NIST CSF 2.0
Know the framework. Build the program. Defend what matters.
THE RING
Identify
Understand the organization's current cybersecurity risks. Know your assets, your vulnerabilities, your threats, and your exposure before you can protect against them.
Protect
Use safeguards to prevent or reduce cybersecurity risk. The controls, policies, and technical measures that stand between threats and assets.
Detect
Find and analyze possible cybersecurity attacks and compromises. Detection speed is the metric that determines whether a breach is a contained incident or a catastrophe.
Respond
Take action regarding a detected cybersecurity incident. Contain the damage, communicate to stakeholders, analyze the cause, and mitigate the impact.
Recover
Restore assets and operations affected by a cybersecurity incident. Get back to normal — and come back stronger than before.