Example: dental hygienist

NIST Cybersecurity Framework Policy Template Guide

Page 1 NIST Cybersecurity FrameworkPolicy Template Page i ContentsIntroduction 1 NIST Function: Identify 2 Identify: Asset Management ( ) 2 Identify: Risk Management Strategy ( ) 2 Identify: Supply Chain Risk Management ( ) 2 NIST Function: Protect 4 Protect: Identity Management and Access Control ( )

Additional Policy Templates 15 General 15 Network15 Server Security 15 Application Security 15 Contents. ... Cybersecurity Framework (NIST CSF). This guide gives the correlation between 49 of the NIST CSF subcategories, and applicable policy and standard templates. A NIST

Tags:

  Policy, Guide, Framework, Template, Framework policy template guide

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of NIST Cybersecurity Framework Policy Template Guide

1 Page 1 NIST Cybersecurity FrameworkPolicy Template Page i ContentsIntroduction 1 NIST Function: Identify 2 Identify: Asset Management ( ) 2 Identify: Risk Management Strategy ( ) 2 Identify: Supply Chain Risk Management ( ) 2 NIST Function: Protect 4 Protect: Identity Management and Access Control ( ) 4 Protect: Awareness and Training ( P R.)

2 AT ) 4 Protect: Data Security ( ) 4 Protect: Information Protection Processes and Procedures ( ) 5 Protect: Maintenance ( ) 6 Protect: Protective Technology ( ) 6 NIST Function: Detect 7 Detect: Anomalies and Events ( ) 7 Detect: Security Continuous Monitoring ( ) 7 Detect: Detection Processes ( ) 7 NIST Function.

3 Respond 8 Respond: Response Planning ( ) 8 Respond: Communications ( ) 8 Respond: Analysis ( ) 9 Respond: Improvements ( ) 9 NIST Function: Recover 10 Recover: Recovery Planning ( ) 10 Recover: Improvements ( ) 10 Recover.

4 Communications ( ) Page 1 IntroductionThe Multi-State Information Sharing & Analysis Center (MS-ISAC) is offering this Guide to participants of the Nationwide Cybersecurity Review (NCSR) and MS-ISAC members, as a resource to assist with the application and advancement of Cybersecurity policies. The Policy templates are provided courtesy of the State of New York and the State of California. The templates can be customized and used as an outline of an organizational Policy , with additional details to be added by the end user.

5 The NCSR question set represents the National Institute of Standards and Technology Cybersecurity Framework (NIST CSF). This Guide gives the correlation between 49 of the NIST CSF subcategories, and applicable Policy and standard templates. A NIST subcategory is represented by text, such as This represents the NIST function of Identify and the category of Asset additional information on services provided by the Multi-State Information Sharing & Analysis Center (MS-ISAC), please refer to the following page: These Policy templates are also mapped to the resources MS-ISAC and CIS provide, open source resources, and free FedVTE training: : These policies may not reference the most recent applicable NIST revision, however may be used as a baseline Template for end users.

6 These Policy templates are not to be used for profit or monetary gain by any Function: Identify Page 2 NIST FUNCTION: IdentifyIdentify: Asset Management ( ) Physical devices and systems within the organization are Use of Information Technology Resource PolicyAccess Control PolicyAccount Management/Access Control StandardIdentification and Authentication PolicyInformation Security PolicySecurity Assessment and Authorization PolicySecurity Awareness and Training Policy Software platforms and applications within the organization are Use of Information Technology Resource PolicyAccess Control PolicyAccount Management/Access Control StandardIdentification and Authentication PolicyInformation Security PolicySecurity Assessment and Authorization

7 PolicySecurity Awareness and Training Policy External information systems are and Communications Protection Policy Resources ( , hardware, devices, data, time, and software) are prioritized based on their classification, criticality, and business value).Information Classification StandardInformation Security Policy Cybersecurity roles and responsibilities for the entire workforces and third-party stakeholders ( suppliers, customers, partners) are Use of Information Technology Resource PolicyInformation Security PolicySecurity Awareness and Training PolicyIdentify: Risk Management Strategy ( ) Risk management processes are established, managed, and agreed to by organizational Security PolicyInformation Security Risk Management StandardRisk Assessment PolicyIdentify.

8 Supply Chain Risk Management ( ) Suppliers and third-party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment and Authentication PolicySecurity Assessment and Authorization PolicySystems and Services Acquisition Function: Identify Page 3 Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual and Authentication PolicySecurity Assessment and Authorization PolicySystems and Services Acquisition Policy Response and recovery planning and testing are conducted with suppliers and third-party Security Threat Response PolicyCyber Incident Response StandardIncident Response PolicySystems and Services Acquisition Function: Protect Page 4 NIST FUNCTION: ProtectProtect.

9 Identity Management and Access Control ( ) Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and Control PolicyAccount Management/Access Control StandardAuthentication Tokens StandardConfiguration Management PolicyIdentification and Authentication PolicySanitization Secure Disposal StandardSecure Configuration StandardSecure System Development Life Cycle Standard Remote access is Access Standard Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of Control PolicyAccount Management/Access Control StandardAuthentication Tokens StandardConfiguration Management PolicyIdentification and Authentication PolicySanitization Secure Disposal StandardSecure Configuration StandardSecure System Development Life Cycle Standard Network integrity is protected ( , network segregation, network segmentation).

10 Wireless Network Security StandardMobile Device SecuritySystem and Information Integrity PolicyProtect: Awareness and Training ( PR . AT ) PR . AT-1 All users are informed and Use of Information Technology Resources PolicyInformation Security PolicyPersonnel Security PolicyPhysical and Environmental Protection Policy Security Awareness and Training PolicyProtect: Data Security ( ) Data-at-rest is protectedComputer Security Threat Response PolicyCyber Incident Response StandardEncryption StandardIncident Response PolicyInformation Security PolicyMaintenance PolicyMedia Protection PolicyMobile Device Security Patch Management Function.


Related search queries