An organization must protect its information from unauthorized access and disclosure. Data breaches large and small can have far-reaching operational, financial, and reputational impacts. The goal of this project is to provide a practical solution to detect, respond to, and recover from incidents that affect data confidentiality. The architecture described seeks to provide the technical capabilities needed by an organization to maintain full awareness of its data as well as mitigate the effects of a data breach. The implementation will include data and network monitoring, event detection, and other potential technologies. The project team will create a reference design and a detailed description of the practical steps needed to implement a secure solution based on standards and best practices. This project will result in a freely available NIST Cybersecurity Practice Guide.
An organization must protect its information from unauthorized access and disclosure. Data breaches large and small can have far-reaching operational, financial, and reputational impacts. The goal of this project is to provide a practical solution to detect, respond to, and recover from incidents...
See full abstract
An organization must protect its information from unauthorized access and disclosure. Data breaches large and small can have far-reaching operational, financial, and reputational impacts. The goal of this project is to provide a practical solution to detect, respond to, and recover from incidents that affect data confidentiality. The architecture described seeks to provide the technical capabilities needed by an organization to maintain full awareness of its data as well as mitigate the effects of a data breach. The implementation will include data and network monitoring, event detection, and other potential technologies. The project team will create a reference design and a detailed description of the practical steps needed to implement a secure solution based on standards and best practices. This project will result in a freely available NIST Cybersecurity Practice Guide.
Hide full abstract