SlideShare a Scribd company logo
4
Most read
6
Most read
9
Most read
NIST CSF
CP 100 - Pune
Objectives of CSF in a Nutshell
Describe Current
Security Posture
Describe Target Security
Posture
Continuous
Improvement
Assess Progress towards
Target Posture
Communicate Risk
A framework of Frameworks
ISA62443
ISO/IEC 27001
CCS CSC1
NIST SP 800 - 53
COBIT 5
NIST cyber security Framework
Framework Profile
(Where you are and where you
want to go)
Framework
Implementation Tiers
(How you view cybersecurity)
Framework
Core
(What it does)
•Defines (measures) current state
•Defines (measures) desired state
•Tiers (4) that show how
cybersecurity risks and processes are
viewed within an organization
•Required Tier based on perceived
risk/benefit analysis
•Identify
•Protect
•Detect
•Restore
•Recover
High Level overview of the framework
Framework
Core
Identify
Detect
RespondRecover
Protect
The Framework Core
Framework core functions explained..
Identify
• Understand what’s important to the business and what the risks are
Protect
• Develop safeguards to ensure CIA
Detect
• Find bad things
Respond
• What you do when bad things happen
Recover
• How to restore what the bad guys broke
Structure
Microsoft Excel
Worksheet
Function
Unique
Identifier
Function
Category
Unique
Identifier
Category
Subcategor
y
Informative
References
ID Identify
ID.AM-1
Asset
Manageme
nt
Physical
devices
within the
organization
are
inventoried
• CCS-
CSC1
• COBIT 5
• ISA-
62443-2-
1:2009
ID.AM-2
Asset
Manageme
nt
Software
Platforms
and
Applications
within the
organization
are
inventoried
• CCS-
CSC1
• COBIT 5
• ISA-
62443-2-
1:2009
Structured example
Framework Implementation Tiers
• How cybersecurity risks and processes are
viewed within organization
Partial
Risk
Informed
Repeatable
Adaptable
Sophistication
Framework profile
• Presents overview of present
and future cybersecurity
posture
– Business Requirements
– Risk Tolerance
– Resources
• Used to define current state
and desired state
– Can help measure progress...
A Common Language for All Levels
Priorities
Risk Appetite
Budget
Framework
Profile
Implementation Progress
Vulnerabilities, Threats,
Assets
Status,
Changes in
Risk
Executive Level
Focus: Organizational risk
Actions: Risk Decision/Priority
Operations Level
Focus: Risk Management Implementation
Actions: Secure Infrastructure, Implement Profile
Process Level
Focus: Risk Management
Actions: Select Profile, Allocate Budget
Process
Prioritize
and Scope
Business
Objectives
Priorities Strategy
Orient
Related
Systems
Assets Regulations
Risk
Assessment
Exposure Tolerance
Create
Current
Profile
Where you
are now
Create
Target
Profile
Where you
need to be
Gap
Analysis
Delta between
Current/Target
Action Plan MEASURE
How is NIST CSF Different?
• Expresses cybersecurity activities in a common
language
• Leverages existing standards – does not reinvent
the wheel – can map existing
processes/guidelines into CSF
• Provides crucial guidance for reinforcing security
controls while maintaining a focus on business
objectives
• Provides a vehicle to effectively measure
cybersecurity effectiveness independent of
existing framework
Thank you

More Related Content

PPTX
NIST Critical Security Framework (CSF)
PDF
NIST cybersecurity framework
PPTX
Cyber Defense Matrix: Reloaded
PDF
Cybersecurity Roadmap Development for Executives
PPTX
NIST CyberSecurity Framework: An Overview
PDF
NIST Cybersecurity Framework 101
PDF
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
NIST Critical Security Framework (CSF)
NIST cybersecurity framework
Cyber Defense Matrix: Reloaded
Cybersecurity Roadmap Development for Executives
NIST CyberSecurity Framework: An Overview
NIST Cybersecurity Framework 101
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...

What's hot (20)

PDF
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
PPTX
New Paradigms for the Next Era of Security
PDF
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
PDF
Information Security Strategic Management
PDF
The OCTAVE Method
PDF
Guide to Risk Management Framework (RMF)
PPTX
Information & Cyber Security Risk
PPTX
How to implement NIST cybersecurity standards in my organization
PDF
SOC Certification Runbook Template
PDF
Strategy considerations for building a security operations center
PDF
Lessons Learned from the NIST CSF
PDF
NIST Cybersecurity Framework (CSF) 2.0 Workshop
PPTX
Iso27001 Risk Assessment Approach
PPTX
Zero Trust and Data Security
PPTX
CISSP - Chapter 1 - Security Concepts
PDF
NIST SP 800 30 Flow Chart
PPTX
Cyber kill chain
PPTX
Cyber Defense Matrix: Revolutions
PDF
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
PPTX
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
New Paradigms for the Next Era of Security
Microsoft-CISO-Workshop-Security-Strategy-and-Program (1).pdf
Information Security Strategic Management
The OCTAVE Method
Guide to Risk Management Framework (RMF)
Information & Cyber Security Risk
How to implement NIST cybersecurity standards in my organization
SOC Certification Runbook Template
Strategy considerations for building a security operations center
Lessons Learned from the NIST CSF
NIST Cybersecurity Framework (CSF) 2.0 Workshop
Iso27001 Risk Assessment Approach
Zero Trust and Data Security
CISSP - Chapter 1 - Security Concepts
NIST SP 800 30 Flow Chart
Cyber kill chain
Cyber Defense Matrix: Revolutions
NIST Cybersecurity Framework (CSF) 2.0: What has changed?
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Ad

Similar to NIST CSF Overview (20)

PDF
PPTX
DOC-20250530-WA0008.pptx.................
PDF
INFORMATION SECURITY MATURITY MODEL FOR NIST CYBER SECURITY FRAMEWORK Sultan
PPTX
Conducting a NIST Cybersecurity Framework (CSF) Assessment
PPTX
Keynote Session : NIST - Cyber Security Framework Measuring Security
PPTX
Sdl deployment in ics
PPTX
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
PPTX
Building Your Information Security Program: Frameworks & Metrics
PPTX
Verifikasi dan Validasi keamanan informasi
PPTX
Making security champions in organization
PPTX
Shah Sheik Building a CSoC v1.2 DEFCAMP.pptx
PPTX
the role of 27001 in cybersecurity pp.pptx
PDF
Alienvault how to build a security operations center (on a budget) (2017, a...
PDF
Secure immediate PDF access to every chapter of MIS Essentials 4th Edition Kr...
PPTX
Overcoming Security Challenges in DevOps
PPTX
7 Steps to Build a SOC with Limited Resources
PPTX
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
PPTX
Career In Information security
PPTX
Cloud Security Assessment Methods.pptx
PPTX
DOC-20250530-WA0008.pptx.................
INFORMATION SECURITY MATURITY MODEL FOR NIST CYBER SECURITY FRAMEWORK Sultan
Conducting a NIST Cybersecurity Framework (CSF) Assessment
Keynote Session : NIST - Cyber Security Framework Measuring Security
Sdl deployment in ics
Diskusi buku: Securing an IT Organization through Governance, Risk Management...
Building Your Information Security Program: Frameworks & Metrics
Verifikasi dan Validasi keamanan informasi
Making security champions in organization
Shah Sheik Building a CSoC v1.2 DEFCAMP.pptx
the role of 27001 in cybersecurity pp.pptx
Alienvault how to build a security operations center (on a budget) (2017, a...
Secure immediate PDF access to every chapter of MIS Essentials 4th Edition Kr...
Overcoming Security Challenges in DevOps
7 Steps to Build a SOC with Limited Resources
Stop Chasing the Version: Compliance with CIPv5 through CIPv99
Career In Information security
Cloud Security Assessment Methods.pptx
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
KodekX | Application Modernization Development
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
cuic standard and advanced reporting.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Empathic Computing: Creating Shared Understanding
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PPT
Teaching material agriculture food technology
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Network Security Unit 5.pdf for BCA BBA.
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Diabetes mellitus diagnosis method based random forest with bat algorithm
CIFDAQ's Market Insight: SEC Turns Pro Crypto
KodekX | Application Modernization Development
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
GamePlan Trading System Review: Professional Trader's Honest Take
Mobile App Security Testing_ A Comprehensive Guide.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Electronic commerce courselecture one. Pdf
cuic standard and advanced reporting.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks
Empathic Computing: Creating Shared Understanding
Advanced Soft Computing BINUS July 2025.pdf
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Teaching material agriculture food technology
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

NIST CSF Overview

  • 2. Objectives of CSF in a Nutshell Describe Current Security Posture Describe Target Security Posture Continuous Improvement Assess Progress towards Target Posture Communicate Risk
  • 3. A framework of Frameworks ISA62443 ISO/IEC 27001 CCS CSC1 NIST SP 800 - 53 COBIT 5 NIST cyber security Framework
  • 4. Framework Profile (Where you are and where you want to go) Framework Implementation Tiers (How you view cybersecurity) Framework Core (What it does) •Defines (measures) current state •Defines (measures) desired state •Tiers (4) that show how cybersecurity risks and processes are viewed within an organization •Required Tier based on perceived risk/benefit analysis •Identify •Protect •Detect •Restore •Recover High Level overview of the framework
  • 6. Framework core functions explained.. Identify • Understand what’s important to the business and what the risks are Protect • Develop safeguards to ensure CIA Detect • Find bad things Respond • What you do when bad things happen Recover • How to restore what the bad guys broke
  • 8. Function Unique Identifier Function Category Unique Identifier Category Subcategor y Informative References ID Identify ID.AM-1 Asset Manageme nt Physical devices within the organization are inventoried • CCS- CSC1 • COBIT 5 • ISA- 62443-2- 1:2009 ID.AM-2 Asset Manageme nt Software Platforms and Applications within the organization are inventoried • CCS- CSC1 • COBIT 5 • ISA- 62443-2- 1:2009 Structured example
  • 9. Framework Implementation Tiers • How cybersecurity risks and processes are viewed within organization Partial Risk Informed Repeatable Adaptable Sophistication
  • 10. Framework profile • Presents overview of present and future cybersecurity posture – Business Requirements – Risk Tolerance – Resources • Used to define current state and desired state – Can help measure progress...
  • 11. A Common Language for All Levels Priorities Risk Appetite Budget Framework Profile Implementation Progress Vulnerabilities, Threats, Assets Status, Changes in Risk Executive Level Focus: Organizational risk Actions: Risk Decision/Priority Operations Level Focus: Risk Management Implementation Actions: Secure Infrastructure, Implement Profile Process Level Focus: Risk Management Actions: Select Profile, Allocate Budget
  • 12. Process Prioritize and Scope Business Objectives Priorities Strategy Orient Related Systems Assets Regulations Risk Assessment Exposure Tolerance Create Current Profile Where you are now Create Target Profile Where you need to be Gap Analysis Delta between Current/Target Action Plan MEASURE
  • 13. How is NIST CSF Different? • Expresses cybersecurity activities in a common language • Leverages existing standards – does not reinvent the wheel – can map existing processes/guidelines into CSF • Provides crucial guidance for reinforcing security controls while maintaining a focus on business objectives • Provides a vehicle to effectively measure cybersecurity effectiveness independent of existing framework