Skip to content

Commit 5cb8dcd

Browse files
committed
update Cybersecurity Primer
1 parent ce19eb2 commit 5cb8dcd

1 file changed

Lines changed: 3 additions & 1 deletion

File tree

src/content/posts/cybersecurity-primer.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -174,6 +174,8 @@ Access Control patterns
174174

175175
Every system must be Assessed and Authorized. An Authority to Operate (ATO) specifies the controls that must be implemented.
176176

177+
Assessment is control assessment. Is a control implemented? Prove it, trace it, don't make assumptions.
178+
177179
System is defined by a boundary and what is in it.
178180

179181
- Information types
@@ -192,7 +194,7 @@ Controls are the safeguards or countermeasures prescribed for an information sys
192194
- Inheritance makes this manageable
193195
- Informally, a control, simply asks a question.
194196

195-
Risk Assessment
197+
Risk Assessment (not Control Assessment)
196198

197199
- Threat
198200
- Impact

0 commit comments

Comments
 (0)