CHAPTER 11: AN OVERVIEW OF THE CRF PROCESSES
Part 3 – by far the longest part of this book – goes into a wide range of security processes (all taken from the CRF) you might need to implement. For ease of reference, this chapter offers a short description for each of the 24 processes within our CRF, giving you a better idea of which ones you should look at further.
To break the Framework down, there are four process categories, with each process falling within one of them. Each category describes how its processes fit within the overall Framework. The four categories are:
1.Manage and protect:
Deploy risk-appropriate information security measures – relying on people, processes and technology – to protect the confidentiality, integrity and availability ...
Get The Cyber Security Handbook – Prepare for, respond to and recover from cyber attacks now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.