Verkauf durch Sack Fachmedien

Edwards

A Comprehensive Guide to the Nist Cybersecurity Framework 2.0

Strategies, Implementation, and Best Practice

Medium: Buch
ISBN: 978-1-394-28036-0
Verlag: Wiley
Erscheinungstermin: 10.09.2024
Lieferfrist: bis zu 10 Tage
Autoren/Hrsg.

Autoren

Preface xix

Acknowledgments xx

1 Introduction 1

2 Understanding the NIST Cybersecurity Framework 2.0 5

3 Cybersecurity Controls 11

4 Compliance and Implementation 15

5 Organizational Context (GV.OC) 21

6 Risk Management Strategy (GV.RM) 39

7 Roles, Responsibilities, and Authorities (GV.RR) 61

8 Policy (GV.PO) 73

9 Oversight (GV.OV) 81

10 Cybersecurity Supply Chain Risk Management (GV.SC) 91

11 Asset Management (ID.AM) 121

12 Risk Assessment (ID.RA) 143

13 Improvement (ID.IM) 173

14 Identity Management, Authentication, and Access Control (PR.AA) 187

15 Awareness and Training (PR.AT) 207

16 Data Security (PR.DS) 215

17 Platform Security (PR.PS) 227

18 Technology Infrastructure Resilience (PR.IR) 245

19 Continuous Monitoring (DE.CM) 257

20 Adverse Event Analysis (DE.AE) 275

21 Incident Management (RS.MA) 295

22 Incident Analysis (RS.AN) 311

23 Incident Response Reporting and Communication (RS.CO) 325

24 Incident Mitigation (RS.MI) 333

25 Incident Recovery Plan Execution (RC.RP) 341

26 Incident Recovery Communication (RC.CO) 359

A Appendix A: Glossary of Terms 365

B Appendix B: Descriptions of NIST 800-53 Controls 371

Index of 800-53 Controls used in the CSF 425