target selection, electronic target folders and post-operation analysis.

OCOP

2 - 6

Short description of this knowledge area

Security aspects of networking & telecommunication protocols, including the security of routing, network security elements, and specific cryptographic protocols used for network security.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Network design

Designing communication networks to meet business requirements, ensuring scalability, reliability, security and alignment with strategic objectives.

NTDS

2 - 6

Network support

Providing maintenance and support services for communications networks.

NTAS

1 - 5

Information assurance

Protecting against and managing risks related to the use, storage and transmission of data and information systems.

INAS

2 - 7

Short description of this knowledge area

Security in the design, implementation, & deployment of general-purpose and specialist hardware, including trusted computing technologies and sources of randomness.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Hardware design

Specifying and designing hardware systems and components to meet defined requirements by following agreed design principles and standards.

HWDE

2 - 6

Short description of this knowledge area

Security challenges in cyber-physical systems, such as the Internet of Things & industrial control systems, attacker models, safe-secure designs, and security of large-scale infrastructures.

SFIA skills – click links for full skill description including levels

 

SFIA Skill name

SFIA skill description

Code

Levels

Real-time/embedded systems development

Designing and developing reliable real-time software typically within embedded systems.

RESD

2 - 6

Safety assessment

Assessing safety-related software and hardware systems to determine compliance with standards and required levels of safety integrity.

SFAS

4 - 6

Safety engineering

Applying appropriate methods to assure safety during all lifecycle phases of safety-related systems developments.

SFEN

2 - 6

Infrastructure design

Designing technology infrastructure to meet business requirements, ensuring scalability, reliability, security and alignment with strategic objectives.

IFDN

2 - 6

Short description of this knowledge area

Security concerns and limitations of the physical layer including aspects of radio frequency encodings and transmission techniques, unintended radiation, and interference.

SFIA skills – click links for full skill description including levels

SFIA Skill name

SFIA skill description

Code

Levels

Network design

Designing communication networks to meet business requirements, ensuring scalability, reliability, security and alignment with strategic objectives.

NTDS

2 - 6

Radio frequency engineering

Designing, installing and maintaining radio frequency based devices and software.

RFEN

2 - 6