39
NIST Cybersecurity Framework Explained

NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

  • Upload
    others

  • View
    28

  • Download
    1

Embed Size (px)

Citation preview

Page 1: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

NIST Cybersecurity Framework Explained

Page 2: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Introduction

2

Tom ConkleG2 Inc, Cybersecurity Engineer & CForum Founding Member

Kelly HoodG2 Inc, Cybersecurity Engineer & CForum Member

Page 3: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Agenda

• Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”)

• Framework Overview• Framework Core Categories

Framework for Improving Critical Infrastructure

Cybersecurity

Version 1.1

4

Page 4: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Risk Management Framework (RMF)

Workforce Framework (NICE)

Privacy Engineering Framework (PEF)

Cyber Physical Systems (CPS) Framework

Cybersecurity Framework (CSF)

The Cybersecurity Framework helps organizes and communicate about cybersecurity improvements

NIST Frameworks

5

Page 5: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Framework Core

Framework Profiles

Implementation Tiers

The Cybersecurity Framework established three primary components

6

Page 6: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

The Framework Core establishes a common language for describing a cybersecurity program

Framework Core

• Common set of cybersecurity• activities, • desired outcomes, and • applicable references

• Used across critical infrastructure sectors

• Provides a high-level, strategic view of the lifecycle of an organization’s management of cybersecurity risk

7

Page 7: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Framework Core

The subcategories describe expected outcomes of a cybersecurity program

8

Page 8: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Each subcategory is matched with relevant Informative References

Framework Core

9

Page 9: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Implementation Tier Characteristics• Tier 1: Partial

• Cybersecurity program is ad-hoc

• Tier 2: Risk Informed• Cybersecurity roles are beginning to be

informally defined

• Tier 3: Repeatable• Cybersecurity program is defined in

formal, approved policies

• Tier 4: Adaptive• Cybersecurity program is robust with formal, approved policies and roles• Organization is seeking out information on new threats before they occur to

help stay ahead

10

Page 10: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Profiles help organizations align & prioritize cybersecurity activities

11

Page 11: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Current and Target state Profiles help organizations capture their cybersecurity program

• Current State Profile• Present state of the

organization’s unique cybersecurity program

• Target State Profile• Captures the to-be state

for the organization’s cybersecurity program

12

Page 12: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Category updates in the Framework Version 1.1

13

• Functions: 5 5• Categories: 22 23• Subcategories: 98 108

Supply Chain Risk

Management

Identity Management & Access Control

Page 13: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Version 1.1 clarified and enhanced the Core

14

Page 14: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Asset Management is the first category in the Identify Function

(ID.AM)

15

Page 15: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Business Environment is the second category in the Identify Function.

(ID.BE)

16

Page 16: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Governance is the third category in the Identify Function.

(ID.GV)

17

Page 17: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Risk Assessment is the forth category in the Identify Function.

(ID.RA)

18

Page 18: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Risk Management Strategy is the fifth category in the Identify Function.

(ID.RM)

19

Page 19: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Supply Chain Risk Management was added as the sixth category in the Identify Function.

(ID.SC)

20

Page 20: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Identity Management, Authentication, and Access Control is the first category in the Protect Function.

(PR.AC)

21

Page 21: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Awareness and Training is the second category in the Protect Function.

(PR.AT)

22

Page 22: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Data Security is the third category in the Protect Function.

(PR.DS)

23

Page 23: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Information Protection Processes and Procedures is the forth category in the Protect Function.

(PR.IP)

24

Page 24: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Maintenance is the fifth category in the Protect Function.

(PR.MA)

25

Page 25: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Protective Technology is the sixth category in the Protect Function.

(PR.PT)

26

Page 26: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Anomalies and Events is the first category in the Detect Function.

(DE.AE)

27

Page 27: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Security Continuous Monitoring is the second category in the Detect Function.

(DE.CM)

28

Page 28: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Detection Processes is the third category in the Detect Function.

(DE.DP)

29

Page 29: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Response Planning is the first category in the Respond Function.

(RS.RP)

30

Page 30: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Communications is the second category in the Respond Function.

(RS.CO)

31

Page 31: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Analysis is the third category in the Respond Function.

(RS.AN)

32

Page 32: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Mitigation is the forth category in the Respond Function.

(RS.MI)

33

Page 33: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Improvements is the fifth category in the Respond Function.

(RS.IM)

34

Page 34: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Recovery Planning is the first category in the Recover Function.

(RC.RP)

35

Page 35: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Improvements is the second category in the Recover Function.

(RC.IM)

36

Page 36: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Communications is the third category in the Recover Function.

(RC.CO)

37

Page 37: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

There are several benefits for using the NIST Cybersecurity Framework

• Common Language• Collaboration Opportunities• Maintain Compliance• Demonstrate Due Care• Secure Supply Chain• Measuring Cybersecurity Status• Cost Efficiency

39

Compliance Secure

Page 38: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Resources to aid in understanding & implementation of the NIST Cybersecurity Framework

Cybersecurity Framework Websitewww.NIST.gov/CyberFramework

CForum Websitewww.Cyber.securityFramework.org

G2 Templates & Implementation Assistance

www.ManageTheRisk.com

40

Page 39: NIST Cybersecurity Framework Explained · 2019-07-26 · Framework for Improving Critical Infrastructure Cybersecurity (the “Cybersecurity Framework”) • Framework Overview •

© 2018 RSA Conference. All rights reserved.

Questions?

41

Tom ConkleCybersecurity [email protected](443) 292-6679

Kelly HoodCybersecurity [email protected](443) 741-1968