Lab 2: Build a Custom Profile

salsa polka, acoustic chicago blues motown · 3:13

Listen on 93

Lyrics

[Verse 1]
NIST eight hundred fifty-three revision five catalog
Full buffet of controls but we need just a few logs
Cherry-pick the ones that fit your enterprise needs
Custom profile trimming excess, planting security seeds

[Chorus]
Select, Set, Validate - the profile creation dance
Select your controls with surgical precision stance
Set parameters to match your organization's way
Validate against JSON Schema every single day

[Verse 2]
Import statement points to where the catalog lives
Choose control families that your risk model forgives
AC dash one for access, SC dash seven for crypto
Handpicked arsenal defending your digital metro

[Chorus]
Select, Set, Validate - the profile creation dance
Select your controls with surgical precision stance
Set parameters to match your organization's way
Validate against JSON Schema every single day

[Bridge]
Parameter substitution makes it yours alone
Sixty days becomes ninety in your policy zone
Set values override the catalog's generic text
Your organization's flavor in the security context

[Verse 3]
Profile metadata tells the story of your choice
Title, version, last modified gives the doc a voice
JSON Schema validation keeps the structure clean
Error messages will guide you to a profile pristine

[Chorus]
Select, Set, Validate - the profile creation dance
Select your controls with surgical precision stance
Set parameters to match your organization's way
Validate against JSON Schema every single day

[Outro]
From catalog abundance to tailored defense
Custom profile mastery makes security sense

← Lab 1: Explore Existing Content | Lab 3: Create a Component Definition →