Framework Profile represents
Represents the outcomes based on business needs an organization has selected from the Framework Categories and Subcategories.
Current Profile
Indicated the cyber security outcomes that are currently being achieved.
Target Profile
Indicates the outcomes needed to achieve the desired cyber security risk management goals
What are the tiers of Framework implementation?
What is the partial risk management process?
Organizational cyber security risk management practices are not formalized, and risk is managed in an ad how and sometimes reactive manner.
Partial Integrated Risk Management Program?
There is limited awareness of cyber security risk at the organizational level and an organizational-wide approach to managing cyber security risk has not been established.
Partial External Partcipation
The organization is usually unaware of the cyber supply chain risks of the products and services it provides and that it uses.
Risk Informed (Risk Management)
Prioritization of cyber security is directly informed by organizational risk objectives, the threat environment, or business/mission requirements.
Risk Informed (Integrated Risk Management Program)
Cyber security is shared within the organization on an informal basis.
Risk Informed(External Participation)
The organization collaborated with and receives some information from other entities and generated some of its own information, but may not share information with others.
Repeatable (Risk Management Process)
Organizational cyber security practices are regularly updated based on the application of risk management processes to changes in business/mission requirements and a changing threat and technology landscape.
Repeatable (Integrated Risk Management Program)
Risk-Informed policies, processes, and procedures are defined implemented as intended, and reviewed.
Repeatable (External Partcipation)
It collaborates with and receives information from other entities regularly that complements internally generated information, and shares information with other entities.
Adaptive (Risk Management Process)
The organization adapts its cybersecurity practices based on previous and current cybersecurity activities, including lessons learned and predictive indicators
Adaptive (Integrated Risk Management Program)
The organization can quickly and efficiently account for changes to business/mission objectives in how risk is approached and communicated.
Adaptive (External Participation)
The organization understands its role, dependencies, and dependents in the larger ecosystem and contributes to the community’s broader understanding of risks.
Functions
Organize basic cybersecurity activities at their highest level.
Categories
Are the subdivisions of a function into groups of cybersecurity outcomes closely tied to programmatic needs and particular activities.
Subcategories
Further divide a category into specific outcomes of technical and/or management activities.
Informative References
Are specific sections of standards, guidelines, and practices common among critical infrastructure sectors that illustrate a method to achieve the outcomes associated with each subcategory.
5 types of cybersecurity framework
Identify
Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities
Protect
Develop and implement appropriate safeguards to ensure delivery of critical services
Detect
Develop and implement appropriate activities to identify the occurrence of a cybersecurity event