Penetration Testing with Kali Linux
PWK - Copyright © 2023 OffSec Services Limited. All rights reserved.
53
Risk Assessment). These categories, in turn, include subcategories that consist of statements
describing the outcome of improved security and which are aligned with Information References.
These references go into deeper detail about possible technical implementations. For example,
Subcategory ID.BE-1 (Function: Identify, Category: Business Environment) states “The
organization’s role in the supply chain is identified and communicated.”
The Framework Implementation Tiers specify the degree to which an organization’s
Cybersecurity practices satisfy the outcome described by the subcategories of the Framework
Core. There are four such Tiers: partial (the least degree), risk informed, repeatable, and adaptive.
Framework Profiles refer to the relationship between the present implementation of an
organization’s cybersecurity activities (Current Profile) and their desired outcome (Target Profile),
which is determined by the organization’s business objectives, requirements, controls and risk
appetite. The comparison of these profiles can help the organization perform a gap analysis, as
well as understand and prioritize the work required to fill it.
ATT3CK
and D3FEND: The MITRE
103
organization has tabulated and organized a framework for
cataloging how groups of attackers work together to infiltrate systems and achieve their goals.
This framework, called the
Yüklə
Dostları ilə paylaş: