| Identify | Asset Management | Inventory and Control of Hardware Assets |
| Identify | Asset Management | Inventory and Control of Software Assets |
| Identify | Asset Management | Data Inventory and Classification |
| Identify | Risk Assessment | Risk Assessment |
| Identify | Risk Assessment | Vulnerability Management |
| Protect | Access Control | Account Management |
| Protect | Access Control | Least Privilege |
| Protect | Awareness Training | Security Awareness and Training Programs |
| Protect | Data Security | Data Encryption |
| Protect | Data Security | Data Loss Prevention |
| Detect | Anomalies and Events | Intrusion Detection Systems |
| Detect | Anomalies and Events | Security Information and Event Management (SIEM) |
| Detect | Security Continuous Monitoring | Continuous Monitoring |
| Respond | Incident Response | Incident Response Plan |
| Respond | Incident Response | Incident Response Team |
| Respond | Communications | Communication Plan |
| Respond | Recovery Planning | Disaster Recovery Plan |
| Recover | Recovery Planning | Backup and Recovery |
| Recover | Recovery Planning | Business Continuity Plan |
Leave a comment