podział etapów ochrony organizacji

Cybersecurity Components
Poland

Identify

Governance
Risk Assessment
Compliance
Configuration Management
Vulnerability Scanning
Penetration Testing
Asset Management

Detect

Security Information and Event Management (SIEM) & Analytics
Intrusion Detection / Prevention System (IDS/IPS)
Vulnerability Scanning
Wireless Intrusion Detection System (IDS)
Endpoint Detection & Response (EDR)
Host Intrusion Detection System (HIDS)
Endpoint Data Lost Prevention (EDLP)
Edge Data Lost Prevention (Edge DLP)
Edge Antimalware
Security Sockets Layer (SSL) Decryption
Network Management System (NMS)
File Integrity Monitoring (FIM)
Baselining
Threat Hunting
Threat Intelligence Feeds
Deception / Honeypots
Code Analysis

Protect

Firewalls / Access Control Lists (ACLs)
Remote Access Virtual Private Network (VPN)
Endpoint Protection (EP)
Email Antimalware
Intrusion Prevention (IPS)
Web Filtering
Asset Management
Network Access Control (NAC)
Mobile Device Management (MDM)
Identity and Access Management (IDAM)
Single-Sign-On (SSO)
Multi-Factor Authentication (MFA)
Privileged Access Management (PAM)
IDAM Governance
Endpoint Encryption (EE)
Database Audit Monitoring
Device Authentication
Web Application Firewall (WAF)
Database Encryption
Cloud Access Security Broker (CASB)
Application Segmentation
Public Key Infrastructure (PKI)
Key Management
Distributed Denial of Service (DDoS) Protection
Application Whitelisting

Respond

Incident Response & Recovery
Endpoint Detection & Response
eDiscovery / Forensics

Recover

Disaster Recovery Planning
Incident Response & Recovery