EmberSec
  • Home
  • Solutions
    • Services >
      • Technical Services
      • Managed Detection & Response
      • Governance, Risk, & Compliance
    • vCISO
    • Remote Work
    • Utilities
  • Resources
    • Partner Program
    • Blog
    • Webinars
  • About
    • Why EmberSec
    • News
  • Partners
    • FireEye
    • Fortinet
    • ATT
  • Contact

Blog

THE NIST Framework as cyber best practice

1/13/2020

 

By Bradley Wolfenden

For the majority of organizations, regardless of size, any mention of the word ‘cybersecurity’ can lead to some serious anxiety. Whether that anxiety is the result of a lack of general awareness, limited internal expertise, absence of a response plan, restricted budgets, or a myriad of other triggers, there is no doubt that the complex web of cyber best practices can be daunting.
 
To help calm this overwhelming reality, many business leaders will turn to one of several existing cybersecurity frameworks as a starting place. These frameworks provide guidance around managing risk, foster improved communications, allow for scalability in application, and can support recruitment and hiring of cyber talent. For this blog post the EmberSec team digs in on the NIST Cybersecurity Framework to share how it can be leveraged to improve your overall cybersecurity strategy. We chose to focus this blog specifically on the NIST Framework due to our D.o.D. and government heritage, rich experience working with it, and due cause how it takes a threat-based approach to cybersecurity.
The NIST Cybersecurity Framework: A History
​

Since the publication of the Preliminary Framework was released in 2013, several iterations and revisions have been made available by NIST to better reflect the constantly evolving nature of cybersecurity, developments in technology, the emergence of new industry sectors, the state of adversaries, and the needs of its user base.


Picture
​Because of the NIST Cybersecurity Framework’s inherent flexibility and versatility, and evolution of the framework, adoption of the Framework both domestically and internationally has grown.

Why Adopt a Framework

At a very basic layer, cybersecurity frameworks provide organizations with a starting point from which to structure and develop their security culture and posture. With built-in customization mechanisms (i.e., tiers, profiles, etc.), oftentimes frameworks can be adjusted for use by any type of organization. When it comes to the NIST Cybersecurity Framework specifically, here are a few ways it can help:
Picture
  • Managing Risk- Organizations have used the NIST Cybersecurity Framework’s tiers to determine optimal levels of risk management. Profiles and implementation plans are being leveraged in prioritizing and budgeting for cybersecurity improvement activities.
  • Communication- Leadership has picked up the lexicon of the Framework and is able to have informed conversations about cybersecurity risk.
  • Scalability- Because the Framework is outcome driven and does not mandate how an organization must achieve those outcomes, it enables scalability. A small organization with a smaller cybersecurity budget, or a large corporation with a significant budget, are each able to approach the outcome in a way that is feasible for them. It is this flexibility that allows the Framework to be utilized by organizations getting started in establishing a cybersecurity program, while still providing value to organizations with mature programs. 
  • Recruitment & Hiring- Taxonomy and common lexicon that describes cybersecurity functions, work roles, etc.
 
 
 
Understanding & Implementing the NIST Cybersecurity Framework

While some organizations may simply look to the NIST Cybersecurity Framework as a reference point to improve their cybersecurity posture and strategy (i.e. the Seven Steps for Improving or Developing a Risk-Informed Cybersecurity Program), others may wish to leverage the Framework as more of a comprehensive solution for structuring their teams, delegating workloads, establishing expectations, and driving common dialogue.
 
For the latter, it’s important to first understand the three primary components used to develop a holistic cybersecurity program.


  1. Framework Profile: This component aligns industry standards and best practices to the Framework Core in an implementation scenario, and supports prioritizations/ measurement while factoring in business needs.
  2. Framework Core: Defined here are the cybersecurity activities and informative references, organized around particular outcomes to better enable communication of cyber risk across an organization.
  3. Framework Implementation Tiers: This component describe how cybersecurity risk is calculated and managed by an organization.
 
Using these pieces of the Framework, organizations are able to identify and prioritize their business requirements and material risks, and then make reasonable and informed cybersecurity decisions that lead to both feasible and cost-effective improvements.
 
Next, kick off a deeper dive below the rote memorization of its five Core Functions and break the Framework down into more digestible pieces using the Categories. So, what are each of the five Core Functions, and what do (or should) they, do?


Picture
​Once the grouping of outcomes from the Framework’s categories have been grasped, you may find it helpful to apply more technical cybersecurity specializations. As an example, Laura Lee, VP of Cyber Training at By Light Professional IT Services, LLC and Adjunct Professor for Graduate Cybersecurity courses at the University of Colorado, Boulder and National University, takes the following approach: 
Picture
In the figure above, Laura suggests four technical cybersecurity specializations as outlined along the vertical axis of the chart. Individuals charged with executing within the ‘Harden’ specialization, for example, have responsibilities across all five of the Core Functions as defined by the NIST cybersecurity framework and operate by hardening everything across the entire enterprise (i.e. not just Windows devices or systems).
 
To put it all together for “real-world” implementation, Laura applies the NIST Cybersecurity Framework, and the related technical cybersecurity specializations, to the typical structure of a security operations center (SOC) in the figure below. 
Picture
​As with other frameworks, the NIST Cybersecurity Framework exists as a template from which organizations can build, grow, transform, or evaluate. Whether you’re looking to capture the current vs. future state of your cybersecurity program, need to analyze your cybersecurity maturity against compliance mandates, or are just starting to build your cybersecurity best practices from scratch, the NIST Cybersecurity Framework encourages efficiency and provides the flexibility and versatility to enable innovation.
 
 
Note: It’s worth calling out that cybersecurity leaders should also consider their respective, industry-specific frameworks (i.e. HITRUST for healthcare, etc.). 
To learn more about how you can utilize the NIST Framework to improve your security posture, check out our Governance, Risk, and Compliance Services
Learn more about Governance, Risk, & Compliance

Comments are closed.

    Archives

    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    June 2020
    May 2020
    April 2020
    March 2020
    February 2020
    January 2020
    December 2019
    November 2019
    October 2019

    Categories

    All

    RSS Feed

Home 
Services 

About 
Events
​Resources
​Contact​
Contact Us
​ (703) 224-1000
info [at] embercybersecurity.com
8484 Westpark Dr.
Suite 600, McLean, VA, 22102
Home 
Services 
About

Events
Resources
​Contact​
Contact Us
​ (703) 224-1000
info [at] embercybersecurity.com
8484 Westpark Dr.
Suite 600, McLean, VA, 22102
Privacy Policy
Picture
© 2020 By Light Professional IT Services LLC. All Rights Reserved.
  • Home
  • Solutions
    • Services >
      • Technical Services
      • Managed Detection & Response
      • Governance, Risk, & Compliance
    • vCISO
    • Remote Work
    • Utilities
  • Resources
    • Partner Program
    • Blog
    • Webinars
  • About
    • Why EmberSec
    • News
  • Partners
    • FireEye
    • Fortinet
    • ATT
  • Contact