NIST Cybersecurity Framework - A Cheat Sheet For Professionals
NIST Cybersecurity Framework - A Cheat Sheet For Professionals
LEARN MORE
growing threats of hackers, ransomware and stolen data, and the threat to LEARN MORE
data only continues to grow.
Information Security
SEE: NIST Cybersecurity Framework: A cheat sheet for professionals (free Certification Training
PDF) (TechRepublic) Bundle
Training from TechRepublic
Academy
President Barack Obama recognized the cyber threat in 2013, which led to his
cybersecurity executive order that attempts to standardize practices. President LEARN MORE
Donald Trump’s 2017 cybersecurity executive order went one step further and
made the framework created by Obama’s order into federal government
policy. DOWNLOAD OUR
WHITEPAPER NOW!
The framework isn’t just for government use, though: It can be adapted to
businesses of any size.
TechRepublic’s cheat sheet about the National Institute of Standards and 20 Pro Tips to Make
Technology’s Cybersecurity Framework (NIST CSF) is a quick introduction to Windows 10 Work the Way
this new government recommended best practice, as well as a “living” guide You Want
No matter how you look at it, adjusting
that will be updated periodically to reflect changes to the NIST’s configuration settings in Microsoft Windows
documentation. 10 can get complicatedvery quickly
Executive summary
What is the NIST Cybersecurity Framework? The NIST CSF is a set
DOWNLOAD NOW
of optional standards, best practices, and recommendations for
improving cybersecurity and risk management at the organizational
level. NIST wrote the CSF at the behest of Obama in 2014.
Why does the NIST Cybersecurity Framework matter? As
cyberattacks become more complex, repelling them becomes more Cybersecurity
difficult, especially without a single cohesive strategy for information
Insider
security and private sector organizations. The CSF aims to Stay abreast of the latest
standardize practices to ensure uniform protection of all US cyber cybersecurity news,
assets. solutions, and best practices.
Who does the NIST Cybersecurity Framework affect? The CSF
Email Address
affects anyone who makes decisions about cybersecurity and
Please select your country.
cybersecurity risks in their organizations, and those responsible for
implementing new IT policies.
When is the NIST Cybersecurity Framework happening? Obama I agree to the Terms of Use , Privacy Policy and
Video Services Policy . I understand I will
called for the creation of the CSF in an executive order issued in receive a complimentary subscription to
TechRepublic's News and Special Offers
newsletter, and Top Story of the Day newsletter
2013, and NIST released the guidelines a year later. Trump’s 2017 (you can opt out at any time).
1.1.
How can I implement the NIST Cybersecurity Framework? NIST
has thorough documentation of the CSF on its website, along with
links to FAQs, industry resources and other information necessary Top Story of the Day
to ease enterprise transition into a CSF world. If you can only read one tech
SEE: Governments and nation states are now officially training for story a day, this is it.
cyberwarfare: An inside look (PDF download) (TechRepublic)
Email Address
Framework?
I agree to the Terms of Use , Privacy Policy and
Video Services Policy . I understand I will
Obama signed Executive Order 13636 in 2013, titled Improving Critical receive a complimentary subscription to
TechRepublic's News and Special Offers
newsletter, and Top Story of the Day newsletter
Infrastructure Cybersecurity, which set the stage for the NIST Cybersecurity (you can opt out at any time).
Framework that was released in 2014. The CSF’s goal is to create a common
language, set of standards and easily executable series of goals for improving Subscribe
cybersecurity and limiting cybersecurity risk.
Framework core
The core is “a set of activities to achieve specific cybersecurity outcomes, and
references examples of guidance to achieve those outcomes.” It is further
broken down into four elements: Functions, categories, subcategories and
informative references.
Implementation tiers
There are four tiers of implementation, and while CSF documents don’t
consider them maturity levels, the higher tiers are considered more complete
implementation of CSF standards for protecting critical infrastructure.
Profiles
Profiles are both outlines of an organization’s current cybersecurity status and
roadmaps toward CSF goals for protecting critical infrastructure. NIST said
having multiple profiles—both current and goal—can help an organization find
weak spots in its cybersecurity implementations and make moving from lower
to higher tiers easier.
Additional resources
Cybersecurity threats and data breaches continue to increase, and the latest
disasters seemingly come out of nowhere and the reason why we’re
constantly caught off guard is simple: There’s no cohesive framework tying the
cybersecurity world together.
“If NIST learns that industry is not prepared for a new update, or sufficient
features have not been identified to warrant an update, NIST continues to
collect comments and suggestions for feature enhancement, bringing those
topics to the annual Cybersecurity Risk Management Conference for
discussion, until such a time that an update is warranted,” NIST said.
Additional resources
The degree to which the CSF will affect the average person won’t lessen with
time either, at least not until it sees widespread implementation and becomes
the new standard in cybersecurity planning.
If it seems like a headache it’s best to confront it now: Ignoring the NIST’s
recommendations will only lead to liability down the road with a cybersecurity
event that could have easily been avoided. Embrace the growing pains as a
positive step in the future of your organization.
Additional resources
Risk management tips from the SBA and NIST every small-business
owner should read (TechRepublic)
NIST’s Cybersecurity Framework offers small businesses a vital
information security toolset (TechRepublic)
IBM’s 2020 Cost of Data Breach report: What it all means –
Video (ZDNet)
DHS CISA and FBI share list of top 10 most exploited
vulnerabilities (ZDNet)
Can your organization obtain reasonable cybersecurity? Yes, and
here’s how (TechRepublic)
Kroger data breach highlights urgent need to replace legacy, end-
of-life tools (TechRepublic)
DevSecOps: What it is and how it can help you innovate in
cybersecurity (ZDNet)
Private sector organizations still have the option to implement the CSF to
protect their data—the government hasn’t made it a requirement for anyone
operating outside the federal government.
In 2018, the first major update to the CSF, version 1.1, was released. Most of the
changes came in the form of clarifications and expanded definitions, though
one major change came in the form of a fourth section designed to help
cybersecurity leaders use the CSF as a tool for self-assessing current risks.
While brief, section 4.0 describes the outcomes of using the framework for
self-assessment, breaking it down into five key goals:
There’s no better time than now to implement the CSF: It’s still relatively new, it
can improve the security posture of organizations large and small, and it could
position you as a leader in forward-looking cybersecurity practices and
prevent a catastrophic cybersecurity event.
Additional resources
Image: iStock/monsitj
By Brandon Vigliarolo
Brandon is a Staff Writer for TechRepublic. He's an award-winning feature and how-to writer who previously worked as an
IT professional and served as an MP in the US Army.
EDITOR'S PICKS
SERVICES EXPLORE
Systems downtime Newsletters Do Not Sell My Information Meet the Team Videos
expense calculator
RSS Feeds TechRepublic Academy
Research: The
Site Map TechRepublic Premium
complexities of
multicloud
Site Help & Feedback
deployments are often
worth the benefits,
even in uncertain times