Identify: Develop an understanding of processes and assets in order to better manage cybersecurity risk to systems, assets, data, and capabilities. An organizational understanding will help ensure the proper flow of data and better identify vulnerabilities before they become an issue.
Protect: Implement safeguards to protect the delivery of services. Manage access to assets and information by securely protecting devices, managing vulnerabilities, and conducting regular backups.
Detect: Develop appropriate processes to alert you to the occurrence of a cybersecurity event. Test detection processes and understand the expected flow of data.
Respond: Create response plans to take action in the event of a cybersecurity incident. Regularly update response plans and coordinate with key stakeholders.
Recover: Communicate plans for resilience and create a plan to restore impaired capabilities or services.