this post was submitted on 23 Jun 2023
1 points (100.0% liked)

Cybersecurity

75 readers
19 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Rules

Community Rules

founded 1 year ago
MODERATORS
 

Anyone familiar/have experience with conducting a Crown Jewels Analysis (CJA)? MITRE’s SEG (“Systems Engineering Guide”) has a process for doing this (page 167) but there are certainly other methodologies. Am working on something like this so any anecdotes would be cool to hear about!

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here