Cybersecurity is the management practice governing all of the digital equipment and software, executing and available to execute, on connected corporeal, virtual, and cloud devices, within a proprietary process domain, to enable and limit the use of the equipment and software to achieve designed and intended purposes under the [CIA] rubric of information confidentiality, integrity, and availability.
This management requires:
- Discovery and description – enumeration – of all hardware and software process elements, protocols, and connection interfaces between them, in the processing domain.
- Understanding the operational potential and optimal technical configuration of all hardware and software elements and connection protocols in the processing domain.
- Diagnosis and assessment of versions and upgrade state for all elements to compare against known exploit vulnerabilities and to recommend potential patching.
- Minimizing threat exposure through configuration recommendations that remove access to services and ports from all unauthorized sources, and specifically grant access to services and ports, on a least-privilege basis, to authorized sources.
- Identification and removal of any unauthorized out-of-band processes.
- Fluency in the tools and methods used to expose and analyze the above requirements.