Components of Cybersecurity Framework
Components of Cybersecurity Framework
TRANSFORMACIÓN DIGITAL”
INTRODUCCIÓN A LA
CIBERSEGURIDAD Y
CIBERDEFENSA
Noviembre 2022
[email protected]
PRIMER SEMINARIO EN “CIBERSEGURIDAD Y CIBERDEFENSA EN TIEMPOS DE
TRANSFORMACIÓN DIGITAL”
[email protected]
Cybersecurity Framework Components
The Framework consists of 3 main components
3
Framework Implementation Tiers
4 4
Framework Core
Function Category ID
Asset Management ID.AM
Business Environment ID.BE
What processes and assets Governance ID.GV
need protection? Identify Risk Assessment ID.RA
Risk Management Strategy ID.RM
Supply Chain Risk Management ID.SC
Identity Management & Access Control PR.AC
Awareness and Training PR.AT
Data Security PR.DS
What safeguards are
available? Protect Information Protection Processes & Procedures PR.IP
Maintenance PR.MA
Protective Technology PR.PT
Anomalies and Events DE.AE
What techniques can
identify incidents? Detect Security Continuous Monitoring DE.CM
Detection Processes DE.DP
Response Planning RS.RP
Communications RS.CO
What techniques can contain
impacts of incidents? Respond Analysis RS.AN
Mitigation RS.MI
Improvements RS.IM
Recovery Planning RC.RP
What techniques can restore
capabilities? Recover Improvements RC.IM 5
Communications RC.CO
Core: A Translation Layer
Senior Executives
• Broad enterprise
considerations
• Abstracted risk
vocabulary
Specialists in Implementation /
Other Fields Operations
• Specific focus outside • Deep technical
of cybersecurity considerations
• Specialized or no risk • Highly specialized
vocabulary vocabulary
6
Subcategories & Informative References
Function Category ID
Asset Management ID.AM
Subcategory Informative References
ID.BE-1: The organization’s COBIT 5 APO08.04, APO08.05, APO10.03,
Business Environment ID.BE role in the supply chain is APO10.04, APO10.05
Governance ID.GV identified and ISO/IEC 27001:2013 A.15.1.3, A.15.2.1,
Identify communicated A.15.2.2
Risk Assessment ID.RA
NIST SP 800-53 Rev. 4 CP-2, SA-12
Risk Management Strategy ID.RM
Supply Chain Risk Management ID.SC ID.BE-2: The organization’s COBIT 5 APO02.06, APO03.01
Identity Management & Access place in critical NIST SP 800-53 Rev. 4 PM-8
PR.AC
Control infrastructure and its
Awareness and Training PR.AT industry sector is identified
and communicated
Data Security PR.DS
Protect
Information Protection Processes &
PR.IP
Procedures
7
Framework Profiles
• Alignment with business requirements, risk tolerance, and
organizational resources
• Enables organizations to establish a roadmap for reducing
cybersecurity risk
• Used to describe current state or desired target state of
cybersecurity activities
8
Building a Profile
9
Resource and Budget Decision Making
10
Resources
Where to Learn More and Stay Current