You are on page 1of 7

Security Framework & Products Mapping

© M.Tech Group 2019. All rights reserved.


Digital
CyberSecurity Forensic
Incident
Framework Response Assessment,
Report

Identify • Asset Management (AM)


(ID) • Business Environment (BE)
• Governance (GV)
• Risk Assessment (RA) Monitor, Threat
• Risk Management Strategy (RM) Alert Hunting

Protect • Access Control (AC)


(PR) • Awareness Training (AT)
• Data Security (DS)
• Information Protection & Procedures (IP) Filter, Standardize, Enrich, Correlate
• Maintenance (MA) Risk Packet Threat IDS
• Protective Technology (PT) Asset Data Data
Log Data Data
Data Endpoint
Data Correlated Data
Flow Access
Trend Server Data
Data DLP
Data Data
Data SSL Visibility Data
Detect • Anomalies and Event (AE)
(DE) • Security Continuous Monitoring (CM) Log
• Detection Process (DP) Collection Packet
Capture
DDoS Prevention
Access
Anti-Malware Endpoint
Response • Response Planning (RP) Monitorin Data Loss
Analysis
(RS) • Communication (CO) g Prevention
• Analysis (AN)
• Mitigation (MI) IDS/IPS
• Improvement (IM) Risk & Compliance Mgmt Encryption
App. User
Monitorin Data Behavioral
Firewall Vulnerability Identity &
g Discovery & Analysis
Mgmt Access
Recovery • Recovery Planning (RP)
Classification
Mgmt
(RC) • Improvements (IM)
• Communication (CO)

Network Network IT Asset


Identity & Remote Honey
Monitoring Access Mgmt
Access Connection Pot
Control Analytic /VPN
Technology Blueprint
GOVERNANCE, RISK MANAGEMENT & COMPLIANCE
Security Policy Regulatory & Compliance Business Continuity
Audit Management Risk Management Vendor Management
Management Management Management

SECURITY TRAINING PLATFORM SECURITY OPERATIONS MANAGEMENT


Security Test/Lab Threat Intelligence SIEM Vulnerability Behavioral Analysis Incident Response Mgmt. Forensic
Management

SECURITY TECHNOLOGIES

DATA & INFORMATION INFRATRUCTURE

IDENTITY & ACCESS APPLICATION & PROCESS Enterprise Digital Rights Management Network Package Capture & Analysis

User Activity Monitoring Application Monitoring Content-Aware Data Leak Prevention Advanced Threat Prevention

Identity Proofing Fraud Prevention Data Encryption/Tokenization Inbound/Outbound Gateway

Access Management and Single-Sign On Data LifeCycle Management Mobile Device


Application Firewall/Shielding DoS Protection
Mgmt

n-Factor Authentication Software Lifecycle Management Data Masking/Redaction Firewall/


Endpoint Security
IPDS/VPN

Privilege Account Management Cloud Access Security Broker File/BigData Firewall Network Access Control

Identity Lifecycle Management Application Security Testing Database Firewall Network & Devices Security Testing

Software Inventory & Configuration Infrastructure Inventory & Configuration


Identity Analytics Data Discovery & Classification
Management Management

INFRASTRUCTURE SERVICES
Security Policy Public-Key Encryption
LDAP/RADIUS/ TACACS+ Infrastructure Monitoring Logs & Events Collection IT Service Management
Monitoring Infrastructure Management
Target Profile: FSI Basic/Mandatory Advanced Optional

GOVERNANCE, RISK MANAGEMENT & COMPLIANCE


Security Policy Regulatory & Compliance Business Continuity
Audit Management Risk Management Vendor Management
Management Management Management

SECURITY TRAINING PLATFORM SECURITY OPERATIONS MANAGEMENT


Security Test/Lab Threat Intelligence SIEM Vulnerability Management Behavioral Analysis Incident Response Mgmt. Forensic

SECURITY TECHNOLOGIES

DATA & INFORMATION INFRATRUCTURE

IDENTITY & ACCESS APPLICATION & PROCESS Enterprise Digital Rights Management Network Package Capture & Analysis

User Activity Monitoring Application Monitoring Content-Aware Data Leak Prevention Advanced Threat Prevention

Identity Proofing Fraud Prevention Data Encryption/Tokenization Inbound/Outbound Gateway

Access Management and Single-Sign On Application Firewall/Shielding Data LifeCycle Management DoS Protection Mobile Device Mgmt

n-Factor Authentication Software Lifecycle Management Data Masking/Redaction Firewall/ IPDS/VPN Endpoint Security

Privilege Account Management Cloud Access Security Broker File/BigData Firewall Network Access Control

Identity Lifecycle Management Application Security Testing Database Firewall Network & Devices Security Testing

Software Inventory & Configuration Infrastructure Inventory & Configuration


Identity Analytics Data Discovery & Classification
Management Management

INFRASTRUCTURE SERVICES
Security Policy Public-Key Encryption
LDAP/RADIUS/ TACACS+ Infrastructure Monitoring Logs & Events Collection IT Service Management
Monitoring Infrastructure Management
M.Tech Products Mapping
GOVERNANCE, RISK MANAGEMENT & COMPLIANCE
Security Policy Regulatory & Compliance Business Continuity
Audit Management Risk Management Vendor Management
Management Management Management

SECURITY TRAINING PLATFORM SECURITY OPERATIONS MANAGEMENT


Threat Intelligence Vulnerability Behavioral Incident Response
Security Test/Lab SIEM Forensic
Management Analysis Mgmt.

SECURITY TECHNOLOGIES
APPLICATION & PROCESS DATA & INFORMATION INFRATRUCTURE

IDENTITY & ACCESS Application Monitoring Enterprise Digital Rights Management Network Package Capture & Analysis

User Activity Monitoring Fraud Prevention Content-Aware Data Leak Prevention Advanced Threat Prevention

Identity Proofing Application Firewall/Shielding Data Encryption/Tokenization Proxy/Isolation

Access Management and Single-Sign Data LifeCycle Management Mobile Device


Software Lifecycle Management DoS Protection
On Management

n-Factor Authentication Cloud Access Security Broker Data Masking/Redaction Firewall/


Endpoint Security
IPDS/VPN

Privilege Account Management Application Gateway File/BigData Firewall Network Access Control

Identity Lifecycle Management Application Security Testing Database Firewall Network & Devices Security Testing

Software Inventory & Configuration Infrastructure Inventory &


Identity Analytics Data Discovery & Classification
Management Configuration Management

INFRASTRUCTURE SERVICES
LDAP/RADIUS/ Infrastructure Logs & Events Security Policy Public-Key Encryption IT Service
TACACS+ Monitoring Collection Enforcement Infrastructure Management Management
Target Profile: Government Basic/Mandatory Advanced Optional

GOVERNANCE, RISK MANAGEMENT & COMPLIANCE


Security Policy Regulatory & Compliance Business Continuity
Audit Management Risk Management Vendor Management
Management Management Management

SECURITY TRAINING PLATFORM SECURITY OPERATIONS MANAGEMENT


Security Test/Lab Threat Intelligence SIEM Vulnerability Management Behavioral Analysis Incident Response Mgmt. Forensic

SECURITY TECHNOLOGIES

DATA & INFORMATION INFRATRUCTURE

IDENTITY & ACCESS APPLICATION & PROCESS Enterprise Digital Rights Management Network Package Capture & Analysis

User Activity Monitoring Application Monitoring Content-Aware Data Leak Prevention Advanced Threat Prevention

Identity Proofing Fraud Prevention Data Encryption/Tokenization Inbound/Outbound Gateway

Access Management and Single-Sign On Application Firewall/Shielding Data LifeCycle Management DoS Protection Mobile Device Mgmt

n-Factor Authentication Software Lifecycle Management Data Masking/Redaction Firewall/ IPDS/VPN Endpoint Security

Privilege Account Management Cloud Access Security Broker File/BigData Firewall Network Access Control

Identity Lifecycle Management Application Security Testing Database Firewall Network & Devices Security Testing

Software Inventory & Configuration Infrastructure Inventory & Configuration


Identity Analytics Data Discovery & Classification
Management Management

INFRASTRUCTURE SERVICES
Security Policy Public-Key Encryption
LDAP/RADIUS/ TACACS+ Infrastructure Monitoring Logs & Events Collection IT Service Management
Monitoring Infrastructure Management
© M.Tech Group 2019. All rights reserved.

You might also like