GovWhitePapers Logo

Sorry, your browser is not compatible with this application. Please use the latest version of Google Chrome, Mozilla Firefox, Microsoft Edge or Safari.

Approaches for Federal Agencies to Use the Cybersecurity Framework

The document highlights examples for implementing the Framework for Improving Critical Infrastructure Cybersecurity (known as the Cybersecurity Framework) in a manner that complements the use of other NIST security and privacy risk management standards, guidelines, and practices. These examples include support for an Enterprise Risk Management (ERM) approach in alignment with OMB and FISMA requirements that agency heads “manage risk commensurate with the magnitude of harm that would result from unauthorized access, use, disclosure, disruption, modification, or destruction of a federal information system or federal information.”

The use of the Cybersecurity Framework’s components enable discussion about the various types of risk that might occur within federal organizations and promote conversations about how to determine the likelihood and potential consequences of risk events. These activities can then be combined with those described in NIST Special Publication (SP) 800-37, Revision 2, Risk Management Framework for Information Systems and Organizations; SP 800-39, Managing Information Security Risk; and other guidelines to form a comprehensive risk-based approach for security and privacy.

 

Interested in cybersecurity? Check out this GovWhitePapers blog post! You can also find events on cybersecurity on our sister site, GovEvents.

 

  • Author(s):
  • Matt Barrett
  • Jeff Marron
  • Victoria Yan Pillitteri
  • Jon Boyens
  • Stephen Quinn
  • Greg Witte
  • Larry Feldman
  • Share this:
  • Share on Facebook
  • Share on Twitter
  • Share via Email
  • Share on LinkedIn
Approaches for Federal Agencies to Use the Cybersecurity Framework
Format:
  • White Paper
Topics:
Website:Visit Publisher Website
Publisher:National Institute of Standards and Technology (NIST)
Published:March 1, 2020
License:Public Domain

Featured Content

Contact Publisher

Claim Content