From the course: NIST Cybersecurity Framework (CSF) 2.0 Primer: From Fundamentals to Implementation by Pearson

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

The Identify (ID) function

The Identify (ID) function

The next function on the list is identify, and this is all about identifying assets, the risks that are associated with said assets, and then any improvements that can be made. So it's kind of like what's going on, like actually understanding what's going on with anything of value in our company. So going through it really quickly, there's only three categories, and the first one is assets, asset management specifically, and an asset is just anything of value. It could be hardware, software, real estate, reputation, employees, and the list goes on from there. Just anything that has value to the organization is an asset. So we need to manage these assets so that, for instance, computers don't disappear, or other assets aren't damaged or improperly prioritized with risk management. So we need to identify assets first, just like what are our assets, and track them, implement some sort of asset tracking or inventorying system, and then do the same for services, by the way. services we…

Contents