You are on page 1of 10

eBook

NIST Cybersecurity Framework:


A Quick Start Guide
A baseline for your Cybersecurity programme
Introduction by Gonzalo Cuatrecasas
NIST Cybersecurity Framework: A Quick Start Guide

Building Cyber Resilience:


Why is it important?
In today's interconnected world, term and iterative approach to your
organizations of all sizes face organization’s cybersecurity.
ever-evolving cybersecurity threats. To
address these challenges, the National Cybersecurity is rapidly becoming a key
Institute of Standards and Technology point when building relationships with
(NIST) has developed a comprehensive partners. Either for important clients or
framework that provides a flexible and providers, not being able to show a
proactive approach to managing and well-documented cybersecurity
enhancing cybersecurity practices. program can be a deal breaker.
Standards like NIST CSF help your
The NIST Cyber Security Framework organization avoid relationship hick-ups
(CSF) consists of standards, guidelines in supply chains to client, supplier, and
and best practices to manage vendor.
cybersecurity from a corporate risk
management point of view. It provides a Inversely, you also become protected
set of desired cybersecurity activities from less secure organizations that may
and outcomes using common language like to connect to your environment.
that is easy to understand outside of IT.
As regulations and laws continue to
The Framework Core, and evolve, the NIST CSF also provides
Implementation Tiers support organizations with a strong
organizations by providing relevant cybersecurity foundation for
context on how an organization views compliance. This is even more important
cybersecurity risk management. Unlike as the compliance bar is steadily
other methods this framework provides increasing regardless of geography or
for a unique alignment of the industry. What’s more, some new
organizational requirements and regulations, like NYDFS 23
objectives, risk appetite, and resources (cybersecurity requirements on
against the desired outcomes. Financial Covered Entities) use the NIST
CSF as their cybersecurity reference.
The NIST CSF is becoming the gold
standard for how to build a
cybersecurity program creating a long
NIST Cybersecurity Framework: A Quick Start Guide

The NIST CSF: Another important area of


enhancement is “cloud management”.

A good place
Most companies have hybrid
environments with more PasS and
SaaS, which delegate legal and
to start operational responsibility to third
parties.
The NIST CybeSecurity Framework is Finally, the NIST CSF recommends
qualitatively well organized in a implementing “Role-Based Access
structure that makes it easier for Control” (RBAC) for user and admin
organizations to manage Cyber Risks as access management. As we move to
a Risk management discipline, rather hybrid cloud environments, a more
than an IT problem. As compared to modern Functional Access Control
other frameworks, such as ISO, it is a (FAC) methodology should be adapted.
good place to start, or migrate, to While RBAC is a good place to start,
establish a baseline for your FAC is more granular and secure access
Cybersecurity program. management approach.
As with any generic Framework, there But overall, this is a good starting point
may be some key cybersecurity areas for cybersecurity because it provides a
that are underrepresented. For comprehensive and flexible framework
instance, forensics and “log file for organizations to manage and
management” could be improved. In this mitigate cyber risks. It offers a common
case the NIST CSF only recommends 30 language, best practices, and
retention. After a breach, we know that guidelines that can be customized to fit
finding the vector of attack is the specific needs of any organization.
paramount, however, some breaches are
only discovered months after the initial So stay safe!
attack.

Gonzalo Cuatrecasas

Cyber Security Manager at Axel


Johnson International. Professor of the
Global MBA in Digital Transformation.
NIST Cybersecurity Framework: A Quick Start Guide

A Quick Start Guide


Getting Started with the NIST
Cybersecurity Framework:
What is the NIST
Cybersecurity Framework, OT
ECT
DE
PR
and how can my

TE
organization use it?

CT
TIFY
The NIST Cybersecurity Framework4 FRAMEWORK

IDEN

RESP
can help an organization begin or
improve their cybersecurity program.

ON
D
Built off of practices that are known to R
RECOVE
be effective, it can help organizations
improve their cybersecurity
posture. It fosters communication
among both internal and external
stakeholders about cybersecurity, and
for larger organizations, helps to better
integrate and align cybersecurity risk
management with broader
enterprise risk management processes
as described in the NISTIR 82865 series.

The Framework is organized by five key


Functions – Identify, Protect, Detect,
Respond, Recover. These five
widely understood terms, when
considered together, provide a
comprehensive view of the lifecycle for
managing cybersecurity risk over time.
The activities listed under each
Function may offer a good starting
point for your organization.

Amy Mahn1, Jeffrey Marron1, Stephen Quinn2, Daniel Topper3


1 NIST Applied Cybersecurity Division, Information Technology Laboratory
2 NIST Computer Security Division, Information Technology Laboratory
3 Huntington Ingalls Industries
4 https://www.nist.gov/cyberframework
5 https://csrc.nist.gov/publications/detail/nistir/8286/final
NIST Cybersecurity Framework: A Quick Start Guide

1 IDENTIFY
DEVELOP AN ORGANIZATIONAL
UNDERSTANDING TO MANAGE
CYBERSECURITY RISK TO: SYSTEMS,
ASSETS, DATA, AND CAPABILITIES.

Identify critical enterprise processes processes. Cybersecurity policies


and assets – What are your enterprise’s should be integrated with other
activities that absolutely must continue enterprise risk considerations (e.g.,
in order to be viable? For example, this financial, reputational).
could be maintaining a website to
retrieve payments, protecting Identify threats, vulnerabilities, and risk
customer/patient information securely, to assets – Ensure risk management
or ensuring that the information your processes are established and
enterprise collects remains accessible managed to ensure internal and
and accurate. external threats are identified,
assessed, and documented in risk
Document information flows – It’s registers. Ensure risk responses are
important to not only understand what identified and prioritized, executed, and
type of information your enterprise results monitored.
collects and uses, but also to
understand where the data is located
and and how it is used, especially where
contracts and external partners are
engaged.

Maintain hardware and software


inventory – It’s important to have an
understanding of the computers and
software in your enterprise because
these are frequently the entry points of
malicious actors. This inventory could
be as simple as a spreadsheet.

Establish policies for cybersecurity that


include roles and responsibilities –
These policies and procedures should
clearly describe your expectations for
how cybersecurity activities will protect
your information and systems, and how
they support critical enterprise
NIST Cybersecurity Framework: A Quick Start Guide

2 PROTECT
DEVELOP AND IMPLEMENT THE
APPROPRIATE SAFEGUARDS TO
ENSURE DELIVERY OF SERVICES.

Manage access to assets and


information – Create unique accounts
for each employee and ensure that
users only have access to information,
computers, and applications that are
needed for their jobs. Authenticate
users (e.g., passwords, multi-factor
techniques) before they are granted
access to information, computers, and
applications. Tightly manage and track
physical access to devices.

Protect sensitive data – If your


enterprise stores or transmits sensitive
data, make sure that this data is
protected by encryption both while it’s
stored on computers as well as when it’s
transmitted to other parties. Consider services or features that are not
utilizing integrity checking to ensure necessary to support mission functions.
only approved changes to the data have Ensure that there is a policy and that
been made. Securely delete and/or devices are disposed of securely.
destroy data when it’s no longer needed
or required for compliance purposes. Manage device vulnerabilities –
Regularly update both the operating
Conduct regular backups – Many system and applications that are
operating systems have built-in backup installed on your computers and other
capabilities; software and cloud devices to protect them from attack. If
solutions are also available hat can possible, enable automatic updates.
automate the backup process. A good Consider using software tools to scan
practice is to keep one frequently devices for additional vulnerabilities;
backed up set of data offline to protect remediate vulnerabilities with high
it against ransomware. likelihood and/or impact.

Protect your devices – Consider Train users – Regularly train and retrain
installing host-based firewalls and other all users to be sure that they are aware
protections such as endpoint security of enterprise cybersecurity policies and
products. Apply uniform configurations procedures and their specific roles and
to devices and control changes to responsibilities as a condition of
device configurations. Disable device employment.
NIST Cybersecurity Framework: A Quick Start Guide

3 DETECT
DEVELOP AND IMPLEMENT THE
APPROPRIATE ACTIVITIES TO IDENTIFY
THE OCCURRENCE OF A
CYBERSECURITY EVENT.

Test and update detection processes – Maintain and monitor logs – Logs are
Develop and test processes and crucial in order to identify anomalies in
procedures for detecting unauthorized your enterprise’s computers and
ntities and actions on the networks and applications. These logs record events
in the physical environment, including such as changes to systems or accounts
personnel activity. Staff should be aware as well as the initiation of
of their roles and responsibilities for communication channels. Consider
detection and related reporting both using software tools that can aggregate
within your organization and to external these logs and look for patterns or
governance and legal authorities. anomalies from expected network
behavior.
Know the expected data flows for your
enterprise – If you know what and how Understand the impact of cybersecurity
data is expected to be used for your events – If a cybersecurity event is
enterprise, you are much more likely to detected, your enterprise should work
notice when the unexpected happens – quickly and thoroughly to understand
and unexpected is never a good thing the breadth and depth of the impact.
when it comes to cybersecurity. Seek help. Communicating information
Unexpected data flows might include on the event with appropriate
customer information being exported stakeholders will help keep you in good
from an internal database and exiting stead in terms of partners, oversight
the network. If you have contracted bodies, and others (potentially including
work to a cloud or managed service investors) and improve policies and
provider, discuss with them how they processes.
track data flows and report, including
unexpected events.
NIST Cybersecurity Framework: A Quick Start Guide

4 RESPOND
DEVELOP AND IMPLEMENT THE
APPROPRIATE ACTIVITIES TO TAKE
ACTION REGARDING A DETECTED
CYBERSECURITY EVENT.
Ensure response plans are updated –
Testing the plan (and execution during
an incident) inevitably will reveal
needed improvements. Be sure to
update response plans with lessons
learned.
Ensure response plans are tested - It’s
even more important to test response
Coordinate with internal and external
plans to make sure each person knows
stakeholders – It’s important to make
their responsibilities in executing the
sure that your enterprise’s response
plan. The better prepared your
plans and updates include all key
organization is, the more effective the
stakeholders and external service
response is likely to be. This includes
providers. They can contribute to
knowing any legal reporting
improvements in planning and
requirements or required information
execution.
sharing.

5 RECOVER
DEVELOP AND IMPLEMENT THE
APPROPRIATE ACTIVITIES TO
MAINTAIN PLANS FOR RESILIENCE
AND TO RESTORE ANY CAPABILITIES
Ensure recovery plans are updated – As
with response plans, testing execution
will improve employee and partner
awareness and highlight areas for
OR SERVICES THAT WERE IMPAIRED improvement. Be sure to update
DUE TO A CYBER-SECURITY EVENT. Recovery plans with lessons learned.

Communicate with internal and external Manage public relations and company
stakeholders – Part of recovery depends reputation – One of the key aspects of
upon effective communication. Your recovery is managing the enterprise’s
recovery plans need to carefully account reputation. When developing a recovery
for what, how, and when information will plan, consider how you will manage
be shared with various stakeholders so public relations so that your information
that all interested parties receive the sharing is accurate, complete, and
information they need but no timely – and not reactionary.
inappropriate information is shared.

Source: NIST Special Publication 1271


NIST Cybersecurity Framework: A Quick Start Guide

If you want a structured approach to address


cybersecurity challenges in the rapidly evolving
digital landscape, our Global MBA in Digital
Transformation empowers you to understand and
implement cybersecurity strategies, ensuring that
your digital transformation initiatives are securely
designed, implemented, and managed.

Global MBA in
Digital Transformation
Duration Methodology Credits
1 academic year Live Online 60 ECTS

Dual Degree:

MÁS INFORMACIÓN
BARCELONA | SPAIN
HEADQUARTERS
Almogàvers, 66 | 08018
(+34) 933 001 210

/ MADRID I SPAIN
(+34) 911 091 559

/ LONDON | UK
(+44) 203 76 90 296

/ DUBAI | UAE
(+971) (0) 4311 6252

/ BRASILIA | BRAZIL www.e-zigurat.com

You might also like