www.cybersaint.io Open in urlscan Pro
2606:2c40::c73c:67e4  Public Scan

Submitted URL: https://content.cybersaint.io/e3t/Ctc/WZ+113/ct02K04/VW21-_4cDJB8VvXgzJ52V1_sW28qdJZ4M8BNdMtGxmm3lLBZV1-WJV7CgTxqVNQrkc8-qtpJW...
Effective URL: https://www.cybersaint.io/ultimate-nist-cybersecurity-framework-adoption-guide?utm_medium=email&_hsmi=167726353&_hsenc=p2A...
Submission: On July 06 via api from FR — Scanned from FR

Form analysis 0 forms found in the DOM

Text Content

 * Products
   * Cyberstrong
     * Continuous Control Automation
       For Enterprise
       CyberStrong
       Unparalleled automation, visibility, and efficiency across every facet of
       cybersecurity risk management, trusted by the Fortune 500.
       View Pricing
        * Continuous Control Automation
          
          Automate control compliance at scale with powerful, agile AI.
       
        * Executive & Board Reporting
          
          Present actionable insights in terms that clearly illustrate
          cybersecurity posture.
       
        * Cyber Risk Register
          
          Identify and track all risks, impacts, and mitigations in a single
          location.
       
        * Frameworks & Standards
          
          Align with key requirements and provide assurance across the
          enterprise.
       
        * Automated Crosswalking
          
          Project compliance posture across regulatory frameworks, industry
          standards, or custom control sets to reduce duplicate efforts.
       
        * Integrations
          
          Integrate with your security and IT tech stack to facilitate real-time
          compliance and risk management.
       
       For startups and SMBs
       CyberBase
       Easily meet compliance standards while reducing cost and minimizing cyber
       risk.
       View Pricing
        * Cybersecurity Maturity Model Certification & DFARS
          
          Meet the necessary requirements to do business in the Department of
          Defense supply chain.
       
        * NIST Ransomware Framework
          
          Show due care by aligning with NIST’s guidance for ransomware risk
          management.
       
        * NIST Cybersecurity Framework
          
          Align with the gold-standard NIST CSF and take a proactive approach to
          cybersecurity
     
     * Cyber Risk Register
       Resources
        * Resource Center
          
          Whitepapers, one-pagers, industry reports, analyst research, and more.
       
        * Webinar Channel
          
          Webinars for cutting-edge CISOs, cybersecurity teams, IT compliance
          professionals, and risk management experts.
       
        * Blog
          
          Learn from our experts.
       
        * Case Studies
          
          Explore our customer success stories.
     
     * Automated Crosswalking
       Company
        * Team
          
          Learn more about our mission, vision, and leadership.
       
        * Careers
          
          Join the CyberSaint team.
       
        * Partners
          
          Join our partner ecosystem.
          
           * MSPs/MSSPs
           * SIs
           * Consultancy
       
        * In the Press
          
          CyberSaint is making headlines.
     
     * Executive & Board Reporting
     * Frameworks & Standards
     * Integrations
     For Enterprise
     CyberStrong
     Unparalleled automation, visibility, and efficiency across every facet of
     cybersecurity risk management, trusted by the Fortune 500.
     View Pricing
      * Continuous Control Automation
        
        Automate control compliance at scale with powerful, agile AI.
     
      * Executive & Board Reporting
        
        Present actionable insights in terms that clearly illustrate
        cybersecurity posture.
     
      * Cyber Risk Register
        
        Identify and track all risks, impacts, and mitigations in a single
        location.
     
      * Frameworks & Standards
        
        Align with key requirements and provide assurance across the enterprise.
     
      * Automated Crosswalking
        
        Project compliance posture across regulatory frameworks, industry
        standards, or custom control sets to reduce duplicate efforts.
     
      * Integrations
        
        Integrate with your security and IT tech stack to facilitate real-time
        compliance and risk management.
     
     For startups and SMBs
     CyberBase
     Easily meet compliance standards while reducing cost and minimizing cyber
     risk.
     View Pricing
      * Cybersecurity Maturity Model Certification & DFARS
        
        Meet the necessary requirements to do business in the Department of
        Defense supply chain.
     
      * NIST Ransomware Framework
        
        Show due care by aligning with NIST’s guidance for ransomware risk
        management.
     
      * NIST Cybersecurity Framework
        
        Align with the gold-standard NIST CSF and take a proactive approach to
        cybersecurity
   
   * Cyberbase
     * Cybersecurity Maturity Model Certification & DFARS
       For Enterprise
       CyberStrong
       Unparalleled automation, visibility, and efficiency across every facet of
       cybersecurity risk management, trusted by the Fortune 500.
       View Pricing
        * Continuous Control Automation
          
          Automate control compliance at scale with powerful, agile AI.
       
        * Executive & Board Reporting
          
          Present actionable insights in terms that clearly illustrate
          cybersecurity posture.
       
        * Cyber Risk Register
          
          Identify and track all risks, impacts, and mitigations in a single
          location.
       
        * Frameworks & Standards
          
          Align with key requirements and provide assurance across the
          enterprise.
       
        * Automated Crosswalking
          
          Project compliance posture across regulatory frameworks, industry
          standards, or custom control sets to reduce duplicate efforts.
       
        * Integrations
          
          Integrate with your security and IT tech stack to facilitate real-time
          compliance and risk management.
       
       For startups and SMBs
       CyberBase
       Easily meet compliance standards while reducing cost and minimizing cyber
       risk.
       View Pricing
        * Cybersecurity Maturity Model Certification & DFARS
          
          Meet the necessary requirements to do business in the Department of
          Defense supply chain.
       
        * NIST Ransomware Framework
          
          Show due care by aligning with NIST’s guidance for ransomware risk
          management.
       
        * NIST Cybersecurity Framework
          
          Align with the gold-standard NIST CSF and take a proactive approach to
          cybersecurity
     
     * NIST Ransomware Framework
       Resources
        * Resource Center
          
          Whitepapers, one-pagers, industry reports, analyst research, and more.
       
        * Webinar Channel
          
          Webinars for cutting-edge CISOs, cybersecurity teams, IT compliance
          professionals, and risk management experts.
       
        * Blog
          
          Learn from our experts.
       
        * Case Studies
          
          Explore our customer success stories.
     
     * NIST Cybersecurity Framework
       Company
        * Team
          
          Learn more about our mission, vision, and leadership.
       
        * Careers
          
          Join the CyberSaint team.
       
        * Partners
          
          Join our partner ecosystem.
          
           * MSPs/MSSPs
           * SIs
           * Consultancy
       
        * In the Press
          
          CyberSaint is making headlines.
     Resources
      * Resource Center
        
        Whitepapers, one-pagers, industry reports, analyst research, and more.
     
      * Webinar Channel
        
        Webinars for cutting-edge CISOs, cybersecurity teams, IT compliance
        professionals, and risk management experts.
     
      * Blog
        
        Learn from our experts.
     
      * Case Studies
        
        Explore our customer success stories.
   For Enterprise
   CyberStrong
   Unparalleled automation, visibility, and efficiency across every facet of
   cybersecurity risk management, trusted by the Fortune 500.
   View Pricing
    * Continuous Control Automation
      
      Automate control compliance at scale with powerful, agile AI.
   
    * Executive & Board Reporting
      
      Present actionable insights in terms that clearly illustrate cybersecurity
      posture.
   
    * Cyber Risk Register
      
      Identify and track all risks, impacts, and mitigations in a single
      location.
   
    * Frameworks & Standards
      
      Align with key requirements and provide assurance across the enterprise.
   
    * Automated Crosswalking
      
      Project compliance posture across regulatory frameworks, industry
      standards, or custom control sets to reduce duplicate efforts.
   
    * Integrations
      
      Integrate with your security and IT tech stack to facilitate real-time
      compliance and risk management.
   
   For startups and SMBs
   CyberBase
   Easily meet compliance standards while reducing cost and minimizing cyber
   risk.
   View Pricing
    * Cybersecurity Maturity Model Certification & DFARS
      
      Meet the necessary requirements to do business in the Department of
      Defense supply chain.
   
    * NIST Ransomware Framework
      
      Show due care by aligning with NIST’s guidance for ransomware risk
      management.
   
    * NIST Cybersecurity Framework
      
      Align with the gold-standard NIST CSF and take a proactive approach to
      cybersecurity

 * Resources
   * Resource Center
     For Enterprise
     CyberStrong
     Unparalleled automation, visibility, and efficiency across every facet of
     cybersecurity risk management, trusted by the Fortune 500.
     View Pricing
      * Continuous Control Automation
        
        Automate control compliance at scale with powerful, agile AI.
     
      * Executive & Board Reporting
        
        Present actionable insights in terms that clearly illustrate
        cybersecurity posture.
     
      * Cyber Risk Register
        
        Identify and track all risks, impacts, and mitigations in a single
        location.
     
      * Frameworks & Standards
        
        Align with key requirements and provide assurance across the enterprise.
     
      * Automated Crosswalking
        
        Project compliance posture across regulatory frameworks, industry
        standards, or custom control sets to reduce duplicate efforts.
     
      * Integrations
        
        Integrate with your security and IT tech stack to facilitate real-time
        compliance and risk management.
     
     For startups and SMBs
     CyberBase
     Easily meet compliance standards while reducing cost and minimizing cyber
     risk.
     View Pricing
      * Cybersecurity Maturity Model Certification & DFARS
        
        Meet the necessary requirements to do business in the Department of
        Defense supply chain.
     
      * NIST Ransomware Framework
        
        Show due care by aligning with NIST’s guidance for ransomware risk
        management.
     
      * NIST Cybersecurity Framework
        
        Align with the gold-standard NIST CSF and take a proactive approach to
        cybersecurity
   
   * Case Studies
     Resources
      * Resource Center
        
        Whitepapers, one-pagers, industry reports, analyst research, and more.
     
      * Webinar Channel
        
        Webinars for cutting-edge CISOs, cybersecurity teams, IT compliance
        professionals, and risk management experts.
     
      * Blog
        
        Learn from our experts.
     
      * Case Studies
        
        Explore our customer success stories.
   
   * Blog
     Company
      * Team
        
        Learn more about our mission, vision, and leadership.
     
      * Careers
        
        Join the CyberSaint team.
     
      * Partners
        
        Join our partner ecosystem.
        
         * MSPs/MSSPs
         * SIs
         * Consultancy
     
      * In the Press
        
        CyberSaint is making headlines.
   
   * Webinar Channel
   Resources
    * Resource Center
      
      Whitepapers, one-pagers, industry reports, analyst research, and more.
   
    * Webinar Channel
      
      Webinars for cutting-edge CISOs, cybersecurity teams, IT compliance
      professionals, and risk management experts.
   
    * Blog
      
      Learn from our experts.
   
    * Case Studies
      
      Explore our customer success stories.

 * Company
   * Team
     For Enterprise
     CyberStrong
     Unparalleled automation, visibility, and efficiency across every facet of
     cybersecurity risk management, trusted by the Fortune 500.
     View Pricing
      * Continuous Control Automation
        
        Automate control compliance at scale with powerful, agile AI.
     
      * Executive & Board Reporting
        
        Present actionable insights in terms that clearly illustrate
        cybersecurity posture.
     
      * Cyber Risk Register
        
        Identify and track all risks, impacts, and mitigations in a single
        location.
     
      * Frameworks & Standards
        
        Align with key requirements and provide assurance across the enterprise.
     
      * Automated Crosswalking
        
        Project compliance posture across regulatory frameworks, industry
        standards, or custom control sets to reduce duplicate efforts.
     
      * Integrations
        
        Integrate with your security and IT tech stack to facilitate real-time
        compliance and risk management.
     
     For startups and SMBs
     CyberBase
     Easily meet compliance standards while reducing cost and minimizing cyber
     risk.
     View Pricing
      * Cybersecurity Maturity Model Certification & DFARS
        
        Meet the necessary requirements to do business in the Department of
        Defense supply chain.
     
      * NIST Ransomware Framework
        
        Show due care by aligning with NIST’s guidance for ransomware risk
        management.
     
      * NIST Cybersecurity Framework
        
        Align with the gold-standard NIST CSF and take a proactive approach to
        cybersecurity
   
   * Partners
     Resources
      * Resource Center
        
        Whitepapers, one-pagers, industry reports, analyst research, and more.
     
      * Webinar Channel
        
        Webinars for cutting-edge CISOs, cybersecurity teams, IT compliance
        professionals, and risk management experts.
     
      * Blog
        
        Learn from our experts.
     
      * Case Studies
        
        Explore our customer success stories.
   
   * In The Press
     Company
      * Team
        
        Learn more about our mission, vision, and leadership.
     
      * Careers
        
        Join the CyberSaint team.
     
      * Partners
        
        Join our partner ecosystem.
        
         * MSPs/MSSPs
         * SIs
         * Consultancy
     
      * In the Press
        
        CyberSaint is making headlines.
   Company
    * Team
      
      Learn more about our mission, vision, and leadership.
   
    * Careers
      
      Join the CyberSaint team.
   
    * Partners
      
      Join our partner ecosystem.
      
       * MSPs/MSSPs
       * SIs
       * Consultancy
   
    * In the Press
      
      CyberSaint is making headlines.

 * Meet With Us

 * Product
   
   * CyberStrong for Enterprises
   * CyberBase for SMBs
 * Pricing
   
   * CyberStrong Pricing
   * CyberBase Pricing
 * Customers
 * Resources
   
   * Resource Center
   * Blog
   * Webinars
   * In The Press
 * Company
   
   * Team
   * Partners
   * Contact

LOGIN
Request Demo

 * Product
   * CyberStrong for Enterprises
   * CyberBase for SMBs
 * Pricing
   * CyberStrong Pricing
   * CyberBase Pricing
 * Customers
 * Resources
   * Resource Center
   * Blog
   * Webinars
   * In The Press
 * Company
   * Team
   * Partners
   * Contact

 * Product
 * Pricing
 * Customers
 * Resources
   
   
   * Resource Center
   * Blog
 * Company
   
   
   * Team
   * Partners
   * Contact
   * In The Press




ADOPT THE NIST CYBERSECURITY FRAMEWORK - UNDERSTAND THE CSF IN 10 MINUTES OR
LESS

Your Ultimate Guide to Simplified NIST CSF Adoption

 

DOWNLOAD THE GUIDE

LOOKING INTO THE NIST FRAMEWORK?


THE ULTIMATE NIST CYBERSECURITY FRAMEWORK GUIDE

This Guide will cover everything that you need to know to start and improve your
NIST Framework-based program.

The Presidential Executive Order on Strengthening the Cybersecurity of Federal
Networks and Critical Infrastructure is motivating action from not only U.S.
federal agencies, but also from U.S. businesses. Recent cyberattacks and
breaches have resulted in heightened private sector awareness, which is driving
businesses to reevaluate how they can reduce enterprise risk. 

Frameworks create a common language for cyber that unifies the conversation
around enterprise risk and security.

Some organizations are even requiring their vendors to adopt frameworks as they
scale. Likewise, financial and healthcare companies are also realizing the
importance of securing their data following this set of best practices. Europe,
too, clearly sees the value of the framework as they look to it while finalizing
the NIS Directive.

When CyberSaint's Founder George Wrenn left his position as a global CSO to
start CyberSaint, he set out to accomplish one goal: Realizing that the
frameworks' nature—by far the most comprehensive approach—implicitly makes it
the most complex. As a result, there needed to be a clear path to implement this
framework at scale - enter CyberSaint.

 

> Our first conclusion: cybersecurity must be managed proactively and not
> reactively. 

> Our second conclusion: Companies have to be strategic when building their
> programs. 

 

As business leaders, there is a substantial responsibility to execute, keep our
companies protected. and effectively relay our progress back to our peers. This
pressure can be crushing - we see what can go wrong in revenue lost and
reputations damaged, sometimes beyond repair. A proactive information security
professional will certainly stay informed and advocate for increased resilience
via a standards-based approach.

As noted above, the NIST Cybersecurity Framework is by far the most
comprehensive framework, but it is also the most complex to navigate.

CSO Online Magazine: How Can My Program Benefit From a Standards-Based Approach?


 


WHY THE NIST CYBERSECURITY FRAMEWORK?

The National Institute of Standards and Technology’s (NIST) Cybersecurity
Framework, formally titled The Framework for Improving Critical Infrastructure
Cybersecurity, can overwhelm even experienced security professionals with its
complexity. Yet, increasingly, it is recognized as a national gold standard. Its
popularity and support are apparent: 61 percent of U.S. businesses are actively
working to adopt the framework as of 2017, and that number continues to grow.

With the release of Version 1.1 of the Framework, it is even more robust, and
still flexible. With the ability to be adopted by organizations of any size
voluntarily, its rapid adoption across industries proves its strength as a
foundation for any cybersecurity program.

The Under Secretary of Commerce for NIST, Walter Copan, noted

"From the very beginning, the Cybersecurity Framework has been a collaborative
effort involving stakeholders from government, industry, and academia. The
impact of their work is evident in the widespread adoption of the framework by
organizations across the United States, as well as internationally."

According to NIST,

"This second draft update aims to clarify, refine, and enhance the Cybersecurity
Framework, amplifying its value and making it easier to use. This latest draft
reflects comments received to date, including those from a public review process
launched in January 2017 and a workshop in May 2017."

 

> "The voluntary NIST Cybersecurity Framework should be every company's first
> line of defense. Adopting version 1.1 is a must do for all CEOs."
> 
> - U.S. Secretary of Commerce Wilbur Ross

 

Small and mid-sized businesses need to be aware that not only large enterprises
are targets, and the Framework may be the most robust method to implement best
practices.

The U.S. National Cybersecurity Alliance says that the cost of cleaning up after
an attack for a small to mid-sized business can range from $690,000 to over $1
million. The NIST Interagency Report (NISTIR) 7621 entitled “Small Business
Information Security: The Fundamentals” states “Because small businesses
typically don’t have the resources to invest in information security the way
larger businesses can, many cybersecurity criminals view them as soft targets.”
The report also notes that some hackers are attacking not simply for profit, but
out of revenge or the thrill of causing havoc. To a small business, a strong
cybersecurity program is often seen as a task too difficult because of the
resource requirements.

Nonetheless, the benefits greatly exceed the cost, as adopting a strong program
and creating a business process will help gain and retain customers especially
in light of publicized cybersecurity attacks, as customers expect sensitive
information to be protected from compromise. The NIST Framework is truly
applicable to any organization regardless of size as a jumping-off point to
establish their cybersecurity posture. It turns in traditional, more audit-based
policies for a risk-based approach to cybersecurity management. It’s a guideline
for businesses to update their risk management approach, as many U.S.
organizations across sizes and industries already leverage some type of security
framework. Businesses of all sizes and industries are seeing the importance of
building a robust cybersecurity program and are seeking more proactive
strategies. Its five core functions: identify, protect, detect, respond, and
recover, are a blueprint to mitigate cybersecurity risk. Implemented properly,
an organization will have the most powerful set of tools and procedures in
place. 

 

> In a sense, the Framework is a dynamic Deming cycle—continuous, logical, and
> always learning.


 


YOUR FRAMEWORK PROFILE

A Profile enables an organization to establish a roadmap for reducing
cybersecurity risk that is well-aligned with organizational and sector goals,
considers legal/regulatory requirements and industry best practices, and
reflects risk management priorities.

Given the complexity of many organizations, they may choose to have multiple
profiles, aligned with particular components and recognizing their individual
needs. Framework Profiles can be used to describe the current state or the
desired target state of specific cybersecurity activities.

Your Current and Target Profile

The Current Profile indicates the cybersecurity outcomes that are currently
being achieved. The Target Profile indicates the outcomes needed to achieve the
desired cybersecurity risk management goals.

It's important here to loop in goals from all business segments both business
and security. That way, you'll have a more well-rounded goal set that aligns
with your business's vision for the future.

The Value of Profiles

Profiles support business/mission requirements within your organization to all
constituents, and also aid in the communication of risk between organizations.
If you have a difficult time translating your current and target-risk and
cybersecurity strength to your partners, vendors, and the like, creating these
profiles will be monumental in boosting communication between all parties
involved. The better the communication is within and around your organization,
the more progress you'll make in building a robust program or even creating a
faster response plan.

If you're interested in baselining your organization against NIST Cybersecurity
Framework best practices in hours, check out CyberStrong. You'll be able to see
areas for improvement and gaps across all five NIST functions, and you'll have a
plan of action on how to close those gaps within your organization.


THE 5 NIST FRAMEWORK FUNCTIONS EXPLAINED

Identify

NIST defines the identify function as calling on the need to "develop the
organizational understanding to manage cybersecurity risk to systems, assets,
data, and capabilities.". In this function, as a cybersecurity stakeholder, you
can work on laying a foundation in your organization for effective use of the
Framework moving forward. The focus of identify is on the business and how it
relates to cybersecurity risk, especially taking into account the resources at
hand. Here are some of the outcome Categories associated with this function:

 * Asset Management
 * Business Environment
 * Governance
 * Risk Assessment
 * Risk Management Strategy

The importance of the identify function is clear: it lays the groundwork for
cybersecurity-related actions that your organization will take moving forward.
Identifying what exists, what risks are associated with those environments, and
how that relates in context with your business goals are crucial to having
success with the Framework. 

Successful implementation of the identify function could result in multiple
outcomes, for example:

 * Defining all assets and environments
 * Defining the current and target states of controls
 * Making a plan to remediate those gaps
 * Prioritizing how to approach mitigation in a business context
 * Prioritizing the needs of all stakeholders and business leaders involved
 * Defining how to communicate on cybersecurity issues with all related
   stakeholders

Organizations have to evolve in their cybersecurity practices and implement the
vital safeguards to contain and limit the impacts of potential cybersecurity
incidents. All digital and physical assets must be accounted for, and roles must
be defined with clear communication workflows around incidents and risk. The
policies and procedures that you implement will provide the stability needed for
your cybersecurity program as it works through all five functions and matures.

 

Protect

NIST says that the framework functions "aid an organization in expressing its
management of cybersecurity risk by organizing information, enabling risk
management decisions, addressing threats, and improving by learning from
previous activities". 

The protect function is important because its purpose is to "develop and
implement appropriate safeguards to ensure delivery of critical infrastructure
services. The Protect Function supports the ability to limit or contain the
impact of a potential cybersecurity event. Examples of outcome Categories within
this Function include: Identity Management and Access Control; Awareness and
Training; Data Security; Information Protection Processes and Procedures;
Maintenance; and Protective Technology" according to NIST. 

Protect covers these categories:

 * Access Control: validating identities and access to different systems,
   facilities, etc.
 * Awareness and Training: Giving employees and others the ability to be part of
   your cybersecurity plan with education and training.
 * Data Security: Manage your data according to company standards in order to
   mitigate cybersecurity risks, and protect its Availability, Integrity, and
   Confidentiality proactively.
 * Information Protection Processes & Procedures: Put in place the policies,
   processes, and procedures that you need to manage the protection of your
   assets.
 * Maintenance: Continuously repair your Information System components and
   mitigate them
 * Protective Technology: Deploy the security solutions needed to protect them
   in line with company policies

Some examples of ways to attain these requirements are:

 * Preventing data breaches by using 2FA, MFA, and controlling access to all of
   your environments and data.
 * Make sure your people are properly trained on how to handle your company's
   critical data and their various levels of access. Prevent accidents as much
   as possible.
 * Make sure your data is encrypted, in motion, and protected in all ways
   possible

Organizations must evolve as breaches are becoming all the more common. By
focusing on the protect function, you can put in place the policies and
procedures to lay a strong foundation for your cybersecurity program as it
matures in all five functions.

 

Detect

The detect function requires that you develop and implement the appropriate
activities to identify the occurrence of a cybersecurity event.

"The detect function enables timely discovery of cybersecurity events. Examples
of outcome Categories within this Function include: Anomalies and Events;
Security Continuous Monitoring; and Detection Processes."

 * Anomalies & Events: Your program will detect unusual activity as soon as
   possible, and the impact of events is understood by everyone on your team and
   beyond.
 * Security & Continuous Monitoring: You're monitoring your information system
   and environments at specified intervals to identify cybersecurity events in
   your organization.
 * Detection Processes: Procedures and processes for detection are put in place
   and tested in order to ensure timely and broad awareness of cybersecurity
   events.

The detect function is a critical step to a robust cybersecurity program - the
faster you can detect a cybersecurity event, the faster you can mitigate the
effects of it. Examples of how to accomplish steps towards a thorough detect
function are as follows:

 * Anomalies & Events: Prepare your team to have the knowledge to collect and
   analyze data from multiple points to detect an event.
 * Security & Continuous Monitoring: Make your team able to monitor your assets
   27/7 or consider involving an MSS to supplement.
 * Detection Processes: Attempt to know about a breach as soon as possible and
   follow disclosure requirements as needed. Your program should be able to
   detect inappropriate access to your data as soon as possible.

Clearly, the detect function is one of the most important, as detecting a breach
or event can be life or death for your business. There is no doubt that
following these best practices and implementing these solutions will help you
scale your program and mitigate cybersecurity risk. In our next blog post, we
will explore the respond function.

 

Respond

NIST defines respond as "Develop and implement appropriate activities to take
action regarding a detected cybersecurity incident".

"The Respond Function supports the ability to contain the impact of a potential
cybersecurity incident. Examples of outcome Categories within this Function
include: Response Planning; Communications; Analysis; Mitigation; and
Improvements".

Here are the parts to the respond function and their importance:

 * Response Planning: Response processes and procedures are executed and
   maintained, to ensure timely response to detected cybersecurity events.
 * Analysis: Analysis is conducted to ensure adequate response and support
   recovery activities.
 * Mitigation: Activities are performed to prevent the expansion of an event,
   mitigate its effects, and eradicate the incident.
 * Communications: Response activities are coordinated with internal and
   external stakeholders, as appropriate, to include external support from law
   enforcement agencies.
 * Improvements: Organizational response activities are improved by
   incorporating lessons learned from current and previous detection/response
   activities.

When breaches occur in companies, an incident response plan is critical to
managing the immediate aftermath. Surprisingly, lots of organizations don't have
an incident response plan or just haven't tested the plan that they have in
place.

 * Your Response Plan: Make sure that you're reporting breaches if they occur.
 * Mitigate: Make sure you have a plan to mitigate any event that could occur,
   in-house and with third parties.
 * Analyze: Go over your plan with experts inside and outside of your team.

 

Recover

According to NIST, the recover function is defined as the need to "develop and
implement the appropriate activities to maintain plans for resilience and to
restore any capabilities or services that were impaired due to a cybersecurity
security event.

"The Recover Function supports timely recovery to normal operations to reduce
the impact from a cybersecurity event. Examples of outcomes for this function
include: Recovery Planning, Improvements, and Communications."

Recover includes these areas:

 * Recovery Planning: Recovery procedures are tested, executed, and maintained
   so that your program can mitigate the effects of an event sooner rather than
   later
 * Improvement: Recovery planning and processes are improved when events happen
   and areas for improvement are identified and solutions put together
 * Communication: Coordinate internally and externally for greater organization,
   thorough planning, and execution

The recover function is important not only in the eyes of your business or
organization in recovering from an attack, but also in the eyes of your
customers or market. Swift recovery handled with grace and tactfulness will
allow you to end up in a much stronger position internally and externally than
you would otherwise.

 

> Prioritizing these focus areas within recover will ensure that your
> organization has a recovery plan that is up to date and matches your
> organization's goals and objectives.


 


SIMPLIFY NIST FRAMEWORK ADOPTION IN 5 STEPS

There’s little doubt that the NIST CSF is effective, but it’s also a complex
framework that needs to be tailored to meet an organization’s risk reduction
goals. When Dimensional Research surveyed 300 IT and security professionals in
the US, it found that 64% of respondents using the NIST CSF reported that they
were not using all the recommended controls, just some of them.

Also, 83% of organizations with plans to implement in the coming year reported
an intention to adopt some, rather than all, the CSF controls. Selective
adoption can yield results if done properly. This can be a great starting point
for organizations with limited resources. What’s required is a way to reduce the
complexity and make the NIST CSF just a little more digestible for your
organization.

Below are some key concepts that can both simplify and accelerate your NIST CSF
program.

Step #1 – Align NIST Program with Business Objectives

Map your objectives to the NIST control families. For example, if your
organization requires “availability” of systems as the top priority, then
starting with “Contingency Planning” (CP) controls is going to better align your
program with your business objectives.

Step #2 –  Focus on Foundational “Primary Controls” First
Start with a subset of the control families selected and limit your initial
custom framework control list to the vital “Primary Controls.” This will save
“Control Enhancements” for later when your NIST CSF program is more mature.
Control enhancements include details beyond the base control, such as frequency
of testing, automation, and extensive documentation of the process surrounding
the control. While important, these control enhancements only matter if the base
control is already in place.  

Step #3 – Get the Low-Hanging Fruit by Implementing NIST SP 800-171
Select your base framework controls using an existing framework profile or
selection such as the NIST SP 800-171, which covers more than 80% of the full
NIST CSF but requires approximately 20% of the effort, significantly reducing
the number of controls that need to be adopted. Similar to the 80/20 principle,
this approach can greatly improve security with a fraction of the effort
required to implement the full NIST CSF.

Step #4 – Balance the Five Framework Functions Evenly
Distribute your effort equally across all five phases of the NIST CSF. Creating
a balanced program.
If we follow the natural phases embodied with the NIST CSF, we can break the
various stages down into smaller pieces that are easier to digest and
implement.  

 * Identify the risks to your systems, data, and other assets. You must be able
   to effectively prioritize your focus, fully understand governance, and carry
   out accurate risk assessments.
 * Protect your critical infrastructure by limiting access to assets, training
   employees, securing and validating data integrity, implementing protective
   procedures and systems, and scheduling regular maintenance.
 * Detect cybersecurity events that could be attacked. This means flagging
   anomalies, monitoring traffic, and modeling regular noise so you can
   accurately identify anything suspicious. 
 * Respond when an event is detected. You need a clear response plan with a
   communication protocol and a fixed timeline. Responses should be analyzed,
   mitigation efforts tested, and all lessons learned used to make structural
   process improvements. 
 * Recover your vital services and capabilities after an attack as quickly as
   possible, so the impact on your organization is reduced. Solid recovery plans
   should be bolstered by a constantly evolving approach informed by events and
   strong communication links with relevant internal and external parties. 
 * If you’re stronger in one phase, then focus your efforts on one of your
   weaker phases. Do this until your program becomes balanced across the five
   framework phases. 

> Suggestion #5 – Leverage the Entire Organization
> 
> Make NIST CSF adoption a team sport. Engage business units and other resources
> across your organization. Many of the framework’s controls can be assigned to
> business functions such as HR, finance, or IT. The security team doesn’t have
> to own every control.

Infosecurity Magazine: How to Simplify NIST Framework Adoption


POPULAR BLOG POSTS

 * How ISO 27001 Helps Security Teams Stay On Top
 * Analyzing the Results of Your CIS Security Controls Risk Assessment
 * How To Get An ISO27001 Certification
 * Why Would My Startup Be At Risk For Cybersecurity
 * NIST vs. ISO –What You Need To Know


DOWNLOAD FOR FREE AND READ OFFLINE


Download the Guide

AUTOMATE NIST FRAMEWORK ADOPTION


SEE CYBERSTRONG IN ACTION

Schedule a demo

--------------------------------------------------------------------------------

Follow us on LinkedIn Follow us on Twitter Follow us on Facebook


CONNECT WITH US

(877) 647 8273
info@cybersaint.io

PR AND MEDIA CONTACT

media@cybersaint.io

 * Product
   * Executive & Board Reporting
   * Automated Crosswalking
   * Continuous Control Automation
   * Cybersecurity Risk Register
 * Resource Center
   * Resources
   * Blog
   * Glossary
   * Ransomware Risk Management
   * DFARS & CMMC Guide
   * Integrating GRC
 * Company
   * Contact
   * In the Press

--------------------------------------------------------------------------------

Copyright © 2022 CyberSaint Security
 * Privacy Policy

(877) 647-8273 info@cybersaint.io
Subscribe to our blog



PRODUCT

 * Compliance Management
 * IT Risk Management
 * Digital Risk Management
 * Vendor Risk Management


RESOURCE CENTER

 * Resources
 * Blog
 * Glossary
 * Integrating GRC
 * CMMC/DFARS Guide
 * Ransomware Risk Mangement


COMPANY

 * Team
 * Contact
 * In the Press
 * PR and Media Contact: media@cybersaint.io


CONNECT

 * Linkedin
 * Twitter
 * Facebook

Copyright © 2022 CyberSaint Security. All Rights Reserved. Privacy Policy.