Security Resiliency Matrix
First Steps
Security Fundamentals
Security Fundamentals
Fundamental
Vulnerability Management
Vulnerability Assessment
Patching
Network Security
Local Server Firewalls
Secure Wireless
Perimeter Firewalls
Log Collection & Review
Logs Collected Locally
Data & Asset Inventory
Server Inventory
Identity & Access Management
Remote Access MFA
Endpoint Management
Data Inventory
Password Manager
Data Protection
Email & Phishing Defense
Antivirus
Simple Local Backups
Security Awareness & Training
Security Awareness Training
Policy & Incident Management
Know Compliance Requirements
Written Information Security Plan
Written Information Security Policy
Incident Response Plan
Enhance and Enforce
Vulnerability Management
Quarterly Vulnerability Scanning
Network Security
Network Segmentation
Guest Wireless
Log Collection & Review
Logs Collected Centrally
Data & Asset Inventory
Data Flow Diagrams
Identity & Access Management
Administrative MFA
Data Protection
Offsite Backups
Endpoint Detection and Response (EDR)
Security Awareness & Training
Security Awareness Training
Incident Response Training
Policy & Incident Management
Security Leadership
Cyberliability Insurance
Validate and Sustain
Vulnerability Management
Security Maturity Assessment
IT Risk Management
Penetration Testing
Network Security
Advanced Firewalling
Web Application Firewall (WAF)
Activity Correlation Engine
Log Collection & Review
Security Operations Center (SOC)
Data & Asset Inventory
Data Governance
Identity & Access Management
Enterprise MFA
Data Protection
Single Sign On (SSO)
Disaster Recovery Planning
Security Awareness & Training
Security Awareness Training
Red/Purple Team Exercises