Skip to content

Latest commit

 

History

History
105 lines (68 loc) · 11 KB

govern.md

File metadata and controls

105 lines (68 loc) · 11 KB

Govern

Download free policy and standard templates for the NIST CSF 2.0 Govern Core Function, which ensures that a small business's cybersecurity risk management strategy, expectations, and overall policy are established, communicated, and monitored.

Govern Function Background

The Govern Function ensures that an organization’s cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored. It provides insights to help prioritize and achieve the outcomes of the other five Core Functions in line with the organization’s mission and stakeholder expectations. Governance activities are essential for integrating cybersecurity into the broader enterprise risk management strategy.

The Govern function encompasses understanding the organizational context, establishing the cybersecurity strategy and supply chain risk management, defining roles and responsibilities, creating policies, and overseeing cybersecurity initiatives. The Govern Function is comprised of Categories. These Categories break down the Function into more specific outcomes and activities, providing a structured approach for organizations to manage and implement cybersecurity practices.

Govern Policy Templates

The following policy and standard templates help ensure that the NIST CSF Govern categories are adequately addressed, including Organizational Context; Risk Management Strategy, Roles, Responsibilities, and Authorities; Policy; and Oversight:

Visit Template Instructions for help completing these templates and the Implementation Guide for tips on how to implement these policies and standards once the templates are completed.

Information Security Policy

  • Description: This general Information Security Policy establishes the minimum mandatory requirements for information security within the organization. While organizations can exceed these requirements based on specific business needs and legal obligations, they must meet the baseline standards set forth in this policy.
  • Word Template Link: Information-Security-Policy.docx
  • Primary NIST CSF 2.0 Category: Policy

Acceptable Use of Information Technology Resources Policy

  • Description: The Acceptable Use of Information Technology Resources Policy outlines the proper use of information and technology resources within the organization, emphasizing the importance of workforce participation and support for effective security. Inappropriate usage can lead to significant risks, including ransomware attacks, system compromises, and legal issues.
  • Word Template Link: Acceptable-Use-of-Information-Technology-Resources-Policy.docx
  • Primary NIST CSF 2.0 Category: Policy

Planning Policy

  • Description: The Planning Policy ensures that IT resources and information systems are established with effective security controls and control enhancements that reflect applicable federal and state laws, Executive Orders, directives, regulations, policies, standards, and guidance.
  • Word Template Link: Planning-Policy.docx
  • Primary NIST CSF 2.0 Category: Oversight

Personnel Security Policy

  • Description: The Personnel Security Policy ensures that safeguards are implemented for personnel access to and use of information technology resources and data. This policy establishes protocols to verify the trustworthiness of personnel, mitigating risks related to insider threats and ensuring that only authorized individuals have access to sensitive information. It is crucial for protecting the organization’s information assets and maintaining overall security.
  • Word Template Link: Personnel-Security-Policy.docx
  • Primary NIST CSF 2.0 Category: Roles, Responsibilities, and Authorities

Systems and Services Acquisition Policy

Information Security Risk Management Standard

  • Description: The Information Security Risk Management Standard is vital for identifying, analyzing, and maintaining acceptable levels of risk to confidentiality, integrity, and availability. Regular risk assessments enable management to prioritize the most critical information assets, supporting informed decision-making. Compliance with federal and state mandates requires routine assessments to identify risks and implement necessary controls. Addressing security risks early is more cost-effective than dealing with incidents later. This standard provides a framework for evaluating the current security posture, identifying gaps, and determining appropriate actions.
  • Word Template Link: Information-Security-Risk-Management-Standard.docx
  • Primary NIST CSF 2.0 Category: Risk Management Strategy

NIST CSF Govern Categories

The Govern Function is comprised of a set of governance-focused Categories designed to help organizations strengthen their cybersecurity posture. These Govern Categories are designed to enhance the management and oversight of cybersecurity risks at an organizational level. These Categories emphasize leadership commitment, risk management governance, and organizational alignment with cybersecurity goals, ensuring that cybersecurity is integrated into the broader business strategy. A list and description of each specific Govern Category can be found below:

NIST CSF 2.0 Govern Categories

Organizational Context

  • Description: The circumstances — mission, stakeholder expectations, dependencies, and legal, regulatory, and contractual requirements — surrounding the organization’s cybersecurity risk management decisions are understood
  • NIST CSF 2.0 Identifier: GV.OC

Risk Management Strategy

  • Description: The organization’s priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions
  • NIST CSF 2.0 Identifier: GV.RM

Roles, Responsibilities, and Authorities

  • Description: Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated
  • NIST CSF 2.0 Identifier: GV.RR

Policy

  • Description: Organizational cybersecurity policy is established, communicated, and enforced
  • NIST CSF 2.0 Identifier: GV.PO

Oversight

  • Description: Results of organization-wide cybersecurity risk management activities and performance are used to inform, improve, and adjust the risk management strategy
  • NIST CSF 2.0 Identifier: GV.OV

Cybersecurity Supply Chain Risk Management

  • Description: Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders
  • NIST CSF 2.0 Identifier: GV.SC

References