Network Capabilities And Gaps – Current Overview - Group
Go Back
Control not effective/ No Control Control Partially Effective Control Is Effective
Network Infrastructure
Network Framework 1
Data Loss Prevention Data Security Governance
Endpoint Device Encryption Database Encryption
Secure File Transfer Database Monitoring
Data Classification Data Masking
Network Framework 2
Cloud Security & Compliance
Network Framework 3
Device Control Device Identity
Device Access Secure Communication
Systems Security
Network Framework 4
Physical and Logical Access Integration Data Centre Security
Physical and Logical Access Integration Data Centre Security
Physical and Logical Access Integration Physical Security controls
Network Framework 5
IAM Framework RBAC & SOO
3rd Party Access Access Governance
Authentication PAM
Data Centre
Security Monitoring & Data Reciliency
Threat Modelling SIEM UEBA
SOAR Pen Test Threat Intelligence
Data Classification
Host and Endpoint Protection
EDR, Advanced Anti-malware MDM & MAM
Vulnerability Management BYOD control
Patch Management File Integrity Monitoring
Email Security Host and Endpoint Hardening
Systems Security
Network Security
Perimeter IPS Network Access Control Third Party Connectivity Firewall Rules Management
Anti-DDOS Threat Detection/ behaviour analytics Network Inventory management IP Address Management
Datacentre & Cloud workload protection Perimeter Hardening Network IPS Secure network communications
Systems Administrations
Incident Management
Red/Blue/Purple Tests
Security Incident Response Process
Service Continuity
Security aspects of BCM
Cyber Liability Insurance
Backup Assurance
Systems Security
Infosec Management
InfoSec Strategy InfoSec Management System – P1 InfoSec Governance framework
Security Awareness Security/ Architecture Policies, Standards Processes
Risk Management Infosec Compliance