Cybersecurity Functions (Part 1)

Recently, I was asked to detail the functions of Cybersecurity and our responsibilities. This led to me thinking, “What a wonderful prompt for a blog.”

Fundamentally, cybersecurity is a practice that seeks to ensure the availability, integrity, and confidentiality of computers, electronic communications systems and services, and the information contained within. NIST SP 800-53 Rev. 5 includes authentication and nonrepudiation as a part of the definition. However, most people know of what is referred to as the triad, or confidentiality, integrity, and availability of systems and the information within.

In truth, the role of cybersecurity in an organization is to enable the functions of the business and its systems while ensuring proper and adequate security.

In jest, many think of cybersecurity as the ‘blockers’ or the ‘no guy’ (or gal) in an organization. Unfortunately, that reputation has been earned honestly by well-intentioned and poorly executed practices.

In truth, the role of cybersecurity in an organization is to enable the functions of the business and its systems while ensuring proper and adequate security. Many opinions and frameworks define proper and adequate security, and they are well-meaning. Still, I will focus on the leading standard in the industry, the National Institute of Standards and Technology (NIST) Cybersecurity Framework.

Applying cybersecurity functions is a constantly evolving practice with considerations to laws, regulations, policies, standards, and business needs.

At the highest level, there are six functions of cybersecurity. These are (1) Govern, (2) Identify, (3) Protect, (4) Detect, (5) Respond, and (6) Recover. Though presented as a list, the functions should be considered and addressed together. Additionally, applying these functions is not a static set of rules and controls nor singular in size or scope. Applying cybersecurity functions is a constantly evolving practice with considerations to laws, regulations, policies, standards, and business needs.

NIST outlines two states or profiles of cybersecurity for organizations. These are current and target profiles. The remainder of this series will address each of the primary functions, focusing on target profiles. I will integrate concerns with privacy since this is what most organizations are constantly trying to define. Additionally, I will approach the discussion focusing on Zero Trust Architecture, which is currently the leading architecture within the industry.

In part two, I will begin with the govern function and cover the definition, a couple of use cases, and roles within cybersecurity.


How do you define the role of cybersecurity? Comment below!


Posted

in

,

by

Tags:

Comments

2 responses to “Cybersecurity Functions (Part 1)”

  1. […] Cybersecurity Functions (Part 1) – Cyber Muster […]

  2. […] Cybersecurity requires understanding an organization’s mission, vision, and strategy and apply… […]