Skip to content

Latest commit

 

History

History
51 lines (42 loc) · 1.28 KB

README.md

File metadata and controls

51 lines (42 loc) · 1.28 KB

Cybersecurity

Cybersecurity is the measures taken to protect networks, devices, and data against cyberattacks

Steps

Identify

Assess risk and determine what assets to protect

  • Asset Management
  • Business Environment
  • Governance
  • Risk Assessment
  • Risk Management Strategy
  • Supply Chain Risk Management

Protect

Implement appropriate safeguards to limit and prevent any impact resulting from a cybersecurity event

  • Identity Management
  • Authentication and Access Control
  • Awareness & Training
  • Data Security
  • Info Protection & Procedures
  • Maintenance
  • Protective Technology

Detect

Implement appropriate methods to discover a cybersecurity event

  • Anomalies & Events
  • Security Continuous Monitoring
  • Detection Process

Respond

Implement appropriate methods to take action when a cybersecurity incident is discovered

  • Response Planning
  • Communications
  • Analysis
  • Mitigation
  • Improvements

Recover

Implement appropriate methods to restore impacted functionalities

  • Response Planning
  • Improvements
  • Communications

ID

5482f7f1-7229-43a1-a1b1-c9742529b931

References