Skip to content

Latest commit

 

History

History
68 lines (44 loc) · 7.23 KB

detect.md

File metadata and controls

68 lines (44 loc) · 7.23 KB

Detect

Download free policy and standard templates for the NIST CSF 2.0 Detect Core Function, which focuses on identifying possible cybersecurity attacks and compromises in a timely manner.

Detect Function Background

The Detect Function is designed to identify and analyze potential cybersecurity attacks and compromises. It enables the timely detection of anomalies, indicators of compromise, and other events that may signal active threats or incidents. By supporting rapid incident response and recovery, this function emphasizes continuous monitoring and assessment of systems to quickly identify and address emerging risks. The Detect Function is comprised of Categories. These Categories break down the Function into more specific outcomes and activities, providing a structured approach for organizations to manage and implement cybersecurity practices.

Detect Policy Templates

The following policy and standard templates help ensure that the NIST CSF Detect categories are adequately addressed, including Continuous Monitoring and Adverse Event Analysis:

Visit Template Instructions for help completing these templates and the Implementation Guide for tips on how to implement these policies and standards once the templates are completed.

Auditing and Accountability Policy

  • Description: The Auditing and Accountability Policy ensures that Information Technology resources and information systems are established with effective security controls and control enhancements that reflect applicable federal and state laws, Executive Orders, directives, regulations, policies, standards, and guidance.
  • Document Link: Auditing-and-Accountability-Policy.docx
  • Primary NIST CSF 2.0 Category: Continuous Monitoring

Security Logging Standard

  • Description: The Security Logging Standard defines requirements for security log generation, management, storage, disposal, access, and use. Security logs are generated by many sources, including security software, such as antivirus software, firewalls, and intrusion detection and prevention systems; operating systems on servers, workstations, and networking equipment; databases and applications.
  • Document Link: Security-Logging-Standard.docx
  • Primary NIST CSF 2.0 Category: Continuous Monitoring

Vulnerability Scanning Standard

  • Description: The Vulnerability Scanning Standard establishes that vulnerabilities identified through scanning are tracked, evaluated, prioritized and managed until the vulnerabilities are remediated or otherwise appropriately resolved. Managing the vulnerabilities identified during scans ensures that appropriate actions are taken to reduce the potential that these vulnerabilities are exploited and thereby reduce risk of compromise to the confidentiality, integrity and availability of information assets.
  • Document Link: Vulnerability-Scanning-Standard.docx
  • Primary NIST CSF 2.0 Category: Continuous Monitoring

NIST CSF 2.0 Detect Categories

The Detect Categories emphasize the development of processes and tools to monitor systems, analyze threats, and detect anomalies that may indicate potential security incidents. Key components include the establishment of continuous monitoring, anomaly detection, and detection processes to improve the organization's ability to quickly identify and assess potential cybersecurity threats before they escalate. By strengthening these Categories, organizations can improve their situational awareness and enhance their readiness to respond to emerging threats. A list and description of each specific Detect Category can be found below:

NIST CSF 2.0 Detect Categories

Continuous Monitoring

  • Description: Assets are monitored to find anomalies, indicators of compromise, and other potentially adverse events
  • NIST CSF 2.0 Identifier: DE.CM

Adverse Event Analysis

  • Description: Anomalies, indicators of compromise, and other potentially adverse events are analyzed to characterize the events and detect cybersecurity incidents
  • NIST CSF 2.0 Identifier: DE.AE

Implementation Tasks

  • Anomalies and Events: Monitor systems for unusual activity that may indicate a cyber threat.
  • Continuous Monitoring: Utilize automated tools to provide real-time insights into the security posture of the organization.
  • Detection Processes: Establish and maintain procedures for detecting cybersecurity incidents.

References