Security Solutions

GOVERN

Organizational Context

Do you understand your regulatory, contractual, and stakeholder expectations regarding cybersecurity risk management?

Risk Management Strategy

Does your organization have mechanisms in place to set priorities, constraints, risk tolerance, and assumptions, and communicates them to support decisions?

Roles, Responsibilities & Authorities

Are you cybersecurity roles and responsibilities clearly defined and communicated?

Policy

Do you have documented cybersecurity policies and directives? Are they shared and enforced?

Oversight

Do you have mechanisms in place to collect and measure results of your cybersecurity activities? Do you use the information to improve performance and adjust the risk management strategy?

Cybersecurity Supply Chain Risk Management

Do you understand and monitor the risks posed by your supply chain risk?

IDENTIFY

Asset Management

Do you know where all your asset are? Are they sufficiently protected, based on their importance to your business objectives?

Risk Assessment

Do you understand the cybersecurity risks faced by your business? Is that also the case for where your business is heading?

Improvement

Are you getting better at managing cybersecurity over time?

PROTECT

Access Control

Need to improve account management (separation of duties, least privilege) or onboarding and off-boarding procedures?

Awareness & Training

Does your staff understand the risks facing your organization? Do they understand how to handle potential threats?

Data Security

Do you have mechanisms in place to ensure your data’s confidentiality, integrity, and availability?

Platform Security

Are your assets (hardware, software, services) managed consistently? Do you track maintenance and management activities?

Technology Infrastructure Resilience

Do you have a cohesive IT architecture ensuring assets are protected and resilient?

DETECT

Continuous Monitoring

Are you monitoring your assets for anomalies, indicators of compromise, and threats?

Adverse Event Analysis

Do you have the expertise and capabilities to benefit from threat intelligence to improve detection?

RESPOND

Incident Management

Are you prepared to respond to security incidents?

Incident Analysis

Need help understanding the root cause of incidents?

Incident Response Reporting & Communication

Have you established a communication plan involving internal and external stakeholders?

Incident Mitigation

Are you confident you have the capabilities to prevent an incident from expanding within your organization?

RECOVER

Incident Recovery Plan Execution

Does your team know how to recover and rebuild systems following a cybersecurity incident?

Incident Recovery & Communication

Do you know everyone that needs to be involved to restore your data, systems, and services?