Welcome to the first part of a five-part series exploring how the NIST Cybersecurity Framework (NIST CSF) 2.0 can help identify security gaps and assess what should be handled in-house versus outsourced to a trusted security partner. I'll explore the components of cybersecurity frameworks using NIST CSF 2.0 as our guide, breaking down its six core functions and highlighting where Bitdefender can support security teams.
A recent survey conducted by the SANS Institute found that nearly 70% of participants used a cybersecurity framework to help define and measure their internal security team and 74% of those using one, use NIST. So, what exactly is NIST CSF 2.0?
NIST CSF 2.0 is comprised of six high level functions that are descriptive in name and provide the structure for how an organization focuses and addresses their cybersecurity needs. These are Govern (new to 2.0), Identify, Protect, Detect, Respond, and Recover. Under each function there are a series of categories that define a specific security outcome. Those categories are then also broken down into subcategories that further define more specific outcomes of technical and management activities.
The NIST CSF 2.0 graphic wheel is representative of the interconnectedness of each of the functions and a logical order in which to compose a cybersecurity program and address potential threats. Govern, newly introduced in version 2.0 this past year, sits in the middle because it oversees the internal processes for how an organization manages and prioritizes each of the other five functions. The other functions go in clockwise order starting with Identify where an organization categorizes the assets within their environment and then they Protect those assets with systems, processes, and tools. They then monitor those tools and systems to Detect and Respond to threats. Finally, they create a plan to Recover from a cybersecurity incident.
Each function is vital to the implementation and success of a cybersecurity program and often the functions overlap or cannot be addressed in isolation without consideration for another. For example, it’s not possible to create a plan and deploy a set of security tools to protect assets that haven’t been identified, categorized, assessed, and prioritized first. However, many organizations don’t have the ability to dedicate equal attention and resources to each function often due to the lack of staff manpower, time, or even general security knowledge and expertise.
While I’ll dive deeper into each of the functions in the later blogs, I want to spend some time highlighting each function and their top-level categories before we dive into how to use this framework to perform an assessment.
As mentioned above, Govern oversees and sets the foundations for how an organization views, discusses, communicates, plans, and prioritizes the other five functions. It’s all about creating the team who will oversee the program, the creation and dissemination of the plan, the defining of roles and responsibilities across the org, and the implementation of the policies, processes, and procedures. There are six categories that fall under Govern:
Starting with the first of the primary functions, Identify refers to how the organization discovers, manages, and prioritizes all their assets. In this case, assets mean all the things that may fall under a cybersecurity umbrella or need to have some form of security oversight such as data, hardware, software, systems, facilities, services and people. This also includes the identification of areas of improvement across the organization’s policies, plans, processes, procedures and practices that support or overlap with a cybersecurity risk management plan. There are three categories under the Identify function:
Next, the Protect function is how an organization develops and implements appropriate safeguards that can protect critical assets, data, and systems from a variety of threats or vulnerabilities. In essence, it’s all the plans, processes, tools, and systems that are implemented to help organizations prepare for and prevent threats or to help maintain uptime, availability and eliminate other obstructions. It is essential for reducing the risk of security breaches and ensuring that, even if an incident does occur, its impact is minimized.
The detect function is all about the on-going process to monitor the tools and systems deployed to discover threats quickly. It’s about how an organization creates and manages their team members, and the processes and plans put in place to ensure that events and alerts are being monitored and investigated to ensure the timely detection of threats.
Security teams are only as successful as their ability to correctly and efficiently respond to the threats they’ve detected. A proper response program is critical for managing and minimizing the effects of a cybersecurity incident. It involves a set of coordinated activities designed to address and mitigate the immediate impacts of an incident, restore normal operations, and prevent future incidents.
The Recover function is essential for restoring systems, data, and operations after an incident and for strengthening the organization’s ability to deal with future incidents. It’s focused on the plans and processes in place (including rigorous testing and tabletop scenarios) ensuring that an organization can recover and get back up and running after an incident in a timely manner. Effective recovery is critical for minimizing downtime, reducing financial and reputational damage, and ensuring the continuity of business operations. It also helps build organizational resilience by incorporating lessons learned into future planning and improving overall security practices.
Personally, when I look at cybersecurity frameworks, and especially NIST CSF 2.0, I like to simplify it and group each of these functions into 3 distinct phases tied to what I’ll call the lifecycle of a threat:
When thinking about the lifecycle of a threat or attack, it all begins with preparation (on both sides of the coin). It’s about how organizations prepare their team and environment to reduce the likelihood of an attack being successful. It’s how they build and train their security team, how they invest, implement and harden their security tools, and how they plan, organize, and manage all their assets and users, with the policies and procedures put in place to help reduce and mitigate risks as much as possible.
This is when live bullets are firing. An attack is underway, and the threat is real. How does the organization handle the detection of a threat as the attacker uses a variety of tactics and techniques to compromise users, systems, applications, etc. How does the security team monitor event logs, perform investigations and identify malicious activity? Once the threat is discovered, what’s the response to boot the attacker out and ensure that systems are clean and users are no longer compromised?
The final stage of a successful attack, which every organization hopes to avoid, involves recovery and business continuity after a successful breach. In this post-threat phase, the attackers have gained access to data, and the focus shifts to cleanup, restoring systems to working order, and resuming business operations. It’s essential to evaluate how to recover efficiently, restore normal operations, and apply lessons learned to strengthen current capabilities and continuously improve defenses.
By breaking down the framework into these three distinct phases, organizations can understand the risk profile of each function a little better in the context of an attack chain. It’ll make it easier to prioritize areas of focus and direct attention to areas that have the highest return on investment by reducing the greatest amount of risk and vulnerabilities the quickest without compromising security or other areas. The above also allows for easy articulation of the current cybersecurity posture in an easily digestible format for non-technical stakeholders within the senior management team.
Understanding each of the functions that comprise a cybersecurity framework like NIST CSF 2.0 can help organizations understand the series of objectives and tasks required to implement a proper cybersecurity program. Using these frameworks can help organizations perform a full assessment to identify what they might already be doing, what they are currently not doing or overlooking, and where they might be well covered or have security gaps.
This blog has covered a substantial amount of information, and there’s much more to explore. In the next part of this series, we’ll delve into how to leverage NIST CSF 2.0 to identify security gaps and strengthen your organization’s cybersecurity posture.
If you're looking to get your cybersecurity journey started, check out how Bitdefender's security platform can help you. Read up on our GravityZone XDR solution or learn how our MDR service can help empower your team.
tags
Kevin is the Principal Product Marketing Manager at Bitdefender. With a technical background, he excels at storytelling and messaging across a variety of cybersecurity fields.
View all postsDon’t miss out on exclusive content and exciting announcements!