[フレーム]
You are viewing this page in an unauthorized frame window.

This is a potential security issue, you are being redirected to https://csrc.nist.gov.

You have JavaScript disabled. This site requires JavaScript to be enabled for complete site functionality.

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

    Publications

NIST IR 8374 Rev. 1 (Initial Public Draft)

Ransomware Risk Management: A Cybersecurity Framework 2.0 Community Profile

Documentation Topics

Date Published: January 13, 2025
Comments Due: September 11, 2025 (public comment period is CLOSED)
Email Questions to: [email protected]

Planning Note (07/28/2025):

The comment period has been extended through September 11, 2025.


Author(s)

Murugiah Souppaya (NIST), William Barker (Dakota Consulting), William Fisher (NIST), Karen Scarfone (Scarfone Cybersecurity)

Announcement

This draft Ransomware Community Profile reflects changes made to the Cybersecurity Framework (CSF) from CSF 1.1 to CSF 2.0 which identifies security objectives that support managing, detecting, responding to, and recovering from ransomware events. Ransomware can attack organizations of all sizes from any sector. You can use this publication to gauge your organization’s readiness to counter ransomware threats, mitigate potential consequences of a ransomware event, and to develop a ransomware countermeasure playbook.

Per the "Note to Reviewers" starting on line 104 of the draft, NIST is interested in answers to the following questions:

  1. What elements of this Community Profile have been helpful?
  2. Where could this Community Profile be improved?
  3. Are supplemental documents, such as quick start guides, useful? If so, how? If not, why?
  4. What type of prioritization would be most helpful? Control baselines? high/medium/low criticality? Mapping to specific organizational outcomes? Other?
  5. What other ransomware resources have you or your organization used to improve your ransomware risk mitigation strategy? How have those resources been helpful?

General comments on the draft are also welcome.

The public comment period is open now until (削除) March 14 (削除ここまで) September 11, 2025. Please send your feedback about this draft and what content would be most valuable in future NIST ransomware guidance to [email protected].

NOTE: A call for patent claims is included on page iii of this draft. For additional information, see the Information Technology Laboratory (ITL) Patent Policy – Inclusion of Patents in ITL Publications .

Abstract

Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. Attackers may also steal an organization’s information and demand an additional payment in return for not disclosing the information to authorities, competitors, or the public. This Cybersecurity Framework (CSF) 2.0 Community Profile identifies the security objectives from the NIST CSF 2.0 that support governing management of, identifying, protecting against, detecting, responding to, and recovering from ransomware events. The Profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events. This Profile can be leveraged in developing a ransomware countermeasure playbook.

Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. Attackers may also steal an organization’s information and demand an additional payment in return for not disclosing the information to authorities, competitors, or the... See full abstract

Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. Attackers may also steal an organization’s information and demand an additional payment in return for not disclosing the information to authorities, competitors, or the public. This Cybersecurity Framework (CSF) 2.0 Community Profile identifies the security objectives from the NIST CSF 2.0 that support governing management of, identifying, protecting against, detecting, responding to, and recovering from ransomware events. The Profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events. This Profile can be leveraged in developing a ransomware countermeasure playbook.


Hide full abstract

Keywords

Cybersecurity Framework; detect; identify; protect; ransomware; recover; respond; risk; security
Control Families

None selected

Documentation

Publication:
https://doi.org/10.6028/NIST.IR.8374r1.ipd
Download URL

Supplemental Material:
Ransomware Protection and Response project

Document History:
01/13/25: IR 8374 Rev. 1 (Draft)

Topics

Security and Privacy

ransomware

Applications

cybersecurity framework

AltStyle によって変換されたページ (->オリジナル) /