
RS.MI-3: Mitigation
Newly identified vulnerabilities are mitigated or documented as accepted risks.



RS.AN-5: Analysis
Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g., internal testing, security bulletins, or security researchers).





RS.CO-5: Communications
Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness.

RS.CO-4: Communications
Coordination with stakeholders occurs consistent with response plans.



RS.CO-1: Communications
Personnel know their roles and order of operations when a response is needed.

Asset Management
NIST Control ID.AM-3 is the cybersecurity equivalent of a high-definition, real-time map of your digital kingdom. It illuminates the hidden pathways that data traverses, revealing potential ambush points for attackers and bottlenecks in your operations. This visibility is crucial not just for fending off cyber threats, but also for streamlining processes, ensuring regulatory compliance, and rapidly responding to incidents.