Nist CSF Plan Empty
Nist CSF Plan Empty
Nist CSF Plan Empty
Functions metrics
Function Category
Asset Management
Business Environment
Identify Governance
Risk Assessment
Risk Management
Supply Chain Risk
Management
Protect
- Risks Information Protection
- Service Processes and
Procedures
Catalog
- Priorities Maintenance
- Maturity
- Metrics
- 3-Year Protective Technology
Project,
Program &
Initiative
Roadmap
- Metrics
- 3-Year
Project,
Program & Anomalies and Events
Initiative
Roadmap Detect Security Continuous
Monitoring
Recover Improvements
Communications
- Internal/External
Policy Alignment
Information Security Risk-Aligned Framework Maturity Model
Key initiatives
nested and aligned
Monitor, Alerts and Reports - SIEM-
6, 9
Vuln
PCI-PII-PHI
12, 19 Key initiatives
SI Metrics
1b $xxx $xxx $xxx
nested and aligned
Monitor, Alerts and Reports 4, 8
1a 16, 19 $xxx $xxx
Maturity Model Action Plan FY2016 Action Plan FY2017 Action Plan FY2018
FY18 FY18 FY18 FY18 FY19 FY19 FY19 FY19 FY20 FY20 FY20 FY20
4 5 6
-Q1 -Q2 -Q3 -Q4 -Q1 -Q2 -Q3 -Q4 -Q1 -Q2 -Q3 -Q4
Automate
Dashboard
Integration I1ntegration I2ntegration 3 Review
Current State
F
S
Maturity -
progress
identified
Challenges
identified
NIST C
ent State Brian V
Paidhr
Revision
Future
State
Maturity -
progress
identified
Functions Sub-Category - Service CSC or NIST Core Policy Alignment Maturity specifics (process, policy, documentation and automation), used to "Tiers" or Maturity Three Year (or more) Action Plan (Implementation) based on "Profiles" -- Identified Risks,
Catalog Info. References calculate maturity map Map (see legend) Priorities, Maturity, and Capabilities. Quarter-by-quarter initiative or project time-lines and
Cat. IDs Risk Priorities & Appetite - Funded - Unfunded - Proposed measures of success
Internal/External metrics
Information Security Risk-Aligned Framework Maturity Roadmap FY2017
Category CSC Top NIST Policy Documentation Process
Function Unique Links Category Priority Organization Service Catalog FY2018 $ FY2019 $ FY2020 $ FY2021 $ FY2022 $ Process Level Policy Level Automation Level Policy Value Document Automate Maturity 1
In itial
2
R epeatable
3
Defined
4
Managed
5
Optimiz ing
Action Plan FY2018-2019 Action Plan FY2019-2020 Action Plan FY2020-2021
Identifier Twenty Family Level Value Value Value Score
CMDB system, Cis co Prime Vulnerabi li ty Manage ment Program Expansi on Networ k Access Co ntrol Eval uation M ap Data Flows
Vulnerabi li ty Scanner, CMDB s ys tem Vulnerabi li ty Manage ment Pass ive Scan Impl emen tati on CASB Evaluatio n
AM Infrastructure Asset Management Visi o
(CASB )
1, 2 35,000 35,000 10,000 60,000 10,000 DI, DM 26.7% Challenges across Software W hitel isi ng Evaluatio n
Review Asset Management Rol es and Res ponsi bil ities
services are
readily identified
Vulnerabi li ty Manage ment Program Expansi on
CMDB system, Cisco Prime 1 Standardized Informal Formal Partial 30% 5% 10% 5% 50% Vulnerabi li ty Manage ment Pass ive Scan Impl emen tati on Network Access Control Evaluation
Vulnerability Scanner, CMDB system 2 10,000 10,000 10,000 10,000 10,000 Measured None Formal Full 40% 0% 10% 10% 60% CASB Evaluatio n
Software W hitel isi ng Evaluatio n
Budget items roll up to
high level catagory
Visio 1 Inconsistent None Formal None 10% 0% 10% 0% 20% Map Data Flows
Inconsistent Informal None None 10% 5% 0% 0% 15% Review Asset Management Roles and Responsibilities
Standardized None Improvement Partial 30% 0% 20% 5% 55% Align with Organizational Mission
Process
Calapse and Expand Security Policy Inconsistent Defined Formal None 10% 10% 10% 0% 30% Review Roles and Responsibilities Review Roles and Responsibilities Review Roles and Responsibilities
sub-sections and
columns above
Security Policy, (Eramba GRC) 250,000 100,000 100,000 100,000 100,000 Inconsistent Defined Formal None 10% 10% 10% 0% 30% Review Information Security Policies and Architecture Review Information Security Policies and Architecture Review Information Security Policies and Architecture
Eramba GRC Inconsistent Defined Formal None 10% 10% 10% 0% 30% GRC Framework Evaluation and Project GRC Framework Project Phase 1 and Phase 2 GRC Framework Project Phase 3 and Phase 4
IDENTIFY
Inconsistent Informal None None 10% 5% 0% 0% 15% HIPAA and PCI Assessment HIPAA and PCI Assessment HIPAA and PCI Assessment
Vulnerabi li ty Managemen t, P enetration Testin g, R isk Vulnerabi li ty Manage ment Expansi on P roject Evaluate M S-ISAC Th reat In telli gence C ardhol der Data Ri sk Asses sments
Asses sments Expand Th reat In telli gence Cardh older Data Ris k As sess men ts R isk Ass essment Improvements
RA Risk Assessments Risk Assessment MS-ISAC Threat Intel igence 3, 20 0 0 0 0 0 AR 35.0% Cardh older Data Ris k As sess men ts Ri sk Asses sment Improvements
Vulnerabi li ty Managemen t, P enetration Testin g, R isk Ri sk Asses sment Improvements
Asses sments
Ri sk Asses sments
Ri sk Asses sments CMM and
Ri skVulnerability
Asses sments Management, Penetration
Testing, Risk Assessments
3 Repeatable Informal Informal None 20% 5% 5% 0% 30% metrics Vulnerability Management Expansion Project
agnostic
MS-ISAC Threat Inteligence 3 Inconsistent Defined Informal None 10% 10% 5% 0% 25% Expand Threat Intelligence Evaluate MS-ISAC Threat Intelligence
Vulnerability Management, Penetration 3, 20 Inconsistent Defined Informal Partial 10% 10% 5% 5% 30%
Testing, Risk Assessments
Risk Assessments Inconsistent Audited Informal None 10% 15% 5% 0% 30% Cardholder Data Risk Assessments Cardholder Data Risk Assessments Cardholder Data Risk Assessments
Risk Assessments Inconsistent Defined Improvement Full 10% 10% 20% 10% 50% Risk Assessment Improvements Risk Assessment Improvements Risk Assessment Improvements
Process
Review Ri sk Pro cess Review Ri sk Pro cess R evi ew R isk P roces s
Review Tol erance Review Tol erance R evi ew To lerance
RM Risk Management Risk Management 0 0 0 0 0 AR 15.0%
Repeatable None Informal None 20% 0% 5% 0% 25% Review Risk Process Review Risk Process Review Risk Process
Inconsistent None None None 10% 0% 0% 0% 10% Review Tolerance Review Tolerance Review Tolerance
Review Suppl y Chain Process Review Suppl y Chain Process R evi ew Sup ply Ch ai n Pr oces s
Review Ven dors Review Vendors R evi ew Vendor s
SC Supply Chain Risk
Supply Chain Risk Management 0 0 0 0 0 SA 26.0%
Manageme nt
Repeatable None Informal None 20% 0% 5% 0% 25% Review Supply Chain Process Review Supply Chain Process Review Supply Chain Process
Repeatable Embedded Metrics and None 20% 20% 15% 0% 55% Review Vendors Review Vendors Review Vendors
Reporting
Inconsistent None None None 10% 0% 0% 0% 10% Review Vendors Review Vendors Review Vendors
Inconsistent None None None 10% 0% 0% 0% 10% Review Vendors Review Vendors Review Vendors
Acti ve Di rector y, ADFS, (IAM) Identity Access Management Evaluati on Pri vl eged Access Managemen t Eval Identi ty Acces s Mgmt P roject
(VP N), (IAM), (M DM) Remote Acces s Expansi on Networ k Access Co ntrol Eval uation M DM Eval uation
Identity Management (PAM), (NAC) 5 , 11-14, Review Active Di rector y Review Active Di rector y R evi ew Acti ve Directory
AC Firew all, W eb Fil ter, (NAC) 520,000 10,000 0 20,000 0 AC, IA 18.0% Web Con tent Fil ter Project Fi rewall Refres h Project
and Acces s Control 16, 1 8
Active Directory, ADFS, (IAM) 18 10,000 10,000 Inconsistent Defined Informal None 10% 10% 5% 0% 25% Identity Access Management Evaluation Privleged Access Management Eval Identity Access Mgmt Project
(VPN), (IAM), (MDM) 12 500,000 Inconsistent Informal None None 10% 5% 0% 0% 15% Remote Access Expansion MDM Evaluation
Firewall, Web Filter, (NAC) 11, 12, 13, 10,000 20,000 Inconsistent Defined None None 10% 10% 0% 0% 20% Web Content Filter Project Firewall Refresh Project
14
User Awareness, (Phish Training) 17 Repeatable Defined Informal None 20% 10% 5% 0% 35% PCI Edu catio n Review Education Program Review Education Program
General Education
Security Policy, (Eramba GRC) 5, 17 Inconsistent Informal None None 10% 5% 0% 0% 15%
Maturity and
Security Policy 17 Inconsistent Informal None None 10% 5% 0% 0% 15%
progress also
identified
Security Policy, (Eramba GRC) 17 Inconsistent Informal None None 10% 5% 0% 0% 15%
Security Policy, (Eramba GRC) 17 Inconsistent Informal None None 10% 5% 0% 0% 15%
Bi tlocker, Stor age Encrypti on, Certi ficate Services SAN Encrypti on at rest Data Cl as sifi catio n Pro ject En cour age compl iance wi th 100% encryption pol icy
TLS, Cer tificate Servi ces Wo rks tation Certifi cates Data Lo ss Prevention Eval uation Evalu ate FIM solu tion
Operati onal Monito ring, External M onitor ing 1, 2, 1 3, Pol icy to en crypt al l n etwork connections (3yr compli ance) Evaluate FIM s oluti on
DS Data Security Data Loss Prevention , Di gi tal R ights Managemen t 14 0 0 0 0 0 CA 8.6%
Tri pwir e
Bitlocker, Storage Encryption, Certificate 14 Inconsistent Defined None None 10% 10% 0% 0% 20% SAN Encrypti on at rest Data Classification Project
Services Wo rks tation Certifi cates
TLS, Certificate Services 13, 14 Inconsistent Defined None None 10% 10% 0% 0% 20% Policy to encrypt all network connections (3yr compliance) Encourage compliance with 100% encryption policy
Data Loss Prevention, Digital Rights 13 None None None None 0% 0% 0% 0% 0% Data Loss Prevention Evaluation
Management
Tripwire 2 Inconsistent None None None 10% 0% 0% 0% 10% Evaluate FIM solution Evaluate FIM solution
Inci dent R espon se Pl an, Bus iness Con tinui ty Plan 11, 1 9 SA, SC
Procedures Inci dent R espon se Pl an, Bus iness Con tinui ty Plan
Vulnerabi li ty Managemen t, 3r d Party
CIS Benchmarks, DISA STIGs 5, 7, 11 Inconsistent None Informal None 10% 0% 5% 0% 15%
Inconsistent None None None 10% 0% 0% 0% 10% Document Plan Review Plan
Incident Response Plan, Business Continuity None Informal Informal None 0% 5% 5% 0% 10%
Plan
Vulnerability Management, 3rd Party 3 Inconsistent Informal None Partial 10% 5% 0% 5% 20%
MA Maintenance 4, 12 0 0 0 0 0 MA 22.5%
'Log Management, SIEM 6 Inconsistent None None None 10% 0% 0% 0% 10% SIEM Tuning
'Log Management, SIEM 19 Inconsistent None None None 10% 0% 0% 0% 10% SIEM Tuning
JSA, (GrayLog) 19 Inconsistent None None None 10% 0% 0% 0% 10% SIEM Tuning
'(Vulnerability Management), (Network 19 2,000 None None None None 0% 0% 0% 0% 0% Passive Scanner Pilot PVS
Analytics)
Vulnerability Management 3 Inconsistent Informal None None 10% 5% 0% 0% 15% Vulnerability Management Expansion
19 Inconsistent Informal Informal None 10% 5% 5% 0% 20% Build IR Plan Review IR Plan Review IR Plan
3rd party vendor, MS-ISAC 19 40,000 40,000 40,000 Inconsistent None Informal None 10% 0% 5% 0% 15% Perform forensic tests Perform forensic tests
3 Inconsistent Informal None None 10% 5% 0% 0% 15% Exception Review Exception review Exception review
19 None None None None 0% 0% 0% 0% 0% Update IR procedures Update IR procedures Update IR procedures
CO Communications 19 0 0 0 0 0 10.0%
ID.AM-3: Organizational communication and data flows are mapped 1 None None None None 0% 0% 0% 0% 0%
ID.AM-4: External information systems are catalogued 1 None None None None 0% 0% 0% 0% 0%
ID.BE-1: The organization’s role in the supply chain is identified and None None None None 0% 0% 0% 0% 0%
communicated
ID.BE-2: The organization’s place in critical infrastructure and its None None None None 0% 0% 0% 0% 0%
industry sector is identified and communicated
ID.BE-3: Priorities for organizational mission, objectives, and activities None None None None 0% 0% 0% 0% 0%
are established and communicated
ID.BE-4: Dependencies and critical functions for delivery of critical None None None None 0% 0% 0% 0% 0%
services are established
ID.GV-2: CyberSecurity roles and responsibilities are coordinated and None None None None 0% 0% 0% 0% 0%
aligned with internal roles and external partners
ID.GV-4: Governance and risk management processes address None None None None 0% 0% 0% 0% 0%
cybersecurity risks
IDENTIFY
ID.RA-1: Asset vulnerabilities are identified and documented 3 None None None None 0% 0% 0% 0% 0%
ID.RA-2: Cyber Threat inteligence is received from information sharing 3 None None None None 0% 0% 0% 0% 0%
forums and sources
ID.RA-3: Threats, both internal and external, are identified and 3, 20 None None None None 0% 0% 0% 0% 0%
documented
ID.RA-4: Potential business impacts and likelihoods are identified None None None None 0% 0% 0% 0% 0%
ID.RA-5: Threats, vulnerabilities, likelihoods, and impacts are used to None None None None 0% 0% 0% 0% 0%
determine risk
ID.RA-6: Risk responses are identified and prioritized None None None None 0% 0% 0% 0% 0%
ID.RM-1: Risk management processes are established, managed, and None None None None 0% 0% 0% 0% 0%
agreed to by organizational stakeholders
ID.RM-2: Organizational risk tolerance is determined and clearly None None None None 0% 0% 0% 0% 0%
expressed
ID.RM-3: The organization’s determination of risk tolerance is informed None None None None 0% 0% 0% 0% 0%
by its role in critical infrastructure and sector specific risk analysis
SC Supply Chain Risk Supply Chain Ris k Strategic Security - Supply Chain Risk Management 0 0 0 0 0 AR 0.0%
Ma nagement Management
ID.SC-1: Cyber supply chain risk
management processes are identified,
established, assessed, managed, and agreed None None None None 0% 0% 0% 0% 0%
to by organizational stakeholders
PR.AC-2: Physical access to assets is managed and protected None None None None 0% 0% 0% 0% 0%
PR.AC-5: Network integrity is protected (e.g. network segregation, 11, 12, 13,
network segmentation) 14 None None None None 0% 0% 0% 0% 0%
PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-
factor, multi-factor) commensurate with the risk
of the transaction (e.g., individuals’ security and privacy risks and other None None None None 0% 0% 0% 0% 0%
organizational risks)
AT Awareness Awareness and Training Strategic Security - Awareness and Training 4, 17 0 0 0 0 0 AT, PS 0.0%
PR.AT-1: All users are informed and trained 17 None None None None 0% 0% 0% 0% 0%
PR.AT-2: Privileged users understand their roles and responsibilities 4, 17 None None None None 0% 0% 0% 0% 0%
PR.AT-4: Senior executives understand their roles and responsibilities 17 None None None None 0% 0% 0% 0% 0%
1, 2 , 13,
DS Data Security Operational Security - Encryption and Data Integrity 0 0 0 0 0 CA 0.0%
14
PR.DS-3: Assets are formally managed throughout removal, transfers, 1 None None None None 0% 0% 0% 0% 0%
and disposition
PR.DS-4: Adequate capacity to ensure availability is maintained None None None None 0% 0% 0% 0% 0%
PR.DS-5: Protections against data leaks are implemented 13 None None None None 0% 0% 0% 0% 0%
PR.DS-6: Integrity checking mechanisms are used to verify software, 2 None None None None 0% 0% 0% 0% 0%
firmware, and information integrity
PR.DS-7: The development and testing environment(s) are separate None None None None 0% 0% 0% 0% 0%
from the production environment
PROTECT
PR.DS-8: Integrity checking mechanisms are used to verify hardware None None None None 0% 0% 0% 0% 0%
integrity
PR.IP-2: A System Development Life Cycle to manage systems is None None None None 0% 0% 0% 0% 0%
implemented
PR.IP-3: Configuration change control processes are in place None None None None 0% 0% 0% 0% 0%
PR.IP-4: Backups of information are conducted, maintained, and tested None None None None 0% 0% 0% 0% 0%
PR.IP-5: Policy and regulations regarding the physical operating None None None None 0% 0% 0% 0% 0%
environment for organizational assets are met
PR.IP-10: Response and recovery plans are tested 19 None None None None 0% 0% 0% 0% 0%
PR.IP-11: Cybersecurity is included in human resources practices (e.g., None None None None 0% 0% 0% 0% 0%
deprovisioning, personnel screening)
PR.IP-12: A vulnerability management plan is developed and 3 None None None None 0% 0% 0% 0% 0%
implemented
PR.MA-1: Maintenance and repair of organizational assets are performed None None None None 0% 0% 0% 0% 0%
and logged, with approved and controlled tools
PR.MA-2: Remote maintenance of organizational assets is approved, 4, 12 None None None None 0% 0% 0% 0% 0%
logged, and performed in a manner that prevents unauthorized access
4 , 6, 8,
PT Protective Technology Operational Security - Protect Assets 11 , 13, 0 0 0 0 0 CM 0.0%
14 , 18
PR.PT-1: Audit/log records are determined, documented, implemented, 6 None None None None 0% 0% 0% 0% 0%
and reviewed in accordance with policy
PR.PT-2: Removable media is protected and its use restricted according 8, 13, 14 None None None None 0% 0% 0% 0% 0%
to policy
PR.PT-3: The principle of least functionality is incorporated by 4, 14, 18 None None None None 0% 0% 0% 0% 0%
configuring systems to provide only essential capabilities
PR.PT-4: Communications and control networks are protected 11 None None None None 0% 0% 0% 0% 0%
AE Anomalies and Events Operational Security - Monitor, Analyze and Detect Events 6, 12, 19 0 0 0 0 0 SI 0.0%
DE.AE-1: A baseline of network operations and expected data flows for 12 None None None None 0% 0% 0% 0% 0%
users and systems is established and managed
DE.AE-2: Detected events are analyzed to understand attack targets and 19 None None None None 0% 0% 0% 0% 0%
methods
DE.AE-3: Event data are collected and correlated from multiple sources 6 None None None None 0% 0% 0% 0% 0%
and sensors
DE.AE-5: Incident alert thresholds are established 19 None None None None 0% 0% 0% 0% 0%
Security Continuous
CM M onitoring Operational Security - Security Continuous Monitoring 5, 8, 19 0 0 0 0 0 0.0%
DE.CM-1: The network is monitored to detect potential cybersecurity 19 None None None None 0% 0% 0% 0% 0%
events
DE.CM-2: The physical environment is monitored to detect potential 19 None None None None 0% 0% 0% 0% 0%
cybersecurity events
DE.CM-3: Personnel activity is monitored to detect potential 19 None None None None 0% 0% 0% 0% 0%
cybersecurity events
DETECT
DE.CM-6: External service provider activity is monitored to detect 19 None None None None 0% 0% 0% 0% 0%
potential cybersecurity events
DE.CM-7: Monitoring for unauthorized personnel, connections, devices, 19 None None None None 0% 0% 0% 0% 0%
and software is performed
DE.DP-1: Roles and responsibilities for detection are well defined to 6 None None None None 0% 0% 0% 0% 0%
ensure accountability
DE.DP-2: Detection activities comply with all applicable requirements 6 None None None None 0% 0% 0% 0% 0%
DE.DP-5: Detection processes are continuously improved 6 None None None None 0% 0% 0% 0% 0%
RS.RP-1: Response plan is executed during or after an incident 19 None None None None 0% 0% 0% 0% 0%
RS.CO-1: Personnel know their roles and order of operations when a 19 None None None None 0% 0% 0% 0% 0%
response is needed
RS.CO-2: Incidents are reported consistent with established criteria 19 None None None None 0% 0% 0% 0% 0%
RS.CO-3: Information is shared consistent with response plans 19 None None None None 0% 0% 0% 0% 0%
RS.CO-4: Coordination with stakeholders occurs consistent with 19 None None None None 0% 0% 0% 0% 0%
response plans
RS.CO-5: Voluntary information sharing occurs with external 19 None None None None 0% 0% 0% 0% 0%
stakeholders to achieve broader cybersecurity situational awareness
RS.AN-1: Notifications from detection systems are investigated 19 None None None None 0% 0% 0% 0% 0%
RESPOND
RS.AN-2: The impact of the incident is understood 19 None None None None 0% 0% 0% 0% 0%
RS.AN-4: Incidents are categorized consistent with response plans 19 None None None None 0% 0% 0% 0% 0%
RS.MI-3: Newly identified vulnerabilities are mitigated or documented 3 None None None None 0% 0% 0% 0% 0%
as accepted risks
RS.IM-1: Response plans incorporate lessons learned 19 None None None None 0% 0% 0% 0% 0%
RC.RP-1: Recovery plan is executed during or after a cybersecurity 19 None None None None 0% 0% 0% 0% 0%
incident
RC.IM-1: Recovery plans incorporate lessons learned 19 None None None None 0% 0% 0% 0% 0%
RC.CO-3: Recovery activities are communicated to internal and external 19 None None None None 0% 0% 0% 0% 0%
stakeholders as well as executive and management teams
None 0% None 0%
Optimized 50%
Documentation Level Value Automation Level Value
None 0% None 0%
Informal 5% Partial 5%
Priority