paint-brush
Mapping Risk to Cyber Threats, and Adopt Zero Trust by NIST's CSFby@z3nch4n
1,247 reads
1,247 reads

Mapping Risk to Cyber Threats, and Adopt Zero Trust by NIST's CSF

by Zen Chan5mMarch 7th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Cybersecurity Framework (CSF) is a set of best practices organizations can use to secure their data. CSF was released in 2014 and updated in 2018, by an executive order issued by President Obama. The latest version of the CSF is version 1.1, updated in April 2018. NIST has already produced several example framework profiles for manufacturing, elections, and the smart grid. The CSF has three components: the Core, Implementation Tiers, and Profiles. The functions it breaks down activities into — Identify, Protect, Detect, Respond and Recover.

Company Mentioned

Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Mapping Risk to Cyber Threats, and Adopt Zero Trust by NIST's CSF
Zen Chan HackerNoon profile picture
Zen Chan

Zen Chan

@z3nch4n

Interested in Infosec & Biohacking. Security Architect by profession. Love reading and running.

About @z3nch4n
LEARN MORE ABOUT @Z3NCH4N'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Zen Chan HackerNoon profile picture
Zen Chan@z3nch4n
Interested in Infosec & Biohacking. Security Architect by profession. Love reading and running.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Repl
Essentials
Ktachibana
Learnrepo
Digg