Evaluate cybersecurity maturity using NIST CSF 2.0 core functions: Govern, Identify, Protect, Detect, Respond, Recover - designed for all sectors including healthcare and critical infrastructure
GV.OC: Organizational cybersecurity risk management strategy owned by leadership
GV.PO: Policies establish expectations and requirements for security
GV.RM: Cyber risk prioritized alongside operational, financial, strategic risks
GV.SC: Third-party cyber risks assessed and managed
ID.AM: Asset inventory enables risk-based security decisions
ID.AM: Understand where PHI, PII, intellectual property resides
ID.RA: Identify vulnerabilities before adversaries exploit them
ID.RA: Understand evolving threat landscape (ransomware, phishing, APTs)
PR.AC: Limit access to authorized users, devices, processes
PR.DS: AES-256 for data at rest, TLS 1.2+ for data in transit
PR.AT: Human firewall - employees trained on threats and safe practices
PR.IP: Vulnerability management - timely patching prevents exploitation
DE.CM: SIEM, IDS/IPS, endpoint detection and response (EDR)
DE.CM: Centralized logging enables incident investigation and forensics
DE.CM: Detect malicious code, ransomware, insider threats
RS.MA: IR plan covers detection, containment, eradication, recovery
RS.MA: Test IR readiness annually (ransomware, breach scenarios)
RS.CO: Legal, regulatory, customer notification per HIPAA/GDPR timelines
RC.RP: 3-2-1 backup rule - immutable backups prevent ransomware destruction
RC.RP: RTOs and RPOs defined for critical systems and operations
Please answer all required questions to see your results