Mapping the NIST Cybersecurity Framework to SearchLight: Eating our own BBQ

Mapping the NIST Cybersecurity Framework to SearchLight: Eating our own BBQ
Rick Holland
Read More From Rick Holland
September 10, 2019 | 2 Min Read

Back in February, I wrote about how we avoid the term “eat your own dog food” here at Digital Shadows, and use “eat our own BBQ” instead. I wrote, “BBQ sounds much better to me than dog food. Our team has a great service with SearchLight, and we need to take full advantage of it.” In short, eating our own BBQ means, I am a Digital Shadows customer too, and we use our offerings.

So, in this edition of “eat your own BBQ,” I want to share how we have mapped SearchLight to the NIST Cybersecurity Framework. The NIST CSF “is a risk-based approach to managing cybersecurity risk and is composed of three parts: The Framework Core, the Framework Implementation Tiers, and the Framework Profiles.” We have mapped eighteen of the Framework Core’s Function/Category/Subcategory to SearchLight & Shadow Search.

NIST cybersecurity framework

Figure 1. NIST CSF

 

This mapping will help you visualize where Digital Shadows fits into your overall security program. It will also help you map where Digital Shadows helps across the CSF’s: Identify, Protect, Detect, Respond, and Recover spectrum. You can also download the framework’s spreadsheet which includes our mapping as well.

Digital Shadows and the NIST Cyber Security Framework from Digital Shadows

Speaking of eating our own BBQ, here is some of my Labor Day lobster tail BBQ output:

Labor day bbq

 

To learn more about how Digital Shadows fits into your overall NIST Cybersecurity Framework strategy, you can try SearchLight for 7 days. Get started here.

Access Our Threat Intel In Test Drive

Test Drive SearchLight Free for 7 Days
Try It Now

Connect with us

Related Posts

Saving the SOC from overload by operationalizing digital risk protection

Saving the SOC from overload by operationalizing digital risk protection

August 5, 2020 | 4 Min Read

As you may have seen last week, the latest...
The story of Nulled: Old dog, new tricks

The story of Nulled: Old dog, new tricks

August 4, 2020 | 9 Min Read

It is often said that old dogs have a hard...
ShadowTalk Update – Garmin ransomware attack, QSnatch malware, and ShinyHunters Stage 2

ShadowTalk Update – Garmin ransomware attack, QSnatch malware, and ShinyHunters Stage 2

August 3, 2020 | 3 Min Read

This week it’s a full house with ShadowTalk...
Dark Web Travel Agencies Revisited: The Impact of Coronavirus on the Shadow Travel Industry

Dark Web Travel Agencies Revisited: The Impact of Coronavirus on the Shadow Travel Industry

July 29, 2020 | 10 Min Read

Back in February, Digital Shadows published...