From the course: Cyber Supply Chain Risk Management: Designing, Deploying, and Maintaining Secure Supply Chain Programs

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Mapping to NIST CSF to design controls

Mapping to NIST CSF to design controls

- Using frameworks like NIST Cybersecurity Framework is helpful as it gives guidance in terms of streamlining your requirements and also enabling common language between internal and external stakeholders. The reason why NIST CSF is preferred by organization is that it offers common language and a systematic approach to manage cyber risk, identifies areas where existing processes can be improved and places where new processes can be implemented. The framework is outcome-driven and does not mandate how those outcomes are achieved. NIST Cybersecurity Framework 2.0 has six functions, namely, govern, identify, protect, detect, respond, and recover, with categories and subcategories defined. Each function is divided into categories which are related cybersecurity outcomes that collectively comprise the function. The subcategories are not exhaustive, but they describe detailed outcomes that support each category. NIST CSF is broad and not all categories and subcategories are needed for your…

Contents