There are 5 main core functions of the NIST Cybersecurity Framework: Identify, Protect, Detect, Respond and Recover. Let’s focus on the importance of the core function of Protection.
Protecting a cyber system takes more than just physical security controls and cyber access controls. In fact, out of all 5 core functions of the NIST Cybersecurity Framework, most organizations will spend more of their time on protecting their cyber assets than any of the other core functions. Since protection involves physical security, cyber security and personnel it should be an area of focus for all organizations and departments.
That is the challenge. How do you protect your cyber assets? What needs more protection and what needs less? A college professor of mine had a saying when it came to protecting cyber assets, “Protect diamonds like diamonds and protect pens like pens”, meaning you would not have the same security measures to protect a valuable cyber asset verses an inconsequential cyber asset.
The following questions are to help in understanding what needs to be protected and to what extent:
When taking these questions into consideration, you can get the following categories to build and mature your Cybersecurity program:
The questions above do in fact touch all 5 core functions of the NIST Framework in how they can be answered. But that is by design, you cannot protect a cyber asset you haven’t identified, you cannot protect a cyber asset if you have no methods to detect a malfunction, you cannot respond to an event if the cyber asset is not protected and you cannot recover properly if the cyber asset in question is not protected.
For more information on this topic, reach out to our Cyber Security Team.