|
OG-WRL-012 [612]
|
Security Control Assessment |
52 |
132 |
123 |
|
OG-WRL-013 [611]
|
Systems Authorization |
10 |
75 |
18 |
|
DD-WRL-001 [652]
|
Cybersecurity Architecture |
50 |
121 |
48 |
|
DD-WRL-004 [631 and 632]
|
Secure Systems Development |
73 |
119 |
40 |
|
DD-WRL-006 [641]
|
Systems Requirements Planning |
29 |
85 |
24 |
|
DD-WRL-008 [661]
|
Technology Research and Development |
23 |
73 |
22 |
|
IO-WRL-002 [421]
|
Database Administration |
14 |
57 |
14 |
|
IO-WRL-006 [461]
|
Systems Security Analysis |
44 |
88 |
18 |
|
PD-WRL-001 [511]
|
Defensive Cybersecurity |
43 |
125 |
38 |
|
PD-WRL-007 [541]
|
Vulnerability Analysis |
15 |
64 |
18 |