PivotPoint provides Cybersecurity Architecture & Design + CyberML™ training for clients who seek to apply Model-Based Systems Engineering and Agile Architecture techniques to their cybersecurity systems.
Since the Cybersecurity Architecture & Design techniques taught extend the recursive architecture, analysis and design patterns taught during PivotPoint's Essential MBSE + SysML Applied™
and Essential Agile Architecture + UML 2 Applied™
training, successful completion of one of these workshops is a prerequisite for Cybersecurity Architecture & Design training.The Cybersecurity Architecture & Design training training uses the CyberML™ (Cyber Modeling Language™) to specify cybersecurity constructs and patterns needed throughout the System Development Life Cycle.
The CyberML profile specifies basic constructs for specifying network topologies, network communication protocols, cyber devices, and cyber assets. Cyber devices supported include routers/switches, firewalls, encryption/decryption devices, Intrusion Detection/Protection Systems (IDS/IPS), and Unified Threat Management (UTM) devices.
The CyberML model library specifies recursive analysis, design and architecture patterns that can be applied during the full System Development Life Cycle (SDLC) on "both sides" of the System V-Model (a.k.a. System Vee Model)
. When used with a pragmatic "Agile" subset of either UML 2 or SysML 1.x, these recursive analysis, design and architecture patterns facilitate scalable traceability on the "left side" of the System-V Model
, and scalable Verification & Validation (V&V) on the "right side" of the System-V Model.
The CyberML can be customized to support emerging Cybersecurity Framework standards, such as the NIST Cybersecurity Framework (NIST Special Publication 800-37)
, DoD Risk Management Framework (RMF)
, and ISO/IEC 27000