NIST Cyber Security Framework Part - 1
Cross post - https://kantikalyan.medium.com/nist-cyber-security-framework-part-1-b9bd659ab094
As mentioned in a previous blog post - Moved to India and Cyber Security, I have started studying the Cybersecurity Risk Management Framework Specialization on Coursera. This specialization has 3 courses:
1) NIST CSF - 4 Hours
2) NIST DoD RMF - 4 Hours
3) NIST 800-171 - 6 Hours
I am I.T business owner, I have worked as lead full stack .Net web developer in the past and have aspirations of software architect. Security awareness and expertise is very helpful in my journey towards software architect or even software security architect (fighting the bad guys - hackers). And in general cyber security awareness is a good thing, so I thought I would briefly summarize what I have learnt, this is in a certain way Tier-4 of NIST Cyber Security Framework i.e actively communicating with stake holders (here I am communicating with general public), proactively learning and benefitting the community (raising cyber security awareness for the general public can be considered as benefitting the community). I would say ALight Technology And Services Limited is at Tier-2 and transitioning towards Tier-3, by the end of Q3 2023, ALight Technology And Services Limited would be at Tier-4. I know I am very ambitious, I have been like that since childhood. One ambitious man's company - ALight Technology And Services Limited.
This is a series of blog posts, when I post more blog articles in this series, I would be updating the links in this blog.
"Cybersecurity" is defined as:
- the protection of information assets by addressing threats to information processed, stored and transported by inter-networked information systems
- measures taken to protect the integrity of networks, programs and data against "unauthorized" access, damage or attack
- the state of being protected against the criminal or unauthorized use of electronic data, or the measures taken to achieve this
Computer security entails:
- Cybersecurity
- Physical security
Cybersecurity vs. information security
- Information security deals with information
○ Paper documents
○ Digital and intellectual property
○ Verbal or visual files
○ Communications (regardless of media)
- Cybersecurity is concerned with protecting the confidentiality, integrity and availability of digital assets
○ Networks, hardware or software
○ Information that is processed, stored or transported by networked information systems
Cybersecurity consists of the triad known as CIA - Confidentiality, Integrity, Availability
Confidentiality: Different information requires different levels of confidentiality. Personal, financial, and medical information requires higher confidentiality.
Integrity: Integrity is about preventing unauthorized modifications / deletion. Preventing authorized subjects from making unauthorized modifications.
Availability: The assurance that authorized subjects can interact with resources.
Terms & Concepts:
Confidentiality: Prevention of unintentional disclosure
Integrity: Preventing unauthorized modification
Availability: Accessible to authorized users
Auditability: Ability to track and reconstruct events from logs
Identification: Verification of authorized person or process
Authentication: Proof Of identification
Authorization: What can you do
Nonrepudiation: Cannot deny
Layered security: Defense in depth
Access control: Limiting access to authorized users or processes
Security metrics, monitoring: Measuring security activities
Governance: Providing control and direction
Strategy: Method of achieving objectives
Architecture: Used to define the information security strategy. Some examples are:
- Zachman
- TOGAF (The Open Group Architecture Framework)
- DODAF (U.S. Department Of Defense architecture framework)
- MODAF (The British Ministry Of Defense Architecture Framework)
- SABSA (Sherwood Applied Business Security Architecture)
Management: Overseeing activities
Risk: The likelihood that a threat source will exploit one or more vulnerabilities
- Acceptable level of risk (aka risk appetite)
Exposure: Being susceptible to asset loss because of a threat exploiting a vulnerability or
flaw
Vulnerabilities: NIST Special Publication 800-30 defines vulnerability as "an inherent weakness
in an information system, security procedures, internal controls, or implementation that could
be exploited by a threat source."
Threats: A threat is any person, event or environmental factor that could affect or harm a protected asset.
Residual risk: The risk remaining after controls are put in place
Impact: The results and consequences of a risk materializing
Criticality: The higher the value, the more protection it needs.
Sensitivity: Based on the classification and categorization
Business impact analysis (BIA): Evaluating the results and consequences of compromise
Business dependency analysis: An analysis of business resource dependencies, like a supply
chain review
Gap analysis: The difference between "what is" and the stated objective
Controls: Actions to mitigate or reduce risk
Countermeasures: Actions or process (controls) used to reduce vulnerabilities
Policies: Management's interpretation of requirements
Standards: Supports a policy by setting the boundaries
Attacks: Types of compromises
Data classification: Determining the sensitivity and criticality of information
Technologies used in cyber security:
- Firewalls
- User account administration
- Intrusion detection and intrusion prevention
- Antivirus
- Public key infrastructure (PKI)
- Secure Sockets Layer (SSL)
- Single sign-on (SSO)
- Biometrics
- Encryption
- Privacy compliance
- Remote access
- Digital signature
- Electronic data Interchange (EDI) and electronic funds transfer (EFT)
- Virtual private networks (VPNs)
- Forensics
- Monitoring technologies
Key CSF (Cyber Security Framework) attributes:
It's a framework, NOT a prescriptive standard!
- Provides a common language and systematic methodology for managing cyber-risk
- Is meant to be adapted
- Does not tell an organization how much cyber-risk is tolerable
- Enable best practices
- It's voluntary, except for federal agencies (it's mandatory for them)
- It's a living document
- It is intended to be updated as technology and risks change
The Framework consists of 3 main components:
- The framework core
- The framework implementation tiers
- The framework profiles
The framework consists of 5 functions, 23 categories and 98 sub categories.
Functions (IPDRR):
1) Identify - Develop an organizational understanding to manage cybersecurity risk to
systems, people, assets, data, and capabilities.
2) Protect - Develop and implement appropriate safeguards to ensure delivery of critical
services.
3) Detect - Develop and implement appropriate activities to identify the occurrence of a
cybersecurity event.
4) Respond - Develop and implement appropriate activities to take action regarding a
detected cybersecurity incident
5) Recover - Develop and implement appropriate activities to maintain plans for resilience
and to restore any capabilities or services that were impaired due to a cybersecurity
incident.
Framework Implementation Tiers:
No comments:
Post a Comment