Appendix E. Proposed SwA Competency Mappings

When the model was developed, as part of our review process, several organizations mapped actual organizational positions to the competency model designations. This provided us with a checkpoint showing that our model designations were applicable to real organizations, and not just a theoretical exercise. These mappings are shown in Tables E.1 and E.2.

Image
Image
Image

Table E.1 Proposed SwA Competency Mappings ...

Get Cyber Security Engineering: A Practical Approach for Systems and Software Assurance now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.