NIST CSF Series #14: Detect – Anomalies and Events
Function: Detect (DE) Category: Anomalies and Events (AE) “Anomalous activity is detected in a timely manner and the potential impact of events is understood.” DE.AE-1: …
Function: Detect (DE) Category: Anomalies and Events (AE) “Anomalous activity is detected in a timely manner and the potential impact of events is understood.” DE.AE-1: …
Function: Protect (PR) Category: Protective Technology (PT) “Technical security solutions are managed to ensure the security and resilience of systems and assets, consistent with related…
Function: Protect (PR) Category: Maintenance (MA) “Maintenance and repairs of industrial control and information system components is performed consistent with policies and procedures.” PR.MA-1: Maintenance…
Function: Protect (PR) Category: Information Protection Processes and Procedures (IP) “Security policies (that address purpose, scope, roles, responsibilities, management commitment, and coordination among organizational entities),…
Function: Protect (PR) Category: Information Protection Processes and Procedures (IP) “Security policies (that address purpose, scope, roles, responsibilities, management commitment, and coordination among organizational entities),…
Function: Protect (PR) Category: Data Security (DS) “Information and records (data) are managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and…
Function: Protect (PR) Category: Awareness and Training (AT) “The organization’s personnel and partners are provided cybersecurity awareness education and are adequately trained to perform their…
Function: Protect (PR) Category: Access Control (AC) “Access to assets and associated facilities is limited to authorized users, processes, or devices, and to authorized activities…
Function: Identify (ID) Category: Risk Management Strategy (RM) “The organization’s priorities, constraints, risk tolerances, and assumptions are established and used to support operational risk decisions.”…
Function: Identify (ID) Category: Risk Assessment (RA) “The organization understands the cybersecurity risk to organization operations (including mission, functions, image, or reputation), organizational assets, and…