ID. Identify your context
ID.AM Identify all relevant assets.
ID.BE Identify business environment.
ID.GV Identify governance framework.
ID.RA Identify threats and vulnerabilities.
ID.RM Identify risk management strategy.
ID.SC Identify strategy for supply chains.
PR. Protect your assets
PR.AC Protect assets by managing access.
PR.AT Protect assets by managing awareness.
PR.DS Protect assets by managing data security.
PR.IP Protect assets by managing information.
PR.MA Protect assets by managing maintenance.
PR.PT Protect assets by managing technologies.
DE. Detect your anomalies
DE.AE Detect anomalies by analyzing events.
DE.CM Detect anomalies by monitoring systems.
DE.DP Detect anomalies by maintaining processes.
RS. Respond to incidents
RS.RP Respond to incidents by controlling steps.
RS.CO Respond to incidents by coordinating action.
RS.AN Respond to incidents by analyzing the situation.
RS.MI Respond to incidents by mitigating the damage.
RS.IM Respond to incidents by making improvements.
RC. Recover from incidents
RC.RP Recover from incidents by controlling steps.
RC.IM Recover from incidents by making improvements.
RC.CO Recover from incidents by coordinating activities.
Also check out our Plain English Overview of NIST's Privacy Framework.
Updated on August 23, 2021. First
published on January 18, 2020.
firstname.lastname@example.org email@example.com 780-461-4514
Restrictions on the Use of this Page
Copyright © 2020-2021 by Praxiom Research Group Ltd. All Rights Reserved.