Unit 1 - NIST CSWP 29 Flashcards
(78 cards)
What does the NIST Cybersecurity Framework (CSF) 2.0 provide guidance on?
Managing cybersecurity risks
It offers a taxonomy of high-level cybersecurity outcomes for organizations of all sizes and sectors.
What are the primary components of the CSF 2.0?
- CSF Core
- CSF Organizational Profiles
- CSF Tiers
Each component serves a unique purpose in managing cybersecurity risks.
Who is the primary audience for the CSF?
Individuals responsible for developing and leading cybersecurity programs
It can also be used by executives, boards, risk managers, and policymakers.
True or False: The CSF prescribes specific outcomes and how they should be achieved.
False
The CSF links to resources for additional guidance but does not prescribe methods.
What is the purpose of CSF Organizational Profiles?
To describe an organization’s current and/or target cybersecurity posture
They relate to the outcomes defined in the CSF Core.
What are the CSF Functions?
- GOVERN
- IDENTIFY
- PROTECT
- DETECT
- RESPOND
- RECOVER
These Functions organize cybersecurity outcomes at the highest level.
Fill in the blank: The CSF Core is a taxonomy of high-level cybersecurity _______.
outcomes
It helps organizations manage their cybersecurity risks.
What does the GOVERN Function focus on?
Establishing, communicating, and monitoring the cybersecurity risk management strategy
It also addresses policy and oversight of cybersecurity strategy.
What does the IDENTIFY Function entail?
Understanding the organization’s current cybersecurity risks
This includes identifying assets and related cybersecurity risks.
What is the role of the PROTECT Function?
To implement safeguards to manage cybersecurity risks
This includes identity management, data security, and platform security.
What does DETECT refer to in the CSF?
The ability to find and analyze possible cybersecurity attacks and compromises
It supports incident response and recovery activities.
What actions does the RESPOND Function cover?
Actions taken regarding a detected cybersecurity incident
This includes incident management and communication.
What is the aim of the RECOVER Function?
To restore assets and operations affected by a cybersecurity incident
This helps reduce the effects of incidents and enables effective communication during recovery.
True or False: The CSF is designed to be a one-size-fits-all approach.
False
Organizations have unique risks and varying risk appetites, necessitating tailored implementations.
What are Informative References in the context of the CSF?
Sources of guidance on each outcome from existing global standards, guidelines, frameworks, regulations, and policies
They support organizations in achieving cybersecurity outcomes.
What do Implementation Examples illustrate?
Potential ways to achieve each outcome within the CSF
They help organizations understand practical applications of the framework.
Fill in the blank: The CSF is designed to be used by organizations of all _______ and sectors.
sizes
This includes industry, government, academia, and nonprofit organizations.
What is the significance of the Cybersecurity Framework (CSF) 2.0?
It helps organizations manage and reduce their cybersecurity risks
It is useful regardless of the maturity level of an organization’s cybersecurity programs.
What is the relationship between the CSF and enterprise risk management (ERM)?
The CSF is integrated into the broader ERM strategy
It addresses cybersecurity alongside other risks like financial and reputational risks.
What are potential benefits of actions to reduce cybersecurity risk for an organization?
Increasing revenue
For example, offering excess facility space to a commercial hosting provider.
What does the NIST Cybersecurity Framework (CSF) Functions diagram represent?
A wheel showing the interrelation of CSF Functions.
What is the role of the GOVERN Function in the CSF?
It informs how an organization will implement the other five Functions.
What are the five main Functions of the NIST Cybersecurity Framework?
- GOVERN
- IDENTIFY
- PROTECT
- DETECT
- RESPOND
- RECOVER
True or False: Actions supporting GOVERN, IDENTIFY, PROTECT, and DETECT should occur continuously.
True