ICS1 Flashcards
Regulations, Standards, Framework (143 cards)
Application of Information Technology is the systematic implementation of…
Hardware and software so data can be
-Transmitted
-Modified
-Accessed
-Stored securely and efficiently
Name three NIST Frameworks
-NIST Cybersecurity Framework
-NIST Privacy Framework
-NIST 800-53 Security and Privacy controls for informations systems and organizations
NIST Cybersecurity Framework primary components
1
Voluntary framework
1. Framework Core
2. Framework implementation tiers
3. Framework profile
Purpose of NIST CSF
To develop a set of plain language controls for protection of IT infrastructure
What are the NIST CSF Framework Core Areas of Focus
- Identify
- Protect
- Detect
- Respond
- Recover
What is the purpose of the NIST CSF Framework Core Focus Areas?
Things to help develop a program to identify, assess, and manage cyber security risks in a cost effective and repeatable manner. Each core area represent points in the security risk management life cycle and are performed concurrently
NIST CSF - Core Area - IDENTIFY
1
Keep record of:
- Assets used to support information processing operations
- Users both internal and external
-Systems
NIST CSF - Core Area - PROTECT
1
Focuses on:
- Safegaurds and access controls to networks, applications, and other devices.
- Updates to security software
-Encryption of information
-Data backups
-Plans for disposing of files/devices
-User training
NIST CSF - Core Area - DETECT
1
Deploy tools to:
-Detect active attacks
-Monitor network access points, devices, unauthorized personal access, and high risk employee behavior or use of high risk devices
NIST CSF - Core Area - RESPOND
1
Develop response policies addressing how to:
-contain a cybersecurity event
-react using planned responses to mitigate losses
NIST CSF - Core Area - RECOVER
1
Restoration of network to normal operations through:
-repairing equiptment
-restoring back up files/env.
-positioning employees to rebound w/ right responses
1 NIST CFS - Categories/Sub categories of Functions or Core Areas
Core areas have categories that are tied to specific activities/company needs
and further into subcategories for mgmt and technical activities to help achieve outcomes.
NIST CFS - Implementation Tiers - purpose
1
Provides a measure of an organizations informaiton security infrastructure sophistication.
The 4 tiers act as a benchmark to identify the degree to which informaiton security practices are integrated throughout an organization.
How does an organization deteremine their implementation tier?
Based on perception of its own risk given the cybersecurity policies in place.
NIST CFS Implementation Tiers vs. Framework Profiles?
Profiles determine success or failure of information security implementation
Tiers inform the org as to the effectiveness of those profiles.
1 NIST CFS - Implementation Tiers - List Them
Divided into four levels:
1. Partial (Lowest)
2. Risk-Informed
3. Repeatable
4. Adaptive
NIST CFS - Implementation Tiers - division
Tiers are subdivided into
1. Risk Management process
2. Risk management program integration
3. External participation
NIST CFS Implementation Tier - Partil
incident mgmt is not incorporated into processes.
RM Process/Program Integration - RM is ad hoc/reactive
External Participation - corporate cybersecurity is isolated, does not evaluate external risks.
NIST CFS - Implementation Tier - Risk Informed
Involves cybersecurity awareness but not security managed
RM Process - cybersecurity prioritization is based on org. risk, and mgmt approves cybersecurity efforts - CS may be isolated from org processes.
Awareness of environmental security risks impact org, but inconsistent actions to respond to risk.
NIST CSF - Implementation Tier - Repeatable
Integrated into planning and regularly communicated.
RMP - Cybersecurity planning and in policies
RMPM - org risk approach
External participation - org collabs w/ and contributes to security community & governance structures to manage cyber risk.
NIST CFS Implementation Tier - Adaptive
RPP - Org. cybersecurity is based on iterative improvement based on incidents and is responsive to evolving threats
RMPM - org. wide affair - cyber risk is prioritized to other risks
External participation - robustly participates in external info sharing and frequency contributes to community.
1 NIST CFS - Framework profiles - purpose
Mechanism by which companies measure cybersecurity risk and how to minimize risk. - implementation guides w/ industry insights
should consider - org goals, industry goals, legal/reg requirements, best practices, RM priorities.
1 NIST CFS - Framework profiles - Categories
Current profile - current state of org. RM
Target profile - desired future state
Gap analysis - differences between 2