Information Security Management
Purpose
Describe required steps to establish a Cybersecurity framework to understand, assess, prioritize and communicate the cybersecurity efforts.
References
- NIST Cybersecurity Framework:
- Schweiz. Bundesamt für wirtschaftliche Landesversorgung (BWL):
- OpenGroup:
CSF Functions
Govern (GV)
The organization’s cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored.
Organizational Contect (GV.OC)
The circumstances — mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements — surrounding the organization’s cybersecurity risk management decisions are understood.
- Share the organization’s mission (e.g., through vision and mission statements, marketing, and service strategies) to provide a basis for identifying risks that may impede that mission.
- Identify relevant internal/external stakeholders and their cybersecurity-related expectations.
- Determine a process to track and manage legal and regulatory requirements regarding protection of individuals’ information (e.g., General Data Protection Regulation).
- Critical objectives, capabilities, and services that stakeholders depend on or expect from the organization are understood and communicated.
- Outcomes, capabilities, and services that the organization depends on are understood and communicated Create an inventory of the organization’s dependencies on external resources (e.g., facilities, cloud-based hosting providers) and their relationships to organizational assets and business functions.
Risk management (GV.RM)
Risk management objectives are established and agreed to by organizational stakeholders
- Translate risk appetite statements into specific, measurable, and broadly understandable risk tolerance statements.
- Specify criteria for accepting and avoiding cybersecurity risk for various classifications of data.
Roles, Responsibilities, and Authorities (GV.RR):
Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated.
- Leaders (e.g., directors) agree on their roles and responsibilities in developing, implementing, and assessing the organization’s cybersecurity strategy.
- Document risk management roles and responsibility in policy.
Cybersecurity Supply Chain Risk Management (GV.SC):
Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders.
- Assess the suitability of the technology and cybersecurity capabilities and the risk management practices of prospective suppliers.
Policy (GV.PO):
Organizational cybersecurity policy is established, communicated, and enforced.
- Create, disseminate, and maintain an understandable, usable risk management policy with statements of management intent, expectations, and direction.
Identify (ID)
The organization’s current cybersecurity risks are understood.
- Asset Management (ID.AM): Assets (e.g., data, hardware, software, systems, facilities, internal/external services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization’s risk strategy.
Risk Assessment (ID.RA): The cybersecurity risk to the organization, assets, and individuals is understood by the organization.
- Vulnerabilities in assets are identified, validated, and recorded.
- Processes for receiving, analyzing, and responding to
vulnerability disclosures are established.
- Improvement (ID.IM): Improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all CSF Functions.
Protect (PR)
Safeguards to manage the organization’s cybersecurity risks are used
Identity Management, Authentication, and Access Control (PR.AA):
Access to physical and logical assets is limited to authorized users, services, and hardware and managed commensurate with the assessed risk of unauthorized access. What information employees should or do have access to.
- Identities and credentials for authorizes users, services and hardware are managed by the organization.
- Require multifactor authentication.
- Restrict sensitive information access to only those employees who need it to do their jobs.
- requiring multi-factor authentication on all accounts that offer it and consider using password managers to help you and your staff generate and protect strong passwords. (PR.AA-03)
- changing default manufacturer passwords. (PR.AA-01)
- regularly updating and patching software and operating systems. Enable automatic updates to help you remember. (PR.PS-02)
- regularly backing up your data and testing your backups. (PR.DS-11)
- configuring your tablets and laptops to enable full-disk encryption to protect data. (PR.DS-01)
- Data Security (PR.DS): Data are managed consistent with the
organization’s risk strategy to protect the confidentiality,
integrity, and availability of information
- The confidentiality, integrity, and availability of data-at-rest are protected.
- Backups of data are created, protected, maintained, and tested.
- Assess the timeliness, quality, and frequency of your company’s cybersecurity training for employees. (PR.AT-01/02)
- Communicate to your staff how to recognize common attacks, report attacks or suspicious activity, and perform basic cyber hygiene tasks. (PR.AT-01/02)
- Platform Security (PR.PS): The hardware, software (e.g., firmware,
operating systems, applications), and services of physical and
virtual platforms are managed consistent with the organization’s
risk strategy to protect their confidentiality, integrity, and
availability.
- Software is maintained, replaced, and removed commensurate with risk.
Detect (DE)
Possible cybersecurity attacks and compromises are found and analyzed.
Continuous Monitoring (DE.CM): Assets are monitored to find anomalies, indicators of compromise, and other potentially adverse events
- The physical environment is monitored to find potentially adverse events
- Asess your computing technologies and external services for deviations from
expected or typical behavior. (DE.CM-06/09)
- Adverse Event Analysis (DE.AE): Anomalies, indicators of compromise, and other potentially adverse events are analyzed to characterize the events and detect cybersecurity incidents
Respond (RS)
Actions regarding a detected cybersecurity incident are taken.
- Incident Analysis (RS.AN): Investigations are conducted to ensure effective response and support forensics and recovery activities Incident reports are triaged and validated (RS.MA-02)
- Assess the incident to determine its severity, what happened, and its root cause. (RS.AN-03, RS.MA-03)
- Activities are performed to prevent expansion of an event and mitigate its effects (RS.MI)
- Communicate a confirmed cybersecurity incident with all internal and external stakeholders (e.g., customers, business partners, law enforcement agencies, regulatory bodies) as required by laws, regulations, contracts, or policies.(RS.CO-02/03)
Recover (RC)
Assets and operations affected by a cybersecurity incident are restored.
- Incident Recovery Plan Execution (RC.RP): Restoration activities are
performed to ensure operational availability of systems and services
affected by cybersecurity incidents
- who within and outside your business has recovery responsibilities. (RC.RP-01)
- Assess what happened by preparing an after-action report—on your own or in
consultation with a vendor/partner—that documents the incident, the response
and recovery actions taken, and lessons learned. (RC.RP-06)
- Assess the integrity of your backed-up data and assets before using them for restoration. (RC.RP-03)
CSF Controls
| AC | Access Control |
| AT | Awareness and Training |
| AU | Audit and Accountability |
| CA | Assessment, Authorization, and Monitoring |
| CM | Configuration Management |
| CP | Contingency Planning |
| IA | Identification and Authentication |
| IR | Incident Respones |
| MA | Maintenance |
| MP | Media Protection |
| PE | Physical and Environmental Protection |
| PL | Planning |
| PM | Program Management |
| PS | Personnel Security |
| PT | Personally Identifiable Information Processing and Transparency |
| RA | Risk Assement |
| SA | System and Services Acquisition |
| SC | System and Comminucation Protection |
| SI | System Information Integrity |
| SR | Supply Chain Risk Management |