8
Knowledge
Knowledge of authentication, authorization, and access control methods.
Core KSAT for the following Work Roles
No Work Roles with Core KSAT 8 |
Additional KSAT for the following Work Roles
Uses data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events that occur within their environments for the purposes of mitigating threats.
Designs enterprise and systems security throughout the development lifecycle; translates technology and environmental conditions (e.g., law and regulation) into security designs and processes.