Governance: Roles, Responsibilities, and Authorities: GV.RR: Cybersecurity roles and responsibilities are coordinated and aligned with internal […]
Governance: Policy GV.PO: Policy Organizational cybersecurity policy is established and communicated Establishment and communication of the […]
Identify>Asset Management>ID.AM-5: Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their […]
Identify: Governance: ID. GV-4: Governance and risk management processes address cybersecurity risks Addressing cybersecurity risks begins […]
Identify>Asset Management>External information systems are catalogued No systems can exist in isolation. Don’t get taken advantage […]
Identify>Asset Management>ID.AM-1 Physical Devices and Systems Within the Organization Are Inventoried There’s a battle going on […]
Identify>Asset Management>ID.AM-2 Software Platforms and Applications Within the Organization are Inventoried Every new piece of software […]