15. NIST Cybersecurity Framework Exercise Solution
NIST Cybersecurity Framework Exercise Solution
ND545 C1 L2 09.1 NIST Cybersecurity Framework Exercise Solution Video
NIST CSF function summary
The first function, Identify: identify and document your valuable business assets and inventories. This step assists you with recognizing the valuable technology, data, and other resources your company owns.
The second function, Protect: ways you can secure the items you identified in step one. Ways to establish valid protection come in many forms, including nontechnical human components, such as security awareness. On the other side are technical products or services requiring some level of expertise, such as network security with firewalls and web filters, malware and virus protection, patching and updating, and encryption.
The third function, Detect: a real or potential incident as quickly as possible. This allows you to quickly and easily respond and recover. Detect is a process of developing and implementing activities to identify the occurrence of a cybersecurity event, with a focus on finding of such events.
The fourth function, Respond: Once you detect a problem, whether it’s a security breach, network outage, or system misconfiguration, you need to respond. This is your plan for handling incidents to ensure minimal organizational impacts.
The fifth function, Recovery: when an incident is properly responded, you may need to recover your organizational activities. To get your operations quickly back to normal can lessen the financial and human costs of a cybersecurity incident. The more resilient you are, the less your organization is effected.
By using the NIST CSF functions and categories, organizations experience fewer breaches and security compliance issues.