The NIST Cybersecurity Framework
Organizations are guaranteed a reliable and well-developed system that has
yet to serve its on lookers. The first benefit lives in the nature of the
coding software. As time goes on, there are new developments to be processed
and people all around hoping to snag information. This is one of the many
benefits that the NIST framework sees fit to fixing. Another benefit has to do
with the seamless execution that the framework provides. The framework is split
up into three different sections, which consist of the Framework core,
Implementation tiers, and the Framework profiles. Each of these distinct
categories are special in their own way and operate in the background.
For example, the core is responsible for providing a set of activities that
it will use to achieve specific outcomes. The five main cores to remember are
detect, identify, protect, respond, and recover. The Implementation tiers on
the other hand, are responsible for providing the necessary context on how an
organization views the risk involved with cybersecurity as well as the
processes in place to counteract the risk. Thirdly, the Cybersecurity framework
is adaptable to every single issue and task that it meets. Due to continuous
and ongoing advancements regarding technology and devices, different forms of
infrastructures are needed for certain tasks. Thankfully the NIST framework is
a reliable solution. Lastly, the ease of use that NIST frameworks provide is
reassuring to current business owners due to the simplicity behind it all.
To setup a new program or improve on an existing one, companies can utilize
the seven steps of prioritizing and scope, orient, create a profile, risk
assessment, target profile creation, analyzing gaps, and implementing the
entirety of the action. The first step would be for identifying the issue at
hand before continuing. The second step comes after the planning and requires
the individuals to find and collect the necessary tools to continue forth with
their plan. The third step is for creating a profile that suits the needs of
the company. The fourth is an assessment involving risk management. The fifth
step can be seen as a storing and cleaning step since it separates everything
into framework categories and subcategories. As far as step six, deterring,
analyzing, and prioritizing gaps are its main steps. It can be looked at as the
final planning and cost summation of it all. Lastly, step 7 would be used to
put all the steps into play by implementing the action.
With a careful and well thought out adoption of the seven steps, companies
should find the creation of a framework to be a breeze. If I were to
incorporate a Cybersecurity Framework into my line of work in the future, I
would do it by incorporating the seven steps. I would also brush up on the
information and collaborate with fellow workers to decide on the best possible
solution. After my decision and setup of the framework, I see nothing but
smooth sailing after that regarding the startup, continuation, and
responsibilities of the framework.