Module 1 Flashcards
what are the NIST CSF (cybersecurity framework) tiers?
tier 1 -Partial
Tier 2 - risk informed
tier 3 - Repeatable
tier 4 - Adaptable
list the 2 NIST profiles and describe them
current profile - “as is “ state of system cybersecurity
Target profile - the desired outcome “to be” state of cybersecurity
what could you gain by comparing current profile with target profile
gaps in your cybersecurity that need to be addressed
NIST cybersecurity framework Tier 3 explain
Repeatable -
- – risk management practices are formally approved and expressed as policy
- – cybersecurity practices are regularly updated based on risk management processes and changing threat landscape
- – organization-wide approach to manage cybersecurity
- – risk informed policies, processes, and procedures are defined implemented as intended and reviewed.
- –senior executives ensure consideration of cybersecurity through all lines of operation
- – the organization understands its role, dependencies, and dependents in the larger ecosystem.
NIST cybersecurity framework tier 4, explain
Adaptive -
- – Risk Management process
- – org adapts its cyvbersecrui9ty practices based on previous and current cybersecurity activities, including lessons learned and predictive indicators
- – organization actively adapts to a changing threat and technology landscape and response in a timely and effective manner.
- – integrated risk management -
- – organization wide approach to managing cybersecurity risk that uses risk-informed policies, processes, and procedures to address potential cybersecurity events.
what are the 4 NIST framework core elements
Functions
Categories
subcategories
Informative References
explain the role of functions within the NIST framework
Functions - organize basic cyber security activities at their highest level
explain the role of categories within the NIST framework
categories - are the subdivisions of a function into groups of cybersecurity outcomes closely tied to programmatic needs and particular activities
what is: further divide a category into specific outcomes of technical and/or management activities
- function
- category
- sub-category
- informative references
subcategories
explain the role of informational references within the NIST framework
informative references - are specific sections of standards, guidelines, and practices common among critical infrastructure associated with each subcategory
what are the 5 functions in the NIST cybersecurity framework
- Identify
- protect
- detect - in a timely manner… 72hrs or less per GDPR
- respond
- recover
what NIST Cybersecurity framework function would this describe:
develop an organizational understanding to manage cybersecurity risk to system, people, assets, data and capabilities
- Identify
what NIST cybersecurity framework function would be: develop and implement appropriate safeguards to ensure deliver of critical infrastructure services
- Protect
what NIST Cybersecurity Framework function would be defined as:
Develop and implement appropriate activities to identify the occurrence of a cybersecurity event
- Detect
what cybersecurity framework function would be: develop and implement appropriate activities to take action regarding a detected cybersecurity incident
- Respond
what NIST CSF function would be: develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to the cybersecurity incident
- Recovery
list the 4 NIST framework core features
1, functions
- categories
- subcategories
- informative references
what function would these categories belong to? asset management business environment governance risk assessment risk management strategy supply chain risk management
Identity
what function would these categories belong to?
identify management and access control
awareness training
data security
information protection processes and procedures
maintenance
protective technology
Protect
what function would these categories belong to?
anomalies and events
security continuous monitoring
detection processes
Detect
what function would these categories belong to? response planning communications analysis mitigation improvements
Respond
what function would these categories belong to?
recovery planning
improvements
communication
Recover
who controls the CMMC 2.0 model?
DoD
security incident response lifecycle includes these four areas
- Preparation
- detection and analysis
- containment, eradication & recovery
- post incident activity
what clause/section in the ISO 27001 standard addresses encryption
cryptography
what is the purpose of the NIST cybersecurity framework
to help organizations understand their cybersecurity risks and how to reduce risks with customized measures
define federal contract information (FCI)
information, not intended for public release, provided by or generated for the government under a contract to develop or deliver a product or service to the government
4 steps in Incident security
- Preparation
- detection and analysis
- containment, eradication, and recovery
- post-incident activity
this NIST publication is titled “guide to storage encryption technologies for end user devices” and describes valid encryption processes for data at rest
NIST publication 800-111
when NIST cybersecurity framework moved from 1.1 to 1.2 what was added under Identify
supply chain risk management
NIST cybersecurity framework how many functions, categories and sub-categories
functions = 5 categories = 23 sub-categories = 108
NIST cybersecurity framework how many tiers and profiles
tiers = 4 profiles = 2
additional definition to NIST profile
a framework profile represents the outcomes based on the business needs an organization has selected from the framework categories and subcategories
define tier 3 - repeatable
repeatable processes are in place to counter threats. formal risk-management processes and clearly defined security policies - cybersecurity practices are regularly updated - organization wide approach
define the NIST tier 4 - adaptable
continuous improvements and adaptation - regularly conduct risk assessments and adapt security policies and procedures to counter the latest threats - advanced analytics and best practices - organization wide approach - actively adapts to a changing threat and technology landscape
define the NIST tier 2 - risk informed
risk management practices are approved by management - might not be an organization wide policy on risk management - key stakeholders are aware of the main risks - few controls and policies in place
define the NIST tier 1 - partial
lowest tier, cybersecurity risk management has not been formalized and documented - threats are encountered on an ad hoc basis - the organization does not understand its role in the larger ecosystem - limited cybersecurity awareness
A framework implementation tier is a rating that provides what?
context on how an organization views cybersecurity risks and the processes they have in place to mange that risk
CMMC 2.0 level 1 is focused on what
federal contract information (FCI)
preservation is defined as
process to maintain and safeguard the integrity and original condition of potential evidence
a framework implementation tier is a rating that provides what
context on how an organization views cybersecurity risk and the processes they have in place to manage that risks
what is CMMC level 1 focus on
FCI (federal contract information)
what is CMMC level 2 focus on
CUI (controlled unclassified information)
what NIST CSF function would be: develop the organization understanding to manage cybersecurity risk to system , assets, data and capabilities
- identify
what NIST CSF function would be: develop and implement the appropriate safeguards to ensure deliver of critical infrastructure services
- Protect
what NIST CSF function would be: develop and implement the appropriate activities to take action regarding a detected cybersecurity event
- Respond
what NIST CSF function would be: Develop and implement that appropriate activities to maintain plan for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event
5: Recover
what function would have the following categories:
recovery planning
improvements
communication
- Recover