NIST Cybersecurity Framework: Tools and References from Microsoft - Protect Function
The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides voluntary guidance – a set of industry standards and best practices – for reducing cybersecurity risks to critical infrastructure. Organizations that want to utilize the framework may find the task daunting at first, but it is helpful to remember that many of the subcategories in the framework can be accomplished with products and technologies they are already using.
Countless organizations around the globe rely on Microsoft technology to achieve their objectives. Understanding how Microsoft products and technologies relate to the NIST Cybersecurity Framework can help customers make significant progress in implementing it. After having several customers and partners ask me about utilizing the NIST Cybersecurity Framework, I’ve begun mapping Microsoft products and architectural references to subcategories of the Framework.
This post addresses the Protect function. Read my post about the Identify function mapping, and look for posts over the next few weeks covering the Detect, Respond, and Recover functions.
Protect function mapping
About the mapping
In the tables below, I’ve mapped Microsoft products and architectural references to subcategories of the Protect function in the Framework. The resources listed reflect product information and how-to documentation, and do not include Microsoft service offerings (for example, Premier or MCS). Where I’ve left subcategories blank, the activity should be covered by the implementing organization utilizing internal resources or third parties. For Microsoft partners, that white space is the opportunity to step in and provide much needed services.
If you have a resource to add to the list below, share your feedback with me in the Enterprise Security + Mobility Partners Yammer group.
Access Control (PR.AC)
Access to assets and associated facilities is limited to authorized users, processes, or devices, and to authorized activities and transactions.
Awareness and Training (PR.AT)
The organization’s personnel and partners are provided cybersecurity awareness education and are adequately trained to perform their information security-related duties and responsibilities consistent with related policies, procedures, and agreements.
|PR.AT-1All users are informed and trained|
|PR.AT-2Privileged users understand roles and responsibilities|
|PR.AT-3Third-party stakeholders such as suppliers, customers, and partners understand roles and responsibilities|
|PR.AT-4 Senior executives understand roles and responsibilities|
|PR.AT-5Physical and information security personnel understand roles and responsibilities|
Data Security (PR.DS)
Information and records (data) are managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and availability of information.
Information Protection Processes and Procedures (PR.IP)
Security policies (addressing purpose, scope, roles, responsibilities, management commitment, and coordination among organizational entities); processes; and procedures are maintained and used to manage protection of information systems and assets.
|PR.IP-1A baseline configuration of information technology/industrial control systems is created and maintained|
|PR.IP-2A System Development Life Cycle to manage systems is implemented|
|PR.IP-3Configuration change control processes are in place|
|PR.IP-4Backups of information are conducted, maintained, and tested periodically|
|PR.IP-5Policy and regulations regarding the physical operating environment for organizational assets are met|
|PR.IP-6Data is destroyed according to policy|
|PR.IP-7Protection processes are continuously improved|
|PR.IP-8Effectiveness of protection technologies is shared with appropriate parties|
|PR.IP-9Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed|
|PR.IP-10Response and recovery plans are tested|
|PR.IP-11Cybersecurity is included in human resources practices (for example, deprovisioning and personnel screening)|
|PR.IP-12A vulnerability management plan is developed and implemented|
Maintenance and repairs of industrial control and information system components is performed consistent with policies and procedures.
|PR.MA-1Maintenance and repair of organizational assets is performed and logged in a timely manner, with approved and controlled tools|
|PR.MA-2Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access|
Protective Technology (PR.PT)
Technical security solutions are managed to ensure the security and resilience of systems and assets, consistent with related policies, procedures, and agreements.
|PR.PT-1Audit/log records are determined, documented, implemented, and reviewed in accordance with policy||
|PR.PT-2Removable media is protected and its use restricted according to policy|
|PR.PT-3Access to systems and assets is controlled, incorporating the principle of least functionality|
|PR.PT-4Communications and control networks are protected|