This page cannot be added Show book (36 pages) Suggest pages
Manage your book
From LIMSWiki
Jump to navigationJump to searchBook Creator is undergoing changes
Due to severe issues with our existing system, the Book Creator will no longer support saving a book as a PDF.
Download single pages
While the Book Creator PDF rendering is disabled, you can try Download as PDF from the sidebar tools for individual articles.
Use drag & drop to reorder wiki pages and chapters
- About this book
- Introduction
- 1. What is a cybersecurity plan and why do you need it?
- 1.1 Cybersecurity planning and its value
- 2. What are the major regulations and standards dictating cybersecurity action?
- 2.1 Cybersecurity standards frameworks
- 3. Fitting a cybersecurity standards framework into a cybersecurity plan
- 3.1 How do cybersecurity controls and frameworks guide plan development?
- 4. NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework
- 4.1 NIST Cybersecurity Framework
- 5. Develop and create the cybersecurity plan
- 5.1 Develop strategic cybersecurity goals and define success
- 5.2 Define scope and responsibilities
- 5.3 Identify cybersecurity requirements and objectives
- 5.4 Establish performance indicators and associated time frames
- 5.5 Identify key stakeholders
- 5.6 Determine resource needs
- 5.7 Develop a communications plan
- 5.8 Develop a response and continuity plan
- 5.9 Establish how the overall cybersecurity plan will be implemented
- 5.10 Review progress
- 6. Closing remarks
- 6.1 Recap and closing
- Appendix 1. A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec
- Appendix 1.1 Access control
- Appendix 1.2 Awareness and training
- Appendix 1.3 Audit and accountability
- Appendix 1.4 Assessment, authorization, and monitoring
- Appendix 1.5 Configuration management
- Appendix 1.6 Contingency planning
- Appendix 1.7 Identification and authentication
- Appendix 1.8 Incident response
- Appendix 1.9 Maintenance
- Appendix 1.10 Media protection
- Appendix 1.11 Physical and environmental protection
- Appendix 1.12 Planning
- Appendix 1.13 Program management
- Appendix 1.14 Personnel security
- Appendix 1.15 Personally identifiable information processing and transparency
- Appendix 1.16 Risk assessment
- Appendix 1.17 System and services acquisition
- Appendix 1.18 System and communications protection
- Appendix 1.19 System and information integrity
- Appendix 1.20 Supply chain risk management
Download
To download your book choose a format and click the button.