↓ Skip to Main Content
CSC Logo

Cyber Security Center

Main Navigation

  • Home
  • NIST CSF
    • What is NIST CSF ?
    • Govern (GV)
      • Organizational Context (GV.OC)
      • Risk Management Strategy (GV.RM)
      • Cybersecurity Supply Chain Risk Management (GV.SC)
      • Roles, Responsibilities, and Authorities (GV.RR)
      • Policies, Processes, and Procedures (GV.PO)
      • Oversight (GV.OV)
    • Identify (ID)
      • Asset Management (ID.AM)
      • Risk Assessment (ID.RA)
      • Improvement (ID.IM)
    • Protect (PR)
      • Identity Management, Authentication, and Access Control (PR.AA)
      • Awareness and Training (PR.AT)
      • Data Security (PR.DS)
      • Platform Security (PR.PS)
      • Technology Infrastructure Resilience (PR.IR)
    • Detect (DE)
      • Continuous Monitoring (DE.CM)
      • Adverse Event Analysis (DE.AE)
    • Respond (RS)
      • Incident Management (RS.MA)
      • Incident Analysis (RS.AN)
      • Incident Response Reporting and Communication (RS.CO)
      • Incident Mitigation (RS.MI)
    • Recover (RC)
      • Incident Recovery Plan Execution (RC.RP)
      • Incident Recovery Communication (RC.CO)
  • Memorable Images
  • Does and Don’ts
  • Security Awareness

Category: NIST CSF

The National Institute of Standards and Technology (NIST) provides The Cybersecurity Framework (CSF), which is a set of cybersecurity best practices and recommendations. The CSF makes it easier to understand cyber risks and improve your defenses for all types and sized companies.

The Framework is based on existing standards, guidelines, and practices for organizations to better manage and reduce cybersecurity risk. In addition, it was designed to foster risk and cybersecurity management communications amongst both internal and external organizational stakeholders.

GV.RM-01: Do you know the cybersecurity risk objectives for your organization ?

GV.RM-01: Do you know the cybersecurity risk objectives for your organization ?

GV.RM-01: Risk management objectives are established and agreed to by organizational stakeholders. Implementation Examples Example 1: Update near-term …

GV.RM-01: Do you know the cybersecurity risk objectives for your organization ? Read more »

Share this Post
Posted on December 29, 2023

GV.OC-05: Do you have a record of external resources that could affect your organization ?

GV.OC-05: Do you have a record of external resources that could affect your organization ?

GV.OC-05: Outcomes, capabilities, and services that the organization depends on are determined and communicated Implementation Examples Example 1: Create …

GV.OC-05: Do you have a record of external resources that could affect your organization ? Read more »

Share this Post
Posted on December 28, 2023

GV.OC-04: Do you know and share what stakeholders expect from the organization ?

GV.OC-04: Do you know and share what stakeholders expect from the organization ?

GV.OC-04: Critical objectives, capabilities, and services that stakeholders depend on or expect from the organization are determined and …

GV.OC-04: Do you know and share what stakeholders expect from the organization ? Read more »

Share this Post
Posted on December 28, 2023

What is NIST CSF ?

What is NIST CSF ?

NIST CSF, or the National Institute of Standards and Technology Cybersecurity Framework, is a set of guidelines, best …

What is NIST CSF ? Read more »

Share this Post
Posted on December 27, 2023

GV.OC-03: How to manage legal, regulatory, and cybersecurity obligations ?

GV.OC-03: How to manage legal, regulatory, and cybersecurity obligations ?

GV.OC-03: Legal, regulatory, and contractual requirements regarding cybersecurity – including privacy and civil liberties obligations – are understood …

GV.OC-03: How to manage legal, regulatory, and cybersecurity obligations ? Read more »

Share this Post
Posted on December 23, 2023

GV.OC-02: How to determine stakeholders for cybersecurity risk management ?

GV.OC-02: How to determine stakeholders for  cybersecurity risk management ?

GV.OC-02: Internal and external stakeholders are determined, and their needs and expectations regarding cybersecurity risk management are understood. …

GV.OC-02: How to determine stakeholders for cybersecurity risk management ? Read more »

Share this Post
Posted on December 23, 2023

GV.OC-01: How does your organization should share its mission to identify cybersecurity risks ?

GV.OC-01: How does your organization should share its mission to identify cybersecurity risks ?

GV.OC-01: The organizational mission is understood and informs cybersecurity risk management. Example 1: Share the organization’s mission (e.g., …

GV.OC-01: How does your organization should share its mission to identify cybersecurity risks ? Read more »

Share this Post
Posted on December 22, 2023

Search

Recent Posts

  • GV.RM-01: Do you know the cybersecurity risk objectives for your organization ?
  • GV.OC-05: Do you have a record of external resources that could affect your organization ?
  • GV.OC-04: Do you know and share what stakeholders expect from the organization ?

Footer Menu

  • Home
  • Authorization
  • Least Privilege
  • Authentication
  • Zero Trust
  • Unauthorized Access
  • Password
  • Multi Factor Authentication (MFA)
  • Artificial intelligence (AI)
  • Social Media
  • Secure Software Development Life Cycle (SSDLC)
  • Phishing Attack
  • Need to Know Principal
  • Permission Matrix
© 2025 Cyber Security Center | Powered by Responsive Theme
Top