From the course: Cyber Supply Chain Risk Management: Designing, Deploying, and Maintaining Secure Supply Chain Programs
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Mapping to NIST CSF to design controls
From the course: Cyber Supply Chain Risk Management: Designing, Deploying, and Maintaining Secure Supply Chain Programs
Mapping to NIST CSF to design controls
- Using frameworks like NIST Cybersecurity Framework is helpful as it gives guidance in terms of streamlining your requirements and also enabling common language between internal and external stakeholders. The reason why NIST CSF is preferred by organization is that it offers common language and a systematic approach to manage cyber risk, identifies areas where existing processes can be improved and places where new processes can be implemented. The framework is outcome-driven and does not mandate how those outcomes are achieved. NIST Cybersecurity Framework 2.0 has six functions, namely, govern, identify, protect, detect, respond, and recover, with categories and subcategories defined. Each function is divided into categories which are related cybersecurity outcomes that collectively comprise the function. The subcategories are not exhaustive, but they describe detailed outcomes that support each category. NIST CSF is broad and not all categories and subcategories are needed for your…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.