home/dictionary/framework/NIST Cybersecurity Framework

Dictionary · NIST Cybersecurity Framework

L2 — definitions grouped by regulatory framework.

Sort
Filtercosmetic affordance — live filters Phase 2
285 senses under NIST Cybersecurity Framework

Verbs

53 senses
accept

To consent to receive (something given or offered).

control

To exercise authority over; direct; regulate. This include exercising authority over the processesses of issuance and revocation, management, and auditing.

restrict

To confine or put a limit on; keep under control; restrain.

improve

To make or become better; enhance in value or quantity.

destroy

To render target data recovery infeasible and media unusable for the storage of data.

address

To deal with an issue.

coordinate

To bring the different elements of a complex activity into a relationship that will ensure efficiency.

correlate

To have or establish a mutual connection or relationship, in which one thing affects or depends on another.

communicate

To share or convey knowledge, information, news, or ideas.

develop and implement

To design, create, and put something into effect.

encrypt

To convert plaintext into ciphertext using a cryptographic algorithm.

align

To give support to; come together in agreement or alliance.

implement

To put a plan, policy, decision, agreement, etc. into action or effect.

share

To have something in common or use jointly.

receive

To be given, presented with, paid, or come into possession of something.

maintain

To keep up; continue a condition or situation; carry on.

approve

Give sanction to.

assert

To state as having existence; affirm; postulate.

assess

To estimate or determine the nature, value, ability, or quality of someone or something; evaluate.

document

To record something in detail through photography, writing, or other form.

perform

To carry out an action, task, or function.

support

To provide aid or give assistance to.

assign

To appoint someone to a job, duty, task, or organization; allocate a job, duty, or task.

establish

To start something that will last for a long time, or to create or set something in a particular way.

establish and implement

To lay the groundwork for something and then put it into practice.

establish and maintain

To lay the groundwork for something and uphold it or ensure continuation by requiring maintenance.

manage

To handle or control the behavior, movement, or function of a person, animal, or thing.

map

To diagram data that is to be exchanged electronically, including how it is to be used and what business management systems need it; a preliminary step for developing an applications link.

incorporate

To include, take in or contain something as part of a whole.

execute

To carry out fully or put something completely into effect.

mitigate

To lessen or to try to lessen the severity, pain, seriousness, extent, or gravity of.

base

To serve as a foundation, underlying support, or starting point for something.

review

To examine or evaluate formally with the intent of making changes if necessary.

prioritize

To determine the order for dealing with a series of items or tasks according to their relative importance.

verify

To make certain or prove that something is true or accurate; confirm; substantiate.

separate

To move or be apart; detach; disconnect.

understand

To perceive the intended meaning, significance, explanation, or cause of something.

protect

To shield or defend from danger, harm, injury, loss, destruction, or damage.

categorize

To arrange or place in a particular class or group.

update

To modernize or bring up to date.

inventory

To make a comprehensive complete list of things.

transfer

To change possession of property, a right, or a responsibility to another.

identify

To establish, indicate, or verify who or what someone or something is.

know

To have an understanding of or information concerning something.

use

The action of employing something or the state of being put into action for some purpose.

limit

To restrict or assign boundaries to something.

determine

To establish or ascertain exactly as a result of research or calculation.

conduct

To manage, control, or organize and carry out.

comply

To act in accordance with a wish, command, law, standard, or contractual obligation.

proof

To proofread.

define

To state or describe exactly the nature, scope, or meaning of something.

contain

To have, hold, include, or be a part of.

provide

To supply or make something available for use.

Nouns

232 senses
recovery planning

The activities undertaken to define a recovery process which consists of defining rules, processes, and disciplines to ensure that the critical business processes will continue to function if there is a failure of one or more of the information processing or telecommunications resources upon which their operations depends.

create and maintain

Bring something into existence and cause or enable it to continue.

remote access

Access to an organization's nonpublic information system by an authorized user (or an information system) communicating through an external, non-organization-controlled network (e.g., the Internet).

removable storage media

Portable electronic storage media such as magnetic, optical, and solid-state devices, which can be inserted into and removed from a computing device, and that is used to store text, video, audio, and image information. Such devices have no independent processing capabilities. Examples include hard disks, floppy disks, zip drives, compact disks (CDs), thumb drives, pen drives, and similar USB storage devices.

response activity

Any task performed by an organization in reaction to discovered risks.

response and recovery strategy

A systematic plan of action consisting of documented procedures for mitigating and recovering from a disruptive event.

resource

An asset available for use.

response plan

A document detailing the steps that must be taken, or the activities that must be performed well, in response to risk assessment or audit findings.

reputation

The beliefs, opinion, or social evaluation of the public about someone or something.

Respond Function

Develop and implement the appropriate activities to take action regarding a detected cybersecurity event.

restoration operation

An organized activity to restore something.

Risk tolerance

The level of risk an entity is willing to assume in order to achieve a potential desired result.

risk management process

The systematic application of management policies, procedures and practices to the activities of communicating, consulting, establishing the context and identifying, analyzing, evaluating, treating,monitoring and reviewing risk

risk management strategy

A plan of action for analyzing and prioritizing risks to organizational operations, assets, and personal in alignment with the organization's mission and business objectives.

risk response

Accepting, avoiding, mitigating, sharing, or transferring risk to organizational operations, resources, and other organizations.

role

A set of responsibilities defined in a process and assigned to a person or team.

roles and responsibilities

The position and collection of tasks, duties, obligations that participants undertake to complete a project.

security control

A safeguard or countermeasure to avoid, counteract or minimize security risks relating to personal property, or any company property. For business-to-business facing organizations whose service may affect the financial statements of the other company, the prospect may require successful audit reports of policy controls.

security personnel

Individuals who protect people, facilities, and information for an organization.

security process

A series of actions that ensure the protection of data.

security policy

The statement of required protection of the information objects that documents an organization's philosophy of managing, protecting, and distributing its computing and information assets. The set of security rules enforced by the system's security features.

senior executive

A long standing and top ranking member of the management of an organization.

separation of duty

Practice of dividing steps in a function among different individuals, so as to keep a single individual from being able to subvert the process.

stakeholder

An individual who has an interest in something, e.g., a corporation, and is affected by decisions and activities regarding that issue.

software platform

A major piece of software, as an operating system, an operating environment, or a database, under which various smaller application programs can be designed to run.

source

The place, person, or thing where something begins or comes into being.

supplier

Product and service providers used for an organization’s internal purposes (e.g., IT infrastructure) or integrated into the products of services provided to that organization’s Buyers.

supply chain

A system of organizations, people, activities, information, and resources, possibly international in scope, that provides products or services to consumers.

suspicious activity

Activities that give the idea or impression that they are of questionable, dishonest, or of dangerous character or conditions.

supply chain risk management process

The implementation through controls and structures of strategies to manage both everyday and exceptional risks along the supply chain based on continuous risk assessment with the objective of reducing vulnerability and ensuring continuity.

supply chain risk

A risk measured by the likelihood and severity of damage if an Information Technology or Operations Technology system is compromised by a supply chain attack, and takes into account the importance of the system and the impact of compromise on organizational operations and assets, individuals, other organizations, and the Nation. Supply chain attacks may involve manipulating computing system hardware, software, or services at any point during the life cycle. Supply chain attacks are typically conducted or facilitated by individuals or organizations that have access through commercial ties, leading to stolen critical data and technology, corruption of the system/ infrastructure, and/or disabling of mission-critical operations.

system

An interconnected set of information resources under the same direct management control which shares common functionality. A system normally includes hardware, software, information, data, applications, communications, and people.

System Development Life Cycle

A series of stages that the process of system development goes through in order to design and produce a system.

taxonomy

A structure or scheme used for classifying materials or concepts into a hierarchy of categories and subcategories.

technical security solution

Hardware, software, and methodologies for protecting computerized assets from, or resilience against, potential harm from external forces.

test

To ascertain the performance, reliability, or quality of something.

test environment

A controlled environment in which tests will be run on configuration items, builds, processes, IT services, etc.

Threat and Vulnerability Management process

A process that includes vulnerability assessments, vulnerability scanning, penetration testing. Also included in the process is the cataloging of the assets that are in scope, assigning value and importance to those resources, and mitigating or eliminating any vulnerabilities discovered during the process.

test result

A formal document defining the subject of the test, the test plan, approach, analysis tools, and conclusions found during the testing process.

timely manner

As quickly as is reasonable in a particular situation.

third party

A person or group besides the two primarily involved in a situation, agreement, business, etc.

third party contract

Means a contract or purchase order awarded by the Recipient or subrecipient to a vendor or contractor.

threat

Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, or individuals through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Also, the potential for a threat-source to successfully exploit a particular information system vulnerability.

train

To teach a person or animal a particular skill or type of behavior through sustained practice and instruction.

unapproved Information Technology resource

An unsanctioned Information Technology resource.

unauthorized mobile code

A program (e.g., script, macro, or other portable instruction) that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics -- that has not been permitted by the controlling authority.

unauthorized access

Occurs when a user, legitimate or unauthorized, accesses a resource that the user is not permitted to use.

user

This role focuses on the use or operation of a system, having an account on a system, accessing a cryptographic module to obtain cryptographic services, or receiving or using services from an automated information system facility. Any individual or organization that uses or operates a system, has an account on a system, accesses cryptographic modules to obtain cryptographic services, or uses or receives services from an automated information system facility should be assigned to this role.

unauthorized personnel

Employees who do not have the right or permission to access data (or a facility containing data).

workforce

The individuals engaged in or available for work in a country, industry or organization.

Vulnerability Management plan

This purpose of this plan is to establish the organization's assessment and testing process to ensure systems are less susceptible to cyber attack.

vulnerability

A weakness in an information system, administrative controls, internal controls, system security practices and procedures, implementation, or physical layout that could be accidentally triggered or intentionally exploited by a threat in order to gain unauthorized access to information or disrupt processing.

vulnerability scan

The check of a system for known vulnerabilities from beginning to end with resultant errors, and status information.

password

A secret authentication credential consisting of a string of characters.

Personal Data

Any information relating to an identified or identifiable natural person.

access control

A system or measures that limit the retrieving, obtaining, or examining of information, or information processing resources, to persons or applications authorized by the system or data classification.

access right

Authorization to gain access to something physically or logically.

accord

Harmony of people's opinions or actions or characters.

activity

Activities are the major tasks performed by the organization to accomplish each of its functions. Activities are usually defined as part of processes or plans, and are documented in procedures. Several activities may be associated with each function. An activity is identified by the name it is given and its scope (or definition). The scope of the activity encompasses all of the transactions that take place in relation to it. Depending on the nature of the transactions involved, an activity may be performed in relation to one function, or it may be performed in relation to many functions. In cost accounting, an activity is the actual work task or step performed in producing and delivering products and services. An aggregation of activities performed within an organization that is useful for purposes of activity-based costing.

affected party

This role is focused on contracting parties who are affected by organizational activities. Any individual who is in a contract and is affected by organizational activities should be assigned to this role.

after

This limits a Control or Mandate's secondary verb to be put into play once the event taking place has concluded.

agree

Be in accord; be in agreement.

agreement

This record category contains records of mutual understandings, written or verbal, made by two or more parties regarding a matter of opinion or their rights and obligations toward each other.

Analyze

To examine methodically, typically for purposes of explanation and interpretation.

anomalous activity

Any actions that are outside of what is expected, as measured against what "normally" should be happening, occur.

applicable requirement

The relevant or appropriate necessary condition or conditions.

application

A computer program designed to help people perform a certain type of work, including specific functions, such as payroll, inventory control, accounting, and mission support. Depending on the work for which it was designed, an application can manipulate text, numbers, graphics, or a combination of these elements. An application contrasts with systems program, such as an operating system or network control program, and with utility programs, such as copy or sort.

assessed risk

A detected and evaluated risk. An assessed risk of material misstatement at the assertion level is a significant risk.

asset

Anything of material value or usefulness that is owned by a person or company.

asset vulnerability

A weakness in any of the organization's property of material value or usefulness or physical layout that could be accidentally triggered or intentionally exploited by a threat in order to gain unauthorized access to information or disrupt processing.

assumption

Something that is accepted as true without proof.

audit log

A security-relevant chronological record, set of records, and/or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event.

communication

A letter or message containing information or news.

audit

A systematic, independent and documented process for obtaining audit evidence and evaluating it objectively to determine the extent to which the audit criteria are fulfilled.

authentication mechanism

Hardware or software-based mechanisms that forces users, devices, or processes to prove their identity before accessing data on an information system.

authorized device

A computer device that the organization has authorized to be used and connected to the system.

authorized user

A person who has the authority or permission to manage access or make changes to an account.

baseline configuration

A documented set of specifications for an information system, or a configuration item within a system, that has been formally reviewed and agreed on at a given point in time, and which can be changed only through change control procedures.

backup

A copy of files, data, or programs that is generally used for restoration in the event of damage or loss to the original files, data, or programs.

bind

The process of associating two related elements of information.

credential

Information passed from one entity to another that is used to establish the sending entity's access rights.

Critical infrastructure

System and assets, whether physical or virtual, so vital to the U.S. that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.

business impact

The financial, reputational or operational consequences to the business.

business continuity testing

The act of performing a test to evaluate the effectiveness of an organization's business continuity plan.

buyer

A buyer is any person or organization who contracts to acquire an asset or service in return for some form of consideration.

catalog

The process of providing such access, plus additional work to prepare the materials for use, such as labeling, marking, and maintenance of authority files.

Business Value

How much a business is worth. Business value is a highly subjective measure because it involves estimating the value of intangible assets like trade secrets and brand recognition. It adds to this the value of tangible assets like machinery and stockholder equity. Business value is especially important for potential investors or buyers.

capacity

The maximum amount that something can contain.

classification

The act of distributing things into classes or categories of the same type.

critical function

Business activities or information that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.

criticality

A measure of the degree to which an organization depends on the information or information system for the success of a mission or of a business function. (NIST SP 800-60).

interaction

A mutual or reciprocal action; interacting.

configuration change control process

An action that is taken or performed to systematically manage all changes made to an asset's arrangement, system configuration, or security configuration in order to prevent unnecessary disruptions, vulnerabilities, and mitigate threats. Its purpose is to ensure that all changes to a complex system are performed with the knowledge and consent of management.

configure a system

The setting of various switches and jumpers for hardware and the defining of values of parameters for software. Each parameter specifies a preferred or required setting or policy for a computer system, or a configuration control such as a particular registry key, file, or GPO setting. Every parameter includes descriptive elements in a human-understandable manner.

confirm

Establish the truth or correctness of something previously believed to be the case.

constraint

The state of being restricted or prevented.

continuity requirement

A statement of a necessary condition to provide continuity.

contractual obligation

A course of action or conditions that someone is legally bound to because they signed a contract.

Cyber Supply Chain Risk Management Plan

A plan that includes confidentiality, integrity, and availability controls for mitigating the risks associated with the distributed and interconnected nature of IT/OT product and service supply chains. It covers the entire life cycle of a system (including design, development, distribution, deployment, acquisition, maintenance, and destruction) as supply chain threats and vulnerabilities may intentionally or unintentionally compromise an IT/OT product or service at any stage.

cybersecurity activity

Security controls that are specific to the realm of Cybersecurity.

Cybersecurity Profile

A representation of the outcomes that a particular system or organization has selected from the Framework Categories and Subcategories.

cyber supply chain risk management process

A detailed description of the steps necessary to mitigating the risks associated with the distributed and interconnected nature of IT/OT product and service supply chains. It covers the entire life cycle of a system (including design, development, distribution, deployment, acquisition, maintenance, and destruction) as supply chain threats and vulnerabilities may intentionally or unintentionally compromise an IT/OT product or service at any stage.

Cybersecurity Category

The subdivision of a Function into groups of cybersecurity outcomes, closely tied to programmatic needs and particular activities. Examples of Cybersecurity Categories include “Asset Management,” “Identity Management and Access Control,” and “Detection Processes.”.

cybersecurity event

Any act or attempt, successful or unsuccessful, to gain unauthorized access to, disrupt or misuse an Information System or information stored on such Information System.

Cybersecurity Subcategory

The subdivision of a Cybersecurity Category into specific outcomes of technical and/or management activities. Examples of Subcategories include “External information systems are catalogued,” “Data-at-rest is protected,” and “Notifications from detection systems are investigated.”.

Cybersecurity Framework Implementation Tier

A lens through which to view the characteristics of an organization’s approach to risk—how an organization views cybersecurity risk and the processes in place to manage that risk.

cybersecurity function

One of the main components of the Cybersecurity Framework. Cybersecurity functions provide the highest level of structure for organizing basic cybersecurity activities into Cybersecurity Categories and Cybersecurity Subcategories. The five Cybersecurity functions are the Identify function, Protect function, Detect function, Respond function, and Recover function.

cybersecurity law, rule, or regulation

Any federal, state, or local statute or ordinance or any rule or regulation adopted according to any federal, state, or local statute or ordinance that deals specifically with the topic of protecting or defending computerized environments, organizational computerized assets, and user’s computerized assets.

cyber incident

Actions taken through the use of computer networks that result in an actual or potentially adverse effect on an information system and/or the information residing therein.

Cybersecurity Framework Core

A set of cybersecurity activities and references that are common across critical infrastructure sectors and are organized around particular outcomes. The Framework Core comprises four types of elements: Functions, Categories, Subcategories, and Informative References.

cyber supply chain risk assessment process

The foundational task in the cyber supply chain risk assessment process, cyber supply chain risk assessments are aimed at identifying and assessing applicable risk of Information and operational technology (IT/OT) outsourcing, diverse distribution routes, assorted technologies, laws, policies, procedures, and practices.

Cybersecurity

Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets. Organization and user’s assets include connected computing devices, personnel, infrastructure, applications, services, telecommunications systems, and the totality of transmitted and/or stored information in the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the security properties of the organization and user’s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: - Availability - Integrity, which may include authenticity and non-repudiation - Confidentiality

Cybersecurity outcome

A Cybersecurity outcome is the business need defined and tiered implementation of the outcomes listed in either the Categories or Subcategories section of Table 2 in the NIST Cybersecurity Framework.

cyber threat intelligence

Organized, analyzed and refined information about potential or current attacks that threaten an organization. The primary purpose of threat intelligence is helping organizations understand the risks of the most common and severe external threats, such as zero-day threats, advanced persistent threats (APTs) and exploits. Although threat actors also include internal (or insider) and partner threats, the emphasis is on the types that are most likely to affect a particular organization's environment. Threat intelligence includes in-depth information about specific threats to help an organization protect itself from the types of attacks that could do them the most damage. In a military, business or security context, intelligence is information that provides an organization with decision support and possibly a strategic advantage. Threat intelligence is a component of security intelligence and, like SI, includes both the information relevant to protecting an organization from external and inside threats as well as the processes, policies and tools designed to gather and analyze that information. Threat intelligence services provide organizations with current information related to potential attack sources relevant to their businesses; some also offer consultation service.

cybersecurity risk

A risk to organizational operations, (including mission, functions, image, and reputation), resources, and other organizations due to the potential for unauthorized access, use, disclosure, disruption, modification, or destruction of information, Information Technology, and/or Operations Technology.

cybersecurity risk management

The process of identifying risks and vulnerabilities and applying administrative actions and comprehensive solutions to ensure that the organization is adequately protected.

information security procedure

The documented series of steps on how to establish and maintain the confidentiality, integrity, and availability of information.

information system component

A discrete, identifiable information technology asset (e.g., hardware, software, firmware) that represents a building block of an information system. Information system components include commercial information technology products.

cybersecurity roles and responsibilities

The functions and duties of personnel who are responsible for preventing cybersecurity events that disrupt operations or affected parties, assigned and performed in conformance with pertinent laws and standards.

information security process

The activities associated with establishing and maintaining the confidentiality, integrity, and availability of data and information.

cybersecurity training

Activities that are used to teach people about tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user’s assets.

data

A subset of information in an electronic format that allows it to be retrieved or transmitted. (CNSSI-4009)

information security roles and responsibilities

The position and collection of tasks, duties, obligations that participants undertake to perform the daily and all special tasks in the role of information security.

information sharing forum

An assembly in which participants share problems, solutions, updates, and data on topics relevant to its discourse.

Data leakage

An unauthorized data transfer out of a computer or data center.

data-in-motion

Data being transferred between devices, such as data being sent from one application to another.

data flow

The path of data from input to output, which includes the traveling of data through the communication lines, routers, switches and firewalls as well as processing through various applications on servers that process the data from user input to storage in the organizations central database.

Detect Function

Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event.

Data-At-Rest

Refers to all data stored on hard drives, thumb drives, DVDs, CDs, floppy diskettes, and similar storage media. It excludes data that is traversing a network or temporarily residing in computer memory to be read or updated.

detect

Discover, investigate, or discern the existence or presence of something.

delivery

The supply or provision of something.

dependency

A relationship between processes or activities that directly or indirectly relies upon another process or activity to occur, begin, or finish.

detective activity

An activity designed to identify undesirable events that do occur and alert management about what has happened. This enables management to take corrective action promptly.

device

A generic term for a server, storage, client platform, computer, or any part of a computer other than the CPU or working memory.

development environment

The set of processes and programming tools used to develop, test, and debug an application or program.

Information System

A discrete set of information resources organized for the collection, processing, maintenance, use, sharing, dissemination, or disposition of information. Note: Information systems also include specialized systems such as industrial/process controls systems, telephone switching and private branch exchange (PBX) systems, and environmental control systems.

dispose of

Get rid of by throwing away or giving or selling to someone else.

effectiveness

The degree to which information is relevant and pertinent to the business process as well as delivered in a timely, correct, consistent, and usable manner.

during

This limits a Control or Mandate's secondary verb to be put into play as the event is happening.

event data

Any data that you want to measure about an event.

event information

The data fields and information that needs to be captured during monitoring so that the organization knows what happened when the event was triggered.

event

Any observable occurrence in a system and/or network. Events sometimes provide indication that an incident is occurring. (CNSSI-4009).

integrity check mechanism

Any software, hardware, or methodology that checks a program, system, or records for unauthorized modifications.

external information system

An information system or component of an information system that is outside of the accreditation boundary established by the organization and for which the organization typically has no direct control over the application of required security controls or the assessment of security control effectiveness.

facility

A place, amenity, or piece of equipment provided for a particular purpose.

external service provider

An independent business that provides its services to other business.

forensics

As it relates to information security, the application of investigative tools and analysis techniques to gather evidence from computer resources to determine the cause of data compromises.

Governance, Risk, and Compliance framework

The overall structure of procedures of how an organization is controlled and directed , how an organization identifies and mitigates risk, and how the organization adheres to pertinent rules, standards, and regulations that defines the scope, objectives, and activities regrading such procedures.

Informative Reference

A specific section of standards, guidelines, and practices common among critical infrastructure sectors that illustrates a method to achieve the outcomes associated with each Cybersecurity Subcategory. An example of an Informative Reference is ISO/IEC 27001 Control A.10.8.3, which supports the “Data-in-transit is protected” Subcategory of the “Data Security” Category in the “Protect” function.

hardware integrity

The assurance that any given hardware asset is not a counterfeit, or otherwise falsely represented as being whole and intact as measured against original specifications.

Identify Function

Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities.

human resources process

The steps necessary to support the general management of the organizational workforce, including staffing, employee compensation and benefits, and defining/designing work.

identity

The set of attribute values (i.e., characteristics) by which an entity is recognizable and that, within the scope of an identity manager's responsibility, is sufficient to distinguish that entity from any other entity.

incident alert threshold

The magnitude or intensity that must be exceeded before a detected incident triggers an alert, who receives the alert, and the priority of the alert.

incident monitoring process

An established or official method for implementing the policy for incident monitoring or performing the tasks, processes, or operations to monitor for incidents which must be executed in the same manner in order to obtain the same results in the same circumstances.

incident monitoring program

The documented activities, policies, and procedures within an organization for organizing and directing all activities undertaken to review, track, evaluate, and report on the status of incidents.

incident monitoring roles and responsibilities

The position and collection of tasks, duties, obligations that participants undertake to perform the daily and all special tasks associated with reviewing, trackIng, evaluatIng, and reportIng on the status of incidents..

identify and document

Establish, indicate, or verify who or what someone or something is and record that in detail through photography, writing, or other form.

incident containment process

An established or official method for implementing the policy for incident containment or performing the tasks, processes, or operations to limit and prevent further damage from happening after an incident occurs, along with ensuring that there is no destruction of forensic evidence that may be needed for future legal actions which must be executed in the same manner in order to obtain the same results in the same circumstances.

Impact

A measure of the effect of an incident, problem, or change on business processes; often based on how service levels will be affected; used with urgency to assign priority.

incident

An event that disrupts the service or operations of an organization.

incident alert

Any form of security alert, security alarm, or logged event notification that has been triggered by any form of detection. The triggering of an incident alert begins the incident response process.

incident management process

An activity undertaken to direct personnel and resources to respond to an incident.

include

Make part of a whole or set.

individual

A human being.

inform

Give someone facts or information.

information technology supplier

Information systems, components and services providers used for an organization’s internal purposes (e.g., IT infrastructure) or integrated into the products of services provided to that organization’s buyers.

incident response process

An established or official method for implementing the policy for incident response or performing the tasks, processes, or operations to address and manage the aftermath of a disaster or other significant event that may affect the organization’s people or ability to function productively which must be executed in the same manner in order to obtain the same results in the same circumstances.

incident response program

A documented approach for organizing and directing all activities undertaken to handle known security breaches or attacks in such a way as to limit damage and reduce the time it takes for the organization to recover time and costs.

incident response roles and responsibilities

The position and collection of tasks, duties, obligations that participants undertake to perform the daily and all special tasks associated with managing the aftermath of a disaster or other significant event that may affect the organization's people or ability to function productively..

information

Any communication or representation of knowledge such as facts, data, or opinions in any medium or form, including textual, numerical, graphic, cartographic, narrative, or audiovisual.

industry sector

The world of business and commerce is often divided up in to a selection of broad and commonly recognised groups, called sectors. Often a more general term, a sector represents a group of industries and markets that share common attributes.

information security policy

The rules and guidelines of an organization on how to ensure the confidentiality, integrity, and availability of the organization's information.

interested personnel

This role focuses on persons or organizations that have a recognizable stake in the outcome of a court matter or who are potentially being affected by a situation or hoping to make money off of the situation. Any individual or organization that has a recognizable stake in the outcome of a court matter, may be affected by a situation, or make money from the situation should be assigned to this role.

Investigate

To carry out a formal or systematic inquiry to discover and examine the facts of an event, incident, etc. in order to establish the truth.

least functionality principle

In information security, computer science, and configuration management the limiting of access to only that information and resources that are necessary for its legitimate purpose.

law enforcement authority

The various government agencies responsible for preventing crime, apprehending criminals, and enforcing laws.

lessons learned

A set of statements captured after completion of a project or a portion of a project that describes in a neutral way what did or did not work, along with a statement regarding the risk of ignoring the lesson.

least privilege

The principle that a security architecture should be designed so that each entity is granted the minimum system resources and authorizations that the entity needs to perform its function.

likelihood

The state or fact of something's being likely; probability.

log

To record an event or transaction in an organized record-keeping system, usually sequenced in the order they occurred.

maintenance

The process of making repairs and keeping components of an asset in good condition so that the asset may remain in operating condition and last its entire useful life.

risk analysis

The purpose of this task is to examine and identify the risks to the system, determine the probability of occurrence, analyze the related vulnerabilities of the system, the resulting impact, and the additional safeguards that mitigate this impact.

malicious code

Software or firmware designed to infiltrate or damage a computer system without the owner's knowledge or consent, with the intent of compromising the confidentiality, integrity, or availability of the owner’s data, applications, or operating system. Such software typically enters a network during many business-approved activities, which results in the exploitation of system vulnerabilities. Examples include viruses, worms, Trojans (or Trojan horses), spyware, adware, and rootkits.

meet

Fulfill or satisfy (a need, requirement, or condition).

mission

A statement of what an organization will achieve.

mobile code

A program (e.g., script, macro, or other portable instruction) that can be shipped unchanged to a heterogeneous collection of platforms and executed with identical semantics.

monitor

To watch and check the progress or quality of something over a period of time; keep under regular surveillance.

multiple sources

Information classified based on two or more source documents, classification guides or combination of both.

network

Information system(s) implemented with a collection of interconnected components. Such components may include routers, hubs, cabling, telecommunications controllers, key distribution centers, and technical control devices.

network activity baseline

Establishing a trusted baseline document involves identifying the following: - network data points of interest - length of the baseline data collection period - methods and tools used to collect and store data Suggested network data points of interest include the following: - a list of predetermined devices a given workstation or server should communicate with - VPN usage, including access times, bandwidth and resources used, source IP addresses, and geolocation information - the known set of ports and protocols in use by the network - firewall and intrusion detection system logs - normal traffic patterns and flows.

network segregation

Developing and enforcing a ruleset controlling which computing devices are permitted to communicate with which other computing devices.

network integrity

The state of a computer network where it is performing its intended functions without being degraded or impaired by changes or disruptions in its internal or external environments. A network is functioning properly when several things occur: applications and client get enough network availability, applications and clients get proper bandwidth, network security does its job during both peacetime and attack, and network management has complete control of the entire network.

objective

A projected state of affairs that a person or a system plans or intends to achieve a personal or organizational desired end-point in some sort of assumed development. Many people endeavor to reach goals within a finite time by setting deadlines.

organizational risk tolerance

The level of risk an organization is willing to take in order to achieve a potential desired result.

operation

An organized activity involving multiple people.

organization

This group focuses on corporate bodies, businesses, federal agencies and their operational elements, and any entity that has people, resources, and budgets. Any of these bodies should be assigned to this group.

organizational objective

Performance targets set by an organization.

operating state

Distinct operating modes (which typically include specific Information Technology and Operations Technology configurations as well as alternate or modified procedures) that have been designed and implemented for the function and can be invoked by a manual or automated process in response to an event, a changing risk environment, or other sensory and awareness data to provide greater safety, resiliency, reliability, and/or cybersecurity. For example, a shift from the normal state of operation to a high-security operating mode may be invoked in response to a declared cybersecurity incident of sufficient severity. The high-security operating state may trade off efficiency and ease of use in favor of increased security by blocking remote access and requiring a higher level of authentication and authorization for certain commands until a return to the normal state of operation is deemed safe.

partner

An associate in an activity or endeavor or sphere of common interest.

risk

A measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: • the adverse impacts that would arise if the circumstance or event occurs; and • the likelihood of occurrence. Note: Information system-related security risks are those risks that arise from the loss of confidentiality, integrity, or availability of information or information systems and consider the adverse impacts to organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, other organizations, and the Nation.

risk decision

A decision by the leadership of an organization to accept an option having a given risk function in preference to another, or in preference to taking no action.

physical access

The ability of people to physically gain access to a computer system or facility.

physical access control

A mechanism, system, or barrier that prevents unauthorized physical access to an area or a facility.

personnel

People who are employed by and work directly within an organization.

physical environment

The physical external surrounding and conditions in which something exists.

physical operating environment authority document

Statutes, regulations, safe harbors, audit guidelines, best practices, Service Level Agreements, Contractual Obligations, organizational policies and procedures, and any other documents that defines the temperatures, humidity levels, electromagnetic levels, vibration levels, power levels, and space required for any device to operate properly.

personnel activity

Any duty or action performed by a staff member.

potential impact

The loss of confidentiality, integrity, or availability could be expected to have: • a limited adverse effect (FIPS 199 low); • a serious adverse effect (FIPS 199 moderate); or • a severe or catastrophic adverse effect (FIPS 199 high) on organizational operations, organizational assets, or individuals.

place

A physical environment, point, or position; portion of space; location.

process

A series of operations performed by a computer.

policy

An official expression of principles that direct an organization's operations.

policy and procedure

A set of policies are principles, rules, and guidelines formulated or adopted by an organization to reach its long-term goals and typically published in a booklet or other form that is widely accessible. Policies and procedures are designed to influence and determine all major decisions and actions, and all activities take place within the boundaries set by them. Procedures are the specific methods employed to express policies in action in day-to-day operations of the organization. Together, policies and procedures ensure that a point of view held by the governing body of an organization is translated into steps that result in an outcome compatible with that view.

priority

A category based on impact and urgency used to identify the relative importance of an incident, problem, or change and the required time for action to be taken. For example, the SLA may state that priority 2 incidents must be resolved within 12 hours.

protection

The activity of keeping someone or something safe from harm or injury.

procedure

An established or official method for implementing a policy or performing a task or operation which must be executed in the same manner in order to obtain the same results in the same circumstances.

production environment

Production environment is a term used mostly by developers to describe the setting where software and other products are actually put into operation for their intended uses by end users. A production environment can be thought of as a real-time setting where programs are run and hardware setups are installed and relied on for organization or commercial daily operations.

privileged user

Any user account with greater than basic access privileges. Typically, these accounts have elevated or increased privileges with more rights than a standard user account. However, the extent of privileges across different privileged accounts can vary greatly depending on the organization, job function or role, and the technology in use.

Public Relations

The professional maintenance of a favorable public image by a company or other organization or a famous person.

Protect Function

A Cybersecurity Function that focuses on developing and implementing the appropriate safeguards to ensure delivery of critical infrastructure services.

protective measure

Any precautionary action, procedure or installation conceived or undertaken to guard or defend from harm persons, property or the environment.

protective technology

Special tamper-evident features and materials employed for the purpose of detecting tampering and deterring attempts to compromise, modify, penetrate, extract, or substitute information processing equipment and keying material.

Recover Function

Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event.

recovery process

The steps taken to restore a service, configurable item, etc. to a working state.

critical service

A service that could not be interrupted or unavailable for several business days without significantly jeopardizing operation of the organization.

record

Anything that is put down in permanent form and preserved as evidence.

Recovery action

An action that is undertaken to return something to a normal state.

recovery plan

The written expression of a recovery process which consists of defining rules, processes, and disciplines to ensure that the critical business processes will continue to function if there is a failure of one or more of the information processing or telecommunications resources upon which their operations depends. The following are key elements to a disaster recovery plan: 1) Establish a planning group, 2) Perform risk assessment and audits, 3) Establish priorities for applications and networks, 4) Develop recovery strategies, 5) Prepare inventory and documentation of the plan, 6) Develop verification criteria and procedures, 5) Implement the plan.

recovery strategy

A strategy to resume the minimum set of critical services identified in the business impact analysis (e.g. use of another delivery channel to provide the same service.

repair

Restore something damaged, faulty, or worn to a good condition.

report

To give a spoken or written account of something that has been seen, done etc.

remote maintenance

Offsite monitor, service, repair, and diagnostic activities on assets performed by secure communication through an external network.