NIST Framework Notes Flashcards

Understand NIST Framework

1
Q

What are the 3 components of the NIST Framework?

A

Framework Core, Implementation Tiers, and Framework Profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Framework Core

A

Outlines the risk and the outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Implementation Tier

A

Outlines how cybersecurity risk is managed by an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Framework Profiles

A

Helps organizations outline how they are going to implement cybersecurity outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Framework CORE Functions

A

Identify, Protect, Detect, Respond, and Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identify Categories

A

Asset Management, Business Environment, Governance, Risk Assessment, Risk Management Strategy, and Supply Chain Risk Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protect Categories

A

Identity Management & Access Control, Awareness Training, Data Security, Information Protection Processes and Procedures, Maintenance, and Protective Technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Detect Categories

A

Anomalies and Events, Security/continuous monitoring, and Detection Processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Respond Categories

A

Response Planning, Communications, Analysis, Mitigation, and Improvements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Recover Categories

A

Recovery Planning, Improvements, and Communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

4 Tiers in NIST Framework

A

Partial, Risk Informed, Repeatable, and Adaptive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Partial Tier 1

A

Cyber program is ad-hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk-Informed Tier 2

A

Cyber program is beginning to be informally developed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Repeatable Tier 3

A

Cyber program is defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Adaptive Tier 4

A

Cyber program is robust and seeks out new threats before they occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Asset Management

A

Defining the assets that are a part of the organization’s goals and business functions

17
Q

Business Environment

A

Helps understand the goals of the business.

18
Q

Governance

A

Identify policies and procedures, and relevant roles/responsibilities of those internal and external of the organization.

19
Q

Risk Assessment

A

Identifying vulnerabilities

20
Q

Risk Management Strategies

A

Process and procedures to prevent and detect risk

21
Q

Supply Chain Risk Management

A

Identifying, Assessing, protecting, and managing our suppliers

22
Q

Identity Management and Authentication

A

Least Privilege and Trust, but verify.

23
Q

Awareness Training

A

providing insight into the organization’s initiatives and governance policies

24
Q

Data Security

A

protecting data at rest, transit, and availability.

25
Information Protection
Confidentiality, Integrity, and availability of data
26
Maintenance
Continuous improvement of processes and how is it protected
27
Protection
WCGW and what are the critical assets that need to be operational
28
Anomalies and Events
establish a network baseline (traffic, etc..). Understand what good looks like.
29
Security and Continous Monitoring
Identifying the baseline and events that don't meet the expected criteria
30
Detection Processes
Identifying roles and responsibilities for detecting events
31
Response Planning
Identify policies and procedures for events
32
Communications
Identify the person responsible and who needs to be informed. Make sure incidents are reported based on policies
33
Analysis
Take a closer look on what caused the incident or investigate incidents to gain assurance on the impact.
34
Mitigation
Limit the impact of an incident and remediate
35
Improvements
Understand what caused issues and build a plan to improve (Lessons learned).
36
Recovery Planning
Make sure plans are executed during and after incidents