Cisco Security Architecture Framework
GPTKB entity
Statements (70)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Security Framework
|
gptkbp:addresses |
Threat Landscape
|
gptkbp:aimsTo |
Protect Information Assets
|
gptkbp:designedFor |
Enterprise Security
|
gptkbp:developedBy |
gptkb:Cisco_Systems
|
gptkbp:enhances |
Incident Response
|
gptkbp:facilitates |
Security Assessments
|
gptkbp:focusesOn |
Risk Management
|
gptkbp:hasCollaboratedWith |
Academic Institutions
Industry Associations Security Vendors |
https://www.w3.org/2000/01/rdf-schema#label |
Cisco Security Architecture Framework
|
gptkbp:includes |
Network Security
Data Protection Cloud Security Application Security Security Policies Endpoint Security Security Processes Identity_and_Access_Management Security_Technologies |
gptkbp:integratesWith |
Network Infrastructure
|
gptkbp:isAccessibleBy |
Various Industries
|
gptkbp:isAssignedTo |
Industry Standards
Business Objectives Cybersecurity Frameworks |
gptkbp:isAttendedBy |
Government Agencies
|
gptkbp:isBasedOn |
Best Practices
|
gptkbp:isDesignedFor |
Mitigate Risks
|
gptkbp:isDocumentedIn |
Cisco_Security_Guides
Cisco_Whitepapers |
gptkbp:isEnhancedBy |
Emerging Technologies
Feedback Mechanisms Automation_Technologies |
gptkbp:isEvaluatedBy |
Performance Reviews
Security Audits Compliance Checks Third-Party Assessments Security Metrics |
gptkbp:isFocusedOn |
Continuous_Improvement
|
gptkbp:isInformedBy |
Regulatory Requirements
User Feedback Security Trends |
gptkbp:isIntegratedWith |
Threat Intelligence
|
gptkbp:isPartOf |
gptkb:Cisco_Security_Solutions
|
gptkbp:isPromotedBy |
Cisco_Partners
|
gptkbp:isPromotedThrough |
gptkb:Cisco_Webinars
Stakeholders Industry Conferences Online Resources Cisco_Training_Programs |
gptkbp:isReferencedIn |
Security_Research
|
gptkbp:isReviewedBy |
Industry Experts
|
gptkbp:isSupportedBy |
gptkb:Cisco_Security_Products
Security Tools Technical Documentation Community Resources Security Frameworks |
gptkbp:isUpdatedBy |
Cisco_Security_Team
|
gptkbp:isUsedBy |
Security Professionals
|
gptkbp:isUtilizedFor |
Security Training
Security Planning |
gptkbp:isUtilizedIn |
gptkb:Security_Operations_Centers
Incident Management Risk Assessments |
gptkbp:promotes |
Security Best Practices
|
gptkbp:provides |
Guidelines for Implementation
Framework for Security Architecture |
gptkbp:supports |
Compliance Requirements
|
gptkbp:utilizes |
Defense in Depth Strategy
|