NIST Cybersecurity Framework
por Vasilis Giotsas

1. Protect
1.1. Protective Technology
1.1.1. Communications and control networks are protected
1.2. Identity Management, Authentication and Access Control
1.2.1. Network integrity is protected (e.g., network segregation, network segmentation)
1.3. Data Security
1.3.1. Protections against data leaks are implemented
2. Detect
2.1. Anomalies and Events
2.1.1. A baseline of network operations and expected data flows for
2.1.2. Event data are collected and correlated from multiple sources and sensors
2.1.3. Impact of events is determined
2.2. Security Continuous Monitoring
2.2.1. The network is monitored to detect potential cybersecurity events
2.2.2. Malicious code is detected
2.2.3. External service provider activity is monitored to detect potential cybersecurity events
3. Respond
3.1. Communications
3.1.1. Information is shared consistent with response plans
3.1.1.1. s
3.1.2. Notifications from detection systems are investigated