• T0084: Employ secure configuration management processes
  • T0542: Translate proposed capabilities into technical requirements
  • T1010: Communicate enterprise information technology architecture
  • T1019: Determine special needs of cyber-physical systems
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1027: Integrate organizational goals and objectives into security architecture
  • T1029: Implement organizational evaluation and validation criteria
  • T1077: Assess the organization's cybersecurity architecture
  • T1096: Perform privacy impact assessments (PIAs)
  • T1100: Configure network hubs, routers, and switches
  • T1101: Optimize network hubs, routers, and switches
  • T1122: Determine essential system capabilities and business functions
  • T1123: Prioritize essential system capabilities and business functions
  • T1124: Restore essential system capabilities and business functions after catastrophic failure events
  • T1125: Define system availability levels
  • T1126: Determine disaster recovery and continuity of operations system requirements
  • T1151: Develop cybersecurity designs for systems and networks with multilevel security requirements
  • T1152: Develop cybersecurity designs for systems and networks that require processing of multiple data classification levels
  • T1153: Integrate cybersecurity designs for systems and networks
  • T1168: Define acquisition life cycle cybersecurity architecture requirements
  • T1169: Define acquisition life cycle systems security engineering requirements
  • T1179: Determine if systems and architecture are consistent with cybersecurity architecture guidelines
  • T1263: Perform security reviews
  • T1264: Identify gaps in security architecture
  • T1265: Develop a cybersecurity risk management plan
  • T1293: Advise on security requirements to be included in statements of work
  • T1294: Advise on Risk Management Framework process activities and documentation
  • T1361: Determine the impact of new system and interface implementations on organization's cybersecurity posture
  • T1362: Document impact of new system and interface implementations on organization's cybersecurity posture
  • T1363: Plan system security development
  • T1364: Conduct system security development
  • T1403: Allocate cybersecurity services
  • T1404: Select cybersecurity mechanisms
  • T1410: Develop system security contexts
  • T1423: Create system security concept of operations (ConOps) documents
  • T1426: Determine cybersecurity design and architecture effectiveness
  • T1434: Create cybersecurity architecture functional specifications
  • T1507: Determine user requirements
  • T1508: Plan cybersecurity architecture
  • T1519: Design system security measures
  • T1520: Update system security measures
  • T1521: Develop enterprise architecture
  • T1527: Define baseline system security requirements
  • T1544: Create definition activity documentation
  • T1545: Create architecture activity documentation
  • T1556: Identify system and network protection needs
  • T1563: Implement system security measures
  • T1583: Determine effectiveness of system implementation and testing processes
  • T1627: Conduct cybersecurity management assessments
  • T1628: Design cybersecurity management functions