ID | Control | Informative References | Assessment |
---|---|---|---|
DE.AE-1 | A baseline of network operations and expected data flows for users and systems is established and managed | A1 Analyse & Resolve IT Services Availability Performance Reports What is a Business Process You can link to an Essential View, Intranet Page or something else You can link to an image or document |
Last Assessment: 09/2021 Assessor: Alan Law Status: Pass |
DE.AE-2 | Detected events are analyzed to understand attack targets and methods |
Last Assessment: 09/2016 Assessor: Alex Brown Status: Pass |
|
DE.AE-3 | Event data are aggregated and correlated from multiple sources and sensors |
Last Assessment: 08/2017 Assessor: Alan Law Status: Fail |
|
DE.AE-4 | Impact of events is determined |
Last Assessment: None Assessor: Status: |
|
DE.AE-5 | Incident alert thresholds are established |
Last Assessment: None Assessor: Status: |
|
DE.CM-1 | The network is monitored to detect potential cybersecurity events |
Last Assessment: None Assessor: Status: |
|
DE.CM-2 | The physical environment is monitored to detect potential cybersecurity events |
Last Assessment: None Assessor: Status: |
|
DE.CM-3 | Personnel activity is monitored to detect potential cybersecurity events |
Last Assessment: None Assessor: Status: |
|
DE.CM-4 | Malicious code is detected |
Last Assessment: None Assessor: Status: |
|
DE.CM-5 | Vnauthorized mobile code is detected |
Last Assessment: None Assessor: Status: |
|
DE.CM-6 | External service provider activity is monitored to detect potential cybersecurity events |
Last Assessment: None Assessor: Status: |
|
DE.CM-7 | Monitoring for unauthorized personnel, connections, devices, and software is performed |
Last Assessment: None Assessor: Status: |
|
DE.CM-8 | Vulnerability scans are performed |
Last Assessment: None Assessor: Status: |
|
DE.DP-1 | Roles and responsibilities for detection are well defined to ensure accountability |
Last Assessment: None Assessor: Status: |
|
DE.DP-2 | Detection activities comply with all applicable requirements |
Last Assessment: None Assessor: Status: |
|
DE.DP-3 | Detection processes are tested |
Last Assessment: None Assessor: Status: |
|
DE.DP-4 | Event detection information is communicated to appropriate parties |
Last Assessment: None Assessor: Status: |
|
DE.DP-5 | Detection processes are continuously improved |
Last Assessment: None Assessor: Status: |
|
ID.AM-1 | Physical devices and systems within the organization are inventoried |
Last Assessment: None Assessor: Status: |
|
ID.AM-2 | Software platforms and applications within the organization are inventoried |
Last Assessment: None Assessor: Status: |
|
ID.AM-3 | 0rganizational communication and data flows are mapped |
Last Assessment: None Assessor: Status: |
|
ID.AM-4 | External information systems are catalogued |
Last Assessment: None Assessor: Status: |
|
ID.AM-5 | Resources (e.g., hardware, devices, data, and software) are prioritized based on their classification, criticality, and business value |
Last Assessment: None Assessor: Status: |
|
ID.AM-6 | Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established |
Last Assessment: None Assessor: Status: |
|
ID.BE-1 | The organizations role in the supply chain is identified and communicated |
Last Assessment: None Assessor: Status: |
|
ID.BE-2 | The organizations place in critical infrastructure and its industry sector is identified and communicated |
Last Assessment: None Assessor: Status: |
|
ID.BE-3 | Priorities for organizational mission, objectives, and activities are established and communicated |
Last Assessment: None Assessor: Status: |
|
ID.BE-4 | Dependencies and critical functions for delivery of critical services are established |
Last Assessment: None Assessor: Status: |
|
ID.BE-5 | Resilience requirements to support delivery of critical services are established |
Last Assessment: None Assessor: Status: |
|
ID.GV-1 | 0rganizational information security policy is established |
Last Assessment: None Assessor: Status: |
|
ID.GV-2 | Information security roles & responsibilities are coordinated and aligned with internal roles and external partners |
Last Assessment: None Assessor: Status: |
|
ID.GV-3 | Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed |
Last Assessment: None Assessor: Status: |
|
ID.GV-4 | Governance and risk management processes address cybersecurity risks |
Last Assessment: None Assessor: Status: |
|
ID.RA-1 | Asset vulnerabilities are identified and documented |
Last Assessment: None Assessor: Status: |
|
ID.RA-2 | Threat and vulnerability information is received from information sharing forums and sources |
Last Assessment: None Assessor: Status: |
|
ID.RA-3 | Threats, both internal and external, are identified and documented |
Last Assessment: None Assessor: Status: |
|
ID.RA-4 | Potential business impacts and likelihoods are identified |
Last Assessment: None Assessor: Status: |
|
ID.RA-5 | Threats, vulnerabilities, likelihoods, and impacts are used to determine risk |
Last Assessment: None Assessor: Status: |
|
ID.RA-6 | Risk responses are identified and prioritized |
Last Assessment: None Assessor: Status: |
|
ID.RM-1 | Risk management processes are established, managed, and agreed to by organizational stakeholders |
Last Assessment: None Assessor: Status: |
|
ID.RM-2 | 0rganizational risk tolerance is determined and clearly expressed |
Last Assessment: None Assessor: Status: |
|
ID.RM-3 | The organizations determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis |
Last Assessment: None Assessor: Status: |
|
PR.AT-1 | All users are informed and trained |
Last Assessment: None Assessor: Status: |
|
PR.AT-2 | Privileged users understand roles & responsibilities |
Last Assessment: None Assessor: Status: |
|
PR.AT-3 | Third-party stakeholders (e.g., suppliers, customers, partners) understand roles & responsibilities |
Last Assessment: None Assessor: Status: |
|
PR.AT-4 | Senior executives understand roles & responsibilities |
Last Assessment: None Assessor: Status: |
|
PR.AT-5 | Physical and information security personnel understand roles & responsibilities |
Last Assessment: None Assessor: Status: |
|
PR.Ac-1 | Identities and credentials are managed for authorized devices and users |
Last Assessment: None Assessor: Status: |
|
PR.Ac-2 | Physical access to assets is managed and protected |
Last Assessment: None Assessor: Status: |
|
PR.Ac-3 | Remote access is managed |
Last Assessment: None Assessor: Status: |
|
PR.Ac-4 | Access permissions are managed, incorporating the principles of least privilege and separation of duties |
Last Assessment: None Assessor: Status: |
|
PR.Ac-5 | Network integrity is protected, incorporating network segregation where appropriate |
Last Assessment: None Assessor: Status: |
|
PR.DS-1 | Data-at-rest is protected |
Last Assessment: None Assessor: Status: |
|
PR.DS-2 | Data-in-transit is protected |
Last Assessment: None Assessor: Status: |
|
PR.DS-3 | Assets are formally managed throughout removal, transfers, and disposition |
Last Assessment: None Assessor: Status: |
|
PR.DS-4 | Adequate capacity to ensure availability is maintained |
Last Assessment: None Assessor: Status: |
|
PR.DS-5 | Protections against data leaks are implemented |
Last Assessment: None Assessor: Status: |
|
PR.DS-6 | Integrity checking mechanisms are used to verify software, firmware, and information integrity |
Last Assessment: None Assessor: Status: |
|
PR.DS-7 | The development and testing environment(s) are separate from the production environment |
Last Assessment: None Assessor: Status: |
|
PR.IP-1 | A baseline configuration of information technology/industrial control systems is created and maintained |
Last Assessment: None Assessor: Status: |
|
PR.IP-10 | Response and recovery plans are tested |
Last Assessment: None Assessor: Status: |
|
PR.IP-11 | Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening) |
Last Assessment: None Assessor: Status: |
|
PR.IP-12 | A vulnerability management plan is developed and implemented |
Last Assessment: None Assessor: Status: |
|
PR.IP-2 | A System Development Life Cycle to manage systems is implemented |
Last Assessment: None Assessor: Status: |
|
PR.IP-3 | Configuration change control processes are in place |
Last Assessment: None Assessor: Status: |
|
PR.IP-4 | Backups of information are conducted, maintained, and tested periodically |
Last Assessment: None Assessor: Status: |
|
PR.IP-5 | Policy and regulations regarding the physical operating environment for organizational assets are met |
Last Assessment: None Assessor: Status: |
|
PR.IP-6 | Data is destroyed according to policy |
Last Assessment: None Assessor: Status: |
|
PR.IP-7 | Protection processes are continuously improved |
Last Assessment: None Assessor: Status: |
|
PR.IP-8 | Effectiveness of protection technologies is shared with appropriate parties |
Last Assessment: None Assessor: Status: |
|
PR.IP-9 | Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed |
Last Assessment: None Assessor: Status: |
|
PR.MA-1 | Maintenance and repair of organizational assets is performed and logged in a timely manner, with approved and controlled tools |
Last Assessment: None Assessor: Status: |
|
PR.MA-2 | Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access |
Last Assessment: None Assessor: Status: |
|
PR.PT-1 | Audit/log records are determined, documented, implemented, and reviewed in accordance with policy |
Last Assessment: None Assessor: Status: |
|
PR.PT-2 | Removable media is protected and its use restricted according to policy |
Last Assessment: None Assessor: Status: |
|
PR.PT-3 | Access to systems and assets is controlled, incorporating the principle of least functionality |
Last Assessment: None Assessor: Status: |
|
PR.PT-4 | Communications and control networks are protected |
Last Assessment: None Assessor: Status: |
|
RC.CO-2 | Reputation after an event is repaired |
Last Assessment: None Assessor: Status: |
|
RC.CO-3 | Recovery activities are communicated to internal stakeholders and executive and management teams |
Last Assessment: None Assessor: Status: |
|
RC.CO-l | Public relations are managed |
Last Assessment: None Assessor: Status: |
|
RC.IM-2 | Recovery strategies are updated |
Last Assessment: None Assessor: Status: |
|
RC.IM-l | Recovery plans incorporate lessons learned |
Last Assessment: None Assessor: Status: |
|
RC.RP-1 | Recovery plan is executed during or after an event |
Last Assessment: None Assessor: Status: |
|
RS.AN-1 | Notifications from detection systems are investigated |
Last Assessment: None Assessor: Status: |
|
RS.AN-2 | The impact of the incident is understood |
Last Assessment: None Assessor: Status: |
|
RS.AN-3 | Forensics are performed |
Last Assessment: None Assessor: Status: |
|
RS.AN-4 | Incidents are categorized consistent with response plans |
Last Assessment: None Assessor: Status: |
|
RS.CO-1 | Personnel know their roles and order of operations when a response is needed |
Last Assessment: None Assessor: Status: |
|
RS.CO-2 | Events are reported consistent with established criteria |
Last Assessment: None Assessor: Status: |
|
RS.CO-3 | Information is shared consistent with response plans |
Last Assessment: None Assessor: Status: |
|
RS.CO-4 | Coordination with stakeholders occurs consistent with response plans |
Last Assessment: None Assessor: Status: |
|
RS.CO-5 | Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness |
Last Assessment: None Assessor: Status: |
|
RS.IM-1 | Response plans incorporate lessons learned |
Last Assessment: None Assessor: Status: |
|
RS.IM-2 | Response strategies are updated |
Last Assessment: None Assessor: Status: |
|
RS.MI-1 | Incidents are contained |
Last Assessment: None Assessor: Status: |
|
RS.MI-2 | Incidents are mitigated |
Last Assessment: None Assessor: Status: |
|
RS.MI-3 | Newly identified vulnerabilities are mitigated or documented as accepted risks |
Last Assessment: None Assessor: Status: |
|
RS.RP-1 | Response plan is executed during or after an event |
Last Assessment: None Assessor: Status: |
ID | Control | Informative References | Assessment |