CSF 2
CSF 2
GOVERN (GV)
IDENTIFY (ID): The organization's
current cybersecurity risks are
understood
Asset Management (ID.AM): Assets (e.g.,
data, hardware, software, systems,
facilities, services, people) that enable the
organization to achieve business purposes
are identified and managed consistent with
their relative importance to organizational
objectives and the organization's risk
strategy
ID.AM-01: Inventories of hardware managed by
the organization are maintained
IDENTIFY (ID)
PROTECT (PR): Safeguards to manage
the organization's cybersecurity risks
are used
Identity Management, Authentication, and
Access Control (PR.AA): Access to physical
and logical assets is limited to authorized
users, services, and hardware and
managed commensurate with the assessed
risk of unauthorized access
PROTECT (PR)
DETECT (DE): Possible cybersecurity
attacks and compromises are found
and analyzed
Continuous Monitoring (DE.CM): Assets are
monitored to find anomalies, indicators of
compromise, and other potentially adverse
events
DETECT (DE)
RESPOND (RS): Actions regarding a
detected cybersecurity incident are
taken
Incident Management (RS.MA): Responses
to detected cybersecurity incidents are
managed
RESPOND (RS)
RECOVER (RC): Assets and operations
affected by a cybersecurity incident
are restored
Incident Recovery Plan Execution (RC.RP):
Restoration activities are performed to
ensure operational availability of systems
and services affected by cybersecurity
incidents
RC.RP-01: The recovery portion of the incident
response plan is executed once initiated from
the incident response process
RECOVER (RC)
SP 800-218: PO.2.1
CRI Profile v2.0: GV.RR
SP 800-221A: GV.OV-2
CSF v1.1: ID.GV-2
Ex1: Constantly transfer log data generated CRI Profile v2.0: DE.AE-03
by other sources to a relatively small CRI Profile v2.0: DE.AE-03.01
number of log servers CRI Profile v2.0: DE.AE-03.02
Ex2: Use event correlation technology (e.g., CSF v1.1: DE.AE-3
SIEM) to collect information captured by
multiple sources
Ex3: Utilize cyber threat intelligence to help
correlate events among log sources
1st: 1st Party Risk
Ex1: Use SIEMs or other tools to estimate CRI Profile v2.0: DE.AE-04
impact and scope, and review and refine CRI Profile v2.0: DE.AE-04.01
the estimates CSF v1.1: DE.AE-4
Ex2: A person creates their own estimates
of impact and scope
1st: 1st Party Risk
Ex1: Apply incident criteria to known and CRI Profile v2.0: DE.AE-08
assumed characteristics of activity in order CRI Profile v2.0: DE.AE-08.01
to determine whether an incident should CSF v1.1: DE.AE-5
be declared
Ex2: Take known false positives into
account when applying incident criteria
1st: 1st Party Risk