Cybersecurity

NIST-CSF: Cybersecurity Framework (CSF)

This library of Cybersecurity Playbooks provides a set of fully loaded and editable templates that represent the core of what is generally required by management (including process owners), boards of directors and their audit committees, as well as internal and external auditors of relevant organizations, to document, assess, test, report and oversee the design and operating effectiveness of the typical key internal controls on which management is reliant to maintain compliance with Cybersecurity regulatory requirements.

They are drawn from a range of authoritative sources including the National Institute of Standards and Technology (NIST), the Federal Financial Institutions Examination Council's (FFIEC), the Department of Defense, the SEC's Office of Compliance Inspections and Examinations (OCIE), and the New York Department of Financial Services (NYDFS).

Download the Playbook

Unlock access to a wealth of information.

What is the ENIST-CSF: Cybersecurity Framework (CSF) Playbook?

The NIST-CSF: Cybersecurity Framework (CSF) Playbook enables organizations – regardless of size, degree of cybersecurity risk, or cybersecurity sophistication – to apply the principles and best practices of risk management to improving security and resilience.

An organization without an existing cybersecurity program can use the Framework as a reference to establish one.

The NIST CSF Playbook is a risk-based Framework based on International Standards and consists of:

  • 5 Functions (Identify, Protect, Detect, Respond, Recover)
  • 23 Categories (subdivisions of a Function into groups of cybersecurity outcomes)
  • 108 Subcategories (supporting achievement of the outcomes in each Category)
  • Informative References:
    • NIST SP 800-53
    • ISO/IEC 27001:2013
    • COBIT 5
    • CIS CSC
    • ISA 62443

Gallery

Previous
Next

You Also Get

fill-254-fill-255

Policy Document Template

These templates are designed to be a starting point for your clients, which can be tailored for your client's specific organizational needs.

fill-1137

Overview Flow Charts

A diagrammatic representation of the flow of assessment activities within your playbook.

fill-22-fill-24-fill-26

Instructions

Our instructions for use. These are the same for all our playbooks, once you know how to use one, you can use them all.

fill-22-fill-24-fill-26

Tutorial

A PowerPoint tutorial on the specific playbook, covering the most important aspects of this area of assessment.

One Subscription. 100+ Playbooks.

You know what your clients need, let us help you deliver.

Related Playbooks

Playgroup Icon

NIST-CSF: Cybersecurity Framework (CSF)

Preview
Playgroup Icon

The Cybersecurity Maturity Model (CMMC) Level 1

Preview
Playgroup Icon

Cybersecurity Maturity Model (CMMC) Level 3

Preview
Playgroup Icon

Cybersecurity Baseline Assessment (FFIEC)

Preview
Playgroup Icon

Cybersecurity (NYDFS 23 NYCRR 500)

Preview

What are they saying?

Learn more about the many benefits our Playbooks have offered organisations like yours.

Based on Authoritative Sources

Sign up for our newsletter and get the best of GRC Playbook straight to your inbox.
Leo-logo ERDF ESF