Security Functions
1 Governance, Risk & Compliance (GRC)
- Security policies, standards, procedures
- Risk assessments & risk treatment
- Regulatory compliance (ISO 27001, NIST, PCI, SOX, GDPR, etc.
- Third-party / vendor risk
- Metrics, reporting to management
2. Security Architecture & Engineering
- Security architecture & design
- Secure system / cloud / network design
- Security tooling selection
- Zero Trust, IAM architecture
- Security patterns & blueprints
3. Identity & Access Management (IAM)
- User lifecycle (joiner/mover/leaver)
- Authentication & authorization
- Privileged Access Management (PAM)
- MFA, SSO, role models
- Access reviews & certifications
4. Application Security (AppSec / DevSecOps)
- Secure SDLC
- Code reviews (SAST/DAST/SCA)
- Threat modeling
- CI/CD security
- API & web security
5. Infrastructure & Platform Security
- Server, OS, database security
- Network security (firewalls, segmentation)
- Cloud security (AWS/GCP/Azure)
- Container & Kubernetes security
- Hardening & baseline configuration
6. Security Operations (SecOps / SOC)
- Security monitoring (SIEM)
- Incident detection & response
- Threat hunting
- Log management
- Use-case development
7. Incident Response & Digital Forensics
- Incident handling & coordination
- Containment, eradication, recovery
- Forensics & evidence handling
- Root cause analysis
- Post-incident lessons learned
8. Vulnerability & Exposure Management
- Vulnerability scanning
- Penetration testing
- Patch management oversight
- Risk-based remediation
- Attack surface management
9. Data Security & Privacy
- Responsibilities
- Data classification
- Encryption & key management
- DLP
- Privacy controls & DPIAs
- Data retention & disposal
10. Business Continuity & Resilience
- BCP & DR
- Backup security
- Ransomware preparedness
- Crisis management
- Availability & resilience testing
11. Security Awareness & Culture
- Awareness programs
- Phishing simulations
- Secure behavior training
- Insider risk reduction
12. Physical & Environmental Security
- Facility access control
- Data center security
- CCTV & monitoring
- Environmental controls
13. Third-Party & Supply Chain Security
- Vendor security assessments
- Contractual security clauses
- Ongoing monitoring
- Cloud/SaaS risk management
14. Security Strategy & Leadership (CISO Office)
- Security strategy & roadmap
- Budget & resource planning
- Executive communication
- Program maturity & alignment with business