Within NIST, there are five functions of the framework:
- Identify – Determine what assets are at risk
- Protect – Take steps to safeguard your IT assets
- Detect – Routinely monitor to alert for problems
- Respond – Plan for the worst and be ready to act
- Recover – Get back to normal after a breach
Notice something in “recover”? It is assumed that you will need to get back to normal after a breach. In other words, it is assumed that at some point you will face a successful cyber-attack and part of being ready is having the right documentation, plans and controls. The webinar goes into more detail on where to get the specific documentation to help you create your plans.
While this type of framework can be implemented by many IT folks to a greater or lesser degree, it has emerged as a specialty within the cybersecurity world. What is certain is that if an organization is looking to implement a framework then they need an internal champion and/or an external consultant to drive the process – again to the level of sophistication based on the risk of your situation.