NIST Framework Notes Flashcards
Understand NIST Framework
What are the 3 components of the NIST Framework?
Framework Core, Implementation Tiers, and Framework Profiles
Framework Core
Outlines the risk and the outcomes
Implementation Tier
Outlines how cybersecurity risk is managed by an organization.
Framework Profiles
Helps organizations outline how they are going to implement cybersecurity outcomes
Framework CORE Functions
Identify, Protect, Detect, Respond, and Recover
Identify Categories
Asset Management, Business Environment, Governance, Risk Assessment, Risk Management Strategy, and Supply Chain Risk Management.
Protect Categories
Identity Management & Access Control, Awareness Training, Data Security, Information Protection Processes and Procedures, Maintenance, and Protective Technology.
Detect Categories
Anomalies and Events, Security/continuous monitoring, and Detection Processes.
Respond Categories
Response Planning, Communications, Analysis, Mitigation, and Improvements
Recover Categories
Recovery Planning, Improvements, and Communications
4 Tiers in NIST Framework
Partial, Risk Informed, Repeatable, and Adaptive
Partial Tier 1
Cyber program is ad-hoc
Risk-Informed Tier 2
Cyber program is beginning to be informally developed
Repeatable Tier 3
Cyber program is defined
Adaptive Tier 4
Cyber program is robust and seeks out new threats before they occur
Asset Management
Defining the assets that are a part of the organization’s goals and business functions
Business Environment
Helps understand the goals of the business.
Governance
Identify policies and procedures, and relevant roles/responsibilities of those internal and external of the organization.
Risk Assessment
Identifying vulnerabilities
Risk Management Strategies
Process and procedures to prevent and detect risk
Supply Chain Risk Management
Identifying, Assessing, protecting, and managing our suppliers
Identity Management and Authentication
Least Privilege and Trust, but verify.
Awareness Training
providing insight into the organization’s initiatives and governance policies
Data Security
protecting data at rest, transit, and availability.