Cybersecurity is the measures taken to protect networks, devices, and data against cyberattacks
Assess risk and determine what assets to protect
- Asset Management
- Business Environment
- Governance
- Risk Assessment
- Risk Management Strategy
- Supply Chain Risk Management
Implement appropriate safeguards to limit and prevent any impact resulting from a cybersecurity event
- Identity Management
- Authentication and Access Control
- Awareness & Training
- Data Security
- Info Protection & Procedures
- Maintenance
- Protective Technology
Implement appropriate methods to discover a cybersecurity event
- Anomalies & Events
- Security Continuous Monitoring
- Detection Process
Implement appropriate methods to take action when a cybersecurity incident is discovered
- Response Planning
- Communications
- Analysis
- Mitigation
- Improvements
Implement appropriate methods to restore impacted functionalities
- Response Planning
- Improvements
- Communications
5482f7f1-7229-43a1-a1b1-c9742529b931