Access-control processes and restriction of elevated privileges
Protection from misuse of data in motion, in use, and at rest
Hardening of hardware, based on established standards
Understanding and management of vulnerabilities
Existence of communication and control network protections (firewalls, etc.)
Establishing the Identify and Protect Functions

Components of the cybersecurity program required to build a highly effective response program
Defined Cybersecurity Program
Cybersecurity shall relentlessly protect our patient’s health information by establishing effective, fundamental Identify and Protect capabilities and building world-class Detect, Response and Recover capabilities.
This healthcare provider example of a mission statement also describes the strategy for protecting patient information. The mission and purpose are to relentlessly protect patient information, and the strategy is focused on building fundamental identification and protection capabilities, then world-class detection, response, and recover capabilities. All of the preceding components (see Figure 2-1) are derived from subcategories within the NIST CSF.
After establishing the purpose and mission, the program is assessed and measured to determine the maturity and effectiveness of the current state. Measuring the current state drives the road map for meeting the mission. Using a three-year time horizon, annual objectives push the program forward. Creating accountability for the who, what, where, when, and how of achieving program objectives; forming subprograms; and achieving alignment with the mission come next.
A Programmatic Approach
Building cybersecurity programs leads to measurement and improvement actions that continue year over year. Domain thinking might lead to focusing on competencies and one-and-done approaches for certain capabilities. For example, the Protective Technology subcategory of the NIST CSF Protect category. Implementing firewalls managed by a security engineer could lead some to feel the network perimeter is sufficiently protected. No additional effort is required for this subcategory. Programs are continuous. Iterations, cycles, or sprints (the terms do not matter) occur with defined milestones. Once those milestones are met, new ones are created. In terms of a cybersecurity program, the hope is that milestones become more incremental as the program matures.
Identifying Programs

Examples of individual cybersecurity programs within the ABC Cybersecurity Program
An incident response program is an essential component of a cybersecurity program. Each CSF component serves to make the others better and able to meet the cybersecurity organization’s objectives. As outlined earlier in the chapter, an incident response program will not meet its objectives if programs such as access management, data protection, information protection, and all others are not following effective program management.
How Does Each Program Support Incident Response ?

Examples of how each cybersecurity program within an entity supports incident response. Deficiencies in each program reduce the effectiveness of the incident response program.
Summary
Prior to acting on the desire to build a best-in-class incident response program, it is necessary to establish the capabilities outlined in the Identify and Protect Functions of the NIST CSF. These NIST CSF functions, as part of cybersecurity programs supporting the incident response program, must be fundamentally effective. Without governance, risk management, asset management, network protection, threat management, access management, change control, training and awareness, and business continuity/disaster recovery, it is nearly impossible for the incident response program to be effective. Each of the programs outlined executes key activities required for incident response to be effective. Without these, the potential for incident response to meet the entity’s needs is limited.