NIST
          Cybersecurity Framework

Use NIST's Framework to manage and control cybersecurity threats and attacks.
Use it to protect critical infrastructure and to safeguard the health, safety, security,
and privacy of customers, employees, and other interested parties. For more
information, see our more detailed overview of NIST's Framework Core.

ID. Identify your context

ID.AM Identify all relevant assets.

ID.BE Identify business environment.

ID.GV Identify governance framework.

ID.RA Identify threats and vulnerabilities.

ID.RM Identify risk management strategy.

ID.SC Identify strategy for supply chains.

PR. Protect your assets

PR.AC Protect assets by managing access.

PR.AT Protect assets by managing awareness.

PR.DS Protect assets by managing data security.

PR.IP Protect assets by managing information. 

PR.MA Protect assets by managing maintenance.

PR.PT Protect assets by managing technologies.

DE. Detect your anomalies

DE.AE Detect anomalies by analyzing events.

DE.CM Detect anomalies by monitoring systems.

DE.DP Detect anomalies by maintaining processes.

RS. Respond to incidents

RS.RP Respond to incidents by controlling steps.

RS.CO Respond to incidents by coordinating action.

RS.AN Respond to incidents by analyzing the situation.

RS.MI Respond to incidents by mitigating the damage.

RS.IM Respond to incidents by making improvements.

RC. Recover from incidents

RC.RP Recover from incidents by controlling steps.

RC.IM Recover from incidents by making improvements.

RC.CO Recover from incidents by coordinating activities.

NIST Cybersecurity Framework

 If you'd like to see how we've translated each of the above sections into
Plain English, please check out our more detailed Cybersecurity Framework.

OTHER CYBERSECURITY PAGES

Introduction to the NIST Cybersecurity Framework

Detailed Structure of NIST Cybersecurity Framework Core

How to Create a Cybersecurity Program Using NIST Framework

NIST Cybersecurity Framework Core Translated into Plain English

NIST Cybersecurity Privacy Principles Translated into Plain English

NIST Cybersecurity Implementation Tiers Translated into Plain English

Updated on January 30, 2020. First published on January 18, 2020.

Home Page

Our Library

A to Z Index

Customers

How to Order

Our Products

Our Prices

Guarantee

Praxiom Research Group Limited              help@praxiom.com             780-461-4514


Legal Restrictions on the Use of this Page
Thank you for visiting this web page. You are, of course, welcome to view our material as often
as you wish, free of charge. And as long as you keep intact all copyright notices, you are also
welcome to print or make one copy of this page for your own personal, noncommercial,
home use. But, you are not legally authorized to print or produce additional copies or to
copy and paste any of our material onto another web site or to republish it in any way.

Copyright 2020 by Praxiom Research Group Ltd. All Rights Reserved.

Praxiom Research Group Limited