Your Top Five Cyber Risks in Five Clicks with the Free Cyber Risk Analysis

FREE RISK ANALYSIS
Request Demo

Adopt the NIST Cybersecurity Framework - Understand the CSF in 10 Minutes or Less

Your Ultimate Guide to Simplified NIST CSF Adoption

 

Looking into the NIST Framework?

The Ultimate NIST Cybersecurity Framework Guide

This Guide will cover everything that you need to know to start and improve your NIST Framework-based program.

The Presidential Executive Order on Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure is motivating action from not only U.S. federal agencies, but also from U.S. businesses. Recent cyberattacks and breaches have resulted in heightened private sector awareness, which is driving businesses to reevaluate how they can reduce enterprise risk. 

Frameworks create a common language for cyber that unifies the conversation around enterprise risk and security.

Some organizations are even requiring their vendors to adopt frameworks as they scale. Likewise, financial and healthcare companies are also realizing the importance of securing their data following this set of best practices. Europe, too, clearly sees the value of the framework as they look to it while finalizing the NIS Directive.

When CyberSaint's Founder George Wrenn left his position as a global CSO to start CyberSaint, he set out to accomplish one goal: Realizing that the frameworks' nature—by far the most comprehensive approach—implicitly makes it the most complex. As a result, there needed to be a clear path to implement this framework at scale - enter CyberSaint.

 

Our first conclusion: cybersecurity must be managed proactively and not reactively. 
Our second conclusion: Companies have to be strategic when building their programs. 

 

As business leaders, there is a substantial responsibility to execute, keep our companies protected. and effectively relay our progress back to our peers. This pressure can be crushing - we see what can go wrong in revenue lost and reputations damaged, sometimes beyond repair. A proactive information security professional will certainly stay informed and advocate for increased resilience via a standards-based approach.

As noted above, the NIST Cybersecurity Framework is by far the most comprehensive framework, but it is also the most complex to navigate.

CSO Online Magazine: How Can My Program Benefit From a Standards-Based Approach?

 

Why The NIST Cybersecurity Framework?

The National Institute of Standards and Technology’s (NIST) Cybersecurity Framework, formally titled The Framework for Improving Critical Infrastructure Cybersecurity, can overwhelm even experienced security professionals with its complexity. Yet, increasingly, it is recognized as a national gold standard. Its popularity and support are apparent: 61 percent of U.S. businesses are actively working to adopt the framework as of 2017, and that number continues to grow.

With the release of Version 1.1 of the Framework, it is even more robust, and still flexible. With the ability to be adopted by organizations of any size voluntarily, its rapid adoption across industries proves its strength as a foundation for any cybersecurity program.

The Under Secretary of Commerce for NIST, Walter Copan, noted

"From the very beginning, the Cybersecurity Framework has been a collaborative effort involving stakeholders from government, industry, and academia. The impact of their work is evident in the widespread adoption of the framework by organizations across the United States, as well as internationally."

According to NIST,

"This second draft update aims to clarify, refine, and enhance the Cybersecurity Framework, amplifying its value and making it easier to use. This latest draft reflects comments received to date, including those from a public review process launched in January 2017 and a workshop in May 2017."

 

"The voluntary NIST Cybersecurity Framework should be every company's first line of defense. Adopting version 1.1 is a must do for all CEOs."

- U.S. Secretary of Commerce Wilbur Ross

 

Small and mid-sized businesses need to be aware that not only large enterprises are targets, and the Framework may be the most robust method to implement best practices.

The U.S. National Cybersecurity Alliance says that the cost of cleaning up after an attack for a small to mid-sized business can range from $690,000 to over $1 million. The NIST Interagency Report (NISTIR) 7621 entitled “Small Business Information Security: The Fundamentals” states “Because small businesses typically don’t have the resources to invest in information security the way larger businesses can, many cybersecurity criminals view them as soft targets.” The report also notes that some hackers are attacking not simply for profit, but out of revenge or the thrill of causing havoc. To a small business, a strong cybersecurity program is often seen as a task too difficult because of the resource requirements.

Nonetheless, the benefits greatly exceed the cost, as adopting a strong program and creating a business process will help gain and retain customers especially in light of publicized cybersecurity attacks, as customers expect sensitive information to be protected from compromise. The NIST Framework is truly applicable to any organization regardless of size as a jumping-off point to establish their cybersecurity posture. It turns in traditional, more audit-based policies for a risk-based approach to cybersecurity management. It’s a guideline for businesses to update their risk management approach, as many U.S. organizations across sizes and industries already leverage some type of security framework. Businesses of all sizes and industries are seeing the importance of building a robust cybersecurity program and are seeking more proactive strategies. Its five core functions: identify, protect, detect, respond, and recover, are a blueprint to mitigate cybersecurity risk. Implemented properly, an organization will have the most powerful set of tools and procedures in place. 

 

In a sense, the Framework is a dynamic Deming cycle—continuous, logical, and always learning.

 

Your Framework Profile

A Profile enables an organization to establish a roadmap for reducing cybersecurity risk that is well-aligned with organizational and sector goals, considers legal/regulatory requirements and industry best practices, and reflects risk management priorities.

Given the complexity of many organizations, they may choose to have multiple profiles, aligned with particular components and recognizing their individual needs. Framework Profiles can be used to describe the current state or the desired target state of specific cybersecurity activities.

Your Current and Target Profile

The Current Profile indicates the cybersecurity outcomes that are currently being achieved. The Target Profile indicates the outcomes needed to achieve the desired cybersecurity risk management goals.

It's important here to loop in goals from all business segments both business and security. That way, you'll have a more well-rounded goal set that aligns with your business's vision for the future.

The Value of Profiles

Profiles support business/mission requirements within your organization to all constituents, and also aid in the communication of risk between organizations. If you have a difficult time translating your current and target-risk and cybersecurity strength to your partners, vendors, and the like, creating these profiles will be monumental in boosting communication between all parties involved. The better the communication is within and around your organization, the more progress you'll make in building a robust program or even creating a faster response plan.

If you're interested in baselining your organization against NIST Cybersecurity Framework best practices in hours, check out CyberStrong. You'll be able to see areas for improvement and gaps across all five NIST functions, and you'll have a plan of action on how to close those gaps within your organization.

The 5 NIST Framework Functions Explained

Identify

NIST defines the identify function as calling on the need to "develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities.". In this function, as a cybersecurity stakeholder, you can work on laying a foundation in your organization for effective use of the Framework moving forward. The focus of identify is on the business and how it relates to cybersecurity risk, especially taking into account the resources at hand. Here are some of the outcome Categories associated with this function:

  • Asset Management
  • Business Environment
  • Governance
  • Risk Assessment
  • Risk Management Strategy

The importance of the identify function is clear: it lays the groundwork for cybersecurity-related actions that your organization will take moving forward. Identifying what exists, what risks are associated with those environments, and how that relates in context with your business goals are crucial to having success with the Framework. 

Successful implementation of the identify function could result in multiple outcomes, for example:

  • Defining all assets and environments
  • Defining the current and target states of controls
  • Making a plan to remediate those gaps
  • Prioritizing how to approach mitigation in a business context
  • Prioritizing the needs of all stakeholders and business leaders involved
  • Defining how to communicate on cybersecurity issues with all related stakeholders

Organizations have to evolve in their cybersecurity practices and implement the vital safeguards to contain and limit the impacts of potential cybersecurity incidents. All digital and physical assets must be accounted for, and roles must be defined with clear communication workflows around incidents and risk. The policies and procedures that you implement will provide the stability needed for your cybersecurity program as it works through all five functions and matures.

 

Protect

NIST says that the framework functions "aid an organization in expressing its management of cybersecurity risk by organizing information, enabling risk management decisions, addressing threats, and improving by learning from previous activities". 

The protect function is important because its purpose is to "develop and implement appropriate safeguards to ensure delivery of critical infrastructure services. The Protect Function supports the ability to limit or contain the impact of a potential cybersecurity event. Examples of outcome Categories within this Function include: Identity Management and Access Control; Awareness and Training; Data Security; Information Protection Processes and Procedures; Maintenance; and Protective Technology" according to NIST

Protect covers these categories:

  • Access Control: validating identities and access to different systems, facilities, etc.
  • Awareness and Training: Giving employees and others the ability to be part of your cybersecurity plan with education and training.
  • Data Security: Manage your data according to company standards in order to mitigate cybersecurity risks, and protect its Availability, Integrity, and Confidentiality proactively.
  • Information Protection Processes & Procedures: Put in place the policies, processes, and procedures that you need to manage the protection of your assets.
  • Maintenance: Continuously repair your Information System components and mitigate them
  • Protective Technology: Deploy the security solutions needed to protect them in line with company policies

Some examples of ways to attain these requirements are:

  • Preventing data breaches by using 2FA, MFA, and controlling access to all of your environments and data.
  • Make sure your people are properly trained on how to handle your company's critical data and their various levels of access. Prevent accidents as much as possible.
  • Make sure your data is encrypted, in motion, and protected in all ways possible

Organizations must evolve as breaches are becoming all the more common. By focusing on the protect function, you can put in place the policies and procedures to lay a strong foundation for your cybersecurity program as it matures in all five functions.

 

Detect

The detect function requires that you develop and implement the appropriate activities to identify the occurrence of a cybersecurity event.

"The detect function enables timely discovery of cybersecurity events. Examples of outcome Categories within this Function include: Anomalies and Events; Security Continuous Monitoring; and Detection Processes."

  • Anomalies & Events: Your program will detect unusual activity as soon as possible, and the impact of events is understood by everyone on your team and beyond.
  • Security & Continuous Monitoring: You're monitoring your information system and environments at specified intervals to identify cybersecurity events in your organization.
  • Detection Processes: Procedures and processes for detection are put in place and tested in order to ensure timely and broad awareness of cybersecurity events.

The detect function is a critical step to a robust cybersecurity program - the faster you can detect a cybersecurity event, the faster you can mitigate the effects of it. Examples of how to accomplish steps towards a thorough detect function are as follows:

  • Anomalies & Events: Prepare your team to have the knowledge to collect and analyze data from multiple points to detect an event.
  • Security & Continuous Monitoring: Make your team able to monitor your assets 27/7 or consider involving an MSS to supplement.
  • Detection Processes: Attempt to know about a breach as soon as possible and follow disclosure requirements as needed. Your program should be able to detect inappropriate access to your data as soon as possible.

Clearly, the detect function is one of the most important, as detecting a breach or event can be life or death for your business. There is no doubt that following these best practices and implementing these solutions will help you scale your program and mitigate cybersecurity risk. In our next blog post, we will explore the respond function.

 

Respond

NIST defines respond as "Develop and implement appropriate activities to take action regarding a detected cybersecurity incident".

"The Respond Function supports the ability to contain the impact of a potential cybersecurity incident. Examples of outcome Categories within this Function include: Response Planning; Communications; Analysis; Mitigation; and Improvements".

Here are the parts to the respond function and their importance:

  • Response Planning: Response processes and procedures are executed and maintained, to ensure timely response to detected cybersecurity events.
  • Analysis: Analysis is conducted to ensure adequate response and support recovery activities.
  • Mitigation: Activities are performed to prevent the expansion of an event, mitigate its effects, and eradicate the incident.
  • Communications: Response activities are coordinated with internal and external stakeholders, as appropriate, to include external support from law enforcement agencies.
  • Improvements: Organizational response activities are improved by incorporating lessons learned from current and previous detection/response activities.

When breaches occur in companies, an incident response plan is critical to managing the immediate aftermath. Surprisingly, lots of organizations don't have an incident response plan or just haven't tested the plan that they have in place.

  • Your Response Plan: Make sure that you're reporting breaches if they occur.
  • Mitigate: Make sure you have a plan to mitigate any event that could occur, in-house and with third parties.
  • Analyze: Go over your plan with experts inside and outside of your team.

 

Recover

According to NIST, the recover function is defined as the need to "develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity security event.

"The Recover Function supports timely recovery to normal operations to reduce the impact from a cybersecurity event. Examples of outcomes for this function include: Recovery Planning, Improvements, and Communications."

Recover includes these areas:

  • Recovery Planning: Recovery procedures are tested, executed, and maintained so that your program can mitigate the effects of an event sooner rather than later
  • Improvement: Recovery planning and processes are improved when events happen and areas for improvement are identified and solutions put together
  • Communication: Coordinate internally and externally for greater organization, thorough planning, and execution

The recover function is important not only in the eyes of your business or organization in recovering from an attack, but also in the eyes of your customers or market. Swift recovery handled with grace and tactfulness will allow you to end up in a much stronger position internally and externally than you would otherwise.

 

Prioritizing these focus areas within recover will ensure that your organization has a recovery plan that is up to date and matches your organization's goals and objectives.

 

Simplify NIST Framework Adoption in 5 Steps

There’s little doubt that the NIST CSF is effective, but it’s also a complex framework that needs to be tailored to meet an organization’s risk reduction goals. When Dimensional Research surveyed 300 IT and security professionals in the US, it found that 64% of respondents using the NIST CSF reported that they were not using all the recommended controls, just some of them.

Also, 83% of organizations with plans to implement in the coming year reported an intention to adopt some, rather than all, the CSF controls. Selective adoption can yield results if done properly. This can be a great starting point for organizations with limited resources. What’s required is a way to reduce the complexity and make the NIST CSF just a little more digestible for your organization.

Below are some key concepts that can both simplify and accelerate your NIST CSF program.

Step #1 – Align NIST Program with Business Objectives

Map your objectives to the NIST control families. For example, if your organization requires “availability” of systems as the top priority, then starting with “Contingency Planning” (CP) controls is going to better align your program with your business objectives.

Step #2 –  Focus on Foundational “Primary Controls” First
Start with a subset of the control families selected and limit your initial custom framework control list to the vital “Primary Controls.” This will save “Control Enhancements” for later when your NIST CSF program is more mature. Control enhancements include details beyond the base control, such as frequency of testing, automation, and extensive documentation of the process surrounding the control. While important, these control enhancements only matter if the base control is already in place.  

Step #3 – Get the Low-Hanging Fruit by Implementing NIST SP 800-171
Select your base framework controls using an existing framework profile or selection such as the NIST SP 800-171, which covers more than 80% of the full NIST CSF but requires approximately 20% of the effort, significantly reducing the number of controls that need to be adopted. Similar to the 80/20 principle, this approach can greatly improve security with a fraction of the effort required to implement the full NIST CSF.

Step #4 – Balance the Five Framework Functions Evenly
Distribute your effort equally across all five phases of the NIST CSF. Creating a balanced program.
If we follow the natural phases embodied with the NIST CSF, we can break the various stages down into smaller pieces that are easier to digest and implement.  

  • Identify the risks to your systems, data, and other assets. You must be able to effectively prioritize your focus, fully understand governance, and carry out accurate risk assessments.
  • Protect your critical infrastructure by limiting access to assets, training employees, securing and validating data integrity, implementing protective procedures and systems, and scheduling regular maintenance.
  • Detect cybersecurity events that could be attacked. This means flagging anomalies, monitoring traffic, and modeling regular noise so you can accurately identify anything suspicious. 
  • Respond when an event is detected. You need a clear response plan with a communication protocol and a fixed timeline. Responses should be analyzed, mitigation efforts tested, and all lessons learned used to make structural process improvements. 
  • Recover your vital services and capabilities after an attack as quickly as possible, so the impact on your organization is reduced. Solid recovery plans should be bolstered by a constantly evolving approach informed by events and strong communication links with relevant internal and external parties. 
  • If you’re stronger in one phase, then focus your efforts on one of your weaker phases. Do this until your program becomes balanced across the five framework phases. 

Suggestion #5 – Leverage the Entire Organization

Make NIST CSF adoption a team sport. Engage business units and other resources across your organization. Many of the framework’s controls can be assigned to business functions such as HR, finance, or IT. The security team doesn’t have to own every control.

Infosecurity Magazine: How to Simplify NIST Framework Adoption

Automate NIST Framework Adoption

See CyberStrong in Action

Schedule a demo