NIST Guide
NIST Guide
Frameworks create a common language for cyber that unifies the conversation around
enterprise risk and security.
Traditionally, financial and healthcare companies have been concerned with securing their
clients' data. However, following recent attacks, organizations across every sector realize the
need to propagate a robust risk-aware culture. Enterprises also understand that securing their
organization means securing their supply chain - requiring vendors to adopt frameworks to
continue their working relationship.
When CyberSaint's founder, George Wrenn, left his position as a global CSO to start CyberSaint,
he set out to accomplish one goal: realizing that the frameworks' nature—by far the most
comprehensive— designates that it is the most complex.
Our first conclusion: Cyber must be managed proactively and not reactively.
Our second conclusion: Companies have to be strategic when building and supplementing their
programs.
As business leaders, there is a substantial responsibility to execute and keep our companies
secure. The pressure is evident, and we see it build with each attack that damages revenue and
reputation. A proactive information security professional must stay informed and advocate for
increased resilience via a standards-based approach.
The Under Secretary of Commerce for NIST, Walter Copan, noted "From the very beginning, the
Cybersecurity Framework has been a collaborative effort involving stakeholders from
government, industry, and academia. The impact of their work is evident in the widespread
adoption of the framework by organizations across the United States, as well as
internationally.”
According to NIST "This second draft update aims to clarify, refine, and enhance the
Cybersecurity Framework, amplifying its value and making it easier to use. This latest draft
reflects comments received to date, including those from a public review process launched in
January 2017 and a workshop in May 2017."
Additionally, the U.S. Secretary of Commerce Wilbur Ross noted that "The voluntary NIST
Cybersecurity Framework should be every company's first line of defense. Adopting version 1.1
is a must do for all CEOs."
Small and mid-sized businesses need to be aware that not only large enterprises are targeted,
and the Framework may be the most robust method to implement best-practices.
In fact, small businesses are attacked about four thousand times per day, making up 62% of all
cyberattacks according to IBM.
The U.S. National Cybersecurity Alliance says that the cost of cleaning up after an attack for a
small to mid-sized business can range from $690,000 to over $1 million. The NIST Interagency
Report (NISTIR) 7621 entitled “Small Business Information Security: The Fundamentals” states
“Because small businesses typically don’t have the resources to invest in information security the
way larger businesses can, many cybercriminals view them as soft targets.”
The report also notes that some hackers are attacking not merely for profit, but out of revenge
or thrill of causing havoc. To a small business, a robust cybersecurity program is often seen as a
task too difficult because of the resources necessary.
Nonetheless, the benefits greatly exceed the cost, as adopting a proactive program and creating
a business process will help gain and retain customers - especially in light of publicized
cybersecurity attacks, as customers expect sensitive information to be protected.
The NIST Framework is genuinely applicable to any organization regardless of size as a jumping
off point to establish their cybersecurity posture. It turns in traditional, more audit-based policies
for a risk-based approach to cybersecurity management. It’s a guideline for businesses to update
their risk management approach, as many U.S. organizations across sizes and industries already
leverage some form of security framework.
Businesses of all sizes and industries are seeing the importance of building a robust cyber
program and are seeking more proactive strategies. Its five core functions: Identify, Protect,
In a sense, the Framework is a dynamic Deming cycle—continuous, logical and always learning.
Given the complexity of many organizations, they may choose to have multiple profiles, aligned
with particular components and recognizing their individual needs. Framework Profiles can be
used to describe the current state or the desired target state of specific cybersecurity activities.
It's essential here to pull in goals from all business segments - both business and security. That
way, you'll have a more well-rounded goal set that aligns with your business's vision for the
future.
If you're interested in baselining your organization against NIST Cybersecurity Framework best
practices in hours, check out CyberStrong. You'll be able to see areas for improvement and gaps
across all five NIST functions, and you'll have a plan of action on how to close those gaps within
your organization.
The importance of the identify function is evident: it lays the groundwork for cybersecurity-
related actions that your organization will take moving forward.
Identifying what exists, what risks are associated with those environments, and how that relates
in context with your business goals are crucial to having success with the Framework.
Successful implementation of the identify function could result in multiple outcomes, for
example:
• Defining all assets and environments
• Determining the current and target states of controls
• Making a plan to remediate those gaps
• Prioritizing how to approach mitigation in a business context
• Prioritizing the needs of all stakeholders and business
• leaders involved
• Defining how to communicate on cybersecurity issues
• with all related stakeholders
Organizations have to evolve in their cyber practices and implement the vital safeguards to
contain and limit impacts of potential cyber incidents. All digital and physical assets must be
accounted for, and roles must be defined with clear communication workflows around incidents
and risk. The policies and procedures that you implement will provide the stability needed for
your cybersecurity program as it works through all five functions and matures.
The protect function is vital because its purpose is to "develop and implement appropriate
safeguards to ensure the delivery of critical infrastructure services. The protect function
supports the ability to limit or contain the impact of a potential cybersecurity event.”
Examples of outcome categories within this function include: Identity Management and Access
Control; Awareness and Training; Data Security; Information Protection Processes and
Procedures; Maintenance; and Protective Technology.
Organizations must evolve as breaches are becoming all the more common. By focusing on the
protect function, you can put in place the policies and procedures to lay a strong foundation for
your cybersecurity program as it matures in all five functions.
Detect
The detect function requires that you develop and implement the appropriate activities to
identify the occurrence of a cybersecurity event.
The detect function enables the timely discovery of cybersecurity events. Examples of outcome
categories within this function include: Anomalies and Events; Security Continuous Monitoring;
and Detection Processes.
The detect function is a critical step to a robust cyber program - the faster you can detect a
cybersecurity event, the quicker you can mitigate the effects of it. Examples of how to
accomplish steps towards a thorough detect function are as follows:
• Anomalies & Events: Prepare your team to have the knowledge to collect and analyze
data from multiple points to detect an event.
• Security & Continuous Monitoring: Make your team able to monitor your assets 24/7 or
consider involving an MSS to supplement.
• Detection Processes: Attempt to know about a breach as soon as possible and follow
disclosure requirements as needed. Your program should be able to detect inappropriate
access to your data as quickly as possible.
The detect function is one of the most important, as detecting a breach or event can be life or
death for your business. There is no doubt that following these best practices and implementing
these solutions will help you scale your program and mitigate cybersecurity risk.
Respond
NIST defines respond as "Develop and implement appropriate activities to take action regarding
a detected cybersecurity incident."
The Respond Function supports the ability to contain the impact of a potential cybersecurity
incident. Examples of outcome Categories within this Function include: Response Planning;
Communications; Analysis; Mitigation; and Improvements.
Here are the parts to the respond function and their importance:
• Response Planning: Response processes and procedures are executed and maintained, to
ensure timely response to detected cybersecurity events.
• Analysis: Analysis is conducted to ensure adequate response and support recovery
activities.
• Mitigation: Activities are performed to prevent expansion of an event, mitigate its effects,
and eradicate the incident.
• Communications: Response activities are coordinated with internal and external
stakeholders, as appropriate, to include external support from law enforcement agencies.
• Improvements: Organizational response activities are improved by incorporating lessons
learned from current and previous detection/response activities.
Recover
According to NIST, the recover function is defined as the need to "develop and implement the
appropriate activities to maintain plans for resilience and to restore any capabilities or services
that were impaired due to a cyber security event”.
The recover function supports timely recovery to normal operations to reduce the impact from a
cybersecurity event. Examples of outcomes for this function include: Recovery Planning,
Improvements, and Communications.
The recover function is essential not only in the eyes of your business or organization in
recovering from an attack but also in the eyes of your customers or market. Swift recovery
handled with grace and tactfulness will allow you to end up in a much stronger position internally
and externally than you would otherwise.
Prioritizing these focus areas within recover will ensure that your organization has a recovery
plan that is up to date and matches your organization's goals and objectives.
• Identify the risks to your systems, data, and other assets. You must be able to effectively
prioritize your focus, fully understand governance, and carry out accurate risk
assessments.
• Protect your critical infrastructure by limiting access to assets, training employees,
securing and validating data integrity, implementing protective procedures and systems,
and scheduling regular maintenance.
• Detect cybersecurity events that could be attacks. This means flagging anomalies,
monitoring traffic and modeling regular noise so you can accurately identify anything
suspicious.
• Respond when an event is detected. It would be best if you had a clear response plan
with a communication protocol and a fixed timeline. Responses should be analyzed,
CyberSaint Security’s CyberStrong Platform Streamlines NIST CSF Adoption and Compliance
Management.