• Identify: Use organizational understanding to minimize risk to systems, assets, data and capabilities.
• Protect: Design safeguards to limit the impact of potential events on critical services and infrastructure.
• Detect: Implement activities to identify the occurrence of a cybersecurity event.
• Respond: Take appropriate action after learning of a security event.
• Recover: Plan for resilience and the timely repair of compromised capabilities and services.