Cybersecurity Architecture

Responsible for ensuring that security requirements are adequately addressed in all aspects of enterprise architecture, including reference models, segment and solution architectures, and the resulting systems that protect and support organizational mission and business processes.

  • T0084: Employ secure configuration management processes
  • T0542: Translate proposed capabilities into technical requirements
  • T1010: Communicate enterprise information technology architecture
  • T1019: Determine special needs of cyber-physical systems
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1027: Integrate organizational goals and objectives into security architecture
  • T1029: Implement organizational evaluation and validation criteria
  • T1077: Assess the organization's cybersecurity architecture
  • T1096: Perform privacy impact assessments (PIAs)
  • T1100: Configure network hubs, routers, and switches
  • T1101: Optimize network hubs, routers, and switches
  • T1122: Determine essential system capabilities and business functions
  • T1123: Prioritize essential system capabilities and business functions
  • T1124: Restore essential system capabilities and business functions after catastrophic failure events
  • T1125: Define system availability levels
  • T1126: Determine disaster recovery and continuity of operations system requirements
  • T1151: Develop cybersecurity designs for systems and networks with multilevel security requirements
  • T1152: Develop cybersecurity designs for systems and networks that require processing of multiple data classification levels
  • T1153: Integrate cybersecurity designs for systems and networks
  • T1168: Define acquisition life cycle cybersecurity architecture requirements
  • T1169: Define acquisition life cycle systems security engineering requirements
  • T1179: Determine if systems and architecture are consistent with cybersecurity architecture guidelines
  • T1263: Perform security reviews
  • T1264: Identify gaps in security architecture
  • T1265: Develop a cybersecurity risk management plan
  • T1293: Advise on security requirements to be included in statements of work
  • T1294: Advise on Risk Management Framework process activities and documentation
  • T1361: Determine the impact of new system and interface implementations on organization's cybersecurity posture
  • T1362: Document impact of new system and interface implementations on organization's cybersecurity posture
  • T1363: Plan system security development
  • T1364: Conduct system security development
  • T1403: Allocate cybersecurity services
  • T1404: Select cybersecurity mechanisms
  • T1410: Develop system security contexts
  • T1423: Create system security concept of operations (ConOps) documents
  • T1426: Determine cybersecurity design and architecture effectiveness
  • T1434: Create cybersecurity architecture functional specifications
  • T1507: Determine user requirements
  • T1508: Plan cybersecurity architecture
  • T1519: Design system security measures
  • T1520: Update system security measures
  • T1521: Develop enterprise architecture
  • T1527: Define baseline system security requirements
  • T1544: Create definition activity documentation
  • T1545: Create architecture activity documentation
  • T1556: Identify system and network protection needs
  • T1563: Implement system security measures
  • T1583: Determine effectiveness of system implementation and testing processes
  • T1627: Conduct cybersecurity management assessments
  • T1628: Design cybersecurity management functions