0% found this document useful (0 votes)
49 views11 pages

CSF 2

Contine todas las fases, categorías y subcategorías (controles), para su definición e implementación.

Uploaded by

ricjavramirez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views11 pages

CSF 2

Contine todas las fases, categorías y subcategorías (controles), para su definición e implementación.

Uploaded by

ricjavramirez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 11

NIST Cybersecurity Framework

Title (CSF)
The 2.0Cybersecurity
NIST ReferenceFramework
Tool
Read Me (CSF)is 2.0
This a download from the CSF 2.0 Reference Tool, which assists users in exploring the CSF 2.0 Core. This export is a user generated version of the Core
Change Log Final
The NIST Cybersecurity Framework 2.0 www.nist.gov/cyberframework

Function Category Subcategory


GOVERN (GV): The organization's
cybersecurity risk management Organizational Context (GV.OC): The
circumstances - mission, stakeholder GV.OC-01: The organizational mission is
understood and informs
GV.OC-02: Internal cybersecurity
and external risk
stakeholders
are understood,
GV.OC-03: Legal,and their needs
regulatory, and and
contractual
requirements regarding cybersecurity - including
GV.OC-04: Critical objectives, capabilities, and
services that stakeholders depend on or expect
GV.OC-05: Outcomes, capabilities, and services
Risk Management Strategy (GV.RM): The that the organization depends on are
organization's priorities, constraints, risk GV.RM-01: Risk management objectives are
established and appetite
GV.RM-02: Risk agreed toand
by organizational
risk tolerance
statements
GV.RM-03: Cybersecurity risk management and
are established, communicated,
activities
GV.RM-04: and outcomes
Strategic are included
direction in
that describes
appropriate risk response
GV.RM-05: Lines options is across
of communication established
the
organization are established for
GV.RM-06: A standardized method for cybersecurity
calculating, documenting,
GV.RM-07: Strategic categorizing,
opportunities (i.e.,and
positive
Roles, Responsibilities, and Authorities risks) are characterized and are included in
(GV.RR): Cybersecurity roles, GV.RR-01: Organizational leadership is
responsible and accountable
GV.RR-02: Roles, for cybersecurity
responsibilities, and authorities
related to cybersecurity risk management
GV.RR-03: Adequate resources are allocated are
commensurate with the cybersecurity risk
GV.RR-04: Cybersecurity is included in human
Policy (GV.PO): Organizational resources practices
cybersecurity policy is established, GV.PO-01: Policy for managing cybersecurity
risks is established
GV.PO-02: based
Policy for on organizational
managing cybersecurity
Oversight (GV.OV): Results of organization- risks is reviewed, updated, communicated, and
wide cybersecurity risk management GV.OV-01: Cybersecurity risk management
strategy
GV.OV-02: outcomes are reviewed
The cybersecurity riskto inform and
management
strategy
GV.OV-03: is reviewed and adjusted
Organizational to ensure
cybersecurity risk
management performance is evaluated and
CSF 2.0 Page 2 of 11
Function Category Subcategory
Cybersecurity Supply Chain Risk
Management (GV.SC): Cyber supply chain GV.SC-01: A cybersecurity supply chain risk
management program, strategy,
GV.SC-02: Cybersecurity roles andobjectives,
responsibilities for suppliers,
GV.SC-03: Cybersecurity customers,
supply chain riskand
management is integrated
GV.SC-04: Suppliers are knowninto and
cybersecurity
prioritized by
criticality
GV.SC-05: Requirements to address
cybersecurity risks inand
GV.SC-06: Planning supply
due chains areare
diligence
performed
GV.SC-07: The to reduce risks before
risks posed entering
by a supplier, into
their
products
GV.SC-08:and services,
Relevant and other
suppliers andthird
otherparties
third
parties are included in incident planning,
GV.SC-09: Supply chain security practices are
integrated into cybersecurity
GV.SC-10: Cybersecurity and
supply enterprise
chain risk risk
GOVERN (GV) management plans include provisions for
IDENTIFY (ID): The organization's
current cybersecurity risks are Asset Management (ID.AM): Assets (e.g.,
data, hardware, software, systems, ID.AM-01: Inventories of hardware managed by
the organization
ID.AM-02: are maintained
Inventories of software, services, and
systems managed by
ID.AM-03: Representations the organization are
of the organization's
authorized network communication
ID.AM-04: Inventories of services provided and internal
by
suppliers are maintained
ID.AM-05: Assets are prioritized based on
classification, criticality,ofresources,
ID.AM-07: Inventories data and and impact
corresponding
ID.AM-08: Systems,metadata for designated
hardware, software,data
Risk Assessment (ID.RA): The cybersecurity services, and data are managed throughout their
risk to the organization, assets, and ID.RA-01: Vulnerabilities in assets are identified,
validated, and recorded
ID.RA-02: Cyber threat intelligence is received
from
ID.RA-03: Internalsharing
information forumsthreats
and external and sources
to the
organization are identified and recorded
ID.RA-04: Potential impacts and likelihoods of
threats
ID.RA-05:exploiting
Threats,vulnerabilities
vulnerabilities,are identified
likelihoods,
and impacts
ID.RA-06: are
Risk used to understand
responses are chosen,inherent
prioritized,
planned, tracked, and communicated
ID.RA-07: Changes and exceptions are managed,
assessed
ID.RA-08:for risk impact,
Processes recorded,analyzing,
for receiving, and tracked
and
responding to vulnerability disclosures
ID.RA-09: The authenticity and integrity of are
hardware and software
ID.RA-10: Critical areare
suppliers assessed prior
assessed to to
prior
Improvement (ID.IM): Improvements to acquisition
organizational cybersecurity risk
CSF 2.0 Page 3 of 11
Function Category Subcategory
ID.IM-01: Improvements are identified from
evaluations
ID.IM-02: Improvements are identified from
security
ID.IM-03:tests and exercises,
Improvements areincluding
identifiedthose
from
execution of operational processes, procedures,
ID.IM-04: Incident response plans and other
IDENTIFY (ID) cybersecurity plans that affect operations are
PROTECT (PR): Safeguards to manage
the organization's cybersecurity risks Identity Management, Authentication, and
Access Control (PR.AA): Access to physical PR.AA-01: Identities and credentials for
authorized users, services,
PR.AA-02: Identities and hardware
are proofed and boundareto
credentials based on the context of
PR.AA-03: Users, services, and hardware are interactions
authenticated
PR.AA-04: Identity assertions are protected,
conveyed,
PR.AA-05: and verified
Access permissions, entitlements, and
authorizations
PR.AA-06: Physicaldefined
are access to in assets
a policy, managed,
is managed,
Awareness and Training (PR.AT): The monitored, and enforced commensurate with
organization's personnel are provided with PR.AT-01: Personnel are provided with
awareness and training
PR.AT-02: Individuals in so that theyroles
specialized possess
are the
Data Security (PR.DS): Data are managed provided with awareness and training so that
consistent with the organization's risk PR.DS-01: The confidentiality, integrity, and
availability
PR.DS-02: Theof data-at-rest are protected
confidentiality, integrity, and
availability of data-in-transit are protected
PR.DS-10: The confidentiality, integrity, and
availability of data-in-use are protected
PR.DS-11: Backups of data are created,
Platform Security (PR.PS): The hardware, protected, maintained, and tested
software (e.g., firmware, operating systems, PR.PS-01: Configuration management practices
are established
PR.PS-02: and is
Software applied
maintained, replaced, and
removed commensurate with risk replaced, and
PR.PS-03: Hardware is maintained,
removed
PR.PS-04: Log records arewith
commensurate risk and made
generated
available
PR.PS-05:for continuous
Installation andmonitoring
execution of
unauthorized software are prevented
PR.PS-06: Secure software development
Technology Infrastructure Resilience practices are integrated, and their performance
(PR.IR): Security architectures are managed PR.IR-01: Networks and environments are
protected fromorganization's
PR.IR-02: The unauthorizedtechnology
logical access and
assets
are protected
PR.IR-03: from environmental
Mechanisms are implemented threats
to
achieve resilience requirements in normal
PR.IR-04: Adequate resource capacity to ensure and
availability is maintained
CSF 2.0 Page 4 of 11
Function Category Subcategory
PROTECT (PR)
DETECT (DE): Possible cybersecurity
attacks and compromises are found Continuous Monitoring (DE.CM): Assets are
monitored to find anomalies, indicators of DE.CM-01: Networks and network services are
monitored
DE.CM-02: toThefind potentially
physical adverse is
environment events
monitored to find potentially adverse
DE.CM-03: Personnel activity and technologyevents
usage are monitored
DE.CM-06: to findprovider
External service potentially adverse
activities
and servicesComputing
DE.CM-09: are monitored to find
hardware potentially
and software,
Adverse Event Analysis (DE.AE): Anomalies, runtime environments, and their data are
indicators of compromise, and other DE.AE-02: Potentially adverse events are
analyzed
DE.AE-03:toInformation
better understand associated
is correlated from
multiple sources
DE.AE-04: The estimated impact and scope of
adverse
DE.AE-06:events are understood
Information on adverse events is
provided
DE.AE-07: Cyber threat staff
to authorized and tools
intelligence and other
contextual
DE.AE-08: Incidents are declared wheninto
information are integrated the
adverse
DETECT (DE) events meet the defined incident criteria
RESPOND (RS): Actions regarding a
detected cybersecurity incident are Incident Management (RS.MA): Responses
to detected cybersecurity incidents are RS.MA-01: The incident response plan is
executed
RS.MA-02:inIncident
coordination with
reports arerelevant
triaged third
and
validated
RS.MA-03: Incidents are categorized and
prioritized
RS.MA-04: Incidents are escalated or elevated as
needed
RS.MA-05: The criteria for initiating incident
Incident Analysis (RS.AN): Investigations recovery are applied
are conducted to ensure effective response RS.AN-03: Analysis is performed to establish
what has taken
RS.AN-06: place
Actions during anduring
performed incident
an and the
investigation are recorded,
RS.AN-07: Incident data andand the records'
metadata are
collected, and their integrity and provenance
RS.AN-08: An incident's magnitude is estimated are
Incident Response Reporting and and validated
Communication (RS.CO): Response RS.CO-02: Internal and external stakeholders are
notified
RS.CO-03:of Information
incidents is shared with designated
Incident Mitigation (RS.MI): Activities are internal and external stakeholders
performed to prevent expansion of an RS.MI-01: Incidents are contained

CSF 2.0 Page 5 of 11


Function Category Subcategory
RS.MI-02: Incidents are eradicated
RESPOND (RS)
RECOVER (RC): Assets and operations
affected by a cybersecurity incident Incident Recovery Plan Execution (RC.RP):
Restoration activities are performed to RC.RP-01: The recovery portion of the incident
response
RC.RP-02:plan is executed
Recovery actionsonce initiated from
are selected, scoped,
prioritized, and performed
RC.RP-03: The integrity of backups and other
restoration assets mission
RC.RP-04: Critical is verified before using
functions and them
cybersecurity
RC.RP-05: Therisk management
integrity are assets
of restored considered
is
verified,
RC.RP-06: The end of incident recovery is and
systems and services are restored,
Incident Recovery Communication (RC.CO): declared based on criteria, and incident-related
Restoration activities are coordinated with RC.CO-03: Recovery activities and progress in
restoring
RC.CO-04:operational capabilities
Public updates are recovery
on incident
RECOVER (RC) are shared using approved methods and

CSF 2.0 Page 6 of 11


Implementation Examples Informative References
CRI Profile v2.0: GV
CSF v1.1: ID.GV
CRI Profile v2.0: GV.OC
CSF v1.1: ID.BE
Ex1: Share the organization's mission (e.g., CRI Profile v2.0: GV.OC-01
through vision
Ex1: Identify and mission
relevant internalstatements,
stakeholders CRICRI Profile
Profile v2.0:
v2.0: GV.OC-01.01
GV.OC-02
and their cybersecurity-related
Ex1: Determine a process to track and CRI
CRI Profile v2.0: GV.OC-02.01
Profile v2.0: GV.OC-03
manage
Ex1: Establish criteria for determining the CRI Profile v2.0: GV.OC-03.01
legal and regulatory requirements CRI Profile v2.0: GV.OC-04
criticality of capabilities
Ex1: Create an inventory of theand services as CRI
CRI Profile v2.0: GV.OC-04.01
Profile v2.0: GV.OC-05
organization's dependencies on external CRI
CRI Profile
Profile v2.0:
v2.0: GV.OC-05.01
GV.RM
Ex1: Update near-term and long-term CSF v1.1: ID.RM
CRI Profile v2.0: GV.RM-01
cybersecurity risk management
Ex1: Determine and communicate risk objectives CRI
CRI Profile
Profile v2.0:
v2.0: GV.RM-01.01
GV.RM-02
appetite
Ex1: Aggregate and manage cybersecurity CRI Profile v2.0: GV.RM-02.01
statements that convey CRI Profile v2.0: GV.RM-03
risks alongside
Ex1: Specify otherfor
criteria enterprise
acceptingrisks
and(e.g., CRI
CRI Profile
Profile v2.0:
v2.0: GV.RM-03.01
GV.RM-04
avoiding cybersecurity risk
Ex1: Determine how to update seniorfor various CRI
CRI Profile v2.0: GV.RM-04.01
Profile v2.0: GV.RM-05
executives, directors, and management
Ex1: Establish criteria for using a on CRI
CRI Profile v2.0: GV.RM-05.01
Profile v2.0: GV.RM-06
quantitative
Ex1: Define and communicate guidance and CRI Profile v2.0: GV.RM-06.01
approach to cybersecurity risk CRI Profile v2.0: GV.RM-07
methods for identifying opportunities and CRI CRI Profile
Profile v2.0:
v2.0: GV.RM-07.01
GV.RR
CSF v1.1: ID.GV-2
Ex1: Leaders (e.g., directors) agree on their CIS Controls v8.0: 14.1
roles and responsibilities
Ex1: Document in developing,
risk management roles and CRI Profile v2.0:
CIS Controls v8.0:GV.RR-01
14.9
responsibilities in policy CRI Profile
Ex1: Conduct periodic management reviews CRI Profile v2.0: GV.RR-03v2.0: GV.RR-02
to ensure
Ex1: that cybersecurity
Integrate those given cybersecurity
risk CRI Profile v2.0:
CIS Controls v8.0:GV.RR-03.01
6.1
management considerations into human CIS Controls v8.0: 6.2
CRI Profile v2.0: GV.PO
Ex1: Create, disseminate, and maintain an CSF v1.1: ID.GV-1
CRI Profile v2.0: GV.PO-01
understandable, usable risk
Ex1: Update policy based on periodic management CRI
CRI Profile v2.0:
Profile v2.0: GV.PO-01.01
GV.PO-02
reviews of cybersecurity risk management CRI CRI Profile
Profile v2.0:
v2.0: GV.OV
GV.PO-02.01
Ex1: Measure how well the risk CRI Profile v2.0: GV.OV-01
management strategy and risk
Ex1: Review audit findings to confirm results have CRI
CRI Profile
Profile v2.0:
v2.0: GV.OV-01.01
GV.OV-02
whether the existing cybersecurity
Ex1: Review key performance indicators strategy CRI
CRI Profile v2.0: GV.OV-02.01
Profile v2.0: GV.OV-03
(KPIs) to ensure that organization-wide CRI Profile v2.0: GV.OV-03.01
CSF 2.0 Page 7 of 11
Implementation Examples Informative References
CRI Profile v2.0: GV.SC
Ex1: Establish a strategy that expresses the CSF v1.1: ID.SC
CIS Controls v8.0: 15.2
objectives
Ex1: Identify one or more specific roles or CIS Controls v8.0:GV.SC-01
of the cybersecurity supply chain CRI Profile v2.0: 15.4
positions that will be responsible and CRI Profile v2.0:
Ex1: Identify areas of alignment and overlap CRI Profile v2.0: GV.SC-03 GV.SC-02
with cybersecurity
Ex1: Develop and
criteria forenterprise risk
supplier criticality CRI Profile v2.0:
CIS Controls v8.0:GV.SC-03.01
15.1
based on, for example, the sensitivity
Ex1: Establish security requirements for of CIS
CIS Controls v8.0:
Controls v8.0: 15.3
15.4
suppliers, products, and services
Ex1: Perform thorough due diligence on CRI Profile v2.0: EX.CN
CIS Controls v8.0: 15.5
prospective suppliers that
Ex1: Adjust assessment formats and is consistent with CRI Profile v2.0:
CIS Controls v8.0:EX.DD
15.6
frequencies based on the third party's CRI Profile
Ex1: Define and use rules and protocols for CIS Controls v8.0: 15.4v2.0: EX.MM
reporting incident
Ex1: Policies response and
and procedures recovery CRI
require Profile v2.0:
CIS Controls v8.0:GV.SC-08
15.6
provenance records for all acquired
Ex1: Establish processes for terminating CRI Profile v2.0: GV.SC-09
CIS Controls v8.0: 15.7
critical relationships under both normal and CRI Profile v2.0: EX.TR
CRI Profile v2.0: ID
CSF v1.1: IDv2.0: ID.AM
CRI Profile
Ex1: Maintain inventories for all types of CSF v1.1: ID.AM
CIS Controls v8.0: 1.1
hardware, including IT, IoT, OT,
Ex1: Maintain inventories for all types of and mobile CRI
CIS Controls v8.0:ID.AM-01
Profile v2.0: 2.1
software and services, including CRI Profile
Ex1: Maintain baselines of communication CIS Controls v8.0: 3.8 v2.0: ID.AM-02
and
Ex1:data flows all
Inventory within the organization's
external services used by CRI Profile v2.0:
CIS Controls v8.0:ID.AM-03
15.1
the organization, including third-party
Ex1: Define criteria for prioritizing each CRI Profile v2.0: ID.AM-04
CIS Controls v8.0: 3.7
class
Ex1: Maintain a list of the designated data CRI
of assets Profile v2.0:
CIS Controls v8.0:ID.AM-05
3.2
types of interest (e.g., personally CRI Profile
Ex1: Integrate cybersecurity considerations CIS Controls v8.0: 1.1 v2.0: ID.AM-07
throughout the life cycles of systems, CIS
CRI Controls v8.0:ID.RA
Profile v2.0: 3.5
Ex1: Use vulnerability management CSF v1.1: ID.RA
CIS Controls v8.0: 7.1
technologies to identify unpatched
Ex1: Configure cybersecurity tools and and CRI
CRI Profile v2.0: ID.RA-01
Profile v2.0: ID.RA-02
technologies with detection
Ex1: Use cyber threat intelligence to or response CRI
CRI Profile v2.0: ID.RA-02.01
Profile v2.0: ID.RA-03
maintain
Ex1: Business leaders and cybersecurity risk CRI
awareness of the types of threat CRI Profile
Profile v2.0:
v2.0: ID.RA-03.01
ID.RA-04
management practitioners
Ex1: Develop threat models to better work together to CRI
CRI Profile v2.0: ID.RA-04.01
Profile v2.0: ID.RA-05
understand
Ex1: Apply the vulnerability management CRI Profile v2.0: ID.RA-05.01
risks to the data and identify CRI Profile v2.0: ID.RA-06
plan's
Ex1: Implement and follow procedures for CRI Profile v2.0: ID.RA-06.01
criteria for deciding whether to CRI Profile v2.0: ID.RA-07
the
Ex1:formal
Conduct documentation, review, testing, CRI
vulnerability information Profile v2.0:
CIS Controls v8.0:ID.RA-07.01
7.2
sharing between the organization
Ex1: Assess the authenticity and and its CRI Profile v2.0: ID.RA-08
CRI Profile v2.0: EX.DD-04
cybersecurity of critical technology
Ex1: Conduct supplier risk assessments CRI
CRI Profile
Profile v2.0:
v2.0: EX.DD-04.01
EX.DD-03
against business and applicable CRI
CRI Profile v2.0: EX.DD-03.01
Profile v2.0: ID.IM
CSF v1.1: RS.IM
CSF 2.0 Page 8 of 11
Implementation Examples Informative References
Ex1: Perform self-assessments of critical CRI Profile v2.0: ID.IM-01
services that improvements
Ex1: Identify take current threats and TTPs
for future CRI Profile v2.0:
CIS Controls v8.0:ID.IM-01.01
17.7
incident response
Ex1: Conduct activities lessons
collaborative based on
learned CRI Profile v2.0: ID.IM-02
CRI Profile v2.0: ID.IM-03
sessions with suppliers
Ex1: Establish contingency plans (e.g., CRI
CRI Profile
Profile v2.0:
v2.0: ID.IM-03.01
ID.IM-04
incident response, business continuity, CRI Profile v2.0: ID.IM-04.01
CRI Profile v2.0: PR
CSF v1.1: PRv2.0: PR.AA
CRI Profile
Ex1: Initiate requests for new access or CSF v1.1: PR.AC
CIS Controls v8.0: 5.1
additional access for employees,
Ex1: Verify a person's claimed identity at CIS Controls v8.0:PR.AA-02
CRI Profile v2.0: 6.7
enrollment time using government-issued
Ex1: Require multifactor authentication CRI Profile v2.0: PR.AA-02.01
CRI Profile v2.0: PR.AA-03
Ex2: Enforce policies for the minimum
Ex1: Protect identity assertions that are CRI
CRI Profile
Profile v2.0:
v2.0: PR.AA-03.01
PR.AA-04
used to convey authentication and
Ex1: Review logical and physical access user CRI
CIS Controls v8.0:PR.AA-04.01
Profile v2.0: 3.3
privileges periodically and whenever CIS Controls v8.0:
Ex1: Use security guards, security cameras, CRI Profile v2.0: PR.AA-06 6.8
locked entrances, alarm systems, and other CRI Profile v2.0: PR.AA-06.01
CRI Profile v2.0: PR.AT
Ex1: Provide basic cybersecurity awareness CSF v1.1: PR.AT
CIS Controls v8.0: 14.1
and
Ex1: Identify the specialized roles within the CIS Controls v8.0:PR.AT-01
training to employees, contractors, CRI Profile v2.0: 14.9
organization that require additional CRI Profile v2.0: PR.AT-02
CRI Profile v2.0: PR.DS
Ex1: Use encryption, digital signatures, and CSF v1.1: PR.DS
CIS Controls v8.0: 3.11
cryptographic
Ex1: Use encryption, digital signatures, and CIS Controls v8.0:PR.DS-01
hashes to protect the CRI Profile v2.0: 3.10
cryptographic hashes to protect
Ex1: Remove data that must remain the CRI Profile v2.0: PR.DS-02
CRI Profile v2.0: PR.DS-10
confidential (e.g., from processors
Ex1: Continuously back up critical data inand CRI Profile v2.0:
CIS Controls v8.0:PR.DS-10.01
11.2
near-real-time, and back up other data CIS Controls v8.0:PR.PS
CRI Profile v2.0: 11.3
Ex1: Establish, test, deploy, and maintain CIS Controls v8.0: 4.1
hardened baselines that enforce
Ex1: Perform routine and emergency the CIS
CIS Controls
Controls v8.0:
v8.0: 4.2
2.2
patching within the timeframes
Ex1: Replace hardware when it lacks specified in CIS
CIS Controls v8.0: 2.3
Controls v8.0: 1.2
needed security capabilities or
Ex1: Configure all operating systems, when it CRI Profile v2.0:
CIS Controls v8.0:PR.PS-03
8.2
applications, and services (including cloud- CRI Profile v2.0:
Ex1: When risk warrants it, restrict software CIS Controls v8.0: 2.5 PR.PS-04
execution
Ex1: Protectto all
permitted products
components of only or CRI Profile v2.0:
CIS Controls v8.0:PR.PS-05
16.1
organization-developed software from CRI Profile v2.0: PR.PS-06
CRI Profile v2.0: PR.IR
Ex1: Logically segment organization CIS Controls v8.0: 3.12
networks
Ex1: Protect organizational equipment from CIS
and cloud-based platforms CRI Controls v8.0:PR.IR-02
Profile v2.0: 12.2
known environmental
Ex1: Avoid single pointsthreats, such
of failure in as CRI
CRI Profile
Profile v2.0:
v2.0: PR.IR-02.01
PR.IR-03
systems and infrastructure
Ex1: Monitor usage of storage, power, CRI
CRI Profile v2.0: PR.IR-03.01
Profile v2.0: PR.IR-04
compute, network bandwidth, and other CRI Profile v2.0: PR.IR-04.01
CSF 2.0 Page 9 of 11
Implementation Examples Informative References

CRI Profile v2.0: DE


CSF v1.1: DE
CRI Profile v2.0: DE.CM
CSF v1.1:
Ex1: Monitor DNS, BGP, and other network CIS Controls v8.0: 13.1 DE.CM
services for adverse
Ex1: Monitor logs fromevents
physical access CRI
CRI Profile
Profile v2.0:
v2.0: DE.CM-01
DE.CM-02
control systems (e.g., badge readers)
Ex1: Use behavior analytics software to to find CRI
CIS Controlsv2.0:
Profile v8.0:DE.CM-02.01
10.7
detect anomalous user
Ex1: Monitor remote and onsiteactivity to mitigate CRI Profile v2.0: DE.CM-03
CIS Controls v8.0: 15.2
administration and maintenance
Ex1: Monitor email, web, file sharing, activities CIS
CIS Controls
Controls v8.0:
v8.0: 15.6
10.1
collaboration services, and other common CRI Profile v2.0: DE.CM-09
CRI Profile v2.0: DE.AE
Ex1: Use security information and event CSF v1.1: DE.AE
CIS Controls v8.0: 8.11
management
Ex1: Constantly transfer log data generated CRI Profile v2.0: DE.AE-02
(SIEM) or other tools to CRI Profile v2.0: DE.AE-03
by
Ex1: Use SIEMs or other tools to estimate CRI Profile v2.0: DE.AE-03.01
other sources to a relatively small CRI Profile v2.0: DE.AE-04
impact
Ex1: Use cybersecurity software to generate CRI Profile v2.0: DE.AE-04.01
and scope, and review and refine CRI Profile v2.0: DE.AE-06
alerts and provide
Ex1: Securely providethem to the
cyber security
threat CRI
CRI Profile
Profile v2.0:
v2.0: DE.AE-06.01
DE.AE-07
intelligence
Ex1: Apply incident criteria to known and CRI Profile v2.0: DE.AE-07.01
feeds to detection CRI Profile v2.0: DE.AE-08
assumed characteristics of activity in order CRI Profile v2.0: DE.AE-08.01
CRI Profile v2.0: RS
CSF v1.1: RSv2.0: RS.MA
CRI Profile
Ex1: Detection technologies automatically CSF v1.1: RS.RP
CIS Controls v8.0: 17.4
report
Ex1: Preliminarily review incident reports to CRI Profile v2.0: RS.MA-01
confirmed incidents CRI Profile v2.0: RS.MA-02
confirm that they are cybersecurity-related
Ex1: Further review and categorize CRI
CRI Profile v2.0: RS.MA-02.01
Profile v2.0: RS.MA-03
incidents based on the type of incident
Ex1: Track and validate the status of all CRI
CRI Profile
Profile v2.0:
v2.0: RS.MA-03.01
RS.MA-04
ongoing incidents
Ex1: Apply incident recovery criteria to CRI
CIS Controls v8.0:RS.MA-04.01
Profile v2.0: 17.9
known and assumed characteristics of the CRI Profile v2.0: RS.MA-05
CRI Profile v2.0: RS.AN
Ex1: Determine the sequence of events that CSF v1.1: RS.AN
CIS Controls v8.0: 17.8
occurred
Ex1: Require each incident responder and CRI Profile v2.0:
during the incident and which CRI Profile v2.0: RS.AN-03
RS.AN-06
others (e.g., system administrators,
Ex1: Collect, preserve, and safeguard the CRI
CRI Profile v2.0: RS.AN-06.01
Profile v2.0: RS.AN-07
integrity
Ex1: Review other potential targets of the CRI Profile v2.0: RS.AN-07.01
of all pertinent incident data and CRI Profile v2.0: RS.AN-08
incident to search for indicators of CRI
CRI Profile v2.0: RS.AN-08.01
Profile v2.0: RS.CO
Ex1: Follow the organization's breach CSF v1.1: RS.CO
CIS Controls v8.0: 17.2
notification
Ex1: Securely procedures after discovering
share information a CRI
consistent Profile v2.0:
CIS Controls v8.0:RS.CO-02
17.2
with response plans and information CRI Profile v2.0: RS.CO-03
CRI Profile v2.0: RS.MI
Ex1: Cybersecurity technologies (e.g., CSF v1.1: RS.MI
CRI Profile v2.0: RS.MI-01
antivirus software) and cybersecurity CRI Profile v2.0: RS.MI-01.01
CSF 2.0 Page 10 of 11
Implementation Examples Informative References
Ex1: Cybersecurity technologies and CRI Profile v2.0: RS.MI-02
cybersecurity features of other CRI Profile v2.0: RS.MI-02.01
CRI Profile v2.0: RC
CSF v1.1: RCv2.0: RC.RP
CRI Profile
Ex1: Begin recovery procedures during or CSF v1.1: RC.RP
CRI Profile v2.0: RC.RP-01
after incident
Ex1: Select response
recovery processes
actions based on the CRI
CRI Profile v2.0:
Profile v2.0: RC.RP-01.01
RC.RP-02
criteria defined in the incident
Ex1: Check restoration assets for response
indicators CRI
CIS Controls v8.0:RC.RP-02.01
Profile v2.0: 11.5
of
Ex1: Use business impact and systemother
compromise, file corruption, and CRI Profile v2.0: RC.RP-03
CRI Profile v2.0: RC.RP-04
categorization records
Ex1: Check restored (including
assets service of
for indicators CRI
CRI Profile
Profile v2.0:
v2.0: RC.RP-04.01
RC.RP-05
compromise and remediation of root
Ex1: Prepare an after-action report that CRI
CRI Profile v2.0:
Profile v2.0: RC.RP-05.01
RC.RP-06
documents the incident itself, the response CRI
CRI Profile v2.0: RC.RP-06.01
Profile v2.0: RC.CO
Ex1: Securely share recovery information, CSF v1.1: RC.CO
CRI Profile v2.0: RC.CO-03
including
Ex1: Followrestoration progress,breach
the organization's consistent CRI Profile v2.0:
CIS Controls v8.0:RC.CO-03.01
17.2
notification procedures for recovering from CIS Controls v8.0: 17.6

CSF 2.0 Page 11 of 11

You might also like