NIST Control Families
Tenable Nessus
Splunk
CS SOP
Tech
100

This NIST control family focuses on verifying identities before granting access to systems.

What is Identification and Authentication (IA)?

100

This type of Nessus scan checks for vulnerabilities without logging into the target system, relying only on external visibility.

What is a non-credentialed (unauthenticated) scan?

100

This language is used in Splunk to search, filter, and analyze log data.

What is SPL (Search Processing Language)?

100

This is the minimum retention period for audit records, defined as either one year or one inspection cycle (such as a Defense Counterintelligence and Security Agency (DCSA) Security Review), whichever is longer.

What is one year or one inspection cycle, whichever is longer?

100

This system for sharing documents over the internet was created by Tim Berners-Lee in 1989 while working at CERN.

What is the World Wide Web?

200

This control family ensures users only get the permissions they need to do their jobs.

What is Access Control (AC)?

200

Nessus scans systems for these known security issues, often tracked in databases like CVE.

What are vulnerabilities?

200

This Splunk component is responsible for collecting and forwarding data from source systems to indexers.

What is a forwarder (universal forwarder)?

200

In Cyber, this term is defined as security posture analysis and assessments conducted at a frequency sufficient to support risk-based decisions and ensure adequate protection of data holdings.


What is continuous monitoring?


200

This 1970s relational database language, developed at IBM, became the foundation for modern database querying.

What is SQL?

300

This NIST control family is responsible for tracking and recording system activity for security analysis.

What is Audit and Accountability (AU)?

300

This mode of scanning in Nessus requires login credentials to perform deeper analysis of a system.

What is a credentialed scan?

300

This Splunk component stores and indexes incoming data, making it searchable.

What is an indexer?

300

These Defense Information Systems Agency guidelines are used to configure RAY classified information systems to prevent unauthorized and unintended data transfer via shared system resources.

What is Security Technical Implementation Guides (STIG)?

300

This 1983 home console helped revive the video game industry after the crash of 1983.

What is the Nintendo Entertainment System?

400

This control focuses on protecting data confidentiality and integrity through encryption methods.

What is System and Communications Protection (SC)?

400

This scoring system, often shown in Nessus results, provides a standardized way to measure vulnerability severity from 0.0 to 10.0.

What is CVSS (Common Vulnerability Scoring System)?

400

This command in SPL is used to transform events into statistical tables, often used with functions like count, avg, or sum.

What is stats?

400

Global Security Services (GSS) Cybersecurity will develop and maintain this plan for each classified information systems to track and monitor identified deficiencies.

What is a POA&M?

400

This handheld electronic organizer helped define early mobile productivity before smartphones.

What is the PalmPilot?

500

This control family includes processes for identifying, reporting, and responding to cybersecurity incidents.

What is Incident Response (IR)?

500

In Nessus, each vulnerability check is implemented as one of these uniquely identified components, often referenced by a numeric ID.

What is a plugin?

500

This type of Splunk file, often in CSV format, is used to enrich search results by mapping fields to additional data.

What is a lookup table?

500

This role reviews and confirms any ongoing operational need for an individual to maintain continued system access.

What is the PM/ISO?

500

This early messaging device became iconic for physical keyboards and push email before smartphones dominated.

What is the BlackBerry?