You will be introduced to how organizations determine what assets to protect. You’ll learn about the connection between managing risk and classifying assets by exploring the unique challenge of securing physical and digital assets. You’ll also be introduced to the National Institute of Standards and Technology (NIST) framework standards, guidelines and best practices to manage cybersecurity risk.
Learning Objectives
- Define threat, vulnerability, asset, and risk.
- Explain security’s role in mitigating organizational risk.
- Classify assets based on value.
- Identify whether data is in use, in transit, or at rest.
- Discuss the uses and benefits of the NIST Cybersecurity Framework.
- Get started with the course
- Introduction to assets
- Video: Welcome to module 1
- Video: The what, why, and how of asset security
- Reading: Understand risks, threats, and vulnerabilities
- Video: Tri: Life in asset security
- Video: Security starts with asset classification
- Reading: Common classification requirements
- Practice Quiz: Test your knowledge: Introduction to assets
- Practice Quiz: Activity: Classify the assets connected to a home network
- Reading: Activity Exemplar: Classify the assets connected to a home network
- Digital and physical assets
- Risk and asset security
- Video: Elements of a security plan
- Video: The NIST Cybersecurity Framework
- Reading: Security guidelines in action
- Practice Quiz: Test your knowledge: Risk and asset security
- Practice Quiz: Activity: Score risks based on their likelihood and severity
- Reading: Activity Exemplar: Score risks based on their likelihood and severity
- Review: Introduction to asset security
Get started with the course
Video: Introduction to Course 5
The world of security is a broad and exciting field that encompasses a variety of roles and responsibilities. From securing Gmail to protecting physical assets, security professionals work to safeguard valuable information and systems from harm. This course will introduce you to the fundamental concepts of asset security, security systems and controls, and threat modeling, equipping you with the knowledge to pursue a rewarding career in this dynamic field.
What do you picture when you
think about the security field? This might make you think of a dark room
with people hunched over their computers. Maybe you picture a person in a lab
carefully analyzing evidence. Or, maybe you imagine a guard standing
watch in front of a building. The truth is,
no matter what thoughts cross your mind, all of these examples are part
of the wide world of security. Hi, my name is Da’Queshia. I have worked as a security engineer for
four years. I’m excited to be your instructor for
this course and share some of my experience with you. At Google, I’m part of a diverse team
of security professionals who all have different backgrounds and
unique perspectives. For example,
in my role, I work to secure Gmail. Part of my daily activities include
developing new security features and fixing vulnerabilities in the application
to make email safer for our users. Some members of my team began working in
security after graduating from college. Many others found their way into the field
after years of working in another industry. Security teams come in all
different shapes and sizes. Each member of a team has a role to play. While our specific functions
within the group differ, we all share the same objective:
protecting valuable assets from harm. Accomplishing this mission involves
a combination of people, processes, and tools. In this course, you’ll learn
about each of these in detail. First, you’ll be introduced to
the world of asset security. You’ll learn about the variety of
assets that organizations protect and how these factor into a company’s
overall approach to security. Then, you’ll begin exploring
the security systems and controls that teams use to proactively
protect people and their information. All systems have weaknesses
that can be improved upon. When those weaknesses are neglected or
ignored, they can lead to serious problems. In this section of the course,
you’ll focus on common vulnerabilities in systems and the ways security teams
stay ahead of potential problems. Finally, you’ll learn about
the threats to asset security. You’ll also be introduced to the threat
modeling process that security teams use to stay one step ahead
of potential attacks. In this field, we try to do everything possible to avoid
being put in a compromised position. By the end of this course, you’ll have
a clearer picture of the ways people, processes, and technology work together
to protect all that’s important. Throughout the course, you’ll also get an idea of the exciting
career opportunities available to you. Security truly is
an interdisciplinary field. Your background and
perspective is an asset. Whether you’re a recent college
graduate or starting a new career path, the security field presents
a wide range of possibilities. So what do you say? Are you ready to go on
this journey with me?
Video: Da’Queshia: My path to cybersecurity
Da’Queshia is a security engineer at Google who works to protect Gmail from threats. She has a diverse background, having worked in a variety of jobs before entering cybersecurity. She believes that her soft skills, such as time management, people skills, and communication, are valuable assets in her current role. She describes her job as a “Google security guard” and explains that she is responsible for identifying and fixing vulnerabilities in Gmail. She also emphasizes the importance of threat modeling and encourages anyone interested in cybersecurity to be patient and persistent.
Hi. My name is Da’Queshia. I’m a security engineer. That basically means
I work securing Google’s products so users
like you aren’t vulnerable. Before I entered cybersecurity, I worked installing Internet. I also worked at a chip factory. I worked in fast food. I sold shoes at the mall. I did a lot of things
before I made it here. A lot of what I learned
in my past jobs I actually use every day. Some of it is my soft skills
like time management, people skills, and
communication. As a new cybersecurity analyst, it’s important to be able to
communicate, take feedback, and feel uncomfortable, not
with the people around you, but with the problems
you’re trying to solve because sometimes it requires you to think outside of the box and be challenged. I would describe my job as a Google security guard because I work on the Gmail
security team, it’s my job to protect Gmail. Some of those threats are people who are sending
you bad emails, who are trying to get
your user credentials or get you to click
on a phishing link. When it comes to
vulnerabilities, some of those could be something like unsanitized input, which can lead to trouble. My typical work day starts
like everyone else. I check my emails and then from there I go
into my bug queue; it’s essentially when
people tell me there’s a problem with
one of our products. I start doing a little
bit of research and then I like to explore the
bug a little bit more. I like to figure out if
this can break this, can it also break this, and if it can, what
else can I do with it? Then from there, I look for a solution to make
sure that I fix that hole and then any other holes that we might
have in our security. Some of the things
you learned about in this course is threat modeling, and that’s something
I use every day. Whenever I get a
bug, it’s part of my job to figure
out the attack tree and what type of vectors we use to take advantage
of vulnerabilities. No one is born
knowing everything. I know that sounds really
cliche or like super obvious, but it helps me
because it helps put some perspective the time and effort that everyone has to put in in order to
learn something new. So be patient with yourself. Don’t let anyone discourage
you from cybersecurity. Taking this course is one step closer to getting
into your goal. Don’t get discouraged
now. Keep going.
Introduction to assets
Video: Welcome to module 1
The increasing reliance on technology creates a massive amount of data, making businesses enticing targets for cybercriminals. This presents a growing need for security professionals with diverse perspectives to solve complex problems and protect sensitive information. This course will explore how assets, threats, and vulnerabilities are managed, the importance of asset inventories, and the challenges in the evolving digital landscape. You’ll learn about security plans built on policies, standards, and procedures, including the NIST Cybersecurity Framework used by companies to safeguard their customers and reputation. Buckle up, it’s time to embark on this exciting journey into the world of security!
We all depend on technology so
much nowadays. Examples of this are all around us. Personal devices, like smartphones, help
keep us in touch with friends and families across the globe. Wearable technologies help us achieve
personal goals and be more productive. Businesses have also come to embrace
technology in everyday life. From streamlining operations to
automating processes, our world is more connected because of technology. The more we rely on technology,
the more information we share. As a result, an enormous amount
of data is created every day. This huge surge in
data creation presents unique challenges. As businesses become more
reliant on technology, cybercriminals become more sophisticated
in how they affect organizations. Data breaches are becoming increasingly
serious due to all the sensitive data businesses are storing. One positive aspect of these challenges is
a growing need for individuals like you! Security is a team effort. Unique perspectives, like yours,
are an asset to any organization. A team filled with diverse backgrounds,
cultures, and experiences is more likely to
solve problems and be innovative. As breach after breach hits the
headlines, it’s clear that organizations need more professionals focused on security. Companies around the globe are working
hard to keep up with the demands of a rapidly changing digital landscape. As the environment continues to transform,
the more your personal experience is valuable. In this section, we’ll start by
exploring how assets, threats, and vulnerabilities factor
into security plans. After that, we’ll discuss
the use of asset inventories in protecting the wide range of
assets that companies have. Then, we’ll consider the challenges in
this rapidly changing digital world. And finally, you’ll gain an understanding
of the building blocks of a security plan: its policies, standards, and procedures. We’ll examine the NIST Cybersecurity
Framework that companies use to create security plans that protect
their customers and their brands. I hope you’re as excited to go on
this journey into this world of security as I am. Now, let’s get started!
Video: The what, why, and how of asset security
This passage emphasizes the importance of practice and planning in the field of security. Drawing parallels to activities like painting, mastering basketball moves, and playing a solo on the guitar, the text underscores the need for time, dedication, and focus to enhance skills. The focus shifts to security, highlighting the significance of planning for the future, a core skill in the profession.
The analogy of planning for a trip is used to illustrate the concept of dealing with uncertainty by preemptively solving problems. Businesses, like individuals, engage in risk analysis to plan for potential challenges. The passage introduces the CIA triad, emphasizing confidentiality, integrity, and availability as key components in security risk planning.
The process of security risk planning involves analyzing three elements: assets, threats, and vulnerabilities. Assets, considered valuable items to an organization, range from buildings and equipment to data and people. Threats encompass circumstances or events that can negatively impact assets, such as burglars or natural disasters. Vulnerabilities are weaknesses within assets that can be exploited by threats, like a weak lock on a door.
Security plans prioritize resources by considering the importance of assets, potential threats, and vulnerabilities. The passage concludes by stressing the need for security teams to account for a wide range of these elements to effectively plan for the future.
The What, Why, and How of Asset Security in Cybersecurity
Welcome, fellow security warriors! Today, we’ll delve into the realm of asset security, a cornerstone of any robust cybersecurity defense.
What are assets?
In the digital arena, assets are anything that holds value and can be compromised, impacting your organization’s operations, reputation, or finances. They include:
- Data: Customer records, financial information, intellectual property – the lifeblood of your business.
- Hardware: Servers, laptops, mobile devices – gateways to your sensitive information.
- Software: Applications, operating systems, cloud platforms – the tools that keep things running.
- Networks: The intricate web connecting your assets, a potential vulnerability if not secured.
- People: Your employees, contractors, even customers – insiders who can be unknowingly manipulated.
Why is asset security crucial?
Imagine a fortress. Strong walls and vigilant guards protect your valuables. But if you don’t know what’s inside, hidden weaknesses can be exploited. That’s why asset security is vital:
- Prevents breaches: By knowing your assets, you can identify and prioritize vulnerabilities before attackers do.
- Minimizes damage: If a breach occurs, you can quickly isolate compromised assets and prevent widespread harm.
- Ensures compliance: Regulations often mandate asset identification and protection, and neglecting them can lead to hefty fines.
- Optimizes resources: You can focus your security efforts on the assets that matter most, saving time and money.
How do we achieve asset security?
Building your asset security fortress involves several steps:
1. Discovery:
- Inventory everything: Conduct a thorough sweep, identifying all hardware, software, and data assets. Don’t forget cloud resources and shadow IT!
- Classify assets: Categorize them based on their criticality and sensitivity. Customer data is likely more crucial than printers, right?
- Document vulnerabilities: Scan your assets for known weaknesses and prioritize patching based on risk.
2. Protection:
- Implement access controls: Granular permissions limit who can access what, preventing unauthorized use.
- Secure configurations: Harden your systems and applications against common attack methods. Think strong passwords and encryption!
- Monitor and detect: Continuously scan for suspicious activity and have a plan to respond swiftly to potential incidents.
3. Resilience:
- Backup and recovery: Regularly back up your critical assets to ensure you can bounce back from attacks or disasters.
- Incident response plan: Define clear procedures for identifying, containing, and recovering from breaches. Practice makes perfect!
- Awareness and training: Educate your employees about cyber threats and how to identify and report suspicious activity.
Remember, asset security is an ongoing journey, not a destination. Regularly review your inventory, adapt to new threats, and embrace a culture of continuous improvement. By fortifying your assets, you’ll build a resilient digital fortress that can withstand even the fiercest cyber storms.
Bonus tips:
- Automate tasks: Leverage tools to automate asset discovery, vulnerability scanning, and patching for efficiency.
- Integrate with SIEM: Connect your asset inventory to your Security Information and Event Management (SIEM) system for centralized monitoring and incident response.
- Stay informed: Keep yourself updated on the latest cyber threats and vulnerabilities to adapt your defenses accordingly.
Painting a portrait.
Perfecting a new basketball move. Playing a solo on guitar.
They all share something in common. Can you guess what it is? If you thought “practice,”
you’re absolutely correct! It takes time, dedication, and
focus to improve these skills. The security profession is no different. Planning for the future is a core skill that you’ll
need to practice all the time in security. We all deal with uncertainty by trying
to solve problems before they arise. For example, if you’re going on a trip, you might think about the length
of the trip and how much to pack. Maybe you’re traveling somewhere cold.
You might bring coats and sweaters to help keep you warm. We all want to feel the security of
knowing that there’s a plan if something goes wrong. Businesses are no different.
Just like you, organizations try their best to
plan ahead by analyzing risk. Security teams help companies
by focusing on risk. In security, a risk is anything that
can impact the confidentiality, integrity, or availability of an asset. Our primary focus as security
practitioners is to maintain confidentiality, integrity,
and availability, which are the three
components of the CIA triad. The process of security risk planning is
the first step toward protecting these cornerstones. Each organization has their own unique
security plan based on the risk they face. Thankfully, you don’t need to be familiar
with every possible security plan to be a good security practitioner. All you really need to know are the basics
of how these plans are put together. Security plans are based on
the analysis of three elements: assets, threats, and vulnerabilities. Organizations measure security risk by
analyzing how each can have an effect on confidentiality, integrity, and
availability of their information and systems. Basically, they each represent the what,
why, and how of security. Let’s spend a little time exploring
each of these in more detail. As you might imagine, an asset is
an item perceived as having value to an organization. This often includes a wide range of
things. Buildings, equipment, data, and people are all examples of assets
that businesses want to protect. Let’s examine this idea more by
analyzing the assets of a home. Inside a home, there’s a wide
range of assets, like people and personal belongings. The outside structure of a home is made
of assets too, like the walls, roof, windows, and doors. All of these assets have value, but they
differ in how they might be protected. Someone might place a lower priority
on protecting the outside walls than on the front door, for example. This is because a burglar is more likely
to enter through the front door than a wall. That’s why we have locks. With so many types of assets to think of, security plans need to
prioritize resources. After all,
no matter how large a security team is, it would be impossible to monitor every
single asset at all hours of the day. Security teams can prioritize
their efforts based on threats. In security,
a threat is any circumstance or event that can negatively impact assets. Much like assets,
threats include a wide range of things. Going back to the example of a home, a threat can be a burglar
who’s trying to gain access. Burglars aren’t the only type of threat
that affect the security of windows and doors. What if either broke by accident? Strong winds can blow the door
open during a bad storm. Or, kids playing with a ball nearby
can accidentally damage a window. If any of these thoughts crossed your mind,
great job! You’re already demonstrating
a security mindset. The final element of a security plan that
we’re going to cover are vulnerabilities. In security, a vulnerability is a weakness
that can be exploited by a threat. A weak lock on a front door, for example, is a vulnerability that can
be exploited by a burglar. And old, cracked wood is a different
vulnerability on that same front door that can increase the chances of storm damage. In other words, think of vulnerabilities
as flaws within an asset. Assets can have many different types of
vulnerabilities that are an easy target for attackers. We’ll explore different
types of threats and vulnerabilities in greater detail later. For now, just understand that security
teams need to account for a wide range of assets, threats, and vulnerabilities
to effectively plan for the future.
What are the elements of security risk planning? Select three answers.
Assets, Vulnerabilities, Threats
Security risk planning involves the analysis of three elements: assets, threats, and vulnerabilities. An asset is an item perceived as having value to an organization, such as a cash register and the money inside it.
Reading: Understand risks, threats, and vulnerabilities
Reading
When security events occur, you’ll need to work in close coordination with others to address the problem. Doing so quickly requires clear communication between you and your team to get the job done.
Previously, you learned about three foundational security terms:
- Risk: Anything that can impact the confidentiality, integrity, or availability of an asset
- Threat: Any circumstance or event that can negatively impact assets
- Vulnerability: A weakness that can be exploited by a threat
These words tend to be used interchangeably in everyday life. But in security, they are used to describe very specific concepts when responding to and planning for security events. In this reading, you’ll identify what each term represents and how they are related.
Security risk
Security plans are all about how an organization defines risk. However, this definition can vary widely by organization. As you may recall, a risk is anything that can impact the confidentiality, integrity, or availability of an asset. Since organizations have particular assets that they value, they tend to differ in how they interpret and approach risk.
One way to interpret risk is to consider the potential effects that negative events can have on a business. Another way to present this idea is with this calculation:
Likelihood x Impact = Risk
For example, you risk being late when you drive a car to work. This negative event is more likely to happen if you get a flat tire along the way. And the impact could be serious, like losing your job. All these factors influence how you approach commuting to work every day. The same is true for how businesses handle security risks.
In general, we calculate risk in this field to help:
- Prevent costly and disruptive events
- Identify improvements that can be made to systems and processes
- Determine which risks can be tolerated
- Prioritize the critical assets that require attention
The business impact of a negative event will always depend on the asset and the situation. Your primary focus as a security professional will be to focus on the likelihood side of the equation by dealing with certain factors that increase the odds of a problem.
Risk factors
As you’ll discover throughout this course, there are two broad risk factors that you’ll be concerned with in the field:
- Threats
- Vulnerabilities
The risk of an asset being harmed or damaged depends greatly on whether a threat takes advantage of vulnerabilities.
Let’s apply this to the risk of being late to work. A threat would be a nail puncturing your tire, since tires are vulnerable to running over sharp objects. In terms of security planning, you would want to reduce the likelihood of this risk by driving on a clean road.
Categories of threat
Threats are circumstances or events that can negatively impact assets. There are many different types of threats. However, they are commonly categorized as two types: intentional and unintentional.
For example, an intentional threat might be a malicious hacker who gains access to sensitive information by targeting a misconfigured application. An unintentional threat might be an employee who holds the door open for an unknown person and grants them access to a restricted area. Either one can cause an event that must be responded to.
Categories of vulnerability
Vulnerabilities are weaknesses that can be exploited by threats. There’s a wide range of vulnerabilities, but they can be grouped into two categories: technical and human.
For example, a technical vulnerability can be misconfigured software that might give an unauthorized person access to important data. A human vulnerability can be a forgetful employee who loses their access card in a parking lot. Either one can lead to risk.
Key takeaways
Risks, threats, and vulnerabilities have very specific meanings in security. Knowing the relationship between them can help you build a strong foundation as you grow essential skills and knowledge as a security analyst. This can help you gain credibility in the industry by demonstrating that you have working knowledge of the field. And it signals to your future colleagues that you’re a member of the global security community.
Video: Tri: Life in asset security
Tri is a security engineer at Google who is passionate about asset security. He got into the field after being hacked as a kid and wanting to learn how to defend himself. He enjoys building detections that catch malicious behavior and thinks it’s important to be able to think outside the box to solve complex problems. He’s proud to be on the security team and protect users from bad things happening on the internet.
I’m Tri, a security engineer at Google. My department is Detection and Response. Let’s see,
what does my everyday look like? Well, of course I have the free lunch
and coffee, which is nice. And then I finally get to my desk
and I open up the SIEM to see what kind of exciting events
are there for me to look into and what threats there could be out there
for me to analyze. Also, I work on improving our analysis
for detection of potential threats. So my security passion
developed at a young age. I was a victim of a hack,
believe it or not. After school every day at that time
I would go home and play a computer game. One day I got home, I brought it up
and it said, “Your CD key is in use by…”, and then it gave some strange name there
that I didn’t recognize. At first I felt shocked. I had bought this game myself
and somebody stole my CD key, but it did provide me this motivation
to start to learn how to defend myself. For example,
I learned about manual removal of malware, and that became one of my favorite topics. Also, for fun,
I started doing some white hat hacker activity against some of my friends. Asset security is a very important field, and there’s many varieties of assets
that you could be looking into to protect. My favorite part is building
the detections that actually have the potential
to catch malicious behavior. In asset management security,
you have the ability to accurately inventory all of the assets
which include IP, user data, employee machines,
and to make sure you have a security posture
that’s on par with what you need. There’s always new technology
coming on the scene, new hardware, and we are responsible for understanding
what potential new threats are out there. Problem
solving ability and creative thinking is important in cybersecurity
because there’s always complex problems, and people need to be able to think
outside of the box, think creatively, and think holistically as they approach their solutions to mitigate risks. Cybersecurity is a noble occupation. Many things can happen. Many bad
things can happen on the Internet, but we can be there to stand up against it and we can be there
to do something about it. We can be there to protect our users,
or family members, or friends. That responsibility is heavy. But also, of course, it’s
a very important mission. And I am proud to
be within the security team.
Video: Security starts with asset classification
Introduction:
- Difficulty in finding important items like keys or phone.
- Similar challenge for organizations with growing number of assets.
- Example of online retailer expanding and needing to protect increasing assets.
What is Asset Management?
- Tracking and managing assets and their associated risks.
- Essential for security planning.
- Assets include equipment, data, intellectual property, etc.
Benefits of Asset Inventory:
- Central part of asset protection.
- Enables resource allocation and risk management.
- Helps identify missing assets.
Asset Classification:
- Labeling assets based on sensitivity and importance.
- Common scheme: public, internal-only, confidential, restricted.
- Public: shareable with anyone.
- Internal-only: shareable within the organization.
- Confidential: access limited to specific project members.
- Restricted: highly sensitive, need-to-know access only.
Examples of Asset Classification:
- Online retailer’s internal emails about a new product as confidential.
- Doors at their office labeled restricted.
Impact of Classification:
- Determines whether an asset can be disclosed, altered, or destroyed.
Conclusion:
- Asset management is a continuous process for uncovering security gaps and managing risks.
- Keeping track of organizational assets is crucial for effective security planning.
Security Starts with Asset Classification: Your Cybersecurity Foundation
In the ever-evolving landscape of cybersecurity, where threats lurk around every corner, defense starts with a crucial step: asset classification. It’s the foundation upon which you build your security posture, the first line of defense against ever-hungry attackers.
Imagine a bank vault. Before you install fancy locks and alarms, you need to know what treasures you’re protecting, right? That’s exactly what asset classification does for your organization’s digital assets.
What are assets?
Think beyond just servers and software. Your assets are anything that holds value to your organization, anything whose compromise could disrupt operations, damage reputation, or cause financial harm. They can be:
- Tangible: Servers, laptops, mobile devices, buildings, even that old printer in the corner.
- Intangible: Data (customer records, financial information, intellectual property), brand reputation, employee know-how, and even your online presence.
Why classify? It’s all about prioritization.
Classifying your assets helps you understand their relative importance and vulnerability. It’s like sorting your prized possessions – some might deserve a bank vault, while others are fine in a drawer.
Classification methods:
There are different ways to classify assets, but some common approaches include:
- Confidentiality: Public, internal, confidential, and restricted. Public assets are like the newspapers everyone reads, while restricted ones are top-secret documents.
- Impact: High, medium, low. Imagine the chaos if your customer database is breached compared to losing a company blog post.
- Value: Critical, important, moderate, low. This might be based on financial worth or the asset’s role in core operations.
Benefits of classification:
- Focused security: Allocate resources efficiently, protecting the crown jewels first.
- Informed decisions: Make data-driven choices about security controls and investments.
- Compliance adherence: Meet regulatory requirements that often mandate asset classification.
- Reduced risk: Identify and address vulnerabilities before they become exploited.
Now, let’s get practical!
Here’s a step-by-step guide to implementing asset classification:
1. Inventory: Discover and document all your assets, leaving no digital stone unturned. Think of it as a treasure hunt!
2. Assess: Analyze each asset’s value, impact, and confidentiality using the chosen classification scheme.
3. Label: Clearly mark assets with their classification level, raising awareness and ensuring proper handling.
4. Maintain: This is an ongoing process, not a one-time thing. Regularly review and update your inventory as assets evolve.
5. Train: Educate your team about asset classification and its importance in safeguarding the organization’s treasures.
Remember, asset classification is a continuous journey, not a destination. Embrace it as a powerful tool to prioritize, protect, and ultimately, secure your organization’s vital assets.
By following these steps and staying vigilant, you’ll be well on your way to building a robust cybersecurity defense, one classified asset at a time.
Bonus tip: Leverage technology! Asset management tools can automate much of the heavy lifting, freeing you to focus on strategic security decisions.
So, what are you waiting for? Grab your metaphorical magnifying glass and start unearthing the true value of your digital treasures. With asset classification as your guide, you’ll be well-equipped to navigate the ever-changing cybersecurity landscape and keep your organization safe and sound.
It can be really stressful when you have trouble
finding something important. You’re late to an appointment
and can’t find your keys! We all find ourselves in situations like these
at one time or another. Believe it or not, organizations deal with the same kind of trouble. Take a few seconds to
think of the number of important assets
you have nearby. I’m thinking of my phone, wallet, and keys, for example. Next, imagine that
you’ve just joined a security team for a
small online retailer. The company has been growing
over the past few years, adding more and more customers. As a result, they’re expanding
their security department to protect the increasing
numbers of assets they have. Let’s say each of you are
responsible for 10 assets. That’s a lot of assets! Even in this small
business setting, that’s an incredible amount of things that need protecting. A fundamental truth
of security is you can only protect the
things you account for. Asset management
is the process of tracking assets and the
risks that affects them. All security plans revolve
around asset management. Recall that assets include any item perceived as having
value to an organization. Equipment, data, and
intellectual property are just a few of the wide range of assets businesses
want to protect. A critical part of every organization’s security plan is keeping track of its assets. Asset management starts with
having an asset inventory, a catalog of assets that
need to be protected. This is a central part of protecting
organizational assets. Without this record,
organizations run the risk of losing track of
all that’s important to them. A good way to think of asset inventories is as a
shepherd protecting sheep. Having an accurate
count of the number of sheep help in a lot of ways. For example, it
will be easier to allocate resources, like
food, to take care of them. Another benefit of
asset inventory might be that you’d get an alert if one of them goes missing. Once more, think of the important assets
you have nearby. Just like me, you’re
probably able to rate them according to
the level of importance. I would rank my wallet ahead
of my shoes, for example. In security, this practice is known as asset classification. In general, asset classification is the practice of labeling assets based on the sensitivity and importance to
an organization. Organizations label
assets differently. Many of them follow a basic
classification scheme: public, internal-only, confidential, and restricted. Public assets can be
shared with anyone. Internal-only can be
shared with anyone in the organization but should
not be shared outside of it. And confidential assets
should only be accessed by those working
on a specific project. Assets classified
as restricted are typically highly sensitive
and must be protected. Assets with this label are
considered need-to-know. Examples include
intellectual property and health or
payment information. For example, a growing
online retailer might mark internal emails about a new product as
confidential because those working on the new product
should know about it. They might also
label the doors at their offices with
the restricted sign to keep everyone out who doesn’t have a specific reason
to be in there. These are just a couple of
everyday examples that you may be familiar with from
your prior experience. For the most part, classification
determines whether an asset can be disclosed,
altered, or destroyed. Asset management is a
continuous process, one that helps uncover unexpected gaps in security
for potential risks. Keeping track of all
that’s important to a organization is an essential
part of security planning.
Fill in the blank: _____ assets are often highly sensitive and considered need-to-know.
Restricted
Restricted assets are often highly sensitive and considered need-to-know.
Reading: Common classification requirements
Reading
Asset management is the process of tracking assets and the risks that affect them. The idea behind this process is simple: you can only protect what you know you have.
Previously, you learned that identifying, tracking, and classifying assets are all important parts of asset management. In this reading, you’ll learn more about the purpose and benefits of asset classification, including common classification levels.
Why asset management matters
Keeping assets safe requires a workable system that helps businesses operate smoothly. Setting these systems up requires having detailed knowledge of the assets in an environment. For example, a bank needs to have money available each day to serve its customers. Equipment, devices, and processes need to be in place to ensure that money is available and secure from unauthorized access.
Organizations protect a variety of different assets. Some examples might include:
- Digital assets such as customer data or financial records.
- Information systems that process data, like networks or software.
- Physical assets which can include facilities, equipment, or supplies.
- Intangible assets such as brand reputation or intellectual property.
Regardless of its type, every asset should be classified and accounted for. As you may recall, asset classification is the practice of labeling assets based on sensitivity and importance to an organization. Determining each of those two factors varies, but the sensitivity and importance of an asset typically requires knowing the following:
- What you have
- Where it is
- Who owns it, and
- How important it is
An organization that classifies its assets does so based on these characteristics. Doing so helps them determine the sensitivity and value of an asset.
Common asset classifications
Asset classification helps organizations implement an effective risk management strategy. It also helps them prioritize security resources, reduce IT costs, and stay in compliance with legal regulations.
The most common classification scheme is: restricted, confidential, internal-only, and public.
- Restricted is the highest level. This category is reserved for incredibly sensitive assets, like need-to-know information.
- Confidential refers to assets whose disclosure may lead to a significant negative impact on an organization.
- Internal-only describes assets that are available to employees and business partners.
- Public is the lowest level of classification. These assets have no negative consequences to the organization if they’re released.
How this scheme is applied depends greatly on the characteristics of an asset. It might surprise you to learn that identifying an asset’s owner is sometimes the most complicated characteristic to determine.
Note: Although many organizations adopt this classification scheme, there can be variability at the highest levels. For example, government organizations label their most sensitive assets as confidential instead of restricted.
Challenges of classifying information
Identifying the owner of certain assets is straightforward, like the owner of a building. Other types of assets can be trickier to identify. This is especially true when it comes to information.
For example, a business might issue a laptop to one of its employees to allow them to work remotely. You might assume the business is the asset owner in this situation. But, what if the employee uses the laptop for personal matters, like storing their photos?
Ownership is just one characteristic that makes classifying information a challenge. Another concern is that information can have multiple classification values at the same time. For example, consider a letter addressed to you in the mail. The letter contains some public information that’s okay to share, like your name. It also contains fairly confidential pieces of information that you’d rather only be available to certain people, like your address. You’ll learn more about how these challenges are addressed as you continue through the program.
Key takeaways
Every business is different. Each business will have specific requirements to address when devising their security strategy. Knowing why and how businesses classify their assets is an important skill to have as a security professional. Information is one of the most important assets in the world. As a cybersecurity professional, you will be closely involved with protecting information from damage, disclosure, and misuse. Recognizing the challenges that businesses face classifying this type of asset is a key to helping them solve their security needs.
Practice Quiz: Test your knowledge: Introduction to assets
What is a risk?
Anything that can impact the confidentiality, integrity, or availability of an asset
A risk is anything that can impact the confidentiality, integrity, or availability of an asset.
A security professional discovers a rogue access point on their company WiFi that is not managed by the networking team. The rogue device is altering and deleting sensitive records without authorization. What is the rogue device in this scenario?
Threat
The rogue device is a threat because it is negatively impacting the company’s assets.
A product team is storing customer survey data for a new project in a cloud drive. The data is only accessible to product team members while the project is in development. What is this data’s asset type?
Confidential
This data is confidential. Confidential assets such as this customer survey data can only be accessed by those working on a specific project.
What is the practice of labeling assets based on sensitivity and importance to an organization?
Asset classification
Asset classification is the practice of labeling assets based on sensitivity and importance to an organization.
Practice Quiz: Activity: Classify the assets connected to a home network
Reading: Activity Exemplar: Classify the assets connected to a home network
Reading
Completed Exemplar
To review the exemplar for this course item, click the link and select Use Template.
Link to exemplar: Home asset inventory exemplar
Assessment of Exemplar
Compare the exemplar to your completed asset inventory. Review your work using each of the criteria in the exemplar. What did you do well? Where can you improve? Use your answers to these questions to guide you as you continue to progress through the course.
Note: The exemplar represents one possible way to complete the activity. Yours will likely differ in certain ways. What’s important is that your asset inventory lists the common characteristics of network connected devices and evaluates them based on their level of sensitivity.
The exemplar uses detail from the given scenario and adheres to the following guidelines:
- Identify 3 devices on the home network
- List network access, owner, and location details for each device
- Include 1–2 notes on network access
- Classify each asset based on level of sensitivity
The exemplar only lists devices with network access because that fits within the scope of this scenario. However, asset inventories might include non-network devices. For example, a homeowner might also keep track of physical assets like a safe or digital assets like family videos.
Classifying assets based on their level of importance can be subjective. Much of asset classification depends on identifying an asset’s owner, their location, and other important characteristics. This information should be evaluated before determining who should have access to an asset and what they are authorized to do. Remember, classification helps determine the level of impact an asset can have on a business if it were disclosed, altered, or destroyed.
Key Takeaways
Having an inventory of devices on your home network is a useful way to protect your personal assets. It’s also a useful artifact that you can show to prospective employers when interviewing for security analyst positions. Resources like this demonstrate your security mindset and ability to think critically about asset vulnerabilities.
Digital and physical assets
Video: Assets in a digital world
The passage discusses the importance of security in protecting organizational assets, particularly focusing on the value of information, often in digital form or data. It introduces the three states of data: in use, in transit, and at rest, emphasizing the significance of safeguarding data in each state. The text highlights that weak information security can lead to serious consequences such as identity theft and financial loss. It also notes the evolving nature of data at rest, with increasing reliance on cloud storage. The conclusion emphasizes the need to adapt to the changing digital landscape and underscores the importance of understanding where data is and what it’s doing for effective security management.
Welcome back! We’ve covered
a lot of information so far. I hope you’re having as much fun exploring the role
of security as I am! We’ve explored what
organizational assets are and why they
need protection. You’ve also gotten a sense of the tremendous amount of
assets security teams protect. Previously, we began examining security
asset management and the importance of
keeping track of everything that’s important
to an organization. Security teams classify
assets based on value. Next, let’s expand our security mindset and
think about this question. What exactly is valuable
about an asset? These days, the answer
is often information. Most information is
in a digital form. We call this data. Data is information
that is translated, processed, or stored
by a computer. We live in a connected world. Billions of devices around
the world are linked to the internet and are exchanging data with each
other all the time. In fact, millions of pieces of data are being passed to
your device right now! When compared to
physical assets, digital assets have
additional challenges. What you need to understand
is that protecting data depends on where that data
is and what it’s doing. Security teams protect data in three different states: in use, in transit, and at rest. Let’s investigate this
idea in greater detail. Data in use is data being
accessed by one or more users. Imagine being at a
park with your laptop. It’s a nice sunny day, and you stop at a bench to
check your email. This is an example
of data in use. As soon as you log in, your inbox is considered
to be in use. Next, is data in transit. Data in transit is data
traveling from one point to another. While you’re
signed into your account, a message from one of
your friends appears. They sent you an
interesting article about the growing
security industry. You decide to reply, thanking them for
sending this to you. When you click send, this is now an example
of data in transit. Finally, there’s data at rest. Data at rest is data not
currently being accessed. In this state, data is typically stored on a physical device. An example of data at
rest would be when you finish checking your email
and close your laptop. You then decide to pack up and go to a nearby
cafe for breakfast. As you make your way from
the park towards the cafe, the data in your
laptop is at rest. So now that we understand
these states of data, let’s connect this back
to asset management. Earlier, I mentioned that
information is one of the most valuable assets
that companies can have. Information security,
or InfoSec, is the practice of keeping data in all states away from
unauthorized users. Weak information security
is a serious problem. It can lead to things
like identity theft, financial loss, and
reputational damage. These events have potential
to harm organizations, their partners, and
their customers. And there’s more to consider in your work as a security analyst. As our digital world
continually changes, we are adapting our
understanding of data at rest. Physical devices like
our smartphones more commonly store
data in the cloud, meaning that our information
isn’t necessarily at rest just because our phone
is resting on a table. We should always be mindful of new vulnerabilities as our world becomes increasingly connected. Remember, protecting data depends on where the data
is and what it’s doing. Keeping track of information
is part of the puzzle that companies solve when considering their security plan. Understanding the
three states of data enable security teams to analyze risk and determine an asset management plan
for different situations.
The only type of data that security teams must protect is data in use.
False
Security teams are responsible for protecting data in all states: in use, in transit, and at rest.
Reading: The emergence of cloud security
Reading
One of the most significant technology developments this century has been the emergence of cloud computing. The United Kingdom’s National Cyber Security Centre defines cloud computing as, “An on-demand, massively scalable service, hosted on shared infrastructure, accessible via the internet.”
Earlier, you learned that most information is in the form of data, which is in a constant state of change. In recent years, businesses started moving their data to the cloud. The adoption of cloud-based services has complicated how information is kept safe online. In this reading, you’ll learn about these challenges and the opportunities they’ve created for security professionals.
Soaring into the cloud
Starting an online business used to be a complicated and costly process. In years past, companies had to build and maintain their own internal solutions to operate in the digital marketplace. Now, it’s much easier for anyone to participate because of the cloud.
The availability of cloud technologies has drastically changed how businesses operate online. These new tools allow companies to scale and adapt quickly while also lowering their costs. Despite these benefits, the shift to cloud-based services has also introduced a range of new cybersecurity challenges that put assets at risk.
Cloud-based services
The term cloud-based services refers to a variety of on demand or web-based business solutions. Depending on a company’s needs and budget, services can range from website hosting, to application development environments, to entire back-end infrastructure.
There are three main categories of cloud-based services:
- Software as a service (SaaS)
- Platform as a service (PaaS)
- Infrastructure as a service (IaaS)
Software as a service (SaaS)
SaaS refers to front-end applications that users access via a web browser. The service providers host, manage, and maintain all of the back-end systems for those applications. Common examples of SaaS services include applications like Gmail™ email service, Slack, and Zoom software.
Platform as a service (PaaS)
PaaS refers to back-end application development tools that clients can access online. Developers use these resources to write code and build, manage, and deploy their own apps. Meanwhile, the cloud service providers host and maintain the back-end hardware and software that the apps use to operate. Some examples of PaaS services include Google App Engine™ platform, Heroku®, and VMware Cloud Foundry.
Infrastructure as a service (IaaS)
IaaS customers are given remote access to a range of back-end systems that are hosted by the cloud service provider. This includes data processing servers, storage, networking resources, and more. Resources are commonly licensed as needed, making it a cost-effective alternative to buying and maintaining on premises.
Cloud-based services allow companies to connect with their customers, employees, and business partners over the internet. Some of the largest organizations in the world offer cloud-based services:
- Google Cloud Platform
- Microsoft Azure
Cloud security
Shifting applications and infrastructure over to the cloud can make it easier to operate an online business. It can also complicate keeping data private and safe. Cloud security is a growing subfield of cybersecurity that specifically focuses on the protection of data, applications, and infrastructure in the cloud.
In a traditional model, organizations had their entire IT infrastructure on premises. Protecting those systems was entirely up to the internal security team in that environment. These responsibilities are not so clearly defined when part or all of an operational environment is in the cloud.
For example, a PaaS client pays to access the resources they need to build their applications. So, it is reasonable to expect them to be responsible for securing the apps they build. On the other hand, the responsibility for maintaining the security of the servers they are accessing should belong to the cloud service provider because there are other clients using the same systems.
In cloud security, this concept is known as the shared responsibility model. Clients are commonly responsible for securing anything that is directly within their control:
- Identity and access management
- Resource configuration
- Data handling
Note: The amount of responsibility that is delegated to a service provider varies depending on the service being used: SaaS, PaaS, and IaaS.
Cloud security challenges
All service providers do their best to deliver secure products to their customers. Much of their success depends on preventing breaches and how well they can protect sensitive information. However, since data is stored in the cloud and accessed over the internet, several challenges arise:
- Misconfiguration is one of the biggest concerns. Customers of cloud-based services are responsible for configuring their own security environment. Oftentimes, they use out-of-the-box configurations that fail to address their specific security objectives.
- Cloud-native breaches are more likely to occur due to misconfigured services.
- Monitoring access might be difficult depending on the client and level of service.
- Meeting regulatory standards is also a concern, particularly in industries that are required by law to follow specific requirements such as HIPAA, PCI DSS, and GDPR.
Many other challenges exist besides these. As more businesses adopt cloud-based services, there’s a growing need for cloud security professionals to meet a growing number of risks. Burning Glass, a leading labor market analytics firm, ranks cloud security among the most in-demand skills in cybersecurity.
Key takeaways
So much of the global marketplace has shifted to cloud-based services. Cloud technology is still new, resulting in the emergence of new security models and a range of security challenges. And it’s likely that other concerns might arise as more businesses become reliant on the cloud. Being familiar with the cloud and the different services that are available is an important step towards supporting any organizations efforts to protect information online.
Resources for more information
Cloud security is one of the fastest growing subfields of cybersecurity. There are a variety of resources available online to learn more about this specialized topic.
- The U.K.’s National Cyber Security Centre has a detailed guide for choosing, using, and deploying cloud services securely based on the shared responsibility model.
- The Cloud Security Alliance® is an organization dedicated to creating secure cloud environments. They offer access to cloud security-specific research, certification, and products to users with a paid membership.
- CompTIA Cloud+ is a certificate program designed to teach you the foundational skills needed to become a cloud security specialist.
Practice Quiz: Test your knowledge: Digital and physical assets
What is the practice of keeping data in all states away from unauthorized users?
Information security
An employee is promoted to a new role, so their workstation is transferred to a different office. As the employee’s workstation is being relocated, what data state are its files in?
At rest
The files are at rest. Data is at rest when it is not being accessed. In this scenario, moving the workstation does not change the data state.
What is an example of data in transit?
A sent email is traveling over the network to reach its destination.
An email traveling over a network to its destination is an example of data in transit.
Fill in the blank: Data is in use when it is being _____ by one or more users.
accessed
Data is in use when it is being accessed by one or more users.
Risk and asset security
Video: Elements of a security plan
Security is about people, processes, and technology. It requires everyone in the organization to participate, from employees to vendors to customers. Security plans are essential for preparing for risks and ensuring everyone is aligned.
Three key elements of security plans:
- Policies: Set of rules to reduce risk and protect information. They address strategic questions like “what are we protecting and why?”
- Standards: Reference points for how well assets are being protected. They inform policy creation.
- Procedures: Step-by-step instructions for specific security tasks. They ensure accountability, consistency, and efficiency across the organization.
Security plans are tailored to each organization’s goals. Understanding their structure and the roles of policies, standards, and procedures is crucial for effective security implementation.
Elements of a Security Plan in Cybersecurity
In the ever-evolving digital landscape, where cyber threats are constantly on the rise, having a robust security plan is no longer a luxury, it’s a necessity. A well-defined security plan acts as a roadmap, guiding your organization in identifying, mitigating, and responding to cyber threats. It’s not simply a document, but a dynamic framework that requires continuous improvement and adaptation.
What is a Security Plan?
A security plan is a comprehensive document that outlines the strategies and procedures your organization will implement to protect its critical assets, including data, systems, and applications. It should be tailored to your specific needs and risk profile, and address all aspects of your security posture, from access control and incident response to risk assessment and employee training.
Essential Elements of a Security Plan:
1. Policies:
- Purpose: Policies serve as the foundation of your security plan, outlining the overall principles and expectations for cybersecurity within your organization.
- Key components: Acceptable Use Policy (AUP), Data Protection Policy, Password Policy, Incident Response Policy, etc.
- Example: An acceptable use policy (AUP) defines the permitted and prohibited activities for users accessing your organization’s resources, such as email, internet usage, and data handling.
2. Standards:
- Purpose: Standards provide specific technical specifications and guidelines for implementing your security policies. They ensure consistency and effectiveness in your security controls.
- Key components: Password complexity standards, encryption standards, data classification standards, etc.
- Example: The National Institute of Standards and Technology (NIST) publishes security standards and guidelines that organizations can adopt, such as NIST Special Publication 800-53 for security controls.
3. Procedures:
- Purpose: Procedures provide step-by-step instructions for performing specific security tasks and responding to incidents. They ensure clear and consistent execution of security measures.
- Key components: Procedures for incident reporting, password reset, data backup, system access control, etc.
- Example: A procedure for incident reporting should detail the steps employees should take if they suspect a security breach, including who to contact and what information to provide.
4. Risk Assessment:
- Purpose: Regularly evaluating your security posture and identifying potential risks is crucial for prioritizing your resources and focusing your efforts on the most critical areas.
- Key components: Identifying assets, vulnerabilities, threats, and potential impacts.
- Example: Conducting a penetration test can help you identify vulnerabilities in your systems and applications before attackers exploit them.
5. Incident Response:
- Purpose: Having a well-defined incident response plan ensures you are prepared to react quickly and effectively to security breaches. It minimizes damage and restores operations as quickly as possible.
- Key components: Defining roles and responsibilities, communication protocols, containment and eradication procedures, post-incident review and analysis.
- Example: An incident response plan should outline the steps to be taken in case of a data breach, such as isolating the affected systems, notifying relevant authorities, and communicating with impacted individuals.
6. Training and Awareness:
- Purpose: Educating your employees about cybersecurity best practices is essential for reducing human error and promoting a culture of security within your organization.
- Key components: Training on phishing awareness, password hygiene, data security, and incident reporting.
- Example: Conducting regular phishing simulations can help employees identify and avoid malicious emails.
Additional Considerations:
- Compliance Requirements: Ensure your security plan adheres to any relevant industry regulations or compliance requirements.
- Continuous Improvement: Regularly review and update your security plan to adapt to changes in your organization and the evolving threat landscape.
- Testing and Validation: Regularly test your security controls and procedures to identify and address any weaknesses.
- Communication and Collaboration: Foster open communication and collaboration across all levels of your organization to promote security awareness and ensure everyone is on the same page.
Conclusion:
By implementing a robust security plan with these essential elements, you can significantly improve your organization’s security posture and proactively protect your critical assets from cyber threats. Remember, security is an ongoing process, not a one-time event. By continuously monitoring, evaluating, and improving your security plan, you can ensure your organization remains resilient in the face of ever-evolving cyber threats.
Security is all about people,
processes, and technology. It’s a team effort, and
I mean that literally. Protecting assets extends
well beyond one person or a group of people in an IT department. The truth of the matter is
that security is a culture. It’s a shared set of values that
spans all levels of an organization. These values touch everyone, from
employees, to vendors, to customers. Protecting digital and physical assets
requires everyone to participate, which can be a challenge. That’s what security plans are for! Plans come in many shapes and sizes, but
they all share a common goal: to be prepared for risks when they happen. Placing the focus on people is what leads
to the most effective security plans. Considering the diverse backgrounds and
perspectives of everyone involved ensures that no one is left out
when something goes wrong. We talked earlier about the risk
as being anything that can impact the confidentiality, integrity,
or availability of an asset. Most security plans address
risks by breaking them down according to categories and factors. Some common risk categories might include,
the damage, disclosure, or loss of information. Any of these can be due to factors
like the physical damage or malfunctions of a device. There are also factors like attacks and
human error. For example, a new school teacher may be
asked to sign a contract before their first day of class. The agreement may warn against some
common risks associated with human error, like using a personal email to
send sensitive information. A security plan may require that all
new hires sign off on this agreement, effectively spreading the values
that ensure everyone’s in alignment. This is just one example of the types and
causes of risk that a plan might address. These things vary widely
depending on the company. But how these plans are communicated
is similar across industries. Security plans consist of three
basic elements: policies, standards, and procedures. These three elements are how
companies share their security plans. These words tend to be used
interchangeably outside of security, but you’ll soon discover that they each
have a very specific meaning and function in this context. A policy in security is a set of rules
that reduce risk and protects information. Policies are the foundation
of every security plan. They give everyone in and out of
an organization guidance by addressing questions like,
what are we protecting and why? Policies focus on the strategic side
of things by identifying the scope, objectives, and
limitations of a security plan. For instance,
newly hired employees at many companies are required to sign off on
acceptable use policy, or AUP. These provisions outline secure ways
that an employee may access corporate systems. Standards are the next part. These have a tactical function, as they
concern how well we’re protecting assets. In security, standards are references
that inform how to set policies. A good way to think of standards is
that they create a point of reference. For example, many companies use the
password management standard identified in NIST Special Publication 800-63B
to improve their security policies by specifying that employees’ passwords
must be at least eight characters long. The last part of a plan is its procedures. Procedures are step-by-step instructions
to perform a specific security task. Organizations usually keep multiple
procedure documents that are used throughout the company, like how
employees can choose secure passwords, or how they can securely reset
a password if it’s been locked. Sharing clear and actionable procedures
with everyone creates accountability, consistency, and
efficiency across an organization. Policies, standards, and
procedures vary widely from one company to another because they are tailored
to each organization’s goals. Simply understanding the structure
of security plans is a great start. For now, I hope you have a clearer
picture of what policies, standards, and procedures are, and how they are essential
to making security a team effort.
What primary elements do security plans include? Select three answers.
Policies, Standards, Procedures
Security plans include three basic elements: policies, standards, and procedures. Policies are a set of rules that reduce risk and protect information. Standards are references that inform how to set policies. Procedures are step-by-step instructions for performing a security task.
Video: The NIST Cybersecurity Framework
Compliance is the process of adhering to internal standards and external regulations, ensuring data security and protecting reputation. It’s crucial for businesses to avoid fines, penalties, and lawsuits, especially in highly regulated industries.
NIST Cybersecurity Framework (CSF):
- Voluntary framework: Provides standards, guidelines, and best practices for managing cybersecurity risk.
- 3 main components:
- Core: Five functions: Identify, Protect, Detect, Respond, Recover.
- Tiers: Measure performance across each core function (Level 1: passive, Level 4: adaptive).
- Profiles: Provide insight into the current state of a security plan.
Benefits of CSF:
- Helps businesses secure information assets.
- Shows commitment to data security and customer trust.
- Provides a roadmap for continuous improvement.
Next steps:
Focus on the Protect function of the CSF.
Understanding the NIST Cybersecurity Framework
The National Institute of Standards and Technology (NIST) Cybersecurity Framework is a voluntary framework that helps organizations manage and reduce cybersecurity risks. It provides a common language and approach for organizations to assess their cybersecurity posture, identify and prioritize risks, and implement appropriate safeguards.
Why is the NIST Cybersecurity Framework Important?
In today’s digital world, cybersecurity threats are constantly evolving. Organizations of all sizes need a comprehensive approach to managing cybersecurity risks. The NIST Cybersecurity Framework provides a proven framework that can be used by any organization, regardless of size or industry.
The Five Core Functions of the NIST Cybersecurity Framework
The NIST Cybersecurity Framework is organized around five core functions:
- Identify: Identify and prioritize assets and understand the potential threats they face.
- Protect: Protect assets from unauthorized access, use, disclosure, disruption, modification, or destruction.
- Detect: Detect security events as early as possible.
- Respond: Respond to security events quickly and effectively.
- Recover: Recover from security events and restore normal operations.
The Three Tiers of the NIST Cybersecurity Framework
The NIST Cybersecurity Framework also defines three tiers of maturity:
- Tier 1 – Partial: Organizations in Tier 1 have taken some steps to manage cybersecurity risks, but they have not fully implemented all of the necessary controls.
- Tier 2 – Risk-Informed: Organizations in Tier 2 have a more mature cybersecurity program and have implemented controls based on their risk assessment.
- Tier 3 – Repeatable: Organizations in Tier 3 have a highly mature cybersecurity program and can proactively identify and address threats.
The Five Profiles of the NIST Cybersecurity Framework
The NIST Cybersecurity Framework also defines five profiles:
- Basic: This profile is designed for organizations with a low-risk profile.
- Targeted: This profile is designed for organizations with a moderate-risk profile.
- Informative: This profile is designed for organizations with a high-risk profile.
- Risk-Managed: This profile is designed for organizations that are required to comply with specific regulations.
- Adaptive: This profile is designed for organizations that are constantly evolving and changing.
How to Get Started with the NIST Cybersecurity Framework
The NIST Cybersecurity Framework website provides a wealth of resources to help organizations get started, including:
- Getting Started Guide: This guide provides an overview of the framework and how to get started.
- Framework Reference: This document provides detailed information on each of the framework’s components.
- Implementation Guides: These guides provide specific guidance on how to implement the framework in different industries and sectors.
- Case Studies: These case studies illustrate how organizations are using the framework to improve their cybersecurity posture.
Additional Resources
- The NIST Cybersecurity Framework website: https://www.nist.gov/cyberframework
- The NIST Cybersecurity Framework Quick Start Guide: https://www.nist.gov/cyberframework/getting-started/quick-start-guide
- The NIST Cybersecurity Framework Implementation Guides: https://www.nist.gov/cyberframework/getting-started
Conclusion
The NIST Cybersecurity Framework is a valuable tool that can help organizations manage and reduce cybersecurity risks. By following the framework’s guidance, organizations can improve their cybersecurity posture and protect their critical assets.
Next Steps
- Download the NIST Cybersecurity Framework and review the core functions, tiers, and profiles.
- Assess your organization’s current cybersecurity posture.
- Develop a plan to implement the NIST Cybersecurity Framework in your organization.
- Seek help from a qualified cybersecurity professional if needed.
By taking these steps, you can start to improve your organization’s cybersecurity posture and protect your assets from cyber threats.
Having a plan is just one
part of securing assets. Once the plan is in action, the other
part is making sure everyone’s following along. In security, we call this compliance. Compliance is the process of
adhering to internal standards and external regulations. Small companies and large organizations
around the world place security compliance at the top of their list of priorities. At a high-level, maintaining trust,
reputation, safety, and the integrity of your data are just a few
reasons to be concerned about compliance. Fines, penalties, and
lawsuits are other reasons. This is particularly true for companies in highly regulated industries,
like health care, energy, and finance. Being out of compliance with
a regulation can cause long lasting financial and reputational effects that
can seriously impact a business. Regulations are rules
set by a government or other authority to control
the way something is done. Like policies,
regulations exist to protect people and their information, but on a larger scale. Compliance can be a complex process
because of the many regulations that exist all around the world. For our purpose, we’re going to focus
on a framework of security compliance, the U.S. based NIST Cybersecurity Framework. Earlier in the program, you learned
the National Institute of Standards and Technology, or NIST. One of the primary roles of NIST is to
openly provide companies with a set of frameworks and security standards that
reflect key security related regulations. The NIST Cybersecurity Framework
is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.
Commonly known as the CSF, this framework was developed to help
businesses secure one of their most important assets, information. The CSF consists of three main components:
the core, it’s tiers, and it’s profiles. Let’s explore each of these together to build a better understanding
of how NIST’s CSF is used. The core is basically a simplified
version of the functions, or duties, of a security plan. The CSF core identifies five
broad functions: identify, protect, detect, respond, and recover. Think of these categories of
the core as a security checklist. After the core, the next NIST
component we’ll discuss is its tiers. These provide security
teams with a way to measure performance across each of
the five functions of the core. Tiers range from Level-1 to Level-4. Level-1, or passive, indicates a function
is reaching bare minimum standards. Level-4, or adaptive, is an indication that a function
is being performed at an exemplary standard. You may have noticed that CSF tiers
aren’t a yes or no proposition; instead, there’s a range of values. That’s because tiers are designed as
a way of showing organizations what is and isn’t working with their security plans. Lastly, profiles are the final
component of CSF. These provide insight into
the current state of a security plan. One way to think of profiles is like
photos capturing a moment in time. Comparing photos of the same
subject taken at different times can provide useful insights. For example, without these photos, you
might not notice how this tree has changed. It’s the same
with NIST profiles. Good security practice is about
more than avoiding fines and attacks. It demonstrates that you care
about people and their information. Before we go, let’s visit the core’s
functions one more time to look at where we’ve been and where we’re going. The first function is identify.
Our previous discussions on asset management and
risk assessment relates to that function. Coming up, we’re going to focus on many
of the categories of the second function, the protect function.
Meet you there!
"Identify" and "Detect" are two of the five NIST Cybersecurity Framework (CSF) core functions. What are the other three? Select all that apply.
Protect, Respond, Recover
The five NIST Cybersecurity Framework (CSF) core functions are identify, protect, detect, respond, and recover. The core is a simplified version of the functions or duties of a security plan. Think of these functions as a checklist for reducing security risk.
Reading: Security guidelines in action
Reading
Organizations often face an overwhelming amount of risk. Developing a security plan from the beginning that addresses all risk can be challenging. This makes security frameworks a useful option.
Previously, you learned about the NIST Cybersecurity Framework (CSF). A major benefit of the CSF is that it’s flexible and can be applied to any industry. In this reading, you’ll explore how the NIST CSF can be implemented.
Origins of the framework
Originally released in 2014, NIST developed the Cybersecurity Framework to protect critical infrastructure in the United States. NIST was selected to develop the CSF because they are an unbiased source of scientific data and practices. NIST eventually adapted the CSF to fit the needs of businesses in the public and private sector. Their goal was to make the framework more flexible, making it easier to adopt for small businesses or anyone else that might lack the resources to develop their own security plans.
Components of the CSF
As you might recall, the framework consists of three main components: the core, tiers, and profiles. In the following sections, you’ll learn more about each of these CSF components.
Core
The CSF core is a set of desired cybersecurity outcomes that help organizations customize their security plan. It consists of five functions, or parts: Identify, Protect, Detect, Respond, and Recover. These functions are commonly used as an informative reference to help organizations identify their most important assets and protect those assets with appropriate safeguards. The CSF core is also used to understand ways to detect attacks and develop response and recovery plans should an attack happen.
Tiers
The CSF tiers are a way of measuring the sophistication of an organization’s cybersecurity program. CSF tiers are measured on a scale of 1 to 4. Tier 1 is the lowest score, indicating that a limited set of security controls have been implemented. Overall, CSF tiers are used to assess an organization’s security posture and identify areas for improvement.
Profiles
The CSF profiles are pre-made templates of the NIST CSF that are developed by a team of industry experts. CSF profiles are tailored to address the specific risks of an organization or industry. They are used to help organizations develop a baseline for their cybersecurity plans, or as a way of comparing their current cybersecurity posture to a specific industry standard.
Note: The core, tiers, and profiles were each designed to help any business improve their security operations. Although there are only three components, the entire framework consists of a complex system of subcategories and processes.
Implementing the CSF
As you might recall, compliance is an important concept in security. Compliance is the process of adhering to internal standards and external regulations. In other words, compliance is a way of measuring how well an organization is protecting their assets. The NIST Cybersecurity Framework (CSF) is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk. Organizations may choose to use the CSF to achieve compliance with a variety of regulations.
Note: Regulations are rules that must be followed, while frameworks are resources you can choose to use.
Since its creation, many businesses have used the NIST CSF. However, CSF can be a challenge to implement due to its high level of detail. It can also be tough to find where the framework fits in. For example, some businesses have established security plans, making it unclear how CSF can benefit them. Alternatively, some businesses might be in the early stages of building their plans and need a place to start.
In any scenario, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) provides detailed guidance that any organization can use to implement the CSF. This is a quick overview and summary of their recommendations:
- Create a current profile of the security operations and outline the specific needs of your business.
- Perform a risk assessment to identify which of your current operations are meeting business and regulatory standards.
- Analyze and prioritize existing gaps in security operations that place the businesses assets at risk.
- Implement a plan of action to achieve your organization’s goals and objectives.
Pro tip: Always consider current risk, threat, and vulnerability trends when using the NIST CSF.
You can learn more about implementing the CSF in this report by CISA that outlines how the framework was applied in the commercial facilities sector.
Industries embracing the CSF
The NIST CSF has continued to evolve since its introduction in 2014. Its design is influenced by the standards and best practices of some of the largest companies in the world.
A benefit of the framework is that it aligns with the security practices of many organizations across the global economy. It also helps with regulatory compliance that might be shared by business partners.
Key takeaways
The NIST CSF is a flexible resource that organizations may choose to use to assess and improve their security posture. It’s a useful framework that combines the security best practices of industries around the world. Implementing the CSF can be a challenge for any organization. The CSF can help business meet regulatory compliance requirements to avoid financial and reputational risks.
Practice Quiz: Test your knowledge: Risk and asset security
What types of risks do security plans address? Select three answers.
Loss of information, Damage to assets, Disclosure of data
Security plans address risks such as damage to assets, loss of information, and disclosure of data.
What are the basic elements of a security plan? Select three answers.
Standards, Procedures, Policies
The basic elements of a security plan are policies, standards, and procedures. Policies are rules that reduce risk and protect information. Standards are references that inform how to set policies. And procedures are step-by-step instructions to perform a specific security task.
Fill in the blank: The NIST CSF is a _____ framework that consists of standards, guidelines, and best practices to manage cybersecurity risk.
voluntary
The NIST CSF is a voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk. It is a comprehensive framework with a flexible design that can be used in any industry.
What are some benefits of the NIST Cybersecurity Framework (CSF)? Select three answers.
- It’s adaptable to fit the needs of any business.
- It can be used to identify and assess risk.
- It helps organizations achieve regulatory standards.
Some benefits of the CSF are that it’s adaptable to fit the needs of any business, it helps organizations achieve regulatory standards, and it can be used to identify and assess risk.
Practice Quiz: Activity: Score risks based on their likelihood and severity
Reading: Activity Exemplar: Score risks based on their likelihood and severity
Reading
Completed Exemplar
To review the exemplar for this course item, click the following link and select Use Template.
Link to exemplar: Risk register
Assessment of Exemplar
Compare the exemplar to your completed activity. Review your work using each of the criteria in the exemplar. What did you do well? Where can you improve? Use your answers to these questions to guide you as you continue to progress through the course.
Note: The exemplar represents one possible way to complete the activity. Yours will likely differ in certain ways. What’s important is that you’ve considered how likelihood and impact affect how organizations approach risk management.
Next, you can review the results of a completed risk register:
Notes
Some risk factors to have considered might have been the number of other companies that interact with the bank. These sources of risk might introduce incidents beyond the bank’s control. Also, the risk of theft is important to consider because of the number of customers and the operational impact it could have to the business.
Likelihood
A range of likelihood scores were estimated based on factors that could lead to a security incident. Each risk was scored as a 1, 2, or 3 on a risk matrix, meaning the chances of occurring were rare, likely, or certain. A supply chain attack caused by natural disaster was scored with a 1, meaning it was regarded as unlikely due to the unpredictability of those events. On the other hand, compromised data events were scored a 2 because they are likely to occur given the possible causes.
Severity
No risk received a severity score less than 2 because risks that involve data breaches such as business email compromise, can have serious consequences. Customers at a bank trust the businesses to protect their money and personal information. Also, the bank’s operations could be terminated if they fail to comply with regulations.
Priority
A financial records leak received the highest overall risk score of 9. This indicates that this risk is almost certain to happen and would greatly impact the bank’s ability to operate. Such a high overall score signals the security team to prioritize remediating, or resolving any issues related to that risk before moving on to risks that scored lower.
Key takeaways
Risk assessments are useful for identifying risks to an organization’s information, networks and systems. Security plans can benefit from regular risk assessments as a way of highlighting important concerns that should be addressed. Additionally, these assessments help keep track of any changes that can occur in an organization’s operating environment.
Review: Introduction to asset security
Video: Wrap-up
- Organizational risk management:
- Assets: Identifying and understanding critical assets.
- Threats: Recognizing potential security risks and their impact.
- Vulnerabilities: Identifying weaknesses that can be exploited.
- Asset inventories: Importance of knowing and tracking assets.
- Data protection in a changing digital world:
- Data in use, in transit, and at rest.
- Policies, standards, and procedures:
- Roles and importance in achieving security goals.
- NIST Cybersecurity Framework:
- Understanding its structure and benefits.
Conclusion:
- Continuous learning is crucial for cybersecurity practitioners.
- Attackers constantly evolve, requiring adaptation and improvement.
- Next step: Exploring systems used by security teams for asset protection.
Well done! You made it to
the end of this section! Being a security practitioner takes commitment
and a desire to learn. A big part of the job
involves keeping current with best practices and
emerging trends. Thinking back on my own journey into the world of security, I’m so proud of you for
your continued commitment. We’ve covered a lot of
material this week, and this is a good time to
reflect and look back on the key concepts
we explored together. We covered the
building blocks of organizational risk management: assets, threats, and
vulnerabilities. We also spent some
time demonstrating the importance of
asset inventories. It’s much easier to protect
company assets if you know where they are and
who’s responsible for them. After that, we
moved on to explore the challenges in a rapidly
changing digital world. Part of protecting
data in this world is understanding if it’s in use, in transit, or at rest. Finally, in our
high-level exploration of policies, standards, and procedures, we talked about how each of them factor into
achieving security goals. There’s no one-size-fits-all approach to
achieving security. While exploring the NIST
Cybersecurity Framework, you gained an
appreciation of how it supports good
security practices. Attackers are also constantly
building their skills and finding new ways to break through the defenses we put up. Remember, the landscape
is always changing. There’s always more
to learn if you want to be a good security
practitioner. Next up, we’re going to expand our security mindset
by learning more about the different systems
security teams use to protect
organizational assets. I’m looking forward to it!
Reading: Glossary terms from module 1
Terms and definitions from Course 5, Module 1
Asset: An item perceived as having value to an organization
Asset classification: The practice of labeling assets based on sensitivity and importance to an organization
Asset inventory: A catalog of assets that need to be protected
Asset management: The process of tracking assets and the risks that affect them
Compliance: The process of adhering to internal standards and external regulations
Data: Information that is translated, processed, or stored by a computer
Data at rest: Data not currently being accessed
Data in transit: Data traveling from one point to another
Data in use: Data being accessed by one or more users
Information security (InfoSec): The practice of keeping data in all states away from unauthorized users
National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF): A voluntary framework that consists of standards, guidelines, and best practices to manage cybersecurity risk
Policy: A set of rules that reduce risk and protect information
Procedures: Step-by-step instructions to perform a specific security task
Regulations: Rules set by a government or other authority to control the way something is done
Risk: Anything that can impact confidentiality, integrity, or availability of an asset
Standards: References that inform how to set policies
Threat: Any circumstance or event that can negatively impact assets
Vulnerability: A weakness that can be exploited by a threat
Quiz: Module 1 challenge
An employee who has access to company assets abuses their privileges by stealing information and selling it for personal gain. What does this scenario describe?
Threat
Which of the following are examples of security vulnerabilities? Select three answers.
Unattended laptop, Unlocked doors at a business, Weak password
Which of the following refers to the process of tracking assets and the risks that affect them?
Asset management
An employee is asked to email customers and request that they complete a satisfaction survey. The employee must be given access to confidential information in the company database to conduct the survey. What types of confidential customer information should the employee be able to access from the company’s database to do their job? Select two answers.
Customer names, E-mail addresses
Which of the following are examples of internal-only information? Select two answers.
Employee records, Business plans
Which of the following can be prevented with effective information security? Select three answers.
Identity theft, Reputational damage, Financial loss
What is an example of digital data at rest? Select two answers.
Email messages in an inbox, Files on a hard drive
Fill in the blank: Most security plans address risks by breaking them down into these categories: damage, disclosure, and _____.
loss of information
Which of the following are components of the NIST Cybersecurity Framework? Select three answers.
Core, Tiers, Profiles
Which component of the NIST Cybersecurity Framework (CSF) is used to measure the performance of a security plan?
Tiers