About Lesson
The NIST Cybersecurity Framework (CSF) emphasizes the use of cryptography across several of its core functions:
-
Protect:
- Data Security (PR.DS): Recommends the use of encryption to protect sensitive data both at rest and in transit.
- Identity Management and Access Control (PR.AC): Suggests cryptographic techniques for user authentication and access controls, such as multifactor authentication and digital certificates.
-
Identify:
- Asset Management (ID.AM): Cryptographic keys are considered critical assets that need to be inventoried and managed securely.
-
Detect:
- Anomalies and Events (DE.AE): Cryptographic integrity checks can help detect unauthorized changes to data.
-
Respond and Recover:
- Response Planning (RS.RP): Cryptographic measures can ensure secure communication during incident response.
- Recovery Planning (RC.RP): Encrypted backups and cryptographic key recovery mechanisms support data restoration.