Domain 1 Emphasize Ethics Emphasize authenticity and nonrepudiation (properties of Integrity) Change “ global ” context to “ holistic ” context (legal and regulatory requirements) Move Investigation types here from Domain 7 Change SCA to Control assessments (security and privacy) Remove Asset valuation from risk management Mention Risk maturity modeling Use the term, Supply Chain Risk Management (SCRM) Mention social engineering, phishing, security champions , and gamification Domain 2 Use the term, asset handling requirements Move Provision resources securely here from Domain 7 Specify data lifecycle Emphasize asset retention (EOL, EOS) Identify Data protection methods Move Digital Rights Management (DRM) here from Domani 3 Domain 3 Specify secure design principles Identify 15 (add 7 more) vulnerabilities of architectures, designs, and solution elements. ( Microservices , Containerization , Serverless , High-Performance Computing systems , Edge computing s...
Comments
Post a Comment