ID. Identify your contextID.AM Identify all relevant assets. ID.BE Identify business environment. ID.GV Identify governance framework. ID.RA Identify threats and vulnerabilities. ID.RM Identify risk management strategy. ID.SC Identify strategy for supply chains. PR. Protect your assetsPR.AC Protect assets by managing access. PR.AT Protect assets by managing awareness. PR.DS Protect assets by managing data security. PR.IP Protect assets by managing information. PR.MA Protect assets by managing maintenance. PR.PT Protect assets by managing technologies. DE. Detect your anomaliesDE.AE Detect anomalies by analyzing events. DE.CM Detect anomalies by monitoring systems. DE.DP Detect anomalies by maintaining processes. RS. Respond to incidentsRS.RP Respond to incidents by controlling steps. RS.CO Respond to incidents by coordinating action. RS.AN Respond to incidents by analyzing the situation. RS.MI Respond to incidents by mitigating the damage. RS.IM Respond to incidents by making improvements. RC. Recover from incidentsRC.RP Recover from incidents by controlling steps. RC.IM Recover from incidents by making improvements. RC.CO Recover from incidents by coordinating activities. |
Also check out our Plain English Overview of NIST's Privacy Framework.
Updated on August 23, 2021. First
published on January 18, 2020.
praxiom@gmail.com help@praxiom.com 780-461-4514 |
Legal
Restrictions on the Use of this Page Copyright © 2020-2021 by Praxiom Research Group Ltd. All Rights Reserved. |