0% found this document useful (0 votes)
100 views7 pages

# MTVN - Security Framework

Uploaded by

viti_93
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
100 views7 pages

# MTVN - Security Framework

Uploaded by

viti_93
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Security Framework & Products Mapping

© M.Tech Group 2019. All rights reserved.


Digital
CyberSecurity Forensic
Incident
Framework Response Assessment,
Report

Identify • Asset Management (AM)


(ID) • Business Environment (BE)
• Governance (GV)
• Risk Assessment (RA) Monitor, Threat
• Risk Management Strategy (RM) Alert Hunting

Protect • Access Control (AC)


(PR) • Awareness Training (AT)
• Data Security (DS)
• Information Protection & Procedures (IP) Filter, Standardize, Enrich, Correlate
• Maintenance (MA) Risk Packet Threat IDS
• Protective Technology (PT) Asset Data Data
Log Data Data
Data Endpoint
Data Correlated Data
Flow Access
Trend Server Data
Data DLP
Data Data
Data SSL Visibility Data
Detect • Anomalies and Event (AE)
(DE) • Security Continuous Monitoring (CM) Log
• Detection Process (DP) Collection Packet
Capture
DDoS Prevention
Access
Anti-Malware Endpoint
Response • Response Planning (RP) Monitorin Data Loss
Analysis
(RS) • Communication (CO) g Prevention
• Analysis (AN)
• Mitigation (MI) IDS/IPS
• Improvement (IM) Risk & Compliance Mgmt Encryption
App. User
Monitorin Data Behavioral
Firewall Vulnerability Identity &
g Discovery & Analysis
Mgmt Access
Recovery • Recovery Planning (RP)
Classification
Mgmt
(RC) • Improvements (IM)
• Communication (CO)

Network Network IT Asset


Identity & Remote Honey
Monitoring Access Mgmt
Access Connection Pot
Control Analytic /VPN
Technology Blueprint
GOVERNANCE, RISK MANAGEMENT & COMPLIANCE
Security Policy Regulatory & Compliance Business Continuity
Audit Management Risk Management Vendor Management
Management Management Management

SECURITY TRAINING PLATFORM SECURITY OPERATIONS MANAGEMENT


Security Test/Lab Threat Intelligence SIEM Vulnerability Behavioral Analysis Incident Response Mgmt. Forensic
Management

SECURITY TECHNOLOGIES

DATA & INFORMATION INFRATRUCTURE

IDENTITY & ACCESS APPLICATION & PROCESS Enterprise Digital Rights Management Network Package Capture & Analysis

User Activity Monitoring Application Monitoring Content-Aware Data Leak Prevention Advanced Threat Prevention

Identity Proofing Fraud Prevention Data Encryption/Tokenization Inbound/Outbound Gateway

Access Management and Single-Sign On Data LifeCycle Management Mobile Device


Application Firewall/Shielding DoS Protection
Mgmt

n-Factor Authentication Software Lifecycle Management Data Masking/Redaction Firewall/


Endpoint Security
IPDS/VPN

Privilege Account Management Cloud Access Security Broker File/BigData Firewall Network Access Control

Identity Lifecycle Management Application Security Testing Database Firewall Network & Devices Security Testing

Software Inventory & Configuration Infrastructure Inventory & Configuration


Identity Analytics Data Discovery & Classification
Management Management

INFRASTRUCTURE SERVICES
Security Policy Public-Key Encryption
LDAP/RADIUS/ TACACS+ Infrastructure Monitoring Logs & Events Collection IT Service Management
Monitoring Infrastructure Management
Target Profile: FSI Basic/Mandatory Advanced Optional

GOVERNANCE, RISK MANAGEMENT & COMPLIANCE


Security Policy Regulatory & Compliance Business Continuity
Audit Management Risk Management Vendor Management
Management Management Management

SECURITY TRAINING PLATFORM SECURITY OPERATIONS MANAGEMENT


Security Test/Lab Threat Intelligence SIEM Vulnerability Management Behavioral Analysis Incident Response Mgmt. Forensic

SECURITY TECHNOLOGIES

DATA & INFORMATION INFRATRUCTURE

IDENTITY & ACCESS APPLICATION & PROCESS Enterprise Digital Rights Management Network Package Capture & Analysis

User Activity Monitoring Application Monitoring Content-Aware Data Leak Prevention Advanced Threat Prevention

Identity Proofing Fraud Prevention Data Encryption/Tokenization Inbound/Outbound Gateway

Access Management and Single-Sign On Application Firewall/Shielding Data LifeCycle Management DoS Protection Mobile Device Mgmt

n-Factor Authentication Software Lifecycle Management Data Masking/Redaction Firewall/ IPDS/VPN Endpoint Security

Privilege Account Management Cloud Access Security Broker File/BigData Firewall Network Access Control

Identity Lifecycle Management Application Security Testing Database Firewall Network & Devices Security Testing

Software Inventory & Configuration Infrastructure Inventory & Configuration


Identity Analytics Data Discovery & Classification
Management Management

INFRASTRUCTURE SERVICES
Security Policy Public-Key Encryption
LDAP/RADIUS/ TACACS+ Infrastructure Monitoring Logs & Events Collection IT Service Management
Monitoring Infrastructure Management
M.Tech Products Mapping
GOVERNANCE, RISK MANAGEMENT & COMPLIANCE
Security Policy Regulatory & Compliance Business Continuity
Audit Management Risk Management Vendor Management
Management Management Management

SECURITY TRAINING PLATFORM SECURITY OPERATIONS MANAGEMENT


Threat Intelligence Vulnerability Behavioral Incident Response
Security Test/Lab SIEM Forensic
Management Analysis Mgmt.

SECURITY TECHNOLOGIES
APPLICATION & PROCESS DATA & INFORMATION INFRATRUCTURE

IDENTITY & ACCESS Application Monitoring Enterprise Digital Rights Management Network Package Capture & Analysis

User Activity Monitoring Fraud Prevention Content-Aware Data Leak Prevention Advanced Threat Prevention

Identity Proofing Application Firewall/Shielding Data Encryption/Tokenization Proxy/Isolation

Access Management and Single-Sign Data LifeCycle Management Mobile Device


Software Lifecycle Management DoS Protection
On Management

n-Factor Authentication Cloud Access Security Broker Data Masking/Redaction Firewall/


Endpoint Security
IPDS/VPN

Privilege Account Management Application Gateway File/BigData Firewall Network Access Control

Identity Lifecycle Management Application Security Testing Database Firewall Network & Devices Security Testing

Software Inventory & Configuration Infrastructure Inventory &


Identity Analytics Data Discovery & Classification
Management Configuration Management

INFRASTRUCTURE SERVICES
LDAP/RADIUS/ Infrastructure Logs & Events Security Policy Public-Key Encryption IT Service
TACACS+ Monitoring Collection Enforcement Infrastructure Management Management
Target Profile: Government Basic/Mandatory Advanced Optional

GOVERNANCE, RISK MANAGEMENT & COMPLIANCE


Security Policy Regulatory & Compliance Business Continuity
Audit Management Risk Management Vendor Management
Management Management Management

SECURITY TRAINING PLATFORM SECURITY OPERATIONS MANAGEMENT


Security Test/Lab Threat Intelligence SIEM Vulnerability Management Behavioral Analysis Incident Response Mgmt. Forensic

SECURITY TECHNOLOGIES

DATA & INFORMATION INFRATRUCTURE

IDENTITY & ACCESS APPLICATION & PROCESS Enterprise Digital Rights Management Network Package Capture & Analysis

User Activity Monitoring Application Monitoring Content-Aware Data Leak Prevention Advanced Threat Prevention

Identity Proofing Fraud Prevention Data Encryption/Tokenization Inbound/Outbound Gateway

Access Management and Single-Sign On Application Firewall/Shielding Data LifeCycle Management DoS Protection Mobile Device Mgmt

n-Factor Authentication Software Lifecycle Management Data Masking/Redaction Firewall/ IPDS/VPN Endpoint Security

Privilege Account Management Cloud Access Security Broker File/BigData Firewall Network Access Control

Identity Lifecycle Management Application Security Testing Database Firewall Network & Devices Security Testing

Software Inventory & Configuration Infrastructure Inventory & Configuration


Identity Analytics Data Discovery & Classification
Management Management

INFRASTRUCTURE SERVICES
Security Policy Public-Key Encryption
LDAP/RADIUS/ TACACS+ Infrastructure Monitoring Logs & Events Collection IT Service Management
Monitoring Infrastructure Management
© M.Tech Group 2019. All rights reserved.

You might also like