{"id":58144,"date":"2022-05-03T11:35:19","date_gmt":"2022-05-03T06:05:19","guid":{"rendered":"https:\/\/www.the-next-tech.com\/?p=58144"},"modified":"2022-05-03T11:35:19","modified_gmt":"2022-05-03T06:05:19","slug":"what-to-know-about-nist-compliance","status":"publish","type":"post","link":"https:\/\/www.the-next-tech.com\/security\/what-to-know-about-nist-compliance\/","title":{"rendered":"What to Know About NIST Compliance"},"content":{"rendered":"<p>The NIST Cybersecurity Framework is a collection of guidelines for reducing cybersecurity risks, which is published by the U.S. National Institute of Standards and Technology.<\/p>\n<p>For businesses that have to be compliant, the best way to do so is the use of a <a href=\"https:\/\/www.sseinc.com\/nist\/\" target=\"_blank\" rel=\"noopener\">proven technology stack of hardware and software tools<\/a>. Before an organization can get to that point, though, they need to understand the Framework, why it\u2019s used, and how to generally be compliant.<\/p>\n<p>Below is an explanation of NIST compliance and its implications.<\/p>\n<h2>The Basics<\/h2>\n<p>NIST compliance broadly refers to complying with one, or more than one, of the NIST publications. NIST is the National Institute of Standards and Technology, a division of the Department of Commerce. The goal of the NIST is to set technology-related standards and, in particular, controls for cybersecurity.<\/p>\n<p>The standards are meant as a way to <a href=\"https:\/\/www.the-next-tech.com\/blockchain-technology\/best-6-blockchain-protocols-to-consider-for-2022\/\">ensure uniform cybersecurity protocols<\/a> and efforts across all government agencies and also businesses that work with the federal government.<\/p>\n<p>What\u2019s meant by compliance differs based on the particular NIST publication.<\/p>\n<p>Any company that works with the federal supply chain must be NIST compliant. This includes prime contractors, subcontractors, and subcontractors who are working for another subcontractor.<\/p>\n<p>Some companies opt to comply with the standards even when they\u2019re outside <a href=\"https:\/\/www.the-next-tech.com\/supply-chain-management\/how-can-digital-transformation-in-supply-chain-management\/\">the federal supply chain<\/a> because it puts in place best practices for protecting their business data.<\/p>\n<p>When an organization is NIST compliant, they have a framework to protect data and information, keeping it secure and safe while also protecting critical infrastructure from internal and external threats. The guidelines apply to all data from businesses that provide services to the federal government.<\/p>\n<p>If an organization works with <a href=\"https:\/\/www.the-next-tech.com\/finance\/financial-benefits-of-surety-bonds-in-small-business\/\">the federal government<\/a> and they\u2019re not compliant, it could lose its ability to do business with these agencies.<\/p>\n<p>When compliant with NIST, an organization is also better able to be compliant with other regulations in their industry or governmental regulations.<\/p>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/review\/seamless-ai\/\">Seamless AI Review: Features, Pricing, & Getting Started (2024 Guide)<\/a><\/span>\n<h2>Small Business NIST Compliance<\/h2>\n<p>Although it\u2019s often associated exclusively with federal agencies and manufacturers, small and medium-sized businesses also benefit from NIST compliance.<\/p>\n<p>According to the NIST <a href=\"https:\/\/www.the-next-tech.com\/security\/4-ideas-for-small-business-owners-can-improve-on-their-cybersecurity\/\">Small Business Cybersecurity<\/a> Act, the NIST is required to publish resources that can help small businesses voluntarily identify, assess and manage their cybersecurity risks.<\/p>\n<p>The resources have to be technology-neutral and as much as possible based on international standards. They also have to be able to vary depending on the size and industry of the small business and how sensitive collected data is. They should be consistent with national cybersecurity programs under the Cybersecurity Enhancement Act of 2014.<\/p>\n<p>Due to this Act, NIST created the Small Business Cybersecurity Corner with resources, including a guide to the fundamentals based on <a href=\"https:\/\/www.the-next-tech.com\/security\/what-the-cybersecurity-executive-order-means-for-the-private-sector\/\">the Cybersecurity Framework<\/a>.<br \/>\n<!-- Home page 728x90 --><br \/>\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\" style=\"display: inline-block; width: 728px; height: 90px;\" data-ad-client=\"ca-pub-9864771813712812\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<h2>What is the NIST Cybersecurity Framework?<\/h2>\n<p>The NIST Cybersecurity Framework or CSF is a risk management framework that\u2019s the most widely adopted of the NIST publications. The Framework was initially made for U.S. <a href=\"https:\/\/www.the-next-tech.com\/security\/important-security-trends-for-the-workplace-for-2022\/\">critical infrastructure sectors<\/a>, but now organizations often rely on it to reduce cybersecurity risks broadly.<\/p>\n<p>The CSF doesn\u2019t recommend standards or concepts, nor does it recommend technologies. Rather, it collects the best practices related to cybersecurity from standards bodies, including not only the NIST but also the International Standards Organization (ISO).<\/p>\n<p>Five key areas are used to evaluate cybersecurity controls according to the Framework.<\/p>\n<p>These are identified, protect, detect, respond to, and recover.<\/p>\n<p>These areas are meant to be inclusive of <a href=\"https:\/\/www.the-next-tech.com\/artificial-intelligence\/iot-cybersecurity-solutions-and-strategy\/\">the entire lifecycle of cybersecurity risk<\/a>. Every area has categories that associate with particular activities and needs, and the categories are broken into subcategories as well as standards, guidelines, and the practices needed to achieve category-specific outcomes.<\/p>\n<p>Gartner reports as many as 50% of American companies and organizations use the NIST cybersecurity framework, and it\u2019s also growing in popularity outside the U.S.<\/p>\n<p>More details about <a href=\"https:\/\/www.the-next-tech.com\/development\/how-to-make-your-app-successful-a-detailed-step-by-step-guide\/\">the Framework are detailed<\/a> below.<\/p>\n<span class=\"seethis_lik\"><span>Also read:<\/span> <a href=\"https:\/\/www.the-next-tech.com\/top-10\/the-10-best-job-search-websites\/\">Top 10 Job Search Websites of 2024<\/a><\/span>\n<h2>Identify<\/h2>\n<p>The goal of this function is to help organizations develop an understanding that allows them to appropriately assess their risks to assets, data, capabilities, and systems.<\/p>\n<p>This includes:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.the-next-tech.com\/business\/5-crucial-features-your-enterprise-risk-management-software-must-have\/\">Asset management encompasses<\/a> everything that allows an organization to achieve its business purposes.<\/li>\n<li>Business environment including stakeholders and activities. This is the information that an organization uses to inform its cybersecurity roles and responsibilities as well as decisions related to risk management.<\/li>\n<li>Governance includes the processes and procedures that are used for the management and monitoring of the regulatory, legal, and operational environments.<\/li>\n<li>Risk assessment ensures an organization understands the risk that it faces in terms of organizational operations and assets as well as individuals.<\/li>\n<li>Risk management strategies encompass priorities, assumptions, and constraints that are used in support of risk-related decisions.<\/li>\n<li><a href=\"https:\/\/www.the-next-tech.com\/supply-chain-management\/how-can-digital-transformation-in-supply-chain-management\/\">Supply chain risk management<\/a> includes all the decision-making associated with the management of risk related to the supply chain.<\/li>\n<\/ul>\n<p><script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\" style=\"display: inline-block; width: 728px; height: 90px;\" data-ad-client=\"ca-pub-9864771813712812\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<h2>Protect<\/h2>\n<p>The Framework includes <a href=\"https:\/\/www.the-next-tech.com\/machine-learning\/how-can-ai-and-ml-implement-automation-in-digital-onboarding\/\">the development and implementation<\/a> of particular safeguards to make sure that there\u2019s a delivery of critical services.<\/p>\n<p>This includes:<\/p>\n<ul>\n<li>Access control, making sure access to assets is available only to authorized devices, processes, and users.<\/li>\n<li>Awareness and training are how not only employees and staff are trained, but also partners. Everyone involved needs cybersecurity awareness training, and they need to receive specific training that allows them to carry out their duties and responsibilities that comply with cybersecurity policies.<\/li>\n<li>Data security includes how information and data are maintained.<\/li>\n<li><a href=\"https:\/\/www.the-next-tech.com\/development\/tech-disruptions-and-transformations-to-set-the-tone-of-realty\/\">Information protection processes and procedures<\/a> include how security policies, processes, and procedures are maintained.<\/li>\n<li>Maintenance is what\u2019s required to make sure that everything is performed consistently.<\/li>\n<li>Protective technology is the solution that is used to make sure there\u2019s compliance.<\/li>\n<\/ul>\n<p><script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\" style=\"display: inline-block; width: 728px; height: 90px;\" data-ad-client=\"ca-pub-9864771813712812\"><\/ins><br \/>\n<script>\n(adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<h2>Detect<\/h2>\n<p>According to the NIST Framework, organizations need to <a href=\"https:\/\/www.the-next-tech.com\/business\/how-to-develop-your-business-with-the-help-of-a-social-network-such-as-instagram\/\">develop and accordingly implement<\/a> activities to identify a potential cybersecurity event. This can include detecting anomalous activity in a timely manner and security continuous monitoring.<\/p>\n<p>Finally, <a href=\"https:\/\/www.the-next-tech.com\/development\/top-10-web-development-frameworks-for-2022\/\">other elements of the Framework<\/a> are Response, meaning the development and implementation of the needed activities to take action following the detection of an event and Recover. Recover is the development and implementation of activities to stay resilient and restore capabilities and continuity after a cybersecurity event.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The NIST Cybersecurity Framework is a collection of guidelines for reducing cybersecurity risks, which is published by the U.S. National<\/p>\n","protected":false},"author":1373,"featured_media":58146,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[49],"tags":[600,12914,3287,12913,12915,10893],"_links":{"self":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/58144"}],"collection":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/users\/1373"}],"replies":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/comments?post=58144"}],"version-history":[{"count":1,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/58144\/revisions"}],"predecessor-version":[{"id":58145,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/posts\/58144\/revisions\/58145"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media\/58146"}],"wp:attachment":[{"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/media?parent=58144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/categories?post=58144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.the-next-tech.com\/rest\/wp\/v2\/tags?post=58144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}