skip to main content
Skip header Section
Cybersecurity Framework Manufacturing Profile NISTIR 8183: NISTIR 8183 Sept 2017September 2017
Publisher:
  • CreateSpace Independent Publishing Platform
  • 7290 Investment Drive # B
  • North Charleston
  • SC
  • United States
ISBN:978-1-9765-2972-6
Published:18 September 2017
Pages:
64
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

Full Color, issued September 2017 This document provides the Cybersecurity Framework (CSF) implementation details developed for the manufacturing environment. The Manufacturing Profile of the Cybersecurity Framework can be used as a roadmap for reducing cybersecurity risk for manufacturers that is aligned with manufacturing sector goals and industry best practices. This Manufacturing Profile provides a voluntary, risk-based approach for managing cybersecurity activities and reducing cyber risk to manufacturing systems. The Manufacturing Profile is meant to enhance but not replace current cybersecurity standards and industry guidelines that the manufacturer is embracing. Why buy a book you can download for free? First you gotta find a good clean (legible) copy and make sure its the latest version (not always easy). Some documents found on the web are missing some pages or the image quality is so poor, they are difficult to read. We look over each document carefully and replace poor quality images by going back to the original source document. We proof each document to make sure its all there including all changes. If you find a good copy, you could print it using a network printer you share with 100 other people (typically its either out of paper or toner). If its just a 10-page document, no problem, but if its 250-pages, you will need to punch 3 holes in all those pages and put it in a 3-ring binder. Takes at least an hour. Its much more cost-effective to just order the latest version from Amazon.com This book is published by 4th Watch Books and includes copyright material. We publish compact, tightly-bound, full-size books (8 by 11 inches), with glossy covers. 4th Watch Books is a Service Disabled Veteran-Owned Small Business (SDVOSB). If you like the service we provide, please leave positive review on Amazon.com. For more titles published by 4th Watch Books, please visit: cybah.webplus.net A full copy of all the pertinent cybersecurity standards is available on DVD-ROM in the CyberSecurity Standards Library disc which is available at Amazon.com. NIST SP 800-12 An Introduction to Information Security NIST SP 800-18 Developing Security Plans for Federal Information Systems NIST SP 800-31 Intrusion Detection Systems NIST SP 800-34 Contingency Planning Guide for Federal Information Systems NIST SP 800-35 Guide to Information Technology Security Services NIST SP 800-39 Managing Information Security Risk NIST SP 800-40 Guide to Enterprise Patch Management Technologies NIST SP 800-41 Guidelines on Firewalls and Firewall Policy NIST SP 800-44 Guidelines on Securing Public Web Servers NIST SP 800-47 Security Guide for Interconnecting Information Technology Systems NIST SP 800-48 Guide to Securing Legacy IEEE 802.11 Wireless Networks NIST SP 800-53A Assessing Security and Privacy Controls NIST SP 800-61 Computer Security Incident Handling Guide NIST SP 800-77 Guide to IPsec VPNs NIST SP 800-83 Guide to Malware Incident Prevention and Handling for Desktops and Laptops NIST SP 800-92 Guide to Computer Security Log Management NIST SP 800-94 Guide to Intrusion Detection and Prevention Systems (IDPS) NIST SP 800-97 Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i NIST SP 800-137 Information Security Continuous Monitoring (ISCM) NIST SP 800-160 Systems Security Engineering

Contributors

Recommendations