Overview of the NIST Cybersecurity Framework

Overview of the NIST Cybersecurity Framework

What is the NIST CSF?

The Cybersecurity Framework (CSF) is a collection of standards, guidelines and best practices created and published by the National Institute of Standards & Technology (NIST).

It consists of three components:?Implementation Tiers, the?Core?and?Profiles.

Implementation Tiers?help organizations determine their current and target level of risk management controls.

The?Core?consists of five functions that help reduce risk by offering a set of activities and outcomes to support an organization’s risk management objectives.

Lastly,?Profiles?are a way to perform a gap analysis between an organization’s desired level of risk management and the current implementation.

Implementation Tiers

Implementation Tiers are a way for organizations to describe how closely their risk management practices match the Cybersecurity Framework. This largely depends on an organization’s resources and ability to implement risk management processes at scale.

  1. Partial
  2. Risk-informed
  3. Repeatable
  4. Adaptive

No alt text provided for this image

The Core

Each function includes a set of activities that guide organizations on cybersecurity best practices that is further broken down into categories and subcategories. There are five functions: Identify, Protect, Detect, Respond and Recover.

Each function and its corresponding categories are described below.

Identify

Objective: understanding the organization’s existing assets, objectives and risk appetite

  • Asset Management – Identify and document all assets that enable the organization to operate
  • Business Environment – Understand and prioritize organizational mission & objectives
  • Governance – Understand and document policies, procedures and processes related to regulatory or operational needs
  • Risk Assessment – Identify potential risks to business operations
  • Risk Management Strategy – Establish organizational priorities and risk tolerances to support operational decisions
  • Supply Chain Risk Management – Establish organizational priorities and risk tolerances associated with its supply chain

Protect

Objective: Create the appropriate defenses to support organizational objectives

  • Identity Management, Authentication and Access Control – Limit access to authorized users
  • Awareness & Training – Offer cybersecurity education to personnel and partners
  • Data Security – Protect the confidentiality, integrity and availability of information
  • Information Protection Processes & Procedures – Define policies to protect systems & data
  • Maintenance – Define processes for maintenance of information systems
  • Protective Technology – Implement technical solutions to protect systems & data

Detect

Objective: Implement actions to detect cybersecurity incidents

  • Anomalies and Events – Define processes for detecting and determining impact of anomalies
  • Security Continuous Monitoring – Monitor systems and assets continuously to identify & verify effectiveness of security controls
  • Detection Processes – Maintain and test methods for detecting anomalous events

Respond

Objective: Execute actions after a cybersecurity incident is detected

  • Response Planning – Define and execute processes to respond to detected events
  • Communications – Communicate and coordinate response with stakeholders
  • Analysis – Conduct analysis to verify effectiveness of response
  • Mitigation – Perform activities to prevent, mitigate or resolve the incident
  • Improvements – Improve response activities by updating processes due to lessons learned

Recover

Objective: Restore capabilities, services or reputation after a cybersecurity incident

  • Recovery Planning – Execute processes to recover after incident
  • Improvements – Improve recovery planning activities after lessons learned
  • Communications – Communicate and coordinate recovery with stakeholders

Profiles

The CSF defines a?7-step process?for how to use profiles to improve the organization’s cybersecurity posture:

  1. Prioritize and Scope
  2. Orient
  3. Create a Current Profile
  4. Conduct a Risk Assessment
  5. Create a Target Profile
  6. Determine, Analyze, and Prioritize Gaps

If you’d like to learn more details about the Cybersecurity Framework (CSF), head over to the NIST website for?official documentation, including a spreadsheet containing all of the categories and subcategories.

Ramsey P. Anderson

Project Manager | Screenwriter | Veteran

3 å¹´

Perfect timing!!

赞
回复

要查看或添加评论,请登录

Kassidy Hall的更多文章

  • Testing WhatPulse Web Application Security

    Testing WhatPulse Web Application Security

    Background I have been using WhatPulse for over 17 years. WhatPulse, first released in 2003, is a client capable of…

    4 条评论
  • Hacking the Juice Shop: Information Gathering

    Hacking the Juice Shop: Information Gathering

    The Juice Shop is an intentionally vulnerable web application developed by the Open Web Application Security Project…

  • Multi-threaded Port Scanner

    Multi-threaded Port Scanner

    One of the core functions performed during network reconnaissance is identifying open ports on a target host. There…

    1 条评论
  • RouterOS-Scanner for MikroTik Devices

    RouterOS-Scanner for MikroTik Devices

    During early March 2022, Microsoft released a security tool to scan for vulnerabilities associated with Mikrotik…

  • Introduction to REST API Concepts

    Introduction to REST API Concepts

    This article is a brief introduction to the REpresentational State Transfer (REST) architecture. It is intended for…

    1 条评论
  • Agile & Scrum for Newbies

    Agile & Scrum for Newbies

    Agile is a framework for methodologies that follow the Agile manifesto. One of the most common Agile methodologies in…

  • Two-Step Verification vs. Two-Factor Authentication

    Two-Step Verification vs. Two-Factor Authentication

    In February 2022, Google announced they have seen a 50% decrease in account compromises since auto-enrolling users in…

    2 条评论

社区洞察

其他会员也浏览了