Security Operations

Kom i gang. Det er Gratis
eller tilmeld med din email adresse
Security Operations af Mind Map: Security Operations

1. Log and Event Management

1.1. AlienVault

1.2. SecurityOnion

2. Incident Management

3. Security Orchestration and Response (SOAR)

3.1. Cortex

3.2. Patrowl

4. Risk Management

4.1. Eramba

4.2. Barnowl (Risk Log)

5. Vulnerability Management

5.1. Qualys

5.2. Microsoft SCCM

5.2.1. Patch Management

6. Privilege Access Management

6.1. Cyberark

6.2. Microsoft LAPS

7. Governance

7.1. Information security Policy

7.2. IT Security Plan

7.3. Acceptable Use of IT Policy

7.4. MITTRE ATT&CK Framework

7.5. NIST CSF 800-53

7.6. COBIT 2019

8. MFA

8.1. Duo Security

8.2. Microsoft Azure MFA

8.3. RSA Authentication Manager

9. Firewall

9.1. Fortigate

9.1.1. VPN

9.1.2. Internet Breakout

9.2. Cisco ASA

9.2.1. 3rd Party Services

10. Monitoring

10.1. ManageEngine OpsManager

10.2. ManageEngine Application Manager

10.3. DarkTrace

10.4. FortiAnalyzer

10.5. Mimecast

11. Emails

11.1. Mimecast

11.1.1. MX= Mimecast for all emails

11.2. Office 365

11.2.1. 90-95% users

12. Network Security

12.1. Portnox (Access Control)

12.2. Cisco ISE (PoC)

12.3. SDWAN (PoC)

13. Malware/Intrusion Prevention

13.1. FortiSandbox

13.2. FortiGate Firewall

14. Compliance, Audit and Review

14.1. Internal Audit

14.2. Penetration Test

14.3. Monthly Report Reviews

14.4. SWIFT CSP Attestation

15. Information Sharing

15.1. BAN Cybersecurity Forum

15.2. OSSAT/OSSAC

15.3. Namibia National Cyber Security Competition

16. Password Management

16.1. Bitwarden

17. Encryption

17.1. Bitlocker

17.2. Public Key Infrastructure

17.3. Wildcard certificate

18. Portals

18.1. Web Proxy (Centos Nginx)

18.1.1. MTN Public IPs

18.2. FortiGate Firewall

19. AOC

19.1. Core Network Re-Design

19.2. Advanced Cloud Security (M365 E5)

19.2.1. Microsoft ATP

19.3. Penetration Test

20. Configuration Management

20.1. Microsoft ATP

20.2. NIST STIG

20.2.1. Baseline Security: Windows and Linux

20.3. Configuration Management Database (CMDB)

20.4. Microsoft Red Forest

21. Industry Projects

21.1. EFT/EEFT

22. Information Security

22.1. Data Classification

22.1.1. Azure Information Protection

23. Mobile Devices

23.1. Microsoft Intune

24. Endpoint Protection

24.1. Symantec Endpoint Protection

25. BCM

25.1. NISS

25.2. EFT

25.3. Full BCM

26. Interdepartmental Projects

26.1. SAP HANA Upgrade

26.2. Banking Supervision

26.3. Data Classification

27. Threat Intelligence

27.1. MISP

27.2. OpenCTI

27.3. AlienVault OTX

28. Training