Cybersecurity Framework Manufacturing Profile
This document provides the Cybersecurity Framework (CSF) implementation details developed for the manufacturing environment. The “Manufacturing Profile” of the Cybersecurity Framework can be used as a roadmap for reducing cybersecurity risk for manufacturers that is aligned with manufacturing sector goals and industry best practices.
Tags:
Manufacturing, Framework, Profile, Industry, Cybersecurity, Cybersecurity framework manufacturing profile, Manufacturing profile
Information
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
Documents from same domain
Guide for Cybersecurity Event Recovery
nvlpubs.nist.govcyber event, but as a guide to develop recovery plans in the form of customized playbooks. As referred to in this document, a playbook is an action plan that documents an actionable set of steps an organization
Archived NIST Technical Series Publication
nvlpubs.nist.govNIST Special Publication 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations RON ROSS KELLEY DEMPSEY
Announcing the Standard for Personal Identity …
nvlpubs.nist.govFIPS PUB 201-2 . FEDERAL INFORMATION PROCESSING STANDARDS PUBLICATION . Personal Identity Verification (PIV) of . Federal Employees and Contractors
Federal, Verification, Employee, Identity, Processing, Personal, Contractor, Personal identity verification, Federal employees and contractors
Security and Privacy Controls for Federal Information ...
nvlpubs.nist.govThis publication provides a catalog of security and privacy controls for federal information systems and organizations and a process for selecting controls to protect ...
Guidelines for Media Sanitization - NIST
nvlpubs.nist.govNIST Special Publication 800 -88 . Revision 1 . Guidelines for Media Sanitization . Richard Kissel . Andrew Regenscheid . Matthew Scholl . Kevin Stine . This publication is available free of charge from:
Media, Guidelines, Inst, Revisions, Sanitization, Guidelines for media sanitization
Computer Security Incident Handling Guide - NIST …
nvlpubs.nist.govNIST Special Publication 800-61 Revision 2 . Computer Security Incident Handling Guide . Recommendations of the National Institute of Standards and Technology
Guide, Security, Computer, Standards, Handling, Incident, Computer security incident handling guide
Volume I: guide for mapping types of information …
nvlpubs.nist.govNIST Special Publication 800-60 Volume I Revision 1 . Volume I: Guide for Mapping Types of Information and Information Systems to Security Categories
Guide for conducting risk assessments - NIST
nvlpubs.nist.govRevision 1. I N F O R M A T I O N S E C U R I T Y . Computer Security Division . Information Technology Laboratory . National Institute of Standards and Technology
Protecting Controlled Unclassified Information in ...
nvlpubs.nist.govNIST Special Publication 800-171 Revision 1 . Protecting Controlled Unclassified Information in Nonfederal Systems . and Organizations . RON …
Special, Inst, Publication, Nist special publication 800 171
Determination of trace elements in ruby laser …
nvlpubs.nist.govJOURNAL OF RE SEAR CH of the Nationol Bureau of Standards- A. Physics and Chemistry Vol. 75A, No.5, September-October 1971 j Determination of Trace Elements in Ruby Laser Crystals by Neutron Activation Analysis
Determination, Elements, Trace, Determination of trace elements
Related documents
Kubernetes Hardening Guide
media.defense.govMar 15, 2022 · Cybersecurity and Infrastructure Security Agency Kubernetes Hardening Guidance Notices and history Document change history Date Version Description August 2021 1.0 Initial release March 2022 1.1 Updated guidance based on industry feedback Disclaimer of warranties and endorsement
Withdrawn NIST Technical Series Publication
nvlpubs.nist.govNov 13, 2020 · consistently and clearly about cybersecurity work and its cybersecurity workforce. Organizations or sectors can develop additional publications or tools that meet their needs to define or provide guidance on different aspects of workforce development, planning, training, and education. An online reference spreadsheet tool [4]
BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE
csrc.nist.gov4. Issues related to vulnerability identification are tracked and reported to relevant managers. 4. Underlying causes for vulnerabilities are identified (e.g., through root-cause analysis) 4. Risks related to the performance of vulnerability identification activities are identified, analyzed, disposed of, monitored,and controlled. 4
GUIDELINES ON MARITIME CYBER RISK MANAGEMENT
wwwcdn.imo.org4 ALBERT EMBANKMENT LONDON SE1 7SR Telephone: +44 (0)20 7735 7611 Fax: +44 (0)20 7587 3210 MSC-FAL.1/Circ.3 5 July 2017 GUIDELINES ON MARITIME CYBER RISK MANAGEMENT 1 The Facilitation Committee, at its forty-first session (4 to 7 April 2017), and the