Security Solutions
GOVERN
Organizational Context
Do you understand your regulatory, contractual, and stakeholder expectations regarding cybersecurity risk management?
Risk Management Strategy
Does your organization have mechanisms in place to set priorities, constraints, risk tolerance, and assumptions, and communicates them to support decisions?
Roles, Responsibilities & Authorities
Are you cybersecurity roles and responsibilities clearly defined and communicated?
Policy
Do you have documented cybersecurity policies and directives? Are they shared and enforced?
Oversight
Do you have mechanisms in place to collect and measure results of your cybersecurity activities? Do you use the information to improve performance and adjust the risk management strategy?
Cybersecurity Supply Chain Risk Management
Do you understand and monitor the risks posed by your supply chain risk?
IDENTIFY
Asset Management
Do you know where all your asset are? Are they sufficiently protected, based on their importance to your business objectives?
Risk Assessment
Do you understand the cybersecurity risks faced by your business? Is that also the case for where your business is heading?
Improvement
Are you getting better at managing cybersecurity over time?
PROTECT
Access Control
Need to improve account management (separation of duties, least privilege) or onboarding and off-boarding procedures?
Awareness & Training
Does your staff understand the risks facing your organization? Do they understand how to handle potential threats?
Data Security
Do you have mechanisms in place to ensure your data’s confidentiality, integrity, and availability?
Platform Security
Are your assets (hardware, software, services) managed consistently? Do you track maintenance and management activities?
Technology Infrastructure Resilience
Do you have a cohesive IT architecture ensuring assets are protected and resilient?
DETECT
Continuous Monitoring
Are you monitoring your assets for anomalies, indicators of compromise, and threats?
Adverse Event Analysis
Do you have the expertise and capabilities to benefit from threat intelligence to improve detection?
RESPOND
Incident Management
Are you prepared to respond to security incidents?
Incident Analysis
Need help understanding the root cause of incidents?
Incident Response Reporting & Communication
Have you established a communication plan involving internal and external stakeholders?
Incident Mitigation
Are you confident you have the capabilities to prevent an incident from expanding within your organization?
RECOVER
Incident Recovery Plan Execution
Does your team know how to recover and rebuild systems following a cybersecurity incident?
Incident Recovery & Communication
Do you know everyone that needs to be involved to restore your data, systems, and services?