4.4 Applicability of the Cybersecurity Framework ποΈ
Applicability of the Cybersecurity Framework ποΈ
Bottom line:
- Cybersecurity risk continues to increase, with no signs of slowing down
- Costs of cybersecurity risks continue to grow
Why? π€
The greatest threat that faces any of us today is the threat of complexity: Trillions of lines of code in billions of devices, with ubiquitous connectivity across the globe.
Dr. Ron Ross, Distinguished Fellow of NIST
Characteristics of the Framework π
Voluntary Framework
The CSF is a foundational resource that may be adopted voluntarily and through governmental policies and mandates.
Flexible, Adaptive
The CSF describes desired outcomes that are intended to be understood by a broad audience, including executives, managers, and practitioners, regardless of their cybersecurity expertise. Because these outcomes are sector-, country-, and technology-neutral, they provide an organization with the flexibility needed to address their unique risks, technologies, and mission considerations.
The CSF describes desired outcomes that are intended to be understood by a broad audience, including executives, managers, and practitioners, regardless of their cybersecurity expertise. Because these outcomes are sector-, country-, and technology-neutral, they provide an organization with the flexibility needed to address their unique risks, technologies, and mission considerations.
Focus on Risk Instead of Controls
Organizations will continue to have unique risks β including different threats and vulnerabilities β and risk tolerances, as well as unique mission objectives and requirements. Thus, organizationsβ approaches to managing risks and their implementations of the CSF will vary.
Focus on Risk Instead of Compliance
https://www.reddit.com/r/cybersecurity/comments/1crxcwi/compliance_isnt_security/
- While compliance with regulations and standards is important, an organizationβs goal is first to reduce risk, and to foster a risk-based mindset
- Next, from that point compliance will naturally follow
Facilitates Communication and Collaboration
When implementing the CSF, managers will focus on how to achieve risk targets through common services, controls, and collaboration, as expressed in the Target Profile and improved through the actions being tracked in the action plan (e.g., risk register, risk detail report, POA&M)
https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.29.pdf
Preparing to create and use Organizational Profiles involves gathering information about organizational priorities, resources, and risk direction from executives. Managers then collaborate with practitioners to communicate business needs and create risk-informed Organizational Profiles.
- Common language and structure for discussing cybersecurity risks, enabling different teams and departments to communicate effectively and align their efforts.
- This characteristic fosters a culture of collaboration, ensuring that cybersecurity considerations are integrated into various aspects of the organizationβs operations.
Continually Improving and Evolving
Transcript
Now that we have some fundamentals in risk management from Chapter 3 and are starting to immerse ourselves in CSF in Chapter 4, we need to start with why. Why do we have CSF? What is its applicability?
In this section, there are two key things you need to remember for the exam. I'll also provide context on why these two things are important.
- Cybersecurity Risk Continues to Increase:
- Cybersecurity risk is growing in cost.
Because of these two drivers, we need CSF to help manage these issues.
Why is Cybersecurity Risk Increasing?
To unpack that, let's start with Dr. Ron Ross, a distinguished fellow of NIST, who says the greatest threat we face today is the threat of complexity. Trillions of lines of code in billions of devices with ubiquitous connectivity create a large exposed attack surface. His points about technology being complicated and everywhere are in my top ten reasons why cybersecurity is hard. CSF makes cybersecurity easier.
Top Ten Reasons Cybersecurity is Hard:
- Technology is Everywhere and Complex:
- McKinsey states that every company is a software company. For example, an apple farm relies on software for billing and supply chain management, making it a software company.
- The interconnectedness of sensors, servers, and endpoints increases the attack surface in cyberspace.
- Systems are Inherently Flawed:
- All systems fail and are vulnerable. Since 1988, 200,000 vulnerabilities have been discovered in software, and these are just the ones we know about.
- Technology is Rarely Secure by Default:
- Dr. Ross highlights the importance of least functionality, one of his top two favorite controls.
- Cybersecurity is Complicated:
- There are 3,500 vendors in 18 categories in the cybersecurity market, adding layers and complexity to security.
- Cyber Threats are Dynamic:
- Unlike static threats like fire, cyber threats are always changing, creating an innovation arms race between attackers and defenders.
- Cybersecurity is a Silent Killer:
- When your identity is stolen or unauthorized access occurs, it might go undetected for weeks, months, or years.
- Economics Drive More Actors and Capability:
- Cybercrime costs are often cited in the trillions. Whether the correct number is 6 trillion or 1 trillion, it's clear that cybercrime is significant and growing.
- The Threat is Evolving: We're in Early Innings and the Science Isn't Settled
- Cyber threats now impact cars, satellites, IoT, industrial, physical, and consumer sectors. The levels of danger range from hacktivism to crime, espionage, terrorism, and warfare, all occurring on the same IP version 4 Internet.
- Skill Shortage:
- There's a significant shortage of cybersecurity skills, which is why we're here.
- Other Challenges:
- If I've missed any other challenges, let me know.
These points help explain why costs and risks are rising and the importance of CSF. Let's learn more about it in the next video. I'll see you there.