Skip to content

Latest commit

 

History

History
248 lines (162 loc) · 11.9 KB

3. PROTECT.md

File metadata and controls

248 lines (162 loc) · 11.9 KB

NIST-CYBERSECURITY-FRAMEWORK-V2.0 (CSF 2.0)

Reference Guide in Planning Organizations Risk Management.

TABLE DESCRIPTION:


    • ID:
      This column contains the ID of the category being described and its connection with that particular function. e.g. Function: 'PR' points to the category "AA (Identity Management, Authentication, and Access Control)", leading to the ID of that category being "PR.AA".

    • CATEGORY:
      This column describes the key focus of the organization in that particular category. e.g. For the category 'PR.AA', "Identity Management, Authentication, and Access Control" is the key area of focus.

    • METHODOLOGY:
      Describes the methods and considerations the organization should carry out its risk assessment pertinet to the category being considered. e.g PR.AA describes the type of assets (phiscal & logical) to be protected

    • SUB CATEGORY ID:
      List the various sub-categories related to that specific category. e.g PR.AA (category) --> PR.AA-1, PR.AA-2, PR.AA-3, PR.AA-4, PR.AA-5, PR.AA-6(Sub-Category).

    • SUB CATEGORY DESCRIPTION:
      This column describes each sub-category 'ID' e.g. PR.AA-1 has its own description, which is different from PR.AA-2.

    • SUB CATEGORY MODIFICATIONS:
      This column, contains the sub-category that "WITHDRAWN", The sub category, that was "NEWLY ADDED OR INTRODUCED" and where the withdrawn category was "MOVED TO".



  • Protect


    PROTECT function focuses on safeguarding, through the implementation of relevant security measures, and how the organizations cybersecurity are used.

    Below is listed the various Sub-categories of the "Protect Function" in planning your organization's risk assessment for its critical infrastructures.


    ENTIRE CATEGORY WITH ITS SUB-CATEGORY WITHDRAWN AND NEW SUB-CATEGORY INCOPORATED INTO:

    CATEGORY WITHDRAWN AND INCORPORATED INTO A NEW CATEGORY:

    PR.AC-->PR.AA, PR.IP-->(PR.PS,ID.AM,ID.RA,PR.DSPR.IR,ID.IM,GV.RR), PR.MA-->(ID.AM &PR.PS), PR.PT-->(PR.PS,PR.DS,PR.AA, & PR.IR).

    ITS SUBCATEGORIES:

    PR.AC:  PR.AC-1,PR.AC-2, PR.AC-3, PR.AC-4, PR.AC-5, PR.AC-6, PR.AC-7.
    PR.IP:  PR.IP-1,PR.IP-2, PR.IP-3, PR.IP-4,PR.IP-5,PR.IP-6, PR.IP-7, PR.IP-8,PR.IP-9,PR.IP-10, PR.IP-11, PR.IP-12.
    PR.MA:  PR.MA-1,PR.MA-2.
    PR.PT:  PR.PT-1,PR.PT-2, PR.PT-3, PR.PT-4, PR.PT-5.

    SUBCATEGORIES NOW INCORPORATED INTO:

    PR.AC:
    (PR.AC-1)-->(PR.AA-1 & PR.AA-5),(PR.AC-2)-->(PR.AA-6), (PR.AC-3)-->(PR.AA-3, PR.AA-5, & PR.IR-1), (PR.AC-4)-->(PR.AA-5), (PR.AC-5)-->(PR.IR-1), (PR.AC-6)-->(PR.AA-2), (PR.AC-7)-->(PR.AA-3).
    PR.IP:
    (PR.IP-1)-->(PR.PS-1),(PR.IP-2)-->(ID.AM-8 & PR.PS-6), (PR.IP-3)-->(ID.RA-7, PR.PS-1), (PR.IP-4)-->(PR.DS-11),(PR.IP-5)-->(PR.IR-2), (PR.IP-6)-->(ID.AM-8), (PR.IP-7)-->(ID.IM-3), (PR.IP-8)-->(ID.IM-3), (PR.IP-9)-->(ID.IM-4), (PR.IP-10)-->(ID.IM-2 & ID.IM-4),
    (PR.IP-11)-->(GV.RR-4), (PR.IP-12)-->(ID.RA-1 & PR.PS-2)
    PR.MA:
    (PR.MA-1)-->(ID.AM-8 & PR.PS-3),(PR.MA-2)-->(ID.AM-8 & PR.PS-2).
    PR.PT:
    (PR.PT-1)-->(PR.PS-4),(PR.PT-2)-->(PR.DS-1,PR.PS-1), (PR.PT-3)-->(PR.PS-1), (PR.PT-4)-->(PR.AA-6 & PR.IR-1), (PR.PT-5)-->(PR.IR-3).
    PR.DS:
    (PR.DS-3)-->(ID.AM-8 & PR.PS-3),(PR.DS-4)-->(PR.IR-4),(PR.DS-5)-->(PR.DS-1,PR.DS-2 & PR.DS-10), PR.DS-6-->(PR.DS-1 & DE.CM-9),
    (PR.DS-7)-->(PR.IR-1),(PR.DS-8)-->(ID.RA-9 & DE.CM-9).

        ID    CATEGORY                    METHODOLOGYSUB CATEGORY ID       SUB CATEGORY        DESCRIPTION    SUB CATEGORY MODIFICATIONS
    PR.AAIdentity Management, Authentication, and Access Control. Protecting Assets:

    Organizations Assets and infrastrutures facilities (physical and logical assets) associated with it are limited to only authorized users, services, and hardware. Ensuring they are managed appropriately with the assessed risk of unauthorized access.
    PR.AA-1, PR.AA-2, PR.AA-3, PR.AA-4, PR.AA-5, PR.AA-6.
    PR.AA-1:

    Managing the identities and credentials of authorized users, services, and hardware associated with the organization.

    PR.AA-2:

    Identities are proofed and bound to credentials based on the context of interactions.

    PR.AA-3:

    Ensuring that users, services, and hardware are authenticated.

    PR.AA-4:

    Declared identity are protected, conveyed, and verified.

    PR.AA-5:

    The organization defined policy should include access permissions, entitlements,authorization, and how they are managed, enforced, and reviewed, and must incorporate principle of least privilege, and seperation of duties.

    PR.AA-6:

    The phyiscal access to the organizations assets is managed, monitored, and enforced consistently with risk.



    WITHDRAWN
    N/A

    NEWLY ADDED
    N/A

    MOVED TO
    N/A
    PR.ATAwareness and Training. Cybersecurity Awareness and Training as part of The Protection Plan:

    The entire organization's employees, personels, partners, and stakeholders are provided with adequate cybersecurity awareness program and education. They should have a proper training on how to conduct their information security, related duties, and resposibilites.
    PR.AT-1, PR.AT-2.
    PR.AT-1:

    All users (personels, employees, and stakeholders) are well Informed and trained (awareness training), so that they could possess the knowledge and skills to perform general task, with cybersecurity risks in mind.

    PR.AT-2:

    Individuals in specialized roles (Top level executives or Senior managers and teams), are well Informed and trained (awareness training), so that they could possess the knowledge and skills to perform general task, with cybersecurity risks in mind.



    WITHDRAWN
    PR.AT-3, PR.AT-4, PR.AT-5.

    NEWLY ADDED
    (N/A)

    MOVED TO
    PR.AT-1, PR.AT-2.
    PR.DSData Security. Data Protection and Asset Management:

    Information and records are properly protected and managed, and it should align consistently with organization's risk strategy to protect the cybersecurity TRIAD (Confidentiality, Integrity, and Availability) of these information.
    PR.DS-1, PR.DS-2, PR.DS-10, PR.DS-11
    PR.DS-1:

    All data (payment card information, PII's, or even physical storage file rooms, and more), all these are data at rest should and must be protected. Ensuring their confidentiality, integrity, and availability.

    PR.DS-2:

    All Data in Transit (Moving from one location to another) should and must be protected.Ensuring their confidentiality, integrity, and availability.

    PR.DS-10:

    All Data in use, should and must be protected.Ensuring their confidentiality, integrity, and availability.

    PR.DS-11:

    All Data should have their backups created, protected, maintained, and tested.

    WITHDRAWN
    PR.DS-3,PR.DS-4,PR.DS-5,
    PR.DS-6,PR.DS-7,PR.DS-8.

    NEWLY ADDED
    PR.DS-10,PR.DS-11.

    MOVED TO
    Read Top of Page
    SUBCATEGORIES NOW INCORPORATED INTO.
    PR.PSPlatform Security Strategy To Ensure The Protection of All Platforms:

    All hardware, softwares (e.g. firmware, operating systems, applications), are to be consistently managed, adhering to the organizations risk strategy, to ensure the protection of their confidentiality, integrity, and availability.
    PR.PS-1, PR.PS-2, PR.PS-3, PR.PS-4, PR.PS-5, PR.PS-6
    PR.PS-1:

    Configuration management practises are to be established and applied.

    PR.PS-2:

    Software is maintained,replaced, and removed inline with risk.

    PR.PS-3:

    Hardware is maintained,replaced, and removed inline with risk.

    PR.PS-4:

    Log records are to be generated and made available for continuous monitoring.

    PR.PS-5:

    Installation and execution of unauthorized softwares, are prevented.

    PR.PS-6:

    Integrating secure software development practises, and their performance monitored throughout the software development life cycle.

    WITHDRAWN
    (N/A)

    NEWLY ADDED
    (N/A)

    MOVED TO
    (N/A)
    PR.IRTechnology Infrastructure Resilience Managing Security Architecture:

    Security architecture are properly managed, with the organization's risk strategy, ensuring the protection of its assets confidentiality, integrity, and availability, and organizational resilience.
    PR.IR-1, PR.IR-2, PR.IR-3, PR.IR-4
    PR.IR-1:

    All networks and environments are to be protected from unauthorized logical access, and usage.

    PR.IR-2:

    All organization's technology assets are protected from enviromental threats.

    PR.IR-3:

    Implementing mechanisms to attain resilience requirements in normal and adverse situations.

    PR.IR-4:

    Maintaining availability through the provision of adequate resource capacity.

    WITHDRAWN
    (N/A)

    NEWLY ADDED
    (N/A)

    MOVED TO
    (N/A)