Contents
What is Cyber Security Framework?
In the coming era, cyber security measures will become more and more important, but when implementing cyber security measures, it will be a heavy burden to build measures from scratch.
However, for transactions with government agencies such as the United States, it is becoming essential to take measures such as meeting certain security standards.
Therefore, the NIST Cyber Security Framework (CSF) is published by the government agency “National Institute of Standards and Technology (NIST)” as a reference as a certain standard for security measures. These are the guidelines.
Nowadays, security measures based on the NIST cyber security framework are expanding outside the United States. The cybersecurity framework helps improve cybersecurity programs and includes CSF content, including defense-related industries, healthcare and financial services industries.
The NIST Cyber Security Framework (CSF) is consists of 5 functions: Identify、Protect、Detect、Respond、Recover, each function runs in parallel and continuously.
These five functions need to be considered together in order to capture the risk management cycle in an advanced and strategic manner in an organization’s cyber security measures.
IDENTIFY
Develop an organizational understanding to manage cybersecurity risk to: systems, assets, data, and capabilities.
PROTECT
Develop and implement the appropriate safeguards to ensure delivery of services.
DETECT
Develop and implement the appropriate activities to identify the occurrence of a cyber security event.
RESPOND
Develop and implement the appropriate activities to take action regarding a detected cyber security event.
RECOVER
Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cyber security event.
Benefits of complying with the cybersecurity framework
Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cyber security event
※The charts used on this page are taken from the NIST CSF.
※Please refer to the original text for an accurate understanding of the content.
※We are not responsible for any problems that may occur based on the contents of this page.
Getting Started with the NISTCybersecurity Framework
Getting Started with the NIST Cybersecurity Framework: A Quick Start Guide