One of the most common drawbacks of cybersecurity frameworks and standards is that they fail to make a sufficiently compelling case to business leaders. Many focus on the needs of IT teams and exhibit high technological complexity and technical challenges for implementation. Others are biased towards specific types of computing infrastructure or even specific vendors.
The NIST Cybersecurity Framework takes a different approach. It makes clear from the outset that cyber-risk is business risk. To that end, it is more a risk-management framework, and that is something business leaders are very familiar with. The NIST CSF controls span six function areas, 22 categories, and 106 subcategories to ensure comprehensive coverage.
The framework serves as voluntary guidance, drawing from widely adopted best practices and
existing guidelines and standards. It also gives organizations complete flexibility over how they implement the framework and how they prioritize their information security strategies. Version 1.1, published in 2018, also places a greater emphasis on protecting supply chains. While version 2.0, published in 2024, emphasizes the integration of cybersecurity into business strategy and promotes top-down governance.The NIST security control categories span six function areas that cover the entire lifecycle of cybersecurity-related incidents. Each of the 22 NIST CSF control categories are broken down into subcategories, of which there is a total of 106. These are directly tied to desired business outcomes. For example, the very first subcategory addresses physical device inventorying.
In addition to the Framework Core detailed above, there are two other main components – the Framework Implementation Tiers and the Framework Profile. The tiers provide context as to how the organization views its cybersecurity risk and how it manages it. The profiles represent the desired outcomes, prioritizations, and controls adopted specifically for your organization.
The first phase of implementing the framework aims to assist you in developing and supervising a cybersecurity strategy that aligns with your organization's overarching mission and risk tolerance. It addresses organizational context, risk management strategy, cybersecurity supply chain risk management, roles, responsibilities and authorities, policies, processes, and procedures, and oversight.
The second phase deals with evaluating your current environment and building out your risk profile. This involves inventorying every information-bearing device or virtual machine that makes up your environment and defining the roles and responsibilities of your stakeholders and workforce.
The next phase deals with the protective measures to be applied to mitigate the risks identified in the second phase. This function area encompasses the technical, physical, and administrative measures required across six primary categories:
The fourth phase covers an organization’s ability to detect threats and maintain full visibility over its computing environment. This plays a vital role in advanced and proactive security, since it guards against new and unknown threats as well.
Next, organizations must have a clearly defined and documented process for responding to threats. This is vital for stopping attacks in progress and mitigating their effects before they lead to far-reaching consequences:
The sixth and final stage is all about preparing for the worst-case scenario. Regardless of how sophisticated your detection and response capabilities are, it is vital that you have a process in place for recovering from an incident, such as a data breach, with as little damage to your business, clients, and stakeholders as possible.
Charles IT is Connecticut’s premier compliance and information security expert. We offer the full range of managed technology solutions and consultancy services to ensure your business is up to speed with the latest threats. Get in touch today to schedule a meeting!