{"id":933,"date":"2019-08-05T22:05:27","date_gmt":"2019-08-05T22:05:27","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=933"},"modified":"2020-07-30T08:31:38","modified_gmt":"2020-07-30T15:31:38","slug":"aligning-with-nist-cyber-security-framework-using-your","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/","title":{"rendered":"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services"},"content":{"rendered":"<p>As IT infrastructures grow more complex with the advent of public\/private clouds and internet of things (IOT), organizations are struggling to maintain a real-time view of what is on their network, quickly isolating\/quarantining end-points compromised by malware and preventing sensitive data from being exfiltrated to command-and-control servers.<\/p>\n<p>CIOs\/CISOs are increasingly held accountable by the board of directors for securing their business infrastructure and preventing any security breaches that can ruin the reputation of the company. The security best practices defined in the\u00a0<a href=\"https:\/\/www.nist.gov\/cyberframework\/framework\" target=\"_blank\" rel=\"noopener nofollow noreferrer\">National Institute of Standards and Technology (NIST) Cyber Security Framework (CSF) version 1.1<\/a>, establishes a consistent methodology, taxonomy, and approach to risk management from both a company executive and security operations perspective.<\/p>\n<p>According to Gartner, 73% of IT organizations are already implementing or planning to implement NIST CSF in the next 18 months, to measure the security posture of their business infrastructure.<\/p>\n<h2><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-114\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/image001.png\" alt=\"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services\" width=\"600\" height=\"413\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001.png 600w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001-300x207.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/h2>\n<h2 id=\"toc-hId--1333129552\"><span style=\"font-size: medium;\"><strong>Why NIST Cyber Security Framework?<\/strong><\/span><\/h2>\n<p>The increasing adoption rate of NIST CSF by most IT organizations can be attributed to the following.<\/p>\n<ul>\n<li>NIST applies to both public and private sectors with an appeal beyond the US<\/li>\n<li>It can co-exist, take advantage of existing frameworks such as ISO, COBIT, FFIEC, as well as form the basis for compliance programs such as FedRAMP<\/li>\n<li>It depicts an information security lifecycle that is typically followed and understood by IT organizations<\/li>\n<li>It provides a common taxonomy that can be applied across a wide variety of IT infrastructure components (network, endpoints, applications, and data)<\/li>\n<\/ul>\n<h2 id=\"toc-hId--445625871\"><span style=\"font-size: medium;\"><strong>What are the Key Elements of NIST CSF?<\/strong><\/span><\/h2>\n<p>The NIST CSF is broken down into 3 components \u2013 the core, implementation tiers, and profiles.<\/p>\n<ul>\n<li><strong>Core<\/strong>: Consists of the following 5 high-level functions, further divided into 23 categories.<\/li>\n<li><strong>Identify:<\/strong>\u00a0take inventory of assets on your network and identify risks<\/li>\n<li><strong>Protect:<\/strong>\u00a0implement protective technologies to prevent cyber threats from succeeding<\/li>\n<li><strong>Detect:<\/strong>\u00a0security events that escape the protective controls including 24\/7 monitoring<\/li>\n<li><strong>Respond:<\/strong>\u00a0to security incidents to rapidly contain and mitigate cyber attacks<\/li>\n<li><strong>Recover:<\/strong>\u00a0restore any services or capabilities that were impaired due to a cyber security event\/incident<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-936\" src=\"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/NIST-blog.png\" alt=\"What are the Key Elements of NIST CSF?\" width=\"141\" height=\"140\" srcset=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/NIST-blog.png 141w, https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/NIST-blog-75x75.png 75w\" sizes=\"auto, (max-width: 141px) 100vw, 141px\" \/><\/p>\n<ul>\n<li><strong>Implementation Tiers:\u00a0<\/strong>help organizations characterize their practices in each of the Core functions and Categories, and prioritize the findings into these 4 tiers \u2013 Partial (1), Risk Informed (2), Repeatable (3), and Adaptive (4), based on the current maturity level of the security practices followed by the IT organization.<\/li>\n<li><strong>Profiles:\u00a0<\/strong>define the outcomes based on business needs and prioritize opportunities for improving an organization\u2019s cyber security posture by comparing its \u201ccurrent\u201d state with a desired \u201ctarget\u201d state.<\/li>\n<\/ul>\n<p>The NIST CSF allows you to establish your unique current and target profile, identify the gaps between in the security controls deployed including the foundational network infrastructure services, and prioritize improvement actions, based on your resources and budget.<\/p>\n<h2 id=\"toc-hId-441877810\"><span style=\"font-size: medium;\"><strong>How Does Foundational Network Infrastructure Services Help Satisfy NIST CSF?<\/strong><\/span><\/h2>\n<p>Organizations can leverage the foundational network infrastructure services to not only provide basic network connectivity but also gain precise visibility and security context for your SecOps team.<\/p>\n<ul>\n<li><strong>Domain Name Service (DNS):<\/strong>\u00a0provides critical audit trail of any domain\/hostname lookups. This audit trail can be leveraged to quickly map out command-and-control (C&amp;C) servers that have been accessed by compromised devices<\/li>\n<li><strong>Domain Host Configuration Protocol (DHCP):<\/strong>\u00a0can be used to dynamically assign reusable IP addresses to devices on the network, every time when a device (e.g. laptop) joins a network. DHCP data also helps correlate disparate security events related to the same device under investigation.<\/li>\n<li><strong>IP Address Management (IPAM)<\/strong>: begins with IP address discovery, tracking, and allocation of data pertaining to all devices on the network. It maintains a centralized repository of data associated with devices, networks, and services<\/li>\n<\/ul>\n<p>At a high-level foundational network infrastructure services can satisfy the following NIST CSF requirements and reduce their overall business risks.<\/p>\n<ul>\n<li><span style=\"font-size: small;\"><em>Identify<\/em>\u00a0what is on your network in real-time by using the IPAM service that provides a single source of truth of your asset inventory.<\/span><\/li>\n<li><span style=\"font-size: small;\"><em>Protect<\/em>\u00a0your network by rapidly isolating endpoints (using integrations with NAC solutions) compromised by malware that bypasses your perimeter defenses.<\/span><\/li>\n<li><span style=\"font-size: small;\"><em>Detect<\/em>\u00a0cyber threats that use DNS tunneling to exfiltrate sensitive data and preventing backhaul traffic to malicious C&amp;C servers.<\/span><\/li>\n<li><span style=\"font-size: small;\"><em>Respond<\/em>\u00a0to and mitigate cyber-attacks by providing API-level integrations with NAC, endpoint detection and response providers.<\/span><\/li>\n<\/ul>\n<p>Infoblox is leading the way to next-level DDI with its\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/secure-dns-security\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_self\" rel=\"nofollow noopener noreferrer\">Secure Cloud-Managed Network Services<\/a>\u00a0<u><\/u>. Infoblox brings next-level security, reliability and automation to on-premises, cloud and hybrid networks, setting customers on a path to a single pane of glass for network management.<\/p>\n<p>Download this\u00a0<a href=\"https:\/\/info.infoblox.com\/resources-whitepapers-adopting-nist-cyber-security-framework?utm_source=blox-community&amp;utm_campaign=community-q2\" target=\"_self\" rel=\"nofollow noopener noreferrer\">Infoblox white paper<\/a><u><\/u>, to learn more about how the capabilities in the foundational network infrastructure services map to the core functions and sub-categories in NIST, and what are the top 10 must haves in the foundational network infrastructure services to satisfy the NIST CSF.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As IT infrastructures grow more complex with the advent of public\/private clouds and internet of things (IOT), organizations are struggling to maintain a real-time view of what is on their network, quickly isolating\/quarantining end-points compromised by malware and preventing sensitive data from being exfiltrated to command-and-control servers. CIOs\/CISOs are increasingly held accountable by the board [&hellip;]<\/p>\n","protected":false},"author":227,"featured_media":114,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[15],"class_list":{"0":"post-933","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-security","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services<\/title>\n<meta name=\"description\" content=\"As IT infrastructures grow more complex with the advent of public\/private clouds and internet of things (IOT), organizations are struggling to maintain a real-time view of what is on their network, quickly isolating\/quarantining end-points compromised by malware and preventing sensitive data from being exfiltrated to command-and-control servers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services\" \/>\n<meta property=\"og:description\" content=\"As IT infrastructures grow more complex with the advent of public\/private clouds and internet of things (IOT), organizations are struggling to maintain a real-time view of what is on their network, quickly isolating\/quarantining end-points compromised by malware and preventing sensitive data from being exfiltrated to command-and-control servers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-05T22:05:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-30T15:31:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"413\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Krupa Srivatsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krupa Srivatsan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/aligning-with-nist-cyber-security-framework-using-your\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/aligning-with-nist-cyber-security-framework-using-your\\\/\"},\"author\":{\"name\":\"Krupa Srivatsan\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\"},\"headline\":\"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services\",\"datePublished\":\"2019-08-05T22:05:27+00:00\",\"dateModified\":\"2020-07-30T15:31:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/aligning-with-nist-cyber-security-framework-using-your\\\/\"},\"wordCount\":793,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/aligning-with-nist-cyber-security-framework-using-your\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001.png\",\"keywords\":[\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/aligning-with-nist-cyber-security-framework-using-your\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/aligning-with-nist-cyber-security-framework-using-your\\\/\",\"name\":\"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/aligning-with-nist-cyber-security-framework-using-your\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/aligning-with-nist-cyber-security-framework-using-your\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001.png\",\"datePublished\":\"2019-08-05T22:05:27+00:00\",\"dateModified\":\"2020-07-30T15:31:38+00:00\",\"description\":\"As IT infrastructures grow more complex with the advent of public\\\/private clouds and internet of things (IOT), organizations are struggling to maintain a real-time view of what is on their network, quickly isolating\\\/quarantining end-points compromised by malware and preventing sensitive data from being exfiltrated to command-and-control servers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/aligning-with-nist-cyber-security-framework-using-your\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/aligning-with-nist-cyber-security-framework-using-your\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/aligning-with-nist-cyber-security-framework-using-your\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001.png\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/image001.png\",\"width\":600,\"height\":413,\"caption\":\"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/aligning-with-nist-cyber-security-framework-using-your\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/3cd3a5f9e497b09854c3bc168f9365d5\",\"name\":\"Krupa Srivatsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"url\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/live-infoblox-blog.pantheonsite.io\\\/wp-content\\\/uploads\\\/avatar_user_227_1571768571-96x96.jpg\",\"caption\":\"Krupa Srivatsan\"},\"description\":\"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/krupa-srivatsan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services","description":"As IT infrastructures grow more complex with the advent of public\/private clouds and internet of things (IOT), organizations are struggling to maintain a real-time view of what is on their network, quickly isolating\/quarantining end-points compromised by malware and preventing sensitive data from being exfiltrated to command-and-control servers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/","og_locale":"en_US","og_type":"article","og_title":"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services","og_description":"As IT infrastructures grow more complex with the advent of public\/private clouds and internet of things (IOT), organizations are struggling to maintain a real-time view of what is on their network, quickly isolating\/quarantining end-points compromised by malware and preventing sensitive data from being exfiltrated to command-and-control servers.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/","og_site_name":"Infoblox Blog","article_published_time":"2019-08-05T22:05:27+00:00","article_modified_time":"2020-07-30T15:31:38+00:00","og_image":[{"width":600,"height":413,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001.png","type":"image\/png"}],"author":"Krupa Srivatsan","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Krupa Srivatsan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/"},"author":{"name":"Krupa Srivatsan","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5"},"headline":"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services","datePublished":"2019-08-05T22:05:27+00:00","dateModified":"2020-07-30T15:31:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/"},"wordCount":793,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001.png","keywords":["Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/","url":"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/","name":"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001.png","datePublished":"2019-08-05T22:05:27+00:00","dateModified":"2020-07-30T15:31:38+00:00","description":"As IT infrastructures grow more complex with the advent of public\/private clouds and internet of things (IOT), organizations are struggling to maintain a real-time view of what is on their network, quickly isolating\/quarantining end-points compromised by malware and preventing sensitive data from being exfiltrated to command-and-control servers.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001.png","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/image001.png","width":600,"height":413,"caption":"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/aligning-with-nist-cyber-security-framework-using-your\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Aligning with NIST Cyber Security Framework Using Your Foundational Network Infrastructure Services"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/3cd3a5f9e497b09854c3bc168f9365d5","name":"Krupa Srivatsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","url":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","contentUrl":"https:\/\/live-infoblox-blog.pantheonsite.io\/wp-content\/uploads\/avatar_user_227_1571768571-96x96.jpg","caption":"Krupa Srivatsan"},"description":"Krupa is Senior Director of Product Marketing at Infoblox. She has 18 years of experience in technology in various roles including software development, product management and product marketing. Currently, she is responsible for messaging, positioning and bringing to market Infoblox\u2019s security solutions that ease security operations and provide DNS based security. She has an MBA from University of California, Haas School of Business and a Computer Science Engineering degree.","url":"https:\/\/www.infoblox.com\/blog\/author\/krupa-srivatsan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/933","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/227"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=933"}],"version-history":[{"count":7,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/933\/revisions"}],"predecessor-version":[{"id":5463,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/933\/revisions\/5463"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/114"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}