Skip to content

Latest commit

 

History

History
179 lines (121 loc) · 16.8 KB

protect.md

File metadata and controls

179 lines (121 loc) · 16.8 KB

Protect

Download free policy and standard templates for the NIST CSF 2.0 Protect Core Function, which focuses on proactive safeguards designed to limit or contain the impact of potential cybersecurity events.

Protect Function Background

The Protect Function defines the necessary safeguards to manage an organization’s cybersecurity risks. After identifying and prioritizing assets and risks, this function focuses on securing those assets to reduce the likelihood and impact of adverse cybersecurity events while enhancing opportunities for success. Key outcomes of the Protect function include identity management, authentication, and access control; security awareness and training; data protection; platform security (securing hardware, software, and services for both physical and virtual platforms); and the resilience of technology infrastructure. The Protect Function is comprised of Categories. These Categories break down the Function into more specific outcomes and activities, providing a structured approach for organizations to manage and implement cybersecurity practices.

Protect Policy Templates

The following policy and standard templates help ensure that the NIST CSF Protect categories are adequately addressed, including Identity Management, Authentication, and Access Control; Awareness and Training; Data Security; Platform Security; and Technology Infrastructure Resilience:

Visit Template Instructions for help completing these templates and the Implementation Guide for tips on how to implement these policies and standards once the templates are completed.

802.11 Wireless Network Security Standard

  • Description: The 802.11 Wireless Network Security Standard establishes controls for 802.11 wireless networks in order to minimize risks to the confidentiality, integrity and availability of information and to support secure access to resources and services over wireless networks.
  • Document Link: 80211-Wireless-Network-Security-Standard.docx
  • Primary NIST CSF 2.0 Category: Technology Infrastructure Resilience

Access Control Policy

Account Management Access Control Standard

Authentication Tokens Standard

  • Description: The Authentication Tokens Standard lists the appropriate authentication tokens that can be used with systems developed or operated that require authenticated access depending on the Authenticator Assurance Level. This document also provides the requirements for management of those authentication devices.
  • Document Link: Authentication-Tokens-Standard.docx
  • Primary NIST CSF 2.0 Category: Identity Management, Authentication, and Access Control

Encryption Standard

  • Description: The Encryption Standard defines the organizational use of encryption. Encryption is a cryptographic operation that is used to enhance security and protect the electronic data (“data”) by transforming readable information (“plaintext”) into unintelligible information (“ciphertext”). Encryption is an effective tool in mitigating the threat of unauthorized access to data.
  • Document Link: Encryption-Standard.docx
  • Primary NIST CSF 2.0 Category: Data Security

Identification and Authentication Policy

Information Classification Standard

  • Description: The Information Classification Standard outlines a classification process and provides procedures for classifying information in a manner that uniformly protects information entrusted to the entity.
  • Document Link: Information-Classification-Standard.docx
  • Primary NIST CSF 2.0 Category: Data Security

Media Protection Policy

  • Description: The Media Protection Policy ensures that Information Technology (IT) controls access to and disposes of media resources in compliance with IT security policies, standards, and procedures.
  • Document Link: Media-Protection-Policy.docx
  • Primary NIST CSF 2.0 Category: Data Security

Mobile Device Security Standard

  • Description: The Mobile Device Security Standard outlines the additional protections required for the use of mobile devices. Mobile devices often need additional protection because their nature generally places them at higher exposure to threats than other client devices that are only used within an entity’s facilities and on the entity’s networks.
  • Document Link: Mobile-Device-Security.docx
  • Primary NIST CSF 2.0 Category: Platform Security

Patch Management Standard

  • Description: The Patch Management Standard outlines how to proactively prevent the exploitation of IT vulnerabilities that exist within an organization. By applying security related software or firmware updates (patches) to applicable IT systems, the expected result is reduced time and money spent dealing with exploits by reducing or eliminating the related vulnerability.
  • Document Link: Patch-Management-Standard.docx
  • Primary NIST CSF 2.0 Category: Platform Security

Physical and Environmental Protection Policy

  • Description: The Physical and Environmental Protection Policy ensures that Information Technology resources are protected by physical and environmental security measures that prevent physical tampering, damage, theft, or unauthorized physical access.
  • Document Link: Physical-and-Environmental-Protection-Policy.docx
  • Primary NIST CSF 2.0 Category: Awareness and Training

Remote Access Standard

Sanitization and Secure Disposal Standard

  • Description: The Sanitization and Secure Disposal Standard outlines applicable media that needs special disposition, and how that media will be disposed, in order to mitigate the risk of unauthorized disclosure of information and to ensure its confidentiality.
  • Document Link: Sanitization-Secure-Disposal-Standard.docx
  • Primary NIST CSF 2.0 Category: Data Security

Security Awareness and Training Policy

System and Communications Protection Policy

System and Information Integrity Policy

  • Description: The System and Information Integrity Policy ensures that Information Technology resources and information systems are established with system integrity monitoring to include areas of concern such as malware, application and source code flaws, industry supplied alerts and remediation of detected or disclosed integrity issues.
  • Document Link: System-and-Information-Integrity-Policy.docx
  • Primary NIST CSF 2.0 Category: Data Security

Secure Coding Standard

  • Description: The Secure Coding Standard ensures that code written is resilient to high-risk threats and to avoid the occurrence of the most common coding errors which create serious vulnerabilities in software. While it is impossible to write code that is completely impervious to all possible attacks, implementing these coding standards throughout information systems will significantly reduce the risk of disclosure, alteration or destruction of information due to software vulnerabilities.
  • Document Link: Secure-Coding-Standard.docx
  • Primary NIST CSF 2.0 Category: Platform Security

NIST CSF 2.0 Protect Categories

The Protect Categories are designed to establish proactive measures that reduce the likelihood of a cybersecurity incident and mitigate potential impact. Key components include access control, data security, awareness and training, and protective technologies to ensure that both technical and organizational safeguards are in place. By strengthening these Categories, organizations can implement robust defenses that prevent unauthorized access, reduce vulnerabilities, and protect sensitive data from both internal and external threats. A list and description of each specific Protect Category can be found below:

NIST CSF 2.0 Protect Categories

Identity Management, Authentication, and Access Control

  • Description: Access to physical and logical assets is limited to authorized users, services, and hardware and managed commensurate with the assessed risk of unauthorized access
  • NIST CSF 2.0 Identifier: PR.AA

Awareness and Training

  • Description: The organization’s personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks
  • NIST CSF 2.0 Identifier: PR.AT

Data Security

  • Description: Data are managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and availability of information
  • NIST CSF 2.0 Identifier: PR.DS

Platform Security

  • Description: The hardware, software (e.g., firmware, operating systems, applications), and services of physical and virtual platforms are managed consistent with the organization’s risk strategy to protect their confidentiality, integrity, and availability
  • NIST CSF 2.0 Identifier: PR.PS

Technology Infrastructure Resilience

  • Description: Security architectures are managed with the organization’s risk strategy to protect asset confidentiality, integrity, and availability, and organizational resilience
  • NIST CSF 2.0 Identifier: PR.IR

Implementation Tasks

  • Access Control: Manage who has access to systems and data, ensuring the principle of least privilege.
  • Data Security: Implement measures to protect data at rest and in transit, such as encryption and tokenization.
  • Awareness and Training: Conduct regular training to ensure employees understand cybersecurity risks and best practices.
  • Protective Technology: Deploy technologies such as firewalls, intrusion detection systems, and endpoint protection.

References