CSF Glossary: Difference between revisions
Jump to navigation
Jump to search
(Created page with "'''Source of Reference: official [https://www.nist.gov/cyberframework/online-learning/components-framework Cybersecurity Framework Components] from National Institute of Standards and Technology (NIST).''' For inquiries and reporting errors on this wiki, please [mailto:support@cmmctoolkit.org contact us]. Thank you. == B == {|class="wikitable" style="width: 85%;" ! style="width: 30%"| Term ! style="width: 70%"| Description |- |Buyer |The people or organizations that co...") |
No edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 5: | Line 5: | ||
== B == | == B == | ||
{|class="wikitable" style="width: 85%;" | {|class="wikitable" style="width: 85%;" | ||
! style="width: | ! style="width: 20%"| Term | ||
! style="width: | ! style="width: 80%"| Description | ||
|- | |- | ||
|Buyer | |Buyer | ||
Line 14: | Line 14: | ||
== C == | == C == | ||
{|class="wikitable" style="width: 85%;" | {|class="wikitable" style="width: 85%;" | ||
! style="width: | ! style="width: 20%"| Term | ||
! style="width: | ! style="width: 80%"| Description | ||
|- | |- | ||
| | |Category | ||
|The | |The subdivision of a Function into groups of cybersecurity outcomes, closely tied to programmatic needs and particular activities. Examples of Categories include “Asset Management,” “Identity Management and Access Control,” and “Detection Processes.” | ||
|- | |- | ||
| | |Critical Infrastructure | ||
|Systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on cybersecurity, national economic security, national public health or safety, or any combination of those matters. | |||
| | |||
|- | |- | ||
| | |Cybersecurity | ||
| | |The process of protecting information by preventing, detecting, and responding to attacks. | ||
|- | |- | ||
| | |Cybersecurity Event | ||
|A | |A cybersecurity change that may have an impact on organizational operations (including mission, capabilities, or reputation). | ||
|- | |- | ||
| | |Cybersecurity Incident | ||
| | |A cybersecurity event that has been determined to have an impact on the organization prompting the need for response and recovery. | ||
|} | |} | ||
== D == | == D == | ||
{|class="wikitable" style="width: 85%;" | {|class="wikitable" style="width: 85%;" | ||
! style="width: | ! style="width: 20%"| Term | ||
! style="width: | ! style="width: 80%"| Description | ||
|- | |- | ||
| | |Detect (function) | ||
| | |Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. | ||
|} | |} | ||
== F == | == F == | ||
{|class="wikitable" style="width: 85%;" | {|class="wikitable" style="width: 85%;" | ||
! style="width: | ! style="width: 20%"| Term | ||
! style="width: | ! style="width: 80%"| Description | ||
|- | |- | ||
| | |Framework | ||
| | |A risk-based approach to reducing cybersecurity risk composed of three parts: the Framework Core, the Framework Profile, and the Framework Implementation Tiers. Also known as the “Cybersecurity Framework.” | ||
|- | |- | ||
| | |Framework Core | ||
| | |A set of cybersecurity activities and references that are common across critical infrastructure sectors and are organized around particular outcomes. The Framework Core comprises four types of elements: Functions, Categories, Subcategories, and Informative References. | ||
|- | |- | ||
| | |Framework Implementation Tier | ||
| | |A lens through which to view the characteristics of an organization’s approach to risk—how an organization views cybersecurity risk and the processes in place to manage that risk. | ||
|- | |- | ||
| | |Framework Profile | ||
|A | |A representation of the outcomes that a particular system or organization has selected from the Framework Categories and Subcategories. | ||
|- | |- | ||
| | |Function | ||
| | |One of the main components of the Framework. Functions provide the highest level of structure for organizing basic cybersecurity activities into Categories and Subcategories. The five functions are Identify, Protect, Detect, Respond, and Recover. | ||
|} | |} | ||
== I == | == I == | ||
{|class="wikitable" style="width: 85%;" | {|class="wikitable" style="width: 85%;" | ||
! style="width: 20%"| Term | |||
! style="width: 80%"| Description | |||
! style="width: 20 | |||
! style="width: | |||
|- | |- | ||
| | |Identify (function) | ||
| | |Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. | ||
|- | |- | ||
| | |Informative Reference | ||
| | |A specific section of standards, guidelines, and practices common among critical infrastructure sectors that illustrates a method to achieve the outcomes associated with each Subcategory. An example of an Informative Reference is ISO/IEC 27001 Control A.10.8.3, which supports the “Data-in-transit is protected” Subcategory of the “Data Security” Category in the “Protect” function. | ||
|} | |} | ||
== M == | == M == | ||
{|class="wikitable" style="width: 85%;" | {|class="wikitable" style="width: 85%;" | ||
! style="width: | ! style="width: 20%"| Term | ||
! style="width: | ! style="width: 80%"| Description | ||
|- | |- | ||
|Mobile Code | |Mobile Code | ||
|A program (e.g., script, macro, or other portable instruction) that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics. | |||
|A | |||
|} | |} | ||
== P == | == P == | ||
{|class="wikitable" style="width: 85%;" | {|class="wikitable" style="width: 85%;" | ||
! style="width: | ! style="width: 20%"| Term | ||
! style="width: | ! style="width: 80%"| Description | ||
|- | |- | ||
| | |Protect (function) | ||
| | |Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. | ||
|- | |- | ||
|Privileged User | |Privileged User | ||
|A user | |A user that is authorized (and, therefore, trusted) to perform security�-relevant functions that ordinary users are not authorized to perform. | ||
|} | |} | ||
== R == | == R == | ||
{|class="wikitable" style="width: 85%;" | {|class="wikitable" style="width: 85%;" | ||
! style="width: | ! style="width: 20%"| Term | ||
! style="width: | ! style="width: 80%"| Description | ||
|- | |- | ||
| | |Recover (function) | ||
| | |Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. | ||
|- | |- | ||
| | |Respond (function) | ||
|Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. | |||
| | |||
|- | |- | ||
|Risk | |Risk | ||
|A measure of extent to which an entity is threatened by a potential circumstance or event, and typically a function of: | |A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence. | ||
|- | |- | ||
| | |Risk Management | ||
|The | |The process of identifying, assessing, and responding to risk. | ||
|} | |} | ||
== S == | == S == | ||
{|class="wikitable" style="width: 85%;" | {|class="wikitable" style="width: 85%;" | ||
! style="width: | ! style="width: 20%"| Term | ||
! style="width: | ! style="width: 80%"| Description | ||
|- | |- | ||
| | |Subcategory | ||
|The subdivision of a Category into specific outcomes of technical and/or management activities. Examples of Subcategories include “External information systems are catalogued,” “Data-at-rest is protected,” and “Notifications from detection systems are investigated.” | |||
| | |||
|- | |- | ||
| | |Supplier | ||
|Product and service providers used for an organization’s internal purposes (e.g., IT infrastructure) or integrated into the products of services provided to that organization’s Buyers. | |||
| | |||
|} | |} | ||
== T == | == T == | ||
{|class="wikitable" style="width: 85%;" | {|class="wikitable" style="width: 85%;" | ||
! style="width: 20%"| Term | |||
! style="width: 80%"| Description | |||
! style="width: 20 | |||
! style="width: | |||
|- | |- | ||
| | |Taxonomy | ||
| | |A scheme of classification. | ||
|} | |} |
Latest revision as of 20:00, 9 April 2023
Source of Reference: official Cybersecurity Framework Components from National Institute of Standards and Technology (NIST).
For inquiries and reporting errors on this wiki, please contact us. Thank you.
B
Term | Description |
---|---|
Buyer | The people or organizations that consume a given product or service. |
C
Term | Description |
---|---|
Category | The subdivision of a Function into groups of cybersecurity outcomes, closely tied to programmatic needs and particular activities. Examples of Categories include “Asset Management,” “Identity Management and Access Control,” and “Detection Processes.” |
Critical Infrastructure | Systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on cybersecurity, national economic security, national public health or safety, or any combination of those matters. |
Cybersecurity | The process of protecting information by preventing, detecting, and responding to attacks. |
Cybersecurity Event | A cybersecurity change that may have an impact on organizational operations (including mission, capabilities, or reputation). |
Cybersecurity Incident | A cybersecurity event that has been determined to have an impact on the organization prompting the need for response and recovery. |
D
Term | Description |
---|---|
Detect (function) | Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. |
F
Term | Description |
---|---|
Framework | A risk-based approach to reducing cybersecurity risk composed of three parts: the Framework Core, the Framework Profile, and the Framework Implementation Tiers. Also known as the “Cybersecurity Framework.” |
Framework Core | A set of cybersecurity activities and references that are common across critical infrastructure sectors and are organized around particular outcomes. The Framework Core comprises four types of elements: Functions, Categories, Subcategories, and Informative References. |
Framework Implementation Tier | A lens through which to view the characteristics of an organization’s approach to risk—how an organization views cybersecurity risk and the processes in place to manage that risk. |
Framework Profile | A representation of the outcomes that a particular system or organization has selected from the Framework Categories and Subcategories. |
Function | One of the main components of the Framework. Functions provide the highest level of structure for organizing basic cybersecurity activities into Categories and Subcategories. The five functions are Identify, Protect, Detect, Respond, and Recover. |
I
Term | Description |
---|---|
Identify (function) | Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. |
Informative Reference | A specific section of standards, guidelines, and practices common among critical infrastructure sectors that illustrates a method to achieve the outcomes associated with each Subcategory. An example of an Informative Reference is ISO/IEC 27001 Control A.10.8.3, which supports the “Data-in-transit is protected” Subcategory of the “Data Security” Category in the “Protect” function. |
M
Term | Description |
---|---|
Mobile Code | A program (e.g., script, macro, or other portable instruction) that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics. |
P
Term | Description |
---|---|
Protect (function) | Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services. |
Privileged User | A user that is authorized (and, therefore, trusted) to perform security�-relevant functions that ordinary users are not authorized to perform. |
R
Term | Description |
---|---|
Recover (function) | Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. |
Respond (function) | Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. |
Risk | A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence. |
Risk Management | The process of identifying, assessing, and responding to risk. |
S
Term | Description |
---|---|
Subcategory | The subdivision of a Category into specific outcomes of technical and/or management activities. Examples of Subcategories include “External information systems are catalogued,” “Data-at-rest is protected,” and “Notifications from detection systems are investigated.” |
Supplier | Product and service providers used for an organization’s internal purposes (e.g., IT infrastructure) or integrated into the products of services provided to that organization’s Buyers. |
T
Term | Description |
---|---|
Taxonomy | A scheme of classification. |