↓ Skip to Main Content
CSC Logo

Cyber Security Center

Main Navigation

  • Home
  • NIST CSF
    • What is NIST CSF ?
    • Govern (GV)
      • Organizational Context (GV.OC)
      • Risk Management Strategy (GV.RM)
      • Cybersecurity Supply Chain Risk Management (GV.SC)
      • Roles, Responsibilities, and Authorities (GV.RR)
      • Policies, Processes, and Procedures (GV.PO)
      • Oversight (GV.OV)
    • Identify (ID)
      • Asset Management (ID.AM)
      • Risk Assessment (ID.RA)
      • Improvement (ID.IM)
    • Protect (PR)
      • Identity Management, Authentication, and Access Control (PR.AA)
      • Awareness and Training (PR.AT)
      • Data Security (PR.DS)
      • Platform Security (PR.PS)
      • Technology Infrastructure Resilience (PR.IR)
    • Detect (DE)
      • Continuous Monitoring (DE.CM)
      • Adverse Event Analysis (DE.AE)
    • Respond (RS)
      • Incident Management (RS.MA)
      • Incident Analysis (RS.AN)
      • Incident Response Reporting and Communication (RS.CO)
      • Incident Mitigation (RS.MI)
    • Recover (RC)
      • Incident Recovery Plan Execution (RC.RP)
      • Incident Recovery Communication (RC.CO)
  • Memorable Images
  • Does and Don’ts
  • Security Awareness

GV.RM-01: Do you know the cybersecurity risk objectives for your organization ?

GV.RM-01: Do you know the cybersecurity risk objectives for your organization ?

GV.RM-01: Risk management objectives are established and agreed to by organizational stakeholders. Implementation Examples Example 1: Update near-term …

GV.RM-01: Do you know the cybersecurity risk objectives for your organization ? Read more »

Share this Post
Posted on December 29, 2023

GV.OC-05: Do you have a record of external resources that could affect your organization ?

GV.OC-05: Do you have a record of external resources that could affect your organization ?

GV.OC-05: Outcomes, capabilities, and services that the organization depends on are determined and communicated Implementation Examples Example 1: Create …

GV.OC-05: Do you have a record of external resources that could affect your organization ? Read more »

Share this Post
Posted on December 28, 2023

GV.OC-04: Do you know and share what stakeholders expect from the organization ?

GV.OC-04: Do you know and share what stakeholders expect from the organization ?

GV.OC-04: Critical objectives, capabilities, and services that stakeholders depend on or expect from the organization are determined and …

GV.OC-04: Do you know and share what stakeholders expect from the organization ? Read more »

Share this Post
Posted on December 28, 2023

What is NIST CSF ?

What is NIST CSF ?

NIST CSF, or the National Institute of Standards and Technology Cybersecurity Framework, is a set of guidelines, best …

What is NIST CSF ? Read more »

Share this Post
Posted on December 27, 2023

GV.OC-03: How to manage legal, regulatory, and cybersecurity obligations ?

GV.OC-03: How to manage legal, regulatory, and cybersecurity obligations ?

GV.OC-03: Legal, regulatory, and contractual requirements regarding cybersecurity – including privacy and civil liberties obligations – are understood …

GV.OC-03: How to manage legal, regulatory, and cybersecurity obligations ? Read more »

Share this Post
Posted on December 23, 2023

GV.OC-02: How to determine stakeholders for cybersecurity risk management ?

GV.OC-02: How to determine stakeholders for  cybersecurity risk management ?

GV.OC-02: Internal and external stakeholders are determined, and their needs and expectations regarding cybersecurity risk management are understood. …

GV.OC-02: How to determine stakeholders for cybersecurity risk management ? Read more »

Share this Post
Posted on December 23, 2023

GV.OC-01: How does your organization should share its mission to identify cybersecurity risks ?

GV.OC-01: How does your organization should share its mission to identify cybersecurity risks ?

GV.OC-01: The organizational mission is understood and informs cybersecurity risk management. Example 1: Share the organization’s mission (e.g., …

GV.OC-01: How does your organization should share its mission to identify cybersecurity risks ? Read more »

Share this Post
Posted on December 22, 2023

What are the 10 common security errors that you should avoid ?

What are the 10 common security errors that you should avoid ?

Weak Passwords: Using weak passwords is a common security error. Examples include using simple passwords like “123456” or …

What are the 10 common security errors that you should avoid ? Read more »

Share this Post
Posted on December 9, 2023 Tagged with Social Media

Least Privilege: This is what happens when you give Too Much Authorizations to any User?

Least Privilege: This is what happens when you give Too Much Authorizations to any User?

Least Privilege: This is what happens when you give Too Much Authorizations to any User. Share this Post

Share this Post
Posted on December 4, 2023 Tagged with Authorization, Least Privilege

AI Security: What’s wrong with AI?

AI Security: What’s wrong with AI?

AI Security: Someone is actively trying to hack AI. Share this Post

Share this Post
Posted on March 31, 2023 Tagged with Artificial intelligence (AI)

Posts pagination

1 2 Next

Search

Recent Posts

  • GV.RM-01: Do you know the cybersecurity risk objectives for your organization ?
  • GV.OC-05: Do you have a record of external resources that could affect your organization ?
  • GV.OC-04: Do you know and share what stakeholders expect from the organization ?

Footer Menu

  • Home
  • Authorization
  • Least Privilege
  • Authentication
  • Zero Trust
  • Unauthorized Access
  • Password
  • Multi Factor Authentication (MFA)
  • Artificial intelligence (AI)
  • Social Media
  • Secure Software Development Life Cycle (SSDLC)
  • Phishing Attack
  • Need to Know Principal
  • Permission Matrix
© 2025 Cyber Security Center | Powered by Responsive Theme
Top