Home NIST Cybersecurity Framework
Post
Cancel

NIST Cybersecurity Framework

NIST Cybersecurity Framework

Introduction

There are several complex cybersecurity frameworks that can be utilized to construct a more effective security program and aid in guiding the organization to manage and mitigate risks. Organizations can employ the NIST framework to:

  • Evaluate their existing cybersecurity posture
  • Identify any gaps
  • Prioritize necessary actions
  • Formulate a roadmap to enhance their overall cybersecurity resilience.

There are several well-known frameworks, such as ISO 27001 and CIS Controls, among others. All of these frameworks offer valuable guidance for enhancing cybersecurity practices. However, my current focus is on the NIST framework, which consists of five core functions, an implementation tier, and profiles.

Components

(Functions)

The core consists of activities, desired outcomes, and relevant references that are universally applicable across the sector. This encompasses industry standards, guidelines, and best practices that can be effectively communicated and understood from an executive level down to the implementation and operational levels.

Core

The core consists of 5 functions:

  1. Identify
  2. Protect
  3. Detect
  4. Respond
  5. Recover

You’ve identified that taking care of the organization’s assets is really important. One big thing you noticed is that some data that’s not being actively used isn’t properly protected. To make sure it’s protected, you’ve added measures to keep it locked up, like putting it in a digital safe (encrypting it). You’ve also set up a way to detect if anyone tries to mess with it without permission.

Now, the next step is being ready to respond if something goes wrong. If your watchful system notices anything fishy, you want to have a plan in place to take action and stop any potential problems from getting worse. It’s like having a team on standby to deal with things immediately.

Even though you’ve done a lot to be prepared and responsive, there’s still one more important thing: making sure that if something does happen, you can recover and bounce back quickly. Think of it like having a backup plan to get everything back to normal and running smoothly again. The better your plans for all these steps, the faster you can get things back on track.

Implementation Tiers (process)

The Implementation Tier assists the organization in evaluating and communicating their level of cybersecurity maturity and readiness. It helps them get a clear picture of where they currently stand in terms of putting the core functions of the framework into action. Moreover, it offers a guide for how they can enhance their practices and move forward effectively.

There are four implementations Tiers

TiersRisk Management ProcessIntegrated Risk Management ProgramExternal Participation
PartialRisk Management Process is not Formalized and process is not well defined and AD hoc approach for risk or ractive mannerThere is limited awareness of cybersecurity risk at the organizational level and inconsistencies in security measurement implemented across the organizationinconsistencies in security measurement implemented across the organization. Not aware to supply chain risks
Risk-InformedRisk Management Process is approved by management but may not be established as organizational-wide policyThere is an awareness of cybersecurity risk at the organizational level, but an organization-wide approach to managing cybersecurity risk has not been established. Identified and prioritzed critical assests, vulenerabilities, and threatsOrgaization does collaborate but may not share information wth others and they are aware of supply chain risks
RepeatableRisk Management Process is fromally approved and expressed as policy and its updated when changes in bsuiness or mission requirment changes or when the threat and technology changesorganizational-wide approach to manage the risk. Risk-informed policies, processes, and procedures are defined, implemented as intended, and reviewedIt collaborates with and receives information from other entities regularly that complements internally generated information, and shares information with other entities. The organization is aware of the cyber supply chain risks. Usually acts formall upon supply chain risk
AdaptiveThe organization adapts its cybersecurity practices based on previous and current cybersecurity activities, including lessons learned and predictive indicators. Actively adapts to a changing threat and technology landscape and responds in a timely and effective manner to evolving, sophisticated threats.organization-wide approach to managing cybersecurity risk that uses risk-informed policies, processes, and procedures to address potential cybersecurity events.The organization shares that information internally and externally with other collaborators. The organization uses real-time or near real-time information to understand and consistently act upon cyber supply chain risks associated. Communicates proactively, using formal (e.g. agreements) and informal mechanisms to develop and maintain strong supply chain relationships.

By knowing where they currently stand and setting goals to move up in the tiers, the organization can make their cybersecurity stronger and align their efforts with the industry best practices and communication their cybersecurity maturity to stakeholder and partner

Profiles (Attributes)

Profiles refer to customized sets of cybersecurity rules and safeguards that are chosen and put in place to match an organization’s comfort level for risk, business goals, and rules it needs to follow. An organization can use several profiles.

Profiles help outline how things are being done now and how they should be done in the future for specific cybersecurity actions. Looking at the differences between these can show where problems might be, and then a plan can be made to fix those problems.

  • Current state: What’s happening right now as a result of the actions taken.
  • Desired state: The result that needs to happen or be reached.
This post is licensed under CC BY 4.0 by the author.