Building a Robust Security Program Using the NIST Cybersecurity Framework

Nova Novriansyah
Novai-Cybersecurity 101
6 min readJul 23, 2024

In today’s digital age, cybersecurity is a paramount concern for organizations of all sizes. One effective way to establish a comprehensive security program is by utilizing the NIST Cybersecurity Framework (CSF). This framework provides a structured approach to managing cybersecurity risk, divided into five core functions: Identify, Protect, Detect, Respond, and Recover. In this article, we’ll walk through each function and illustrate how to build a robust security program using NIST CSF.

1. Identify (ID)

Objective: Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities.

Activities:

Asset Management (ID.AM):

  • Inventory all hardware and software assets.
  • Classify assets based on criticality and sensitivity.

Business Environment (ID.BE):

  • Understand the organization’s role in the supply chain.
  • Identify mission-critical services and their impact on operations.

Governance (ID.GV):

  • Establish cybersecurity policies, roles, and responsibilities.
  • Ensure compliance with relevant laws and regulations.

Risk Assessment (ID.RA):

  • Conduct regular risk assessments to identify potential threats and vulnerabilities.
  • Prioritize risks based on likelihood and impact.

Risk Management Strategy (ID.RM):

  • Develop a risk management strategy and action plan.
  • Align risk management practices with organizational goals.

2. Protect (PR)

Objective: Develop and implement appropriate safeguards to ensure the delivery of critical services.

Activities:

Identity Management and Access Control (PR.AC):

  • Implement multi-factor authentication for critical systems.
  • Define and enforce access control policies.

Awareness and Training (PR.AT):

  • Conduct regular security awareness training for all employees.
  • Provide specialized training for roles with elevated privileges.

Data Security (PR.DS):

  • Encrypt sensitive data in transit and at rest.
  • Implement data loss prevention (DLP) solutions.

Information Protection Processes and Procedures (PR.IP):

  • Develop and maintain incident response and recovery procedures.
  • Regularly update security policies and procedures.

Maintenance (PR.MA):

  • Ensure timely application of security patches and updates.
  • Regularly review and update security configurations.

Protective Technology (PR.PT):

  • Implement intrusion detection and prevention systems (IDS/IPS).
  • Use endpoint protection solutions and monitor network traffic.

3. Detect (DE)

Objective: Develop and implement appropriate activities to identify the occurrence of a cybersecurity event.

Activities:

Anomalies and Events (DE.AE):

  • Establish baseline behavior for network and system activities.
  • Detect and analyze deviations from the baseline.

Security Continuous Monitoring (DE.CM):

  • Continuously monitor network traffic, endpoints, and critical systems.
  • Use security information and event management (SIEM) tools.

Detection Processes (DE.DP):

  • Define and regularly review detection processes.
  • Ensure timely and accurate detection of cybersecurity events.

4. Respond (RS)

Objective: Develop and implement appropriate activities to take action regarding a detected cybersecurity incident.

Activities:

Response Planning (RS.RP):

  • Develop and maintain an incident response plan.
  • Define roles and responsibilities for incident response.

Communications (RS.CO):

  • Establish communication channels for internal and external stakeholders.
  • Report incidents to regulatory authorities as required.

Analysis (RS.AN):

  • Conduct root cause analysis of incidents.
  • Document findings and lessons learned.

Mitigation (RS.MI):

  • Implement measures to contain and eradicate threats.
  • Recover affected systems and data.

Improvements (RS.IM):

  • Review and update the incident response plan based on lessons learned.
  • Conduct post-incident reviews and improve response capabilities.

5. Recover (RC)

Objective: Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.

Activities:

Recovery Planning (RC.RP):

  • Develop and maintain a disaster recovery plan.
  • Define recovery time objectives (RTO) and recovery point objectives (RPO).

Improvements (RC.IM):

  • Review and update recovery plans based on lessons learned.
  • Conduct regular testing of recovery plans.

Communications (RC.CO):

  • Communicate recovery status to stakeholders.
  • Coordinate with external partners during recovery efforts.

Example Document: NIST Cybersecurity Framework Security Program for an E-commerce Company

Company Name: TokoMedia .

Industry: E-commerce

Objective: Implement a robust cybersecurity program based on the NIST Cybersecurity Framework to protect customer data, ensure the integrity of online transactions, and maintain compliance with regulatory requirements.

1. Identify (ID)

Objective: Develop an organizational understanding to manage cybersecurity risk to systems, people, assets, data, and capabilities.

Activities:

Asset Management (ID.AM):

  • Action: Inventory all hardware and software assets.
  • Details: Maintain a detailed list of servers, workstations, networking equipment, and software applications used in the company.
  • Owner: IT Manager
  • Frequency: Quarterly reviews

Business Environment (ID.BE):

  • Action: Understand Tokomedia role in the supply chain.
  • Details: Document critical business functions, including payment processing, order management, and customer support.
  • Owner: Business Operations Manager
  • Frequency: Annually

Governance (ID.GV):

  • Action: Establish cybersecurity policies, roles, and responsibilities.
  • Details: Develop and enforce policies on data protection, access control, and incident response.
  • Owner: Chief Information Security Officer (CISO)
  • Frequency: Semi-annually

Risk Assessment (ID.RA):

  • Action: Conduct regular risk assessments to identify potential threats and vulnerabilities.
  • Details: Evaluate risks related to online payment systems, customer data storage, and third-party integrations.
  • Owner: Risk Management Team
  • Frequency: Bi-annually

Risk Management Strategy (ID.RM):

  • Action: Develop a risk management strategy and action plan.
  • Details: Implement risk mitigation measures and prioritize actions based on risk impact.
  • Owner: CISO
  • Frequency: Annually

2. Protect (PR)

Objective: Develop and implement appropriate safeguards to ensure the delivery of critical services.

Activities:

Identity Management and Access Control (PR.AC):

  • Action: Implement multi-factor authentication for critical systems.
  • Details: Enforce MFA for access to administrative dashboards and financial data.
  • Owner: IT Security Team
  • Frequency: Continuous

Awareness and Training (PR.AT):

  • Action: Conduct regular security awareness training for all employees.
  • Details: Train staff on phishing, password hygiene, and data protection.
  • Owner: HR and IT Security Team
  • Frequency: Quarterly

Data Security (PR.DS):

  • Action: Encrypt sensitive data in transit and at rest.
  • Details: Use TLS for data transmission and AES-256 for data storage encryption.
  • Owner: Database Administrator
  • Frequency: Continuous

Information Protection Processes and Procedures (PR.IP):

  • Action: Develop and maintain incident response and recovery procedures.
  • Details: Create a detailed incident response plan and conduct regular drills.
  • Owner: IT Security Team
  • Frequency: Annually

Maintenance (PR.MA):

  • Action: Ensure timely application of security patches and updates.
  • Details: Regularly update software and firmware to address known vulnerabilities.
  • Owner: IT Operations
  • Frequency: Monthly

Protective Technology (PR.PT):

  • Action: Implement intrusion detection and prevention systems (IDS/IPS).
  • Details: Monitor network traffic and endpoints for suspicious activities.
  • Owner: IT Security Team
  • Frequency: Continuous

3. Detect (DE)

Objective: Develop and implement appropriate activities to identify the occurrence of a cybersecurity event.

Activities:

Anomalies and Events (DE.AE):

  • Action: Establish baseline behavior for network and system activities.
  • Details: Define normal activity patterns and detect anomalies.
  • Owner: IT Security Team
  • Frequency: Continuous

Security Continuous Monitoring (DE.CM):

  • Action: Continuously monitor network traffic, endpoints, and critical systems.
  • Details: Use SIEM tools to aggregate and analyze security logs.
  • Owner: IT Security Team
  • Frequency: Continuous

Detection Processes (DE.DP):

  • Action: Define and regularly review detection processes.
  • Details: Ensure detection methods are updated with the latest threat intelligence.
  • Owner: IT Security Team
  • Frequency: Quarterly

4. Respond (RS)

Objective: Develop and implement appropriate activities to take action regarding a detected cybersecurity incident.

Activities:

Response Planning (RS.RP):

  • Action: Develop and maintain an incident response plan.
  • Details: Define procedures for handling different types of security incidents.
  • Owner: IT Security Team
  • Frequency: Annually

Communications (RS.CO):

  • Action: Establish communication channels for internal and external stakeholders.
  • Details: Ensure timely and effective communication during incidents.
  • Owner: Corporate Communications
  • Frequency: As needed

Analysis (RS.AN):

  • Action: Conduct root cause analysis of incidents.
  • Details: Investigate incidents to identify causes and preventive measures.
  • Owner: IT Security Team
  • Frequency: Post-incident

Mitigation (RS.MI):

  • Action: Implement measures to contain and eradicate threats.
  • Details: Take immediate action to limit the impact of incidents.
  • Owner: IT Security Team
  • Frequency: As needed

Improvements (RS.IM):

  • Action: Review and update the incident response plan based on lessons learned.
  • Details: Conduct post-incident reviews to improve response capabilities.
  • Owner: IT Security Team
  • Frequency: Post-incident

5. Recover (RC)

Objective: Develop and implement appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.

Activities:

Recovery Planning (RC.RP):

  • Action: Develop and maintain a disaster recovery plan.
  • Details: Define RTO and RPO for critical systems and data.
  • Owner: IT Operations
  • Frequency: Annually

Improvements (RC.IM):

  • Action: Review and update recovery plans based on lessons learned.
  • Details: Regularly test and refine recovery plans to ensure effectiveness.
  • Owner: IT Operations
  • Frequency: Annually

Communications (RC.CO):

  • Action: Communicate recovery status to stakeholders.
  • Details: Provide regular updates to customers, partners, and regulatory bodies during recovery efforts.
  • Owner: Corporate Communications
  • Frequency: As needed

By implementing this security program based on the NIST Cybersecurity Framework, TokoMedia . can ensure a structured and comprehensive approach to managing cybersecurity risks. This program not only helps in protecting critical assets and data but also enhances the company’s resilience against potential cyber threats.

By following the NIST Cybersecurity Framework, organizations can build a resilient security program that effectively identifies, protects, detects, responds to, and recovers from cybersecurity threats. Implementing these structured activities ensures that all aspects of cybersecurity are covered, providing a robust defense against potential attacks.

Whether you’re just starting to develop your cybersecurity program or looking to enhance an existing one, the NIST CSF provides a comprehensive, adaptable, and practical approach to managing cybersecurity risk.

--

--

Nova Novriansyah
Novai-Cybersecurity 101

C|CISO, CEH, CC, CVA,CertBlockchainPractitioner, Google Machine Learning , Tensorflow, Unity Cert, Arduino Cert, AWS Arch Cert. CTO, IT leaders. Platform owners