NIST CSF Flashcards

(48 cards)

1
Q

What are the different Tiers?

A
  1. ) Partial
  2. ) Risk Informed
  3. ) Repeatable
  4. ) Adaptive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three cybersecurity management practice areas being measured under the different Tiers?

A
  1. ) Risk Management Process
  2. ) Integrated Risk Management Program
  3. ) External Participation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Risk Management Process mean?

A

The functionality and repeatability of the cybersecurity risk management
- How much is the organization involved in the risk management process?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Integrated Risk Management Program mean?

A

The extent to which cybersecurity is considered in broader risk management decisions
- How well is cybersecurity risk integrated into the overall business risk of the organization? How much is cybersecurity considered in overall risk management?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does External Participation mean?

A

The degree to which the organization: 1. monitors and manages supply chain risk, and 2. benefits by sharing or receiving information from external parties
- How well does the organization coordinates, collaborates, and shares information back and forth with other organizations?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Profile?

A

A particular customization of the CSF Core for an organization or sector based on their unique requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three main inputs that determine a CSF Profile?

A
  1. ) Business Objectives
  2. ) Security Requirements
  3. ) Technical Environment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If the CSF is an overall cybersecurity management model, then what is the RMF?

A

It falls under CSF for Risk Management, which has “tasks” that link back to CSF functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some of the most comparable frameworks to the CSF?

A
  • CIS (Center for Internet Security) CSC
  • COBIT 5
  • ISA
  • ISO/IEC
  • NIST SP 800-53
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 5 CSF Functions?

A
  1. ) Identify (ID)
  2. ) Protect (PR)
  3. ) Detect (DE)
  4. ) Respond (RS)
  5. ) Recover (RE)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

For ID, the organization must identify what?

A
  • Systems and data
  • Critical business processes that depend on those systems and data
  • The weaknesses and strengths associated with those systems
  • All resources (people, technology, money, equipment, facilities)
  • Vulnerabilities, threats, likelihood, impact, and frequency and overall risk
  • Governance (laws, regulations, etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the categories under the Identify (ID) Function?

A
  1. ) Asset Management (ID.AM)
  2. ) Business Environment (ID.BE)
  3. ) Governance (ID.GV)
  4. ) Risk Assessment (ID.RA)
  5. ) Risk Management Strategy (ID.RM)
  6. ) Supply Chain Risk Management (ID.SC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many subcategories support the 6 categories within the Identify Function?

A

29

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the Protect (PR) Function focus on?

A
  • Ensuring strong authentication and access control
  • Protecting data
  • Secure maintenance of assets
  • Securing people (security clearances, user authorization, etc.)
  • Sound policies and procedures
  • Ensuring the right administrative, technical, and physical controls are in place
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the categories under the Protect (PR) Function?

A
  1. ) Identity Management, Authentication, Access Control (PR.AC)
  2. ) Awareness and Training (PR.AT)
  3. ) Data Security (PR.DS)
  4. ) Information Protection Processes and Procedures (PR.IP)
  5. ) Maintenance (PR.MA)
  6. ) Protective Technology (PR.PT)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How many subcategories support the 6 categories within the Protect Function?

A

39

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of the “Informative References” portion of the CSF?

A

Maps the subcategory to other frameworks and controls that tell you how to actually do the subcategory (action)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the Detect (DE) Function focus on?

A
  • Focuses on detection processes and technologies
  • Looks for anomalies and unusual events
  • Ensures continuous security and risk monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the categories under the Detect (DE) Function?

A
  1. ) Anomalies and Events (DE.AE)
  2. ) Security Continuous Monitoring (DE.CM)
  3. ) Detection Processes (DE.DP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How many subcategories support the 3 categories within the Detect Function?

21
Q

What does the Respond (RS) Function focus on?

A
  • Planning for incident and contingency response
  • Ensuring the robustness of incident communications
  • Analyzing the root causes of incidents
  • Mitigating damage to systems, data, equipment, facilities, and people
  • Improving the overall contingency planning and response processes
22
Q

What are the categories under the Respond (RS) Function?

A
  1. ) Response Planning (RS.RP)
  2. ) Communications (RS.CO)
  3. ) Analysis (RS.AN)
  4. ) Mitigation (RS.MI)
  5. ) Improvements (RS.IM)
23
Q

How many subcategories support the 5 categories within the Respond Function?

24
Q

What does the Recover (RC) Function focus on?

A
  • Business continuity, incident recovery, and disaster recovery planning
  • Maintaining communications during the recovery process
  • Improving the recovery effort
25
What are the categories under the Recover (RC) Function?
1. ) Recovery Planning (RC.RP) 2. ) Improvements (RC.IM) 3. ) Communications (RC.CO)
26
How many subcategories support the 3 categories within the Recover Function?
6
27
What is a Tier?
The degree to which an organization's cybersecurity risk management practices exhibit the characteristics defined in the Framework
28
What is the purpose of Tiers?
They're used to measure how well the organization implements different aspects of the CSF, the three cybersecurity management practice areas
29
What is Tier 1?
Partial
30
What is Tier 2?
Risk-Informed
31
What is Tier 3?
Repeatable
32
What is Tier 4?
Adaptive
33
What are the CSF Tiers NOT?
They're not: - A maturity model - The same as the RMF Tiers
34
What is the RMF Three-Tier Risk Model composed of?
1. ) Organizational 2. ) Mission/Business Process 3. ) Information System They don't measure anything
35
What does the "Organization" RMF Risk Tier cover?
Higher-level management processes and overarching risk
36
What does the "Mission/Business Process" RMF Risk Tier cover?
Risk associated with processes used across the organization
37
What does the "Information System" RMF Risk Tier cover?
Risk associated with a particular system or systems
38
How can you explain the measuring differences between CSF Tiers vs. Maturity Models vs. RMF Risk Tiers?
- CSF Tiers measure level of effort - Maturity Models measure repeatability and definability of processes geared towards that effort - RMF Risk Tiers measure nothing at all, different cross sections of the organization
39
What are characteristics of CSF Profiles?
- They align Functions, Categories, and Subcategories with mission/business requirements, risk, and resources - They allow organizations to establish a unique roadmap to cybersecurity based on their needs - They describe both current and target states of the organization in terms of cybersecurity posture
40
For CSF Profiles, what are the inputs combined with to create the Profile output?
Inputs (Business Objectives, Risk, and Technical Environment) + Functions, Categories, Subcategories = Output (CSF Profile)
41
How many CSF Subcategories are there in total?
108
42
How does an organization identify assets and risks?
- Make a physical inventory of all assets - Perform a mission analysis - Perform a business impact assessment - Perform a comprehensive risk assessment
43
How does an organization protect their assets?
- Ensure users are trained on how to protect sensitive data (periodic security training, user agreements and consequences, personnel security processes) - Test protection mechanisms (Vulnerability assessments, penetration testing, risk assessments)
44
How does an organization effectively detect?
- Assume a state of breach - Implement detection controls at multiple layers (Perimeter, interior systems and data, people) - Be able to detect both unusual and normal events - Be able to filter useful information from "noise" - Employ the right people for detection (who know what to look for) - Continuously monitor for analogies and risk Use multiple types of controls (physical, tech, operational like following procedure)
45
How does an organization set up response capabilities?
- Develop incident response plans - Plan for quick, efficient, and accurate incident communications - Develop plans to mitigate damage to systems, data, equipment, facilities, and people - Become proficient at analyzing the root causes of incidents - Ensure a process to improve contingency planning and response processes in place - Develop and retain qualified personnel for response effort - Exercise response capabilities (IR = incident response) - Refine processes through risk analysis and lessons learned
46
How does an organization implement recovery?
- Develop, test, and maintain: 1. ) Business Continuity 2. ) Incident Recovery 3. ) Disaster Recovery Plans - Ensure robust communications process during recovery - Capture lessons learned to improve recovery function - Select and train qualified people for recovery functions
47
How do you create your own CSF Profile?
- Develop your mission/business objectives - Determine risk - Determine governance (Which laws are applicable) - Articulate with CSF subcategories - Produce controls and technical methods
48
What are the factors of business continuity that matter for the Recovery Function?
1. ) Critical process recovery 2. ) Timeliness 3. ) Redundant capabilities