Nist SP 1300
Nist SP 1300
Nist SP 1300
0:
Small Business Quick-Start Guide
• Assess the potential impact of a total or partial loss of critical business assets and Technical Deep Dive: Staging Cybersecurity Risks for Enterprise Risk Management and
operations. (GV.0C-04) Governance Oversight
• Assess whether cybersecurity insurance is appropriate for your business. (GV.RM-04)
• Assess cybersecurity risks posed by suppliers and other third parties before entering into Questions to Consider
formal relationships. (GV.SC-06) • As our business grows, how often are we reviewing our cybersecurity strategy?
• Do we need to upskill our existing staff, hire talent, or engage an external partner
Prioritize to help us establish and manage our cybersecurity plan?
• Prioritize managing cybersecurity risks alongside other business risks. (GV.RM-03) • Do we have acceptable use policies in place for business and for employee-owned
devices accessing business resources? Have employees been educated on these
Communicate policies?
• Communicate leadership’s support of a risk-aware, ethical, and continually improving Related Resources
culture. (GV.RR-01)
• Communicate, enforce, and maintain policies for managing cybersecurity risks. (GV.PO-01) • Securing Small and Medium-Sized Supply Chains Resource Handbook
• Choosing A Vendor/Service Provider
Prioritize
Technical Deep Dive: Integrating Cybersecurity and Enterprise Risk Management
• Prioritize inventorying and classifying your business data. (ID.AM-07)
• Prioritize documenting internal and external cybersecurity threats and associated Questions to Consider
responses using a risk register. (ID.RA) • What are our most critical business assets (data, hardware, software, systems, facilities,
services, people, etc.) we need to protect?
Communicate
• What are the cybersecurity and privacy risks associated with each asset?
• Communicate cybersecurity plans, policies, and best practices to all staff and • What technologies or services are personnel using to accomplish their work? Are these
relevant third parties. (ID.IM-04) services or technologies secure and approved for use?
• Communicate to staff the importance of identifying needed improvements to Related Resources
cybersecurity risk management processes, procedures, and activities. (ID.IM)
• NIST Risk Register Template
• Take Stock. Know What Sensitive Information You Have
• Evaluating Your Operational Resilience and Cybersecurity Practices
Actions to Consider Getting Started with an Incident Response Plan Contact Phone
Before an incident occurs, you want to be ready with a basic response Business
plan. This will be customized based on the business but should include: Leader:
Understand
A business champion: Someone who is responsible for developing Technical
• Understand what your incident response plan is and who has authority and Contact:
responsibility for implementing various aspects of the plan. (RS.MA-01) and maintaining your incident response plan.
Who to call: List all the individuals who may be part of your State
Assess incident response efforts. Include their contact information, Police:
• Assess your ability to respond to a cybersecurity incident. (RS.MA-01) responsibilities, and authority.
Legal:
• Assess the incident to determine its severity, what happened, and its root cause. What/when/how to report: List your business's
(RS.AN-03, RS.MA-03) communications/reporting responsibilities as required by laws, Bank:
regulations, contracts, or policies.
Insurance:
Prioritize Technical Deep Dive: NIST Computer Security Incident Handling Guide
• Prioritize taking steps to contain and eradicate the incident to prevent further Questions to Consider
damage. (RS.MI)
• Do we have a cybersecurity incident response plan? If so, have we practiced it to see if it is
Communicate feasible?
• Communicate a confirmed cybersecurity incident with all internal and external • Do we know who the key internal and external stakeholders and decision-makers are who
stakeholders (e.g., customers, business partners, law enforcement agencies, will assist if we have a confirmed cybersecurity incident?
regulatory bodies) as required by laws, regulations, contracts, or policies. Related Resources
(RS.CO-02/03)
• Incident Response Plan Basics
• FBI’s Internet Crime Complaint Center
• Data Breach Response: A Guide for Business
• Best Practices for Victim Response and Reporting of Cyber Incidents
View the Quick-Start Guide for Creating and Using Organizational Profiles for more detailed information on how to get started creating Current and Target Profiles for your organization.
Additional Resources
The NIST Cybersecurity Framework Reference Tool allows users to explore the full CSF 2.0 Core in human and machine-readable versions (in JSON and Excel), while also maintaining
resources with information to help you achieve your desired outcomes, such as:
• Mapping: Informative references are mappings indicating relationships between the CSF 2.0 and various standards, guidelines, regulations, and other content. They help inform
how an organization may achieve the Core’s outcomes.
• Implementation examples provide illustrations of concise, action-oriented steps to guide organizations in achieving the CSF outcomes. The examples are not a comprehensive
list of all actions that could be taken by an organization, nor are they a baseline of required actions; they are a set of helpful examples to get organizations thinking about
concrete steps.
NIST Cybersecurity and Privacy Reference Tool (CPRT) provides a simple way to access reference data from various NIST cybersecurity and privacy standards, guidelines, and Frameworks–
downloadable in common formats (XLSX and JSON).
NIST SP 800-53 provides a catalog of security and privacy controls you can choose from. The controls are flexible, customizable, and implemented as part of an organization-wide process to
manage risk. View and export from the Cybersecurity and Privacy Reference Tool (CPRT).
The Workforce Framework for Cybersecurity (NICE Framework) helps employers achieve the outcomes in the CSF 2.0 by assisting them to identify critical gaps in cybersecurity staffing and
capabilities; determine and communicate position responsibilities and job descriptions; and provide staff training and career pathways.