In the spirit of the Cyber Security Awareness Month, we wanted to do a five part article on the Five Functions of NIST (National Institute of Standards and Technology). The goal is to provide a high-level overview of the things you should be doing to be more Cybersecure. We like the NIST framework because it is simple, logical and expandable. Everything you build as per the below would be rolled into your Cybersecurity program and enforced via policies.
The first function is “Identity”, the official definition: “The Identify Function assists in developing an organizational understanding of managing cybersecurity risk to systems, people, assets, data, and capabilities.” As we said: logical. If you want to protect yourself from cyber threats, you need to know what you need to protect! (and we will of course focus on data).
Step 1: Create a list of assets and people: all physical, logical and software assets in your organizations and the [groups of] people using them including, but not limited to:
Step 2: Establish a data classification framework and evaluate it against your different data (for example, public, private, confidential and secret)
Step 3: Looking at the assets in step 1 and evaluating it against the data sensitivity in step 2 start evaluating the actual risks, the main factors being:
A risk is a combination of the likelihood (rare, unlikely, moderate, likely, almost certain) of something happening vs the impact (negligible, minor, moderate, major, severe) of that thing happening, based on the matrix below you can assign a risk from very low to extreme.
So for example: One of your executives has the entire finances of the company on his/her laptop (it is not encrypted, but it is backed up). According to our classification, that data would be typically be considered confidential, not secret. Evaluating against the risk above:
(hint: with information like this, you can now make some good decisions, like in the above: just encrypting that laptop would eliminate the high and very high risks).
As you start getting Cybersecure, here is a list of documents you should be creating:
We hope this will help to get you started on your Cybersecure journey. All documents and information are only made available for informational purposes, you should work with a professional to adapt them to your business.
Stay tuned for the next of the Five Functions: Protect.