tmccoy14 commited on
Commit
f5f80d1
1 Parent(s): 5647594

Update frameworks/nist/framework.json

Browse files
Files changed (1) hide show
  1. frameworks/nist/framework.json +6 -6
frameworks/nist/framework.json CHANGED
@@ -92,7 +92,7 @@
92
  "description": "Maintain a detailed inventory of all organizational assets.",
93
  "controlCategory": "Identify",
94
  "readableControlId": "NIST 1",
95
- "severity": "High",
96
  "automationPlatforms": [],
97
  "criteria": [
98
  {
@@ -108,7 +108,7 @@
108
  "description": "Implement strong user authentication mechanisms to prevent unauthorized access.",
109
  "controlCategory": "Protect",
110
  "readableControlId": "NIST 2",
111
- "severity": "High",
112
  "automationPlatforms": [],
113
  "criteria": [
114
  {
@@ -124,7 +124,7 @@
124
  "description": "Develop and enforce access control policies to limit access to sensitive information.",
125
  "controlCategory": "Protect",
126
  "readableControlId": "NIST 3",
127
- "severity": "Medium",
128
  "automationPlatforms": [],
129
  "criteria": [
130
  {
@@ -140,7 +140,7 @@
140
  "description": "Establish continuous monitoring to detect cybersecurity incidents promptly.",
141
  "controlCategory": "Detect",
142
  "readableControlId": "NIST 4",
143
- "severity": "High",
144
  "automationPlatforms": [],
145
  "criteria": [
146
  {
@@ -156,7 +156,7 @@
156
  "description": "Develop and implement a comprehensive incident response plan.",
157
  "controlCategory": "Respond",
158
  "readableControlId": "NIST 5",
159
- "severity": "High",
160
  "automationPlatforms": [],
161
  "criteria": [
162
  {
@@ -172,7 +172,7 @@
172
  "description": "Create and maintain a recovery strategy to restore operations after a cybersecurity incident.",
173
  "controlCategory": "Recover",
174
  "readableControlId": "NIST 6",
175
- "severity": "Medium",
176
  "automationPlatforms": [],
177
  "criteria": [
178
  {
 
92
  "description": "Maintain a detailed inventory of all organizational assets.",
93
  "controlCategory": "Identify",
94
  "readableControlId": "NIST 1",
95
+ "severity": "high",
96
  "automationPlatforms": [],
97
  "criteria": [
98
  {
 
108
  "description": "Implement strong user authentication mechanisms to prevent unauthorized access.",
109
  "controlCategory": "Protect",
110
  "readableControlId": "NIST 2",
111
+ "severity": "high",
112
  "automationPlatforms": [],
113
  "criteria": [
114
  {
 
124
  "description": "Develop and enforce access control policies to limit access to sensitive information.",
125
  "controlCategory": "Protect",
126
  "readableControlId": "NIST 3",
127
+ "severity": "medium",
128
  "automationPlatforms": [],
129
  "criteria": [
130
  {
 
140
  "description": "Establish continuous monitoring to detect cybersecurity incidents promptly.",
141
  "controlCategory": "Detect",
142
  "readableControlId": "NIST 4",
143
+ "severity": "high",
144
  "automationPlatforms": [],
145
  "criteria": [
146
  {
 
156
  "description": "Develop and implement a comprehensive incident response plan.",
157
  "controlCategory": "Respond",
158
  "readableControlId": "NIST 5",
159
+ "severity": "high",
160
  "automationPlatforms": [],
161
  "criteria": [
162
  {
 
172
  "description": "Create and maintain a recovery strategy to restore operations after a cybersecurity incident.",
173
  "controlCategory": "Recover",
174
  "readableControlId": "NIST 6",
175
+ "severity": "medium",
176
  "automationPlatforms": [],
177
  "criteria": [
178
  {