An adjacency matrix allows you to see items that frequently appear together in a way that enables efficient sorting. Each block demonstrates where the two controls on the axis appear in one or more CSF subcategories together.
When the controls on the X and Y axis appear together in one or more CSF subcategories, the matrix cell at their intersection is shaded. The darkness of the shade indicates the number of co-occurrences.
Continue reading “Adjacency Matrix of Controls in the Cybersecurity Framework”
This diagram visualizes the relationships between the CSF and the selected control set. The CSF version selected is represented by the largest node, then CSF functions by medium-sized nodes. The remainder of the nodes are links from the CSF functions to categories, then to subcategories, and finally to controls of the given control set. CSF functions and control families (also known as domains in some control sets) are differentiated by color.
This diagram can be useful to visualize which controls facilitate multiple security outcomes (or CSF subcategories).
Continue reading “Node-Link Diagram of the Cybersecurity Framework Mapped to Controls”
This diagram visualizes the relationships between the controls in the selected control set. Links between controls represent controls that appear in the same CSF subcategory. Controls that appear together in multiple categories are represented by thicker link lines. Control families (also known as domains in some control sets) are differentiated by color.
This visualization can be useful in determining groups of controls that contribute to a specific security outcome, as defined by a CSF subcategory.
Continue reading “Co-Occurrence Network of Security Controls”
Overview
Sunburst diagrams visualize the cumulative (or recursive) size of each element along a radial axis. The size of the sector indicates the cumulative number of CSF elements or controls that are encompassed by that sector. For example, you can see below that the CSF function containing the most controls is Protect.
Continue reading “Sunburst Visualization of the Cyber Security Framework”