Unit 1 - NIST CSWP 29 Flashcards

(78 cards)

1
Q

What does the NIST Cybersecurity Framework (CSF) 2.0 provide guidance on?

A

Managing cybersecurity risks

It offers a taxonomy of high-level cybersecurity outcomes for organizations of all sizes and sectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the primary components of the CSF 2.0?

A
  • CSF Core
  • CSF Organizational Profiles
  • CSF Tiers

Each component serves a unique purpose in managing cybersecurity risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who is the primary audience for the CSF?

A

Individuals responsible for developing and leading cybersecurity programs

It can also be used by executives, boards, risk managers, and policymakers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: The CSF prescribes specific outcomes and how they should be achieved.

A

False

The CSF links to resources for additional guidance but does not prescribe methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of CSF Organizational Profiles?

A

To describe an organization’s current and/or target cybersecurity posture

They relate to the outcomes defined in the CSF Core.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the CSF Functions?

A
  • GOVERN
  • IDENTIFY
  • PROTECT
  • DETECT
  • RESPOND
  • RECOVER

These Functions organize cybersecurity outcomes at the highest level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the blank: The CSF Core is a taxonomy of high-level cybersecurity _______.

A

outcomes

It helps organizations manage their cybersecurity risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the GOVERN Function focus on?

A

Establishing, communicating, and monitoring the cybersecurity risk management strategy

It also addresses policy and oversight of cybersecurity strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the IDENTIFY Function entail?

A

Understanding the organization’s current cybersecurity risks

This includes identifying assets and related cybersecurity risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the role of the PROTECT Function?

A

To implement safeguards to manage cybersecurity risks

This includes identity management, data security, and platform security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does DETECT refer to in the CSF?

A

The ability to find and analyze possible cybersecurity attacks and compromises

It supports incident response and recovery activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What actions does the RESPOND Function cover?

A

Actions taken regarding a detected cybersecurity incident

This includes incident management and communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the aim of the RECOVER Function?

A

To restore assets and operations affected by a cybersecurity incident

This helps reduce the effects of incidents and enables effective communication during recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False: The CSF is designed to be a one-size-fits-all approach.

A

False

Organizations have unique risks and varying risk appetites, necessitating tailored implementations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Informative References in the context of the CSF?

A

Sources of guidance on each outcome from existing global standards, guidelines, frameworks, regulations, and policies

They support organizations in achieving cybersecurity outcomes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do Implementation Examples illustrate?

A

Potential ways to achieve each outcome within the CSF

They help organizations understand practical applications of the framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fill in the blank: The CSF is designed to be used by organizations of all _______ and sectors.

A

sizes

This includes industry, government, academia, and nonprofit organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the significance of the Cybersecurity Framework (CSF) 2.0?

A

It helps organizations manage and reduce their cybersecurity risks

It is useful regardless of the maturity level of an organization’s cybersecurity programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the relationship between the CSF and enterprise risk management (ERM)?

A

The CSF is integrated into the broader ERM strategy

It addresses cybersecurity alongside other risks like financial and reputational risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are potential benefits of actions to reduce cybersecurity risk for an organization?

A

Increasing revenue

For example, offering excess facility space to a commercial hosting provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does the NIST Cybersecurity Framework (CSF) Functions diagram represent?

A

A wheel showing the interrelation of CSF Functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the role of the GOVERN Function in the CSF?

A

It informs how an organization will implement the other five Functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the five main Functions of the NIST Cybersecurity Framework?

A
  • GOVERN
  • IDENTIFY
  • PROTECT
  • DETECT
  • RESPOND
  • RECOVER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False: Actions supporting GOVERN, IDENTIFY, PROTECT, and DETECT should occur continuously.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What do CSF Profiles describe?
An organization’s current and/or target cybersecurity posture.
26
What is a Current Profile in the context of CSF Profiles?
Specifies the Core outcomes that an organization is currently achieving.
27
What does a Target Profile specify?
Desired outcomes prioritized for cybersecurity risk management objectives.
28
What is a Community Profile?
A baseline of CSF outcomes addressing shared interests among organizations.
29
List the steps to create and use a CSF Organizational Profile.
* Scope the Organizational Profile * Gather needed information * Create the Organizational Profile * Analyze gaps and create an action plan * Implement the action plan and update the Profile
30
What are CSF Tiers used for?
Characterizing the rigor of an organization’s cybersecurity risk governance.
31
What are the four Tiers in the NIST Cybersecurity Framework?
* Partial (Tier 1) * Risk Informed (Tier 2) * Repeatable (Tier 3) * Adaptive (Tier 4)
32
Fill in the blank: The CSF provides a basis for improved _______ regarding cybersecurity expectations.
[risk management communication]
33
What types of online resources supplement the CSF?
* Informative References * Implementation Examples * Quick Start Guides
34
What are Informative References?
Mappings indicating relationships between the Core and various standards.
35
What do Implementation Examples provide?
Concise, action-oriented steps to achieve the outcomes of Subcategories.
36
What is the purpose of Quick Start Guides (QSGs)?
To provide actionable first steps for implementing the CSF.
37
How does the CSF improve risk management communication?
By fostering bidirectional information flow between executives and managers.
38
What types of ICT risk can organizations face?
* Privacy * Supply chain * Artificial intelligence
39
How can organizations integrate cybersecurity with other risk management programs?
By using Enterprise Risk Management (ERM) approaches.
40
What resources describe the relationship between cybersecurity risk management and ERM?
* NIST Cybersecurity Framework 2.0 – Enterprise Risk Management Quick-Start Guide * NIST IR 8286 series
41
What is the purpose of NIST Interagency Report (IR) 8286?
Integrating Cybersecurity and Enterprise Risk Management (ERM) ## Footnote IR 8286 consists of several parts, including identifying, estimating, prioritizing, and staging cybersecurity risks.
42
What does the NIST Cybersecurity Framework (CSF) help organizations with?
Integrating cybersecurity risk management with individual ICT risk management programs ## Footnote This includes programs like SP 800-37 and SP 800-30.
43
How does the CSF relate to privacy risks?
It helps address privacy risks related to the loss of confidentiality, integrity, and availability of individuals’ data ## Footnote Examples include data breaches leading to identity theft.
44
What is Cybersecurity Supply Chain Risk Management (C-SCRM)?
A systematic process for managing exposure to cybersecurity risk throughout supply chains ## Footnote It includes developing appropriate response strategies, policies, and procedures.
45
What are the key components of the NIST CSF Core?
Functions, Categories, and Subcategories ## Footnote These components help organizations in managing their cybersecurity risks.
46
Fill in the blank: The organizational mission is understood and informs _______.
cybersecurity risk management
47
What does the category 'Govern' (GV) in the CSF include?
Organizational Context, Risk Management Strategy, Roles, Responsibilities, and Authorities, Policy, Oversight, Cybersecurity Supply Chain Risk Management ## Footnote Each component has specific identifiers for tracking.
48
What is the role of 'Identify' (ID) in the CSF?
Understanding the organization’s current cybersecurity risks ## Footnote This includes asset management and risk assessment.
49
True or False: Privacy risks can only arise from cybersecurity incidents.
False ## Footnote Privacy risks can also arise from data processing unrelated to cybersecurity.
50
What does the 'Protect' (PR) function focus on?
Using safeguards to manage the organization’s cybersecurity risks ## Footnote This includes identity management and data security.
51
What is the significance of the NIST Artificial Intelligence Risk Management Framework (AI RMF)?
Helps address cybersecurity and privacy risks associated with AI ## Footnote AI risks are treated alongside other enterprise risks.
52
What does the 'Recover' (RC) function in the CSF entail?
Incident Recovery Plan Execution and Incident Recovery Communication ## Footnote This function ensures that organizations can recover from incidents.
53
What is the purpose of the NIST Privacy Framework?
To address different aspects of cybersecurity and privacy risks ## Footnote It works alongside the NIST Cybersecurity Framework.
54
Fill in the blank: Cybersecurity roles and responsibilities for suppliers, customers, and partners are established and _______.
communicated
55
What is the focus of the 'Detect' (DE) function in the CSF?
Continuous Monitoring and Adverse Event Analysis ## Footnote This function helps organizations identify cybersecurity incidents.
56
What does the 'Incident Management' (RS.MA) subcategory involve?
Managing incidents effectively to mitigate impacts ## Footnote It is part of the 'Respond' (RS) function.
57
What is the goal of 'Risk Assessment' (ID.RA) in the CSF?
Understanding the cybersecurity risk to the organization, assets, and individuals ## Footnote This includes identifying vulnerabilities and potential impacts.
58
True or False: The CSF is only applicable to large organizations.
False ## Footnote The CSF is applicable to organizations of all sizes.
59
What does 'Awareness and Training' (PR.AT) ensure?
Personnel possess the knowledge and skills to perform cybersecurity tasks ## Footnote Training is essential for effective risk management.
60
What are access permissions, entitlements, and authorizations defined in?
A policy ## Footnote These are managed, enforced, and reviewed while incorporating the principles of least privilege and separation of duties.
61
What is the purpose of awareness and training (PR.AT) in cybersecurity?
To provide personnel with cybersecurity awareness and training ## Footnote This ensures they can perform their cybersecurity-related tasks effectively.
62
What does PR.AT-01 focus on?
Providing personnel with awareness and training for general cybersecurity tasks ## Footnote This includes understanding cybersecurity risks.
63
What is the aim of PR.DS in data security?
To manage data consistent with the organization’s risk strategy ## Footnote This protects the confidentiality, integrity, and availability of information.
64
What does PR.DS-01 protect?
The confidentiality, integrity, and availability of data-at-rest
65
What does PR.PS stand for?
Platform Security ## Footnote It involves managing hardware, software, and services to protect their confidentiality, integrity, and availability.
66
What is the purpose of PR.IR?
To manage security architectures with the organization’s risk strategy ## Footnote This protects asset confidentiality, integrity, and availability.
67
What does DE.CM encompass in the detect phase?
Continuous monitoring of assets ## Footnote This is to find anomalies, indicators of compromise, and other potentially adverse events.
68
What is the focus of DE.AE?
Analyzing anomalies and indicators of compromise ## Footnote This helps characterize events and detect cybersecurity incidents.
69
What does RS.MA in the respond phase refer to?
Incident Management ## Footnote This involves managing responses to detected cybersecurity incidents.
70
What is the goal of RC.RP in the recovery phase?
To perform restoration activities for operational availability ## Footnote This is for systems and services affected by cybersecurity incidents.
71
What does Tier 1 of the CSF Tiers represent?
Partial application of the organizational cybersecurity risk strategy ## Footnote It indicates ad hoc management and limited awareness of cybersecurity risks.
72
What characterizes Tier 3 of the CSF Tiers?
Repeatable risk management practices ## Footnote Policies are formally approved and cybersecurity practices are regularly updated.
73
What is a CSF Category?
A group of related cybersecurity outcomes ## Footnote These collectively comprise a CSF Function.
74
Define CSF Function.
The highest level of organization for cybersecurity outcomes ## Footnote There are six CSF Functions: Govern, Identify, Protect, Detect, Respond, and Recover.
75
What does CSF Target Profile specify?
Desired Core outcomes prioritized for achieving cybersecurity objectives
76
What is the role of CSF Informative Reference?
To map a relationship between a CSF Core outcome and existing standards ## Footnote This includes guidelines, regulations, or other content.
77
True or False: The organization adapts its cybersecurity practices based on previous activities.
True
78
Fill in the blank: CSF __________ is a mechanism for describing an organization’s current and/or target cybersecurity posture.
Organizational Profile