RC.CO

Recover Communications (RC.CO): Restoration activities are coordinated with internal and external parties, such as coordinating centers, Internet Service Providers, owners of attacking systems, victims, other…

RS.IM & RC.IM

Response Improvements (RS.IM): Organizational response activities are improved by incorporating lessons learned from current and previous detection/response activities.

RS.MI

Response Mitigation (RS.MI): Activities are performed to prevent expansion of an event, mitigate its effects, and eradicate the incident.

RS.AN

Response Analysis (RS.AN): Analysis is conducted to ensure adequate response and support recovery activities.

RS.RP & RS.CO

Response Planning (RS.RP): Response processes and procedures are executed and maintained, to ensure timely response to detected cybersecurity events. Response Communications (RS.CO): Response activities are…

DE.DP

Detection Processes (DE.DP): Detection processes and procedures are maintained and tested to ensure timely and adequate awareness ofanomalous events.

DE.CM

Detect Security Continuous Monitoring (DE.CM): The information system and assets are monitored at discrete intervals to identify cybersecurity events and verify the effectiveness of protective…

DE.AE

DETECT (DE). Anomalies and Events (DE.AE): Anomalous activity is detected in a timely manner and the potential impact of events is understood.

ID.BE

Identify Business Environment (ID.BE): The organization’s mission, objectives, stakeholders, and activities are understood and prioritized; this information is used to inform cybersecurity roles, responsibilities, and…

PR.MA & PR.PT

Protect Maintenance (PR.MA): Maintenance and repairs of industrial control and information system components is performed consistent with policies and procedures. Protective Technology (PR.PT): Technical security…

PR.IP

Protect Information Protection Processes and Procedures (PR.IP): Security policies (that address purpose, scope, roles, responsibilities, management commitment, and coordination among organizational entities), processes, and procedures…

PR.DS

Protect Data Security (PR.DS): Information and records (data) are managedconsistent with the organization’s risk strategy to protect theconfidentiality, integrity, and availability of information.

PR.AT

Protect Awareness and Training (PR.AT): The organization’s personnel and partners are provided cybersecurity awareness education and are adequately trained to perform their information security-related duties…

PR.AC

Protect Access Control (PR.AC): Access to assets and associated facilities is limited to authorized users, processes, or devices, and to authorized activities and transactions.

ID.SC

Supply Chain Risk Management (ID.SC) The organization’s priorities, constraints, risk tolerances, and assumptions are established and used to support risk decisions associated with managing supply…

ID.RA

Risk Assessment (ID.RA): The organization understands the cybersecurity risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals.

ID.RM

Risk Management Strategy (ID.RM): The organization’s priorities, constraints, risk tolerances, and assumptions are established and used to support operational risk decisions.

ID.AM

Asset Management (ID.AM): The data, personnel, devices, systems, and facilities that enable the organization to achieve business purposes are identified and managed consistent with their…

BCP.RP

BCP.RP (Readiness Procedures): Readiness procedures define aspects which include assumptions & instructions to the participants on how to test procedures before an actual disaster, and…

BCP.PMA

Plan, Measures & Arrangements: An organization defines plans for the continuity of services and products in the event of a disruption. Measures include the documented…

Get Started

About

Subscribe

Sign-up and receive the latest news

>

Subscribe

Sign-up and receive the latest news

>