How companies respond to security threats? Take a look at the updated NIST network security framework

Source: Internet
Author: User
Tags access added address agencies application business different enterprise

How can businesses address security threats? Look at the updated NIST network security framework. The NIST Cybersecurity Framework is a guide issued by the National Institute of Standards and Technology to guide organizations and organizations in securing information. The framework was first enacted in February 2014 and added to this year's 1.1 new release. The earliest application of the framework in the United States national infrastructure facilities, such as power agencies and so on. Because it provides a versatile guide, it adapts to and adapts to the needs of different organizations and is now widely used in the United States and around the world.

This framework enables businesses and organizations to apply the principles and best practices of risk management to enhance the security and resiliency of critical infrastructure. It provides organizations and organizations with the best of the best in the industry. Although this framework is voluntary, many organizations and agencies have adopted such a framework.

This video shows why businesses and organizations of all sizes can apply the NIST framework to manage the risks their organizations face at the information security level. Baldrige Cybersecurity Excellence Builder, an assessment tool, also helps organizations measure the benefits of using the framework.

The latest features

Some of the most eye-catching features in the current revision include:

First, test the role and perfection of the cyber-risk system of an enterprise or organization.

Second, it can also give the associated business goals and results based on the detected indicators, pointing out the effort and complexity required. This means that the new version can measure two issues at the same time, how the business or organization can reduce business risk, and how much positive benefits this good network security can bring to it, such as how many new users it gets and how much revenue it brings.

Third, the category of access controls has changed within the framework and it has been renamed as Identity Management and Access Control. This change of name ensures management of user identities and credentials throughout the entire process, from creation to decommissioning. For example, to ensure the identity of user S; to verify that this is true S is using the certificate; to ensure that S is changed or disabled when S leaves the company. This change is a positive step, while controlling access to resource objects and ensuring the identity of the object.

Framework content

This framework is based on the management of network security risks and consists of three parts: Framework Core, Implementation Tiers and Profiles. Each part of the framework component emphasizes the connection between the enterprise itself and the activities of the network security.

Among them, the core components of the framework have five concurrent functions, including identification, protection, detection, response and recovery. These capabilities raise the high-level strategic view from the perspective of the entire life cycle of cybersecurity risk management in an organization or organization.

The level of implementation of the framework allows these companies or organizations to understand the background of cybersecurity risks, and the process of risk management. The implementation level describes the framework features exhibited in many practices, such as risk and risk perception, repeatability and adaptability.

The framework of the executive layer can be defined as the framework of the core model in a particular implementation scenario, guidance and practice of unity. It identifies the key points that can improve the cyber security posture by comparing the current "how it is" with the "how it will be".

Framework advantage

With a flexible application to all walks of life, this framework can detect and respond to emerging threats in emerging markets, including ransomware, IoT intrusions, and other new types of malware. As risk management is a continuous process that includes risk identification, risk assessment and risk management measures, the framework suggests that companies must understand the likelihood of a risk event and its aftermath, in order to achieve better risk management aims. In this way, an organization can determine an acceptable level of service risk, which is expressed as an enterprise's risk tolerance. Understanding your risk tolerance lets your business prioritize cybersecurity initiatives. It is extremely important for this framework to be adaptable to different industries, and enterprises need to respond to various risks in a timely manner.

In this update, we have improved and strengthened some of the statements that make it easier for organizations and enterprises to use the framework and remain compatible with the original version of the framework while still maintaining the voluntary and flexible framework. - Matt Barrett, Project Manager, NIST Network Security Framework

As cloud computing, big data and analytics come to new heights, the potential harms of security issues in healthcare, power grids, the Internet of Things and business are also on the rise. This framework provides a comprehensive exposition of the practice of information security in the enterprise. The recommended practice method can effectively help enterprises and organizations to effectively isolate threats and protect their assets.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.