- T0084: Employ secure configuration management processes
- T0542: Translate proposed capabilities into technical requirements
- T1010: Communicate enterprise information technology architecture
- T1019: Determine special needs of cyber-physical systems
- T1020: Determine the operational and safety impacts of cybersecurity lapses
- T1027: Integrate organizational goals and objectives into security architecture
- T1029: Implement organizational evaluation and validation criteria
- T1077: Assess the organization's cybersecurity architecture
- T1096: Perform privacy impact assessments (PIAs)
- T1100: Configure network hubs, routers, and switches
- T1101: Optimize network hubs, routers, and switches
- T1122: Determine essential system capabilities and business functions
- T1123: Prioritize essential system capabilities and business functions
- T1124: Restore essential system capabilities and business functions after catastrophic failure events
- T1125: Define system availability levels
- T1126: Determine disaster recovery and continuity of operations system requirements
- T1151: Develop cybersecurity designs for systems and networks with multilevel security requirements
- T1152: Develop cybersecurity designs for systems and networks that require processing of multiple data classification levels
- T1153: Integrate cybersecurity designs for systems and networks
- T1168: Define acquisition life cycle cybersecurity architecture requirements
- T1169: Define acquisition life cycle systems security engineering requirements
- T1179: Determine if systems and architecture are consistent with cybersecurity architecture guidelines
- T1263: Perform security reviews
- T1264: Identify gaps in security architecture
- T1265: Develop a cybersecurity risk management plan
- T1293: Advise on security requirements to be included in statements of work
- T1294: Advise on Risk Management Framework process activities and documentation
- T1361: Determine the impact of new system and interface implementations on organization's cybersecurity posture
- T1362: Document impact of new system and interface implementations on organization's cybersecurity posture
- T1363: Plan system security development
- T1364: Conduct system security development
- T1403: Allocate cybersecurity services
- T1404: Select cybersecurity mechanisms
- T1410: Develop system security contexts
- T1423: Create system security concept of operations (ConOps) documents
- T1426: Determine cybersecurity design and architecture effectiveness
- T1434: Create cybersecurity architecture functional specifications
- T1507: Determine user requirements
- T1508: Plan cybersecurity architecture
- T1519: Design system security measures
- T1520: Update system security measures
- T1521: Develop enterprise architecture
- T1527: Define baseline system security requirements
- T1544: Create definition activity documentation
- T1545: Create architecture activity documentation
- T1556: Identify system and network protection needs
- T1563: Implement system security measures
- T1583: Determine effectiveness of system implementation and testing processes
- T1627: Conduct cybersecurity management assessments
- T1628: Design cybersecurity management functions
- K0018: Knowledge of encryption algorithms
- K0055: Knowledge of microprocessors
- K0092: Knowledge of technology integration processes
- K0646: Knowledge of system optimization techniques
- K0674: Knowledge of computer networking protocols
- K0675: Knowledge of risk management processes
- K0676: Knowledge of cybersecurity laws and regulations
- K0677: Knowledge of cybersecurity policies and procedures
- K0678: Knowledge of privacy laws and regulations
- K0679: Knowledge of privacy policies and procedures
- K0680: Knowledge of cybersecurity principles and practices
- K0681: Knowledge of privacy principles and practices
- K0682: Knowledge of cybersecurity threats
- K0683: Knowledge of cybersecurity vulnerabilities
- K0684: Knowledge of cybersecurity threat characteristics
- K0685: Knowledge of access control principles and practices
- K0686: Knowledge of authentication and authorization tools and techniques
- K0687: Knowledge of business operations standards and best practices
- K0688: Knowledge of common application vulnerabilities
- K0689: Knowledge of network infrastructure principles and practices
- K0690: Knowledge of requirements analysis principles and practices
- K0691: Knowledge of cyber defense tools and techniques
- K0692: Knowledge of vulnerability assessment tools and techniques
- K0694: Knowledge of computer algorithm capabilities and applications
- K0698: Knowledge of cryptographic key management principles and practices
- K0707: Knowledge of database systems and software
- K0709: Knowledge of business continuity and disaster recovery (BCDR) policies and procedures
- K0710: Knowledge of enterprise cybersecurity architecture principles and practices
- K0714: Knowledge of electrical engineering principles and practices
- K0718: Knowledge of network communications principles and practices
- K0719: Knowledge of human-computer interaction (HCI) principles and practices
- K0720: Knowledge of Security Assessment and Authorization (SA&A) processes
- K0727: Knowledge of analysis standards and best practices
- K0728: Knowledge of Confidentiality, Integrity and Availability (CIA) principles and practices
- K0729: Knowledge of non-repudiation principles and practices
- K0730: Knowledge of cyber safety principles and practices
- K0731: Knowledge of systems security engineering (SSE) principles and practices
- K0736: Knowledge of information technology (IT) security principles and practices
- K0739: Knowledge of mathematics principles and practices
- K0742: Knowledge of identity and access management (IAM) principles and practices
- K0743: Knowledge of new and emerging technologies
- K0744: Knowledge of operating system (OS) systems and software
- K0745: Knowledge of parallel and distributed computing principles and practices
- K0749: Knowledge of process engineering principles and practices
- K0751: Knowledge of system threats
- K0752: Knowledge of system vulnerabilities
- K0753: Knowledge of remote access principles and practices
- K0756: Knowledge of security management principles and practices
- K0757: Knowledge of system design tools and techniques
- K0758: Knowledge of server administration principles and practices
- K0759: Knowledge of client and server architecture
- K0765: Knowledge of software engineering principles and practices
- K0768: Knowledge of automated systems analysis tools and techniques
- K0772: Knowledge of systems testing and evaluation tools and techniques
- K0773: Knowledge of telecommunications principles and practices
- K0778: Knowledge of enterprise information technology (IT) architecture principles and practices
- K0779: Knowledge of systems engineering processes
- K0791: Knowledge of defense-in-depth principles and practices
- K0814: Knowledge of secure coding tools and techniques
- K0835: Knowledge of risk assessment principles and practices
- K0836: Knowledge of threat assessment principles and practices
- K0839: Knowledge of critical infrastructure systems and software
- K0840: Knowledge of hardware reverse engineering tools and techniques
- K0842: Knowledge of software reverse engineering tools and techniques
- K0846: Knowledge of secure software deployment principles and practices
- K0847: Knowledge of secure software deployment tools and techniques
- K0848: Knowledge of network systems management principles and practices
- K0849: Knowledge of network systems management tools and techniques
- K0851: Knowledge of reverse engineering principles and practices
- K0859: Knowledge of encryption tools and techniques
- K0865: Knowledge of data classification standards and best practices
- K0866: Knowledge of data classification tools and techniques
- K0868: Knowledge of process improvement principles and practices
- K0869: Knowledge of process maturity models and frameworks
- K0870: Knowledge of enterprise architecture (EA) reference models and frameworks
- K0871: Knowledge of enterprise architecture (EA) principles and practices
- K0872: Knowledge of service management principles and practices
- K0873: Knowledge of service management standards and best practices
- K0874: Knowledge of key management service (KMS) principles and practices
- K0875: Knowledge of symmetric encryption principles and practices
- K0876: Knowledge of key management service (KMS) key rotation policies and procedures
- K0877: Knowledge of application firewall principles and practices
- K0878: Knowledge of network firewall principles and practices
- K0891: Knowledge of the Open Systems Interconnect (OSI) reference model
- K0894: Knowledge of computer architecture principles and practices
- K0906: Knowledge of multi-level security (MLS) systems and software
- K0907: Knowledge of cross-domain solutions
- K0915: Knowledge of network architecture principles and practices
- K0917: Knowledge of Personally Identifiable Information (PII) data security standards and best practices
- K0918: Knowledge of Payment Card Industry (PCI) data security standards and best practices
- K0919: Knowledge of Personal Health Information (PHI) data security standards and best practices
- K0921: Knowledge of program protection plan (PPP) principles and practices
- K0927: Knowledge of configuration management tools and techniques
- K0928: Knowledge of systems engineering principles and practices
- K0933: Knowledge of N-tier architecture principles and practices
- K0934: Knowledge of data classification policies and procedures
- K0942: Knowledge of cryptology principles and practices
- K0947: Knowledge of computer engineering principles and practices
- K0948: Knowledge of embedded systems and software
- K0949: Knowledge of fault tolerance tools and techniques
- K0952: Knowledge of information theory principles and practices
- K0983: Knowledge of computer networking principles and practices
- K1014: Knowledge of network security principles and practices
- K1049: Knowledge of routing protocols
- K1080: Knowledge of secure software update principles and practices
- K1081: Knowledge of secure firmware update principles and practices
- K1086: Knowledge of design modeling
- K1095: Knowledge of design methods
- K1110: Knowledge of acquisition cybersecurity requirements
- K1111: Knowledge of application security design principles and practices
- K1120: Knowledge of Confidentiality, Integrity, Availability, Authenticity, and Non-repudiation (CIAAN) principles and practices
- K1137: Knowledge of cybersecurity requirements
- K1143: Knowledge of data classification levels
- K1159: Knowledge of fail-over or alternate site requirements
- K1169: Knowledge of material supportability requirements
- K1173: Knowledge of multilevel security requirements
- K1194: Knowledge of Personally Identifiable Information (PII) attributes
- K1212: Knowledge of security controls
- K1216: Knowledge of service-oriented security architecture practices and principles
- K1223: Knowledge of system backup requirements
- K1236: Knowledge of user requirements
- S0141: Skill in assessing security systems designs
- S0172: Skill in applying secure coding techniques
- S0383: Skill in analyzing an organization's enterprise information technology architecture
- S0385: Skill in communicating complex concepts
- S0386: Skill in communicating verbally
- S0387: Skill in communicating in writing
- S0418: Skill in applying secure network architectures
- S0419: Skill in designing systems
- S0428: Skill in designing architectures
- S0429: Skill in designing frameworks
- S0430: Skill in collaborating with others
- S0458: Skill in coordinating efforts between stakeholders
- S0465: Skill in identifying critical infrastructure systems
- S0466: Skill in identifying systems designed without security considerations
- S0543: Skill in scanning for vulnerabilities
- S0544: Skill in recognizing vulnerabilities
- S0551: Skill in applying information technologies into proposed solutions
- S0569: Skill in designing security controls
- S0570: Skill in designing the integration of hardware solutions
- S0571: Skill in designing the integration of software solutions
- S0574: Skill in developing security system controls
- S0578: Skill in evaluating security designs
- S0590: Skill in building use cases
- S0596: Skill in encrypting network communications
- S0598: Skill in creating test plans
- S0613: Skill in configuring software-based computer protection tools
- S0632: Skill in designing Test and Evaluation Strategies (TES)
- S0637: Skill in designing multi-level security solutions
- S0638: Skill in designing cross-domain solutions
- S0655: Skill in designing secure test plans
- S0657: Skill in implementing Public Key Infrastructure (PKI) encryption
- S0658: Skill in implementing digital signatures
- S0659: Skill in applying security models
- S0673: Skill in translating operational requirements into security controls
- S0674: Skill in installing system and component upgrades
- S0675: Skill in optimizing system performance
- S0683: Skill in implementing network segregation
- S0685: Skill in configuring computer protection components
- S0686: Skill in performing risk assessments
- S0728: Skill in preparing briefings
- S0762: Skill in integrating organization objectives
- S0791: Skill in presenting to an audience
- S0813: Skill in identifying cybersecurity issues in external connections
- S0814: Skill in identifying privacy issues in partner interconnections
- S0822: Skill in collaborating with stakeholders
- S0853: Skill in performing cybersecurity architecture analysis
- S0880: Skill in performing security architecture analysis
- S0893: Skill in performing user needs analysis
Source: Workforce Framework for Cybersecurity (NICE Framework) (NIST SP 800-181 Rev 1) (Version: 2.0.0)