Our Framework

Case Study Image

IDENTIFY

Perform a thorough Risk Analysis

The Identify Function assists in developing an organizational understanding to managing cybersecurity risk to systems, people, assets, data, and capabilities. Understanding the business context, the resources that support critical functions, and the related cybersecurity risks enables an organization to focus and prioritize its efforts, consistent with its risk management strategy and business needs.

PROTECT

Develop Policies and Procedures,
Implement Appropriate Access and Auditing Control

 The Protect Function outlines appropriate safeguards to ensure delivery of critical infrastructure services. The Protect Function supports the ability to limit or contain the impact of a potential cybersecurity event.

Case Study Image
Case Study Image

DETECT

Continuous Monitoring 24x7x365
Enable Auditing Capabilities

The Detect Function defines the appropriate activities to identify the occurrence of a cybersecurity event. The Detect Function enables timely discovery of cybersecurity events.

  • Ensuring Anomalies and Events are detected, and their potential impact is understood
  • Maintaining Detection Processes to provide awareness of anomalous events

RESPOND

Establish a robust Response plan.
Correlate, Analyze, Triage and Respond to Detected Events

The Respond Function includes appropriate activities to take action regarding a detected cybersecurity incident. The Respond Function supports the ability to contain the impact of a potential cybersecurity incident.

  • Ensuring Response Planning process are executed during and after an incident.
Case Study Image
Case Study Image

RECOVER

Institute a Recovery Plan.
Create Improvements to Prevent Future Attacks

The Recover Function identifies appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity incident. The Recover Function supports timely recovery to normal operations to reduce the impact from a cybersecurity incident.

  • Ensuring the organization implements Recovery Planning processes and procedures to restore systems and/or assets affected by cybersecurity incidents