Search This Blog

Saturday, October 1, 2022

NIST CSF (Cybersecurity Framework)

NIST CSF Introduction

Version 1.0 of the National Institute of Standards and Technology Cybersecurity Framework was issued in February 2014 and provides a framework for improving critical infrastructure cybersecurity.  Version 1.1 released in April 2018 refines, clarifies, and enhances version 1.0 of the NIST Cybersecurity Framework (CSF).  

The National Institute of Standards and Technology is currently working on version 2.0 of the NIST CSF.  

Find the latest version of the NIST CSF at:  NIST CSF 

This article as an overview of the NIST Cybersecurity framework and is not meant to drill down to deep.  Separate articles drill down on each function in greater detail.


Organizational Benefits from NIST CSF

Based on security practices known to be effective, the NIST Cybersecurity Framework (CSF), establishes a set of standard security functions and outcomes.  Organizations can use the NIST CSF to improve their cybersecurity posture.  It helps organizations foster communication about cybersecurity internally and externally and allows organizations to integrate and align cybersecurity risk management with enterprise risk management processes.


Introduction to the five (5) NIST CSF Functions

The NIST Cybersecurity framework is organized on 5 key functions:


NIST Cybersecurity Functions
NIST CSF Function Table

These five (5) functions are a comprehensive view of managing cybersecurity risk over time.  Each function is an important aspect of cybersecurity and all functions are needed to have an effective cybersecurity posture.


NIST CSF Identify

The NIST CSF Identify function helps to develops the ability to manage cybersecurity risk to: systems, assets, data, and capabilities.  It involves inventorying assets, systems, and data to determine what needs protecting.

The NIST CSF Identify function helps to:

  1. Identify critical enterprise processes and assets
  2. Document information flows
  3. Maintain hardware and software inventory
  4. Establish policies for cybersecurity that include roles and responsibilities
  5. Identify threats, vulnerabilities, and risk to Assets

NIST CSF Protect

The NIST CSF Protect function is focused on putting in place the appropriate safeguards to ensure delivery of services.  So, implementing the protection mechanisms to ensure critical information systems and operational systems are protected and in service.

The Protect function helps to: 

  1. Manage access to assets and Information
  2. Protect Sensitive data
  3. Conduct regular backups
  4. Protect devices
  5. Manage device vulnerabilities
  6. Train Users


NIST CSF Detect

NIST CSF Detect function ensures the appropriate mechanisms and tools are in place to identify occurrences of cybersecurity events.  Detect is all about identifying when a cybersecurity event is happening.

  1. The Detect function helps to:
  2. Test and update detection processes
  3. Know the expected data flows for your enterprise
  4. Maintain and monitor logs
  5. Understand the impact of cybersecurity events


NIST CSF Respond

The NIST CSF Respond function ensures the appropriate activities and mechanisms are in place to take appropriate actions when a cybersecurity event is detected.  The Respond function is all about taking swift action when a cybersecurity event happens to contain and prevent any further impacts. 


The NIST CSF Respond function helps to:

  1. Ensure response plans are tested
  2. Ensure response plans are updated
  3. Internal and external stakeholder coordination is managed and in place



NIST CSF Recover

The NIST CSF Recover function ensures appropriate activities are in place to maintain plans for resilience and to restore systems, capabilities, or services impaired due to a cybersecurity event.   The respond function is focused on recovery or restoring any services that were impacted due to a cybersecurity event.


The NIST CSF Recover function helps to:

  1. Communicate with internal and external stakeholders
  2. Ensure recovery plans are updated
  3. Manage public relations and company reputation



NIST CSF Implementation Tiers

NIST defines Implementation tiers for the Cybersecurity framework.  The Tiers denote increasing degrees of rigor and maturity regarding cybersecurity risk management practices.  The tier levels help with determining the extent to which cybersecurity risk management is informed by business needs and is integrated into an organization’s overall risk management practices.   

Tiers are defined to support organizational decision making on how to manage cybersecurity risk, as well as helping to determine the dimensions that are higher priority for an organization and should receive additional resources.  Obtaining higher tiers is encouraged when it is determined to be feasible and cost-effective for reduction of cybersecurity risk.


The Tier definitions are as follows:

  • Tier 1: Partial
  • Tier 2: Risk Informed
  • Tier 3: Repeatable
  • Tier 4: Adaptive


Conclusion

The NIST Cybersecurity Framework is important for increasing an organizations security posture.  The NIST CSF is built based on security practices that are known to be effective.  This is extremely helpful to organization in improving cybersecurity risk management practices.  NIST CSF is organized around 5 functions, Identify, Protect, Detect, Respond, and Recover.  The NIST Cybersecurity framework also helps to foster communication across internal and external stakeholders allowing organizations to work more collaboratively to improve the cybersecurity posture across the enterprise.  


Finally NIST CSF establishes four (4) implementation tiers and are defined to help with organizational decision making on how to manage cybersecurity risk.  The four implementation tiers are:  Tier 1: Partial, Tier 2: Risk Informed, Tier 3: Repeatable, Tier 4: Adaptive


Subscribe to Feed

Popular Posts

About Me

My photo
I am James Bamberger, an experienced long term investor, MBA, PMP, and Certified Scrum Master who enjoys traveling, the outdoors, family, and spending time with my four kids. You will find Information on leadership, journaling, investing, travel, and the outdoors here. Post a comment if you don't find the information you are looking for. We (my oldest daughter and I) are adding new material often.

Bocaiw Directory