Aklyde
Aklyde
CYBER
RESILIENCE
Kip Boyle
Jason Dion
Lisa McKinley
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LIC cro
ibj
EN evin
SE 3 2
DISCLAIMER
While Akylade carefully ensures the accuracy and quality of these materials, we
D @g
cannot guarantee their accuracy, and all materials are provided without any
warranty whatsoever, including, but not limited to, the implied warranties of
FO m
merchantability or fitness for a particular purpose. The name used in any data
files provided with this course is that of a fictitious company and fictional
R ail.
employees. Any resemblance to current or future companies or employees is
purely coincidental. If you believe we used your name or likeness accidentally,
US co
please notify us, and we will change the name in the next revision of the
manuscript. Akylade is an independent provider of certification solutions for
E m·
product name or service in this book is for educational purposes only. No such
use should be construed to imply sponsorship or endorsement of this book by
LY UG
nor any affiliation of such entity with Akylade. This book may contain links to
sites on the Internet that are owned and operated by third parties (the "External
Sites"). Akylade is not responsible for the availability of, or the content located
BY 22,
on or through any External Site. Please contact Akylade if you have any
concerns regarding such links or External Sites. Any screenshots used for
: R 20
illustrative purposes are the intellectual property of the original software owner.
AM 23
TRADEMARK NOTICES
Akylade®, Akylade Certified Cyber Resilience Fundamentals®,, A/CCRF®,,
ES
other product and service names used may be common law or registered
trademarks of their respective proprietors.
AM
PIRACY NOTICES
GA
This book conveys no rights in the software or other products about which it
was written; all use or licensing of such software or other products is the
responsibility of the user according to the terms and conditions of the software
I
owner. Do not make illegal copies of books or software. If you believe that this
book, related materials, or any other Akylade materials are being reproduced or
transmitted without permission, please email us at legal@akylade.com.
Copyright ©2023
Akylade LLC
https://www.akylade.com
All rights reserved. Except as permitted under the United States Copyright Act
of 1976, this publication, or any part thereof, may not be reproduced or
transmitted in any form or by any means, electronic or mechanical, including
photocopying, recording, storage in an information retrieval system, or
otherwise, without express written permission of Akylade.
ISBN: 979-8-9886499-0-8
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LIC cro
ibj
EN evin
SE 3 2
D @g
FO m
R ail.
US co
E m·
ON A
LY UG
BY 22,
: R 20
BONUS CONTENT
AM 23
ES
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LIC cro
ibj
EN evin
SE 3 2
D @g
FO m
R ail.
US co
E m·
ON A
LY UG
BY 22,
: R 20
AM 23
ES
H
AM
GA
I
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
2 Cybersecurity Fundamentals 13
R ail.
US co
5 Framework Components 57
LY UG
15 Conclusion 229
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LIC cro
ibj
EN evin
SE 3 2
D @g
FO m
R ail.
US co
E m·
ON A
LY UG
BY 22,
: R 20
AM 23
ES
H
AM
GA
I
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LIC cro
ibj
EN evin
SE 3 2
D @g
FO m
R ail.
US co
E m·
ON A
LY UG
ACKNOWLEDGMENTS
BY 22,
This book is written for our community of students worldwide who have
: R 20
allowed us to continue to develop our video courses and books over the
years. Your hard work has led you to positions of increasing responsibility
AM 23
throughout your careers, and we are grateful to have been a small part of
ES
your success.
H
We truly hope that you all continue to love the method to our madness as
AM
certification exams.
I
We wish you all the best as you continue to accelerate your careers to new
heights!
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LIC cro
ibj
EN evin
SE 3 2 CONTRIBUTORS
Akylade would like to thank the following people for their hard work and
D @g
support in developing the A/CCRF and A/CCRP certifications with us.
FO m
Each of these individuals spent countless hours helping to help us bring
these certifications to the world.
R ail.
US co
• CG Acharjya
• Matthew C. Bascom, IT Systems Analyst at Modoc County IT (A+, Linux+, CySA+)
E m·
• Evan Branstner
• Walt V. Carillion (CISSP, CISA, CTPRP, CIA, CFE, CPA)
• Julio Ricardo Duarte, Cybersecurity Expert at Amitego Latin America - LLD Internacional
BY 22,
• Michael Efenaro
• Robert Finch, Cyber Risk Analyst at Cyber Risk Opportunities LLC
: R 20
• Ken Fishkin
• Peter H. Gregory, CISSP, CISA, CISM, CRISC, CDPSE, CIPM, DRCE, CCSK, is the author of
AM 23
more than 50 cybersecurity and technology books, including Solaris Security, CISSP For Dummies,
and CISM All-In-One Exam Guide. He has written certification study guides for CISSP, CISA,
ES
CISM, CRISC, CIPM, CDPSE, and SCSA, and certification exam questions for CISSP, CRISC,
CCSK, and CISA. He is a member of the Forbes Technology Council, CyberEdBoard, and
H
Champion) https://harmont2007.wixsite.com/cybertalk
• Alan How
GA
Steve McMichael, Director of Governance, Risk and Compliance at BlackBerry (CPA, MBA,
CISA)
• Marc Menninger (CISSP, CRISC)
• Galen Minev, CISO at Paysera LTD (M.S. Cybersecurity)
• Keith Morgan IS Security/GSEC (CISSP, CEH, CISA, GSEC, GSEC )
• Joshua Peskay, 3CPO at RoundTable Technology (CISSP, CISM)
Committed to serving the nonprofit and mission-driven sector
• Susan Sarit, Chief Operating Officer at Dion Training Solutions
• Wayne Seavolt
• Muhammad Shahzad
• Bryon Singh, Director of Security Operations at Railworks Corporation
(https://www.linkedin.com/in/bryonsingh/)
• Yuri Soldatenkov, Cybersecurity Advisor (CISSP, CCSP, GDSA, GSTRT, GSLC)
• Galina's Husband & Bianca, Dylan, and Lauriana's Dad
• David John Sopala, Orami (A+, Network+, Security+, CySA+) david.sopala@gmail.com
• Glen Sorensen, vCISO at Cyber Risk Opportunities LLC
• Apurv Tiwari
• Christopher Uloko, Lead Evangelist and Lead Humanitarian at Rod Of Jesse Ministries, Reflecting
Jesus Everywhe
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CHAPTER ONE
AM 23
ES
INTRODUCTION
H
AM
In this book, you will learn how to master cyber resiliency in your
organization and also learn everything you need to know to pass the
GA
book covers the essentials with no fluff, filler, or extra material, so you can
easily learn the material and conquer the certification exam.
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
organization.
BY 22,
This book has also been designed to serve as the official textbook
: R 20
The first portion of the book focuses on the basics of the NIST
ES
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
complete the associated practice exam for the selected certification (scoring
at least 85% or higher), you should be ready to take and pass your Akylade
AM 23
attempt!
H
AM
AKYLADE CERTIFIED
CYBER RESILIENCE FUNDAMENTALS
GA
(A/CCRF)
I
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
book is $125 (USD). To sit for the exam, you must pay this exam fee at the
time of booking, purchase an exam voucher from Akylade’s website
H
AKYLADE CERTIFIED
CYBER RESILIENCE PRACTITIONER
(A/CCRP)
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Framework, including:
E m·
improvement
AM
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
you can better grasp how to study for the exam as you read through the rest
of this textbook. It will help you focus your efforts to get the most out of
AM 23
this material.
ES
certification exams is that there are no trick questions on test day. Every
AM
question is precisely worded to match the material that you are about to
study in this textbook.
GA
During the exam, you should read each question multiple times to
I
ensure that you understand exactly what it’s asking and that you are
answering the question being asked. Anytime you see the words ALWAYS
or NEVER in an answer, think twice about selecting it. As in most things in
life, rarely is there a case where something ALWAYS or NEVER applies to
a given situation when using the NIST Cybersecurity Framework and the
Cyber Risk Management Action Plan (CR-MAP) process.
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
publication.
ON A
Practitioner (A/CCRP) you should only rely on official sources, such as this
textbook or training received from one of Akylade’s Authorized Training
BY 22,
The reason for this is that the Akylade Certified Cyber Resilience
AM 23
Remember, you will not see anything on the exam that was not
covered by the official textbook. This textbook covers all the testable
concepts within its pages, as these are the building blocks of the Akylade
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Framework and its concepts differently due to their own unique situation or
ON A
use cases. When in doubt, you should always select the textbook answer
when answering a question on the certification exam since that is what the
LY UG
On exam day, you should seek to select the best answer from the
options provided. We know that sounds a bit silly, but sometimes a
ES
question may have several right answers, but one is always the best, or most
H
correct, answer.
AM
On test day, you don’t have to memorize the terms of the official
NIST Cybersecurity Framework publication from this textbook word for
word. Instead, you must recognize the right terms from the multiple-choice
options provided.
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
As you read this textbook and study for your upcoming exam,
R ail.
remember that it is important to recall the keywords and definitions for the
US co
But, as you move into your studies for the Akylade Certified Cyber
LY UG
situations based on real-world events and case studies provided to you. This
makes the practitioner-level exam much more difficult than the
AM 23
SUMMARY
AM
the NIST Cybersecurity Framework, the text will equip an individual with
no prior experience with the necessary knowledge and skills to implement,
manage, and optimize the framework within an organization.
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
10
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
PART ONE
AM 23
ES
H
AM
CYBER RESILIENCE
GA
I
11
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
12
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CHAPTER TWO
AM 23
ES
CYBERSECURITY FUNDAMENTALS
H
AM
the complexities you will face while working in the cybersecurity industry.
I
This chapter will be a review for those of you who have already
passed any of the following industry certifications: CompTIA Security+,
CompTIA CySA+, CompTIA PenTest+, CASP+, ISACA’s Certified
Information Security Manager (CISM), ISC2’s Systems Security Certified
Practitioner (SSCP), ISC2’s Certified Information Systems Security
13
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
security measures.
I
14
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
ongoing monitoring.
AM 23
Many of these terms sound quite similar, but there are some
distinctions between them that you should be aware of. Information
security and information systems security have several overlapping areas of
focus, with information security encompassing a broader scope that
includes both information and the systems that process it. Information
15
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
digital attacks.
LY UG
real world, you will often see these terms used interchangeably by
practitioners in the field or one term being preferred over another based on
AM 23
The changing of these terms over time has also affected higher
H
education’s naming schemas for their degrees. For example, from 2008-
AM
cybersecurity. Similarly, any degrees in this area of study earned before 2008
were almost exclusively termed as information systems Security or the even
I
16
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
digest. By comparing the hash digest of the original data with the
recalculated hash digest, integrity violations can be detected, ensuring the
ES
systems.
GA
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
access by an attacker.
H
CYBERSECURITY INCIDENTS
18
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
technically the same thing; you must know the difference between them.
R ail.
US co
A threat is defined as any potential source or actor that has the
capability to exploit a vulnerability, weakness, or flaw that causes harm to
E m·
way to think about this is that a threat is a person or event that has the
potential to impact a valuable resource in some kind of negative manner.
LY UG
because it could cause a power outage that would render your network and
: R 20
systems unusable.
AM 23
19
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
20
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
threat. Therefore, your risk is zero regarding this specific piece of malware,
US co
Conversely, let’s pretend you are the only person living on Mars. If
ON A
you are worried that someone might steal your laptop because you left the
front door to your Martian home unlocked, fear not because this
LY UG
is no one else on the entire planet, so there is no threat actor to exploit the
vulnerability. Since there is zero threat, there is also zero risk.
: R 20
The bottom line is that for a risk to exist, you must have both a
AM 23
threat that can exploit a given vulnerability and the vulnerability itself
ES
how threats and vulnerabilities are linked together, and this is a very
important concept to understand as you begin your journey into
GA
cybersecurity.
I
SUMMARY
21
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
22
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CHAPTER THREE
AM 23
ES
RISK MANAGEMENT
H
FUNDAMENTALS
AM
GA
23
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
willingness and tolerance level for accepting potential risks related to its
digital systems and assets, guiding decision-making processes to align risk
GA
25
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
database that systematically records and tracks identified risks, along with
their attributes, assessment results, and corresponding risk management
BY 22,
register is created initially during the risk identification phase, while the
remainder of the information is added to each risk as the organization
AM 23
Once the risks have been identified, the next phase is conducting a
risk assessment. During the risk assessment, risks are analyzed and
GA
insights into the significance and prioritization of any risk that was
identified in the risk identification phase.
During the risk assessment phase, the risk analysis process plays a
pivotal role in understanding and quantifying the identified risks. Risk
analysis involves evaluating the likelihood of a risk occurring and assessing
its potential impact on the organization’s digital systems and assets. There
are different approaches to conducting risk analysis, including the use of
qualitative, quantitative, and hybrid methods.
26
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
For example, a high likelihood and high impact risk would require
E m·
risks using numerical values and metrics to assess the financial impact and
frequency of risk events. This approach allows organizations to assess risks
AM 23
(ARO).
AM
SLE = AV x EF
The asset value represents the financial worth of the asset at risk,
while the exposure factor represents the percentage of loss that would
occur if the asset were compromised. For example, if an organization’s web
server has an asset value of $100,000 and the exposure factor for a specific
risk is determined to be 60%, the SLE would be $60,000.
This means that in the event that risk materializes, the organization
could potentially face a financial loss of $60,000. Understanding the SLE
allows organizations to prioritize their risk mitigation efforts based on the
potential financial impact of each risk.
27
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
occurrence is used in conjunction with other risk metrics, such as the single
loss expectancy and the annualized loss expectancy, to assess the potential
LY UG
be 3/10 or 0.3.
: R 20
annualized rate of occurrence and the single loss expectancy. For example,
if the SLE for a specific risk is determined to be $50,000 and the ARO is
ES
estimated to be 0.2 (meaning the risk occurs 20% of the time in a year),
H
then the ALE would be $10,000 ($50,000 × 0.2). This indicates that, on
AM
average, the organization can expect to face a financial loss of $10,000 per
year due to that specific risk.
GA
over qualitative risk analysis because it provides a more exact value for each
risk identified. By quantifying risks in monetary terms, organizations can
prioritize their mitigation efforts based on potential financial impact.
28
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
identified during the risk identification phase. This process enables them to
allocate resources, implement appropriate risk management measures, and
LY UG
focus their efforts on mitigating risks that pose the most significant threats
BY 22,
action plans during this phase to address their identified risks. Risk
H
or risk mitigation.
GA
action to avoid, transfer, or mitigate it. Organizations may opt for risk
acceptance when the cost of implementing risk mitigation measures
outweighs the potential impact of the risk.
For example, a small business may accept the risk of a minor data
breach due to limited resources and instead focus on investing their limited
resource in their core business operations. While risk acceptance does not
eliminate the risk, organizations can monitor the risk and be prepared to
respond if the impact exceeds the acceptable threshold based on the
organization’s risk appetite.
29
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
mitigate the financial impact and share the responsibility of managing the
risk with a third party.
ES
H
30
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
resilience.
LY UG
31
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
can adapt their risk mitigation strategies and prevent potential risks from
being exploited.
AM 23
32
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
impact of risks.
ON A
controls, a company may still have a residual risk of a data breach due to
the possibility of an insider threat, an advanced persistent threat, or an
BY 22,
33
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
hours, meaning that it must be back online within four hours of an incident
to minimize financial losses and customer dissatisfaction.
AM 23
disruption.
GA
available backup taken within the last hour to ensure minimal data loss.
34
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
operations.
E m·
35
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
financial analysis are total cost of ownership, return on assets, and return on
investment.
LY UG
36
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
breaches. The total cost of ownership analysis would include the upfront
costs of purchasing the solution, training staff, and ongoing expenses such
: R 20
SUMMARY
37
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
review ensure that risk management strategies remain aligned with the
organization’s objectives and risk landscape. It is also important to
E m·
remember that there are two types of risk: inherent risk and residual risk. By
ON A
understanding inherent risk and residual risk, your organization can make
more informed decisions and allocate resources effectively throughout the
LY UG
functions and critical systems and identifying any single points of failure. By
performing a business impact analysis, an organization can establish metrics
ES
for the recovery time objective, recovery point objective, mean time to
recover, and mean time between failures.
H
AM
38
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CHAPTER FOUR
AM 23
ES
NIST CYBERSECURITY
H
FRAMEWORK
AM
GA
reduce their cybersecurity risk and protect their information systems and
the data they contain. All businesses and organizations have some level of
risk to their operations due to their increased reliance on information
technology, operational technology, and the networks that connect them
together.
39
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
entities.
AM
In this executive order, the President stated, “It is the policy of the
GA
United States to enhance the security and resilience of the Nation’s critical
infrastructure and to maintain a cyber environment that encourages
I
40
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
standards-developing organizations.
AM 23
While NIST was responsible for getting the framework created and
ES
States. These practitioners met with NIST over five separate workshops
AM
other interested entities; specify high-priority gaps for which new or revised
standards were needed; and collaboratively develop action plans by which
these gaps could be addressed.
41
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
framework, version 1.0. Version 1.1 was also designed with some helpful
additions, including a new self-assessment section; a greater focus on supply
E m·
chain risk management; and refinements were made to account for better
ON A
2.0 of the framework and is slated to be released in the first half of 2024.
: R 20
This revision of the framework, version 2.0, is being drafted with a focus on
refining, clarifying, and enhancing the existing version 1.1 for better
AM 23
The proposed version 2.0 will also include a name change from
AM
42
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
relates to several key executive orders issued by the President of the United
AM
43
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
information systems.
ES
sharing mechanisms.
44
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
APPLICABILITY OF THE
CYBERSECURITY FRAMEWORK
E m·
ON A
may be fully distributed or copied for your own organization’s use without
: R 20
paying any licensing fees. This free tool is extremely valuable because it can
be quickly implemented to provide your organization with an instant return
AM 23
Over the past decade, doing business on the internet has become
H
an essential part of our global economy and a huge growth driver for
AM
45
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
become so ingrained into our collective business processes and our daily
ON A
lives.
LY UG
criminals and nation-state actors. Every year, more and larger data breaches
: R 20
are occurring than in the previous years, and larger and higher bandwidth
distributed denial of service attacks are being attempted by these threat
AM 23
actors.
ES
annually. This figure seems to be continuing to grow year after year, as well.
GA
For example, if we look back a few years to 2015, the global cost of
cyber failures and attacks of all kinds was estimated to only cost
I
approximately $500 billion per year globally. If we fast forward just six years
to 2021, the cost will rise to an estimated $6 trillion per year globally.
46
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Using the NIST Cybersecurity Framework, you can organize your defensive
R ail.
and incident response capabilities to be more resilient against cyber-attacks
US co
resiliency consultant.
ON A
47
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
48
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
49
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
50
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
•
AM 23
51
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
the assigned Sector-Specific Agency for the Healthcare and Public Health
BY 22,
In fact, the opposite is quite often true. Attackers will target smaller
I
52
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
continuity of operations.
AM 23
However, with versions 1.0 and 1.1, many practitioners believe it is more
relevant or skewed toward larger organizations with at least 500 employees.
H
That said, it has also been adopted and implemented by small and medium-
AM
53
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
SUMMARY
54
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
55
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
56
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LIC cro
ibj
EN evin
SE 3 2
D @g
FO m
R ail.
US co
E m·
ON A
LY UG
BY 22,
: R 20
AM 23
CHAPTER FIVE
ES
FRAMEWORK COMPONENTS
H
AM
eager to explore new destinations and experiences along the way. To ensure
a smooth journey, you’ll need a roadmap that outlines the best routes,
I
57
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
First, we will look at the framework core that forms the heart of
the NIST Cybersecurity Framework and guides organizations in identifying,
E m·
58
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
For each function, there are also underlying key categories and
E m·
serial or linear path that will ultimately achieve a static desired end state.
H
59
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
trying to achieve.
: R 20
and incomplete risk management participation. They aren’t as bad off as the
Tier 1 organizations, but there is still a lot of room for improvement.
H
60
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
wish to reach in the future. The organization should consider its current
AM
61
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
categories and subcategories in the framework and then select the relevant
ones based on your business or mission drivers and a risk assessment to
BY 22,
determine which are the most important for your specific organization.
: R 20
Once you identify those categories and subcategories that are important to
meet your business’s objectives by reducing or mitigating risk, you can then
AM 23
Once the organization creates its current profile and target profile,
it can be used to conduct a gap analysis between your current state and
desired future state. The results of this gap analysis will then be used to
create a plan of action. This action plan should use proper prioritization
based on the profiles you created and factor in other business needs,
including the cost-effectiveness of the controls and the innovation required
to implement those controls.
62
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
SUMMARY
: R 20
AM 23
cybersecurity risks.
GA
63
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
as your current state accurately reflects where you truly are and that your
R ail.
target state is where you truly plan to work across the entire organization.
US co
E m·
ON A
LY UG
BY 22,
: R 20
AM 23
ES
H
AM
GA
I
64
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CHAPTER SIX
AM 23
ES
FIVE FUNCTIONS
H
AM
65
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Now, let’s dive into the intricacies of the five functions and explore
I
IDENTIFY (ID)
66
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Cybersecurity Framework.
AM 23
67
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
68
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
69
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
support risk decisions associated with managing supply chain risk. Supply
GA
70
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
71
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
commensurate with the risk of the transaction. This is done using single-
factor, multi-factor, or other authentication mechanisms that provide
E m·
organizational risks.
LY UG
72
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
repositories.
ON A
removal, transfers, and disposition. This includes the use of access controls,
authentication mechanisms, and monitoring to ensure that only authorized
ES
corruption so that the organization can restore critical data in the event of
I
an incident.
73
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
development process that helps ensure that all systems are created to the
appropriate security standards.
ES
H
in a controlled manner.
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
75
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
DETECT (DE)
BY 22,
76
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
cybersecurity events.
ON A
cybersecurity events.
BY 22,
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
78
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
79
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
incident.
AM 23
recovery plans.
GA
80
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
from memory, such as DE, for the exam.DP-3, but it would be fair to ask
you to identify the function or category to which DE.DP-3 is linked. In this
E m·
When you are working in the field as a practitioner, you can always
carry a copy of the NIST Cybersecurity Framework version 1.1 to reference
BY 22,
the individual subcategories and activities, as needed. You will find a table
: R 20
As you work in the field, you will find that you don’t need to use all
108 subcategories and outcomes with every organization. Instead, it is more
important that you review them all during your engagements and select the
activities that best align with organizational objectives and overall risk
management strategies being pursued.
81
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
82
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CHAPTER SEVEN
AM 23
ES
Imagine you’re about to get into your car and drive to work. Before
you even leave your driveway, there is an essential step that you must always
GA
Well, in most countries around the world, there are laws that
dictate you must wear a seatbelt when driving a car. If you don’t wear your
seatbelt and a police officer pulls you over, you may simply receive a ticket
or a fine for not following this regulation.
83
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CONTROLS
LY UG
Controls, COBIT 5, or the ISO/IEC 27001 series, you are probably used to
dealing with controls.
AM 23
help prevent, detect, respond to, and recover from cybersecurity incidents.
They can include technical solutions, policies, procedures, training
GA
84
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
VOLUNTARY NATURE OF
THE NIST CSF FRAMEWORK
ES
H
wide latitude and freedom to perform the functions and activities in any
way that makes sense in order to achieve their desired outcomes. These
I
outcomes are categorized under the five functions, while 108 subcategories
and activities are found underneath the 23 outcome categories.
When many first hear that the NIST CSF framework does not have
specific prescriptive controls, they immediately believe this makes it less
secure. This is an incorrect assumption, though. In fact, one of the biggest
issues with more prescriptive frameworks is that they set forth requirements
that MUST be complied with due to their prescriptive nature, even though
the requirements add no additional security benefits.
85
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
letters, numbers, and symbols. For example, a very long, strong, and
ON A
a very long, strong, and complex password, most people will be unable to
remember it. So, they simply write it down or type it into a virtual sticky
BY 22,
exploit or uses social engineering to gain access to the machine, they could
now locate the password stored in the virtual sticky note. During on-site
ES
written there for anyone to see. Therefore, longer and more complex
passwords become less secure when applied to real-world conditions.
GA
86
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
OUTCOMES
E m·
cybersecurity.
H
AM
The one thing people struggle with when they are new to the NIST
Cybersecurity Framework is that each outcome is written as a requirement.
GA
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
controls.
AM 23
subcategories and activities that can help define the specific outcomes that
AM
88
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
requirements, as well.
BY 22,
controls that must be used, but the organization can combine all of their
required controls across all regulations and create a singular action plan
AM 23
89
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
clearly told what they need to do and which controls to implement. The
ON A
problem with this approach is that it doesn’t scale very well. Prescriptive
LY UG
frameworks tend to be less relevant in the long term because systems and
the technology controls needed to secure those systems change at an
BY 22,
INFORMATIVE REFERENCES
AM 23
column with informative references that link back to the controls of other
frameworks.
GA
I
90
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
assets.
ON A
OTHER FRAMEWORKS
LY UG
(COBIT 5)
I
For the certification exams, you are not required to know any of
these frameworks in-depth, but you should have a basic understanding of
91
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
92
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
guidance.
AM
93
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
cyber threats. The CIS CSC provides a prioritized and actionable security
ON A
These controls are based on real-world attack patterns and are regularly
updated to address emerging threats and vulnerabilities. The controls are
ES
coverage.
AM
94
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
processes, ensuring that they align with the organization’s strategic goals
AM
INFORMATION TECHNOLOGY
INFRASTRUCTURE LIBRARY (ITIL)
I
95
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
two key rules: the Privacy Rule and the Security Rule.
: R 20
The Security Rule, on the other hand, focuses on the technical and
GA
97
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
the electric grid in North America. These standards are designed to protect
critical infrastructure assets and systems within the electric power industry
E m·
CIP standards, organizations in the electric power sector can enhance their
cybersecurity practices and align them with industry-specific requirements.
This integration allows utilities to adopt a risk-based approach to identify,
assess, and manage cybersecurity risks while ensuring compliance with the
NERC CIP standards. The combined use of these frameworks enables
utilities to enhance the resilience and reliability of the electric grid,
protecting it from cyber threats and maintaining the secure and continuous
delivery of electricity to consumers.
98
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
allows federal agencies to align their cloud security strategies with industry
I
99
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
100
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
web applications.
E m·
Top Ten, a regularly updated list of the most critical web application
security risks. This list serves as a guide for developers and organizations to
: R 20
SUMMARY
101
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
102
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CHAPTER EIGHT
AM 23
ES
IMPLEMENTATION TIERS
H
AM
103
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
core provides the fundamental functions and activities, the tiers enable the
evaluation of maturity and progress, and the profiles customize the
LY UG
where organizations may revisit and refine their implementation over time
: R 20
its strengths and areas for improvement to allow for a targeted and strategic
approach to enhancing its cybersecurity capabilities.
104
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
long-term cybersecurity goals is important. This ensures that the chosen tier
E m·
approach.
GA
105
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
aid the organization in learning from experience and organizations that are
continually getting better over time. In the NIST Cybersecurity Framework,
BY 22,
current tier level and set goals to advance to the next tier, gradually
improving their cybersecurity practices and enhancing their overall
H
resilience.
AM
106
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
measured within each tier level, including the risk management process, the
BY 22,
question being addressed is: “How well does the organization establish and
execute a risk management process that aligns with its risk tolerance,
objectives, and overall business strategy?” and “How well does my
organization practice risk management?”
107
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
threats?”
AM
MATURITY MODELS
GA
108
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
system (ISMS) based on the ISO/IEC 27001 standard. This maturity model
AM
109
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
maturity.
I
110
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
organization, such as Tier 2 or Tier 3, this dictates the level of effort and
resources that the organization will use toward its cybersecurity and risk
E m·
management programs.
ON A
organization move from one tier to another. The best way to approach this
is with a five-step process.
GA
Second, the organization must define the target state based on the
tier level they want to move toward. After all, if the organization doesn’t
have a target tier or goal selected, the organization can never determine if it
has succeeded in its efforts to move between different tier levels.
111
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
organization.
BY 22,
are achieved. If they are not, then the organization will need to adjust by
AM
approach to continually improve itself until it reaches the desired target tier
initially selected by the organization.
I
SUMMARY
112
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Tier 2 (Risk Informed), Tier 3 (Repeatable), and Tier 4 (Adaptive). Each tier
US co
with Tier 4 being the highest level of maturity. Even though the term
ON A
chart a path toward higher maturity. Also, recall that the process of moving
between different implementation tiers is not meant to be seen as a linear
progression, but instead, it is more agile and spiral in nature as the
organization identifies its current practices, attempts to improve them,
monitors the results and then adapts a new plan to continue their
improvement in the identified areas.
113
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
114
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CHAPTER NINE
AM 23
ES
PROFILES
H
AM
tonight has their own unique tastes and preferences. One person loves spicy
I
flavors, while another prefers mild and savory ones. To satisfy everyone’s
palate, you customize each dish, adjusting the seasonings, ingredients, and
cooking techniques used to prepare the meal.
115
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
by encompassing the five key areas of identity, protect, detect, respond, and
recover. These functions and their associated outcome categories and
AM 23
enhance and complement the framework, allowing for a more tailored and
H
customizing the NIST CSF. We will delve into the process of creating a
profile, examining how it aligns with organizational goals and risk
I
116
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
First, the core functions. The core functions are the foundation of
the framework and provide a structured approach to managing
E m·
management objectives, you can effectively tailor the profile to meet the
AM 23
117
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
with their unique risk landscape and business priorities. This unique profile
that the organization creates will be used to establish a roadmap that aligns
LY UG
its cybersecurity practices with its risk management strategy to enhance its
BY 22,
resilience against cyber threats and enables effective protection of its critical
assets and operations.
: R 20
AM 23
118
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
outcome categories that align with the organization’s priorities and risk
management objectives. Considering the unique cybersecurity challenges
E m·
and focus areas that are specific to the organization, you must prioritize
ON A
important.
ES
needs, resources, and risk landscape. This step ensures that the newly
created tailored profile includes the necessary measures and controls to
address the organization’s cybersecurity challenges effectively.
119
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
their actions on their specific risk landscape and priorities. By following this
step-by-step process, organizations can create a profile that aligns with their
ES
PROFILE TAILORING
GA
A framework profile can measure the gap between the current state
of cybersecurity practices and the target state, including the target
I
120
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Profile Components:
US co
Profile Objectives:
LY UG
systems.
: R 20
security incidents.
ES
Profile Activities:
H
exam systems.
GA
Profile Metrics:
• Percentage of privileged users utilizing multi-factor authentication
• Completion rates of cybersecurity awareness training modules
• Number of unauthorized access incidents reported
121
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
As you read through the sample target profile, you should have
noticed several interesting things about it.
E m·
ON A
Notice that the first section contains only one of the five functions
being considered in this profile. Remember that the framework is voluntary,
LY UG
and the organization can use as much or as little of it as they desire. In this
BY 22,
example, the organization and its consultants have only focused on the
protection function in this profile.
: R 20
activities that could have been added to help meet the overall organizational
AM
objective, the decision was made to limit the scope of the profile and the
number of activities selected to only the most important for this particular
GA
engagement. This decision may have been made due to the amount of time
I
and resources available from the organization for its cybersecurity program
and risk management programs, or it could have been because the
organization was extremely new and just trying to establish its initial actions
in a new cybersecurity program.
In the third section, you will notice that the profile objectives were
not written exactly as they are presented in the NIST Cybersecurity
Framework official documentation. In the target profile, it states that the
organization will “Establish robust identity management, authentication,
and access control measures to safeguard sensitive data in our certification
exam systems.” This most closely aligns with the outcome category of
PR.AC which states that “access to physical and logical assets and
associated facilities is limited to authorized users, processes, and devices,
and it is managed consistent with the assessed risk of unauthorized access
122
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
direct match word for word. This, again, is part of the tailoring. For
ON A
and credentials are issued, managed, verified, revoked, and audited for
authorized devices, users, and processes.” In the tailored profile, this was
BY 22,
systems.” The difference here is that the tailored version is more specific
AM 23
In the final two sections, you will notice the performance goals and
H
metrics. These are not found inside the NIST Cybersecurity Framework
AM
itself, but they are critically important when developing a targeted profile
for an organization. The performance goals state what we are trying to
GA
achieve with the actions specified in the profile. These tend to be more
I
Notice that the target profile did not include the specific number to
be used as a goal for this metric. This is because we want to keep this target
profile generic enough that we can reuse it over the years. During the kick-
off of the organization’s action plan, the metrics will be given a specific
target number that the organization is working toward. At this point,
though, we don’t know how many incidents the organization has had over
123
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
in length or more.
E m·
PROFILE TEMPLATES
ON A
objectives.
: R 20
creation process, ensuring that essential elements are included and relevant
outcome categories and activities are considered. Templates also promote
consistency across an organization or industry profiles, facilitating easier
benchmarking, sharing of best practices, and collaboration.
124
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
subcategories.
R ail.
US co
achieved.
ON A
goals are established to assess the success and effectiveness of the profile
implementation.
AM 23
125
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
MANUFACTURING PROFILE
AM
based on version 1.1 of the NIST CSF. This document is officially called
I
126
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
ISA/IEC 62443 as the basis for the controls needed to reliably produce the
LY UG
There are two particularly good use cases for this Target Profile.
ES
Target Profile in order to reveal gaps or weaknesses that might result in its
GA
127
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
control to further help control the risk. The AC-4 control is focused on
: R 20
Simply put, the organization should implement firewall and routing access
control lists to determine which systems can communicate with other
ES
servers. The SC-7(21) control states that boundary protection should also
be implemented through the use of isolation of system components based
on different missions or business functions.
128
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
trust in the electoral system, and safeguard the democratic process. This
profile serves as a valuable resource for election stakeholders, providing
BY 22,
guidance and best practices to address the unique cybersecurity risks and
challenges faced in the context of elections.
: R 20
AM 23
utmost importance.
I
129
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
smart grid systems can enhance their cybersecurity posture and resilience,
ensuring the secure and reliable delivery of electricity to consumers. The
I
profile provides valuable guidance and best practices tailored to the specific
requirements of smart grid systems, enabling organizations to effectively
manage cybersecurity risks and maintain the integrity and availability of
their critical infrastructure.
130
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
address the unique risks associated with connected vehicles, promoting the
adoption of best practices for secure vehicle-to-vehicle and vehicle-to-
BY 22,
PAYROLL PROFILE
H
and risks associated with payroll systems and processes. Payroll systems
play a critical role in organizations as they handle sensitive employee data
GA
The Payroll Profile emphasizes the need for strong access controls
and identity management to ensure that only authorized personnel can
access payroll systems and data. It also emphasizes the importance of data
encryption and secure transmission protocols to protect sensitive
information during transit. Additionally, the profile highlights the
significance of regular monitoring, detection, and response mechanisms to
identify and mitigate any potential payroll system vulnerabilities or
unauthorized activities.
131
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
MARITIME PROFILE
E m·
becomes more prevalent in the maritime domain, ensuring the security and
resilience of critical maritime infrastructure and systems becomes extremely
: R 20
important for the safety of the industry and the people working within it.
AM 23
132
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
133
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
By comparing the current profile with the target profile, organizations can
LY UG
identify the gaps and prioritize the actions needed to bridge those gaps and
move toward their desired cybersecurity state.
BY 22,
with their overall business strategy and risk management goals. It provides a
AM
134
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Many industries have their own specific cybersecurity requirements and best
ON A
ensure that their cybersecurity practices not only meet regulatory compliance
BY 22,
but also address the unique challenges and risks associated with their specific
industry.
: R 20
Using the framework core will help you focus the organization on
doing the Activities and Outcomes that make the biggest difference toward
achieving cyber resilience. There are many things you could do to become
more resilient. You have a lot of technical choices, but there are also non-
technical possibilities, too.
135
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
The main idea behind this secure once and comply many
approaches is to make it easier to operationalize the framework while
including all of the other cybersecurity obligations the organization might
have based on their industry or business model This allows the organization
to spend less time and money implementing controls because often a single
control can satisfy multiple requirements.
136
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Even better, the organization’s staff can also save lots of time
ON A
SECURE ONCE
AND
ES
COMPLY MANY
H
AM
GA
I
On the left-hand side of the diagram, notice the center of the circle
is the NIST Cybersecurity Framework. It includes the core and its 23
outcome categories and 108 subcategories activities.
Around the outside of the circle are all the other cybersecurity and
data protection requirements that the organization may have. In this
example, this organization is trying to comply with the ISO 27001
requirements, HIPAA regulatory requirements, information security policy,
and customer’s requirements. By mapping these different requirements
back to the framework core, duplication can be detected and removed to
provide a singular set of controls to meet all four sets of requirements at
once.
137
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
that isn’t in the healthcare industry but has a customer who is in the
ON A
healthcare industry.
LY UG
offices and hospital systems that want to use their services to print out the
: R 20
information, such as the reason for the doctor’s visit and what services were
ES
138
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
should cross-reference any of its existing controls that we have in place. For
R ail.
example, ISO 27001 has several requirements related to data backup,
US co
that ADPS is already set up for success and doesn’t have to add an entirely
new set of controls to meet this HIPAA requirement.
BY 22,
: R 20
uses validated data backup practices that remain consistent with the ISO
H
SUMMARY
I
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
standards.
AM 23
140
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CHAPTER TEN
AM 23
ES
141
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
and availability.
LY UG
Through the case study of Akylade Learning, we will delve into the
GA
IDENTIFYING THREATS
142
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
IDENTIFYING VULNERABILITIES
I
143
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
threat actors.
ON A
where a large organization has suffered a data breach simply because one of
its smaller trusted third-party vendors didn’t secure its own systems. Once a
H
threat actor is able to exploit the vendor, they can then pivot into the larger
AM
IDENTIFYING RISKS
I
144
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
occur.
ON A
risks based on their potential severity and the magnitude of their potential
impact on the organization and its operations.
AM
145
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
initiatives. For example, to mitigate the risk of data breaches resulting from
inadequate access controls, implementing multi-factor authentication,
LY UG
should highlight the specific benefits and advantages that these risk
mitigation measures offer in addressing the identified risks. For instance,
ES
mitigate the risk of data loss or system failures, ensuring business continuity
AM
146
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
also important that you have a solid methodology to aid in your decision-
US co
making process.
E m·
147
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
EVALUATING THE
BY 22,
148
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
risks.
BY 22,
changes.
I
149
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
mitigating risks.
: R 20
150
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
measures are aligned with the organization’s risk profile and business
LY UG
151
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
152
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
PART TWO
BY 22,
: R 20
AM 23
ES
THE CR-MAP
H
AM
GA
I
153
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
154
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CHAPTER ELEVEN
AM 23
ES
155
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
total cost, which stands at $65 million and continues to rise, is being directly
ON A
deducted from their cash flow as they did not possess cyber insurance.
LY UG
pallets into 207 rented tractor-trailers to fulfill customer orders. The delayed
I
156
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CYBERSECURITY PRACTICES
AM 23
157
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
organization that values daily cyber hygiene and the practice of reasonable
cybersecurity. You can thrive amidst evolving cyber risks by gaining insights
from the front lines and using that information to drive necessary changes.
As noted by leadership expert John P. Kotter, effective leadership lies in
facilitating meaningful change.
Within your grasp, you hold a practical guide that will assist you in
implementing and documenting your cybersecurity plan to such a degree
that it not only safeguards against reasonable threats but protects you
during potential acquisitions and investigations.
158
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
risks. This phase spans a period of thirty days. It focuses on assessing and
AM 23
risk management action plan itself. This phase also lasts thirty days and
I
159
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
ongoing vigilance, you can bolster your organization’s cyber resilience and
ensure effective management of cyber risks in a rapidly evolving threat
AM 23
landscape.
ES
the CR-MAP, you might question whether the journey has come to an end.
I
It is important to note that the progress made during the first year
does not go to waste. On the contrary, based on the cyber risk management
action plan you have developed, more work is likely needed to refine and
enhance your cyber risk management efforts. It would be a misstep to
simply halt the process at this stage and claim victory.
160
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
phases each year ensures that your organization remains resilient and
adaptive to evolving cyber threats while continuously improving your cyber
E m·
Once you have created your cyber risk management action plan,
BY 22,
management dollars?
H
AM
161
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
ATTORNEY-CLIENT PRIVILEGE
E m·
ON A
management action plan process and identifying your risks, you will already
BY 22,
manifests as a data breach, failure to prioritize that risk in your cyber risk
management game plan could lead to accusations of negligence, both legally
H
and in the court of public opinion. By conducting this work under attorney-
AM
client privilege, you retain control over your cyber risk records. You can
navigate any potential requests for a copy of those records as potential
GA
evidence.
I
162
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
SUMMARY
: R 20
AM 23
assessing the top cyber risks faced by the organization. This phase involves
prioritizing risks to allocate limited resources effectively. The second phase
H
addresses the top five risks identified in phase one. This plan considers
various dimensions of business value and aims to mitigate risks while
GA
163
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
these objectives.
US co
E m·
ON A
LY UG
BY 22,
: R 20
AM 23
ES
H
AM
GA
I
164
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CHAPTER TWELVE
AM 23
ES
PHASE 1: DISCOVERING
H
The first phase of the Cyber Risk Management Action Plan (CR-
MAP) spans thirty days. It marks the critical stage of measuring and scoring
your company’s existing cyber risks.
165
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
effectively.
US co
The first phase of the cyber risk management action plan includes
E m·
eight steps:
ON A
2. Get Buy-In
: R 20
3. Select Interviewees
AM 23
Let us delve into the intricacies of Phase 1 and explore how this
foundational phase and its eight steps can set the stage for a resilient and
proactive approach to managing cyber risks.
166
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
digital assets, such as customer data, payroll data, reputation, and trade
secrets, within the purview of its assessment. Moreover, involving all
H
167
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
This cyber risk management action plan you are developing simply
will not work without buy-in from your employees. Gathering this buy-in
AM
begins with the tone and approach you adopt when engaging with the
GA
input on their perceptions and activities within the company. The way you
communicate about the organization’s new action plan will set the stage for
a more collaborative approach.
168
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
already have strong relationships within the organization or with its affected
ON A
stakeholders.
LY UG
effectively garner initial support. Given below for your reference and
review, is a sample email template the organization’s leadership can us.
: R 20
AM 23
inevitably get questions in return, many of which will spawn from people’s
GA
Hello team,
169
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
These interviews aim to learn how we can best balance our cybersecurity
R ail.
needs with our day-to-day business needs. Each interview will take 30–90
US co
minutes and will be conducted in person here in [city] or via video call, as
E m·
necessary.
ON A
If you have any questions about the program itself, let me know. If you
have questions about the logistics of the interviews, let [point of contact
: R 20
name] know.
AM 23
Thank you!
ES
[Your name]
H
AM
During the first phase of the cyber risk management action plan,
you must determine the right individuals to interview during your
assessment. The number and type of interviews conducted will depend on
the size and revenue of your company.
170
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
the number of interviews you might conduct, you can use a different
R ail.
guideline to select the appropriate number of employees to interview.
US co
have used guidelines based on a percentage of their total staff size instead
ON A
of relying on the revenue targets listed above. In these cases, we have found
that an interview ratio of 1:5 is appropriate if the organization has 50 of less
LY UG
offer firsthand insight into a given organization's cyber risk landscape. They
are also, in fact, internal influencers. This means the very act of interviewing
them will make them better cyber risk managers, and this will shift your
culture toward more reasonable cybersecurity.
171
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
resilience.
AM 23
important to any organizations that are based in the United States because
AM
there are now laws that require organizations to meet certain levels of cyber
resiliency and cybersecurity.
GA
1. How well does the organization identify digital assets and cyber
risks?
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
cyber resilience.
ON A
When you create your questionnaire, you can keep it broad using
LY UG
just these five questions and ask the interviewees to assign a value from 0 to
10 to each response.
BY 22,
: R 20
For other engagements, you may find that these questions don’t dig
deep enough to get the answers you seek. In these cases, you will want to
AM 23
Most people believe you can never have too many resources
dedicated to protecting a digital asset in your organization, but this is simply
AM
not true. It is possible to have too much (or too little) security. Your risk
GA
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
notebook or sticky note. However, this defeats the entire purpose of long,
strong, and complex passwords because the note can now easily be stolen
LY UG
provide too much security and a waste of resources, including time, money,
and employee morale.
174
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Using the potential scorecard, the cyber risk expert states, “Our
: R 20
zero. If your expert knows or perceives that the organization is a bit better
than that, then they could have instead read the next score statement, “Our
ES
find a statement that most closely matches their perception from the
I
175
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
engagements.
E m·
posture. You can use these questions as a baseline for your default
questionnaire but remember you can always remove unneeded questions
: R 20
and add questions you may find useful based on your own experience.
AM 23
Activity format, such as ID.AM-1 represents the Identify (ID) function, the
I
Asset Management (AM) category, and the first activity (1) in this category.
176
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
strategy?
only a few high-value ones.
ON A
177
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
organization understand
differently by attackers than
ON A
operations, reputation,
may seem ordinary to you,
and people?
but is highly sought after by
BY 22,
Executive management
ES
decisions will be
(ID.RM) support operational
inconsistent, and some will
cybersecurity risk
I
178
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
assets limited to
and Access and storage areas
authorized users,
E m·
need-to-know basis.
BY 22,
Everyone in your
GA
179
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
errors.
LY UG
(PR.IP) requirements.
systems and assets?
ES
Information systems
How well are the include servers, desktops,
maintenance and repairs laptops, mobile devices, and
of our organization’s cloud services. All must be
Maintenance
information systems protected against
(PR.MA-2)
performed consistent unauthorized access during
with our policies and maintenance to guard
procedures? against data loss or
malicious code infection.
180
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
someone is intruding on
ON A
normal.
: R 20
potential impacts of
Events know whether an incident
security events
ES
assets monitored to
Continuous to watch what’s happening
identify cybersecurity
I
181
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
insiders.
: R 20
182
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
improving, too.
learned into future
H
activities?
AM
Recovery
restoration activities with quickly, insiders need to be
Communications
I
183
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
scoring system, your next crucial step is to establish specific targets within
the range of five to eight for each of the five functions outlined in the NIST
: R 20
184
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
except for the protect function, which receives a higher target score of 7 or
AM
8.
GA
I
The idea behind the strong castle approach is to identify the most
critical things to protect and then focus your time, effort, and resources on
protecting those things. This strong castle approach and its associated target
score profile is still the current practice of many organizations across
185
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
target scores in the other four functional areas. This approach focuses the
GA
scores.
186
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
an incident occurs.
E m·
ON A
LY UG
BY 22,
: R 20
AM 23
ES
H
expensive and difficult to achieve. Oddly, it’s only practical for either very
I
187
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
sensitive digital assets, like its customer’s names, mailing addresses, and
LY UG
credit card information. Additionally, this organization likely has its own
source code and trade secrets that must be protected. In this scenario, you
BY 22,
approach or the assigned target profile score, you should take the time to
record it before you begin conducting the interviews with the cyber risk
GA
188
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
in your company. Moreover, having the scoring table on hand helps to keep
US co
your respondents’ answers uniform, thus giving you more reliable data
across all the people you will be interviewing.
E m·
ON A
189
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
and ensuring transparency and confidentiality, you can gather the best
possible data and insights from your employees. This will enable you to
E m·
As you begin the interview, you should spend the initial ten
BY 22,
provide them with the score key and a brief explanation of the scoring
process and the purpose of the interview.
H
AM
190
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
associated scores, your next step is to average them out and compare them
to your target scores for each function, category, and activity of the NIST
LY UG
In this diagram, you will notice two circular rings. The outer green
ring is the target score chosen for this particular organization, which is a six
for this diagram. The inner orange ring is the minimum acceptable risk
target score for this organization, which is a five. Near the rings, you will
notice the average response received from the interviewees, for each of the
functions, categories, and activities, as indicated by the black line.
191
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
192
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
The biggest mistake you could make is to simply delete the data,
LY UG
which is often people’s first thought. Instead, the best course of action is to
keep the data, but not include it in the calculations of the client’s scores to
BY 22,
prevent the junk data from skewing the organization’s scores calculated
during CR-MAP process.
: R 20
AM 23
Instead of using the data in calculations, think about why the data
is unusable, and what that might say about the broader environment in the
ES
client’s organization. Did all the executives give unrealistic scores for every
question or did all the operations personnel answer with an eight simply
H
In either case, you need to undercover the root cause of this junk
GA
193
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
they excel in detecting service outages but often fall short in detecting
US co
headlines and narratives from vendors. It’s important to note that the
questionnaire we created does not directly address specific technological
ES
measures like firewalls. This was not an oversight in the questionnaire but
instead was a deliberate approach that stems from our perspective of
H
treating cyber risks as business risks and using a top-down approach rather
AM
anti-spam filters, are essential, relying solely on them will not guarantee
I
194
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
within the five-to-eight range for each function in the NIST Cybersecurity
Framework. This tailored approach ensures that your organization’s cyber
risk management efforts align with its unique needs and risk landscape.
195
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
196
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CHAPTER THIRTEEN
AM 23
ES
public, they hid it from their consumers. They continued selling the
defective—and, frankly, dangerous—routers. As a result, widespread
I
exploitation by hackers occurred, and the attackers were able to gain access
to more than 12,900 connected storage devices.
197
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
might have resulted in a decrease in sales for a short time, but over the long
ON A
haul, it would have enhanced their reputation, not diminished it. They would
LY UG
but because they would know that when a flaw is discovered, they will be
upfront about it. This is called responsible disclosure.
: R 20
AM 23
experienced significant data breaches over the years. In 2014, Home Depot
suffered a data breach that resulted in the theft of 56 million stolen credit
H
card records from their customer database. A year earlier, in 2013, Target
AM
suffered a similar data breach that caused 40 million stolen credit card records
GA
to be stolen.
I
198
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
important that we look at some things that are the keys to successfully
BY 22,
being able to develop your CR-MAP in phase two of the process. This
includes prioritization, roles, and responsibilities, understanding the scale,
: R 20
question your choices, but it’s important to listen to feedback while staying
I
199
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
on the customer service team can quickly adopt a password manager for
their accounts, scaling these changes becomes increasingly challenging as
BY 22,
the size of the organization grows. Scaling each element of your action plan
becomes more difficult with a larger organization, requiring careful
: R 20
achieve the organization’s desired target scores. This is where the data
collected back in the first phase becomes crucial. If your staff is hesitant to
implement additional security measures, you can present them with the
numbers they provided, highlighting the need for action based on their own
input.
200
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
implemented.
E m·
Now that you have identified and prioritized your top five
LY UG
cybersecurity risks, it’s time to develop your cyber risk management action
plan. This crucial second phase will span thirty days, during which you will
BY 22,
posture.
AM 23
questionnaires and identifying your risks already puts you ahead of many
H
other organizations and competitors who have yet to take similar steps.
AM
This ensures protection if a cyber risk you didn’t prioritize becomes the
source of a data breach, guarding against potential accusations of negligence
I
201
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
that your service offerings are provided as is, and your liability is restricted
H
Now, to develop your cyber risk management action plan, you will
follow five steps inside of phase two of the CR-MAP process:
202
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Let’s consider an excerpt from a top cyber risk report that includes
ON A
(DE.DP) and was identified through the question, “How well are our
detection processes and procedures maintained and tested to ensure
BY 22,
The average response from our interviewees was 1.4, while the target
AM 23
score was 6, and the minimum acceptable score was 5. This leaves the
organization with a gap of 4.6 (6 target score – 1.4 average response).
ES
203
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
model.
BY 22,
considerations, here are starting points for three of the activities to aid your
progress for the five detection process requirements:
AM 23
204
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
cyber risks to ensure each has been thoroughly considered, and appropriate
R ail.
controls and mitigations are recommended for inclusion in the cyber risk
US co
shows that the trend will continue for years to come. Unfortunately, the
sources of cybersecurity talent have been unable to keep pace with the
BY 22,
and practice the major point made within this book: cyber risks are business
risks just as serious and worthy of the executive leader’s attention as risks to
ES
sales, order fulfillment, and accounts receivable. This means hiring the
H
talented cybersecurity people you want on your team may be difficult. Even
AM
if you can find them, they will be expensive. Also, odds are they will receive
frequent, unsolicited job offers from organizations willing to pay more than
GA
you are, in which case you will lose them from your team.
I
This means you need to be very smart about where to get the talent
you need to execute your cyber risk mitigation action plans. To help
mitigate this talent gap, we recommend carefully considering which work
you want to keep in-house versus which work will be outsourced.
The general guidance for this is simple: keep the work that is core
to your business in the hands of your trusted insiders and employees.
205
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Core tasks are ones in which your employees perform tasks that
US co
help the business take smart cyber risks, deliver higher quality cybersecurity
decisions than outsiders would be able to, and establish and maintain
E m·
development of your first cyber risk management action plan, that would be
AM 23
your organization may hire an outside firm to conduct your quarterly PCI-
AM
oversight from your employees. Therefore, we can shop around for the best
I
First, we have the core tasks. Maybe we need to bring someone on,
to work as a project manager, preferably with IT security knowledge and
experience, which can be learned. Since it is a tight labor market, we may
opt to provide an internal opportunity to an existing employee first when
trying to fill this position. This project manager will be focused on several
core tasks, including committee work, chairing the cyber risk committee,
participating on the change control committee, participating on the disaster
recovery committee, developing and maintaining standards and procedures,
206
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
COST OF IMPLEMENTATION
AM 23
our cyber risk management planning, we utilize the three-year total cost of
H
207
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
This means the total operating cost per year is $20,200 ($20,200 = $13,000
H
But, this is only the cost per year for a single year, not 3 years.
GA
So, the total cost of ownership over the first 3-year cycle (3TCO)
would be $106,600. This is $46,000 for the implementation cost plus
another $60,600 for the operating cost over the 3 years.
208
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
system acquisition costs, but we will have 160 hours of labor required to
US co
build out the new crisis communication plan at the cost of $125/hour. This
gives us a total implementation cost of $20,000 (160 hours x $125/hour).
E m·
ON A
The organization will spend about 40 hours per year to operate and
maintain this new plan at a cost of $125/hour, generating $5,000 per year in
LY UG
operating costs.
BY 22,
communication plan.
ES
any new system, control, or mitigation that you may want to recommend as
AM
part of your new cyber risk management action plan using a three-year total
cost of ownership (3TCO) figure for easy comparison against other
GA
potential solutions.
I
The business value model contains trust at its cost and divides the
value into four quadrants.
209
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
If you go to the director and say, “We are rolling out a new
cybersecurity process for your department that will require a new piece of
210
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
in that.”
E m·
them; by using the business value analysis model to explain your proposed
changes, you can make them understand how this change will make their
BY 22,
cybersecurity change in a way that gets buy-in from the business side of
your organization, your changes are sure to fail. Soft skills are extremely
ES
Another way the business value model can be useful is when you
need to justify spending money on cybersecurity measures. For example, a
GA
the organization’s budget. You will compete with other proposals for how
your company should spend that same $25,000 because money is a finite
resource.
211
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
we have identified these factors and any additional ones we might want to
H
minimize the gap between our target score and our currently assessed score
within the organization.
GA
212
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
your own roadmap, we recommend a quick web search for the term “Gantt
US co
chart Excel” to find several different templates and tutorials to help get
your roadmap development started.
E m·
ON A
training
company-wide
AM 23
encrypt of Reliability
USB storage
H
company-wide
AM
in contracts
I
213
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
pace for the organization’s staff. In the provided table, notice that
ON A
Once you have identified the gaps that need to be addressed within
ES
your organization and assigned roles for everyone in your cyber risk
management action plan, securing buy-in from the organization’s key
H
addressing the following areas and sharing detailed information about them
through various communication channels while leveraging established
platforms such as newsletters and weekly team meetings. Collaborating with
your marketing team can be advantageous as they possess valuable tools
and techniques to support your efforts.
Next, you must establish how you will measure the success of the
implemented mitigation. Define key performance indicators (KPIs) or
214
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Next, you will need to identify the individuals who will take the
LY UG
that accountability and coordination amongst the teams occur. This clarity
: R 20
behind these decisions. This ensures that the required resources are
available to implement the mitigation strategies effectively.
GA
215
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
First, excluding your company name and logo from the scorecard is
recommended. This may seem counterintuitive, but it helps prevent any
216
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
security measure, random license plate codes like WHJ-597 can be assigned
and placed in the upper-left and bottom-right corners of the scorecard. This
H
SUMMARY
217
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
you can protect your organization, maintain customer trust, and minimize
the potential impact of cyber threats.
H
AM
GA
I
218
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CHAPTER FOURTEEN
AM 23
ES
PHASE 3: MAINTENANCE
H
AND UPDATES
AM
GA
their abysmal cyber hygiene practices at the time. The attackers, whose
identities remain unknown, demonstrated a high level of sophistication
given the scale and precision of the breach. They meticulously navigated
Equifax’s network, identifying valuable credit information, and
subsequently exfiltrated gigabytes of data without detection. Regrettably,
this breach compromised the credit files of countless working Americans,
raising concerns about the long-term repercussions and the motivation
behind the attack.
219
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
unfounded, the economic gears of the country could grind to a halt, stifling
growth and causing widespread disruption.
BY 22,
exposing a shocking lack of cyber hygiene. The attackers did not need to
AM
220
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
process, we must note that these steps are not performed as strictly linearly
as in previous phases. Instead, these steps are often conducted at the same
E m·
time or using an iterative nature. The entirety of this third phase takes about
ON A
ten months to complete, which will complete the full twelve-month CR-
MAP process cycle.
LY UG
to sustaining your cyber risk management action plan. These sessions serve
: R 20
scorecard. It’s crucial to remember that the scores obtained in phase one of
ES
the CR-MAP process are not fixed or static. Instead, they should evolve
over time for each item on the questionnaire and update them based on
H
STEP 1: CONTINUALLY
GA
Updating your scores not only provides data but also tells a
compelling story. For instance, when engaging with a regulator, you can
showcase the progress made over time by stating, “A year ago, our average
score for detecting cybersecurity incidents was 3.6 during our initial cyber
risk assessment; however, through sustained efforts over five quarters, we
have significantly improved our score to 5.1.”
221
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
STEP 2: SCHEDULE
R ail.
MONTHLY CHECK-INS
US co
entire year. These check-ins, which typically take about an hour, should be
LY UG
consistently held on the same day and time each month to maintain a sense
of regularity and consistency.
BY 22,
and tactical. The primary purpose is to monitor progress and identify any
obstacles hindering your advancement. Having too many participants can
H
Since you are already aware of the cybersecurity initiatives you are
GA
other on the progress made in executing different parts of the cyber risk
management action plan. These meetings also serve as a chance to review
the plan and ensure that you are aligned with the organization’s objectives
while providing an avenue for making necessary adjustments to stay on
track.
If you find yourself off track during the monthly check-ins, the
solution might be relatively simple. It could be a matter of lacking the
necessary skill set to effectively mitigate a specific cyber risk. In such cases,
it becomes a human resources challenge that can be addressed by hiring or
contracting someone with the required expertise to help resolve the issue.
222
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
in a distinct way can inadvertently reinforce the notion that cyber risks are
I
223
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
cybersecurity function has achieved its target score, you can mark it as
E m·
completed and shift your focus to the next priority on your list.
ON A
procedures to ensure that every new member receives a badge with their
photograph. Once the project is successfully handed off to the physical
ES
security team and they have commenced its operation, the risk associated
H
completion of that specific project. At this point, updating your cyber risk
records to reflect progress and adjusting your priorities accordingly is
GA
essential.
I
STEP 3: SCHEDULE
QUARTERLY REVIEWS
224
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
organization must stay vigilant and informed about the evolving threats and
: R 20
meetings keep stakeholders informed about the progress and steer the
overall cyber risk management action plan. If your organization operates in
GA
during their interactions with potential customers. This ensures they are
equipped with up-to-date information and can address any potential
concerns their clients might have.
225
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
consider any new or evolving internal and external risks to the organization.
US co
STEP 4: SCHEDULE AN
ES
to reflect on your company’s progress throughout the year. It sets the stage
for repeating the phases of the cyber risk management action plan process
GA
226
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
been accomplished, you reassess and determine your next set of priorities.
US co
This process applied to our annual interviews, as well, since they help us
answer the question, “What actions are now necessary to uphold our
E m·
the data-gathering phase again. This spiral and iterative process not only
effectively manage cyber risks and adds value to your organization but also
: R 20
SUMMARY
227
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
these meetings, you can foster a deeper understanding and appreciation for
E m·
organization.
AM 23
ES
H
AM
GA
I
228
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CHAPTER FIFTEEN
AM 23
ES
CONCLUSION
H
AM
229
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
complete the practice exams for the A/CCRF and A/CCRP certification
LY UG
are designed to provide you with an opportunity to test your knowledge and
gauge your readiness for the official certification exams.
: R 20
AM 23
Once you complete the practice exam, you should review the
correct answers and explanations included with the practice exams to
ES
book, you have confidently acquired the tools to navigate the complex
cybersecurity landscape.
230
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
231
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
232
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
APPENDIX A
AM 23
ES
- Cybersecurity
- Information security
- Information systems security
- Information assurance
233
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
- Vulnerabilities
US co
- Confidentiality
E m·
- Integrity
ON A
- Availability
- Non-repudiation
LY UG
- Authentication
1.2 Summarize key aspects of the
BY 22,
Framework
- Components of the NIST Cybersecurity
ES
Framework
H
- Framework Core
AM
- Framework Profiles
- Implementation Tiers
GA
- Identify
- Protect
- Detect
- Respond
- Recover
1.3 Summarize how the NIST
Cybersecurity Framework is different 2 4
than other frameworks and certifications
234
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Controls
- Focus on Risk instead of Compliance
LY UG
Requirements
BY 22,
References
- International Organization for
ES
Standardization (ISO)/International
Electrotechnical Commission (IEC) 27001
H
and 27002
AM
235
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Framework
- History of the NIST Cybersecurity
LY UG
Framework
- Executive Order 13636
BY 22,
(CISA) of 2015
2.1 Explain the importance of the
GA
Framework Core 2 6
I
- Identify
- Asset Management
- Business Environment
- Governance
- Risk Assessment
- Supply Chain Risk Management
236
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
- Maintenance
US co
- Protective Technology
E m·
- Detect
ON A
- Detection Processes
- Respond
BY 22,
- Response Planning
: R 20
- Communications
- Analysis
AM 23
- Migration
- Improvements
ES
- Recover
H
- Recovery Planning
AM
- Improvements
- Communications
GA
- Identify
- Asset Management
- Business Environment
- Governance
- Risk Assessment
- Supply Chain Risk Management
- Protect
- Identity Management and Access Control
- Awareness and Training
- Data Security
- Information Protection Processes and
Procedures
237
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
- Detection Processes
US co
- Respond
E m·
- Response Planning
ON A
- Communications
- Analysis
LY UG
- Migration
- Improvements
BY 22,
- Recover
: R 20
- Recovery Planning
- Improvements
AM 23
- Communications
2.4 Summarize how the NIST
ES
other publications
GA
238
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
(OWASP)
US co
(CMMI)
- Cybersecurity Capability Maturity Model
ES
(C2M2)
H
(CMMC)
- ISO/IEC 27001
GA
- Tier 1 (Partial)
- Tier 2 (Risk Informed)
- Tier 3 (Repeatable)
- Tier 4 (Adaptive)
3.3 Given a scenario, recommend strategies
for moving an organization between 1 8
Implementation Tiers
239
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
- Core functions
ON A
- Categories
- Subcategories
LY UG
- Utilizing Profiles
- Current Profile versus Target Profile
BY 22,
posture
4.2 Given a scenario, utilize a profile
AM 23
needs
H
AM
- Profile templates
- Sector-specific profiles
- Manufacturing Profile
- Election Infrastructure Profile
- Satellite Networks Profile
- Smart Grid Profile
240
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
- Risk Analysis
E m·
- Qualitative
ON A
- Likelihood of a risk
- Impact of a risk
LY UG
- Quantitative
- Single-loss expectancy (SLE)
BY 22,
- Financial Analysis
- Total Cost of Ownership (TCO)
- Return on Investment (ROI)
- Return on Assets (ROA)
- Risk appetite
5.2 Given a scenario, determine the
appropriate risk response to a 2 3
given threat or vulnerability
- Risk Responses
- Acceptance
- Avoidance
- Transference
241
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
mitigation
: R 20
mitigation
- Develop a risk management plan
H
242
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
APPENDIX B
AM 23
ES
243
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
management questions
US co
of cybersecurity incidents
ON A
outcomes
- Understand the 0-10 scale used in CR-MAP
GA
244
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
245
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
Framework
AM 23
- Financial returns
- Technical risk mitigation
- Legal risk mitigation
- Reliability of Operations
3.3 Given a scenario, create custom
mitigations based on organization 2 13
questionnaire and interviews
3.4 Given a scenario, create standard
operating procedures (SOPs) for 1 13
custom mitigation and control
- Implement mitigations
- Implement controls
246
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
an organization
ON A
organizational units
- Group mitigations by the type of owner
BY 22,
- Money
- Skilled personnel
ES
- Understand recommended
mitigations/controls
247
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
on periodic reviews
BY 22,
: R 20
AM 23
ES
H
AM
GA
I
248
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
APPENDIX C
AM 23
ES
GLOSSARY
H
AM
This glossary references all the terms used in the exam syllabus and the
official textbook. These key terms and definitions should be understood by
GA
analysis (RS.AN)
An outcome category ensures that proper analysis is conducted to
ensure effective response and support recovery activities
249
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
assessment
An internal management activities focused on identifying areas for
BY 22,
improvement
: R 20
business purposes
H
AM
asset value
Represents the financial worth of the asset at risk
GA
audit
I
authentication
The process of verifying the identity of individuals or entities
attempting to access digital systems or resources to prevent
unauthorized access and ensure data security
availability
The assurance that digital systems, services, and resources are accessible
and usable when needed, without disruptions or services being denied
250
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
CIANA pentagon
BY 22,
communications (RC.CO)
GA
communications (RS.CO)
An outcome category ensures that all response activities are
coordinated with internal and external stakeholders, such as external
support from law enforcement agencies if required
compliance architecture
The structure and framework that organizations establish to ensure
adherence to regulatory and legal requirements related to cybersecurity
and data privacy involves the design and implementation of policies,
251
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
confidentiality
FO m
The protection of sensitive information from unauthorized access or
disclosure by ensuring that only authorized individuals or entities can
R ail.
controls
E m·
critical infrastructure
BY 22,
critical system
Any system whose failure or disruption would have a significant impact
H
mission
GA
current profile
I
cyber resiliency
An organization’s ability to withstand and adapt to cyber threats by
effectively responding to and recovering from cyber attacks or
disruptions while minimizing damage and maintaining essential
functions
cybersecurity
The practice of safeguarding computer systems, networks, and digital
information from cyber threats through a range of technical,
operational, and managerial measures aimed at preventing unauthorized
252
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
cybersecurity incident
Any unauthorized or malicious event that compromises the
AM 23
253
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
exposure factor
The percentage of loss that would occur if the asset were compromised
GA
financial analysis
A crucial aspect of risk management that focuses on assessing the
financial implications and considerations associated with cybersecurity
measures and investments
254
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
framework core
R ail.
A high-level cybersecurity category that groups related activities and
US co
framework profile
: R 20
governance (ID.GV)
H
identify (ID)
A function that involves developing an organizational understanding of
cybersecurity risks risk to systems, people, assets, data, and capabilities
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
improvements (RC.IM)
E m·
improvements (RS.IM)
BY 22,
information assurance
ES
information security
The protection of information and data assets from unauthorized
access, use, disclosure, alteration, or destruction that involves the
implementation of security measures, policies, procedures, and controls
to ensure the confidentiality, integrity, and availability of information
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
integrity
E m·
likelihood
The probability of a risk event occurring or being realized
GA
maintenance (PR.MA)
I
maturity model
A structured framework that assesses and guides the progression of an
organization’s capabilities and maturity levels in a specific domain,
providing a roadmap for improvement and growth
257
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
An approach that sets out to achieve a minimum score across the board
R ail.
based on the belief that this is reasonable within the organization’s
US co
mitigation (RS.MI)
BY 22,
the expansion of an event, mitigate its effects, and resolve the incident
AM 23
non-repudiation
The assurance that the originator of a digital communication or
transaction cannot deny their involvement or the authenticity of the
data being exchanged
protect (PR)
A function used by organizations to develop and implement safeguards
to ensure the delivery of critical services and the protection of assets,
both physical and digital, against cyber threats
258
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
recover (RC)
: R 20
incident
H
by cybersecurity incidents.
I
residual risk
The level of risk that remains after implementing risk mitigation
measures, such as controls and safeguards
259
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
responsible disclosure
The ethical practice of promptly and transparently informing affected
LY UG
risk
The potential for loss, damage, or harm resulting from the occurrence
I
risk acceptance
A risk response action involves acknowledging the existence of a risk
and choosing not to take further action to avoid, transfer, or mitigate it
risk appetite
An organization’s willingness and tolerance level for accepting potential
risks related to its digital systems and assets, guiding decision-making
processes to align risk management strategies with business objectives
and priorities
260
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
risk avoidance
R ail.
A risk response action that aims to eliminate or minimize risks by
US co
risk management
ON A
risk mitigation
I
risk register
A centralized document or database that systematically records and
tracks identified risks, along with their attributes, assessment results,
and corresponding risk management actions, to facilitate effective risk
monitoring and mitigation
risk transference
A risk response action that involves shifting the potential impact of a
risk to a third party, typically through contracts, agreements, or
insurance policies
261
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
stakeholder
BY 22,
supplier
GA
target profile
The organization’s desired state of cybersecurity practices and
outcomes, as well as outlining the specific cybersecurity improvements
and goals it aims to achieve
262
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
vulnerability
ON A
world-class approach
BY 22,
263
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
264
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023
He lives in the Seattle, Washington area with his wife and six children.
BY 22,
students across 190 countries get certified and advance in their careers.
With decades of real-world experience, he has served as an Information
ES
265
LICENSED FOR USE ONLY BY: RAMESH AMGAI · ibjcroevin32@gmail.com · AUG 22, 2023