NIST Version 2.0 Cybersecurity Framework Examined

bm
bashis mcw
Published Apr 04, 2024 14:15 PM

The US government's NIST published a new version of its Cybersecurity Framework (CSF), calling it a landmark and the first major update in a decade.

IPVM Image

In this note, we examine the NIST Cybersecurity Framework (CSF) 2.0, what it is, what it covers, and how to take it into account for physical security operators.

***********

***** ********** ** ********** ************* ********** include:

What ** ** ***

****'* ********* ** ********* **** **** existing ********, *********:

  • **** ** *** ********* ** ********** an ************'* *************.
  • ************* *** ************* ***** ** ** conformant, *** ** ********** ******** ** service ****** ** ******** ****.
  • *** **** ********* ** *** ********** to ******** ******* ***************, *** **** it ******** **** ******* *************** ** not *****.

Executive *******

****'* ******************* ********* (*** *.*)***** * *********** ******* **** *** predecessor, *** *.*, ** ** ******* its ************* ****** ******** **************, ****** it ********** ** *** ******** ** organization.

******** ***-************, *** *.* ******** ****-***** guidance ******** *** ************* ** ****** and ******** ************* ***** ** ********** and ************ **** ** * ********** and ********* ******.

***** ************* **** *** *********** ** adapt *** ********* ** ***** ******** needs *** *************, ************** ** *** straightforward. ** **** **** ********* (**** and *****) ** ******** *** ********** current ************* *****, ******* ******** ******** and **********, ****** **************** *** **********, and ******* ******** ******* ** ****** that ********* ********** **** ** ********.

*** *.* **** ********** * ******** that *********** **** *** ********* (********, Protect, ********, *******, *** *******), ********* more ********* ******** ** *** ************* can ********* ************* ******** **** ***** operations.

*** *.* ********* ** * ** page ********:

IPVM Image

CSF *.* ** *.* ***** *******

*** *.* *** ******** *** ***** beyond ******** **************, ****** ** ********** to *** ******** ** ************ *** created * *** '******' ********, ***** serves ** *** *********** ** *** framework, ************ *** ******** **** ********** plays ** ******** ************* *****.

** ********, *** *.* ******* *** focus ** ******** ***** ** *** cybersecurity ****** ***** **** * ******** category ** *** "******" ********, *********** the ******* ********** ** ******** ***** associated **** *****-***** ************* *** ************.

******** **** *********** *** *************** **** been *********** ****** *** *** *** 2.0, *** ***** **** ******* ***:

IPVM Image

CSF *.* *** ******** ******** *** ***** ************

***** *** *.* ******* ********* ** cybersecurity, *** **********, *** **** ********* can ** ******* ** ******* ******** aspects, ********* ******** ******** *** ***** surveillance **********, ***** ************* *** ******* their ******* ******** *******, ****** ****, and ******* ******** ****** *** ************** from ***** ******* *** ******** ***************.

****** *** ******** ***** ** ***** surveillance *** *** **********, ********* ** cameras *** ***** ********** *******. ******** and ********** ******** ******, ********* ******* such ** ************ ****** ** *********, and *************** ****** *** ************** ** improve ********** ********.

********* ******** ******** ** ******* ***** surveillance **********, ********* ****** ********, ******** configurations ** ******* ************ ****** ** camera ***** ** ***** ********** *******, and ********* ********** **** ** ********* detection ******* *** ********* ** ******* identify ********* ** ******** ******** ** the ***** ************ ***********.

******* ******** *** ******** ********* ******** to ***** ************ ********** **** ********** to ******** ******** *********, ********* ********** actions *** ******** ********** **** ** data ****** *** ********** ** ****** rapid ******** ** ***** ************ ********* after ** ********.

CSF *.* *********

***** *** *** *.* ** ********* for *************,********* ***** *****, ************* *** ************* of ******* ******** *** ******** **************, **** **** ********* ********* *** US ******* ********** ******** *** ****** be * *********** *** *** ***********, vendors, ** ******** **** ** ******** with ** ******* ********** ********.

*******, ** *** ************ *** ************* the ********** ** ************** ***** ********, the ************ *** ** ******* ** serious ***** *******, **** ** **** breaches *** ********* ******* **** *** lead ** ******** *** ************ *********** and ******** ********* **** ****.

CSF *.* ************** *** ***************

*** *** *.* ** *** * one-time ****** ************** *** * ******* process **** ******** ********** ********** *** adaptation, ** ***** ******* ********** ****** and ******* ******** ********* *** ********** of **********.

IPVM Image

******** **** ** *** ******** ************** and *********** ** *** ************** ** the ** **********, *** ************'* ********** must ** ******** ** ********* ************* decisions, ********** *** ********** *** ********** of *** ************'* *************, ********* *** video ************ *******, *** ******** *** necessary *********, **** ** ******, ****, training, *** *********.

************* **** ** *********** ********** **** CSF *.*, *** * ************* ********** of *** ************'* ******* ************* ******* is *********, ********* *********** ******** ********, procedures, *** ******** *** *********** ******** assets **** ******* **********.

************** *** ******* ********** ***** *** critical ***** ** ******** ** ************** plan, ***** *** ************ ********** ***** areas ******* ********* ************* *********, ********* video ************, *** ******* ***** ** address ********** ****. **** *** ******* implementing *** ******** ********, ******** ******** policies, *** *********** ********** ********* ** strengthen ************* ******** ****** ******* *** physical *******.

*********** ************* **** ***-**-*** ******** ********** is ******** ** ******** * ********* security *******, **** ************* ************* ************* considerations **** *********** *********, ******** *********** lifecycles, ******** ******** ********, *** ***** surveillance *******.

************* ** ** ******* ****** **** requires ********** ********** *** ***********, ***** regular *********** ** *********** ******** *** proactive ******** ** ***** ** ******** threats *** ******** ** *********** ****** security ******** ** **** ******* *** physical *******.

*********** *** ************** ******* *** ************* progress ** ******** *** ************ *** accountability, **** ******* ******* ******** ****** executives, ***** *******, *** ******** *********** are ******** ** *** ************'* ************* efforts.

************* ****** ******* ******* ******** ***** to ****** **** ********* ********** *** policies **** ** ********, ** **** as ************** ****** ** ******** ************* and ******** *********** *****, ***** ** new *******, *** ****** **** ************* measures ****** ****** *** **-**-****.

CSF *.* **** ********* *** **********

*** *** *.* **** ** * structured ********* *** ************* ******** ********* by ********, ********, *** ***********. ** is ********* ** **** **** ***** results *** *** * ********* ** specific ******* ** ** ***** *** rather ******* * ***** *** ** goals **** ************* *** ****** ** their ***** *** *************.

IPVM Image

****** *.* ********* ********** *********** *** ************* ** *** CSF *.* **** *********, ******** **** human *** *******-******** ******** *** ********* options *** *********** **********, **** *** overview:

IPVM Image

**** ** *** *** ******** ** CSF *.*, ***** ******* ** **********, prioritizing, **********, *** *********** ************** ************* risk ********** **********, ********, *** ********** to **** *** ********'* ******** *****, where:

'************** *******'******* ** *** ************** *******, ***** it ** ********* ** ********** *** organization's ****** *************, *********** ************, ************, and ******* *****, **********, *** *********** requirements, ***** **** *** ***** *** effective ************* **** ********** *********.

'**** ********** ********'** ******* * ****** **** ********** strategy **** ******** ******** *** ************'* priorities, ***********, *** **** ********* ******, which *** ************ ** ***** *********** risk ********* ***********.

'*****, **************** *** ***********'** ********* *****, ****************, *** *********** within *** ***** ******** ********* *** facilitate *********** ********** ** ***** ********** improvement, ***** ** ** **** ******** to ****** **** **** ********** *********** their **** *** ***** ** ********* in ******** ***** ******** *****.

'******'** ******* ************** ************* ********, ****** communicated *** ************ ********, ** **** each ************** ****** *********** ***** **************** and ******* *********** *********, ********** *** risk ** ******** ********.

'*********'** **** ** ******** *** ************* of ************-**** ************* **** ********** **********, analyze *** ******* *** *********** ********, and **** ********* *********** ** ************ improve *** ******* **** ********** ********.

'************* ****** ***** **** **********'** ****** ************* ***** ****** *** supply ***** ******** * ********** ********, where ************ ****** ****** *** ******** manage ********* ** ********, *********, ******, monitor, *** ******* ***** ****** ***** risk ********** ** ****** *************** *** strengthen *** ************'* ********** ** ********* threats **** *** ****** *****.

IPVM Image

******* ** *********** ********* **** *** risks ** ********-******** ******, *******, *** data, **** ** **************, *******, *********, video ************ *********, ** *******, *** storage *******, *** ********** ********* *************** such ** ******** ******** *** ********** protocols, *****:

'***** **********'******** *********** *** ********** *** ********* (such ** ****, ********, ********, *******, facilities, *** ********) **** ****** *** organization ** **** *** ********** ********** with *** ******** ********** ** ***** assets ********* *** ********** *** **** management ********.

'**** **********'** **** ** ********** *** ************* risks ****** *** ************, *** ******, and *** *********** ********, ** **** as *** ********* ******* *** *************** that ***** ********** ********.

'***********'** ************** *********, **********, *** ********** for ******** ************* **** ****** *** CSF ********* ******** *********** **** ** strengthen *** ************* **** ********** ** done **************, ******** ******** ***** ** address *******, *** ********* ******* ************* efforts.

IPVM Image

******* ** ************ ******** ** ******* assets, **** ** ********* ********** *******, ensuring **** ******** *** ******** ** all ******* *** ********* ******* ** mitigate ***** ***************, ****** ********, ***** surveillance *******, *** ***** ****** ********* or *****-****** **************, *****:

'******** **********, **************, *** ****** *******'** ****** **** **** *** ***** people, ********, *** ******* *** ****** resources, **** ******** *** *******, ***** having ***** ******** ** ***** ** verify *** *** ****** ****, **** unauthorized ***** ***, *** ****** ******** measures ***** ** ********* *****.

'********* *** ********** **** ******** ** *** ************ understands *** ** ******* ********** **** cyber ******* ** ********* ******** *** guidance ** **** **** **** ****** knows ***** **** ** ******* *** systems *** **** ******.

'**** ********'** **** ******* ****** **** ************ access ** ********* ** ********* ***** that ******** *** *****, ******** **** data ** ****** ********* **** ******, and ******* ** ************ *** ******.

'******** ********'***** **** *** ***** *** *******, whether ******** ** *******, *** ********* from ********* *****, ********* ******** *** software *** ******** ********** ** ****** secure ******* *** *******.

'********** ************** **********'*** ********** *** ***************, *********, *** availability ** ****** ******* ********** **** ensures ******* *** ********* *** ******* from *** ********** ** ******.

IPVM Image

******* ** ********** ** ****** ***** security *********, **** ** ********* ********* systems ** ******* ********** ********, ***** surveillance ******* ** ****** ******** *********, logging, ********** ***** ** ***** ******* in ******* ** ******* ****** ********, and ******** ** ****** ********* ****, where:

'********** **********'** ******* ******* ******* ** *** infrastructure ** ****** ******** ***** ** intrusion ********, ********* ********** ********, ********* activities, ******* *****, *** ******** **** may ******** * ********* *******, ******* with ******** *******, ********, ** **** management.

'******* ***** ********'*** **** ******** ******** **** ********* out ** *** ******** ** ********, from ******* ******** ******** ** ********** that ******* *** **** **** ***********, to ********** **** ** *********, ******* it ***** * ************* ****, *** how ** ******* ***********.

IPVM Image

******* ** *** ****** ** ***** security *********, ******** ********** ** ******* physical ******** *********, ********** ******** **********, and ******* ******* *** ******* ** regular ********* ** ******* ** ********, where:

'******** **********'** ******* *********** **** * ***** security ******** ** ********, ************ *** prioritizing ********* ***** ** ***** ******** and, **** *********, ********** ********* ** higher ****** ** ********* ** ****** they ******* *********** *********.

'******** ********'*** ** ******** ********** ***** ************** are ********* ** ********** **** ******** and ***, ********** *** **** ***** of *** ********, ***** ***** ****** taken ****** *** ************* ** **********, along **** ********* ******** **** *** metadata, *** ******** *** ********* *** authenticity ** *** *******.

'******** ******** ********* *** *************'** ****** *** ********** ******* **** internal *** ******** ************, ******** ********** with ******** ****, ***********, *** ********.

'******** **********'** ** ******* ******** ** ***** and ******** *** ******* ** ***** security *********, ** ******* *** ********* from *********, *** ** ********* *** threats *******.

IPVM Image

******* ** ********* *** ************'* ************ or ******** ******** ** * ************* incident ** ****** ********** ** ******* as ********, ********* ********* ****, *******, and ********* ** ***** ***-******** ***** or ** ********** ***** ** *************, where:

'******** ******** **** *********'********* **** *** ******** ******** ******* for ******* *** ******** ******** ** the ******** ** ****** *********** ********** and ****** *** ********* ** ******* and ***** ****** ****** ****** ********* status, ***** *** *** ** ******** recovery ** ******** ***** ** ******** and ********-******* ************* ** *********.

'******** ******** *************'** ******** *********** ***** ******** ******* and ********* ******** *** ********** **** internal *** ******** ******* ** ** aware ** ******** ******** *** ******* to ******* *** ********'* ************.

CSF *.* ***** ***** ******

******** ***** ******(***) ***** ** ******* ********* ** help ************* *********** ********* *** *.*, assist ******* ************, ********* **********, ********, and ********* *****, *** ***** ********* steps *** **** ********* *** *********** the ********* **** ******** ************* ********.

************ *********** * ******** ** ** ************'* current *** ******* ************* *******, ******* organizations **********, *****, ********, *** ********** cybersecurity ***** ***** ** ***** ******** mission, ************, *******, *** ************.

IPVM Image

********* **************** ****** *********, *****, *** **** mitigation ******** ****** ******** ************* **** provide * ******* **** ** ************* risk ********** ********** *** ***** ************* to ***** ***** ******* ***********.

IPVM Image

***** ******** ** ******-***** ************** ****** ** ** ************* ***** that ****** ******** ** ******* ******* with ***** ************* **** ********** ********** using *** *.*.

IPVM Image

****** ***** **** *************** ************** ******** ************* ***** ********** the ****** *****, *********** ***************, *** implementing *********** ******** **********.

IPVM Image

***** ******** *** ** ********* ************** ********, ***** *** **** organizations ******* ***** ************* **** ********** and ********** *********** ** ******** ****** improvements *** ******* *** ********.

IPVM Image

************** ***** ** ********** **** ************** ****** ************* **** ********** **** processes *** **** ************** ****** *** organization, ********* *******, *********, ************, *** technical *****, ** ******* ****** **** monitoring, **********, *** ********* ****** ************** units **** *** ********** ********** ******* resilience.

IPVM Image

CSF *.* *********** **********

************** ************* ********* *********** ** **** ** supplement *** ********* *** ******* *************' understanding *** ************** ** ************* *********.

**** ********************** ************ ********* *********, ***** **** *** to ******* *** ********** *** *** not ********** ***** ** **** ** organization ****** ** *** ** *** have ****** ************ *** *************.

IPVM Image

********** ***** *********(****) ******* *** **** ****** *********, such ** *********** ******* *** *.* and *.*, **** *** *.* **, and *** ** *** **.

Comments (2)
UI
Undisclosed Integrator #1
Apr 04, 2024

*** *** **** ** ** **** is *** **** *****, ** ** different, *** **** ** ******? * ahve * *** **** ******** ******* on ******* *** ************ ** ****:

IPVM Image

bm
bashis mcw
Apr 04, 2024

**#*, ***** *** *** *** ********.

**** *** *********, ******** **** *** developed ** ******* ************* *********.

***** *** **** *** ********* ** the ** ********** ** ******* (***) and ** * ********* ************* *********** for *********** *** ************** ******* **** the ***, *** **** *** ** voluntary *** ************* *** *** ** certification ************.

(1)