ARTICLE
2 September 2013

NIST Issues Discussion Draft Of Preliminary Cybersecurity Framework

W
WilmerHale

Contributor

WilmerHale provides legal representation across a comprehensive range of practice areas critical to the success of its clients. With a staunch commitment to public service, the firm is a leader in pro bono representation. WilmerHale is 1,000 lawyers strong with 12 offices in the United States, Europe and Asia.
The National Institute of Standards and Technology has posted a discussion draft of the preliminary version of the voluntary federal cybersecurity standards NIST was directed to develop.
United States Privacy
To print this article, all you need is to be registered or login on Mondaq.com.

The National Institute of Standards and Technology ("NIST") has posted a discussion draft of the preliminary version of the voluntary federal cybersecurity standards NIST was directed to develop under the executive order on critical infrastructure cybersecurity issued by President Obama in February. A preliminary version of the standards, known as the Cybersecurity Framework, are due by October 10. The discussion draft was made public to encourage comments in advance of NIST's fourth public workshop on the framework, to be held at the University of Texas at Dallas on September 11.

The discussion draft emphasizes a risk-management approach to businesses' cybersecurity efforts. It divides the Framework into three parts: a Core, Implementation Tiers, and a Profile.

The Core in turn consists of five functions, designed to provide high-level structures for organizing cybersecurity activities:

  • Identify–Develop the institutional understanding of the organizational systems, assets, data and capabilities that need to be protected; determine priority in light of organizational mission; and establish processes to achieve risk management goals.
  • Protect–Develop and implement the appropriate safeguards, prioritized through the organization's risk management process, to ensure delivery of critical infrastructure services.
  • Detect–Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event.
  • Respond–Develop and implement the appropriate activities, prioritized through the organization's risk management process (including effective planning), to take action regarding a detected cybersecurity event.
  • Recover–Develop and implement the appropriate activities, prioritized through the organization's risk management process, to restore the appropriate capabilities that were impaired through a cybersecurity event.

For each function, the discussion draft identifies existing technical standards, from NIST and international standards bodies, that may inform carrying out the function.

The Tiers represent ways of gauging increasingly extensive degrees of implementation of the core functions, from partial to risk-informed, to repeatable, to adaptive. A Profile is intended to help organizations "establish a roadmap" for organizational efforts to reduce cybersecurity risks. The discussion draft provides a sample five-step process, including (i) make organization-wide decisions; (ii) establish a target, i.e., desired, profile; (iii) establish a current profile; (iv) compare target and current profiles; (v) implement target profile.

The discussion draft also identifies several specific areas for improvement as the revision of the preliminary Framework moves forward: (i) authentication; (ii) automated indicator sharing; (iii) conformity assessment; (iv) data analytics; (v) international aspects, impacts, and alignment; (vi) privacy; and (vii) supply chains and interdependencies.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More