🔐 Simply Cyber Course Materials - Community Access Welcome! This content is shared with enrolled students as part of our commitment to inclusion and value delivery in cybersecurity education. We believe in supporting each other's learning journey through ethical collaboration. Please help us maintain this open educational environment by keeping this URL within our course community. Sharing this link publicly undermines our ability to freely provide these materials. Questions? Reach out to your instructor—we're here to support your success!

Table of Contents

Exam Objectives 📚

AKYLADE_CRF-002_Objectives_v1-1.pdf

AKYLADE_CRF-002_Objectives_v1-1.pdf

1.11 MBPDF File

Candidates must be able to understand the Framework Profiles as they relate to the NIST Cybersecurity Framework. Students will be able to:

4.1 Summarize how profiles are used to tailor the Framework for varying risk management strategies

  • Key components of a profile

    • Core functions

    • Categories

    • Subcategories

  • Utilizing profiles

  • Current profile versus target profile

  • Map profiles to an organization’s cybersecurity posture

4.2 Given a scenario, utilize a profile to tailor the NIST Cybersecurity Framework to specific organizational needs

  • Tailor profiles to support risk management strategies

  • Tailor profiles to support regulatory compliance requirements

  • Utilize profiles to measure an organization’s cybersecurity posture over time

  • Identify relevant core functions, categories, and subcategories

4.3 Explain the use of profiles in the Framework

  • Profile templates

  • Sector-specific profiles

    • Cyber Risk Institute (CRI) Profile

    • Manufacturing profile

    • Election infrastructure profile

    • Hybrid Satellite Network profile

    • Smart grid profile

    • Connected vehicle profile

    • Payroll profile

    • Maritime profile

    • Communications profile

Profiles 🛤️

Term

Definition

So What?

Profiles

An organization’s cybersecurity objectives, current state, and target state, providing a roadmap for aligning cybersecurity activities and priorities with the organization’s business requirements

🫵 Your customization and alignment of the framework to an organization’s unique needs, goals and risk management strategies is the key to how much value you can add

Framework Core

  • Building blocks for managing cybersecurity risks

What is the Framework Core and how is it used?
The Framework Core is a set of cybersecurity activities, desired outcomes, and applicable references that are common across critical infrastructure sectors. An example of Framework outcome language is, "physical devices and systems within the organization are inventoried."

The Core presents industry standards, guidelines, and practices in a manner that allows for communication of cybersecurity activities and outcomes across the organization from the executive level to the implementation/operations level. The Framework Core consists of five concurrent and continuous Functions—Identify, Protect, Detect, Respond, Recover. When considered together, these Functions provide a high-level, strategic view of the lifecycle of an organization's management of cybersecurity risk. The Framework Core then identifies underlying key Categories and Subcategories for each Function, and matches them with example Informative References, such as existing standards, guidelines, and practices for each Subcategory.

Selected Target Implementation Tier

What are Framework Implementation Tiers and how are they used?
Framework Implementation Tiers ("Tiers") provide context on how an organization views cybersecurity risk and the processes in place to manage that risk. Tiers describe the degree to which an organization's cybersecurity risk management practices exhibit the characteristics defined in the Framework (e.g., risk and threat aware, repeatable, and adaptive). The Tiers characterize an organization's practices over a range, from Partial (Tier 1) to Adaptive (Tier 4). These Tiers reflect a progression from informal, reactive responses to approaches that are agile and risk-informed. During the Tier selection process, an organization should consider its current risk management practices, threat environment, legal and regulatory requirements, business/mission objectives, and organizational constraints.

Are the Tiers equivalent to maturity levels?
The Framework Implementation Tiers are not intended to be maturity levels. The Tiers are intended to provide guidance to organizations on the interactions and coordination between cybersecurity risk management and operational risk management. The key tenet of the Tiers is to allow organizations to take stock of their current activities from an organization wide point of view and determine if the current integration of cybersecurity risk management practices is sufficient given their mission, regulatory requirements, and risk appetite. Progression to higher Tiers is encouraged when such a change would reduce cybersecurity risk and would be cost-effective.

Key Components of a Profile

  • The same as the CSF Core: Functions Categories Subcategories and activities

  • For each:

    • Determine relevance and priority that align to the the organization’s risk management objectives

    • Customize

Creating a Profile 🎨

Step 1: Identify Organizational Requirements and Objectives

  • Foundational step

  • Thoroughly assess the organization’s risk management objectives, industry-specific regulations, business priorities, and cybersecurity needs.

  • Identify the key drivers that shape the organization’s cybersecurity strategy, e.g.

    • Protecting sensitive data

    • Complying with regulatory requirements

    • Safeguarding critical infrastructure

Step 2: Evaluate the Framework Core

  • Stakeholder engagement is key

  • Identify the specific categories and subcategories that are most relevant to cyber resilience

  • Assess alignment and fit with the organization’s objectives and its risk management strategy

Step 3: Select and Prioritize Categories

  • No organization has enough time or money to focus on everything all of the time

  • Choices will have to be made

  • Prioritization is crticial

  • What are this organization’s unique cybersecurity challenges and focus areas?

  • Which categories will yield the highest return on security investment, to optimize cyber resilience?

Step 4: Define Subcategories and Activities

  • Within each selected category, define the specific subcategories and activities that will guide the organization’s cybersecurity efforts

  • These subcategories and activities provide a more granular level of detail and actionable steps to achieve the desired cybersecurity outcomes

  • Customize these subcategories and activities to align with the organization’s specific needs, resources, and risk landscape

Step 5: Establish Performance Goals and Metrics

  • Measure the effectiveness and progress of its cybersecurity practices

  • Take the time to define clear indicators

  • This helps to

    • Track improvements over time

    • Give management the data they need to make informed decisions about enhancing cybersecurity capabilities

Step 6: Document and Implement the Profile

  • By ensuring that the profile is well-documented, easily understood, and accessible to relevant stakeholders within your organization, you can more easily communicate the profile to the key personnel responsible for implementing and managing the organization’s cybersecurity program

  • During this step, it is also important to actually conduct the implementation of the profile by integrating the defined measures, controls, and practices into the organization’s cybersecurity operations

  • After the initial implementation is complete, it is important to periodically review and update the profile as the organization’s cybersecurity needs evolve over time

Profile Tailoring 🪡

Example Approaches for Limited Engagements

DETECT FUNCTION ONLY

  • 2 categories

  • 11 subcategories

GOVERNANCE.Cybersecurity Supply Chain Risk Management (GV.SC) Category Only

  • 10 subcategories

Example Short, Tailored Profile

CSF Category

CSF Description (NIST)

Profile Objective (Organization)

Identity Management, Authentication, and Access Control (PR.AA):

Access to physical and logical assets is limited to authorized users, services, and hardware and managed commensurate with the assessed risk of unauthorized access

Establish robust identity management, authentication, and access control measures to safeguard sensitive data in our certification exam systems

Awareness and Training (PR.AT):

The organization’s personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related

tasks

Enhance cybersecurity awareness and provide effective training to our personnel and users to mitigate the risk of unauthorized access and security incidents

CSF Subcategory

CSF Description (NIST)

Profile Subcategory (Organization)

PR.AA-03

Users, services, and hardware are authenticated

Users, services, and hardware are authenticated to ensure secure access to certification exam systems.

PR.AT-01

Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind

Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with the cybersecurity risks of the certification exam systems in mind.

Profile Templates 📄

Benefits

  • Consistency, efficiency, alignment with recognized cybersecurity best practices

  • Consistency across an organization or industry helps facilitate bench-marking, sharing of best practices and collaboration

Tips

  • Look for reputable sources like industry associations or government agencies, who have worked with a whole portfolio of organizations out in the field and learned from those experiences

  • Use as a starting point

Sections

Section

Description

Summary

Concise overview

Key objectives and focus areas

Framework Components

Functions, categories, and subcategories

Objectives

Desired outcomes to be achieved

Activities

To meet the profile objectives

Goals

To later assess the success and effectiveness of the profile implementation

Metrics

To measure progress and performance

Sector-Specific Profiles 🏭

Cyber Risk Institute (CRI) Profile

Manufacturing Profile

  • IT (Information Technology) networks

    • Manage and process data

    • Email, documents, spreadsheets, websites, file sharing

  • OT (Operational Technology) networks

    • Control and monitor physical processes, devices, and infrastructure in manufacturing

    • Includes Industrial Control Systems (ICS)

      • Supervisory Control and Data Acquisition (SCADA) systems

      • Distributed Control Systems

      • Programmable Logic Controllers (PLC)

IDENTIFY Function Example

CSF v1.1 Subcategory PR.AC-5 Example

CSF v1.1 Subcategory

CSF v2.0 Subcategory

PR.AC-05: Network integrity is protected

PR.IR-01: Networks and environments are protected from unauthorized logical access and usage

Election Infrastructure Profile

Hybrid Satellite Networks Profile

Smart Grid Profile

Connected Vehicle Profiles

Payroll Profile

Maritime Profile

Communications Profile

Profiles and Regulatory Compliance 🔍

Carefully assess requirements and map to CSF

  • While many industries have their own specific cybersecurity requirements and best practices that organizations must adhere to, customizing your CSF profile to include them ensures that your cybersecurity practices

    • Meet regulatory compliance

    • Adress the unique challenges and risks associated with their specific industry.

  • It establishes a structured and systematic approach to meeting compliance obligations.

Identify gaps

  • It helps identify gaps in current cybersecurity practices to then develop targeted plan to address

  • This approach enables organizations to demonstrate their commitment to regulatory compliance, enhance their security posture, and mitigate potential risks associated with non-compliance

Secure Once, Comply Many ✔️

Mastering Cyber Resilience, p. 147, AKYLADE

Benefits of this Compliance Architecture:

  • Remove guesswork

  • Simplify

  • Map all compliance requirements to outcomes

  • Check new mandates against current framework

  • Make it easier to operationalize the framework

  • Spend less time and money implementing controls

  • Get more consistent execution

HIPPA Requirement

CSF v2.0

ISO27001

164.308(a)(7)(ii)(A): Data Backup Plan

“[e]stablish and implement procedures to create and maintain retrievable exact copies of electronic protected health information”

PR.DS-11: backups of data are created, protected, maintained, and tested

A.12.3.1 Information backup

A.17.1.2 Information security continuity

A.17.1.3 Verification of continuity plans

A.18.1.3 Protection of records

Conclusion and Touchpoints

  • Profiles

  • Customizable Approach

  • Profile Templates

  • Sector-Specific Templates

  • Align Profiles with Regulatory Compliance

Keep Reading