Appendix G: Summary of Health Care Implementation Activities
Health Care and Public Health Sector Cybersecurity Framework Implementation Guide
Table 10 consolidates health care implementation activities for all steps in the NIST Cybersecurity Framework implementation process.
| Implementation Process Steps | Inputs | Activities | Outputs |
|---|---|---|---|
|
Step 1: Prioritize and Scope |
|
|
|
|
Step 2: Orient |
|
|
|
|
Step 3: Create a Target Profile |
|
|
|
|
Step 4: Conduct a Risk Assessment |
|
|
|
|
Step 5: Create a Current Profile |
|
|
|
|
Step 6: Perform Gap Analysis |
|
|
|
|
Step 7: Implement Action Plan |
|
|
|
Table 11 correlates the NIST Cybersecurity Framework implementation process with the elements of a risk analysis that accommodate the use of NIST Cybersecurity Framework Core Informative References.
| Cyber Implementation Process | Risk Analysis Elements |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
<< Back Next >>