Netspective Logo

NIST Resources

National Institute of Standards and Technology frameworks and publications

The National Institute of Standards and Technology (NIST) provides comprehensive frameworks, standards, and guidelines for cybersecurity, risk management, and software development. These resources are essential for organizations seeking to implement robust security practices.

NIST Cybersecurity Framework (CSF)

The NIST Cybersecurity Framework provides a structure for organizations to manage and reduce cybersecurity risk.

Framework Core Functions

┌─────────────────────────────────────────────────────────────────────────────┐
│                    NIST CYBERSECURITY FRAMEWORK                              │
└─────────────────────────────────────────────────────────────────────────────┘

┌─────────┐   ┌─────────┐   ┌─────────┐   ┌─────────┐   ┌─────────┐
│ IDENTIFY│──▶│ PROTECT │──▶│ DETECT  │──▶│ RESPOND │──▶│ RECOVER │
└─────────┘   └─────────┘   └─────────┘   └─────────┘   └─────────┘
     │             │             │             │             │
     ▼             ▼             ▼             ▼             ▼
  Asset        Access        Security      Incident      Recovery
  Management   Control       Monitoring    Response      Planning
  Risk Mgmt    Awareness     Detection     Analysis      Improvements
  Governance   Data Sec      Anomalies     Mitigation    Comms

Function Categories

FunctionPurposeKey Activities
IdentifyUnderstand cybersecurity riskAsset management, risk assessment
ProtectSafeguard critical servicesAccess control, awareness training
DetectIdentify cybersecurity eventsContinuous monitoring, detection
RespondTake action on detected eventsResponse planning, communications
RecoverRestore capabilitiesRecovery planning, improvements

Implementation Tiers

TierDescriptionCharacteristics
Tier 1PartialAd hoc, reactive
Tier 2Risk InformedRisk-aware, not org-wide
Tier 3RepeatableConsistent, formal policies
Tier 4AdaptiveContinuous improvement

NIST 800-53 Security Controls

NIST Special Publication 800-53 provides a catalog of security and privacy controls for federal information systems.

Control Families

IDFamilyDescription
ACAccess ControlWho can access what
ATAwareness and TrainingSecurity education
AUAudit and AccountabilityLogging and monitoring
CAAssessment, AuthorizationControl evaluation
CMConfiguration ManagementSecure configurations
CPContingency PlanningBusiness continuity
IAIdentification and AuthenticationIdentity verification
IRIncident ResponseSecurity incident handling
MAMaintenanceSystem maintenance
MPMedia ProtectionMedia handling
PEPhysical and EnvironmentalPhysical security
PLPlanningSecurity planning
PMProgram ManagementSecurity program
PSPersonnel SecurityPersonnel screening
RARisk AssessmentRisk identification
SASystem and Services AcquisitionSecure development
SCSystem and Communications ProtectionData protection
SISystem and Information IntegritySystem integrity
SRSupply Chain Risk ManagementSupply chain security

Control Baselines

Impact LevelControlsUse Case
Low~125 controlsLow-impact systems
Moderate~325 controlsMost federal systems
High~421 controlsCritical systems

NIST Risk Management Framework (RMF)

The RMF provides a structured process for managing security and privacy risk.

RMF Steps

┌─────────────────────────────────────────────────────────────────────────────┐
│                    RISK MANAGEMENT FRAMEWORK                                 │
└─────────────────────────────────────────────────────────────────────────────┘

    ┌───────────┐
    │ PREPARE   │  Establish context, priorities, resources
    └─────┬─────┘


    ┌───────────┐
    │CATEGORIZE │  Categorize system based on impact
    └─────┬─────┘


    ┌───────────┐
    │  SELECT   │  Select appropriate security controls
    └─────┬─────┘


    ┌───────────┐
    │ IMPLEMENT │  Implement and document controls
    └─────┬─────┘


    ┌───────────┐
    │  ASSESS   │  Assess control effectiveness
    └─────┬─────┘


    ┌───────────┐
    │ AUTHORIZE │  Authorize system operation
    └─────┬─────┘


    ┌───────────┐
    │  MONITOR  │  Continuously monitor controls
    └───────────┘

NIST 800-Series Publications

Key Publications

PublicationTitlePurpose
800-37Risk Management FrameworkRMF guidance
800-53Security and Privacy ControlsControl catalog
800-53AAssessing Security ControlsAssessment procedures
800-61Incident Handling GuideIncident response
800-63Digital Identity GuidelinesAuthentication
800-88Media SanitizationData destruction
800-115Technical Security TestingPenetration testing
800-171Protecting CUIContractor requirements

Software Development Publications

PublicationTitleUse Case
800-160 Vol. 1Systems Security EngineeringSecure system design
800-160 Vol. 2Cyber ResiliencySystem resilience
800-218Secure Software Development Framework (SSDF)DevSecOps

Secure Software Development Framework (SSDF)

NIST SP 800-218 defines practices for secure software development.

SSDF Practice Groups

GroupFocusPractices
Prepare (PO)Organization preparationDefine requirements, roles, tools
Protect (PS)Protect softwareSecure environments, code protection
Produce (PW)Produce secure softwareDesign, code, test securely
Respond (RV)Respond to vulnerabilitiesIdentify, remediate, disclose

Key Practices

SSDF_Practices:
  Prepare:
    - PO.1: Define security requirements
    - PO.2: Implement roles and responsibilities
    - PO.3: Implement supporting toolchains
    - PO.4: Define criteria for software security checks
    - PO.5: Implement and maintain secure environments

  Protect_Software:
    - PS.1: Protect all forms of code
    - PS.2: Provide software integrity verification
    - PS.3: Archive and protect release data

  Produce_Well_Secured:
    - PW.1: Design to meet security requirements
    - PW.2: Review software design
    - PW.4: Reuse secure software
    - PW.5: Create source code adhering to standards
    - PW.6: Configure compilation to secure code
    - PW.7: Review and analyze human-readable code
    - PW.8: Test executable code
    - PW.9: Configure software to have secure settings

  Respond_Vulnerabilities:
    - RV.1: Identify and confirm vulnerabilities
    - RV.2: Assess vulnerabilities
    - RV.3: Remediate vulnerabilities

Using NIST Resources in NUP

Mapping to NUP Phases

NUP PhaseNIST Resources
InceptionRisk Assessment (800-30), System Categorization
ElaborationControl Selection (800-53), Security Requirements
ConstructionSSDF Practices, Secure Coding
TransitionControl Assessment (800-53A), Authorization
OperationsContinuous Monitoring, Incident Response

Integration Points

  • Requirements: Map to NIST control requirements
  • Design: Apply 800-160 security engineering
  • Implementation: Follow SSDF practices
  • Testing: Use 800-115 testing guidance
  • Deployment: Complete RMF authorization
  • Operations: Implement continuous monitoring


Compliance

This section fulfills ISO 13485 requirements for regulatory requirements (4.1.1) and risk management (7.1), and ISO 27001 requirements for information security policies (A.5.1), compliance with legal requirements (A.5.31), and risk management (6.1).

View full compliance matrix

How is this guide?

Last updated on

On this page