0% found this document useful (0 votes)
233 views1 page

Nist Cyber Resilience Framework

The NIST Cyber Resilience Framework outlines 5 functions - identification, protection, detection, response, and recovery - to improve ICT resilience. It includes categories such as asset management, governance, risk assessment, access control, data security, anomaly detection, security monitoring, response planning, and recovery planning. The framework takes a 360 degree approach to cybersecurity and resilience.

Uploaded by

sizi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
233 views1 page

Nist Cyber Resilience Framework

The NIST Cyber Resilience Framework outlines 5 functions - identification, protection, detection, response, and recovery - to improve ICT resilience. It includes categories such as asset management, governance, risk assessment, access control, data security, anomaly detection, security monitoring, response planning, and recovery planning. The framework takes a 360 degree approach to cybersecurity and resilience.

Uploaded by

sizi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

NIST Cyber Resilience Framework zur Verbesserung der IKT-Resilienz

5 Funktionen – 360° Abdeckung für Cyber Security & Resilience


Funktionen Kategorien

 Inventar Management (Assest Management) (ID.AM Geschäftsumfeld (Business Environment) (ID.BE)


 Governance (ID.GV)
IDENTIFIZIEREN (ID)  Risikomanagement (Risk Assessment) (ID.RA)
 Risikomanagement Strategie (Risk Management Strategy) (ID.RM)
 Lieferketten Risikomanagement (Supply Chain Risk Management) (ID.SC)

 Zugriffsmanagement und -steuerung (Access Control) (PR.AC)


 Awareness and Training (PR.AT
 Datensicherheit (Data Security) (PR.DS)
SCHÜTZEN (PR)
 Schutz von Daten (Information Protection Processes and Procedures) (PR.IP)
 Maintenance (PR.MA)
 Protective Technology (PR. PT)
Governance

 Vorfälle (Anomalies and Events) (DE.AE)


ERKENNEN (DE)  Überwachung (Security Continuous Monitoring) (DE.CM)
 Detection Processes (DE.DP)

 Response Planning (RS.RP)


 Kommunikation (Communications) (RS.CO)
REAGIEREN (RS)  Analyse (Analysis) (RS.AN)
 Bewältigung (Mitigation) (RS.MI)
 Verbesserungen (Improvements) (RS.IM)

 Wiederherstellungsplanung (Recovery Planning) (RC.RP)


WIDERHERSTELLEN
 Verbesserungen (Improvements) (RC.IM)
(RC)
 Kommunikation (Communications) (RC.CO)

RM Risk Management AG, Security & Risk Consultants, Switzerland 2

You might also like