Security Framework & Products Mapping
© M.Tech Group 2019. All rights reserved.
Digital
CyberSecurity Forensic
Incident
Framework Response Assessment,
Report
Identify • Asset Management (AM)
(ID) • Business Environment (BE)
• Governance (GV)
• Risk Assessment (RA) Monitor, Threat
• Risk Management Strategy (RM) Alert Hunting
Protect • Access Control (AC)
(PR) • Awareness Training (AT)
• Data Security (DS)
• Information Protection & Procedures (IP) Filter, Standardize, Enrich, Correlate
• Maintenance (MA) Risk Packet Threat IDS
• Protective Technology (PT) Asset Data Data
Log Data Data
Data Endpoint
Data Correlated Data
Flow Access
Trend Server Data
Data DLP
Data Data
Data SSL Visibility Data
Detect • Anomalies and Event (AE)
(DE) • Security Continuous Monitoring (CM) Log
• Detection Process (DP) Collection Packet
Capture
DDoS Prevention
Access
Anti-Malware Endpoint
Response • Response Planning (RP) Monitorin Data Loss
Analysis
(RS) • Communication (CO) g Prevention
• Analysis (AN)
• Mitigation (MI) IDS/IPS
• Improvement (IM) Risk & Compliance Mgmt Encryption
App. User
Monitorin Data Behavioral
Firewall Vulnerability Identity &
g Discovery & Analysis
Mgmt Access
Recovery • Recovery Planning (RP)
Classification
Mgmt
(RC) • Improvements (IM)
• Communication (CO)
Network Network IT Asset
Identity & Remote Honey
Monitoring Access Mgmt
Access Connection Pot
Control Analytic /VPN
Technology Blueprint
GOVERNANCE, RISK MANAGEMENT & COMPLIANCE
Security Policy Regulatory & Compliance Business Continuity
Audit Management Risk Management Vendor Management
Management Management Management
SECURITY TRAINING PLATFORM SECURITY OPERATIONS MANAGEMENT
Security Test/Lab Threat Intelligence SIEM Vulnerability Behavioral Analysis Incident Response Mgmt. Forensic
Management
SECURITY TECHNOLOGIES
DATA & INFORMATION INFRATRUCTURE
IDENTITY & ACCESS APPLICATION & PROCESS Enterprise Digital Rights Management Network Package Capture & Analysis
User Activity Monitoring Application Monitoring Content-Aware Data Leak Prevention Advanced Threat Prevention
Identity Proofing Fraud Prevention Data Encryption/Tokenization Inbound/Outbound Gateway
Access Management and Single-Sign On Data LifeCycle Management Mobile Device
Application Firewall/Shielding DoS Protection
Mgmt
n-Factor Authentication Software Lifecycle Management Data Masking/Redaction Firewall/
Endpoint Security
IPDS/VPN
Privilege Account Management Cloud Access Security Broker File/BigData Firewall Network Access Control
Identity Lifecycle Management Application Security Testing Database Firewall Network & Devices Security Testing
Software Inventory & Configuration Infrastructure Inventory & Configuration
Identity Analytics Data Discovery & Classification
Management Management
INFRASTRUCTURE SERVICES
Security Policy Public-Key Encryption
LDAP/RADIUS/ TACACS+ Infrastructure Monitoring Logs & Events Collection IT Service Management
Monitoring Infrastructure Management
Target Profile: FSI Basic/Mandatory Advanced Optional
GOVERNANCE, RISK MANAGEMENT & COMPLIANCE
Security Policy Regulatory & Compliance Business Continuity
Audit Management Risk Management Vendor Management
Management Management Management
SECURITY TRAINING PLATFORM SECURITY OPERATIONS MANAGEMENT
Security Test/Lab Threat Intelligence SIEM Vulnerability Management Behavioral Analysis Incident Response Mgmt. Forensic
SECURITY TECHNOLOGIES
DATA & INFORMATION INFRATRUCTURE
IDENTITY & ACCESS APPLICATION & PROCESS Enterprise Digital Rights Management Network Package Capture & Analysis
User Activity Monitoring Application Monitoring Content-Aware Data Leak Prevention Advanced Threat Prevention
Identity Proofing Fraud Prevention Data Encryption/Tokenization Inbound/Outbound Gateway
Access Management and Single-Sign On Application Firewall/Shielding Data LifeCycle Management DoS Protection Mobile Device Mgmt
n-Factor Authentication Software Lifecycle Management Data Masking/Redaction Firewall/ IPDS/VPN Endpoint Security
Privilege Account Management Cloud Access Security Broker File/BigData Firewall Network Access Control
Identity Lifecycle Management Application Security Testing Database Firewall Network & Devices Security Testing
Software Inventory & Configuration Infrastructure Inventory & Configuration
Identity Analytics Data Discovery & Classification
Management Management
INFRASTRUCTURE SERVICES
Security Policy Public-Key Encryption
LDAP/RADIUS/ TACACS+ Infrastructure Monitoring Logs & Events Collection IT Service Management
Monitoring Infrastructure Management
M.Tech Products Mapping
GOVERNANCE, RISK MANAGEMENT & COMPLIANCE
Security Policy Regulatory & Compliance Business Continuity
Audit Management Risk Management Vendor Management
Management Management Management
SECURITY TRAINING PLATFORM SECURITY OPERATIONS MANAGEMENT
Threat Intelligence Vulnerability Behavioral Incident Response
Security Test/Lab SIEM Forensic
Management Analysis Mgmt.
SECURITY TECHNOLOGIES
APPLICATION & PROCESS DATA & INFORMATION INFRATRUCTURE
IDENTITY & ACCESS Application Monitoring Enterprise Digital Rights Management Network Package Capture & Analysis
User Activity Monitoring Fraud Prevention Content-Aware Data Leak Prevention Advanced Threat Prevention
Identity Proofing Application Firewall/Shielding Data Encryption/Tokenization Proxy/Isolation
Access Management and Single-Sign Data LifeCycle Management Mobile Device
Software Lifecycle Management DoS Protection
On Management
n-Factor Authentication Cloud Access Security Broker Data Masking/Redaction Firewall/
Endpoint Security
IPDS/VPN
Privilege Account Management Application Gateway File/BigData Firewall Network Access Control
Identity Lifecycle Management Application Security Testing Database Firewall Network & Devices Security Testing
Software Inventory & Configuration Infrastructure Inventory &
Identity Analytics Data Discovery & Classification
Management Configuration Management
INFRASTRUCTURE SERVICES
LDAP/RADIUS/ Infrastructure Logs & Events Security Policy Public-Key Encryption IT Service
TACACS+ Monitoring Collection Enforcement Infrastructure Management Management
Target Profile: Government Basic/Mandatory Advanced Optional
GOVERNANCE, RISK MANAGEMENT & COMPLIANCE
Security Policy Regulatory & Compliance Business Continuity
Audit Management Risk Management Vendor Management
Management Management Management
SECURITY TRAINING PLATFORM SECURITY OPERATIONS MANAGEMENT
Security Test/Lab Threat Intelligence SIEM Vulnerability Management Behavioral Analysis Incident Response Mgmt. Forensic
SECURITY TECHNOLOGIES
DATA & INFORMATION INFRATRUCTURE
IDENTITY & ACCESS APPLICATION & PROCESS Enterprise Digital Rights Management Network Package Capture & Analysis
User Activity Monitoring Application Monitoring Content-Aware Data Leak Prevention Advanced Threat Prevention
Identity Proofing Fraud Prevention Data Encryption/Tokenization Inbound/Outbound Gateway
Access Management and Single-Sign On Application Firewall/Shielding Data LifeCycle Management DoS Protection Mobile Device Mgmt
n-Factor Authentication Software Lifecycle Management Data Masking/Redaction Firewall/ IPDS/VPN Endpoint Security
Privilege Account Management Cloud Access Security Broker File/BigData Firewall Network Access Control
Identity Lifecycle Management Application Security Testing Database Firewall Network & Devices Security Testing
Software Inventory & Configuration Infrastructure Inventory & Configuration
Identity Analytics Data Discovery & Classification
Management Management
INFRASTRUCTURE SERVICES
Security Policy Public-Key Encryption
LDAP/RADIUS/ TACACS+ Infrastructure Monitoring Logs & Events Collection IT Service Management
Monitoring Infrastructure Management
© M.Tech Group 2019. All rights reserved.