NIST (CSF) Flashcards

(32 cards)

1
Q

Used to develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities.

A

Identify (ID)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Used by organizations to develop and implement safeguards to ensure delivery of critical services.

A

Protect (PR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Used by an organization to develop and implement appropriate activities identify the occurrence of a cybersecurity event.

A

Detect (DE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Used by an organization to develop and implement appropriate activities to take action regarding a detected cybersecurity incident.

A

Respond (RS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Develops and implements appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impairs due to a cybersecurity incident.

A

Recover (RC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Five Functions of Core

A

Identify
Protect
Detect
Respond
Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The identification of data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes.

A

Asset Management (ID.AM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Focused on the understanding and prioritization of the organization’s mission, objectives, stakeholders, and activities.

A

Business Environment (ID.BE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The policies, procedures, and processes used to manage and monitor the organization’s regulatory, legal, risk, environmental, and operational requirements.

A

Governance (ID.GV)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Ensure that the organization understands the cybersecurity risk to its organizational operations, organizational assets, and individuals.

A

Risk Assessment (ID.RA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Establishing and implementing the processes to identify, assess and manage supply chain risks within modern enterprises and organizations.

A

Supply Chain Risk Management (ID.SC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Used to establish the organization’s priorities, constraints risk tolerances, and assumptions in order to support operational risk decisions.

A

Risk Management Strategy (ID.RM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Focused on the access to physical and logical assets and associated facilities.

A

Identity Management Authentication and Access Control. (PR.AC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Focuses in the organization’s personnel and partners being provided with cybersecurity awareness education to perform cybersecurity duties and responsibilities.

A

Awareness and Training (PR.AT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ensure that security policies, processes, and procedures are maintained and used to mange protection of information systems and assets.

A

Information Protection Processes and Procedures (PR.IP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Refers to the consistent management of information and records with organization’s risk strategy to protect the confidentiality, integrity, and availability of the data.

A

Data Security (PR.DS)

16
Q

Ensures that maintenance and repairs of industrial control and information system components are performed consistent with policies and procedures.

A

Maintenance (PR.MA)

17
Q

Manages technical security solutions to ensure the security and resilience of systems and assets is consistent with related policies, procedures, and agreements.

A

Protective Technology (PR.PT)

18
Q

Ensure that anomalous activity is detected and the potential impact of events is understood.

A

Anomalies and Events (DE.AE)

19
Q

Ensure that the information system and assets are continually monitored to identify cybersecurity events and verify the effectiveness of protective measures.

A

Security Continuous Monitoring (DE.CM)

20
Q

Maintained and tested to ensure that processes and procedures create awareness of anomalous events.

A

Detection Processes (DE. DP)

21
Q

Executes and maintains response processes and procedures to ensure appropriate responses to detected cybersecurity incidents.

A

Response Planning (RS.RP)

22
Q

Ensure that all response activities are coordinated with internal and external stakeholders.

A

Communication (RS.CO)

23
Q

Ensure proper analysis is conducted to ensure effective response and support recovery activities.

A

Analysis (RS.AN)

24
Ensure that activities are performed to prevent expansion of an event, mitigate its effects, and resolve the incident.
Mitigation (RS.MI)
25
Ensure that the organization's response activities are continually getting better by incorporating lessons learned from current and previous detection and response activities.
Improvements (RS.IM)
26
Executes and maintains the recovery processes and procedures to ensure restoration of systems or assets affected by cybersecurity incidents.
Recovery Planning (RC.RP)
27
Ensure that the organization's recovery planning and processes are continually getting better by incorporating lessons learned into future activities.
Improvements (RC.IM)
28
Ensure that all restoration activities are coordinated with internal and external parties.
Communications (RC.CO)
29
Countermeasures that organizations implement to detect, prevent, reduce, or counteract security risks to their systems and networks.
Controls
30
____________ Framework is completely voluntary for companies and organizations to use.
NIST Cybersecurity Framework
31
How many: Outcomes? Activities? Functions?
108 Outcomes 23 Activities 5 Functions