[Verse 1] NIST framework maps the cyber terrain Category Five emerges from the rain Enterprise level surveys the domain Mission processes forge the stronger chain Operational controls where threats remain Three tiers weaving through supply chain pain [Chorus] Three-tier protection we embrace Enterprise, mission, operational space Map controls to taxonomy's face Sub-categories lock into place SCRM shields every interface Three-tier protection we embrace [Verse 2] Enterprise architects scan horizons wide Governance structures serve as trusted guides Mission business flows cannot hide From threats that penetrate the outside Operational details magnified Where vendor vulnerabilities collide [Chorus] Three-tier protection we embrace Enterprise, mission, operational space Map controls to taxonomy's face Sub-categories lock into place SCRM shields every interface Three-tier protection we embrace [Bridge] Controls cascade from peak to valley floor Each tier defends what came before Taxonomy branches open every door Sub-categories multiply the score DoD precision matters more and more Cybersecurity at the core [Verse 3] Suppliers vetted through cascading screens Risk assessments threading through machines Multi-level defense intervenes Where Category Five taxonomy convenes NIST alignment strengthens all routines Protecting classified and routine scenes [Chorus] Three-tier protection we embrace Enterprise, mission, operational space Map controls to taxonomy's face Sub-categories lock into place SCRM shields every interface Three-tier protection we embrace [Outro] From boardroom strategy to circuit board Three tiers united by one accord Supply chain fortress, cyber sword Three-tier protection our reward
← Watch the Data Turn | 2 NIST SP 800-171 Rev 3 and the SCRM Family →