Tech Kaizen

passion + usefulness = success .. change is the only constant in life

Search this Blog:

NIST Cybersecurity Framework (CSF)

The National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) is a voluntary set of cybersecurity standards and guidelines that can be adapted by organizations of all sizes and industries to improve their cybersecurity posture. It is designed to help organizations identify, assess, and manage cybersecurity risks.The framework was initially published in 2014 for critical infrastructure sectors but has since been widely adopted across various industries, including government and private enterprises globally. 

Key components of the NIST Cybersecurity Framework:

  • Identify: This phase involves identifying the organization's business processes, assets, and dependencies and assessing potential cybersecurity risks.
  • Detect: This phase involves implementing measures to detect cybersecurity incidents and anomalies.
  • Respond: This phase involves developing plans to respond to and recover from cybersecurity incidents.
  • Recover: This phase involves restoring normal operations after a cybersecurity incident and implementing measures to prevent future incidents.
  • Govern: This phase involves establishing governance and oversight processes to ensure that the cybersecurity program is effective and aligned with the organization's overall objectives.

NIST Cybersecurity Framework Examples:
    Here are some examples of how organizations can implement the NIST Cybersecurity Framework:

    1. Healthcare Organization:

  • Identify: Assess patient data and medical devices for vulnerabilities, identify critical business processes, and analyze potential threats like ransomware and data breaches.
  • Detect: Implement intrusion detection systems, network monitoring tools, and security information and event management (SIEM) solutions to detect anomalies and potential cyberattacks.
  • Respond: Develop incident response plans, conduct regular tabletop exercises, and establish relationships with law enforcement and cybersecurity experts for rapid response.
  • Recover: Create data backup and disaster recovery plans, test recovery procedures regularly, and implement measures to prevent future incidents, such as patching vulnerabilities and strengthening access controls.
  • Govern: Establish a cybersecurity governance committee, develop policies and procedures, and conduct regular risk assessments to ensure compliance with HIPAA and other regulations.

    2. Financial Institution:

  • Identify: Assess customer data, financial systems, and online banking platforms for vulnerabilities, identify critical business processes, and analyze potential threats like phishing attacks and fraud.
  • Detect: Implement intrusion detection systems, network monitoring tools, and security information and event management (SIEM) solutions to detect anomalies and potential cyberattacks.
  • Respond: Develop incident response plans, conduct regular tabletop exercises, and establish relationships with law enforcement and cybersecurity experts for rapid response.
  • Recover: Create data backup and disaster recovery plans, test recovery procedures regularly, and implement measures to prevent future incidents, such as patching vulnerabilities and strengthening access controls.
  • Govern: Establish a cybersecurity governance committee, develop policies and procedures, and conduct regular risk assessments to ensure compliance with regulations like PCI DSS and GLBA.

NIST Cybersecurity Framework (CSF) Tools:
    NIST Cybersecurity Framework (CSF) is a voluntary framework that provides a set of standards and guidelines for organizations to improve their cybersecurity posture.
While the CSF itself is not open-source, there are several open-source tools and resources that can be used to implement and manage it. Here are some examples of open-source implementations and resources for the NIST Cybersecurity Framework.

Open-source tools:

  • NIST CSF Mapper: A tool that helps organizations map their existing security controls to the NIST CSF.
  • NIST CSF Implementation Guide: An open-source guide that provides guidance on implementing the NIST CSF.
  • NIST CSF Maturity Model: A tool that helps organizations assess their cybersecurity maturity level against the NIST CSF.
  • NIST CSF Compliance Checker: A tool that helps organizations check their compliance with the NIST CSF.
  • OpenSCAP: A set of tools that can be used to assess and report on system security configurations against security standards, including the NIST CSF.


NIST 1.0 vs NIST 2.0

NIST 1.0

  •     Primarily focused on US critical infrastructure.  
  •     Limited emphasis on governance.
  •     Incorporated supply chain risk management but with less detail.
  •     Less flexible, with a more rigid structure.
  •     Limited references to other frameworks.
  •     Provided core guidance but limited additional resources.
  •     Primarily focused on activities and processes.

NIST 2.0

  •     Broadened scope to include organizations of all sizes and industries worldwide.  
  •     Introduced a dedicated "Govern" function to emphasize the importance of strong governance in cybersecurity.  
  •     Expanded guidance on supply chain risk management to address emerging threats.  
  •     More adaptable, allowing for customization to fit different organizational needs and maturity levels.  
  •     Incorporates references to other widely used compliance frameworks, promoting better alignment and integration.
  •     Offers a suite of resources, including quick-start guides, success stories, and implementation examples, to support organizations in adopting the framework.  
  •     Places a stronger emphasis on measuring cybersecurity outcomes and demonstrating effectiveness.

ref:

  • NIST Cybersecurity Framework: https://www.nist.gov/itl/smallbusinesscyber/nist-cybersecurity-framework-0
  • The NIST Cybersecurity Framework (CSF) v2.0: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf
  • NIST Cybersecurity Framework v1.1 Implementation Guide: https://www.nist.gov/cyberframework/background
  • Misc:
    • https://www.ftc.gov/business-guidance/small-businesses/cybersecurity/nist-framework

Labels: CYBERSECURITY, SOFTWARE SECURITY
Newer Post Older Post Home

The Verge - YOUTUBE

Loading...

Google - YOUTUBE

Loading...

Microsoft - YOUTUBE

Loading...

MIT OpenCourseWare - YOUTUBE

Loading...

FREE CODE CAMP - YOUTUBE

Loading...

NEET CODE - YOUTUBE

Loading...

GAURAV SEN INTERVIEWS - YOUTUBE

Loading...

Y Combinator Discussions

Loading...

SUCCESS IN TECH INTERVIEWS - YOUTUBE

Loading...

IGotAnOffer: Engineering YOUTUBE

Loading...

Tanay Pratap YOUTUBE

Loading...

Ashish Pratap Singh YOUTUBE

Loading...

Questpond YOUTUBE

Loading...

Kantan Coding YOUTUBE

Loading...

CYBER SECURITY - YOUTUBE

Loading...

CYBER SECURITY FUNDAMENTALS PROF MESSER - YOUTUBE

Loading...

DEEPLEARNING AI - YOUTUBE

Loading...

STANFORD UNIVERSITY - YOUTUBE

Loading...

NPTEL IISC BANGALORE - YOUTUBE

Loading...

NPTEL IIT MADRAS - YOUTUBE

Loading...

NPTEL HYDERABAD - YOUTUBE

Loading...

MIT News

Loading...

MIT News - Artificial intelligence

Loading...

The Berkeley Artificial Intelligence Research Blog

Loading...

Microsoft Research

Loading...

MachineLearningMastery.com

Loading...

Harward Business Review(HBR)

Loading...

Wharton Magazine

Loading...
My photo
Krishna Kishore Koney
View my complete profile
" It is not the strongest of the species that survives nor the most intelligent that survives, It is the one that is the most adaptable to change "

View krishna kishore koney's profile on LinkedIn

Monthly Blog Archives

  • ►  2025 (2)
    • ►  May (1)
    • ►  April (1)
  • ▼  2024 (18)
    • ►  December (1)
    • ►  October (2)
    • ▼  September (5)
      • Security Posture Overview
      • NIST Cybersecurity Framework (CSF)
      • First Principles Thinking
      • Design Systems: A Foundation for Consistency and E...
      • Atomic Design Pattern
    • ►  August (10)
  • ►  2022 (2)
    • ►  December (2)
  • ►  2021 (2)
    • ►  April (2)
  • ►  2020 (17)
    • ►  November (1)
    • ►  September (7)
    • ►  August (1)
    • ►  June (8)
  • ►  2019 (18)
    • ►  December (1)
    • ►  November (2)
    • ►  September (3)
    • ►  May (8)
    • ►  February (1)
    • ►  January (3)
  • ►  2018 (3)
    • ►  November (1)
    • ►  October (1)
    • ►  January (1)
  • ►  2017 (2)
    • ►  November (1)
    • ►  March (1)
  • ►  2016 (5)
    • ►  December (1)
    • ►  April (3)
    • ►  February (1)
  • ►  2015 (15)
    • ►  December (1)
    • ►  October (1)
    • ►  August (2)
    • ►  July (4)
    • ►  June (2)
    • ►  May (3)
    • ►  January (2)
  • ►  2014 (13)
    • ►  December (1)
    • ►  November (2)
    • ►  October (4)
    • ►  August (5)
    • ►  January (1)
  • ►  2013 (5)
    • ►  September (2)
    • ►  May (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2012 (19)
    • ►  November (1)
    • ►  October (2)
    • ►  September (1)
    • ►  July (1)
    • ►  June (6)
    • ►  May (1)
    • ►  April (2)
    • ►  February (3)
    • ►  January (2)
  • ►  2011 (20)
    • ►  December (5)
    • ►  August (2)
    • ►  June (6)
    • ►  May (4)
    • ►  April (2)
    • ►  January (1)
  • ►  2010 (41)
    • ►  December (2)
    • ►  November (1)
    • ►  September (5)
    • ►  August (2)
    • ►  July (1)
    • ►  June (1)
    • ►  May (8)
    • ►  April (2)
    • ►  March (3)
    • ►  February (5)
    • ►  January (11)
  • ►  2009 (113)
    • ►  December (2)
    • ►  November (5)
    • ►  October (11)
    • ►  September (1)
    • ►  August (14)
    • ►  July (5)
    • ►  June (10)
    • ►  May (4)
    • ►  April (7)
    • ►  March (11)
    • ►  February (15)
    • ►  January (28)
  • ►  2008 (61)
    • ►  December (7)
    • ►  September (6)
    • ►  August (1)
    • ►  July (17)
    • ►  June (6)
    • ►  May (24)
  • ►  2006 (7)
    • ►  October (7)

Blog Archives Categories

  • .NET DEVELOPMENT (38)
  • 5G (5)
  • AI (Artificial Intelligence) (9)
  • AI/ML (4)
  • ANDROID DEVELOPMENT (7)
  • BIG DATA ANALYTICS (6)
  • C PROGRAMMING (7)
  • C++ PROGRAMMING (24)
  • CAREER MANAGEMENT (6)
  • CHROME DEVELOPMENT (2)
  • CLOUD COMPUTING (45)
  • CODE REVIEWS (3)
  • CYBERSECURITY (12)
  • DATA SCIENCE (4)
  • DATABASE (14)
  • DESIGN PATTERNS (9)
  • DEVICE DRIVERS (5)
  • DOMAIN KNOWLEDGE (14)
  • EDGE COMPUTING (4)
  • EMBEDDED SYSTEMS (9)
  • ENTERPRISE ARCHITECTURE (10)
  • IMAGE PROCESSING (3)
  • INTERNET OF THINGS (2)
  • J2EE PROGRAMMING (10)
  • KERNEL DEVELOPMENT (6)
  • KUBERNETES (19)
  • LATEST TECHNOLOGY (18)
  • LINUX (9)
  • MAC OPERATING SYSTEM (2)
  • MOBILE APPLICATION DEVELOPMENT (14)
  • PORTING (4)
  • PYTHON PROGRAMMING (6)
  • RESEARCH AND DEVELOPMENT (1)
  • SCRIPTING LANGUAGES (8)
  • SERVICE ORIENTED ARCHITECTURE (SOA) (10)
  • SOFTWARE DESIGN (13)
  • SOFTWARE QUALITY (5)
  • SOFTWARE SECURITY (23)
  • SYSTEM and NETWORK ADMINISTRATION (3)
  • SYSTEM PROGRAMMING (4)
  • TECHNICAL MISCELLANEOUS (31)
  • TECHNOLOGY INTEGRATION (5)
  • TEST AUTOMATION (5)
  • UNIX OPERATING SYSTEM (4)
  • VC++ PROGRAMMING (44)
  • VIRTUALIZATION (8)
  • WEB PROGRAMMING (8)
  • WINDOWS OPERATING SYSTEM (13)
  • WIRELESS DEVELOPMENT (5)
  • XML (3)

Popular Posts

  • Observer Pattern - Push vs Pull Model
  • AI Agent vs AI Workflow
  • Microservices Architecture ..
  • SSCLI(Shared Source Common Language Infrastructure)

My Other Blogs

  • Career Management: Invest in Yourself
  • Color your Career
  • Attitude is everything(in Telugu language)
WINNING vs LOSING

Hanging on, persevering, WINNING
Letting go, giving up easily, LOSING

Accepting responsibility for your actions, WINNING
Always having an excuse for your actions, LOSING

Taking the initiative, WINNING
Waiting to be told what to do, LOSING

Knowing what you want and setting goals to achieve it, WINNING
Wishing for things, but taking no action, LOSING

Seeing the big picture, and setting your goals accordingly, WINNING
Seeing only where you are today, LOSING

Being determined, unwilling to give up WINNING
Gives up easily, LOSING

Having focus, staying on track, WINNING
Allowing minor distractions to side track them, LOSING

Having a positive attitude, WINNING
having a "poor me" attitude, LOSING

Adopt a WINNING attitude!

Total Pageviews

who am i

My photo
Krishna Kishore Koney

Blogging is about ideas, self-discovery, and growth. This is a small effort to grow outside my comfort zone.

Most important , A Special Thanks to my parents(Sri Ramachandra Rao & Srimathi Nagamani), my wife(Roja), my lovely daughter (Hansini) and son (Harshil) for their inspiration and continuous support in developing this Blog.

... "Things will never be the same again. An old dream is dead and a new one is being born, as a flower that pushes through the solid earth. A new vision is coming into being and a greater consciousness is being unfolded" ... from Jiddu Krishnamurti's Teachings.

Now on disclaimer :
1. Please note that my blog posts reflect my perception of the subject matter and do not reflect the perception of my Employer.

2. Most of the times the content of the blog post is aggregated from Internet articles and other blogs which inspired me. Due respect is given by mentioning the referenced URLs below each post.

Have a great time

My LinkedIn Profile
View my complete profile

Failure is not falling down, it is not getting up again. Success is the ability to go from failure to failure without losing your enthusiasm.

Where there's a Will, there's a Way. Keep on doing what fear you, that is the quickest and surest way to to conquer it.

Vision is the art of seeing what is invisible to others. For success, attitude is equally as important as ability.

Favourite RSS Syndications ...

Google Developers Blog

Loading...

Blogs@Google

Loading...

Berklee Blogs » Technology

Loading...

Martin Fowler's Bliki

Loading...

TED Blog

Loading...

TEDTalks (video)

Loading...

Psychology Today Blogs

Loading...

Aryaka Insights

Loading...

The Pragmatic Engineer

Loading...

Stanford Online

Loading...

MIT Corporate Relations

Loading...

AI at Wharton

Loading...

OpenAI

Loading...

AI Workshop

Loading...

Hugging Face - Blog

Loading...

BYTE BYTE GO - YOUTBUE

Loading...

Google Cloud Tech

Loading...

3Blue1Brown

Loading...

Bloomberg Originals

Loading...

Dwarkesh Patel Youtube Channel

Loading...

Reid Hoffman

Loading...

Aswath Damodaran

Loading...