Voluntary guidelines providing structure and guidance for organizations' cybersecurity programs, with specific frameworks for IoT and industrial control systems.
Core Components:
- Identify, Protect, Detect, Respond, and Recover functions
- Asset management and risk assessment requirements
- Security control implementation guidelines
- Supply chain risk management
- Continuous monitoring and vulnerability management
- Incident response and recovery procedures