Skip to content

Commit

Permalink
add: [nist-nice] Initial commit for NIST NICE framework
Browse files Browse the repository at this point in the history
Introduces galaxies for cybersecurity:
 - Work roles
 - Skills
 - Tasks
 - Knowledges
 - Competency areas
 - OPM codes
  • Loading branch information
gallypette committed Jul 24, 2024
1 parent 284671e commit fe01d62
Show file tree
Hide file tree
Showing 14 changed files with 44,823 additions and 0 deletions.
81 changes: 81 additions & 0 deletions clusters/nice-framework-competency_areas.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,81 @@
{
"authors": [
"NIST",
"Jean-Louis Huynen"
],
"category": "workforce",
"description": "Competency areas based on the NIST NICE framework",
"name": "NICE Competency areas",
"source": "https://csrc.nist.gov/pubs/sp/800/181/r1/final",
"type": "nice-framework-competency_areas",
"uuid": "91696bc7-ede9-4875-8814-768bd5c99c66",
"values": [
{
"description": "This Competency Area describes a learner’s capabilities to improve and maintain the security of Operational Technology (OT) systems while addressing their unique performance, reliability, and safety requirements.",
"related": [],
"uuid": "b1658e7f-bcfd-5100-a17d-f94c109ca552",
"value": "This Competency Area describes a learner’s capabilities to improve and maintain the security of Operational Technology (OT) systems while addressing t - NF-COM-010"
},
{
"description": "This Competency Area describes a learner’s capabilities to analyze and control digital and physical risks presented by technology products or services purchased from parties outside your organization.",
"related": [],
"uuid": "7c89be28-ac79-51ee-b62c-df33c371f613",
"value": "This Competency Area describes a learner’s capabilities to analyze and control digital and physical risks presented by technology products or services - NF-COM-011"
},
{
"description": "This Competency Area describes a learner’s capabilities to install, administer, troubleshoot, backup, and conduct recovery of Operating Systems (OS), including in simulated environments.",
"related": [],
"uuid": "c3fb0728-7db4-59e6-b6c0-d1cca586ef6e",
"value": "This Competency Area describes a learner’s capabilities to install, administer, troubleshoot, backup, and conduct recovery of Operating Systems (OS), - NF-COM-009"
},
{
"description": "This Competency Area describes a learner’s capability related to architecting, designing, developing, implementing, and maintaining the trustworthiness of systems that use or are enabled by cyber resources in order to anticipate, withstand, recover from, and adapt to adverse conditions, stresses, attacks, or compromises that use or are enabled by cyber resources.",
"related": [],
"uuid": "ddf2e1b8-56d8-5553-ba0e-291dbaff59ae",
"value": "This Competency Area describes a learner’s capability related to architecting, designing, developing, implementing, and maintaining the trustworthines - NF-COM-007"
},
{
"description": "This Competency Area describes a learner’s capabilities to integrate security as a shared responsibility throughout the development, security, and operations (DevSecOps) life cycle of technologies.",
"related": [],
"uuid": "f5697a53-c4b7-51e5-84fa-86f6df705fa7",
"value": "This Competency Area describes a learner’s capabilities to integrate security as a shared responsibility throughout the development, security, and ope - NF-COM-008"
},
{
"description": "This Competency Area describes a learner’s capabilities to secure the transmissions, broadcasting, switching, control, and operation of communications and related network infrastructures.",
"related": [],
"uuid": "408d10be-0abd-5d1b-b63b-c71e4d0db1a2",
"value": "This Competency Area describes a learner’s capabilities to secure the transmissions, broadcasting, switching, control, and operation of communications - NF-COM-005"
},
{
"description": "This Competency Area describes a learner’s capabilities to transform data using cryptographic processes to ensure it can only be read by the person who is authorized to access it.",
"related": [],
"uuid": "116b4db6-2836-5f25-a04d-7eaa679e790f",
"value": "This Competency Area describes a learner’s capabilities to transform data using cryptographic processes to ensure it can only be read by the person wh - NF-COM-006"
},
{
"description": "This Competency Area describes a learner’s capabilities to conduct and maintain an accurate inventory of all digital assets, to include identifying, developing, operating, maintaining, upgrading, and disposing of assets.",
"related": [],
"uuid": "f5ad1aef-b82b-5680-9773-28e219c4dd27",
"value": "This Competency Area describes a learner’s capabilities to conduct and maintain an accurate inventory of all digital assets, to include identifying, d - NF-COM-003"
},
{
"description": "This Competency Area describes a learner’s capabilities to protect cloud data, applications, and infrastructure from internal and external threats.",
"related": [],
"uuid": "fba7a20e-d646-550b-b413-4e7dd35defeb",
"value": "This Competency Area describes a learner’s capabilities to protect cloud data, applications, and infrastructure from internal and external threats. - NF-COM-004"
},
{
"description": "This Competency Area describes a learner’s capabilities to define, manage, and monitor the roles and secure access privileges of who is authorized to access protected data and resources and understand the impact of different types of access controls.",
"related": [],
"uuid": "9af5d9ff-5221-584f-abf3-12cb5bc9df18",
"value": "This Competency Area describes a learner’s capabilities to define, manage, and monitor the roles and secure access privileges of who is authorized to - NF-COM-001"
},
{
"description": "This Competency Area describes a learner’s capabilities to secure Artificial Intelligence (AI) against cyberattacks, to ensure it is adequately contained where it is used, and to mitigate the threat AI presents where it or its users have malicious intent.",
"related": [],
"uuid": "9f3d059b-73ae-557d-a928-c3ac62f06b8f",
"value": "This Competency Area describes a learner’s capabilities to secure Artificial Intelligence (AI) against cyberattacks, to ensure it is adequately contai - NF-COM-002"
}
],
"version": 1
}
Loading

0 comments on commit fe01d62

Please sign in to comment.