NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
January 23, 2019

Quickstart Guide: NIST Cybersecurity Framework

Justin Fimlaid Justin Fimlaid

There’s a big difference between a security assessment and a security program review. The NIST Cybersecurity Framework is the leading go-to for developing a security program. The NIST Cybersecurity Framework is broken down into three parts:

  1. Framework Core
  2. Implementation Tiers
  3. Profiles

Need assistance getting started with the NIST Cybersecurity Framework and maturing your security processes? Contact NuHarbor today!

The Core provides a set of desired cybersecurity activities and outcomes and creates a common language.  You Think of this as core capabilities implemented in a way that everyone can understand and talk about.

The second part is the Implementation Tiers, which guide organizations to consider the appropriate rigor of security-based company strategic goals and objectives. You can think of this of as a maturity model for your organization that considers executive risk appetite. Simply put, it measures where you’re at today and gives you a framework to decide how good you want to be in the future.

The third and final part is Profiles, which is about optimizing the cybersecurity framework to best serve the organization. The Framework is voluntary, so there is no ‘right’ or ‘wrong’ way to do it. One way of approaching Profiles is for an organization to map their cybersecurity requirements, mission objectives, and operating methodologies, along with current practices, against the subcategories of the Framework Core to create a “Current” Profile. These requirements and objectives can be compared against the current operating state of the organization to gain an understanding of the gaps between the two. Profiles help to create a prioritized implementation plan based on risk, priority, budget, timing.

As you get started with the NIST Cybersecurity Framework to establish your security program, it can be overwhelming. If you’re unsure how or where to start, start with the Core. Once you get comfortable with the Core, then you can start taking on the Tiers and Profiles.

The Core

Let’s start with breaking down the Core. The Core consists of three parts:

  1. Functions (5 total)
  2. Categories (23 total)
  3. Subcategories (108 total)

Simply put, this is a way to organize the logical groupings of the NIST CSF functions and capabilities so you can perform logical mappings between the security controls and desired functions and vise-versa.

The Core Functions

The Core includes five high level functions:

  1. Identify
  2. Protect
  3. Detect
  4. Respond
  5. Recover

1. Identify

The Identify function assists in developing your ability to manage your security program related to governance of the program and manage over cybersecurity risk. This function also assists in developing an organizational understanding of managing cybersecurity risk as it pertains to systems, people, assets, data, and capabilities. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus on and prioritize its efforts, consistent with its risk management strategy and business needs.

2. Protect

The Protect function establishes core safeguards to protect and ensure delivery of core services. Performed correctly, this function will also give you the ability to limit or contain the impact of a potential cybersecurity event.

3. Detect

The Detect function defines the appropriate activities for identifying a cybersecurity event. Developing this function allows you to quickly identify and respond quickly to a cybersecurity event for effective containment. Your ability to Detect directly affects your ability to timely exercise the Respond function.

4. Respond

The Respond function includes a series of actions and activities for effectively taking action regarding a detected cybersecurity incident. The Respond function supports the ability to contain the impact of a potential cybersecurity incident.

5. Recover

The Recover function identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident. The Recover function supports timely recovery to normal operations to reduce the impact of a cybersecurity incident.

These five functions are not only applicable to cybersecurity risk management, but also to risk management at large.

The Core Categories

The next level down is the 23 Categories that are split across the five Functions.

This image depicts the Framework Core’s Functions and Categories:

A Short Description of Categories

  1. Asset Management: The organization identifies data, personnel, devices, systems, and facilities that enable the organization and achieve business goals.
  2. Business Environment: The organization’s mission, objectives, stakeholders, and activities are understood and prioritized. This information is used to inform cybersecurity roles, responsibilities, and risk management decisions.
  3. Governance: The policies, procedures, and processes to manage and monitor the organization’s regulatory, legal, risk, environmental, and operational requirements are understood and inform the management of cybersecurity risk.
  4. Risk Assessment: The organization understands the cybersecurity risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals.
  5. Risk Management Strategy: The organization’s priorities, constraints, risk tolerances, and assumptions are established and used to support operational risk decisions.
  6. Supply Chain Risk Management: Identifies, establishes, and assesses cyber supply chain risk management and gains stakeholder agreement.
  7. Identity Management and Access Control: Access to assets and associated facilities is limited to authorized users, processes, or devices, and to authorized activities and transactions.
  8. Awareness and Training: The organization’s personnel and partners are provided cybersecurity awareness education and are adequately trained to perform their information security-related duties and responsibilities consistent with related policies, procedures, and agreements.
  9. Data Security: Information and records (i.e., data) are managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and availability of information.
  10. Information Protection Processes and Procedures: Security policies (that address purpose, scope, roles, responsibilities, management commitment, and coordination among organizational entities), processes, and procedures are maintained and used to manage protection of information systems and assets.
  11. Maintenance: Maintenance and repairs of industrial control and information system components is performed consistent with policies and procedures.
  12. Protective Technology: Technical security solutions are managed to ensure the security and resilience of systems and assets, consistent with related policies, procedures, and agreements.
  13. Anomalies and Events: Anomalous activity is detected in a timely manner and the potential impact of events is understood.
  14. Security Continuous Monitoring: The information system and assets are monitored at discrete intervals to identify cybersecurity events and verify the effectiveness of protective measures.
  15. Detection Processes: Detection processes and procedures are maintained and tested to ensure timely and adequate awareness of anomalous events.
  16. Response Planning: Response processes and procedures are executed and maintained to ensure timely response to detected cybersecurity events.
  17. Communications (Respond): Response activities are coordinated with internal and external stakeholders, as appropriate, to include external support from law enforcement agencies.
  18. Analysis: Analysis is conducted to ensure adequate response and support recovery activities.
  19. Mitigation: Activities are performed to prevent expansion of an event, mitigate its effects, and eradicate the incident.
  20. Improvements: Organizational response activities are improved by incorporating lessons learned from current and previous detection/response activities.
  21. Recovery Planning: Recovery processes and procedures are executed and maintained to ensure timely restoration of systems or assets affected by cybersecurity events.
  22. Improvements: Recovery planning and processes are improved by incorporating lessons learned into future activities.
  23. Communications (Recover): Restoration activities are coordinated with internal and external parties, such as coordinating centers, Internet Service Providers (ISPs), owners of attacking systems, victims, other CSIRTs, and vendors.

The Core Subcategories

After Categories, there are 108 Subcategories. As we go from Function (i.e., capability) to Category to Subcategory, we get a little more granular with each step and level we go down.

Framework Implementation Tiers

Framework Implementation Tiers (“Tiers”) describe the degree to which an organization’s cybersecurity risk management practices exhibit the characteristics defined in the Framework. The Tiers include:

  • Partial (Tier 1)
  • Risk Informed (Tier 2)
  • Repeatable (Tier 3)
  • Adaptive (Tier 4)

Tiers provide context on how an organization views cybersecurity risk and the organizational processes in place to manage that risk. The Tiers describe the degree to which an organization’s cybersecurity risk management practices exhibit the characteristics defined in the Framework (e.g., risk and threat aware, repeatable, and adaptive). The Tiers characterize an organization’s practices over a range, from Partial (Tier 1) to Adaptive (Tier 4), and reflect a progression from informal, reactive responses to approaches that are agile and risk informed. During the Tier selection process, an organization should consider its current risk management practices, threat environment, legal and regulatory requirements, business/mission objectives, and organizational constraints.

The Core Profile

Overview of Profiles

As an organization determines how to use the Cybersecurity Framework Core to assist in managing their cybersecurity risks, they can develop organization-specific Profiles to map their current state and a desired future state based on their goals and mission.

The following excerpt from the Cybersecurity Framework describes Profiles:

“Through use of the Profiles, the Framework will help the organization align its cybersecurity activities with its business requirements, risk tolerances, and resources.

. . . A Framework Profile (“Profile”) represents the outcomes based on business needs that an organization has selected from the Framework Categories and Subcategories. The Profile can be characterized as the alignment of standards, guidelines, and practices to the Framework Core in a particular implementation scenario. Profiles can be used to identify opportunities for improving cybersecurity posture by comparing a “Current” Profile (the “as is” state) with a “Target” Profile (the “to be” state).”

Tailoring a Profile

Profile development tailors the Cybersecurity Framework to focus on the cybersecurity areas of particular concern to an industry, organization, or functional area as identified through its risk management processes. By evaluating the elements of the Cybersecurity Framework against a particular mission, a Profile is created that shows priorities based on evaluation of the mission against the Cybersecurity Framework Functions, Categories, and Subcategories.

Implementing and Leveraging Profiles in Organizations

The Cybersecurity Framework and Profiles provide a consistent way to discuss security objectives and activities in reader-friendly terminology that is consumable for multiple roles, from executives to technical implementers. Within organizations, benefits include describing how security investments will be used to a Board of Directors and measuring progress in meeting cybersecurity objectives year over year. Advantages provided by industry-focused Profiles include defining consistent priorities across a sub-sector and enabling conversations by discussing security activities using consistent terminology. Industry-specific Profiles are intended to:

  • Minimize future work by each organization
  • Decrease the chance that organizations accidentally omit a requirement
  • Encourage consistent analysis of cybersecurity-risk in the operational environment
  • Align industry and organizational cybersecurity priorities

Organizations that are part of an industry or sub-sector that has one or more industry-focused Profiles generally use those industry-focused Profiles to inform decisions made when constructing their organization-focused Profiles and measuring progress.

NuHarbor is a leading national cybersecurity services firm, supporting the diverse needs of hundreds of clients with clear, comprehensive, and outcome-based solutions. Our tenured, highly certified Security Advisory Team averages 10 years of compliance and information assurance experience and maintains a strong focus on the National Institute of Standards and Technology (NIST). If you need assistance with the NIST Cybersecurity Framework, or any security framework, contact us today!

Included Topics

  • Compliance,
  • Managed Detection and Response,
  • Cybersecurity Technology
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

Compliance 4 min read
NIST Cybersecurity Framework Version 1.1 Changes Read More
Compliance 4 min read
Which Security Controls Framework Is Right for You? Read More
Compliance 5 min read
NIST 800-37 Rev 2 Risk Management Framework: Major Changes Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.