tmccoy14 commited on
Commit
cf65e74
1 Parent(s): c2e920e

Update frameworks/nist/framework.json

Browse files
Files changed (1) hide show
  1. frameworks/nist/framework.json +160 -16
frameworks/nist/framework.json CHANGED
@@ -1,20 +1,84 @@
1
  {
2
  "name": "NIST Cybersecurity Framework (NIST)",
3
  "shortName": "NIST",
4
- "description": "NIST Cybersecurity Framework is a set of guidelines for mitigating organizational cybersecurity risks, published by the US National Institute of Standards and Technology based on existing standards, guidelines, and practices. The framework categorizes all cybersecurity capabilities, projects, processes, daily activities into these 5 core functions: Identify, Protect, Detect, Respond, and Recover.",
5
  "iconUrl": "https://cdn.worldvectorlogo.com/logos/nist.svg",
6
  "stages": [
7
  {
8
- "stageName": "",
9
  "systemComponents": [
10
  {
11
- "componentName": "",
12
  "risks": [
13
  {
14
- "riskId": "",
15
- "title": "",
16
- "definition": "",
17
- "addressedByControls": []
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
18
  }
19
  ]
20
  }
@@ -23,18 +87,98 @@
23
  ],
24
  "controls": [
25
  {
26
- "controlId": "",
27
- "title": "",
28
- "description": "",
29
- "controlCategory": "",
30
- "readableControlId": "",
31
- "severity": "",
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
32
  "automationPlatforms": [],
33
  "criteria": [
34
  {
35
- "criteriaId": "",
36
- "title": "",
37
- "description": ""
38
  }
39
  ]
40
  }
 
1
  {
2
  "name": "NIST Cybersecurity Framework (NIST)",
3
  "shortName": "NIST",
4
+ "description": "NIST Cybersecurity Framework is a set of guidelines for mitigating organizational cybersecurity risks, published by the US National Institute of Standards and Technology based on existing standards, guidelines, and practices. The framework categorizes all cybersecurity capabilities, projects, processes, and daily activities into these 5 core functions: Identify, Protect, Detect, Respond, and Recover.",
5
  "iconUrl": "https://cdn.worldvectorlogo.com/logos/nist.svg",
6
  "stages": [
7
  {
8
+ "stageName": "Identify",
9
  "systemComponents": [
10
  {
11
+ "componentName": "Asset Management",
12
  "risks": [
13
  {
14
+ "riskId": "1.1",
15
+ "title": "Unidentified Assets",
16
+ "definition": "Risk of having assets within the organization that are not identified, increasing vulnerability to cyber attacks.",
17
+ "addressedByControls": ["NIST-1"]
18
+ }
19
+ ]
20
+ }
21
+ ]
22
+ },
23
+ {
24
+ "stageName": "Protect",
25
+ "systemComponents": [
26
+ {
27
+ "componentName": "Access Control",
28
+ "risks": [
29
+ {
30
+ "riskId": "2.1",
31
+ "title": "Unauthorized Access",
32
+ "definition": "Risk of unauthorized individuals gaining access to sensitive information or systems.",
33
+ "addressedByControls": ["NIST-2", "NIST-3"]
34
+ }
35
+ ]
36
+ }
37
+ ]
38
+ },
39
+ {
40
+ "stageName": "Detect",
41
+ "systemComponents": [
42
+ {
43
+ "componentName": "Security Continuous Monitoring",
44
+ "risks": [
45
+ {
46
+ "riskId": "3.1",
47
+ "title": "Undetected Incidents",
48
+ "definition": "Risk of cybersecurity incidents going undetected due to inadequate monitoring.",
49
+ "addressedByControls": ["NIST-4"]
50
+ }
51
+ ]
52
+ }
53
+ ]
54
+ },
55
+ {
56
+ "stageName": "Respond",
57
+ "systemComponents": [
58
+ {
59
+ "componentName": "Incident Response",
60
+ "risks": [
61
+ {
62
+ "riskId": "4.1",
63
+ "title": "Ineffective Incident Response",
64
+ "definition": "Risk of an ineffective response to cybersecurity incidents, leading to prolonged impacts.",
65
+ "addressedByControls": ["NIST-5"]
66
+ }
67
+ ]
68
+ }
69
+ ]
70
+ },
71
+ {
72
+ "stageName": "Recover",
73
+ "systemComponents": [
74
+ {
75
+ "componentName": "Recovery Planning",
76
+ "risks": [
77
+ {
78
+ "riskId": "5.1",
79
+ "title": "Inadequate Recovery Plans",
80
+ "definition": "Risk of insufficient recovery plans, hindering the organization's ability to restore operations after an incident.",
81
+ "addressedByControls": ["NIST-6"]
82
  }
83
  ]
84
  }
 
87
  ],
88
  "controls": [
89
  {
90
+ "controlId": "NIST-1",
91
+ "title": "Asset Inventory",
92
+ "description": "Maintain a detailed inventory of all organizational assets.",
93
+ "controlCategory": "Identify",
94
+ "readableControlId": "NIST 1",
95
+ "severity": "High",
96
+ "automationPlatforms": [],
97
+ "criteria": [
98
+ {
99
+ "criteriaId": "1",
100
+ "title": "Asset Identification",
101
+ "description": "Ensure all assets are identified and recorded in the inventory."
102
+ }
103
+ ]
104
+ },
105
+ {
106
+ "controlId": "NIST-2",
107
+ "title": "User Authentication",
108
+ "description": "Implement strong user authentication mechanisms to prevent unauthorized access.",
109
+ "controlCategory": "Protect",
110
+ "readableControlId": "NIST 2",
111
+ "severity": "High",
112
+ "automationPlatforms": [],
113
+ "criteria": [
114
+ {
115
+ "criteriaId": "1",
116
+ "title": "Authentication Protocols",
117
+ "description": "Use multi-factor authentication for sensitive systems."
118
+ }
119
+ ]
120
+ },
121
+ {
122
+ "controlId": "NIST-3",
123
+ "title": "Access Control Policies",
124
+ "description": "Develop and enforce access control policies to limit access to sensitive information.",
125
+ "controlCategory": "Protect",
126
+ "readableControlId": "NIST 3",
127
+ "severity": "Medium",
128
+ "automationPlatforms": [],
129
+ "criteria": [
130
+ {
131
+ "criteriaId": "1",
132
+ "title": "Policy Enforcement",
133
+ "description": "Regularly review and update access control policies."
134
+ }
135
+ ]
136
+ },
137
+ {
138
+ "controlId": "NIST-4",
139
+ "title": "Continuous Monitoring",
140
+ "description": "Establish continuous monitoring to detect cybersecurity incidents promptly.",
141
+ "controlCategory": "Detect",
142
+ "readableControlId": "NIST 4",
143
+ "severity": "High",
144
+ "automationPlatforms": [],
145
+ "criteria": [
146
+ {
147
+ "criteriaId": "1",
148
+ "title": "Monitoring Tools",
149
+ "description": "Deploy and configure monitoring tools to provide real-time alerts."
150
+ }
151
+ ]
152
+ },
153
+ {
154
+ "controlId": "NIST-5",
155
+ "title": "Incident Response Plan",
156
+ "description": "Develop and implement a comprehensive incident response plan.",
157
+ "controlCategory": "Respond",
158
+ "readableControlId": "NIST 5",
159
+ "severity": "High",
160
+ "automationPlatforms": [],
161
+ "criteria": [
162
+ {
163
+ "criteriaId": "1",
164
+ "title": "Response Procedures",
165
+ "description": "Establish procedures for timely and effective incident response."
166
+ }
167
+ ]
168
+ },
169
+ {
170
+ "controlId": "NIST-6",
171
+ "title": "Recovery Strategy",
172
+ "description": "Create and maintain a recovery strategy to restore operations after a cybersecurity incident.",
173
+ "controlCategory": "Recover",
174
+ "readableControlId": "NIST 6",
175
+ "severity": "Medium",
176
  "automationPlatforms": [],
177
  "criteria": [
178
  {
179
+ "criteriaId": "1",
180
+ "title": "Recovery Plans",
181
+ "description": "Document and regularly update recovery plans."
182
  }
183
  ]
184
  }