Simplify US-CSF Information Security Compliance

The US Cyber Security Framework (CSF) is published by NIST as a framework for cyber security risk management. The CSF was designed to be a more manageable framework for private organizations than either NIST 800-53 or 800-171. It forms a foundation for the development and ongoing management of a cyber security program.

To effectively implement the NIST Cyber Security Framework organizations must develop, document and deliver and series of information security controls designed to protect information, people and systems.

Develop NIST-CSF Security Policies Quickly

Information Security Policies Made Easy

The NIST CSF requires a comprehensive set of written information security policies (ID Governance (GV-1) Organization information security policy is established)   Information Security Policies Made Easy provides complete security policy coverage for all key information security and data privacy elements of the US-CSF. Save time and money developing policies by customizing our library of over 40 expert-written information security policy templates, all mapped to the US-CSF using our Common Policy Library.  Don’t reinvent the wheel!  Our policy templates have been used by over 10,000 organization in 60 countries.

» Learn More  » Request a Sample

 

Streamline US-CSF Compliance

IT Security Made Easy

Use ComplianceShield to help automate every aspect of an Information Security and Data Privacy Program that addresses the NIST CSF.   Our easy-to-use software tool helps define, deliver and demonstrate a cyber security program that addresses key management controls in a fraction of the time of traditional systems.  Use our built-in CSF Control Baseline to define the elements of your program in minutes instead of weeks.  Once defined, ComplianceShield enables you to track, measure, verify and share results with third-parties.

» Learn More  » Request a Sample

 

CSF Required Information Security Policies

The US-CSF specifically requires a set of written information security policies to support cyber risk management.

ID Governance (GV-1) Organization information security policy is established

This core governance requirement translates into the need for a comprehensive set of written information security policies, standards and procedures that address each of the core areas of NIST-CSF.

Information Protection Processes and Procedures (PR.IP): Security policies (that address purpose, scope, roles, responsibilities, management commitment, and coordination among organizational entities), processes, and procedures are maintained and used to manage protection of information systems and assets.

Key Cyber Risk Management Areas of NIST CSF

Identify key Assets (ID.AM), Business Environmental Factors (ID.BE) and Cyber Security Risks (ID.RA) that define the overall risk environment.

Define a Governance Program (ID.GV) to develop the policies, procedures, and processes to manage and monitor the organization’s regulatory, legal, risk, environmental, and operational requirements.

Understand third-party risk via Supply Chain Risk Management (ID.SC)

Provision and Protect Access (PR-AC) for Systems (PR.PT and MA), Personnel (PR.AT) and Data (PR.DS)

Implement Security Continuous Monitoring (DE.CM), Detection Processes (DE.CM) and Detection of Anomalies and Events (DE.AE):

Develop Incident Response Plans (RS.RP), Communications (RS.CO) Analysis (RS.AN), Mitigation (RS.MI) and Improvements (RS.IM).

Develop and test Disaster Recovery Plans (RC.RP), Improvements (RC.IM) and Communications (RC.CO)

Enable Management Accountability

Compliance with the US-CSF requires a proactive approach to identify and respond to potential threats to data and systems.

Section (ID-GV) Governance.

The policies, procedures, and processes to manage and monitor the organization’s regulatory, legal, risk, environmental, and operational requirements are understood and inform the management of cybersecurity risk.

Our ComplianceShield solution enables your organization to quickly establish a baseline of cyber security controls that address all elements of US-CSF.  Once your program is established, using ComplianceShield to track accountability, compliance status and evidence.

Contact us today for a Free 30 Minute Consultation on how your organization can streamline and demonstrate US-CSF compliance.