In the week when the U.S. Secret Service appears to have concluded that the recent Presidential election was subverted by state sponsored hackers it is becoming clearer to the wider world that businesses need to have an incident response plan. Such a plan is very much in line with the NIST Cyber Framework under the category Respond – Develop and implement the appropriate activities to take action regarding a detected cybersecurity event.
Intrusion protection software and hardware looks for unusual activity that touch on anomalies and events in the NIST Detect Framework function. An anomaly is something that has taken place which would not usually take place.
Thank you for reading my latest blog on NIST standards and the Protect function. In this blog I will look at how Data Security falls under the Protect function. User access control starts the ball rolling on this so it’s all about knowing what the criticality and sensitivity of your data is. Assess your data’s criticality to the business. Know what you data assets are.