Identify - Develop security policies and capabilities. Evaluate risks, threats, and vulnerabilities and recommend security controls to mitigate them, Protect - Procure/develop, install, operate, and decommission IT hardware and software assets with security as an embedded requirement of every stage of this operations life cycle., Detect - Perform ongoing, proactive monitoring to ensure that controls are effective and capable of protecting against new types of threats., Respond - Identify, analyze, contain, and eradicate threats to systems and data security., Recover - Implement cybersecurity resilience to restore systems and data if other controls are unable to prevent attacks.,

NIST Cybersecurity Framework Functions

Tabla de clasificación

Estilo visual

Opciones

Cambiar plantilla

¿Restaurar actividad almacenada automáticamente: ?