0 / 60 seg.

According to NIST, what is the first action required to take advantage of the cybersecurity framework?