Request Demo

NIST Cybersecurity Framework

Breaking Down the NIST Cybersecurity Framework: Respond


In this blog, we'll be disucssing the second-to-last framework function of the NIST Cybersecurity Framework: Respond. In the last three articles, we discussed the first three framework functions: Identify, Protect, and Detect in our Breaking Down the NIST Cybersecurity Framework series.

[Webinar with Cybersecurity Influencers: The Benefits of Frameworks and Standards HERE]

NIST defines respond as "Develop and implement appropriate activities to take action regarding a detected cybersecurity incident".

"The Respond Function supports the ability to contain the impact of a potential cybersecurity incident. Examples of outcome Categories within this Function include: Response Planning; Communications; Analysis; Mitigation; and Improvements".

Here are the parts to the respond function and their importance:

  • Response Planning: Response processes and procedures are executed and maintained, to ensure timely response to detected cybersecurity events.
  • Analysis: Analysis is conducted to ensure adequate response and support recovery activities.
  • Mitigation: Activities are performed to prevent expansion of an event, mitigate its effects, and eradicate the incident.
  • Communications: Response activities are coordinated with internal and external stakeholders, as appropriate, to include external support from law enforcement agencies.
  • Improvements: Organizational response activities are improved by incorporating lessons learned from current and previous detection/response activities.

When breaches occur in companies, an incident response plan is critical to manage the immediate aftermath. Surprisingly, lots of organizations don't have an incident response plan, or just havent tested the plan that they have in place.

  • Your Response Plan: Make sure that you're reporting breaches if they occur.
  • Mitigate: Make sure you have a plan to mitigte any event that could occur, in house and with third parties.
  • Analyze: Go over your plan with experts inside and outside of your team.

You may also like

Marriott Breach Points To Issue In ...
on December 13, 2018

On Friday, November 30th, Marriott International announced what could be one of the largest data breaches in history. Over 500 million guests’ personal data, ranging from names to ...

The Key To Turning Your Security ...
on December 13, 2018

It is often said, “if you don’t want something noticed, don’t talk about it”. This is true of a bad GPA, a stain on a carpet, or a project you might have missed a deadline for. ...

Solving The Cybersecurity Skills ...
on December 6, 2018

It is no shock to those in the cyber community that cybersecurity has become a board-level issue for many enterprises. A PwC survey showed a 20% increase in CEO’s concern over ...

The Next Wave Of Innovation For ...
on December 12, 2018

   The internet of things (IoT) is a force transforming the modern enterprise. Anything from robotics in warehouses to smart manufacturing to data center monitoring, the ...

The Corporate Compliance and ...
on December 4, 2018

Corporate compliance and oversight (CCO) is one of the main pillars to a strong integrated risk management (IRM) program and solution. Today, compliance leaders are faced with a ...

Securing the AI powered enterprise
on December 5, 2018

Machine learning and artificial intelligence (AI) has become the competitive differentiator of our time. By 2020, Gartner predicts that almost all new products to enter the market ...