Critical Manufacturing Framework Implementation Guide 2015 508
Critical Manufacturing Framework Implementation Guide 2015 508
This Implementation Guidance aims to simplify the process for all organizations in the Critical Manufacturing Sector—
regardless of their size, cybersecurity risk, or current level of cybersecurity sophistication—to apply the principles and
best practices of risk management. Ultimately, the Framework and this Implementation Guidance are focused on helping
individual organizations reduce and better manage their cybersecurity risks, contributing to a more secure and resilient
sector overall.
The Department of Homeland Security appreciates the dedication and technical expertise of all members of the Critical
Manufacturing Sector Coordinating Council who participated in the development of this Implementation Guidance, as
well as all the inputs provided by public and private stakeholders.
Critical Manufacturing Sector organizations can use the Implementation Guidance to determine how best to implement
the Framework, which provides a repeatable process to identify and prioritize cybersecurity improvements and choose
investments that maximize the impact of each dollar spent. As you use the Implementation Guidance, I ask for your
continued feedback to update and improve the document and make it a robust and valuable guide for your sector partners
and peers.
I encourage your use of and reference to the NIST Framework and this Implementation Guidance as we work together to
improve the security and resilience of our Nation’s critical infrastructure from cyber and other attacks.
Caitlin Durkovich
Assistant Secretary
Office of Infrastructure Protection
National Protection and Programs Directorate
Department of Homeland Security
The Critical Manufacturing Sector embraces the flexibility the Framework offers. The U.S. Department of Homeland
Security (DHS), as the Sector-Specific Agency, worked with the Critical Manufacturing Sector Coordinating Council and
Government Coordinating Council to develop this Implementation Guidance. This guidance provides organizations with:
1
This document uses the term “organization” to describe an operational entity of any size that uses the same cybersecurity risk
management program across its various assets. This Implementation Guidance is designed for any organization—whether the
organization represents the entire enterprise or a process within an enterprise.
Critical Manufacturing Cybersecurity Framework Implementation Guidance 1
Framework Overview and Benefits
To establish critical infrastructure cybersecurity as a national priority, President Obama signed Executive Order 13636:
Improving Critical Infrastructure Cybersecurity (EO 13636) in February 2013. The Executive Order charged the National
Institute of Standards and Technology (NIST) to develop the Framework for Improving Critical Infrastructure
Cybersecurity and led DHS to develop the Critical Infrastructure Cyber Community (C³) Voluntary Program—which now
serves as a central repository for government and private sector tools and resources. The C3 Voluntary Program provides
critical infrastructure sectors; academia; and State, local, tribal, and territorial governments with businesses tools and
resources to use the Framework and enhance their cyber risk management practices. DHS, as the Critical Manufacturing
Sector-Specific Agency, is also a key source of cybersecurity information and tools for sector organizations.
The Framework is based on a collection of cybersecurity standards and industry best practices. The Framework:
The Framework broadly applies across all organizations, regardless of size, industry, or cybersecurity sophistication. The
Framework can help guide an organization in improving cybersecurity and thereby improve the security and resilience of
critical infrastructure. The Framework applies whether an organization has a mature risk management program and
processes, is developing a program or processes, or has no program or processes.
• Assess and specifically describe its current and targeted cybersecurity posture.
• Identify gaps in its current programs and processes.
• Identify and prioritize opportunities for improvement using a continuous and repeatable process.
• Assess progress toward reaching its target cybersecurity posture.
• Demonstrate the organization’s alignment with the Framework’s nationally recognized best practices.
• Highlight any current practices that might surpass the Framework’s recommended practices.
• Communicate its cybersecurity posture in a common, recognized language to internal and external
stakeholders—including customers, regulators, investors, and policymakers.
NIST designed the Framework to provide a nationally recognized approach to cyber risk management using best practices
and proven processes. As more sectors and organizations implement the Framework, its approach will serve as an
accepted baseline for cybersecurity practices in critical infrastructure organizations. Early adoption of the Framework’s
principles may better position Critical Manufacturing Sector organizations to receive additional potential benefits in the
future:
• More attractive cybersecurity insurance coverage — As cyber risks grow, insurance agencies are developing
new and refined approaches to evaluate clients’ premiums based on their use of sound cybersecurity practices.
Framework Structure
The Framework uses three main components—Core Elements, Implementation Tiers, and Profiles—which enable an
organization to identify its cybersecurity practices, define the maturity of its cybersecurity approach, and profile its
current and target (or goal) cybersecurity posture. These three components help an organization examine its cybersecurity
activities in terms of individual organizational priorities.
Framework Core
The Framework Core uses four elements that enable stakeholder identification of cybersecurity focus areas:
1. Functions: The Core Functions are five areas on which organizations can focus their attention to develop a
strategic view of their cybersecurity postures. Although the Functions do not replace a risk management process,
they provide a concise way for senior executives and others to distill the fundamental concepts of cybersecurity
risk so they can assess how identified risks are managed and to see how their organizations align with existing
cybersecurity standards, guidelines, and practices. The five Functions are:
a. Identify—Lay the foundation for effective Framework use. The activities in the Identify Function include
systems, assets, data, capabilities, and other foundational elements that are critical to the organization.
b. Protect—Develop and identify appropriate safeguards to ensure delivery of critical infrastructure services.
c. Detect—Identify and implement the tools to identify the occurrence of a cybersecurity incident.
d. Respond—Use the tools and activities to support the containment of a cybersecurity event.
e. Recover—Bolster resilience and restore any capabilities or services impaired by the cybersecurity event.
2. Categories: The Framework subdivides Functions into Categories, which are activities or processes that support
identification, protection, detection, response, or recovery. In the Identify Function, for example, Categories
include Governance, Business Environment, and Asset Management.
3. Subcategories: Subcategories are the subcomponents of Categories and detail the specific outcomes of the
activity, tool, or approach used in the category.
4. Informative References: References are specific sections of standards, guidelines, and practices. References
provide a method to achieve the outcomes associated with each subcategory. The Framework identified several
national and international standards that organizations can use to achieve the outcomes in each Subcategory. This
Implementation Guidance identifies additional standards, tools, and resources that Critical Manufacturing Sector
organizations may use to achieve the outcomes of each Category and Subcategory.
Table 2 provides an overview and examples of the four Framework Core elements.
Governance
Risk Assessment
Access Control
Data Security
PROTECT Information Protection
Processes and Procedures
Maintenance
Protective Technology
Security Continuous
DETECT
Monitoring
Detection Processes
Response Planning
Communications
RESPOND Analysis
Mitigation
Improvements
Recovery Planning
RECOVER Improvements
Communications
Tier 1: Partial
Organizational cybersecurity risk management practices are not formalized, and risk is managed in an ad hoc and
sometimes reactive manner. There is limited awareness of cybersecurity risk at the organizational level, and an
organization-wide approach to managing cybersecurity risk has not been established.
Tier 3: Repeatable
The organization’s risk management practices are formally approved and expressed as policy. There is an
organization-wide approach to manage cybersecurity risk.
Tier 4: Adaptive
The organization adapts its cybersecurity practices based on lessons learned and predictive indicators derived from
previous and current cybersecurity activities. There is an organization-wide approach to managing cybersecurity risk
that uses risk-informed policies, processes, and procedures to address potential cybersecurity events.
Framework Profile
The Framework Profile aligns to the Core Elements and establishes an organization’s cybersecurity state. The Profile can
represent an organization’s current cybersecurity posture or its target cybersecurity state. Organizations can compare their
present and goal cybersecurity posture, and identify the best course of action to reach that end state. Ultimately, Profiles
provide a mechanism to reduce cybersecurity risk with outcomes based on an organization’s business needs. This
Implementation Guidance will provide further instructions on how an organization can develop its Current and Target
Profile using the Framework’s seven-step implementation approach.
TABLE 3.—Existing Critical Manufacturing Sector Cybersecurity Risk Management Tools and Resources.
This ANSI standard focuses on the risks, Risk Assessment and Risk
operational limitations, and best practices Reduction - A Guideline to
American National Standards
associated with the use of machining Estimate, Evaluate, and Reduce
Institute (ANSI) B11.TR3-2000
equipment and other manufacturing-oriented Risks Associated with Machine
tools and environments. Tools
International Standards
Organization (ISO): This ISO technical report provides an extensive
Safety of Machinery/Risk overview of best practices for examining and Risk Assessment and Retail
Assessment/Practical analyzing risk in the context of machinery and Pack
Guidance and Examples of manufacturing environments.
Methods
2
References are specific sections of standards, guidelines, and practices. The Framework identified several national and international
standards that organizations can use to achieve the outcomes in each subcategory. See Framework Core for more information.
Critical Manufacturing Cybersecurity Framework Implementation Guidance 7
Framework Mapping
The six existing cybersecurity tools and approaches in the Critical Manufacturing Sector, listed in Table 3, have been evaluated against the Functions, Categories,
and Subcategories of the Framework. To determine whether a tool or approach mapped to a particular Subcategory, the sector considered this key question: Can
the tool or approach help an organization further understand or address the particular Subcategory and achieve the associated outcome? The initial
mapping shown in Table 4 is a first attempt at aligning existing tools and approaches to the Framework using open-source research. In some cases, access to the
tools and approaches was not available via open-source research, so fact sheets and program descriptions were used to hypothesize where tools and approaches
aligned. This mapping is designed to be altered in future versions by sector stakeholders with a solid understanding of the tools and approaches.
Asset Management (ID.AM): ID.AM-2: Software platforms and applications within the
X X
The data, personnel, devices, organization are inventoried
systems, and facilities that ID.AM-3: Organizational communication and data flows
enable the organization to X X X
are mapped
IDENTIFY achieve business purposes are
(ID) identified and managed ID.AM-4: External information systems are catalogued X X X
consistent with their relative ID.AM-5: Resources (e.g., hardware, devices, data, and
importance to business software) are prioritized based on their classification, X X X
objectives and the criticality, and business value
organization’s risk strategy.
ID.AM-6: Cybersecurity roles and responsibilities for the
entire workforce and third-party stakeholders (e.g., X X
suppliers, customers, partners) are established
ID.BE-1: The organization’s role in the supply chain is
X X X
identified and communicated
Business Environment
(ID.BE): The organization’s ID.BE-2: The organization’s place in critical infrastructure
X X
mission, objectives, and its industry sector is identified and communicated
stakeholders, and activities are
IDENTIFY ID.BE-3: Priorities for organizational mission, objectives,
understood and prioritized; this X X X X
(ID) and activities are established and communicated
information is used to inform
cybersecurity roles, ID.BE-4: Dependencies and critical functions for delivery
responsibilities, and risk X X X X
of critical services are established
management decisions.
ID.BE-5: Resilience requirements to support delivery of
X X X
critical services are established
Critical Manufacturing
(RC.CO): Restoration activities RC.CO-1: Public relations are managed X X X
are coordinated with internal
and external parties, such as
RECOVER coordinating centers, Internet RC.CO-2: Reputation after an event is repaired X X
(RC) Service Providers, owners of
attacking systems, victims,
other Computer Security RC.CO-3: Recovery activities are communicated to
Incident Response Teams internal stakeholders and executive and management X X
(CSIRTs), and vendors. teams
Implementation should include a plan to communicate progress to appropriate stakeholders, such as senior management.
This process should integrate into an organization’s risk management program and provide feedback and validation to
previous steps. Validation and feedback provide a mechanism for process improvement and can increase the overall
effectiveness and efficiency of the process.
Typical risk management processes includes a strategy that frames, assesses, responds to, and monitors risk. Larger
enterprises may already use a strategic-level approach to which the enterprise’s organizations subscribe. Whether an
organization uses a unique approach or that of a larger enterprise, the applicable strategy should describe the identified
cybersecurity risks that the organization considers when making investment and operational decisions.
Current threat and vulnerability information (e.g., information from important vendors, communication of Critical
Manufacturing Sector threats from an information sharing and analysis center, or other threat advisories) may also help
inform scoping decisions.
In order to gain familiarity and experience, an organization using the Framework for the first time may apply it to a small
subset of operations. For example, an organization may choose to begin with particular business functions because they
are already undergoing similar or related risk management efforts. Then, with a greater understanding, the organization
can apply the Framework to a broader subset of operations or to additional divisions of the organization.
Step 2: Orient
At this stage, an organization identifies the systems, assets, requirements, and risk management approaches that fall within
the scope of the effort. This includes current organization standards and best practices, as well as any additional items that
can enable the organization to achieve its critical infrastructure and business objectives for cybersecurity risk
management. The organization’s risk management program may have already identified and documented much of this
information. In general, organizations should focus initially on critical systems and assets and then expand into systems
and assets that are less critical or central to their mission.
Additionally, an organization should identify the approach to determine its current risk management and cybersecurity
posture. Organizations can use a variety of methods to identify their current cybersecurity posture and create a Current
Profile, including self-evaluations or facilitated approaches. In a self-evaluation, an organization may leverage its own
resources and expertise, whereas a facilitated approach relies on the expertise of a third party. The value in a self-
evaluation is the additional internal cybersecurity awareness and discovery that the activity can generate.
The current Implementation Tier describes the degree of rigor and sophistication of the in-scope cybersecurity risk
management program (i.e., the Framework usage scope defined in Step 1). To identify the Implementation Tier, the
organization maps its current approach to the Implementation Tier descriptions in the Framework document.
Implementation Tiers do not apply to the individual Category and Subcategory outcomes in the Framework Core; the
organization identifies an Implementation Tier for the in-scope cybersecurity and risk management program as a whole.
Organizations may already be using tools, standards, and processes or complying with industry standards that closely
align with the Framework. Some industry and standards organizations have started to publish their own guidance to map
existing standards and tools to the Framework elements to facilitate implementation.
Table 5 provides an example of how a mapping can be used to create a Current Profile for a specific Subcategory outcome
(see Section PR.AC-3 of the Framework document) for three organizations using three different approaches. A similar
table could be built for Implementation Tiers, keeping in mind that Tiers are focused at broader program level risk
management. Note that the examples in these tables are intended to be illustrative of the mapping concept and are unlikely
to address any specific organization’s particular approach. The level of specificity and granularity required for a Profile to
be useful will be unique to each organization.
Organization 1
Internal Controls Approach
Profiles
Function Category Subcategory
Current
Even though the Framework gives organizations a broad overview of the cybersecurity and risk management domains, it
is not all-inclusive, and the organization may have already utilized standards, tools, methods, and guidelines that achieve
outcomes not defined by or referenced in the Framework. The Current Profile should identify these practices as well.
When appropriate, organizations should consider sharing these practices with NIST to help strengthen and expand the
Framework.
The Target Profile outlines the key Category and Subcategory outcomes and associated cybersecurity and risk
management standards, tools, methods, and guidelines that will protect against cybersecurity risks in proportion to the
Table 6 gives an overview of a hypothetical Target Profile for a specific Subcategory outcome (PR.AC-3) for three
organizations using three different approaches. The bold text in the Target Profile highlights where the organization has
identified additional practices it desires to use in order to successfully achieve an outcome based on its current risk
environment and business and critical infrastructure objectives. Organization 1 has determined that the existing practices
it uses for managing remote access are insufficient for addressing its unique risk environment and that additional practices
are required. Organization 2 arrives at the same conclusion and identifies additional standards it would like to deploy
across the in-scope organization. Organization 3 demonstrates an organization whose Current Profile is identical to the
Target Profile for this Subcategory outcome. Such instances will occur when the standards, tools, methods, and guidelines
currently deployed by the organization sufficiently fulfill its cybersecurity and risk management requirements. However,
this alignment of the Current Profile and Target Profile may only last over the short term since an organization’s
cybersecurity and risk management requirements will evolve as its risk and operational environments change over time.
For instance, an organization may determine that a current practice is no longer necessary or is inadequate and, therefore,
omit it from the Target Profile.
In developing a Target Profile, organizations may opt to use a broad approach—considering more effective and efficient
risk management approaches across the entire in-scope organizations—rather than examining individual Categories and
Subcategories.
In addition to the Target Profile, the organization selects a Target Implementation Tier that applies to the in-scope risk
management process. The organization examines each Tier and selects its target (the “desired” state) using the same list of
considerations above for the Target Profile. Once a Target Implementation Tier is selected, the organization identifies the
cybersecurity practices and risk management activities necessary to achieve that target—considering their ability to meet
organizational goals, feasibility to implement, and their ability to reduce cybersecurity risks to acceptable levels for
critical assets and resources (i.e., those most important to achieving the organization’s business and critical infrastructure
objectives).
Using its collection of cybersecurity and risk management standards, tools, methods, and guidelines, the organization
documents these desired outcomes in the Target Profile and Target Implementation Tier.
Organization 1
Internal Controls Approach
Profiles
Function Category Subcategory
Current Target
• Dial-in access for vendor • Dial-in access for vendor
maintenance is enabled as maintenance is enabled as
required and disabled when required and disabled when
maintenance window maintenance window completes
completes • Remote access only authorized via
• Remote access only encrypted VPN service
authorized via encrypted • Remote access activity logged and
VPN service monitored
Access PR.AC-3: • Remote access activity • Access to VPN service restricted
PROTECT
Control Remote access logged and monitored to organization approved devices
(PR)
(PR.AC) is managed • Access to VPN service • All unauthorized connection
restricted to organization attempts to VPN are logged
approved devices • Immediate disabling of VPN
• All unauthorized connection account upon employee
attempts to VPN are logged termination
• Immediate disabling of VPN • Supervisor signature required
account upon employee before VPN account issued
termination • Biannual review of authorized
VPN account list
Organization 2
Standards Based Approach
Profiles
Function Category Subcategory
Current Target
• NIST SP 800-53 Rev 4 AC- • NIST SP 800-53 Rev 4 AC-17
17 • NIST SP 800-53 Rev 4 AC-17 (1)
• NIST SP 800-53 Rev 4 AC- • NIST SP 800-53 Rev 4 AC-17 (2)
17 (1) • NIST SP 800-53 Rev 4 AC-17 (3)
• NIST SP 800-53 Rev 4 AC- • NIST SP 800-53 Rev 4 AC-17 (4)
Access PR.AC-3:
PROTECT 17 (2) • NIST SP 800-53 Rev 4 AC-19
Control Remote access
(PR) • NIST SP 800-53 Rev 4 AC- • NIST SP 800-53 Rev 4 AC-19 (5)
(PR.AC) is managed
19 • NIST SP 800-53 Rev 4 AC-20
• NIST SP 800-53 Rev 4 AC- • NIST SP 800-53 Rev 4 AC-20 (1)
20 • NIST SP 800-53 Rev 4 AC-20 (2)
• NIST SP 800-53 Rev 4 AC-
20 (1)
Organization 3
Exception Approach
Profiles
Function Category Subcategory
Current Target
Access PR.AC-3: • Not Applicable—No remote • Not applicable—No remote access
PROTECT
Control Remote access access available for in- available for in-scope assets and
(PR)
(PR.AC) is managed scope assets and systems systems
Bold text highlights the differences between the current and target approaches.
A gap exists when there is a desired Category or Subcategory outcome in the Target Profile or program characteristic in
the Target Implementation Tier that is not currently satisfied by current cybersecurity and risk management approaches, as
well as situations wherein existing practices do not achieve the outcome to the degree of satisfaction required by the
organization’s risk management strategy. After identifying gaps in both the Profile and Tier, the organization identifies
the potential consequences of failing to address such issues. At this point, the organization should assign a mitigation
priority to all identified gaps. Prioritization of gaps should include examination of existing risk management practices,
the current risk environment, legal and regulatory requirements, business and mission objectives, and any other
applicable organizational limitations or considerations.
Once each gap is assigned a mitigation priority, the organization determines potential mitigation efforts and performs a
cost-benefit analysis (CBA) on each option. The organization creates a plan of prioritized mitigation actions—based on
available resources, business needs, and current risk environment—to move from the existing state to the desired or target
state. If the organization is at its target state, it would seek to maintain its security posture in the face of ongoing changes
to the risk environment.
Organization 1
Internal Controls Approach
Profiles
Function Category Subcategory
Current Target Gaps
• Dial-in access for • Dial-in access for • Supervisor
vendor maintenance is vendor maintenance is signature
enabled as required enabled as required required
and disabled when and disabled when before VPN
maintenance window maintenance window account
completes completes issued
• Remote access only • Remote access only • Biannual
authorized via authorized via review of
encrypted VPN service encrypted VPN service authorized
• Remote access activity • Remote access activity VPN account
logged and monitored logged and monitored list
• Access to VPN service • Access to VPN service
PR.AC-3: restricted to restricted to
Access
PROTECT Remote organization approved organization approved
Control
(PR) access is devices devices
(PR.AC)
managed • All unauthorized • All unauthorized
connection attempts to connection attempts to
VPN are logged VPN are logged
• Immediate disabling of • Immediate disabling of
VPN account upon VPN account upon
employee termination employee termination
• Supervisor signature
required before VPN
account issued
• Biannual review of
authorized VPN
account list
Profiles
Function Category Subcategory
Current Target Gaps
• NIST SP 800-53 Rev • NIST SP 800-53 Rev 4 AC- • NIST SP
4 AC-17 17 800-53
• NIST SP 800-53 Rev • NIST SP 800-53 Rev 4 AC- Rev 4 AC-
4 AC-17 (1) 17 (1) 17 (3)
• NIST SP 800-53 Rev • NIST SP 800-53 Rev 4 AC- • NIST SP
4 AC-17 (2) 17 (2) 800-53
• NIST SP 800-53 Rev • NIST SP 800-53 Rev 4 AC- Rev 4 AC-
4 AC-19 17 (3) 17 (4)
PR.AC-3: • NIST SP 800-53 Rev • NIST SP 800-53 Rev 4 AC- • NIST SP
Access
PROTECT Remote 4 AC-20 17 (4) 800-53
Control
(PR) access is • NIST SP 800-53 Rev • NIST SP 800-53 Rev 4 AC- Rev 4 AC-
(PR.AC)
managed 4 AC-20 (1) 19 19 (5)
• NIST SP 800-53 Rev 4 AC- • NIST SP
19 (5) 800-53
• NIST SP 800-53 Rev 4 AC- Rev 4 AC-
20 20 (2)
• NIST SP 800-53 Rev 4 AC-
20 (1)
• NIST SP 800-53 Rev 4 AC-
20 (2)
Organization 3
Exception Approach
Profiles
Function Category Subcategory
Current Target Gaps
• Not Applicable— • Not Applicable—No remote • None
PR.AC-3:
Access No remote access access available for in-
PROTECT Remote
Control available for in- scope assets and systems
(PR) access is
(PR.AC) scope assets and
managed
systems
An organization may repeat the steps as needed to continuously assess and improve its cybersecurity. For instance,
organizations may find that more frequent repetition of the orient step improves the quality of risk assessments.
Furthermore, organizations may monitor progress through iterative updates to the Current Profile, subsequently
comparing the Current Profile to the Target Profile. Organizations may also utilize this process to align their cybersecurity
program with their desired Framework Implementation Tier.
• Critical Infrastructure Cyber Community (C3) Voluntary Program: The C³ Voluntary Program provides the
central place to access existing cyber resilience resources from DHS and other government agencies. It is the
coordination point within the Federal government to promote use of the Framework and to assist organizations in
understanding its purpose and how it may apply to them.
• Critical Manufacturing Sector-Specific Plan: The Critical Manufacturing Sector-Specific Plan (SSP) is
designed to guide the sector’s efforts to improve security and resilience by identifying a set of public-private
goals, priorities, and activities for the sector.
Table 8 identifies how wide implementation of the Framework within the Critical Manufacturing Sector can help
implement sector-specific strategies and achieve sector goals.
Goal 3 in the 2015 SSP is to “develop strategies to The Framework aims to reduce and better manage
reduce risks to Critical Manufacturing Sector cybersecurity risks in a “cost-effective way based
assets from human, physical, and cyber threats on business needs without placing additional
without hindering economic viability.” regulatory requirements on businesses.”
Priority E in the 2015 SSP, which directly supports The Framework and this Implementation Guidance
Goal 3 cited above, is to “improve Critical aim to equip sector stakeholders with tools and
Manufacturing Sector cybersecurity knowledge, information to secure critical assets.
tools, capabilities, and practices to secure critical
Critical cyber assets.”
Manufacturing
Sector- Priority D within the 2015 SSP is to encourage The Framework provides a common language to
Specific Plan stakeholders to work together to “characterize the communicate cybersecurity requirements among
(SSP) Critical Manufacturing Sector profile of cyber and various sector stakeholders. It also provides a
physical risks and raise risk awareness, recognized risk management methodology that
particularly at executive levels.” raises awareness among subject matter experts
and executives alike.
The 2015 SSP recognizes the importance of The Framework Core includes Subcategories that
collaboration among sector organizations to deal address threat and vulnerability information
with areas of shared risk and encourages sharing and voluntary information-sharing activities
stakeholders to strengthen structures and with external stakeholders to achieve broader
mechanisms for facilitating information sharing. situational awareness.
Current Condition
In order to understand the implementation of the Framework, Critical Manufacturing Organization A contacts the Critical
Manufacturing Sector Coordinating Council and the DHS C3 Voluntary Program for Framework guidance and assistance
with establishing connections with public and private sector organizations.
Critical Manufacturing Organization A assesses its current cybersecurity profile. The assessment shows that Critical
Manufacturing Organization A is only loosely aligned to the Framework’s Functions. As a result, the organization uses its
risk management process and adherence to numerous information security-focused regulations to create its target profile
that reflects the desired strict interpretation for each selected Framework category. The Target Profile is based on the
selection of the Functions, Categories, and Subcategories that are aligned with the organization’s business requirements,
risk tolerance, and resources.
Implementation
Critical Manufacturing Organization A follows the recommended steps on how an organization can use the Framework to
create a new cybersecurity program or improve an existing cybersecurity program.
• Step 1: Identify. Critical Manufacturing Organization A identifies its mission objectives, describes cybersecurity
risks, and determines which organizational components will use the Framework.
• Step 2: Orient. Critical Manufacturing Organization A identifies the systems, assets, requirements, and risk
management approaches and determines how to evaluate current risk management and cybersecurity posture.
• Step 3: Create a Current Profile. Beginning with the Categories specified in the Framework Core, Critical
Manufacturing Organization A develops a “Current Profile” that reflects its understanding of its present-day
cybersecurity activities.
• Step 4: Conduct a Risk Assessment. Critical Manufacturing Organization A analyzes the operational
environment and determines that a cyberattack against its cyber infrastructure is likely over the long term based
on the Cyber Information Sharing and Collaboration Program, which it connected with through the C3 Voluntary
Critical Manufacturing Cybersecurity Framework Implementation Guidance 19
Program. Based on its risk assessment, Critical Manufacturing Organization A identifies various vulnerabilities
and determines the consequence if those vulnerabilities are exploited.
• Step 5: Create a Target Profile. Critical Manufacturing Organization A creates a Target Profile that focuses on
the assessment of the Framework elements (e.g., Categories and Subcategories) describing the organization’s
desired cybersecurity outcomes.
• Step 6: Determine, Analyze, and Prioritize Gaps. Critical Manufacturing Organization A compares the Current
Profile and Target Profile to determine gaps and resources necessary to address the gaps. Critical Manufacturing
Organization A creates a prioritized Action Plan that draws on mission drivers, cost/benefit analysis, and
understanding of risk to achieve Target Profile outcomes. Identifying gaps between the Current Profile and Target
Profile allows for the creation of a roadmap that Critical Manufacturing Organization A implements to reduce its
cybersecurity risk.
• Step 7: Implement Action Plan. The organization implements the steps defined in the Action Plan and monitors
its current cybersecurity practices against the Target Profile.
Critical Manufacturing Organization A also partners with a third-party to evaluate the organization’s management and
execution of risk management activities. To move forward in a comprehensive manner, the organization leverages
activities in Framework Core Functions mentioned in the Preconditions section.
Critical Manufacturing Organization A strives to meet the Tier 3, which includes regular and repeatable risk management
processes to respond to a changing cybersecurity landscape. Tier 3 achievement is accomplished by overlaying the
Framework and Critical Manufacturing Organization A’s risk management activities, gap identification, and mitigation.
Risk management processes include risk-informed policies, processes, and procedures that are defined, implemented as
intended, and validated.
[OPTION 1] Areas for improvement for Critical Manufacturing Organization A are based on Current Profile, Target
Profile, and industry stakeholder input to focus on improving critical areas of cybersecurity and risk management:
• Authentication
• Data Analytics
• Cybersecurity Workforce
• Privacy Standards
• Supply Chain Risk Management
• Asset Management • Awareness and • Anomalies and • Response Planning • Recovery Planning
• Business Environment Training Events • Communications • Improvements
• Governance • Data Security • Security Continuous • Analysis • Communications
• Risk Assessment • Information Protection Monitoring • Mitigation
• Risk Management Processes and • Detection Processes • Improvements
Strategy Procedures
• Protective
Technology