1 min read

NIST CSF 2.0 Baseline Now Available

NIST CSF 2.0 Baseline Now Available
NIST CSF 2.0 Baseline Now Available
2:12

We are pleased to announce the availability of the NIST CSF 2.0 Baseline on the CloudCapsule platform.

Partners and Clients can now compare assessment results against the NIST standard, clearly identifying areas that are compliant, and controls that may need improvement, whether that be a technical control or a policy element.

 

Understanding NIST CSF 2.0

The NIST Cybersecurity Framework (CSF) 2.0 is a comprehensive guide designed to help organizations manage and reduce cybersecurity risks. It provides a structured approach to identifying, assessing, and mitigating cybersecurity threats through a set of high-level outcomes and best practices.

The framework is adaptable to organizations of any size, sector, or maturity level, making it widely applicable across various industries. By using the NIST CSF 2.0, businesses can better understand their cybersecurity posture, prioritize their efforts, and communicate their strategies effectively.

This framework does not prescribe specific solutions but links to resources that offer detailed guidance on achieving desired cybersecurity outcomes, thereby enhancing overall resilience and security.

 
Getting Started with the NIST Baseline

Follow these simple steps to use the NIST CSF 2.0 Baseline in your assessments.

  • Login to CloudCapsule and choose the tenant or run a new assessment by entering the domain or tenant ID
  • Once the scan completes, click on Baselines on the navigation menu
  • Choose NIST CSF from the Baseline choices above the radar graph

NIST Radar Graph

 
Overview of NIST Functions

Scroll down to review the NIST Overview and click on any gauge or individual pass/fail/assumed risk indicator for more detailed information.

NIST Overview Screen

 
Review Individual Control Details

Simply click on an individual control for more information on results, suggested remediation, and impacted elements.

NIST Control

 
Augment Compliance

Augment the controls with your own evidence, 3rd party coverage, and/or assumed risk.

NIST Augmentation

 
Learn More

For more information on NIST, please see the following links:

 https://www.nist.gov/cyberframework

 https://csrc.nist.gov/pubs/cswp/29/the-nist-cybersecurity-framework-csf-20/final

Token Theft Playbook: Incident Response

17 min read

Token Theft Playbook: Incident Response

Token theft is one of the fastest growing attack methods. Lately, I talk to one customer or MSP a week that has had some form of breach that...

Read More
Deploy Attack Surface Reduction Rules from Microsoft Intune

5 min read

Deploy Attack Surface Reduction Rules from Microsoft Intune

Have you ever opened a seemingly harmless Word document, only to have it trigger a script that could have encrypted your entire device? What...

Read More
Australian Datacenter & Essential 8 Baseline Now Available

2 min read

Australian Datacenter & Essential 8 Baseline Now Available

CloudCapsule Available in Australian Datacenter Based on client feedback, we've expanded our datacenter presence to include an Australian location...

Read More