resources.infosecinstitute.com
Open in
urlscan Pro
162.159.135.42
Public Scan
Submitted URL: https://click.e.infosecinstitute.com/?qs=c5b2cfc7bd83099ad227bb841c8048807d2b3702dafe755f989a58243bfc7d30fa905d26dbd0f790400dc7023c5b...
Effective URL: https://resources.infosecinstitute.com/topic/what-is-the-difference-between-the-nice-framework-and-dodd-8140-8570/?utm_source=marketing...
Submission: On April 19 via api from US — Scanned from DE
Effective URL: https://resources.infosecinstitute.com/topic/what-is-the-difference-between-the-nice-framework-and-dodd-8140-8570/?utm_source=marketing...
Submission: On April 19 via api from US — Scanned from DE
Form analysis
2 forms found in the DOMhttps://resources.infosecinstitute.com
<form class="position-relative" action="https://resources.infosecinstitute.com">
<input type="text" placeholder="Search" name="s">
<button type="submit" class="fas fa-search"></button>
<div class="fas fa-times close-search" id="close-search"></div>
</form>
POST https://resources.infosecinstitute.com/wp-comments-post.php
<form action="https://resources.infosecinstitute.com/wp-comments-post.php" method="post" id="commentform" class="comment-form">
<p class="comment-notes"><span id="email-notes">Your email address will not be published.</span> <span class="required-field-message" aria-hidden="true">Required fields are marked <span class="required" aria-hidden="true">*</span></span></p>
<p class="comment-form-comment"><label for="comment">Comment <span class="required" aria-hidden="true">*</span></label> <textarea id="comment" name="comment" cols="45" rows="8" maxlength="65525" required="required"></textarea></p>
<p class="comment-form-author"><label for="author">Name <span class="required" aria-hidden="true">*</span></label> <input id="author" name="author" type="text" value="" size="30" maxlength="245" required="required"></p>
<p class="comment-form-email"><label for="email">Email <span class="required" aria-hidden="true">*</span></label> <input id="email" name="email" type="text" value="" size="30" maxlength="100" aria-describedby="email-notes" required="required"></p>
<p class="comment-form-url"><label for="url">Website</label> <input id="url" name="url" type="text" value="" size="30" maxlength="200"></p>
<p class="form-submit"><input name="submit" type="submit" id="submit" class="submit" value="Post Comment"> <input type="hidden" name="comment_post_ID" value="54989" id="comment_post_ID">
<input type="hidden" name="comment_parent" id="comment_parent" value="0">
</p>
</form>
Text Content
* Boot camps & training * Awareness & anti-phishing * Community * * * * Topics * Certification Prep * Cyber Work * About us * * * Back * Industry insights * Phishing * Hacking * Capture the flag (CTF) * Professional development * Security awareness * Penetration testing * Cyber ranges * General security * Management & compliance * Malware analysis * MITRE ATT&CK™ * News * Application security * Digital forensics * View all * * Back * * * Back * (ISC)² CISSP * (ISC)² CCSP * (ISC)² CSSLP * Cisco CCNA * CMMC * CompTIA A+ * CompTIA Network+ * CompTIA Security+ * CompTIA CySA+ * CompTIA CASP+ * EC-Council CEH * ISACA CDPSE * ISACA CGEIT * ISACA CISA * ISACA CISM * ISACA CRISC * Microsoft Azure * PMP * Other * View all * * Back * Cyber Work Podcast * Cyber Work Applied * Cyber Work Live * * Back * Contact us * Contributors 1. Topics 2. NICE Framework 3. What is the difference between the NICE framework and DoDD 8140/8570? NICE Framework WHAT IS THE DIFFERENCE BETWEEN THE NICE FRAMEWORK AND DODD 8140/8570? December 30, 2020 by Greg Belding Share: AddThis Sharing Buttons Share to FacebookFacebookShare to TwitterTwitterShare to RedditRedditShare to LinkedInLinkedIn For those looking into government work, or for those just plain interested in the different cybersecurity frameworks out there, have probably encountered two framework names almost daily — NICE Framework and DoDD 8140/8570. These frameworks are important, trusted cybersecurity frameworks that touch different parts of government work, but to only know this is barely even the tip of the iceberg. This article will detail the NICE Framework and DoDD 8140/8570. We will explore what they are, their origins, the intended users or stakeholders and how these two frameworks differ. This article is intended to provide a high-level overview of both frameworks with emphasis on how these NIST cybersecurity frameworks differ. WHAT IS THE NICE FRAMEWORK? This framework isn’t mean (pardon the pun) but it is named NICE for the National Initiative for Cybersecurity Education Cybersecurity Workforce Framework. Published by the National Institute of Standards and Technology (NIST) and found in NIST Special Publication 800-181, the NICE Framework provides a baseline for federal cybersecurity roles, efforts and processes as well as a consistent, systematic organization for all cybersecurity efforts for the federal government. The NICE Framework is nationally-focused and establishes a common lexicon and taxonomy for the description of cybersecurity work, roles and workers no matter where or for whom the work is performed. This Framework is a living, changing thing, which is best demonstrated by revisions — the first of which was released on November 16, 2020. NICE FRAMEWORK COMPONENTS This framework consists of the following components: * 7 Categories of high-level common cybersecurity functions groupings * 33 Specialty Areas of cybersecurity work * 52 Work Roles: This is the most detailed of these groupings and lists the specific skills, knowledge and abilities that are necessary to perform the Work Role’s tasks Below is the list of the seven categories of cybersecurity functions: 1. Analyze: Highly specialize evaluation and review of incoming cybersecurity data to determine if it is useful for intelligence 2. Collect and Operate: Offers specialized deception and denial operations, as well as collection of cybersecurity information for intelligence development 3. Investigate: Examines cybersecurity crimes or events related to IT networks, systems and digital evidence 4. Operate and Maintain: Provides administration, support and maintenance required to ensure efficient and effective of IT systems in terms of performance and security 5. Oversee and Govern: Gives leadership, direction, management or development and advocacy for effectively conducting cybersecurity work 6. Protect and Defend: Identification, analysis and mitigation of internal threats to both IT systems and networks 7. Securely Provision: Procures, conceptualizes, builds or designs secure IT systems and is responsible for the development of aspects of systems and networks. WHAT IS DODD 8140/8570? Department of Defense Directive 8570, or DoDD 8570, was a former Department of Defense Directive that has been rolled into a larger initiative, DoDD 8140. This directive gives guidance and procedures for the certification, training and management of all federal government employees responsible for conducting information assurance functions in their job duties. These government employees are required to hold a certification (approved by DoD) to work their specific job, which is listed in the DoD Approved 8140 Baseline Certifications here. DoDD 8140 categorizes the baseline certifications as being either IAT (Information Assurance Technical), IAM (Information Assurance Management), IASAE (IA System Architecture and Engineering) or CSSP (Cyber Security Service Provider). Below are the certifications that fall within each category. IA TECHNICAL IAT LEVEL I * A+ * CND * Network+ IAT LEVEL II * CySA+ * CND * Security+ IAT LEVEL III * CASP+ * CCNP Security * CISA * CISSP IA MANAGEMENT IAM LEVEL I * CAP * CND * Cloud+ * Security+ IAM LEVEL II * CAP * CASP+ * CISM * CISSP * CCISO IAM LEVEL III * CISM * CISSP * CCISO IA SYSTEM ARCHITECTURE AND ENGINEERING IASAE LEVEL I * CASP+ * CISSP * CSSLP IASAE LEVEL II * CASP+ * CISSP * CSSLP IASAE LEVEL III * CISSP-ISSAP * CISSP-ISSEP CYBER SECURITY SERVICE PROVIDER CSSP ANALYST * CEH * CFR * CySA+ CSSP INFRASTRUCTURE SUPPORT * CEH * CFR * CySA+ * CND * CHFI * Cloud+ CSSP INCIDENT RESPONDER * CEH * CFR * CHFI * CySA+ CSSP AUDITOR * CEH * CySA+ * CISA * Cloud+ * CFR CSSP MANAGER * CISM * CCISO ORIGINS Part of the confusion some have between these two frameworks is the entangled origins the two have. Firstly, the NICE Framework provides a baseline for federal cybersecurity but it is a non-binding baseline. In practice, the NICE Framework is used as a starting point for federal agencies. Next, what makes this confusing is the fact that the DoD Cyber Workforce Framework (DCWF) was defined in both DoDD 8140 and the NICE Framework. To top off the confusion level, some jobs bleed into other jobs, which can ultimately cause security vulnerabilities. NICE FRAMEWORK AND DODD 8140 USERS AND STAKEHOLDERS The biggest difference between the NICE Framework and DoDD 8140 is their intended audience, or users and stakeholders. The NICE Framework is intended for a broad range of federal government employees, from the GSA to the FBI. DoDD 8140 is intended for United States military users and stakeholders. This may seem like a slight difference, but it has a huge impact on how these frameworks operate. The NICE Framework and DoDD 8140’s differences are best viewed through the lens of the seven categories of the NICE Framework because of the different intended audiences. Let’s take a look at how these framework’s seven categories differ. * Analysis: NICE focuses on the acts of cybercriminals and 8140 focuses more on foreign intelligence agencies and foreign actors. * Collect & Operate: 8140 focuses on counterintelligence and NICE has a counter-criminal focus. * Investigate: NICE focuses on locking cybercriminals up and 8140 focuses on building developed and detailed target packages for future use. * Oversee & Govern: 8140 places more emphasis on certification because it is more “baked in” for other federal agencies. * Securely Provision: The biggest difference here is that 8140 has built out the Secret Internet Protocol Router Network, otherwise known as SIPRNet. While other federal agencies have secure networks, the heightened need for a secure network on the battlefield has given this category more emphasis for DoDD 8140. CONCLUSION Both the NICE Framework and DoDD 8140 have similar origins, but these frameworks have different focuses because their audiences are so different. DoDD 8140’s intended audience is the United States military/DoD, which has a focus on counterintelligence and foreign actors as the enemies. For the NICE Framework, the intended audience is all other federal agencies, which have cybercriminals as their adversary. SOURCES * NICE Cybersecurity Framework vs 8140: What’s the Difference?, CBTNuggets * NICE Cybersecurity Workforce Framework, NICCS * DoD Directive 8140: IT Training & Certification Requirements, MilitaryBenefits.info Posted: December 30, 2020 Share: AddThis Sharing Buttons Share to FacebookFacebookShare to TwitterTwitterShare to RedditRedditShare to LinkedInLinkedIn Uh-oh! We've encountered a new and totally unexpected error. Get instant boot camp pricing Thank you! A new tab for your requested boot camp pricing will open in 5 seconds. If it doesn't open, click here. Author GREG BELDING View Profile Greg is a Veteran IT Professional working in the Healthcare field. He enjoys Information Security, creating Information Defensive Strategy, and writing – both as a Cybersecurity Blogger as well as for fun. In this Series * What is the difference between the NICE framework and DoDD 8140/8570? * Two ways to build a secure software team using the NICE Framework * Two ways to build a cybersecurity team using the NICE Framework * How to use the NICE Cybersecurity Workforce Framework to plan career progression: A practitioners’ guide * 52 NICE Cybersecurity Workforce Framework work roles: What you need to know * How to align NICE Cybersecurity Workforce Framework KSAs with roles in your organization * 7 NICE Cybersecurity Workforce Framework categories: Everything you need to know * What is the NICE cybersecurity workforce framework? * How to Align Training With the NIST NICE Framework Related Bootcamps Incident Response JOIN THE QUEST FOR NEW SKILLS! * Get hands-on experience * Win over $1,000 in prizes * New challenges every month Join Monthly Challenge LEAVE A REPLY CANCEL REPLY Your email address will not be published. Required fields are marked * Comment * Name * Email * Website RELATED ARTICLES NICE Framework TWO WAYS TO BUILD A SECURE SOFTWARE TEAM USING THE NICE FRAMEWORK June 23, 2021 Susan Morrow NICE Framework TWO WAYS TO BUILD A CYBERSECURITY TEAM USING THE NICE FRAMEWORK May 6, 2021 Susan Morrow NICE Framework HOW TO USE THE NICE CYBERSECURITY WORKFORCE FRAMEWORK TO PLAN CAREER PROGRESSION: A PRACTITIONERS’ GUIDE October 22, 2020 Daniel Brecht NICE Framework 52 NICE CYBERSECURITY WORKFORCE FRAMEWORK WORK ROLES: WHAT YOU NEED TO KNOW September 14, 2020 Kurt Ellzey * * * * * Topics Hacking Penetration testing Cyber ranges Capture the flag Malware analysis Professional development General security News Security awareness Phishing Management, compliance & auditing Digital forensics Threat intelligence DoD 8570 View all topics Certifications CISSP CCSP CGEIT CEH CCNA CISA CISM CRISC A+ Network+ Security+ CASP+ PMP CySA+ CMMC Microsoft Azure View all certifications Careers IT auditor Cybersecurity architect Cybercrime investigator Penetration tester Cybersecurity consultant Cybersecurity analyst Cybersecurity engineer Cybersecurity engineer Incident responder Information security auditor Information security manager View all careers Company Contact us About Infosec Work at Infosec Newsroom Partner program Newsletter Get the latest news, updates and offers straight to your inbox. * ©2022 Infosec Institute, Inc. * * Trademarks * Privacy Policy Infosec, part of Cengage Group