文替是什么意思| hp医学上是什么意思| 眼睛蒙蒙的是什么原因| 3月31日是什么星座| 番茄是什么时候传入中国的| 靠谱什么意思| 男友力是什么意思| 什么叫醪糟| 笑点低是什么意思| 右附件区囊肿是什么意思| 视网膜病变有什么症状| 桃酥为什么叫桃酥| 解表散热什么意思| 中国一词最早出现在什么时候| 宫颈粘液栓是什么样的| 何乐而不为是什么意思| 灶性肠化是什么意思| 家里消毒杀菌用什么好| 房性逸搏心律是什么意思| 牙齿是什么材质| 满是什么结构| 什么面好吃| 脖子疼什么原因| 唐顿庄园讲的是什么| 08年是什么年| 冰丝是什么面料| 经常挖鼻孔有什么危害| 花是什么意思| 七零年属什么生肖| 什么粉| 聪明反被聪明误是什么意思| 活化是什么意思| 为什么尿频| ida是什么意思| 鸡蛋炒什么菜谱大全| 4月18日什么星座| 拉红色的屎是什么原因| 小孩几天不大便是什么原因怎么办| 1995年五行属什么| 胰腺检查挂什么科| 便秘吃什么可以调理| 警察为什么叫条子| 二月二十三日是什么星座| 阿胶糕什么人不能吃| 黄豆可以和什么一起打豆浆| 徐才厚什么级别| 直辖市是什么级别| 老年人喝什么蛋白粉好| 小别胜新婚什么意思| 爱我永不变是什么歌| 腰痛是什么原因| 红海为什么叫红海| 子宫回声欠均匀是什么意思| lo娘是什么意思| 角化异常性疾病是什么| 兔子吃什么| 冰丝和天丝有什么区别| 恐龙的祖先是什么| 顺钟向转位是什么意思| 炉甘石洗剂有什么作用| 梦见前婆婆是什么意思| 美容师都要学什么| 尿管型偏高是什么原因| 中国梦是什么意思| 什么情况下需要做心脏造影| 闫学晶是什么军衔| 95511是什么号码| 破屋什么意思| fashion是什么意思| 时值是什么意思| 什么克风| hankook是什么轮胎| 通讯地址填什么| 明天我要离开是什么歌| 毛周角化症用什么药膏| 一戴套就软是什么原因| com什么意思| 早上睡不醒是什么原因| 指甲变黑是什么原因| 便秘是什么症状| 心悸失眠是什么症状| 拔罐之后要注意什么| 什么样的伤口需要打破伤风针| camel是什么颜色| aca是什么意思| 妈妈的哥哥的老婆叫什么| 药流可以吃什么水果| 梦见自己理发是什么意思| 为什么老是恶心想吐| 嗜睡是什么病| 教师节贺卡上写什么| 老是做噩梦是什么原因| 气管炎吃什么药| 大米放什么不生虫子| 小傻瓜是什么意思| 蜘蛛的血液是什么颜色| 硌脚是什么意思| 关节退行性改变是什么意思| 肝做什么检查最准确| 治飞蚊症用什么眼药水| 淡盐水有什么作用和功效| as是什么| 腰间盘膨出吃什么药效果好| 什么是皮包公司| 翡翠属于什么五行| 胃难受吃什么食物好| 脚背疼是什么原因| 吃什么能生精和提高精子质量| 小猫能吃什么水果| 什么人容易得帕金森病| 蔚蓝是什么意思| 廿是什么意思| 猪油吃多了有什么好处和坏处| 泌尿科挂什么科| 铁扇公主是什么生肖| 内分泌代谢科是看什么病的| 结晶果糖是什么| 肺气肿吃什么食物| 账单日是什么意思| 小孩吃牛肉有什么好处| py是什么意思| 什么叫打卡| 胸部周围痒是什么原因| 干咳无痰是什么原因| 甲状旁腺分泌什么激素| 经常便秘吃什么| 手麻吃什么药| ad吃到什么时候| 热射病是什么病| 婴儿吃手是什么原因| cd20阳性什么意思| 十二指肠溃疡吃什么药| 喝酒头疼是什么原因| 新生儿眼屎多是什么原因| 6月17日什么星座| 舌面有裂纹是什么原因| 饕餮长什么样| 冒虚汗是什么原因| 姑奶奶的老公叫什么| 雷峰塔为什么叫雷峰塔| 47年属什么生肖| 牙齿发黑是什么原因| 讥讽的笑是什么笑| 睾丸癌是由什么引起的| ipada1474是什么型号| 四肢厥逆是什么意思| 奇的多音字是什么| 龟苓膏有什么功效| 豆浆配什么主食当早餐| 1952年属什么| 一个骨一个宽是什么字| 旗袍配什么鞋| 男人有腰窝意味着什么| 为什么会得鼻炎| 超声波是什么原理| 腿脚酸软无力是什么原因| 温州有什么特产| 油条配什么好吃| 吊客是什么意思| 金牛座和什么星座最不配| 失眠用什么药| 蚂蚁喜欢吃什么食物| 天下之奇是什么生肖| 胸口疼吃什么药| 早上起床腰疼是什么原因| 福禄寿的禄是什么意思| 鱼是什么意思| ha是什么意思| 什么叫做流年| 男人脖子后面有痣代表什么| 枣子什么季节成熟| 总蛋白是什么意思| 左侧肚脐旁边疼是什么原因| us什么意思| 扁桃体发炎可以吃什么水果| 姓薄的读音是什么| gamma什么意思| 股市量比什么意思| 笑气是什么气体| 熬夜吃什么对身体好| 女性为什么不适合喝茉莉花茶| 五官立体是什么意思| 三十年婚姻是什么婚| 黑加京念什么| 老感冒是什么原因| 戏子是什么意思| 京剧红色脸谱代表什么| 什么是名媛| 后脑勺出汗多是什么原因| 人吃什么才能长胖| 黄疸是什么样子的图片| 什么食物补锌| 赵子龙属什么生肖| dan是什么意思| 魔怔什么意思| 肖像是什么意思| 什么叫腔梗| 辟邪剑法为什么要自宫| 发达国家的标准是什么| 璋字五行属什么| 尿酸高什么水果不能吃| 12月13日是什么星座| 南京都有什么大学| 眼皮红肿是什么原因| 国粹是什么| 棒打鸳鸯什么意思| 丽江机场叫什么名字| 世界上最毒的蜘蛛叫什么| 农历五月二十八是什么日子| 最高位是什么位| 小怪兽是什么| 3.3是什么星座| 家有一老如有一宝是什么意思| 姓名字号是什么意思| gmail是什么邮箱| 丹参滴丸和丹参片有什么区别| 胃炎不能吃什么食物| 原发性高血压是什么意思| 麦芯粉是什么面粉| 失眠用什么药最好| 白天不懂夜的黑什么意思| 吃龟苓膏有什么好处| 什么的爬| 肌酐下降是什么原因| 梦到发洪水是什么征兆| 小孩检查微量元素挂什么科| 铲垃圾的工具叫什么| 实蛋是什么| 什么颜色的床单有助于睡眠| 续航什么意思| 梦见老婆出轨是什么预兆| 老板是什么意思| 什么叫理疗| 紫苏有什么作用与功效| 一直放屁是什么原因| 两千年前是什么朝代| 朱元璋什么星座| 咳嗽有痰吃什么好的快| 十五年是什么婚| 海丽汉森是什么档次| 传销是什么意思| 急性扁桃体炎吃什么药| pn医学上是什么意思| 蜜蜂的尾巴有什么作用| rinnai是什么品牌| 女性阴毛变白是什么原因| 40年属什么| 能说会道是什么生肖| 频次是什么意思| 为什么会脾虚| 梦见小孩是什么| 原则上是什么意思| 五什么四什么| 落子是什么意思| 尿中泡沫多是什么原因| 创客是什么意思| 不是什么意思| 梦见两口子吵架是什么意思| 孩子改姓需要什么手续| 咖喱是什么东西| 耸肩是什么意思| 荆棘是什么意思| 关系是什么意思| 最好的假牙是什么材质| 百度

Второй прототип китайского самолета С919 будет отправлен на испытательную базу в провинции Шаньдун

百度 此外,为了避免造成潜在的歧视,该条例还要求不得将敏感数据用于智能决策。

The NIST Cybersecurity Framework (CSF) is a set of voluntary guidelines designed to help organizations assess and improve their ability to prevent, detect, and respond to cybersecurity risks. Developed by the U.S. National Institute of Standards and Technology (NIST), the framework was initially published in 2014 for critical infrastructure sectors but has since been widely adopted across various industries, including government and private enterprises globally. The framework integrates existing standards, guidelines, and best practices to provide a structured approach to cybersecurity risk management.

The CSF is composed of three primary components: the Core, Implementation Tiers, and Profiles. The Core outlines five key cybersecurity functions—Identify, Protect, Detect, Respond, and Recover—each of which is further divided into specific categories and subcategories. These functions offer a high-level, outcome-driven approach to managing cybersecurity risks. The Implementation Tiers help organizations assess the sophistication of their cybersecurity practices, while the Profiles allow for customization based on an organization's unique risk profile and needs.

Since its inception, the CSF has undergone several updates to reflect the evolving nature of cybersecurity. Version 1.1, released in 2018, introduced enhancements related to supply chain risk management and self-assessment processes. The most recent update, Version 2.0, was published in 2024, expanding the framework’s applicability and adding new guidance on cybersecurity governance and continuous improvement practices.

The NIST Cybersecurity Framework is used internationally and has been translated into multiple languages. It serves as a benchmark for cybersecurity standards, helping organizations align their practices with recognized global standards, such as ISO/IEC 27001 and COBIT. While widely praised, the framework has been criticized for the cost and complexity involved in its implementation, particularly for small and medium-sized enterprises.

Overview

edit

The NIST Cybersecurity Framework (CSF) is a set of guidelines developed by the U.S. National Institute of Standards and Technology (NIST) to help organizations manage and mitigate cybersecurity risks. It draws from existing standards, guidelines, and best practices to provide a flexible and scalable approach to cybersecurity.[1] The framework provides a high-level taxonomy of cybersecurity outcomes and offers a methodology for assessing and managing those outcomes.[2] Additionally, it addresses the protection of privacy and civil liberties in a cybersecurity context.[3]

The CSF has been translated into multiple languages and is widely used by governments, businesses, and organizations across various sectors.[4][5] According to a 2016 survey, 70% of organizations view the NIST Cybersecurity Framework as a best practice for computer security, though some have noted that implementation can require significant investment.[6]

The framework is designed to be flexible and adaptable, providing high-level guidance that allows individual organizations to determine the specifics of implementation based on their unique needs and risk profiles.[7]

Version 1.0 of the framework was published in 2014, primarily targeting operators of critical infrastructure. A public draft of Version 1.1 was released for comment in 2017, and the final version was published on April 16, 2018. Version 1.1 retained compatibility with the original framework while introducing additional guidance on areas such as supply chain risk management. Version 2.0, released in 2024, further expanded the framework's scope and introduced new guidelines on self-assessment and cybersecurity governance.[8]

The framework consists of three main components: the "Core," "Profiles," and "Tiers." The Core provides a comprehensive set of activities, outcomes, and references related to various aspects of cybersecurity. The Implementation Tiers help organizations assess their cybersecurity practices and sophistication, while the Profiles allow organizations to tailor the framework to their specific requirements and risk assessments.[9]

Organizations typically start by developing a "Current Profile" to describe their existing cybersecurity practices and outcomes. From there, they can create a "Target Profile" to outline the desired future state and define the steps needed to achieve it. Alternatively, organizations can adopt a baseline profile based on their sector or specific industry needs.

Research indicates that the NIST Cybersecurity Framework has the potential to influence cybersecurity standards both within the United States and internationally, particularly in sectors where formal cybersecurity standards are still emerging. This influence could foster better international cybersecurity practices, benefiting businesses that operate across borders and contributing to global cybersecurity efforts.[10]

Functions and categories of cybersecurity activities

edit
 
NIST Version 1.1

The NIST Cybersecurity Framework organizes its "core" material into five "functions" which are subdivided into a total of 23 "categories". For each category, it defines a number of subcategories of cybersecurity outcomes and security controls, with 108 subcategories in all.

For each subcategory, it also provides "Informative Resources" referencing specific sections of a variety of other information security standards, including ISO 27001, COBIT, NIST SP 800-53, ANSI/ISA-62443, and the Council on CyberSecurity Critical Security Controls (CCS CSC, now managed by the Center for Internet Security). Special Publications (SP) aside, most of the informative references requires a paid membership or purchase to access their respective guides. The cost and complexity of the framework has resulted in bills from both houses of Congress that direct NIST to create Cybersecurity Framework guides that are more accessible to small and medium businesses.[11][12]

Here are the functions and categories, along with their unique identifiers and definitions, as stated in the framework document.[13]

Identify

edit

"Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities."

  • Asset Management (ID.AM): The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to business objectives and the organization's risk strategy.
  • Business Environment (ID.BE): The organization's mission, objectives, stakeholders, and activities are understood and prioritized; this information is used to inform cybersecurity roles, responsibilities, and risk management decisions.
  • Governance (ID.GV):- The policies, procedures, and processes to manage and monitor the organization's regulatory, legal, risk, environmental, and operational requirements are understood and inform the management of cybersecurity risk.
  • Risk Assessment (ID.RA): The organization understands the cybersecurity risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals.
  • Risk Management Strategy (ID.RM): The organization's priorities, constraints, risk tolerances, and assumptions are established and used to support operational risk decisions.
  • Supply Chain Risk Management (ID.SC): The organization's priorities, constraints, risk tolerances, and assumptions are established and used to support risk decisions associated with managing supply chain risk. The organization has in place the processes to identify, assess and manage supply chain risks.

Protect

edit

"Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services."

  • Access Control (PR.AC): Access to assets and associated facilities is limited to authorized users, processes, or devices, and to authorized activities and transactions.
  • Awareness and Training (PR.AT): The organization's personnel and partners are provided cybersecurity awareness education and are adequately trained to perform their information security-related duties and responsibilities consistent with related policies, procedures, and agreements.
  • Data Security (PR.DS): Information and records (data) are managed consistent with the organization's risk strategy to protect the confidentiality, integrity, and availability of information.
  • Information Protection Processes and Procedures (PR.IP): Security policies (that address purpose, scope, roles, responsibilities, management commitment, and coordination among organizational entities), processes, and procedures are maintained and used to manage protection of information systems and assets.
  • Maintenance (PR.MA): Maintenance and repairs of industrial control and information system components is performed consistent with policies and procedures.
  • Protective Technology (PR.PT): Technical security solutions are managed to ensure the security and resilience of systems and assets, consistent with related policies, procedures, and agreements.

Detect

edit

"Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event."

  • Anomalies and Events (DE.AE): Anomalous activity is detected in a timely manner and the potential impact of events is understood.
  • Security Continuous Monitoring (DE.CM): The information system and assets are monitored at discrete intervals to identify cybersecurity events and verify the effectiveness of protective measures.
  • Detection Processes (DE.DP): Detection processes and procedures are maintained and tested to ensure timely and adequate awareness of anomalous events.

Respond

edit

"Develop and implement the appropriate activities to take action regarding a detected cybersecurity incident."

  • Response Planning (RS.RP): Response processes and procedures are executed and maintained, to ensure timely response to detected cybersecurity events.
  • Communications (RS.CO): Response activities are coordinated with internal and external stakeholders, as appropriate, to include external support from law enforcement agencies.
  • Analysis (RS.AN): Analysis is conducted to ensure adequate response and support recovery activities.
  • Mitigation (RS.MI): Activities are performed to prevent expansion of an event, mitigate its effects, and eradicate the incident.
  • Improvements (RS.IM): Organizational response activities are improved by incorporating lessons learned from current and previous detection/response activities.

Recover

edit

"Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident."

  • Recovery Planning (RC.RP): Recovery processes and procedures are executed and maintained to ensure timely restoration of systems or assets affected by cybersecurity events.
  • Improvements (RC.IM): Recovery planning and processes are improved by incorporating lessons learned into future activities.
  • Communications (RC.CO): Restoration activities are coordinated with internal and external parties, such as coordinating centers, Internet Service Providers, owners of attacking systems, victims, other CSIRTs, and vendors.

Updates

edit

In 2021 NIST released Security Measures for "EO-Critical Software" Use Under Executive Order (EO) 14028 to outline security measures intended to better protect the use of deployed EO-critical software in agencies’ operational environments.[14]

Journey to CSF 2.0

edit

The NIST Cybersecurity Framework is meant to be a living document, meaning it will be updated and improved over time to keep up with changes in technology and cybersecurity threats, as well as to integrate best-practices and lessons learned. Since releasing version 1.1 in 2018, stakeholders have provided feedback that the CSF needed to be updated. In February 2022, NIST released a request for information on ways to improve the CSF, and released a subsequent concept paper in January of 2023 with proposed changes. Most recently, NIST released its Discussion Draft: The NIST Cybersecurity Framework 2.0 Core with Implementation Examples and has requested public comments be submitted by November 4, 2023. [15]

Main Changes

edit

The following is a list of the major changes to the framework from version 1.1 to 2.0:[16]

  1. The title of the framework has changed from "Framework for Improving Critical Infrastructure Cybersecurity" to "Cybersecurity Framework". The scope of the framework has been updated to reflect the large population of organizations that use the framework.
  2. Implementation examples have been added to provide practical and action-oriented processes to help users achieve the CSF subcategories. Additionally, the framework Profiles have been revised and expanded to demonstrate the various purposes of the profiles.
  3. A new Function, Govern, has been added to provide organizational context and the roles and responsibilities associated with developing a cybersecurity governance model. There is also an additional category in this Function focused on cybersecurity supply chain risk management.
  4. The latest update also provides greater information on cybersecurity assessments by placing greater importance on the continuous improvement of security through a new Improvement Category in the Identify Function.

See also

edit

References

edit

  This article incorporates public domain material from NIST Cybersecurity Framework (PDF). National Institute of Standards and Technology.

  1. ^ Gordon, Lawrence A; Loeb, Martin P; Zhou, Lei (January 1, 2020). "Integrating cost–benefit analysis into the NIST Cybersecurity Framework via the Gordon–Loeb Model". Journal of Cybersecurity. 6 (tyaa005). doi:10.1093/cybsec/tyaa005. ISSN 2057-2085.
  2. ^ "Achieving Successful Outcomes With the NIST Cybersecurity Framework". GovLoop. February 13, 2019. Retrieved June 12, 2021.
  3. ^ HealthITSecurity (February 10, 2016). "HIMSS: NIST Cybersecurity Framework Positive, Can Improve". Retrieved August 2, 2016.
  4. ^ "NIST Cybersecurity Framework".
  5. ^ "Workshop plots evolution of NIST Cybersecurity Framework". FedScoop. April 7, 2016. Retrieved August 2, 2016.
  6. ^ "NIST Cybersecurity Framework Adoption Hampered By Costs, Survey Finds". Information Week Dark Reading. March 30, 2016. Retrieved August 2, 2016.
  7. ^ Gordon, Lawrence A; Loeb, Martin P; Zhou, Lei (January 1, 2020). "Integrating cost–benefit analysis into the NIST Cybersecurity Framework via the Gordon–Loeb Model". Journal of Cybersecurity. 6 (1). doi:10.1093/cybsec/tyaa005. ISSN 2057-2085.
  8. ^ "NIST Releases Version 2.0 of Landmark Cybersecurity Framework". NIST. February 26, 2024.
  9. ^ Justin Seitz (April 14, 2021). Black Hat Python: Python Programming for Hackers. No Starch Press. ISBN 978-1718501126.
  10. ^ Shackelford, Scott J; Proia, Andrew A; Martell, Brenton; Craig, Amanda N (2015). "Toward a Global Cybersecurity Standard of Care?: Exploring the Implications of the 2014 NIST Cybersecurity Framework on Shaping Reasonable National and International Cybersecurity Practices". Texas International Law Journal. 50 (2/3): 305–355. SSRN 2446631. ProQuest 1704865080.
  11. ^ "MAIN STREET Cybersecurity Act of 2017". congress.gov. Retrieved October 5, 2017.
  12. ^ "NIST Small Business Cybersecurity Act of 2017". congress.gov. Retrieved October 5, 2017.
  13. ^ "Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1" (Document). National Institute of Standards and Technology. April 16, 2018. doi:10.6028/nist.cswp.04162018.
  14. ^ "Security Measures for "EO-Critical Software" Use". NIST. May 12, 2021.
  15. ^ "The NIST Cybersecurity Framework 2.0". NIST. 2023. doi:10.6028/NIST.CSWP.29.ipd. Retrieved October 20, 2023.
  16. ^ "Public Draft: The NIST Cybersecurity Framework 2.0" (PDF). NIST. Retrieved October 20, 2023.
edit
巴适什么意思 阴囊湿疹用什么药膏效果最好 羊奶和牛奶有什么区别 1.17是什么星座 作死是什么意思
麦粒肿滴什么眼药水 b-h是什么药 眼睛模糊是什么原因引起的 走马观花的走什么意思 睡觉时间长是什么原因
茶水洗脸有什么好处和坏处 谭震林是什么军衔 男人额头有痣代表什么 脸上爱长痘痘是什么原因 什么是情趣
中医七情指的是什么 wht什么颜色 为宜是什么意思 花中隐士是什么花 心系是什么意思
乳房检查挂什么科hcv9jop1ns0r.cn 肝阳上亢吃什么药hcv9jop4ns9r.cn 合肥有什么玩的hcv7jop7ns1r.cn 激素脸是什么样子hcv9jop4ns6r.cn 女属猪的和什么属相最配hcv8jop5ns2r.cn
突然耳鸣是什么原因hcv9jop4ns7r.cn 瞅瞅是什么意思hcv8jop5ns0r.cn 十二生肖为什么老鼠排第一hcv9jop7ns0r.cn 肚子大是什么原因造成的hcv8jop0ns4r.cn 偶发性房性早搏是什么意思gysmod.com
口嫌体正直什么意思hcv9jop4ns0r.cn 容易出虚汗是什么原因hcv7jop6ns3r.cn 水洗真丝是什么面料jingluanji.com 减肥喝什么hcv8jop4ns3r.cn 埃及是什么人种hcv7jop7ns1r.cn
头疼耳鸣是什么原因引起的hcv8jop2ns9r.cn 今天吃什么helloaicloud.com 引体向上练什么肌肉hcv9jop1ns6r.cn 礼尚往来什么意思hcv8jop4ns7r.cn 拉什么hcv9jop5ns3r.cn
百度