Mapping Against Cybersecurity Frameworks

  • Scott E. Donaldson
  • Stanley G. Siegel
  • Chris K. Williams
  • Abdul Aslam

Abstract

While designing an effective enterprise cybersecurity architecture is an admirable goal in and of itself, no architecture lives in a vacuum and being able to map to other cybersecurity frameworks is an important part of making sure the enterprise’s cybersecurity program is complete, and demonstrating that completeness to outside observers. This chapter details how an enterprise cybersecurity program can be mapped against other cybersecurity frameworks, some of which were introduced in  Chapter 2. There are three main reasons for mapping an enterprise cybersecurity program against other frameworks:

Copyright information

© Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, and Abdul Aslam 2015

Authors and Affiliations

  • Scott E. Donaldson
    • 1
  • Stanley G. Siegel
    • 1
  • Chris K. Williams
    • 1
  • Abdul Aslam
    • 1
  1. 1.VAUnited States

Personalised recommendations