misp-galaxy/clusters/nice-framework-competency_a...

82 lines
5.9 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters!

This file contains ambiguous Unicode characters that may be confused with others in your current locale. If your use case is intentional and legitimate, you can safely ignore this warning. Use the Escape button to highlight these characters.

{
"authors": [
"NIST",
"Jean-Louis Huynen"
],
"category": "workforce",
"description": "Competency areas based on the NIST NICE framework",
"name": "NICE Competency areas",
"source": "https://csrc.nist.gov/pubs/sp/800/181/r1/final",
"type": "nice-framework-competency_areas",
"uuid": "91696bc7-ede9-4875-8814-768bd5c99c66",
"values": [
{
"description": "This Competency Area describes a learners capabilities to improve and maintain the security of Operational Technology (OT) systems while addressing their unique performance, reliability, and safety requirements.",
"related": [],
"uuid": "b1658e7f-bcfd-5100-a17d-f94c109ca552",
"value": "This Competency Area describes a learners capabilities to improve and maintain the security of Operational Technology (OT) systems while addressing t - NF-COM-010"
},
{
"description": "This Competency Area describes a learners capabilities to analyze and control digital and physical risks presented by technology products or services purchased from parties outside your organization.",
"related": [],
"uuid": "7c89be28-ac79-51ee-b62c-df33c371f613",
"value": "This Competency Area describes a learners capabilities to analyze and control digital and physical risks presented by technology products or services - NF-COM-011"
},
{
"description": "This Competency Area describes a learners capabilities to install, administer, troubleshoot, backup, and conduct recovery of Operating Systems (OS), including in simulated environments.",
"related": [],
"uuid": "c3fb0728-7db4-59e6-b6c0-d1cca586ef6e",
"value": "This Competency Area describes a learners capabilities to install, administer, troubleshoot, backup, and conduct recovery of Operating Systems (OS), - NF-COM-009"
},
{
"description": "This Competency Area describes a learners capability related to architecting, designing, developing, implementing, and maintaining the trustworthiness of systems that use or are enabled by cyber resources in order to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises that use or are enabled by cyber resources.",
"related": [],
"uuid": "ddf2e1b8-56d8-5553-ba0e-291dbaff59ae",
"value": "This Competency Area describes a learners capability related to architecting, designing, developing, implementing, and maintaining the trustworthines - NF-COM-007"
},
{
"description": "This Competency Area describes a learners capabilities to integrate security as a shared responsibility throughout the development, security, and operations (DevSecOps) life cycle of technologies.",
"related": [],
"uuid": "f5697a53-c4b7-51e5-84fa-86f6df705fa7",
"value": "This Competency Area describes a learners capabilities to integrate security as a shared responsibility throughout the development, security, and ope - NF-COM-008"
},
{
"description": "This Competency Area describes a learners capabilities to secure the transmissions, broadcasting, switching, control, and operation of communications and related network infrastructures.",
"related": [],
"uuid": "408d10be-0abd-5d1b-b63b-c71e4d0db1a2",
"value": "This Competency Area describes a learners capabilities to secure the transmissions, broadcasting, switching, control, and operation of communications - NF-COM-005"
},
{
"description": "This Competency Area describes a learners capabilities to transform data using cryptographic processes to ensure it can only be read by the person who is authorized to access it.",
"related": [],
"uuid": "116b4db6-2836-5f25-a04d-7eaa679e790f",
"value": "This Competency Area describes a learners capabilities to transform data using cryptographic processes to ensure it can only be read by the person wh - NF-COM-006"
},
{
"description": "This Competency Area describes a learners capabilities to conduct and maintain an accurate inventory of all digital assets, to include identifying, developing, operating, maintaining, upgrading, and disposing of assets.",
"related": [],
"uuid": "f5ad1aef-b82b-5680-9773-28e219c4dd27",
"value": "This Competency Area describes a learners capabilities to conduct and maintain an accurate inventory of all digital assets, to include identifying, d - NF-COM-003"
},
{
"description": "This Competency Area describes a learners capabilities to protect cloud data, applications, and infrastructure from internal and external threats.",
"related": [],
"uuid": "fba7a20e-d646-550b-b413-4e7dd35defeb",
"value": "This Competency Area describes a learners capabilities to protect cloud data, applications, and infrastructure from internal and external threats. - NF-COM-004"
},
{
"description": "This Competency Area describes a learners capabilities to define, manage, and monitor the roles and secure access privileges of who is authorized to access protected data and resources and understand the impact of different types of access controls.",
"related": [],
"uuid": "9af5d9ff-5221-584f-abf3-12cb5bc9df18",
"value": "This Competency Area describes a learners capabilities to define, manage, and monitor the roles and secure access privileges of who is authorized to - NF-COM-001"
},
{
"description": "This Competency Area describes a learners capabilities to secure Artificial Intelligence (AI) against cyberattacks, to ensure it is adequately contained where it is used, and to mitigate the threat AI presents where it or its users have malicious intent.",
"related": [],
"uuid": "9f3d059b-73ae-557d-a928-c3ac62f06b8f",
"value": "This Competency Area describes a learners capabilities to secure Artificial Intelligence (AI) against cyberattacks, to ensure it is adequately contai - NF-COM-002"
}
],
"version": 1
}