NIST CSF Flashcards

1
Q

What are the different Tiers?

A
  1. ) Partial
  2. ) Risk Informed
  3. ) Repeatable
  4. ) Adaptive
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the three cybersecurity management practice areas being measured under the different Tiers?

A
  1. ) Risk Management Process
  2. ) Integrated Risk Management Program
  3. ) External Participation
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does Risk Management Process mean?

A

The functionality and repeatability of the cybersecurity risk management
- How much is the organization involved in the risk management process?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does Integrated Risk Management Program mean?

A

The extent to which cybersecurity is considered in broader risk management decisions
- How well is cybersecurity risk integrated into the overall business risk of the organization? How much is cybersecurity considered in overall risk management?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does External Participation mean?

A

The degree to which the organization: 1. monitors and manages supply chain risk, and 2. benefits by sharing or receiving information from external parties
- How well does the organization coordinates, collaborates, and shares information back and forth with other organizations?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Profile?

A

A particular customization of the CSF Core for an organization or sector based on their unique requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three main inputs that determine a CSF Profile?

A
  1. ) Business Objectives
  2. ) Security Requirements
  3. ) Technical Environment
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If the CSF is an overall cybersecurity management model, then what is the RMF?

A

It falls under CSF for Risk Management, which has “tasks” that link back to CSF functions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are some of the most comparable frameworks to the CSF?

A
  • CIS (Center for Internet Security) CSC
  • COBIT 5
  • ISA
  • ISO/IEC
  • NIST SP 800-53
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the 5 CSF Functions?

A
  1. ) Identify (ID)
  2. ) Protect (PR)
  3. ) Detect (DE)
  4. ) Respond (RS)
  5. ) Recover (RE)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

For ID, the organization must identify what?

A
  • Systems and data
  • Critical business processes that depend on those systems and data
  • The weaknesses and strengths associated with those systems
  • All resources (people, technology, money, equipment, facilities)
  • Vulnerabilities, threats, likelihood, impact, and frequency and overall risk
  • Governance (laws, regulations, etc.)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the categories under the Identify (ID) Function?

A
  1. ) Asset Management (ID.AM)
  2. ) Business Environment (ID.BE)
  3. ) Governance (ID.GV)
  4. ) Risk Assessment (ID.RA)
  5. ) Risk Management Strategy (ID.RM)
  6. ) Supply Chain Risk Management (ID.SC)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How many subcategories support the 6 categories within the Identify Function?

A

29

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the Protect (PR) Function focus on?

A
  • Ensuring strong authentication and access control
  • Protecting data
  • Secure maintenance of assets
  • Securing people (security clearances, user authorization, etc.)
  • Sound policies and procedures
  • Ensuring the right administrative, technical, and physical controls are in place
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the categories under the Protect (PR) Function?

A
  1. ) Identity Management, Authentication, Access Control (PR.AC)
  2. ) Awareness and Training (PR.AT)
  3. ) Data Security (PR.DS)
  4. ) Information Protection Processes and Procedures (PR.IP)
  5. ) Maintenance (PR.MA)
  6. ) Protective Technology (PR.PT)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How many subcategories support the 6 categories within the Protect Function?

A

39

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of the “Informative References” portion of the CSF?

A

Maps the subcategory to other frameworks and controls that tell you how to actually do the subcategory (action)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does the Detect (DE) Function focus on?

A
  • Focuses on detection processes and technologies
  • Looks for anomalies and unusual events
  • Ensures continuous security and risk monitoring
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the categories under the Detect (DE) Function?

A
  1. ) Anomalies and Events (DE.AE)
  2. ) Security Continuous Monitoring (DE.CM)
  3. ) Detection Processes (DE.DP)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How many subcategories support the 3 categories within the Detect Function?

21
Q

What does the Respond (RS) Function focus on?

A
  • Planning for incident and contingency response
  • Ensuring the robustness of incident communications
  • Analyzing the root causes of incidents
  • Mitigating damage to systems, data, equipment, facilities, and people
  • Improving the overall contingency planning and response processes
22
Q

What are the categories under the Respond (RS) Function?

A
  1. ) Response Planning (RS.RP)
  2. ) Communications (RS.CO)
  3. ) Analysis (RS.AN)
  4. ) Mitigation (RS.MI)
  5. ) Improvements (RS.IM)
23
Q

How many subcategories support the 5 categories within the Respond Function?

24
Q

What does the Recover (RC) Function focus on?

A
  • Business continuity, incident recovery, and disaster recovery planning
  • Maintaining communications during the recovery process
  • Improving the recovery effort
25
Q

What are the categories under the Recover (RC) Function?

A
  1. ) Recovery Planning (RC.RP)
  2. ) Improvements (RC.IM)
  3. ) Communications (RC.CO)
26
Q

How many subcategories support the 3 categories within the Recover Function?

27
Q

What is a Tier?

A

The degree to which an organization’s cybersecurity risk management practices exhibit the characteristics defined in the Framework

28
Q

What is the purpose of Tiers?

A

They’re used to measure how well the organization implements different aspects of the CSF, the three cybersecurity management practice areas

29
Q

What is Tier 1?

30
Q

What is Tier 2?

A

Risk-Informed

31
Q

What is Tier 3?

A

Repeatable

32
Q

What is Tier 4?

33
Q

What are the CSF Tiers NOT?

A

They’re not:

  • A maturity model
  • The same as the RMF Tiers
34
Q

What is the RMF Three-Tier Risk Model composed of?

A
  1. ) Organizational
  2. ) Mission/Business Process
  3. ) Information System

They don’t measure anything

35
Q

What does the “Organization” RMF Risk Tier cover?

A

Higher-level management processes and overarching risk

36
Q

What does the “Mission/Business Process” RMF Risk Tier cover?

A

Risk associated with processes used across the organization

37
Q

What does the “Information System” RMF Risk Tier cover?

A

Risk associated with a particular system or systems

38
Q

How can you explain the measuring differences between CSF Tiers vs. Maturity Models vs. RMF Risk Tiers?

A
  • CSF Tiers measure level of effort
  • Maturity Models measure repeatability and definability of processes geared towards that effort
  • RMF Risk Tiers measure nothing at all, different cross sections of the organization
39
Q

What are characteristics of CSF Profiles?

A
  • They align Functions, Categories, and Subcategories with mission/business requirements, risk, and resources
  • They allow organizations to establish a unique roadmap to cybersecurity based on their needs
  • They describe both current and target states of the organization in terms of cybersecurity posture
40
Q

For CSF Profiles, what are the inputs combined with to create the Profile output?

A

Inputs (Business Objectives, Risk, and Technical Environment) + Functions, Categories, Subcategories = Output (CSF Profile)

41
Q

How many CSF Subcategories are there in total?

42
Q

How does an organization identify assets and risks?

A
  • Make a physical inventory of all assets
  • Perform a mission analysis
  • Perform a business impact assessment
  • Perform a comprehensive risk assessment
43
Q

How does an organization protect their assets?

A
  • Ensure users are trained on how to protect sensitive data (periodic security training, user agreements and consequences, personnel security processes)
  • Test protection mechanisms (Vulnerability assessments, penetration testing, risk assessments)
44
Q

How does an organization effectively detect?

A
  • Assume a state of breach
  • Implement detection controls at multiple layers (Perimeter, interior systems and data, people)
  • Be able to detect both unusual and normal events
  • Be able to filter useful information from “noise”
  • Employ the right people for detection (who know what to look for)
  • Continuously monitor for analogies and risk
    Use multiple types of controls (physical, tech, operational like following procedure)
45
Q

How does an organization set up response capabilities?

A
  • Develop incident response plans
  • Plan for quick, efficient, and accurate incident communications
  • Develop plans to mitigate damage to systems, data, equipment, facilities, and people
  • Become proficient at analyzing the root causes of incidents
  • Ensure a process to improve contingency planning and response processes in place
  • Develop and retain qualified personnel for response effort
  • Exercise response capabilities (IR = incident response)
  • Refine processes through risk analysis and lessons learned
46
Q

How does an organization implement recovery?

A
  • Develop, test, and maintain:
    1. ) Business Continuity
    2. ) Incident Recovery
    3. ) Disaster Recovery Plans
  • Ensure robust communications process during recovery
  • Capture lessons learned to improve recovery function
  • Select and train qualified people for recovery functions
47
Q

How do you create your own CSF Profile?

A
  • Develop your mission/business objectives
  • Determine risk
  • Determine governance (Which laws are applicable)
  • Articulate with CSF subcategories
  • Produce controls and technical methods
48
Q

What are the factors of business continuity that matter for the Recovery Function?

A
  1. ) Critical process recovery
  2. ) Timeliness
  3. ) Redundant capabilities