Nist CSF Guide
Nist CSF Guide
02
Table of content
The NIST Cybersecurity Framework 04
Components framework 06
Parting thoughts 37
About ManageEngine 37
01
Disclaimer
Copyright © Zoho Corporation Pvt. Ltd. All rights reserved. ManageEngine makes no warranties, express, implied, or
This material and its contents (“Material”) are intended, among statutory, and assumes no responsibility or liability as to the
other things, to present a general overview of how you can information in this Material. You may not copy, reproduce,
use ManageEngine’s products and services to implement distribute, publish, display, perform, modify, create derivative
the NIST Cybersecurity Framework in your organization. Full works, transmit, or in any way exploit the Material without
implementation of the NIST Cybersecurity Framework requires ManageEngine’s express written permission.
a variety of solutions, processes, people, and technologies.
The ManageEngine logo and all other ManageEngine marks
The solutions mentioned in this Material are some of the ways are registered trademarks of Zoho Corporation Pvt. Ltd. Any
in which IT management tools can help with some of the NIST other names of software products or companies referred to
Cybersecurity Framework implementation. Coupled with other in this Material, and not expressly mentioned herein, are the
appropriate solutions, processes, and people, ManageEngine’s trademarks of their respective owners. Names and characters
solutions help organizations implement the NIST Cybersecurity used in this Material are either the products of the author’s
Framework. This Material is provided for informational imagination or used in a fictitious manner. Any resemblance to
purposes only and should not be considered as legal advice for actual persons, living or dead, is purely coincidental.
implementing the NIST Cybersecurity Framework.
03
02
The NIST Cybersecurity
Framework
With the evolving cybersecurity threat landscape, organizations Today, it has been widely implemented in private and public
are racing to find and implement effective cybersecurity sectors across organizational departments and around the
solutions that help them manage and mitigate security risks globe. Organizations, regardless of their size and industry,
preemptively. can leverage the best practices outlined in the framework
to understand, manage, and mitigate the cybersecurity risks
The National Institute of Standards and Technology (NIST) associated with their data and networks.
developed a framework that could bolster the critical
infrastructure of the US, as per the Cybersecurity Enhancement The NIST Cybersecurity Framework offers guidelines and
Act of 2014. standards to manage cybersecurity risks across an entire
organization or its critical infrastructures. The framework offers
The framework was originally imagined as a cybersecurity risk organizations a flexible, repeatable, and cost-effective approach
management system for the critical infrastructures of the US. towards managing cybersecurity risks on a voluntary basis.
04
01
The benefits of implementing the
NIST Cybersecurity Framework
Strengthen cybersecurity posture: easily as the framework references multiple standards for its
Organizations can discover their current security posture and implementation.
prioritize opportunities to strengthen it by taking guidance from
the informative references outlined in the framework. Maximize ROI:
Focus on critical service delivery components to make
Measure organizational risks: the implementation process cost-effective by reprioritizing
Assess risks objectively and formulate an action plan considering resources.
the budget and resources available to bring risks within tolerance
levels. Become risk-informed:
Transform reactive cybersecurity practices to an agile, risk-
Comply with global standards: informed approach, and continuously adapt to the evolving
Comply with other existing global standards and mandates threat landscape.
05
02
Components of the
framework
06
01
Framework core
The framework core consists of key risk management activities Identify: Understand and identify important systems, people,
that pave the way for organizations to realize cybersecurity assets, and data and their associated risks to manage
outcomes that align with their business objectives. This cybersecurity.
outcome-driven approach allows for tailor-made action plans
to meet business requirements. Protect: Implement appropriate safeguards to protect the
critical infrastructure and resources of an organization.
The core comprises five concurrent functions and offers a
holistic strategy to understand potential security threats, Detect: Monitor systems continuously to discover the
mitigate their impact, and recover from any business occurrence of a cybersecurity incident or anomaly promptly.
disruptions.can leverage the best practices outlined in the
framework to understand, Respond: Take actions against a detected cybersecurity
attack and limit its impact.
Functions are not meant to be a serial path to a desired state
but to be performed concurrently and continuously to develop Recover: Ensure business continuity and undertake recovery
an organizational culture that addresses emerging activities to restore business operations.
cybersecurity risks.
07
02
Framework
implementation tiers
The implementation tiers illustrate the degree to which an organization’s established
cybersecurity program reflects the characteristics outlined in the framework. It helps in
understanding the scope of cybersecurity practices established to manage risks.
08
01
Framework profile
The framework profile represents an organization’s desired cybersecurity program. Based on the priority and estimated
target cybersecurity posture. An organization can develop its cost of the corrective efforts, organizations can plan for
profile by selecting all the most important outcomes based cybersecurity improvement measures.
on its business goals, risk tolerances, and resources from the
categories and subcategories of the framework core. Organizations can use the framework profile to communicate
the cybersecurity requirements that their partners and external
By creating a current profile and comparing it with the target stakeholders, who deliver critical products and services, need
profile, organizations can identify opportunities to improve their to meet in order to keep their supply chain secure.
09
02
How can ManageEngine
help you implement the
NIST Cybersecurity
Framework?
10
01
Identify:
11
02
Category Subcategory How ManageEngine solutions can help you
DataSecurity Plus:
Locate sensitive personal data within files and catalog it.
12
01
Category Subcategory How ManageEngine solutions can help you
Log360:
Track and monitor the sanctioned and unsanctioned applications in your cloud
with an integrated CASB.
ID.AM-5: PAM360:
Access business-critical resources securely as per assigned privilege level.
Resources (e.g., hardware, devices, Classify critical and business-value resources using a CMDB.
data, time, personnel, and software)
are prioritized based on their classifica- AD360:
tion, criticality, and business value Identify user record changes in the HRMS database and automatically modify
corresponding user data in Active Directory.
Endpoint Central:
Configure policy settings on endpoints to restrict user actions and access to
applications based on the assigned user privilege, which is based on
department or role.
01
13
02
Category Subcategory How ManageEngine solutions can help you
ID.AM-6: PAM360:
Allow the workforce, third-party stakeholders, and external vendors to access
Cybersecurity roles and responsibilities organizational resources securely.
for the entire workforce and third-party
stakeholders (e.g., suppliers, Endpoint Central:
customers, partners) are established Map users to customizable roles with a prescribed set of activities and access
permissions based on the requirements.
01
14
01
Category Subcategory How ManageEngine solutions can help you
ID.GV-3 Log360:
Simplify compliance management with audit-ready report templates for PCI
Cyber threat intelligence is received DSS, HIPAA, FISMA, CCPA, the GDPR, and more.
from information sharing forums
ID.RA-2: Log360:
Leverage STIX, TAXII , and AlienVault OTX format threat feeds to discover
Cyber threat intelligence is received malicious IPs, domains, and URLs.
from information sharing forums
Vulnerability Manager Plus:
Prioritize threat response based on news feeds with vulnerabilities that
attackers are exploiting.
01
15
02
Category Subcategory How ManageEngine solutions can help you
ID.RA-3: Log360:
Detect malicious software, services, and processes on endpoints and serv-
Threats, both internal and external, are ers. Mitigate insider threats and account compromise with UEBA. Maintain a
identified and documented tamper-proof log archive to ensure log data from Windows, syslogs, and other
applications is secured for future forensic analysis and audits.
Firewall Analyzer:
Analyze firewall security logs to identify network breach attempts and attacks
such as a virus, a Trojan, and denial-of-service.
ID.RA-5: Log360:
Identify the impact of potential risks from rogue users and entities with UEBA
Threats, vulnerabilities, likelihoods, and and flag the anomalies.
impacts are used to determine risk
Vulnerability Manager Plus:
Scan the assets in your networks to identify OS, third-party application, and
zero-day vulnerabilities. Understand the impact of the threats through the
severity ranking dashboard.
01
16
01
Category Subcategory How ManageEngine solutions can help you
ID.RA-5: Log360:
Identify the impact of potential risks from rogue users and entities with UEBA
Threats, vulnerabilities, likelihoods, and and flag the anomalies.
impacts are used to determine risk
Vulnerability Manager Plus:
Scan the assets in your networks to identify OS, third-party application, and
zero-day vulnerabilities. Understand the impact of the threats through the
severity ranking dashboard.
ID.RA-6: Log360:
Respond to internal and external threats effectively with a set of predefined
Risk responses are identified and actions by leveraging automated incident workflows.
prioritized
PAM360:
Assign trust scores to users and devices based on their security compliance,
and use policy-based access controls to process requests automatically and
take custom actions as per organization policies.
01
17
02
Protect:
18
01
Category Subcategory How ManageEngine solutions can help you
PR.AC-3: PAM360:
Allow privileged users to access remote hosts without any endpoint agents.
Remote access is managed Provision secure access to critical data center components through SSH,
Telnet, and RDP connections.
Endpoint Central:
Establish a secure, web-based connection to remote computers in the LAN
and WAN through VPN or internet.
PR.AC-4: PAM360:
Establish strict governance over privileged access pathways and critical in-
Access permissions and authorizations frastructure. Assign just-in-time controls and provision higher privileges only
are managed, incorporating the when required by users.
principles of least privilege and
separation of duties AD360:
Streamline identity access management tasks by imposing least privilege
access policies to users based on their roles and responsibilities.
01
19
02
Category Subcategory How ManageEngine solutions can help you
PR.AC-6: PAM360:
Onboard privileged user accounts into a secure vault mechanism that offers
Identities are proofed and bound to role-based access to the critical assets in the network.
credentials and asserted in interactions
AD360:
Streamline identity access management tasks by imposing least privilege
access policies to users based on their roles and responsibilities.
20
01
Category Subcategory How ManageEngine solutions can help you
PR.DS-2:
Key Manager Plus:
Manage SSH keys and digital certificates to ensure secure, encrypted data
Data-in-transit is protected
communication.
21
02
Category Subcategory How ManageEngine solutions can help you
01
22
01
Category Subcategory How ManageEngine solutions can help you
01
23
02
Category Subcategory How ManageEngine solutions can help you
PR.IP-5: PAM360:
Secure administrative access to critical systems through privileged pathways.
Policy and regulations regarding the
physical operating environment for Endpoint Central:
organizational assets are met Configure stringent passcode and device lock policies to protect corporate
assets.
24
01
Category Subcategory How ManageEngine solutions can help you
DataSecurity Plus:
Detect ransomware with threshold-based alerts by inspecting sudden spikes in
file rename and other change events. Shut down infected devices to contain
the ransomware spread in your network quickly.
25
02
Detect:
26
01
Category Subcategory How ManageEngine solutions can help you
NetFlow Analyzer:
Leverage the network behavior anomaly detection system to analyze server
traffic, diagnose network anomalies, and identify any threats in the network.
DataSecurity Plus:
Monitor file activities, data transfers, and application usage to spot anomalous
activities.
DE.AE-2: Log360:
Analyze and correlate logs with visual dashboards to discover security
Detected events are analyzed to incidents, attacks, and suspicious or malicious user behavior.
understand attack targets and
methods
DE.AE-3: Log360:
Collect and analyze event logs from the endpoints, servers, network devices,
Event data are collected and correlated and firewalls in your environment to spot security threats.
from multiple sources and sensors
27
02
Category Subcategory How ManageEngine solutions can help you
DE.AE-4: Log360:
Understand the impact of incidents by conducting post-attack analysis and
Impact of events is determined identify patterns to stop attacks through log forensics.
DE.AE-5: Log360:
Configure alert thresholds by selecting the number of anomalies, interval, and
Incident alert thresholds are time range that would trigger the alert.
established
DE.CM-3: Log360:
Monitor privileged user activities, data access, and network access, and
Personnel activity is monitored to receive real-time alerts for incidents.
detect potential cybersecurity events
28
01
Category Subcategory How ManageEngine solutions can help you
DE.CM-7: OpUtils:
Identify rogue device intrusions in the network and block access.
Monitoring for unauthorized personnel,
connections, devices, and software is Endpoint Central:
performed Limit cyberattacks by blocking non-business applications and malicious
executables.
Log360:
Discover the entire list of shadow IT applications in the network automatically
and track users requesting access to these applications.
Firewall Analyzer:
Send security alerts to admins through email or SMS on detection of
anomalous traffic behavior.
30
01
Category Subcategory How ManageEngine solutions can help you
Log360:
Automate and accelerate threat response through standard workflows, and
streamline incident management by integrating with ticketing tools.
ServiceDesk Plus:
Automate major incident workflows to improve resolution time and streamline
major incident management.
31
02
Category Subcategory How ManageEngine solutions can help you
Log360:
Conduct forensics analysis by identifying network and system anomalies.
33
02
Recover:
34
01
Category Subcategory How ManageEngine solutions can help you
35
02
Step1: Prioritize and define the scope
a cybersecurity
subcategories that are being achieved.
program?
management program, organizations must
assess the likelihood of a cybersecurity
event and the consequential impact on
business approach. Step 5: Create a target profile
The framework offers organizations a
repeatable set of actions that can be Based on their current profile and the possibility
of cybersecurity risks, organizations can
performed to design their cybersecurity
determine the chink in their armor. By focusing on
practices from scratch or build on their the area of vulnerability, the respective outcomes
existing program to tackle the evolving Step 6: Identify and prioritize gaps under categories and subcategories are noted
down to manage risks.
cyberthreat landscape
By comparing the current and target
profiles, organizations can determine the
efforts necessary to bridge the gap. By
formulating an action plan to address the Step 7: Implement an action plan
gap by outlining the budget, risk, benefit,
mission drivers, and resources, a Organizations can move towards their desired
cost-effective approach can be spelled target state with guidance from the informative
out with informed decisions.approach. references provided for the outcomes.
Organizations have the leeway to choose which
standards and guidelines better suit their
requirements. 36
01
Parting thoughts
As with any worthy endeavor, the implementation of the NIST Cybersecurity Framework is
more about improving your cybersecurity posture as evolving threats arise rather than racing
towards a definite finish line. Keeping your organization secure is an enduring and iterative
process that comprises risk assessment and implementation of best practices. The framework
acts as a compass that guides organizations in the right direction to plan and prioritize their
cybersecurity strategies.
37
02
About
ManageEngine
ManageEngine crafts the industry’s broadest suite of IT 280,000 companies around the world, including 9 of every 10
management software. We have everything you need—more Fortune 100 companies.
than 120 products and free tools—to manage all of your IT
operations, from networks and servers to applications, your As you prepare for the IT management challenges ahead,
service desk, AD, security, desktops, and mobile devices. we’ll lead the way with new solutions, contextual integrations,
and other advances that can only come from a company
Since 2002, IT teams like yours have turned to us for affordable, singularly dedicated to its customers. And as a division of Zoho
feature-rich software that’s easy to use. You can find our Corporation, we’ll continue pushing for the tight business-IT
on-premises and cloud solutions powering the IT of over alignment you’ll need to seize future opportunities.
38
01
Take control of
Enterprise service management IT operations management
Full-stack ITSM suite Network, server, and application performance
IT asset management with a CMDB
Knowledge base with user self-service
your IT. monitoring
Bandwidth monitoring with traffic analysis
Built-in and custom workflows Monitor, manage, and secure your Network change and configuration management
Orchestration of all IT management functions Application discovery and dependency mapping
digital enterprise with ManageEngine
Service management for all departments Cloud cost and infrastructure monitoring
Reporting and analytics End-user experience monitoring
DNS management
AlOps
Advanced IT analytics
Self-service IT analytics
Unified endpoint management and security Data visualization and business intelligence for IT
Desktop and mobile device management Hundreds of built-in reports and dashboards
Patch management ManageEngine crafts comprehensive IT Instant, flexible report creation
Endpoint device security management software for your business needs Out-of-the-box support for multiple data sources
OS and software deployment
Available for
Remote monitoring and management Enterprise IT | Managed service providers (MSPs)
Web browser security As
Self-hosted on-premises
Monitoring and control of peripheral devices Low-code app development
Self-hosted in public cloud (AWS, Azure)
Endpoint data loss prevention Zoho Cloud-native Custom solution builder
39
02
9 of every 10 Fortune 100 companies
trust us to manage their IT.
40
01
www.manageengine.com