iiRecord
Agentic AI Atlas · Cybersecurity GRC
domain:cybersecurity-grca5c.ai
II.
Domain JSON

domain:cybersecurity-grc

Structured · live

Cybersecurity GRC json

Inspect the normalized record payload exactly as the atlas UI reads it.

File · domain/domains/industry-verticals-2.yamlCluster · domain
Record JSON
{
  "id": "domain:cybersecurity-grc",
  "_kind": "Domain",
  "_file": "domain/domains/industry-verticals-2.yaml",
  "_cluster": "domain",
  "attributes": {
    "displayName": "Cybersecurity GRC",
    "description": "Governance, risk, and compliance for cybersecurity frameworks.\n"
  },
  "outgoingEdges": [
    {
      "from": "domain:cybersecurity-grc",
      "to": "specialization:security-compliance",
      "kind": "contains"
    },
    {
      "from": "domain:cybersecurity-grc",
      "to": "specialization:legal-compliance",
      "kind": "contains"
    }
  ],
  "incomingEdges": [
    {
      "from": "skill-area:compliance-as-code",
      "to": "domain:cybersecurity-grc",
      "kind": "applies_to",
      "attributes": {
        "confidence": "primary"
      }
    },
    {
      "from": "skill-area:PCI-DSS-implementation",
      "to": "domain:cybersecurity-grc",
      "kind": "applies_to",
      "attributes": {
        "confidence": "primary"
      }
    },
    {
      "from": "skill-area:compliance-monitoring",
      "to": "domain:cybersecurity-grc",
      "kind": "applies_to",
      "attributes": {
        "confidence": "secondary"
      }
    },
    {
      "from": "skill-area:privacy-impact-assessment",
      "to": "domain:cybersecurity-grc",
      "kind": "applies_to",
      "attributes": {
        "confidence": "secondary"
      }
    },
    {
      "from": "skill-area:data-classification",
      "to": "domain:cybersecurity-grc",
      "kind": "applies_to",
      "attributes": {
        "confidence": "primary"
      }
    },
    {
      "from": "skill-area:audit-trail-design",
      "to": "domain:cybersecurity-grc",
      "kind": "applies_to",
      "attributes": {
        "confidence": "secondary"
      }
    },
    {
      "from": "workflow:compliance-technology-stack-audit",
      "to": "domain:cybersecurity-grc",
      "kind": "applies_to_domain",
      "attributes": {}
    },
    {
      "from": "workflow:cyber-risk-scenario-modeling",
      "to": "domain:cybersecurity-grc",
      "kind": "applies_to_domain",
      "attributes": {}
    },
    {
      "from": "workflow:threat-intelligence-feed-review",
      "to": "domain:cybersecurity-grc",
      "kind": "applies_to_domain",
      "attributes": {}
    },
    {
      "from": "workflow:security-control-maturity-assessment",
      "to": "domain:cybersecurity-grc",
      "kind": "applies_to_domain",
      "attributes": {}
    },
    {
      "from": "workflow:grc-framework-assessment",
      "to": "domain:cybersecurity-grc",
      "kind": "applies_to_domain",
      "attributes": {}
    },
    {
      "from": "workflow:cyber-risk-quantification",
      "to": "domain:cybersecurity-grc",
      "kind": "applies_to_domain",
      "attributes": {}
    },
    {
      "from": "workflow:control-effectiveness-testing",
      "to": "domain:cybersecurity-grc",
      "kind": "applies_to_domain",
      "attributes": {}
    },
    {
      "from": "workflow:regulatory-change-management",
      "to": "domain:cybersecurity-grc",
      "kind": "applies_to_domain",
      "attributes": {}
    }
  ]
}