Cybersecurity Architecture
Responsible for ensuring that security requirements are adequately addressed in all aspects of enterprise architecture, including reference models, segment and solution architectures, and the resulting systems that protect and support organizational mission and business processes.
- T0084: Employ secure configuration management processes
- T0542: Translate proposed capabilities into technical requirements
- T1010: Communicate enterprise information technology architecture
- T1019: Determine special needs of cyber-physical systems
- T1020: Determine the operational and safety impacts of cybersecurity lapses
- T1027: Integrate organizational goals and objectives into security architecture
- T1029: Implement organizational evaluation and validation criteria
- T1077: Assess the organization's cybersecurity architecture
- T1096: Perform privacy impact assessments (PIAs)
- T1100: Configure network hubs, routers, and switches
- T1101: Optimize network hubs, routers, and switches
- T1122: Determine essential system capabilities and business functions
- T1123: Prioritize essential system capabilities and business functions
- T1124: Restore essential system capabilities and business functions after catastrophic failure events
- T1125: Define system availability levels
- T1126: Determine disaster recovery and continuity of operations system requirements
- T1151: Develop cybersecurity designs for systems and networks with multilevel security requirements
- T1152: Develop cybersecurity designs for systems and networks that require processing of multiple data classification levels
- T1153: Integrate cybersecurity designs for systems and networks
- T1168: Define acquisition life cycle cybersecurity architecture requirements
- T1169: Define acquisition life cycle systems security engineering requirements
- T1179: Determine if systems and architecture are consistent with cybersecurity architecture guidelines
- T1263: Perform security reviews
- T1264: Identify gaps in security architecture
- T1265: Develop a cybersecurity risk management plan
- T1293: Advise on security requirements to be included in statements of work
- T1294: Advise on Risk Management Framework process activities and documentation
- T1361: Determine the impact of new system and interface implementations on organization's cybersecurity posture
- T1362: Document impact of new system and interface implementations on organization's cybersecurity posture
- T1363: Plan system security development
- T1364: Conduct system security development
- T1403: Allocate cybersecurity services
- T1404: Select cybersecurity mechanisms
- T1410: Develop system security contexts
- T1423: Create system security concept of operations (ConOps) documents
- T1426: Determine cybersecurity design and architecture effectiveness
- T1434: Create cybersecurity architecture functional specifications
- T1507: Determine user requirements
- T1508: Plan cybersecurity architecture
- T1519: Design system security measures
- T1520: Update system security measures
- T1521: Develop enterprise architecture
- T1527: Define baseline system security requirements
- T1544: Create definition activity documentation
- T1545: Create architecture activity documentation
- T1556: Identify system and network protection needs
- T1563: Implement system security measures
- T1583: Determine effectiveness of system implementation and testing processes
- T1627: Conduct cybersecurity management assessments
- T1628: Design cybersecurity management functions
- K0018: Knowledge of encryption algorithms
- K0055: Knowledge of microprocessors
- K0092: Knowledge of technology integration processes
- K0646: Knowledge of system optimization techniques
- K0674: Knowledge of computer networking protocols
- K0675: Knowledge of risk management processes
- K0676: Knowledge of cybersecurity laws and regulations
- K0677: Knowledge of cybersecurity policies and procedures
- K0678: Knowledge of privacy laws and regulations
- K0679: Knowledge of privacy policies and procedures
- K0680: Knowledge of cybersecurity principles and practices
- K0681: Knowledge of privacy principles and practices
- K0682: Knowledge of cybersecurity threats
- K0683: Knowledge of cybersecurity vulnerabilities
- K0684: Knowledge of cybersecurity threat characteristics
- K0685: Knowledge of access control principles and practices
- K0686: Knowledge of authentication and authorization tools and techniques
- K0687: Knowledge of business operations standards and best practices
- K0688: Knowledge of common application vulnerabilities
- K0689: Knowledge of network infrastructure principles and practices
- K0690: Knowledge of requirements analysis principles and practices
- K0691: Knowledge of cyber defense tools and techniques
- K0692: Knowledge of vulnerability assessment tools and techniques
- K0694: Knowledge of computer algorithm capabilities and applications
- K0698: Knowledge of cryptographic key management principles and practices
- K0707: Knowledge of database systems and software
- K0709: Knowledge of business continuity and disaster recovery (BCDR) policies and procedures
- K0710: Knowledge of enterprise cybersecurity architecture principles and practices
- K0714: Knowledge of electrical engineering principles and practices
- K0718: Knowledge of network communications principles and practices
- K0719: Knowledge of human-computer interaction (HCI) principles and practices
- K0720: Knowledge of Security Assessment and Authorization (SA&A) processes
- K0727: Knowledge of analysis standards and best practices
- K0728: Knowledge of Confidentiality, Integrity and Availability (CIA) principles and practices
- K0729: Knowledge of non-repudiation principles and practices
- K0730: Knowledge of cyber safety principles and practices
- K0731: Knowledge of systems security engineering (SSE) principles and practices
- K0736: Knowledge of information technology (IT) security principles and practices
- K0739: Knowledge of mathematics principles and practices
- K0742: Knowledge of identity and access management (IAM) principles and practices
- K0743: Knowledge of new and emerging technologies
- K0744: Knowledge of operating system (OS) systems and software
- K0745: Knowledge of parallel and distributed computing principles and practices
- K0749: Knowledge of process engineering principles and practices
- K0751: Knowledge of system threats
- K0752: Knowledge of system vulnerabilities
- K0753: Knowledge of remote access principles and practices
- K0756: Knowledge of security management principles and practices
- K0757: Knowledge of system design tools and techniques
- K0758: Knowledge of server administration principles and practices
- K0759: Knowledge of client and server architecture
- K0765: Knowledge of software engineering principles and practices
- K0768: Knowledge of automated systems analysis tools and techniques
- K0772: Knowledge of systems testing and evaluation tools and techniques
- K0773: Knowledge of telecommunications principles and practices
- K0778: Knowledge of enterprise information technology (IT) architecture principles and practices
- K0779: Knowledge of systems engineering processes
- K0791: Knowledge of defense-in-depth principles and practices
- K0814: Knowledge of secure coding tools and techniques
- K0835: Knowledge of risk assessment principles and practices
- K0836: Knowledge of threat assessment principles and practices
- K0839: Knowledge of critical infrastructure systems and software
- K0840: Knowledge of hardware reverse engineering tools and techniques
- K0842: Knowledge of software reverse engineering tools and techniques
- K0846: Knowledge of secure software deployment principles and practices
- K0847: Knowledge of secure software deployment tools and techniques
- K0848: Knowledge of network systems management principles and practices
- K0849: Knowledge of network systems management tools and techniques
- K0851: Knowledge of reverse engineering principles and practices
- K0859: Knowledge of encryption tools and techniques
- K0865: Knowledge of data classification standards and best practices
- K0866: Knowledge of data classification tools and techniques
- K0868: Knowledge of process improvement principles and practices
- K0869: Knowledge of process maturity models and frameworks
- K0870: Knowledge of enterprise architecture (EA) reference models and frameworks
- K0871: Knowledge of enterprise architecture (EA) principles and practices
- K0872: Knowledge of service management principles and practices
- K0873: Knowledge of service management standards and best practices
- K0874: Knowledge of key management service (KMS) principles and practices
- K0875: Knowledge of symmetric encryption principles and practices
- K0876: Knowledge of key management service (KMS) key rotation policies and procedures
- K0877: Knowledge of application firewall principles and practices
- K0878: Knowledge of network firewall principles and practices
- K0891: Knowledge of the Open Systems Interconnect (OSI) reference model
- K0894: Knowledge of computer architecture principles and practices
- K0906: Knowledge of multi-level security (MLS) systems and software
- K0907: Knowledge of cross-domain solutions
- K0915: Knowledge of network architecture principles and practices
- K0917: Knowledge of Personally Identifiable Information (PII) data security standards and best practices
- K0918: Knowledge of Payment Card Industry (PCI) data security standards and best practices
- K0919: Knowledge of Personal Health Information (PHI) data security standards and best practices
- K0921: Knowledge of program protection plan (PPP) principles and practices
- K0927: Knowledge of configuration management tools and techniques
- K0928: Knowledge of systems engineering principles and practices
- K0933: Knowledge of N-tier architecture principles and practices
- K0934: Knowledge of data classification policies and procedures
- K0942: Knowledge of cryptology principles and practices
- K0947: Knowledge of computer engineering principles and practices
- K0948: Knowledge of embedded systems and software
- K0949: Knowledge of fault tolerance tools and techniques
- K0952: Knowledge of information theory principles and practices
- K0983: Knowledge of computer networking principles and practices
- K1014: Knowledge of network security principles and practices
- K1049: Knowledge of routing protocols
- K1080: Knowledge of secure software update principles and practices
- K1081: Knowledge of secure firmware update principles and practices
- K1086: Knowledge of design modeling
- K1095: Knowledge of design methods
- K1110: Knowledge of acquisition cybersecurity requirements
- K1111: Knowledge of application security design principles and practices
- K1120: Knowledge of Confidentiality, Integrity, Availability, Authenticity, and Non-repudiation (CIAAN) principles and practices
- K1137: Knowledge of cybersecurity requirements
- K1143: Knowledge of data classification levels
- K1159: Knowledge of fail-over or alternate site requirements
- K1169: Knowledge of material supportability requirements
- K1173: Knowledge of multilevel security requirements
- K1194: Knowledge of Personally Identifiable Information (PII) attributes
- K1212: Knowledge of security controls
- K1216: Knowledge of service-oriented security architecture practices and principles
- K1223: Knowledge of system backup requirements
- K1236: Knowledge of user requirements
- S0141: Skill in assessing security systems designs
- S0172: Skill in applying secure coding techniques
- S0383: Skill in analyzing an organization's enterprise information technology architecture
- S0385: Skill in communicating complex concepts
- S0386: Skill in communicating verbally
- S0387: Skill in communicating in writing
- S0418: Skill in applying secure network architectures
- S0419: Skill in designing systems
- S0428: Skill in designing architectures
- S0429: Skill in designing frameworks
- S0430: Skill in collaborating with others
- S0458: Skill in coordinating efforts between stakeholders
- S0465: Skill in identifying critical infrastructure systems
- S0466: Skill in identifying systems designed without security considerations
- S0543: Skill in scanning for vulnerabilities
- S0544: Skill in recognizing vulnerabilities
- S0551: Skill in applying information technologies into proposed solutions
- S0569: Skill in designing security controls
- S0570: Skill in designing the integration of hardware solutions
- S0571: Skill in designing the integration of software solutions
- S0574: Skill in developing security system controls
- S0578: Skill in evaluating security designs
- S0590: Skill in building use cases
- S0596: Skill in encrypting network communications
- S0598: Skill in creating test plans
- S0613: Skill in configuring software-based computer protection tools
- S0632: Skill in designing Test and Evaluation Strategies (TES)
- S0637: Skill in designing multi-level security solutions
- S0638: Skill in designing cross-domain solutions
- S0655: Skill in designing secure test plans
- S0657: Skill in implementing Public Key Infrastructure (PKI) encryption
- S0658: Skill in implementing digital signatures
- S0659: Skill in applying security models
- S0673: Skill in translating operational requirements into security controls
- S0674: Skill in installing system and component upgrades
- S0675: Skill in optimizing system performance
- S0683: Skill in implementing network segregation
- S0685: Skill in configuring computer protection components
- S0686: Skill in performing risk assessments
- S0728: Skill in preparing briefings
- S0762: Skill in integrating organization objectives
- S0791: Skill in presenting to an audience
- S0813: Skill in identifying cybersecurity issues in external connections
- S0814: Skill in identifying privacy issues in partner interconnections
- S0822: Skill in collaborating with stakeholders
- S0853: Skill in performing cybersecurity architecture analysis
- S0880: Skill in performing security architecture analysis
- S0893: Skill in performing user needs analysis
Source: Workforce Framework for Cybersecurity (NICE Framework) (NIST SP 800-181 Rev 1) (Version: 1.0.0)