Share via


NIST Cybersecurity Framework: Tools and References from Microsoft – Respond and Recover Functions

Sergey Tsygalnitsky

The National Institute of Standards and Technology (NIST) Cybersecurity Framework provides voluntary guidance – a set of industry standards and best practices – for reducing cybersecurity risks to critical infrastructure. Organizations that want to utilize the framework may find the task daunting at first, but it is helpful to remember that many of the subcategories in the framework can be accomplished with products and technologies they are already using.

Countless organizations around the globe rely on Microsoft technology to achieve their objectives. Understanding how Microsoft products and technologies relate to the NIST Cybersecurity Framework can help customers make significant progress in implementing it. After having several customers and partners ask me about utilizing the NIST Cybersecurity Framework, I’ve begun mapping Microsoft products and architectural references to subcategories of the framework. This is the final post in this series, addressing the Respond Function and the Recover Function.

Identify function mapping Protect function mapping Detect function mapping Learn more about the NIST Cybersecurity Framework Download the NIST Cybersecurity Framework PDF

Respond and Recover function mapping

About the mapping

In the tables below, I’ve mapped Microsoft products and architectural references to subcategories of the Respond and Recover functions in the Framework. The resources listed reflect product information and how-to documentation, and do not include Microsoft service offerings (for example, Premier or MCS). Where I’ve left subcategories blank, the activity should be covered by the implementing organization utilizing internal resources or third parties. For Microsoft partners, that white space is the opportunity to step in and provide much needed services.

If you have a resource to add to the list below, share your feedback with me in the Enterprise Security + Mobility Partners Yammer group.

Respond (RS)

Response Planning (RS.RP)

Response processes and procedures are executed and maintained, to ensure timely response to detected cybersecurity events.

RS.RP-1

Response plan is executed during or after an event

Communications (RS.CO)

Response activities are coordinated with internal and external stakeholders, as appropriate, to include external support from law enforcement agencies.

RS.CO-1

Personnel know their roles and order of operations when a response is needed

RS.CO-2Events are reported consistent with established criteria

RS.CO-3Information is shared consistent with response plans

RS.CO-4Coordination with stakeholders occurs consistent with response plans

RS.CO-5Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness

Analysis (RS.AN)

Analysis is conducted to ensure adequate response and support recovery activities.

RS.AN-1Notifications from detection systems are investigated

RS.AN-2The impact of the incident is understood

RS.AN-3Forensics are performed

RS.AN-4Incidents are categorized consistent with response plans

Mitigation (RS.MI)

Activities are performed to prevent expansion of an event, mitigate its effects, and eradicate the incident.

RS.MI-1Incidents are contained

RS.MI-2Incidents are mitigated

RS.MI-3Newly identified vulnerabilities are mitigated or documented as accepted risks

Improvements (RC.IM)

Recovery planning and processes are improved by incorporating lessons learned into future activities.

RS.IM-1Response plans incorporate lessons learned

RS.IM-2Response strategies are updated

Recover (RC)

Recovery Planning (RC.RP)

Recovery processes and procedures are executed and maintained to ensure timely restoration of systems or assets affected by cybersecurity events.

RC.RP-1Recovery plan is executed during or after an event

Improvements (RC.IM)

Recovery planning and processes are improved by incorporating lessons learned into future activities.

RC.IM-1Recovery plans incorporate lessons learned
RC.IM-2Recovery strategies are updated

Communications (RC.CO)

Restoration activities are coordinated with internal and external parties, such as coordinating centers, Internet Service Providers, owners of attacking systems, victims, other CSIRTs, and vendors.

RC.CO-1Public relations are managed
RC.CO-2Reputation after an event is repaired
RC.CO-3Recovery activities are communicated to internal stakeholders and executive and management teams

Microsoft security resources

Microsoft Trust Center Microsoft Cybersecurity website Microsoft Secure website