csf2
csf2
Title (CSF)
The 2.0Cybersecurity
NIST ReferenceFramework
Tool
Read Me (CSF)is 2.0
This a download from the CSF 2.0 Reference Tool, which assists users in exploring the CSF 2.0 Core. This export is a user generated version of the Core
Change Log Final
The NIST Cybersecurity Framework 2.0 www.nist.gov/cyberframework
Ex1: Remove data that must remain CRI Profile v2.0: PR.DS-10
confidential (e.g., from
Ex1: Continuously back processors and in
up critical data CRI Profile v2.0:
CIS Controls v8.0:PR.DS-10.01
11.2
near-real-time, and back up other data CIS Controls v8.0: 11.3
CRI Profile v2.0: PR.PS
Ex1: Establish, test, deploy, and maintain CIS Controls v8.0: 4.1
hardened baselines
Ex1: Perform routinethat
andenforce
emergency the CIS
CIS Controls
Controls v8.0:
v8.0: 4.2
2.2
patching within
Ex1: Replace the timeframes
hardware specified in
when it lacks CIS
CIS Controls v8.0: 2.3
Controls v8.0: 1.2
needed securityallcapabilities
Ex1: Configure or when it
operating systems, CRI Profile v2.0: PR.PS-03
CIS Controls v8.0: 8.2
applications,
Ex1: When riskand servicesit,(including
warrants cloud-
restrict software CRI Profile v2.0:
CIS Controls v8.0:PR.PS-04
2.5
execution to permitted products
Ex1: Protect all components of only or CRI
CIS Controls v8.0:PR.PS-05
Profile v2.0: 16.1
organization-developed software from CRI Profile v2.0: PR.PS-06
CRI Profile v2.0: PR.IR
Ex1: Logically segment organization CIS Controls v8.0: 3.12
networks andorganizational
Ex1: Protect cloud-based platforms
equipment from CIS
CRI Controls v8.0:PR.IR-02
Profile v2.0: 12.2
known
Ex1: Avoid single pointsthreats,
environmental such
of failure in as CRI Profile v2.0: PR.IR-02.01
CRI Profile v2.0: PR.IR-03
systems and infrastructure
Ex1: Monitor usage of storage, power, CRI
CRI Profile
Profile v2.0:
v2.0: PR.IR-03.01
PR.IR-04
compute, network bandwidth, and other CRI Profile v2.0: PR.IR-04.01
Ex1: Monitor email, web, file sharing, CIS Controls v8.0: 10.1
collaboration services, and other common CRI
CRI Profile
Profile v2.0:
v2.0: DE.CM-09
DE.AE
CSF v1.1: DE.AE
Ex1: Use security information and event CIS Controls v8.0: 8.11
management (SIEM)
Ex1: Constantly or other
transfer tools
log data to
generated CRI
CRI Profile
Profile v2.0:
v2.0: DE.AE-02
DE.AE-03
by other
Ex1: Use sources
SIEMs ortoother
a relatively
tools tosmall
estimate CRI
CRI Profile v2.0: DE.AE-03.01
Profile v2.0: DE.AE-04
impact and scope, and review and refine CRI Profile v2.0: DE.AE-04.01
Ex1: Use cybersecurity software to generate CRI Profile v2.0: DE.AE-06
alerts and provide
Ex1: Securely them
provide to the
cyber security
threat CRI
CRI Profile
Profile v2.0:
v2.0: DE.AE-06.01
DE.AE-07
intelligence
Ex1: Apply incident criteria to known and CRI Profile v2.0: DE.AE-07.01
feeds to detection CRI Profile v2.0: DE.AE-08
assumed characteristics of activity in order CRI Profile v2.0: DE.AE-08.01
Ex1: Require each incident responder and CRI Profile v2.0: RS.AN-06
others (e.g., system
Ex1: Collect, administrators,
preserve, and safeguard the CRI
CRI Profile
Profile v2.0:
v2.0: RS.AN-06.01
RS.AN-07
integrity of all pertinent
Ex1: Review other potentialincident data
targets of and
the CRI
CRI Profile v2.0:
Profile v2.0: RS.AN-07.01
RS.AN-08
incident to search for indicators of CRI
CRI Profile v2.0: RS.AN-08.01
Profile v2.0: RS.CO
CSF v1.1: RS.CO
Ex1: Follow the organization's breach CIS Controls v8.0: 17.2
notification
Ex1: Securelyprocedures after discovering
share information a
consistent CRI Profile v2.0:
CIS Controls v8.0:RS.CO-02
17.2
with response plans and information CRI Profile v2.0: RS.CO-03