Security Capabilities And Gaps – Current Overview - Group
Go Back
Control not effective/
No Control
Control Partially
Effective
Control Is
Effective
Protect & Prevent
Data Protection
Data Loss
Prevention
Data Security
Governance
Endpoint Device
Encryption
Database
Encryption
Secure File
Transfer
Database
Monitoring
Data
Classification
Data Masking
Cloud Security
Cloud Security & Compliance
IOT Security
Device Control
Device Identity
Device Access
Secure
Communication
Trust Center
Key Management
Certificate Management
PKI
Secure
Cryptographic
Devices
Physical Security Integration
Physical and Logical
Access Integration
Physical Security
controls
Data Centre
Security
Identity & Access Management
IAM Framework
RBAC & SOO
3rd Party Access
Access
Governance
Authentication
PAM
Monitor & Detect
Security Monitoring & Data Reciliency
Threat
Modelling
SIEM
UEBA
SOAR
Pen Test
Threat
Intelligence
Data Classification
Host and Endpoint Protection
EDR, Advanced
Anti-malware
MDM & MAM
Vulnerability
Management
BYOD control
Patch
Management
File Integrity
Monitoring
Email Security
Host and Endpoint
Hardening
Network Security
Perimeter IPS
Network Access
Control
Third Party
Connectivity
Firewall Rules
Management
Anti-DDOS
Threat Detection/
behaviour analytics
Network Inventory
management
IP Address
Management
Datacentre & Cloud
workload protection
Perimeter
Hardening
Network IPS
Secure network
communications
Respond & Recover
Incident Management
Red/Blue/Purple
Tests
Security Incident Response Process
Service Continuity
Security aspects of BCM
Cyber Liability Insurance
Backup Assurance
Plan, Govern, Comply, Educate
Infosec Management
InfoSec Strategy
InfoSec Management
System – P1
InfoSec Governance
framework
Security
Awareness
Security/
Architecture
Policies, Standards
Processes
Risk Management
Infosec Compliance