Unit 1 - NIST CSWP 29 Flashcards

1
Q

What does the NIST Cybersecurity Framework (CSF) 2.0 provide guidance on?

A

Managing cybersecurity risks

It offers a taxonomy of high-level cybersecurity outcomes for organizations of all sizes and sectors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the primary components of the CSF 2.0?

A
  • CSF Core
  • CSF Organizational Profiles
  • CSF Tiers

Each component serves a unique purpose in managing cybersecurity risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Who is the primary audience for the CSF?

A

Individuals responsible for developing and leading cybersecurity programs

It can also be used by executives, boards, risk managers, and policymakers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True or False: The CSF prescribes specific outcomes and how they should be achieved.

A

False

The CSF links to resources for additional guidance but does not prescribe methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of CSF Organizational Profiles?

A

To describe an organization’s current and/or target cybersecurity posture

They relate to the outcomes defined in the CSF Core.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the CSF Functions?

A
  • GOVERN
  • IDENTIFY
  • PROTECT
  • DETECT
  • RESPOND
  • RECOVER

These Functions organize cybersecurity outcomes at the highest level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Fill in the blank: The CSF Core is a taxonomy of high-level cybersecurity _______.

A

outcomes

It helps organizations manage their cybersecurity risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the GOVERN Function focus on?

A

Establishing, communicating, and monitoring the cybersecurity risk management strategy

It also addresses policy and oversight of cybersecurity strategy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does the IDENTIFY Function entail?

A

Understanding the organization’s current cybersecurity risks

This includes identifying assets and related cybersecurity risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the role of the PROTECT Function?

A

To implement safeguards to manage cybersecurity risks

This includes identity management, data security, and platform security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does DETECT refer to in the CSF?

A

The ability to find and analyze possible cybersecurity attacks and compromises

It supports incident response and recovery activities.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What actions does the RESPOND Function cover?

A

Actions taken regarding a detected cybersecurity incident

This includes incident management and communication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the aim of the RECOVER Function?

A

To restore assets and operations affected by a cybersecurity incident

This helps reduce the effects of incidents and enables effective communication during recovery.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

True or False: The CSF is designed to be a one-size-fits-all approach.

A

False

Organizations have unique risks and varying risk appetites, necessitating tailored implementations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are Informative References in the context of the CSF?

A

Sources of guidance on each outcome from existing global standards, guidelines, frameworks, regulations, and policies

They support organizations in achieving cybersecurity outcomes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What do Implementation Examples illustrate?

A

Potential ways to achieve each outcome within the CSF

They help organizations understand practical applications of the framework.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Fill in the blank: The CSF is designed to be used by organizations of all _______ and sectors.

A

sizes

This includes industry, government, academia, and nonprofit organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the significance of the Cybersecurity Framework (CSF) 2.0?

A

It helps organizations manage and reduce their cybersecurity risks

It is useful regardless of the maturity level of an organization’s cybersecurity programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the relationship between the CSF and enterprise risk management (ERM)?

A

The CSF is integrated into the broader ERM strategy

It addresses cybersecurity alongside other risks like financial and reputational risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are potential benefits of actions to reduce cybersecurity risk for an organization?

A

Increasing revenue

For example, offering excess facility space to a commercial hosting provider.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does the NIST Cybersecurity Framework (CSF) Functions diagram represent?

A

A wheel showing the interrelation of CSF Functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the role of the GOVERN Function in the CSF?

A

It informs how an organization will implement the other five Functions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the five main Functions of the NIST Cybersecurity Framework?

A
  • GOVERN
  • IDENTIFY
  • PROTECT
  • DETECT
  • RESPOND
  • RECOVER
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False: Actions supporting GOVERN, IDENTIFY, PROTECT, and DETECT should occur continuously.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What do CSF Profiles describe?

A

An organization’s current and/or target cybersecurity posture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is a Current Profile in the context of CSF Profiles?

A

Specifies the Core outcomes that an organization is currently achieving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does a Target Profile specify?

A

Desired outcomes prioritized for cybersecurity risk management objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is a Community Profile?

A

A baseline of CSF outcomes addressing shared interests among organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

List the steps to create and use a CSF Organizational Profile.

A
  • Scope the Organizational Profile
  • Gather needed information
  • Create the Organizational Profile
  • Analyze gaps and create an action plan
  • Implement the action plan and update the Profile
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What are CSF Tiers used for?

A

Characterizing the rigor of an organization’s cybersecurity risk governance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the four Tiers in the NIST Cybersecurity Framework?

A
  • Partial (Tier 1)
  • Risk Informed (Tier 2)
  • Repeatable (Tier 3)
  • Adaptive (Tier 4)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Fill in the blank: The CSF provides a basis for improved _______ regarding cybersecurity expectations.

A

[risk management communication]

33
Q

What types of online resources supplement the CSF?

A
  • Informative References
  • Implementation Examples
  • Quick Start Guides
34
Q

What are Informative References?

A

Mappings indicating relationships between the Core and various standards.

35
Q

What do Implementation Examples provide?

A

Concise, action-oriented steps to achieve the outcomes of Subcategories.

36
Q

What is the purpose of Quick Start Guides (QSGs)?

A

To provide actionable first steps for implementing the CSF.

37
Q

How does the CSF improve risk management communication?

A

By fostering bidirectional information flow between executives and managers.

38
Q

What types of ICT risk can organizations face?

A
  • Privacy
  • Supply chain
  • Artificial intelligence
39
Q

How can organizations integrate cybersecurity with other risk management programs?

A

By using Enterprise Risk Management (ERM) approaches.

40
Q

What resources describe the relationship between cybersecurity risk management and ERM?

A
  • NIST Cybersecurity Framework 2.0 – Enterprise Risk Management Quick-Start Guide
  • NIST IR 8286 series
41
Q

What is the purpose of NIST Interagency Report (IR) 8286?

A

Integrating Cybersecurity and Enterprise Risk Management (ERM)

IR 8286 consists of several parts, including identifying, estimating, prioritizing, and staging cybersecurity risks.

42
Q

What does the NIST Cybersecurity Framework (CSF) help organizations with?

A

Integrating cybersecurity risk management with individual ICT risk management programs

This includes programs like SP 800-37 and SP 800-30.

43
Q

How does the CSF relate to privacy risks?

A

It helps address privacy risks related to the loss of confidentiality, integrity, and availability of individuals’ data

Examples include data breaches leading to identity theft.

44
Q

What is Cybersecurity Supply Chain Risk Management (C-SCRM)?

A

A systematic process for managing exposure to cybersecurity risk throughout supply chains

It includes developing appropriate response strategies, policies, and procedures.

45
Q

What are the key components of the NIST CSF Core?

A

Functions, Categories, and Subcategories

These components help organizations in managing their cybersecurity risks.

46
Q

Fill in the blank: The organizational mission is understood and informs _______.

A

cybersecurity risk management

47
Q

What does the category ‘Govern’ (GV) in the CSF include?

A

Organizational Context, Risk Management Strategy, Roles, Responsibilities, and Authorities, Policy, Oversight, Cybersecurity Supply Chain Risk Management

Each component has specific identifiers for tracking.

48
Q

What is the role of ‘Identify’ (ID) in the CSF?

A

Understanding the organization’s current cybersecurity risks

This includes asset management and risk assessment.

49
Q

True or False: Privacy risks can only arise from cybersecurity incidents.

A

False

Privacy risks can also arise from data processing unrelated to cybersecurity.

50
Q

What does the ‘Protect’ (PR) function focus on?

A

Using safeguards to manage the organization’s cybersecurity risks

This includes identity management and data security.

51
Q

What is the significance of the NIST Artificial Intelligence Risk Management Framework (AI RMF)?

A

Helps address cybersecurity and privacy risks associated with AI

AI risks are treated alongside other enterprise risks.

52
Q

What does the ‘Recover’ (RC) function in the CSF entail?

A

Incident Recovery Plan Execution and Incident Recovery Communication

This function ensures that organizations can recover from incidents.

53
Q

What is the purpose of the NIST Privacy Framework?

A

To address different aspects of cybersecurity and privacy risks

It works alongside the NIST Cybersecurity Framework.

54
Q

Fill in the blank: Cybersecurity roles and responsibilities for suppliers, customers, and partners are established and _______.

A

communicated

55
Q

What is the focus of the ‘Detect’ (DE) function in the CSF?

A

Continuous Monitoring and Adverse Event Analysis

This function helps organizations identify cybersecurity incidents.

56
Q

What does the ‘Incident Management’ (RS.MA) subcategory involve?

A

Managing incidents effectively to mitigate impacts

It is part of the ‘Respond’ (RS) function.

57
Q

What is the goal of ‘Risk Assessment’ (ID.RA) in the CSF?

A

Understanding the cybersecurity risk to the organization, assets, and individuals

This includes identifying vulnerabilities and potential impacts.

58
Q

True or False: The CSF is only applicable to large organizations.

A

False

The CSF is applicable to organizations of all sizes.

59
Q

What does ‘Awareness and Training’ (PR.AT) ensure?

A

Personnel possess the knowledge and skills to perform cybersecurity tasks

Training is essential for effective risk management.

60
Q

What are access permissions, entitlements, and authorizations defined in?

A

A policy

These are managed, enforced, and reviewed while incorporating the principles of least privilege and separation of duties.

61
Q

What is the purpose of awareness and training (PR.AT) in cybersecurity?

A

To provide personnel with cybersecurity awareness and training

This ensures they can perform their cybersecurity-related tasks effectively.

62
Q

What does PR.AT-01 focus on?

A

Providing personnel with awareness and training for general cybersecurity tasks

This includes understanding cybersecurity risks.

63
Q

What is the aim of PR.DS in data security?

A

To manage data consistent with the organization’s risk strategy

This protects the confidentiality, integrity, and availability of information.

64
Q

What does PR.DS-01 protect?

A

The confidentiality, integrity, and availability of data-at-rest

65
Q

What does PR.PS stand for?

A

Platform Security

It involves managing hardware, software, and services to protect their confidentiality, integrity, and availability.

66
Q

What is the purpose of PR.IR?

A

To manage security architectures with the organization’s risk strategy

This protects asset confidentiality, integrity, and availability.

67
Q

What does DE.CM encompass in the detect phase?

A

Continuous monitoring of assets

This is to find anomalies, indicators of compromise, and other potentially adverse events.

68
Q

What is the focus of DE.AE?

A

Analyzing anomalies and indicators of compromise

This helps characterize events and detect cybersecurity incidents.

69
Q

What does RS.MA in the respond phase refer to?

A

Incident Management

This involves managing responses to detected cybersecurity incidents.

70
Q

What is the goal of RC.RP in the recovery phase?

A

To perform restoration activities for operational availability

This is for systems and services affected by cybersecurity incidents.

71
Q

What does Tier 1 of the CSF Tiers represent?

A

Partial application of the organizational cybersecurity risk strategy

It indicates ad hoc management and limited awareness of cybersecurity risks.

72
Q

What characterizes Tier 3 of the CSF Tiers?

A

Repeatable risk management practices

Policies are formally approved and cybersecurity practices are regularly updated.

73
Q

What is a CSF Category?

A

A group of related cybersecurity outcomes

These collectively comprise a CSF Function.

74
Q

Define CSF Function.

A

The highest level of organization for cybersecurity outcomes

There are six CSF Functions: Govern, Identify, Protect, Detect, Respond, and Recover.

75
Q

What does CSF Target Profile specify?

A

Desired Core outcomes prioritized for achieving cybersecurity objectives

76
Q

What is the role of CSF Informative Reference?

A

To map a relationship between a CSF Core outcome and existing standards

This includes guidelines, regulations, or other content.

77
Q

True or False: The organization adapts its cybersecurity practices based on previous activities.

78
Q

Fill in the blank: CSF __________ is a mechanism for describing an organization’s current and/or target cybersecurity posture.

A

Organizational Profile