Identify
Identify and manage your assets
Protect
Protect your integrity, confidentiality and availability
Detect
Detect anomalies in your systems and indicators of compromise
Respond
Recover
Recover compromised systems or operations
Review | Plan > Do > Check > Act
Review controls, policies and procedures. Prevent future incidents