Bibliotecas de prompts para GRC

Biblioteca de prompts para el NIST Cybersecurity Framework

Acerca de esta biblioteca de prompts

Esta biblioteca de prompts ayuda a las organizaciones a implementar el NIST Cybersecurity Framework (CSF) 2.0, un marco voluntario para gestionar riesgos de ciberseguridad. Utilice estos prompts con ISMS Copilot para desarrollar o mejorar su programa de ciberseguridad alineado con las seis funciones principales del Marco.

El NIST CSF 2.0 (lanzado en 2024) se expande de cinco a seis funciones con la adición de "Gobernar" (Govern) y enfatiza la integración con la gestión de riesgos empresariales y la seguridad de la cadena de suministro.

Implementación del Marco

Evaluación del Perfil Actual

Assess our current cybersecurity posture using the NIST CSF 2.0 framework:

Organization context:
- Industry: [critical infrastructure sector or other]
- Organization size: [employees, locations, revenue]
- Risk environment: [threat landscape, regulatory requirements]
- Current security maturity: [basic/developing/mature/advanced]

For each CSF 2.0 function, assess current state:

GOVERN (GV): Cybersecurity risk management strategy, roles, policies
- GV.OC: Organizational context and risk management strategy
- GV.RM: Risk management strategy integrated with enterprise risk
- GV.RR: Roles, responsibilities, and authorities
- GV.PO: Policy, processes, and procedures
- GV.OV: Cybersecurity supply chain risk management

IDENTIFY (ID): Understanding assets, risks, and vulnerabilities
- ID.AM: Asset management (inventory, classification)
- ID.RA: Risk assessment (threat, vulnerability, impact)
- ID.IM: Improvement (lessons learned, continuous improvement)

PROTECT (PR): Safeguards to limit impact
- PR.AA: Identity management and access control
- PR.AT: Awareness and training
- PR.DS: Data security (protection at rest and in transit)
- PR.PS: Platform security (secure configuration, maintenance)
- PR.IR: Technology infrastructure resilience

DETECT (DE): Activities to discover cybersecurity events
- DE.CM: Continuous monitoring
- DE.AE: Adverse event analysis

RESPOND (RS): Actions upon detected cybersecurity incident
- RS.MA: Incident management
- RS.AN: Incident analysis
- RS.MI: Incident mitigation
- RS.CO: Incident reporting and communication

RECOVER (RC): Plans for resilience and restoration
- RC.RP: Recovery planning
- RC.CO: Recovery communications

For each category and subcategory relevant to our organization:
- Current Implementation Tier (0=Not Implemented, 1=Partial, 2=Risk Informed, 3=Repeatable, 4=Adaptive)
- Evidence of implementation (policies, procedures, tools, controls)
- Gaps and weaknesses
- Priority for improvement (Critical/High/Medium/Low)

Summarize overall maturity by function and provide prioritized improvement roadmap.

Desarrollo del Perfil Objetivo

Define our target cybersecurity posture (Target Profile) using NIST CSF 2.0:

Strategic context:
- Business objectives: [growth, digital transformation, new markets, M&A]
- Risk appetite: [conservative/moderate/aggressive]
- Regulatory drivers: [compliance requirements]
- Threat landscape: [specific threats we face]
- Resource constraints: [budget, staff, expertise]
- Timeline: [1 year, 3 years, 5 years]

For each CSF function and category:
- Target Implementation Tier (desired maturity level)
- Rationale for target tier (why this level is appropriate for our risk)
- Priority outcomes and informative references to implement
- Estimated resources and timeline
- Dependencies and prerequisites

Create a Target Profile that balances risk reduction with business enablement and resource reality.

Address specific focus areas:
- Govern: Enhance board-level cybersecurity oversight, integrate with ERM
- Identify: Complete asset inventory, conduct annual risk assessments
- Protect: Implement zero trust architecture, deploy MFA universally
- Detect: Deploy EDR/SIEM, establish 24/7 SOC or MDR service
- Respond: Develop incident playbooks, conduct tabletop exercises
- Recover: Achieve [RTO/RPO targets], test DR quarterly

Provide gap analysis: Current vs. Target Profile, highlighting priority improvements to close gaps.

Función GOBERNAR (GOVERN)

Marco de gobernanza de ciberseguridad

Establish cybersecurity governance per NIST CSF 2.0 GOVERN function:

GV.OC: Organizational Context
- Mission and objectives: [our business mission and how cybersecurity supports it]
- Critical assets and functions: [what must be protected]
- Legal, regulatory, contractual requirements: [GDPR, HIPAA, PCI DSS, contractual SLAs]
- Stakeholders: [customers, regulators, partners, board]

GV.RM: Risk Management Strategy
- Cybersecurity risk appetite statement: [acceptable vs. unacceptable risks]
- Integration with enterprise risk management (ERM)
- Risk assessment methodology and frequency
- Risk treatment priorities and criteria
- Risk reporting to executive leadership and board

GV.RR: Roles, Responsibilities, Authorities
- CISO or equivalent: [role, reporting line, authority]
- Security team structure: [SOC, GRC, engineering, etc.]
- Business unit responsibilities: [what business owns]
- Board oversight: [board committee, meeting frequency, reporting]
- Third-party roles: [MSSPs, consultants, auditors]

GV.PO: Policies, Processes, Procedures
- Information security policy framework
- Acceptable use, access control, data protection, incident response policies
- Procedure documentation and maintenance
- Policy approval and review cycle

GV.OV: Cybersecurity Supply Chain Risk Management
- Supply chain risk management policy
- Supplier security requirements
- Vendor risk assessment and monitoring
- Contractual security clauses
- Software supply chain security (SBOM, dependency scanning)

Create governance charter, RACI matrix, and policy framework document.

Función IDENTIFICAR (IDENTIFY)

Gestión y clasificación de activos

Implement asset management per NIST CSF ID.AM:

ID.AM-01: Inventory of physical devices and systems
- Servers, workstations, mobile devices, network equipment, IoT
- Asset attributes: owner, location, function, criticality
- Automated discovery tools: [CMDB, asset management platform]

ID.AM-02: Inventory of software platforms and applications
- Operating systems, applications, SaaS subscriptions
- Software licenses and versions
- End-of-life tracking

ID.AM-03: Organizational communication and data flows
- Network diagrams and data flow maps
- External information systems and connections
- Communication paths and protocols

ID.AM-04: External information systems
- Cloud services (IaaS, PaaS, SaaS)
- Partners and interconnected organizations
- Data sharing agreements

ID.AM-05: Resources (hardware, devices, data, personnel) prioritized
- Criticality classification (Tier 1 critical, Tier 2 important, Tier 3 routine)
- Business impact if unavailable
- Data classification (public, internal, confidential, restricted)

Create comprehensive asset register with criticality ratings and ownership for our environment:
[Describe infrastructure, applications, data, users]

Map to Informative References: ISO 27001 A.8.1, CIS Controls 1-2, NIST SP 800-53 CM-8

Programa de evaluación de riesgos

Develop risk assessment program per NIST CSF ID.RA:

ID.RA-01: Asset vulnerabilities identified and documented
- Vulnerability scanning (internal, external, application)
- Penetration testing (frequency: [annual/biannual])
- Security assessments and audits
- Vulnerability remediation SLAs (Critical: X days, High: Y days)

ID.RA-02: Cyber threat intelligence received from information sharing forums
- Threat intelligence sources: [ISACs, vendor feeds, open source]
- Threat intelligence analysis and integration
- Sharing of threat indicators with peers and authorities

ID.RA-03: Threats (internal and external) identified and documented
- Threat modeling for critical assets and applications
- Attack scenarios (ransomware, phishing, insider threat, supply chain)
- Adversary tactics, techniques, and procedures (MITRE ATT&CK)

ID.RA-04 to ID.RA-07: Impact analysis
- Potential impacts identified and documented (confidentiality, integrity, availability)
- Likelihood determination
- Risk assessment (likelihood x impact)
- Risk response and treatment decisions
- Residual risk acceptance

ID.RA-08 to ID.RA-10: Continuous improvement
- Lessons learned from incidents and exercises
- Risk assessment updates based on changes (new systems, threats, business)
- Risk profile communicated to stakeholders

Our risk assessment approach:
- Methodology: [qualitative/quantitative/hybrid]
- Frequency: [annual formal assessment, continuous monitoring]
- Scope: [all systems, critical systems, specific projects]
- Tools: [risk assessment software, GRC platforms]

Create risk register, assessment procedures, and reporting templates.

Función PROTEGER (PROTECT)

Gestión de identidad y acceso

Implement identity and access control per NIST CSF PR.AA:

PR.AA-01: Identities and credentials managed for users, services, hardware
- User provisioning/deprovisioning (joiner/mover/leaver process)
- Service accounts and API keys management
- Device and certificate management
- Identity lifecycle management

PR.AA-02: Identities authenticated
- Multi-factor authentication (MFA) for [all users / remote access / privileged accounts]
- Authentication technologies: [SSO, SAML, OAuth, FIDO2]
- Password policies (length, complexity, no forced rotation per NIST 800-63B)
- Passwordless authentication strategy

PR.AA-03 to PR.AA-06: Access authorization and management
- Role-based access control (RBAC) or attribute-based access control (ABAC)
- Least privilege enforcement
- Privileged access management (PAM) for administrative accounts
- Access reviews (frequency: [quarterly/annual])
- Access request and approval workflow
- Segregation of duties for sensitive functions

PR.AA-07: Federated identity and attribute sharing
- SSO implementation: [Okta, Azure AD, Google Workspace]
- Federated access for partners and customers
- Attribute-based access control for cloud resources

Our environment:
- User count: [employees, contractors, customers]
- Identity systems: [Active Directory, Entra ID, Okta, custom]
- Privileged users: [number, roles]
- Critical systems requiring enhanced access controls: [list]

Create IAM policy, provisioning procedures, and access control matrix.

Protección de datos

Implement data security measures per NIST CSF PR.DS:

PR.DS-01: Data-at-rest protected
- Encryption standards: [AES-256, TDE for databases]
- Full disk encryption for endpoints
- Encryption of backups and archives
- Key management and rotation

PR.DS-02: Data-in-transit protected
- TLS 1.2+ for web traffic
- VPN for remote access: [IPsec, WireGuard]
- Encrypted email (S/MIME, PGP) for sensitive communications
- Secure file transfer (SFTP, FTPS)

PR.DS-03 to PR.DS-05: Asset and configuration management
- Asset disposal and media sanitization (wiping, destruction)
- Secure configuration baselines (CIS Benchmarks, vendor hardening guides)
- Configuration management and change control
- Protection against unauthorized changes (FIM, version control)

PR.DS-06 to PR.DS-08: Data integrity and availability
- Integrity checking mechanisms (hashing, digital signatures)
- Separation of development, test, and production environments
- Backup and restoration procedures (frequency, retention, testing)

PR.DS-09 to PR.DS-11: Data protection monitoring and compliance
- Data loss prevention (DLP) for sensitive data
- Monitoring for unauthorized data exfiltration
- Data protection compliance (GDPR, CCPA, HIPAA)

Our data landscape:
- Data types and classification: [customer PII, payment data, proprietary IP, public]
- Storage locations: [on-prem databases, cloud storage, SaaS applications]
- Data flows: [collection, processing, sharing, retention]

Create data protection policy, encryption standards, and DLP rules.

Función DETECTAR (DETECT)

Programa de monitoreo continuo

Establish continuous monitoring per NIST CSF DE.CM:

DE.CM-01 to DE.CM-03: Network and system monitoring
- Network monitoring (traffic analysis, IDS/IPS)
- System monitoring (event logs, performance, configurations)
- Physical environment monitoring (if applicable: data centers, facilities)

DE.CM-04 to DE.CM-05: Malicious activity detection
- Malicious code detection (antivirus, EDR)
- Unauthorized mobile code, hardware, software detection
- Anomaly and behavioral analysis (UEBA)

DE.CM-06 to DE.CM-09: Monitoring capabilities and coverage
- External service provider monitoring (vendor security, SLA compliance)
- Vulnerability monitoring and scanning (continuous, not just periodic)
- Baseline configurations for monitoring (normal vs. anomalous)
- Comprehensive coverage of all critical assets

Monitoring architecture:
- Log sources: [servers, network devices, applications, cloud, endpoints]
- Centralized logging: [SIEM platform, log management]
- Monitoring tools: [EDR, NDR, SIEM, vulnerability scanners]
- Coverage: [24/7 SOC, business hours, automated alerting]

Monitoring use cases and alerts:
- Failed authentication attempts (brute force, credential stuffing)
- Privilege escalation
- Lateral movement indicators
- Data exfiltration patterns
- Malware and ransomware indicators
- Configuration changes to critical systems
- Vulnerability exploitation attempts

Create monitoring policy, use case library, alert tuning procedures, and escalation matrix.

Análisis de eventos adversos

Implement adverse event analysis per NIST CSF DE.AE:

DE.AE-01: Baseline of network operations and expected data flows
- Normal traffic patterns and baselines
- Expected user behaviors
- Typical system performance and resource usage

DE.AE-02 to DE.AE-04: Event detection and correlation
- Detected events analyzed to understand attack targets and methods
- Event correlation across multiple sources (SIEM correlation rules)
- Impact of events determined (severity, scope, affected assets)

DE.AE-05 to DE.AE-08: Alerting and response
- Incident alert thresholds defined (when to escalate to incident)
- Incident declared and documented when thresholds met
- Information shared with stakeholders per communication plan
- Detection processes tested and improved

Our detection capabilities:
- SIEM: [platform, log sources, correlation rules]
- Threat intelligence integration: [feeds, IOC matching]
- Analysis team: [SOC analysts, tier 1/2/3 structure, or MSSP]
- Alert volume and false positive rate: [current state]

Create event analysis playbook:
- Alert triage procedures
- Investigation steps by alert type
- Escalation criteria (when alert becomes incident)
- Documentation requirements
- Continuous improvement (alert tuning, new detections)

Map to MITRE ATT&CK for detection coverage across tactics and techniques.

Función RESPONDER (RESPOND)

Programa de gestión de incidentes

Develop incident management per NIST CSF RS.MA:

RS.MA-01 to RS.MA-02: Incident response plan and execution
- Incident response plan documented and approved
- Incident response roles and responsibilities (incident commander, technical, communications, legal)
- Incident response execution per plan
- Incident handling procedures (detection, analysis, containment, eradication, recovery)

RS.MA-03 to RS.MA-05: Communication and stakeholder management
- Incident information shared with relevant stakeholders (internal, customers, regulators, law enforcement)
- Coordination with internal and external stakeholders
- Voluntary information sharing with external communities (ISACs, threat intelligence groups)

Incident response framework:

1. Preparation
- Incident response team: [members, on-call rotation]
- Tools and resources: [forensic tools, backup systems, communication channels]
- Incident response playbooks by scenario (ransomware, data breach, DDoS, insider threat)

2. Detection and Analysis
- Incident detection sources (monitoring alerts, user reports, threat intel)
- Incident classification and severity (Critical/High/Medium/Low)
- Initial analysis and scoping

3. Containment, Eradication, Recovery
- Short-term containment (isolate affected systems)
- Long-term containment (patching, hardening)
- Eradication (remove malware, close vulnerabilities, remove attacker access)
- Recovery and restoration (rebuild systems, restore from clean backups, return to normal operations)

4. Post-Incident Activity
- Lessons learned review (what worked, what didn't, how to improve)
- Evidence retention for legal and regulatory purposes
- Update threat intelligence and detection rules

Our incident response context:
- Incident history: [types and frequency of incidents we've faced]
- MTTR: [current mean time to resolve]
- Communication requirements: [breach notification laws, customer SLAs]

Create incident response plan, playbooks for common scenarios, communication templates, and training schedule (tabletop exercises, simulations).

Función RECUPERAR (RECOVER)

Planificación de la recuperación

Develop recovery capabilities per NIST CSF RC.RP:

RC.RP-01 to RC.RP-03: Recovery plan execution
- Recovery plan executed during or after cybersecurity incident
- Recovery strategy aligned with business continuity and disaster recovery plans
- Recovery time and point objectives met (RTO/RPO targets: [specify])

RC.RP-04 to RC.RP-05: Updates and improvements
- Recovery plan updated based on lessons learned
- Recovery planning integrated with incident management

Recovery framework:

1. Business Impact Analysis
- Critical business functions: [identify critical processes]
- Maximum tolerable downtime (MTD): [by function]
- Recovery time objective (RTO): [target time to restore]
- Recovery point objective (RPO): [acceptable data loss]

2. Recovery Strategies
- Data recovery: [backup and restoration procedures]
- System recovery: [rebuild, restore from image, failover to DR site]
- Alternative processing: [manual workarounds, degraded mode operations]
- Third-party recovery services: [DRaaS, cold/warm/hot site]

3. Recovery Procedures
- Step-by-step recovery procedures for critical systems
- Recovery sequence and dependencies
- Validation and testing steps
- Rollback procedures if recovery fails

4. Recovery Testing
- Test scenarios (ransomware recovery, infrastructure failure, data corruption)
- Test frequency: [annual full DR test, quarterly component tests]
- Test documentation and results
- Gap remediation based on test findings

5. Communication During Recovery
- Internal communications (status updates, recovery progress)
- Customer communications (service status, expected restoration)
- Stakeholder updates (leadership, board, regulators)

Our recovery priorities:
- Tier 1 critical systems: [must recover within X hours]
- Tier 2 important systems: [must recover within Y hours]
- Tier 3 routine systems: [recover within Z days]

Create recovery plans, testing schedule, and communication templates for recovery scenarios.

Niveles de implementación y hoja de ruta

Evaluación y progresión del nivel de implementación

Assess our NIST CSF Implementation Tier and plan progression:

CSF Tiers represent organizational maturity in cybersecurity risk management:

Tier 1: Partial
- Risk management: Ad hoc, reactive
- Integrated risk management: Limited awareness
- External participation: Limited or no collaboration
- Workforce: Cybersecurity awareness limited

Tier 2: Risk Informed
- Risk management: Approved policies, not all consistent
- Integrated risk management: Awareness of cyber risk at org level
- External participation: Organization knows external entities
- Workforce: Awareness of roles and responsibilities

Tier 3: Repeatable
- Risk management: Formal policies, regularly updated
- Integrated risk management: Org-wide approach, risk-informed decisions
- External participation: Regular collaboration and information sharing
- Workforce: Appropriately resourced and trained

Tier 4: Adaptive
- Risk management: Adaptive, continuous improvement
- Integrated risk management: Real-time risk awareness across organization
- External participation: Proactive sharing and collaboration
- Workforce: Cybersecurity is part of organizational culture

Current Tier Assessment:
- Overall tier: [1-4]
- Risk Management Program tier: [assess]
- Integrated Risk Management tier: [assess]
- External Participation tier: [assess]
- Workforce tier: [assess]

Target Tier: [desired maturity level]
Rationale: [why this tier aligns with our risk appetite and resources]

Progression Plan:
- Year 1: Achieve Tier [X]
  - Actions: [formalize policies, implement tools, train workforce]
- Year 2: Achieve Tier [Y]
  - Actions: [integrate with ERM, establish external partnerships, continuous improvement]
- Year 3: Achieve Tier [Z]
  - Actions: [adaptive capabilities, real-time monitoring, culture of cybersecurity]

Create tier progression roadmap with milestones, resource requirements, and success metrics.

El NIST CSF es flexible y escalable. Organizaciones de cualquier tamaño y sector pueden utilizarlo. Comience desde su situación actual, priorice en función del riesgo y avance gradualmente hacia su nivel de madurez objetivo.

¿Te fue útil?