[Verse 1] Four pillars standing in digital terrain CCCS ITSG-33 maps the cyber domain Risk management flows through controls so precise Categorize threats, then roll assessment dice Cloud guidance whispers secrets from above Government workloads need protective love [Chorus] I-T-S-G, thirty-three controls the scene Treasury Board directive keeps the data clean N-I-S-T framework two-point-oh so bright Four key readings guard us through the night Memorize the standards, internalize the code Defence readiness on this cyber road [Verse 2] Treasury Board directive cuts through bureaucratic haze Security management sets the federal blaze Baseline requirements, monitoring complete Incident response makes the circle sweet NIST two-point-oh evolved from what we knew Govern, identify, protect, detect pursue [Chorus] I-T-S-G, thirty-three controls the scene Treasury Board directive keeps the data clean N-I-S-T framework two-point-oh so bright Four key readings guard us through the night Memorize the standards, internalize the code Defence readiness on this cyber road [Bridge] Cloud security guidance paints the azure sky Shared responsibility models clarify Who owns encryption, who commands the gate Public, private, hybrid infrastructure fate Risk tolerance measured in matrices fine Advanced learners walk this cyber line [Verse 3] Implementation tiers from partial to optimizing Continuous monitoring keeps threats minimizing Supply chain integrity, recovery time goals Each framework dancing in complementary roles CCCS wisdom merged with NIST evolution Treasury oversight creates the solution [Chorus] I-T-S-G, thirty-three controls the scene Treasury Board directive keeps the data clean N-I-S-T framework two-point-oh so bright Four key readings guard us through the night Memorize the standards, internalize the code Defence readiness on this cyber road [Outro] Four documents unified in cyber space Industrial strategy sets the defence pace Read them, know them, weave them into thought Cybersecurity excellence cannot be bought
← 3 Identity, Credential, and Access Management (ICAM) | 1 Supply Chain Risk Management Fundamentals →