From the course: NIST Cybersecurity Framework (CSF) 2.0 Primer: From Fundamentals to Implementation by Pearson

Unlock this course with a free trial

Join today to access over 25,200 courses taught by industry experts.

Respond (RS) function

Respond (RS) function

Once we've detected a credible cybersecurity incident, then we need to respond to it. We can't just like roll over and go to bed or anything like that. So that is the topic of this sub-lesson. We are going to talk about the respond function, which comprises four individual categories and naturally we'll go over them in turn. So the respond function as a whole is pretty easy to describe. Actions regarding a detected cybersecurity incident are taken. So we actually are going to do something as opposed to pretending it isn't happening, which is never a great strategy as it turns out. So let's go through these categories individually. First there's incident management. And the definition is almost kind of silly. to detected incidents, cybersecurity incidents are managed. So we have a process in place. It's not totally chaos and ad hoc. There is a process in place, then typically that would involve like validation of the incidents, just ensuring that they are incidents, triaging them, so…

Contents