Difference between revisions of "Cybersecurity Frameworks, Architectures & Roadmaps"
| Line 13: | Line 13: | ||
* [http://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program/Standards FIPS 140-2 Security Requirements for Cryptographic Modules] | * [http://csrc.nist.gov/Projects/Cryptographic-Module-Validation-Program/Standards FIPS 140-2 Security Requirements for Cryptographic Modules] | ||
* [http://securityintelligence.com/how-stix-taxii-and-cybox-can-help-with-standardizing-threat-information/ How STIX, TAXII and CybOX Can Help With Standardizing Threat Information] | * [http://securityintelligence.com/how-stix-taxii-and-cybox-can-help-with-standardizing-threat-information/ How STIX, TAXII and CybOX Can Help With Standardizing Threat Information] | ||
| − | * [http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=cti OASIS Cyber Threat Intelligence (CTI) TC] | + | * [http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=cti OASIS Cyber Threat Intelligence (CTI) TC] [http://openc2.org/ OpenC2] |
* [http://www.dhs.gov/using-cybersecurity-framework Using the Cybersecurity Framework] | * [http://www.dhs.gov/using-cybersecurity-framework Using the Cybersecurity Framework] | ||
Revision as of 22:02, 31 July 2018
- Cybersecurity
- Government Services
- Capabilities
- NIST Cybersecurity Framework - consists of standards, guidelines, and best practices to manage cybersecurity-related risk.
- NIST FedRAMP security for the cloud
- United States Computer Emergency Readiness Team (US-CERT)
- Cybersecurity Reference Architecture | Microsoft
- ISO/IEC 15408-1 ISO/IEC Information Technology Task Force (ITTF)
- FIPS 140-2 Security Requirements for Cryptographic Modules
- How STIX, TAXII and CybOX Can Help With Standardizing Threat Information
- OASIS Cyber Threat Intelligence (CTI) TC OpenC2
- Using the Cybersecurity Framework
Not necessarily restricted to artificial intelligence-based solutions.