NIST Framework Notes Flashcards

Understand NIST Framework

1
Q

What are the 3 components of the NIST Framework?

A

Framework Core, Implementation Tiers, and Framework Profiles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Framework Core

A

Outlines the risk and the outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Implementation Tier

A

Outlines how cybersecurity risk is managed by an organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Framework Profiles

A

Helps organizations outline how they are going to implement cybersecurity outcomes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Framework CORE Functions

A

Identify, Protect, Detect, Respond, and Recover

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Identify Categories

A

Asset Management, Business Environment, Governance, Risk Assessment, Risk Management Strategy, and Supply Chain Risk Management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Protect Categories

A

Identity Management & Access Control, Awareness Training, Data Security, Information Protection Processes and Procedures, Maintenance, and Protective Technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Detect Categories

A

Anomalies and Events, Security/continuous monitoring, and Detection Processes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Respond Categories

A

Response Planning, Communications, Analysis, Mitigation, and Improvements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Recover Categories

A

Recovery Planning, Improvements, and Communications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

4 Tiers in NIST Framework

A

Partial, Risk Informed, Repeatable, and Adaptive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Partial Tier 1

A

Cyber program is ad-hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Risk-Informed Tier 2

A

Cyber program is beginning to be informally developed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Repeatable Tier 3

A

Cyber program is defined

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Adaptive Tier 4

A

Cyber program is robust and seeks out new threats before they occur

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Asset Management

A

Defining the assets that are a part of the organization’s goals and business functions

17
Q

Business Environment

A

Helps understand the goals of the business.

18
Q

Governance

A

Identify policies and procedures, and relevant roles/responsibilities of those internal and external of the organization.

19
Q

Risk Assessment

A

Identifying vulnerabilities

20
Q

Risk Management Strategies

A

Process and procedures to prevent and detect risk

21
Q

Supply Chain Risk Management

A

Identifying, Assessing, protecting, and managing our suppliers

22
Q

Identity Management and Authentication

A

Least Privilege and Trust, but verify.

23
Q

Awareness Training

A

providing insight into the organization’s initiatives and governance policies

24
Q

Data Security

A

protecting data at rest, transit, and availability.

25
Q

Information Protection

A

Confidentiality, Integrity, and availability of data

26
Q

Maintenance

A

Continuous improvement of processes and how is it protected

27
Q

Protection

A

WCGW and what are the critical assets that need to be operational

28
Q

Anomalies and Events

A

establish a network baseline (traffic, etc..). Understand what good looks like.

29
Q

Security and Continous Monitoring

A

Identifying the baseline and events that don’t meet the expected criteria

30
Q

Detection Processes

A

Identifying roles and responsibilities for detecting events

31
Q

Response Planning

A

Identify policies and procedures for events

32
Q

Communications

A

Identify the person responsible and who needs to be informed. Make sure incidents are reported based on policies

33
Q

Analysis

A

Take a closer look on what caused the incident or investigate incidents to gain assurance on the impact.

34
Q

Mitigation

A

Limit the impact of an incident and remediate

35
Q

Improvements

A

Understand what caused issues and build a plan to improve (Lessons learned).

36
Q

Recovery Planning

A

Make sure plans are executed during and after incidents