From the course: Cybersecurity Foundations

Understanding the NIST Cybersecurity Framework

From the course: Cybersecurity Foundations

Understanding the NIST Cybersecurity Framework

- [Instructor] The inclusion of cyberspace, International critical infrastructures was formally recognized at the third Global Conference on cyberspace, held in Seoul in 2013. With the publication of the Seoul Framework for a Commitment to an Open and Secure Cyberspace. It states, "The global and open nature of the internet is a driving force in accelerating progress towards development. Governments, business organizations, and individual owners and users of cyberspace must assume responsibility for and take steps to enhance the security of their information technologies." In response to this, in 2014, the US National Institute of Standards and Technology issued the framework for improving critical infrastructure cybersecurity. In 2024, the NIST CSF version 2 was issued. This framework has now become the defacto standard for cybersecurity. Let's take a look at it. The NIST Cybersecurity Framework is an action oriented approach to security and consists of three elements. The framework core, the framework profile, and the framework implementation tiers. The framework core provides a set of activities to achieve cybersecurity, described in the six areas of govern, identify, protect, detect, respond, and recover. Each of these activities is decomposed into a total of 22 categories of security activities. For example, we can see that the detect group decomposes into the two categories of continuous monitoring and adverse event analysis. Going deeper, we can see that each of the categories is further decomposed into a set of controls. For example, the technology infrastructure resilience category is broken down into four subcategories, network and environment protection, environmental protection, resilience, and capacity management. Each of these subcategories is referenced to the relevant NIST, ISO and COBIT standards. The NIST Cybersecurity framework doesn't introduce its own set of controls. It provides a higher level framework, which can be used to develop a contemporary cybersecurity profile for an organization, but it relies on existing control frameworks for its implementation. COBIT, ISA, or otherwise known as IEC 62443. ISO 27000 and NIST, SP 800-53

Contents