Cybersecurity Framework

Use NIST's Framework to manage and control your cybersecurity threats and attacks.
Use it to protect critical infrastructure and to safeguard the health, safety, security,
and privacy of customers, employees, and other interested parties. For more
detail, see NIST's Cybersecurity Framework Translated into Plain English.

Also use NIST's Privacy Framework to manage and control your privacy risks.

ID. Identify your context

ID.AM Identify all relevant assets.

ID.BE Identify business environment.

ID.GV Identify governance framework.

ID.RA Identify threats and vulnerabilities.

ID.RM Identify risk management strategy.

ID.SC Identify strategy for supply chains.

PR. Protect your assets

PR.AC Protect assets by managing access.

PR.AT Protect assets by managing awareness.

PR.DS Protect assets by managing data security.

PR.IP Protect assets by managing information. 

PR.MA Protect assets by managing maintenance.

PR.PT Protect assets by managing technologies.

DE. Detect your anomalies

DE.AE Detect anomalies by analyzing events.

DE.CM Detect anomalies by monitoring systems.

DE.DP Detect anomalies by maintaining processes.

RS. Respond to incidents

RS.RP Respond to incidents by controlling steps.

RS.CO Respond to incidents by coordinating action.

RS.AN Respond to incidents by analyzing the situation.

RS.MI Respond to incidents by mitigating the damage.

RS.IM Respond to incidents by making improvements.

RC. Recover from incidents

RC.RP Recover from incidents by controlling steps.

RC.IM Recover from incidents by making improvements.

RC.CO Recover from incidents by coordinating activities.

 If you'd like to see how we've translated each of the above sections into
Plain English, please check out our more detailed Cybersecurity Framework.

NIST Cybersecurity Framework

 Also check out our Plain English Overview of NIST's Privacy Framework.


InfoGraphics for NIST Cybersecurity

Introduction to Cybersecurity Framework

Structure of NIST Cybersecurity Framework

Cybersecurity Framework in Plain English

How to Create a Cybersecurity Program

Cybersecurity Implementation Tiers

Cybersecurity Privacy Principles

Cybersecurity Audit Checklist

Cybersecurity Audit Tool

Updated on August 23, 2021. First published on January 18, 2020.

Home Page

Our Library

A to Z Index


How to Order

Our Products

Our Prices

Guarantee                             780-461-4514

Legal Restrictions on the Use of this Page
Thank you for visiting this web page. You are, of course, welcome to view our material as often
as you wish, free of charge. And as long as you keep intact all copyright notices, you are also
welcome to print or make one copy of this page for your own personal, noncommercial,
home use. But, you are not legally authorized to print or produce additional copies or to
copy and paste any of our material onto another web site or to republish it in any way.

Copyright 2020-2021 by Praxiom Research Group Ltd. All Rights Reserved.

Praxiom Research Group Limited