this post was submitted on 23 Jun 2023
6 points (100.0% liked)

cybersecurity

5899 readers
50 users here now

An umbrella community for all things cybersecurity / infosec. News, research, questions, are all welcome!

Community Rules

Enjoy!

founded 2 years ago
MODERATORS
 

Anyone familiar/have experience with conducting a Crown Jewels Analysis (CJA)? MITRE's SEG ("Systems Engineering Guide") has a process for doing this (page 167) but there are certainly other methodologies. Am working on something like this so any anecdotes would be cool to hear about!

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here