Analecta Cyber Company Blog: NIST Cybersecurity Framework Category: Identify

NIST Cybersecurity Framework Category: Identify

Overview | Identify | Protect | Detect | Respond | Recover | Index

Compliance to identification requires an inventory of your company’s digital and physical assets. It includes knowing which pieces of the infrastructure are at risk or exposed to common cyber threats. A software inventory will also be important for managing updates.

Identify your critical services, functions and dependencies - Analecta LLC Graphic2018-11-13 | NIST > Identify
Identify Your Critical Services, Functions and Dependencies
Your business comprises critical services and functions; protect these items first when implementing a cybersecurity plan.

Where does your company fit in critical infrastructure? Power lines graphic - Analecta LLC2018-11-06 | NIST > Identify
Where Does Your Company Fit in Critical Infrastructure?
According to the U.S. Chamber of Commerce, 85% of our nation’s critical infrastructure is owned or operated by members of the private sector. Understanding that your industry is a component of the nation’s critical infrastructure may be straightforward.

FBI Public service announcement screenshot graphic2018-09-04 | NIST > Identify
Finding Additional Resources for Threat and Vulnerability Information
FBI’s Internet Crime Complaint Center (IC3) publishes cyber actor and threat activity informational public service announcements. This May 2018 announcement reached numerous news outlets and warned of the havoc caused by hackers on routers and other network devices

data classification 101 protecting data based on the function it serves2018-08-28 | NIST > Identify
Data Classification 101: Protecting Data Based on the Function It Serves
The Government uses an information classification scheme to keep track of specific documents and how valuable they are with respect to the information they contain. This, in turn, classifies how they are protected, which parties have authority to access their contents, and more importantly, which parties should not have access.

2018-03-15 | NIST > Identity
Communicating Your company's Mission, Objectives and Activities for Optimal Cybersecurity
The organization's mission, objectives, stakeholders and activities are understood and prioritized; this information is used to inform cybersecurity roles, responsibilities, and risk management decisions.

2018-03-06 | NIST > Identify
Making Sense of the NIST Cybersecurity Framework: Why you need an asset inventory for managing cyber risk
Organizations need to be able to identify, protect and manage anything that is required to conduct business. Content necessary for effective accountability of information system components should include, hardware, network information and software specifications.