Menu

NIST Releases Preliminary Cybersecurity Framework for Critical Infrastructure Organizations

Business Transactions   |   Cybersecurity and Privacy   |   September 5, 2013
Download   
Share Page

In accordance with the President’s Executive Order on Cybersecurity, issued earlier this year, the National Institute of Standards and Technology ("NIST") is rapidly preparing a Cybersecurity Framework of best practices and guidelines intended to help organizations, particularly those considered part of the nation’s "critical infrastructure," improve their IT and data security.

While a full release of the Framework is not expected until October, NIST has released a preliminary draft to seek industry feedback before releasing the Framework for public comment. The preliminary draft is divided into four main sections. The first section is an introduction that provides the Framework’s context and rationale. The second section describes the Framework’s core functions, which are to identify, protect, detect, respond, and recover. Section two also discusses organizational implementation of the Framework core functions and is intended to help companies in critical infrastructure industries prioritize and manage risk. The third section provides guidance on how to use the Framework to implement and manage an effective data security program. It also provides a five-step example showing how an organization may use the Framework to develop or improve its cybersecurity program. The fourth and last section identifies the following areas of the Framework that need improvement:

  • Authentication
  • Automated Indicator Sharing
  • Conformity Assessment
  • Data Analytics
  • International Aspects, Impacts, Alignment
  • Privacy
  • Supply Chains and Interdependencies

Companies operating in the energy sector, finance and banking, health care, transportation, telecommunications, defense, and utilities must know that, while the Framework is considered "voluntary" and intended to supplement, not replace, an organization’s cyber risk management process, a non-conforming program will invite added regulatory scrutiny and possibly targeted malicious attacks. A full review of your organization’s cyber risk management program, privacy program, and data governance strategy is necessary to assess which areas are in compliance or exceed the standards of the Framework and which need improvement. A public discussion about the Framework is ongoing on Twitter with the hashtag #NISTCSF.

Our attorneys provide comprehensive counsel on matters related to information security, privacy, and data breach response.


©2019 Carlton Fields, P.A. Carlton Fields practices law in California through Carlton Fields, LLP. Carlton Fields publications should not be construed as legal advice on any specific facts or circumstances. The contents are intended for general information and educational purposes only, and should not be relied on as if it were advice about a particular fact situation. The distribution of this publication is not intended to create, and receipt of it does not constitute, an attorney-client relationship with Carlton Fields. This publication may not be quoted or referred to in any other publication or proceeding without the prior written consent of the firm, to be given or withheld at our discretion. To request reprint permission for any of our publications, please use our Contact Us form via the link below. The views set forth herein are the personal views of the author and do not necessarily reflect those of the firm. This site may contain hypertext links to information created and maintained by other entities. Carlton Fields does not control or guarantee the accuracy or completeness of this outside information, nor is the inclusion of a link to be intended as an endorsement of those outside sites.

Subscribe to Publications

Disclaimer

The information on this website is presented as a service for our clients and Internet users and is not intended to be legal advice, nor should you consider it as such. Although we welcome your inquiries, please keep in mind that merely contacting us will not establish an attorney-client relationship between us. Consequently, you should not convey any confidential information to us until a formal attorney-client relationship has been established. Please remember that electronic correspondence on the internet is not secure and that you should not include sensitive or confidential information in messages. With that in mind, we look forward to hearing from you.