Frameworks to Help You Evolve Your Cybersecurity Program - mccright/FCCSCybersecurityInput GitHub Wiki

Process and Control Emphasis

Readiness/Attack Resistance amounts to some combination of controls:

  • directive
  • preventive
  • detective
  • corrective
  • deterrent
  • compensating
  • responsive
  • recovery

Example Frameworks

EXAMPLE - NIST 800-53 Control Families:

https://github.com/mccright/rand-notes/blob/master/NIST-Pub-800-53-Rev4-Controls-List.htm

  • Access Control
  • Audit And Accountability
  • Awareness And Training
  • Configuration Management
  • Contingency Planning
  • Identification And Authentication
  • Incident Response
  • Maintenance
  • Media Protection
  • Personnel Security
  • Physical And Environmental Protection
  • Planning
  • Program Management
  • Risk Assessment
  • Security Assessment And Authorization
  • System And Communications Protection
  • System And Information Integrity
  • System And Services Acquisition

For one example of how to map these, see: https://github.com/mccright/rand-notes/blob/master/Developer-Related-NIST-Pub-800-53-Rev4-Controls.htm

EXAMPLE - Build Security In Maturity Model (BSIMM)

BSIMM is a software security framework used to organize 116 activities in 12 practices organized into four domains.

  • Governance
  1. Strategy & Metrics (SM)
  2. Compliance & Policy (CP)
  3. Training (T)
  • Intelligence
  1. Attack Models (AM)
  2. Security Features & Design (SFD)
  3. Standards & Requirements (SR)
  • SSDL Touchpoints
  1. Architecture Analysis (AA)
  2. Code Review (CR)
  3. Security Testing (ST)
  • Deployment
  1. Penetration Testing (PT)
  2. Software Environment (SE)
  3. Configuration Management & Vulnerability Management (CMVM)
    https://www.bsimm.com/framework.html and https://www.bsimm.com/content/dam/bsimm/reports/bsimm9.pdf

EXAMPLE - World Economic Forum (WEF)

LEARNER Resources:

Software Assurance Maturity Model (SAMM) https://owaspsamm.org/, https://github.com/OWASP/samm and https://www.owasp.org/index.php/OWASP_SAMM_Project
OWASP Cheat Sheet Collection: https://github.com/OWASP/CheatSheetSeries/blob/master/Index.md
"Threat Modeling Cheat Sheet (OWASP)" https://github.com/OWASP/CheatSheetSeries/blob/master/cheatsheets/Threat_Modeling_Cheat_Sheet.md
Mitre Att&ck threat list https://mitre.github.io/attack-navigator/enterprise/. ATT&CK is a catalog of techniques and tactics that describe post-compromise adversary behavior on typical enterprise IT environments. The core use cases involve using the catalog to analyze, triage, compare, describe, relate, and share post-compromise adversary behavior. See the descriptions of all 244 Attack Techniques at: https://attack.mitre.org/techniques/enterprise/; and the 13 more that are specific to mobile environments at: https://attack.mitre.org/tactics/mobile/.
For a Q1 2019 Thread Overview using the MITRE ATT&CK framework, see: https://www.rapid7.com/research/report/2019-q1-threat-report/#MITRE-ATTCK-Framework
"NIST Special Publication 800-181 - National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework." By William Newhouse, Stephanie Keith, Benjamin Scribner, and Greg Witte. NIST, 2017. This publication describes the National Initiative for Cybersecurity Education (NICE) Cybersecurity Workforce Framework (NICE Framework), a reference structure that describes the interdisciplinary nature of the cybersecurity work. It serves as a fundamental reference resource for describing and sharing information about cybersecurity work and the knowledge, skills, and abilities (KSAs) needed to complete tasks that can strengthen the cybersecurity posture of an organization.
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-181.pdf
Zero Trust Engineering: "NSA | Embracing a Zero Trust Security Model." "NSA | Advancing Zero Trust Maturity Throughout the User Pillar." "NSA | Advancing Zero Trust Maturity Throughout the Device Pillar." "NSA | Advancing Zero Trust Maturity Throughout the Network and Environment Pillar." Along with other related cybersecurity documents from the National Security Agency/Central Security Service.