Last updated 1 year ago
The Protect Function supports the ability to limit or contain the impact of a potential cybersecurity event.
Vulnerability Mangement
A continuous process of identifying, assessing, prioritizing and mitigating weaknesses in IT systems to prevent cyber attacks.
Identity and Access Management (IAM)
An introduction to identity and access management (IAM), its importance, how it works, NIST CSF IAM control categories, and resources for further reading.
Zero Trust
Zero Trust, its guiding principles, and how it can be implemented through a Zero Trust Architecture. It also lists various technologies that can assist in deploying Zero Trust and discusses the Zero Trust Maturity Model.