Select a category to get started

Identify

The Identify Function assists in developing an organizational understanding to managing cybersecurity risk to systems, people, assets, data, and capabilities.

asset management

Business alignment

risk management

governance

compliance

Protect

The Protect Function outlines appropriate safeguards to ensure delivery of critical infrastructure services.

Access control

Awareness and training

Data security

Processes and procedures

Maintanance

Protective technology

Detect

The Detect Function defines the appropriate activities to identify the occurrence of a cybersecurity event.

Anomalies and events

security continuous monitoring

Detection processes

Respond

The Respond Function includes appropriate activities to take action regarding a detected cybersecurity incident.

Response planning

Response communications

Recover

The Recover Function identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident.

Disaster recovery

Business continuity

Crisis management