This document discusses security frameworks and concepts. It introduces the 4As, 5As, 6As, and 10As of security which refer to different aspects of security such as assess, architect, apply, administer, awareness, agility, appetite, alignment, assumption, and authorization. It emphasizes that security requires layers and integration across physical, information, management, and telecommunications security. Effective security also requires business alignment, risk appetite, assumption updates, authorization understanding, and continuous measurement and improvement.
13. 10As A10 of Security
Assess Evaluate, Audit, Check
Architect Plan, Design
Apply Build, Implement, Do
Administer Operate, Act, Respond
Awareness Intelligence, User
Agility Timeliness of Response
Appetite How much Risk can you take?
Alignment Business focus
Assumption Something is wrong?
Authorization Right to access, authentication