<img src="https://ws.zoominfo.com/pixel/4CagHYMZMRWAjWFEK36G" width="1" height="1" style="display: none;">
Request Demo

NIST Cybersecurity Framework, implement

How to Implement the NIST Cybersecurity Framework

down-arrow

The National Institutes of Standard and Technology’s Framework for Improving Critical Infrastructure Cybersecurity - later dubbed the NIST Cybersecurity Framework (CSF) - is regarded as the gold-standard framework profile on which to build your cybersecurity program. Designed to facilitate conversations around cybersecurity risk management between cybersecurity professionals and stakeholders across both public and private-sector organizations, the NIST CSF, when coupled with the NIST Risk Management Framework (RMF), is a powerful tool. The RMF is a process-based framework practically applied using multiple more directly practical special publications from NIST and SP 800-30 is one of them. While the NIST CSF is the gold standard for cybersecurity management, being the most comprehensive and flexible, it is also one of the most challenging to implement. In his most recent webinar, CyberSaint Chief Product Officer Padraic O’Reilly discusses the connections between the CSF, RMF, and new Privacy Framework - on our official website. Here we’ll dive into how to use the RMF, SP 800-30, and steps to implement this cyber security framework.

What is NIST SP 800-30

According to NIST: The purpose of Special Publication 800-30 is to provide guidance for conducting risk assessments of federal information systems and organizations…

SP 800-30 gives risk management teams the ability to examine risk through the lenses necessary to relay that risk back to business leaders: threat type, business impact, and financial impact. Relaying these identified risks in this format helps bridge the gap between cybersecurity events and business leaders - as information security becomes an increasing concern at the CEO and Board level, using the same terminology is paramount. SP 800-30 helps technical leaders put cyber risks into a business context.

Using a NIST Risk Assessment to Implement the NIST Cybersecurity Framework

The NIST RMF is predicated on actively conducting assessments for risk-informed control implementation which makes SP 800-30 so critical to both NIST’s framework for risk management as well as cybersecurity management. The CSF is driven by outcomes and maps onto specific security controls - overall, though for strategic planning, the NIST CSF needs a risk assessment to inform where to begin. While O'Reilly sees any framework for risk quantification as a step in the right direction (from a three-by-three matrix through to 800-30 and the FAIR model) he believes that it comes down to how much value the outcomes are to the other members of your organization.

The NIST CSF relies on three main tenets of the Framework for implementation: Profiles, Implementation Tiers, and implementing the Framework Core functions (Identify, Protect, Detect, Respond, Recover). Starting with a risk assessment allows your organization to baseline and integrate that into a baseline CSF Profile. From there, determining your implementation tier level (current and desired) helps contextualize your organization’s current posture further. Finally, the Framework Core will guide where you need to invest resources based on gaps in your security program and perform continuous monitoring. 

A NIST SP 800-30 risk assessment specifically is of value since it rolls up well into the CSF given that they were developed by the same organization. While the CSF is flexible enough to use any risk assessment framework, O'Reilly recommends SP 800-30 for established infosec programs and uses a combination of 800-30 and the FAIR model in the CyberStrong platform.

Tools for Conducting An SP 800-30 Risk Assessment

Implementing both the NIST RMF and CSF relies on a baseline security risk assessment - both frameworks are designed to be as valuable as fast as possible. Baselining with a risk assessment informs where organizations should start when implementing both the NIST CSF as well as the RMF. Although, This integrated approach can be stifled by the tools organizations use to support their teams - in short, using spreadsheets with these two gold standards is insufficient. Integrated risk management tools like the CyberStrong platform help organizations integrate the risk and security assessments into one platform - helping security leaders understand how these two pieces fit together.

For more information on how to implement the NIST CSF, contact us

You may also like

April Product Update
on May 3, 2022

Teamwork makes the dream work! Teamwork makes the dream work - an annoyingly accurate cliche we’ve repeatedly heard over the years from sports fields to corporate offices. It’s a ...

Watch The CyberStrong Platform ...
on April 27, 2022

With cyber-attacks on businesses at an all-time high, it’s more crucial than ever to keep an eye out for potential cyber risks. These risks pose an even bigger threat when ...

Alison Furneaux
January / February Product Update
on March 7, 2022

New year, new features! Each year brings a new list of new year’s resolutions - you know, that list of fake promises you make to yourself, like giving up chocolate, exercising ...

Kyndall Elliott
The Complete Guide to Your ...
on March 4, 2022

The incident response framework by the National Institute of Standards and Technology (NIST) is an impactful beginning for organizations looking to optimize their incident plan ...

Kyndall Elliott
All You Need to Know About NIST ...
on March 3, 2022

Businesses depend on protecting confidential information to establish a reputation of dependability in the market and build trusting relationships with their customers and ...

How Cyber and IT Risk ...
on March 10, 2022

Cybercrime has reached new heights over the last five years, especially during the COVID-19 pandemic. This is made evident by the costly security breaches in big corporations that ...