What common process conducted by organizations when protecting digital assets is outside the scope of the NIST Cybersecurity Framework?
What defines who is accountable for contacting operational teams, managers, and others affected by a
localized, safety critical event?
The network security team in your company has discovered a threat that leaked partial data on a compromised file server that handles sensitive information. Containment must be initiated and addresses by the CSIRT.
Service disruption is not a concern because this server is used only to store files and does not hold any critical workload. Your company security policy required that all forensic information must be preserved.
Which actions should you take to stop data leakage and comply with requirements of the company security policy?
You need to review your current security baseline policy for your company and determine which security
controls need to be applied to the baseline and what changes have occurred since the last update.
Which category addresses this need?
sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=2ahUKEwjjw_fHytHgAhWvyqYKHXaVAWcQFjAAegQICRAC
&url=https%3A%2F%2Fwww.nist.gov%2Fdocument%2Fdraft-cybersecurity-framework-v11-
corexlsx&usg=AOvVaw2wFipKqwxx2QnhlcVB2A7g
Currently there are no comments in this discussion, be the first to comment!