NIST Cyber Security Professional.. things to remember

NIST Cyber Security Professional.. things to remember

Digital Transformation + Cyber Security = Success

Digital Transformation. What to focus on:

Customer Experience -> Operational Efficiencies -> New Revenue Streams -> Rapid Response to Change

What is NIST-CSF : National Institute of Standards & Technology – Cyber Security Framework

The framework is made up of PROFILE : CORE : IMPLENTATION TIERS

Overall, the framework is to improve cyber security against threats.

NIST 7-Step Approach : Scope/Prioritise -> Orient -> Profile -> Risk Assessment -> Target Profile -> Analyse/Prioritise Gaps -> Implement Action plan

Benefits of NIST-CSF : Common Language -> Collaboration -> Due Diligence -> Budget & resource -> Inclusive of Supply Chain -> Compliance

Functions :
Identify -> Protect
> Detect -> Respond -> Recover

Categories :

Identify -> Asset Management -> Business Environment -> Governance -> Risk Assessment -> Risk Mgt Strategy -> Supplu Chain

Protect -> Access Control -> Awareness & Training -> Data Security -> Information Protection -> Maintenance -> Protective Technology

Detect -> Detect anomalies & events -> continuous monitoring -> develop and deploy detection processes

Respond -> Response Processes and Procedures -> Coordinate response activities -> Mitigate effect -> Capture

Recover -> Recovery Planning -> Improvements -> Communications

NIST-CSF Tiers :

  • Tier 1 – Partial – Limited cyber security risk awareness
  • Tier 2 – Risk Informed – Some risk practices.
  • Tier 3 – Repeatable – Formal risk management & receives external information.
  • Tier 4 – Adaptive – Adaptive risk management and actively shares information.

Properties of Risk Management: Risk Management Process -> Integrated Risk Management Program -> External Participation

Cyber Risk Equation : Risk = Threats x Vunerabilities x Asset Value (Risk is NEVER ZERO)

NIST-CSF core: Function -> Categories -> Subcategories (Note: Subcategories -> Maps to : Informative references)

Risk Assessment Methodology (4 parts) : Assessment process -> Risk model, -> Assessment approach, -> Analysis approach.

Risk management Strategy

(input) Risk assumptions – > Risk constraints -> Priorities and trade-offs – > Risk tolerance -> Uncertainty.

(Outputs) Foundation for Risk Management -> Boundaries for risk based decisions ->

Risk Assessment : Frame the risk -> Assess the risk -> Respond to the risk -> Monitor the risk

CIIS – Continual Implementation & Improvement System

Set Vision-> Current Situation -> Goals -> Plans -> Progress -> Momentum

Steve

Comments are closed.