↓ Skip to Main Content
CSC Logo

Cyber Security Center

Main Navigation

  • Home
  • NIST CSF
    • What is NIST CSF ?
    • Govern (GV)
      • Organizational Context (GV.OC)
      • Risk Management Strategy (GV.RM)
      • Cybersecurity Supply Chain Risk Management (GV.SC)
      • Roles, Responsibilities, and Authorities (GV.RR)
      • Policies, Processes, and Procedures (GV.PO)
      • Oversight (GV.OV)
    • Identify (ID)
      • Asset Management (ID.AM)
      • Risk Assessment (ID.RA)
      • Improvement (ID.IM)
    • Protect (PR)
      • Identity Management, Authentication, and Access Control (PR.AA)
      • Awareness and Training (PR.AT)
      • Data Security (PR.DS)
      • Platform Security (PR.PS)
      • Technology Infrastructure Resilience (PR.IR)
    • Detect (DE)
      • Continuous Monitoring (DE.CM)
      • Adverse Event Analysis (DE.AE)
    • Respond (RS)
      • Incident Management (RS.MA)
      • Incident Analysis (RS.AN)
      • Incident Response Reporting and Communication (RS.CO)
      • Incident Mitigation (RS.MI)
    • Recover (RC)
      • Incident Recovery Plan Execution (RC.RP)
      • Incident Recovery Communication (RC.CO)
  • Memorable Images
  • Does and Don’ts
  • Security Awareness

Category: Govern (GV)

Establish and monitor the organization’s cybersecurity risk management strategy, expectations, and policy. The GOVERN Function is cross-cutting and provides outcomes to inform how an organization will achieve and prioritize the outcomes of the other five Functions in the context of its mission and stakeholder expectations. Governance activities are critical for incorporating cybersecurity into an organization’s broader enterprise risk management strategy. GOVERN directs an understanding of organizational context; the establishment of cybersecurity strategy and cybersecurity supply chain risk management; roles, responsibilities, and authorities; policies, processes, and procedures; and the oversight of cybersecurity strategy.

GV.RM-01: Do you know the cybersecurity risk objectives for your organization ?

GV.RM-01: Do you know the cybersecurity risk objectives for your organization ?

GV.RM-01: Risk management objectives are established and agreed to by organizational stakeholders. Implementation Examples Example 1: Update near-term …

GV.RM-01: Do you know the cybersecurity risk objectives for your organization ? Read more »

Share this Post
Posted on December 29, 2023

GV.OC-05: Do you have a record of external resources that could affect your organization ?

GV.OC-05: Do you have a record of external resources that could affect your organization ?

GV.OC-05: Outcomes, capabilities, and services that the organization depends on are determined and communicated Implementation Examples Example 1: Create …

GV.OC-05: Do you have a record of external resources that could affect your organization ? Read more »

Share this Post
Posted on December 28, 2023

GV.OC-04: Do you know and share what stakeholders expect from the organization ?

GV.OC-04: Do you know and share what stakeholders expect from the organization ?

GV.OC-04: Critical objectives, capabilities, and services that stakeholders depend on or expect from the organization are determined and …

GV.OC-04: Do you know and share what stakeholders expect from the organization ? Read more »

Share this Post
Posted on December 28, 2023

GV.OC-03: How to manage legal, regulatory, and cybersecurity obligations ?

GV.OC-03: How to manage legal, regulatory, and cybersecurity obligations ?

GV.OC-03: Legal, regulatory, and contractual requirements regarding cybersecurity – including privacy and civil liberties obligations – are understood …

GV.OC-03: How to manage legal, regulatory, and cybersecurity obligations ? Read more »

Share this Post
Posted on December 23, 2023

GV.OC-02: How to determine stakeholders for cybersecurity risk management ?

GV.OC-02: How to determine stakeholders for  cybersecurity risk management ?

GV.OC-02: Internal and external stakeholders are determined, and their needs and expectations regarding cybersecurity risk management are understood. …

GV.OC-02: How to determine stakeholders for cybersecurity risk management ? Read more »

Share this Post
Posted on December 23, 2023

GV.OC-01: How does your organization should share its mission to identify cybersecurity risks ?

GV.OC-01: How does your organization should share its mission to identify cybersecurity risks ?

GV.OC-01: The organizational mission is understood and informs cybersecurity risk management. Example 1: Share the organization’s mission (e.g., …

GV.OC-01: How does your organization should share its mission to identify cybersecurity risks ? Read more »

Share this Post
Posted on December 22, 2023

Search

Recent Posts

  • GV.RM-01: Do you know the cybersecurity risk objectives for your organization ?
  • GV.OC-05: Do you have a record of external resources that could affect your organization ?
  • GV.OC-04: Do you know and share what stakeholders expect from the organization ?

Footer Menu

  • Home
  • Authorization
  • Least Privilege
  • Authentication
  • Zero Trust
  • Unauthorized Access
  • Password
  • Multi Factor Authentication (MFA)
  • Artificial intelligence (AI)
  • Social Media
  • Secure Software Development Life Cycle (SSDLC)
  • Phishing Attack
  • Need to Know Principal
  • Permission Matrix
© 2025 Cyber Security Center | Powered by Responsive Theme
Top