Establish that your organization conducts organization wide identification of common controls and the development of organizationally tailored control baselines, reducing the workload on individual system owners and the cost of system development and asset protection.

More Uses of the Cyber hygiene Toolkit:

  • Ensure your technical chops should be that you build proofs of concept yourself or direct others to do so based on your designs.
  • Direct: review and validates findings during security testing engagements.
  • Ensure you lead loud infrastructure management, with emphasis on AWS.
  • Supervise: map cyber assets to missions and users.
  • Make sure that your organization process, inspect, cleanse, transform, and model data to discover useful information, informing conclusions, and supporting decision making.
  • Formulate: partner with engineering leaders to drive efficient software development practices.
  • Manage knowledge and regular maintenance of Active Directory and Group Policy.
  • Maintain and develop the existing client base through marketing and direct sales activities.
  • Ensure your organization sales development representative.
  • Audit: competency with sales tracking tools.
  • Steer: document system architectures to support the cyber analysis, identification, selection, and tailoring of security and privacy controls necessary to protect the system.
  • Ensure your organization supports the integration of privacy risk management processes into the RMF to better support the clients privacy protection needs.
  • Develop: mission mapping identifying all asset dependencies.
  • Ensure you recommend and implement process improvements as necessary to facilitate team and stakeholder collaboration and improve cybersecurity operations.
  • Prioritize assets as Mission Critical, Mission Essential, and Mission Support.
  • Organize: cyber IT Specialist mission analysis support.
  • Govern: own complex and innovative features from concept to release, setting specific requirements and direction.
  • Configure firewall and antivirus systems to meet current standards and best practice.
  • Provide front end security support for software, data, and network systems for your organization.
  • Identify existing shortfalls to provide cyber situational awareness.
  • Be certain that your organization conducts security infrastructure testing using manual and automated tools.
  • Be accountable for building and managing infrastructure that requires high availability and security.


Categories: Articles