{"id":58619,"date":"2020-01-09T05:00:34","date_gmt":"2020-01-09T13:00:34","guid":{"rendered":"https:\/\/forescoutstage.wpengine.com\/?p=58619"},"modified":"2024-07-18T10:26:36","modified_gmt":"2024-07-18T17:26:36","slug":"how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework","status":"publish","type":"post","link":"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/","title":{"rendered":"How to Comply in 2020 With The 5 Functions of The NIST Cybersecurity Framework"},"content":{"rendered":"<p><span class=\"ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\"><strong>Update July 9, 2024<\/strong>: In 2024, the standard&#8217;s body has updated the framework. Here&#8217;s <a class=\"fui-Link ___1rxvrpe f2hkw1w f3rmtva f1ewtqcl fyind8e f1k6fduh f1w7gpdv fk6fouc fjoy568 figsok6 f1hu3pq6 f11qmguv f19f4twv f1tyq0we f1g0x7ka fhxju0i f1qch9an f1cnd47f fqv5qza f1vmzxwi f1o700av f13mvf36 f1cmlufx f9n3di6 f1ids18y f1tx3yz7 f1deo86v f1eh06m1 f1iescvh fhgqx19 f1olyrje f1p93eir f1nev41a f1h8hb77 f1lqvz6u f10aw75t fsle3fq f17ae5zn\" title=\"https:\/\/www.forescout.com\/blog\/what-you-need-to-know-about-the-nist-cybersecurity-framework-2\/\" href=\"\/blog\/what-you-need-to-know-about-the-nist-cybersecurity-framework-2\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Link what you need to know about NIST CSF 2.0\">what you need to know about NIST CSF 2.0<\/a>. \u00a0<\/span><\/p>\n<p>The <a href=\"https:\/\/www.nist.gov\/cyberframework\">NIST Framework for Improving Critical Infrastructure Cybersecurity,<\/a> commonly referred to as the NIST Cybersecurity Framework (CSF), provides private sector organizations with a structure for assessing and improving their ability to prevent, detect and respond to cyber incidents. Version 1.1 was published by the US National Institute of Standards and Technology (NIST) in April 2018 and has seen fast adoption across <a href=\"https:\/\/www.nist.gov\/cyberframework\/perspectives\">various industries<\/a>.<\/p>\n<p>The Framework uses business drivers to guide cybersecurity activities and considers cybersecurity as part of an organization\u2019s risk management processes. Many organizations are embracing this framework to help manage their cybersecurity risks. According to the 2019 SANS OT\/ICS Cybersecurity Survey the NIST CSF is the number one framework in use today. How does your organization plan to use or expand your compliance with the NIST CSF in 2020? Let\u2019s dissect this popular framework and share how you can comply.<\/p>\n<p><strong>The 3 Parts of the Framework<\/strong><\/p>\n<ol>\n<li><strong>Framework Core<\/strong><br \/>\nThe framework core is a set of cybersecurity activities, desired outcomes and applicable references that are common across critical infrastructure sectors. It consists of five concurrent and continuous Functions: Identify, Protect, Detect, Respond and Recover.<\/li>\n<li><strong>Implementation Tiers<\/strong><br \/>\nImplementation tiers describe the degree to which an organization\u2019s cybersecurity risk management practices exhibit the characteristics defined in the Framework, over a range from Partial (Tier 1) to Adaptive (Tier 4).<\/li>\n<li><strong>Framework Profile<\/strong><\/li>\n<\/ol>\n<p>A framework profile represents the Core Functions\u2019 Categories and Subcategories prioritized by an organization based on business needs and can be used to measure the organization\u2019s progress toward the Target Profile.<\/p>\n<p class=\"center\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/01\/Forescout-NIST-Framework-The-5-Core-Functions.svg\" \/><\/p>\n<p><strong>The 5 Core Functions<\/strong><br \/>\nWhen considered together, the 5 Core Functions provide a strategic view of the lifecycle of an organization\u2019s cybersecurity risk management and should be treated as a key reference point. Here are the 5 Functions and how to comply with them:\n<ol>\n<li><strong>Identify<\/strong><br \/>\nOrganizations must develop an understanding of their environment to manage cybersecurity risk to systems, assets, data and capabilities. To comply with this Function, it is essential to have full visibility into your digital and physical assets, their interconnections, and defined roles and responsibilities, as well as to understand your current risks and exposure and put policies and procedures into place to manage those risks.<\/li>\n<li><strong>Protect<\/strong><br \/>\nOrganizations must develop and implement the appropriate safeguards to limit or contain the impact of a potential cybersecurity event. To comply, your organization must control access to digital and physical assets, provide awareness education and training, put processes into place to secure data, maintain baselines of network configuration and operations to repair system components in a timely manner and deploy protective technology to ensure cyber resilience.<\/li>\n<li><strong>Detect<\/strong><br \/>\nOrganizations must implement the appropriate measures to quickly identify cybersecurity events. The adoption of continuous monitoring solutions that detect anomalous activity and other threats to operational continuity is required to comply with this Function. Your organization must have visibility into its networks to anticipate a cyber incident and have all information at hand to respond to one. Continuous monitoring and <a href=\"\/company\/blog\/successful-threat-hunting-in-ics-networks\/\">threat hunting<\/a> are very effective ways to analyze and prevent cyber incidents in ICS networks.<\/li>\n<li><strong>Respond<\/strong><br \/>\nShould a cyber incident occur, organizations must have the ability to contain the impact. To comply, your organization must craft a response plan, define communication lines among the appropriate parties, collect and analyze information about the event, perform all required activities to eradicate the incident and incorporate lessons learned into revised response strategies.<\/li>\n<li><strong>Recover<\/strong><br \/>\nOrganizations must develop and implement effective activities to restore any capabilities or services that were impaired due to a cybersecurity event. Your organization must have a recovery plan in place, be able to coordinate restoration activities with external parties and incorporate lessons learned into your updated recovery strategy. Defining a prioritized list of action points which can be used to undertake recovery activity is critical for a timely recovery.<\/li>\n<\/ol>\n<p>Implementing the NIST Cybersecurity Framework can help your organization become more focused on protecting its critical assets. There are many tools that can simplify compliance with this Framework. To learn more about our solution and how it facilitates adoption of the Framework, <a href=\"\/solutions\/compliance\/ebook-how-to-align-with-the-nist-cybersecurity-framework\/\">download our eBook below<\/a>.<\/p>\n<p class=\"center\"><a href=\"\/solutions\/compliance\/ebook-how-to-align-with-the-nist-cybersecurity-framework\/\"><img decoding=\"async\" src=\"\/wp-content\/uploads\/2020\/01\/Comply-with-NIST-Cybersecurity-Framework-CTA.jpg\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Update July 9, 2024: In 2024, the standard&#8217;s body has updated the framework. Here&#8217;s what you need to know about NIST CSF 2.0. \u00a0 The NIST Framework for Improving Critical Infrastructure Cybersecurity, commonly referred to as the NIST Cybersecurity Framework (CSF), provides private sector organizations with a structure for assessing and improving their ability to [&hellip;]<\/p>\n","protected":false},"author":95,"featured_media":58620,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"ep_exclude_from_search":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[562],"tags":[],"coauthors":[420],"class_list":["post-58619","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-views"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How you can Comply with the NIST Cybersecurity Framework<\/title>\n<meta name=\"description\" content=\"An overview of the five Core functions of the NIST Cybersecurity Framework and how your organization can comply with them\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How you can Comply with the NIST Cybersecurity Framework\" \/>\n<meta property=\"og:description\" content=\"An overview of the five Core functions of the NIST Cybersecurity Framework and how your organization can comply with them\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/\" \/>\n<meta property=\"og:site_name\" content=\"Forescout\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ForescoutTechnologies\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-09T13:00:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-18T17:26:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/Comply-with-NIST-Cybersecurity-Framework.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"560\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Erin Anderson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Forescout\" \/>\n<meta name=\"twitter:site\" content=\"@Forescout\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/\"},\"author\":{\"name\":\"Erin Anderson\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/cd9704b710f117715603c9f80b7cab81\"},\"headline\":\"How to Comply in 2020 With The 5 Functions of The NIST Cybersecurity Framework\",\"datePublished\":\"2020-01-09T13:00:34+00:00\",\"dateModified\":\"2024-07-18T17:26:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/\"},\"wordCount\":702,\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/Comply-with-NIST-Cybersecurity-Framework.jpg\",\"articleSection\":[\"News &amp; Views\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/\",\"url\":\"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/\",\"name\":\"How you can Comply with the NIST Cybersecurity Framework\",\"isPartOf\":{\"@id\":\"https:\/\/www.forescout.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/Comply-with-NIST-Cybersecurity-Framework.jpg\",\"datePublished\":\"2020-01-09T13:00:34+00:00\",\"dateModified\":\"2024-07-18T17:26:36+00:00\",\"description\":\"An overview of the five Core functions of the NIST Cybersecurity Framework and how your organization can comply with them\",\"breadcrumb\":{\"@id\":\"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/#primaryimage\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/Comply-with-NIST-Cybersecurity-Framework.jpg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/Comply-with-NIST-Cybersecurity-Framework.jpg\",\"width\":1024,\"height\":560},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.forescout.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Comply in 2020 With The 5 Functions of The NIST Cybersecurity Framework\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.forescout.com\/#website\",\"url\":\"https:\/\/www.forescout.com\/\",\"name\":\"Forescout\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.forescout.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.forescout.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.forescout.com\/#organization\",\"name\":\"Forescout Technologies, Inc.\",\"url\":\"https:\/\/www.forescout.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"contentUrl\":\"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg\",\"width\":1,\"height\":1,\"caption\":\"Forescout Technologies, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ForescoutTechnologies\",\"https:\/\/x.com\/Forescout\",\"https:\/\/www.instagram.com\/forescouttechnologies\/\",\"https:\/\/www.linkedin.com\/company\/forescout-technologies\",\"https:\/\/www.youtube.com\/user\/forescout1\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/cd9704b710f117715603c9f80b7cab81\",\"name\":\"Erin Anderson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.forescout.com\/#\/schema\/person\/image\/87e90fad0f75b2ef3bdf05050aea825d\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a5e70a5125435924686c7f0f482233df515d292e8f78110e54562360c58c1b9d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a5e70a5125435924686c7f0f482233df515d292e8f78110e54562360c58c1b9d?s=96&d=mm&r=g\",\"caption\":\"Erin Anderson\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How you can Comply with the NIST Cybersecurity Framework","description":"An overview of the five Core functions of the NIST Cybersecurity Framework and how your organization can comply with them","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/","og_locale":"en_US","og_type":"article","og_title":"How you can Comply with the NIST Cybersecurity Framework","og_description":"An overview of the five Core functions of the NIST Cybersecurity Framework and how your organization can comply with them","og_url":"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/","og_site_name":"Forescout","article_publisher":"https:\/\/www.facebook.com\/ForescoutTechnologies","article_published_time":"2020-01-09T13:00:34+00:00","article_modified_time":"2024-07-18T17:26:36+00:00","og_image":[{"width":1024,"height":560,"url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/Comply-with-NIST-Cybersecurity-Framework.jpg","type":"image\/jpeg"}],"author":"Erin Anderson","twitter_card":"summary_large_image","twitter_creator":"@Forescout","twitter_site":"@Forescout","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/#article","isPartOf":{"@id":"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/"},"author":{"name":"Erin Anderson","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/cd9704b710f117715603c9f80b7cab81"},"headline":"How to Comply in 2020 With The 5 Functions of The NIST Cybersecurity Framework","datePublished":"2020-01-09T13:00:34+00:00","dateModified":"2024-07-18T17:26:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/"},"wordCount":702,"publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/Comply-with-NIST-Cybersecurity-Framework.jpg","articleSection":["News &amp; Views"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/","url":"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/","name":"How you can Comply with the NIST Cybersecurity Framework","isPartOf":{"@id":"https:\/\/www.forescout.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/#primaryimage"},"image":{"@id":"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/#primaryimage"},"thumbnailUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/Comply-with-NIST-Cybersecurity-Framework.jpg","datePublished":"2020-01-09T13:00:34+00:00","dateModified":"2024-07-18T17:26:36+00:00","description":"An overview of the five Core functions of the NIST Cybersecurity Framework and how your organization can comply with them","breadcrumb":{"@id":"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/#primaryimage","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/Comply-with-NIST-Cybersecurity-Framework.jpg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/Comply-with-NIST-Cybersecurity-Framework.jpg","width":1024,"height":560},{"@type":"BreadcrumbList","@id":"https:\/\/www.forescout.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.forescout.com\/"},{"@type":"ListItem","position":2,"name":"How to Comply in 2020 With The 5 Functions of The NIST Cybersecurity Framework"}]},{"@type":"WebSite","@id":"https:\/\/www.forescout.com\/#website","url":"https:\/\/www.forescout.com\/","name":"Forescout","description":"","publisher":{"@id":"https:\/\/www.forescout.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.forescout.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.forescout.com\/#organization","name":"Forescout Technologies, Inc.","url":"https:\/\/www.forescout.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","contentUrl":"https:\/\/www.forescout.com\/wp-content\/uploads\/2019\/01\/forescout-logo.svg","width":1,"height":1,"caption":"Forescout Technologies, Inc."},"image":{"@id":"https:\/\/www.forescout.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ForescoutTechnologies","https:\/\/x.com\/Forescout","https:\/\/www.instagram.com\/forescouttechnologies\/","https:\/\/www.linkedin.com\/company\/forescout-technologies","https:\/\/www.youtube.com\/user\/forescout1"]},{"@type":"Person","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/cd9704b710f117715603c9f80b7cab81","name":"Erin Anderson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.forescout.com\/#\/schema\/person\/image\/87e90fad0f75b2ef3bdf05050aea825d","url":"https:\/\/secure.gravatar.com\/avatar\/a5e70a5125435924686c7f0f482233df515d292e8f78110e54562360c58c1b9d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a5e70a5125435924686c7f0f482233df515d292e8f78110e54562360c58c1b9d?s=96&d=mm&r=g","caption":"Erin Anderson"}}]}},"featured_media_url":"https:\/\/www.forescout.com\/wp-content\/uploads\/2020\/01\/Comply-with-NIST-Cybersecurity-Framework.jpg","is_file":false,"excerpt_manually_set":false,"_links":{"self":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/58619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/users\/95"}],"replies":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/comments?post=58619"}],"version-history":[{"count":0,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/posts\/58619\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media\/58620"}],"wp:attachment":[{"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/media?parent=58619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/categories?post=58619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/tags?post=58619"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.forescout.com\/wp-json\/wp\/v2\/coauthors?post=58619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}