Security KB

Knowledge Wiki

13 pages · 4 knowledge sources

Knowledge Sources

(4)

PDF Document

CIS_Controls__v8__Critical_Security_Controls__2023_08

CIS Critical Security Controls Version 8 is a prioritized cybersecurity framework developed by industry experts to provide organizations with actionable, community-driven guidance for securing digital environments. It outlines 18 foundational controls—such as asset inventory, data protection, and incident response—which are supported by specific safeguards, procedures, and implementation strategies. The document also includes a technical glossary and licensing guidelines to facilitate the non-commercial adoption of these security standards across various enterprise types.

PDF Document

NIST.SP.1299

The NIST Cybersecurity Framework (CSF) 2.0 provides a comprehensive structure for organizations to manage and reduce cybersecurity risk through six core functions: Govern, Identify, Protect, Detect, Respond, and Recover. This guide introduces key components like Organizational Profiles and Tiers to help entities assess their current security posture and prioritize improvements. Additionally, it offers a suite of supplementary resources, such as Quick Start Guides and implementation examples, to help diverse organizations integrate the framework into their broader risk management strategies.

PDF Document

NIST.CSWP.29

The NIST Cybersecurity Framework (CSF) 2.0 provides flexible, non-prescriptive guidance for organizations of all sizes and sectors to manage, prioritize, and communicate cybersecurity risks. Utilizing three main components—the Core, Organizational Profiles, and Tiers—this updated version places a new emphasis on governance and supply chain risks while offering expanded online resources for practical implementation.

PDF Document

240_enisa_secure_by_design_and_default_playbook_v04

The ENISA "Security by Design and Default Playbook" provides SMEs with practical, actionable guidance for embedding cybersecurity throughout a product's lifecycle, from initial design to decommissioning. It features structured playbooks mapped to the EU Cyber Resilience Act and introduces Machine-Readable Security Manifests (MRSM) to help resource-constrained teams automate security validation. By offering clear architectural and operational frameworks, the guide enables small businesses to implement robust security controls while ensuring regulatory compliance and transparency.

Wiki Overview

Knowledge Graph

13 pages · 0 connections

Summary
Overview
Deep Dive
Entity
Click a node to open the page · Scroll to zoom

Overview Pages

All Pages

ENISA Secure by Design and Default OverviewTOPIC OVERVIEW

Introduction to the ENISA Secure by Design and Default Playbook, designed to help SMEs embed cybersecurity throughout the product lifecycle. It emphasizes structured architectural frameworks and regulatory compliance.

CIS Critical Security Controls v8 OverviewTOPIC OVERVIEW

Overview of the CIS Critical Security Controls Version 8, a prioritized set of foundational controls designed to secure digital environments. It outlines the community-driven approach to actionable cyber defense.

NIST Cybersecurity Framework 2.0 OverviewTOPIC OVERVIEW

An introduction to the NIST Cybersecurity Framework (CSF) 2.0, providing a flexible and non-prescriptive structure for managing cybersecurity risks across diverse organizations. It introduces the Core, Organizational Profiles, and Implementation Tiers.

Cybersecurity Strategies for SMEsDEEP DIVE

Tailored strategies combining ENISA playbooks, NIST Quick Start Guides, and CIS Implementation Groups to help small and medium enterprises secure their environments. It focuses on maximizing security ROI with limited resources.

ENISA Security Lifecycle PlaybooksDEEP DIVE

Actionable guidance from ENISA for implementing robust security controls from initial design to product decommissioning. These playbooks provide SMEs with practical steps to manage engineering and operational security.

Machine-Readable Security Manifests (MRSM)ENTITY

Explores the concept of Machine-Readable Security Manifests (MRSM), an ENISA-recommended tool for automating security validation. MRSMs are especially valuable for resource-constrained teams seeking efficiency and transparency.

EU Cyber Resilience ActENTITY

An overview of the EU Cyber Resilience Act and its regulatory implications for product security. It discusses how frameworks like ENISA's playbooks help businesses ensure compliance with these European standards.

NIST CSF 2.0: Governance and Supply Chain RiskDEEP DIVE

An exploration of the newly emphasized 'Govern' function and supply chain risk management components in NIST CSF 2.0. It highlights how organizations can align cybersecurity with broader enterprise risk management.

The 18 CIS Critical Security ControlsENTITY

A comprehensive listing and description of the 18 CIS Critical Security Controls, ranging from enterprise asset inventory to incident response management. Each control includes specific safeguards and procedures.

CIS Implementation Groups (IGs)ENTITY

Details the CIS Implementation Groups (IGs), which help organizations prioritize control adoption based on their size, risk profile, and available resources. It guides enterprises on scaling non-commercial security standards.

NIST CSF Core FunctionsDEEP DIVE

A detailed breakdown of the six core functions of NIST CSF 2.0: Govern, Identify, Protect, Detect, Respond, and Recover. This guide explains how these functions interact to form a comprehensive risk management strategy.

NIST CSF Profiles and TiersENTITY

Explains NIST CSF Organizational Profiles and Implementation Tiers. These tools help entities assess their current security posture, define target states, and prioritize cybersecurity investments.