CCSA Training Flashcards
Framework Profile represents
Represents the outcomes based on business needs an organization has selected from the Framework Categories and Subcategories.
Current Profile
Indicated the cyber security outcomes that are currently being achieved.
Target Profile
Indicates the outcomes needed to achieve the desired cyber security risk management goals
What are the tiers of Framework implementation?
- Partial
- Risk Informed
- Repeatable
- Adaptive
What is the partial risk management process?
Organizational cyber security risk management practices are not formalized, and risk is managed in an ad how and sometimes reactive manner.
Partial Integrated Risk Management Program?
There is limited awareness of cyber security risk at the organizational level and an organizational-wide approach to managing cyber security risk has not been established.
Partial External Partcipation
The organization is usually unaware of the cyber supply chain risks of the products and services it provides and that it uses.
Risk Informed (Risk Management)
Prioritization of cyber security is directly informed by organizational risk objectives, the threat environment, or business/mission requirements.
Risk Informed (Integrated Risk Management Program)
Cyber security is shared within the organization on an informal basis.
Risk Informed(External Participation)
The organization collaborated with and receives some information from other entities and generated some of its own information, but may not share information with others.
Repeatable (Risk Management Process)
Organizational cyber security practices are regularly updated based on the application of risk management processes to changes in business/mission requirements and a changing threat and technology landscape.
Repeatable (Integrated Risk Management Program)
Risk-Informed policies, processes, and procedures are defined implemented as intended, and reviewed.
Repeatable (External Partcipation)
It collaborates with and receives information from other entities regularly that complements internally generated information, and shares information with other entities.
Adaptive (Risk Management Process)
The organization adapts its cybersecurity practices based on previous and current cybersecurity activities, including lessons learned and predictive indicators
Adaptive (Integrated Risk Management Program)
The organization can quickly and efficiently account for changes to business/mission objectives in how risk is approached and communicated.
Adaptive (External Participation)
The organization understands its role, dependencies, and dependents in the larger ecosystem and contributes to the community’s broader understanding of risks.
Functions
Organize basic cybersecurity activities at their highest level.
Categories
Are the subdivisions of a function into groups of cybersecurity outcomes closely tied to programmatic needs and particular activities.
Subcategories
Further divide a category into specific outcomes of technical and/or management activities.
Informative References
Are specific sections of standards, guidelines, and practices common among critical infrastructure sectors that illustrate a method to achieve the outcomes associated with each subcategory.
5 types of cybersecurity framework
- Identify
- Protect
- Detect
- Respond
- Recover
Identify
Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities
Protect
Develop and implement appropriate safeguards to ensure delivery of critical services
Detect
Develop and implement appropriate activities to identify the occurrence of a cybersecurity event
Respond
Develop and implement appropriate activities to take action regarding a detected cybersecurity incident
Recover
Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.
NIST Cybersecurity Framework
- Profile
- Tiers
- Functions
- Categories
- Subcategories
- Informative References
Two types of profiles
Current and Target
Framework Core Structures
Categories are made up of subcategories and subcategories are made up of informative references/
Framework Functions
Identify ID, Protect PR, Detect DE, Respond RS, and Recover RC
Identify categories
Asset management, business environment, governance, risk assessment, risk management strategy, and supply chain risk management
Protect categories
Identify management and access controls, awareness and training, data security, information protection process and procedures, maintenance , and protective technology.
Detect categories
Anomalies and events, security continuous and monitoring, and detection processes
Respond categories
Response planning, communications, analysis, mitigation, and improvements
Recover categories
Recovery planning, improvements, and communications
Cybersecurity framework
- Identify
- Protect
- Detect
- Respond
- Recover
CEA
Cybersecurity Enhancement Act of 2014
CIS
Center for Internet Security
COBIT
Control Objectives for Information and Related Technology
CSC
Critical Security Control
DHS
Department of Homeland Security
EO
Executive Order
IEC
International Electrotechnical Commission
IR
Interagency Report
ISO
International Organization for Standardization
OT
Operational Technology
RFI
Request for Information
RMP
Risk Management Process
SCRM
Supply Chain Risk Management
SP
Special Publication
DoD
Department of Defense
How many Domains are in CMMC?
17
DIB
Defense Industrial Base
How many level descriptions are there in CMMC?
5
CMMC
Cybersecurity Maturity Model Certification
DFARS
Defense Federal Acquisition Regulation Supplement
CUI
Controlled Unclassified Information
Definition of CMMC
Certification process that measures DIB sector company’s ability to protect FCI and CUI.
FCI
Federal Contract Information
CMMC Model Framework
Models consists of domains, domains consist of capabilities, and capabilities consist of practices and processes
How many capabilities in CMMC?
43
Level 1 of CMMC process
Performed
Level 1 Practices of CMMC?
Basic Cyber Hygiene
Level 2 of Processes (CMMC)
Documented
CMMC Level 2 Practices
Intermediate Cyber Hygiene
CMMC Level 3 Processes
Managed
CMMC Level 3 Practices
Good Cyber Engine
CMMC Level 4 Processes
Reviewed
CMMC Level 4 Practices
Proactive
CMMC Level 5 Processes
Optimizing
CMMC Level 5 Practices
Advanced/Progressive
Level 1 focuses on
The protection of FCI and consists only of practices that correspond to the basic safeguarding requirements specified
Level 2 requires
An organization that can establish and document practices and policies to guide the implementation of their CMMC efforts
Level 3 requires
An organization establish, maintain, and resource a plan demonstrating the management of activities for practice implementation
Level 3 focuses on
The protection of CUI
Level 4 requirements
An organization review and measure practices for effectiveness