<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Column | ANDERN DMCC</title>
	<atom:link href="https://andern.ae/category/column/feed/" rel="self" type="application/rss+xml" />
	<link>https://andern.ae</link>
	<description></description>
	<lastBuildDate>Sun, 02 Oct 2022 09:11:55 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.0.2</generator>

<image>
	<url>https://andern.ae/wp-content/uploads/2022/10/cropped-LOGO-32x32.png</url>
	<title>Column | ANDERN DMCC</title>
	<link>https://andern.ae</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>[Security measures]Framework for thinking about security measures</title>
		<link>https://andern.ae/security-measures/</link>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 02 Oct 2022 08:48:34 +0000</pubDate>
				<category><![CDATA[Column]]></category>
		<guid isPermaLink="false">https://andern.ae/?p=56</guid>

					<description><![CDATA[What is Cyber Security Framework? In the coming era, cyber security measures will become more and more important, but when implementing cyber security measures, it will be a heavy burden to build measures from scratch. However, for transactions with government agencies such as the United States, it is becoming essential to take measures such as [&#8230;]]]></description>
										<content:encoded><![CDATA[
<h2>What is Cyber Security Framework? </h2>



<p>In the coming era, cyber security measures will become more and more important, but when implementing cyber security measures, it will be a heavy burden to build measures from scratch.</p>



<p>However, for transactions with government agencies such as the United States, it is becoming essential to take measures such as meeting certain security standards.</p>



<p>Therefore, the <strong><mark style="background-color:rgba(0, 0, 0, 0)" class="has-inline-color has-black-color"><span data-color="#f3e90b" style="background: linear-gradient(transparent 60%,rgba(243, 233, 11, 0.7) 0);" class="vk_highlighter">NIST Cyber Security Framework (CSF)</span></mark></strong> is published by the government agency "National Institute of Standards and Technology (NIST)" as a reference as a certain standard for security measures. These are the guidelines.</p>



<p>Nowadays, security measures based on the NIST cyber security framework are expanding outside the United States. The cybersecurity framework helps improve cybersecurity programs and includes CSF content, including defense-related industries, healthcare and financial services industries.</p>



<p>The NIST Cyber Security Framework (CSF) is consists of 5 functions: <strong><span data-color="#f0ec1c" style="background: linear-gradient(transparent 60%,rgba(240, 236, 28, 0.7) 0);" class="vk_highlighter">Identify</span></strong>、<strong><span data-color="#f0ec15" style="background: linear-gradient(transparent 60%,rgba(240, 236, 21, 0.7) 0);" class="vk_highlighter">Protect</span></strong>、<strong><span data-color="#f2ee1f" style="background: linear-gradient(transparent 60%,rgba(242, 238, 31, 0.7) 0);" class="vk_highlighter">Detect</span></strong>、<strong><span data-color="#e7e41a" style="background: linear-gradient(transparent 60%,rgba(231, 228, 26, 0.7) 0);" class="vk_highlighter">Respond</span></strong>、<strong><span data-color="#f5f214" style="background: linear-gradient(transparent 60%,rgba(245, 242, 20, 0.7) 0);" class="vk_highlighter">Recover</span></strong>, each function runs in parallel and continuously.<br>These five functions need to be considered together in order to capture the risk management cycle in an advanced and strategic manner in an organization's cyber security measures.</p>



<p></p>



<p></p>



<h3><span data-fontsize="21px" style="font-size: 21px;" class="vk_inline-font-size"><strong>IDENTIFY　</strong></span></h3>



<p>Develop an organizational understanding to manage cybersecurity risk to: systems, assets, data, and capabilities.</p>



<h3><strong><span data-fontsize="21px" style="font-size: 21px;" class="vk_inline-font-size">PROTECT </span></strong></h3>



<p>Develop and implement the appropriate safeguards to ensure delivery of services.</p>



<h3><strong><span data-fontsize="21px" style="font-size: 21px;" class="vk_inline-font-size">DETECT </span></strong></h3>



<p>Develop and implement the appropriate activities to identify the occurrence of a cyber security event.</p>



<h3><strong><span data-fontsize="21px" style="font-size: 21px;" class="vk_inline-font-size">RESPOND　</span></strong></h3>



<p>Develop and implement the appropriate activities to take action regarding a detected cyber security event.</p>



<h3><strong><span data-fontsize="21px" style="font-size: 21px;" class="vk_inline-font-size">RECOVER　</span></strong></h3>



<p>Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cyber security event.</p>



<p></p>



<p></p>



<h3>Benefits of complying with the cybersecurity framework</h3>



<p>Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cyber security event</p>



<p></p>



<p>※The charts used on this page are taken from the NIST CSF.<br>※Please refer to the original text for an accurate understanding of the content.<br>※We are not responsible for any problems that may occur based on the contents of this page.</p>



<p></p>



<blockquote class="wp-block-quote is-style-default"><p>Getting Started with the NISTCybersecurity Framework</p><cite><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1271.pdf">Getting Started with the NIST Cybersecurity Framework: A Quick Start Guide</a></cite></blockquote>



<p></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
