HKIA GL20

Cyber Resilience Assessment Framework

Framework

HKIA GL20

Authority

HKIA (Hong Kong Insurance Authority)

Mapped Controls

945

About HKIA GL20
Hong Kong Insurance Authority - Guideline on Cybersecurity (GL20)
SCF Control Crosswalk Mapping
Showing 945 SCF controls mapped to HKIA GL20
SCF ControlControl NameDomainHKIA GL20 RequirementWeightActions
GOV-01
Cybersecurity & Data Protection Governance ProgramCybersecurity & Data Protection GovernanceN/A10
GOV-01.1
Steering Committee & Program OversightCybersecurity & Data Protection GovernanceN/A7
GOV-01.2
Status Reporting To Governing BodyCybersecurity & Data Protection GovernanceN/A5
GOV-01.3
Commitment To Continual ImprovementsCybersecurity & Data Protection GovernanceN/A7
GOV-02
Publishing Cybersecurity & Data Protection DocumentationCybersecurity & Data Protection GovernanceN/A10
GOV-02.1
Exception ManagementCybersecurity & Data Protection GovernanceN/A8
GOV-03
Periodic Review & Update of Cybersecurity & Data Protection ProgramCybersecurity & Data Protection GovernanceN/A7
GOV-04
Assigned Cybersecurity & Data Protection ResponsibilitiesCybersecurity & Data Protection GovernanceN/A10
GOV-04.1
Stakeholder Accountability StructureCybersecurity & Data Protection GovernanceN/A8
GOV-04.2
Authoritative Chain of CommandCybersecurity & Data Protection GovernanceN/A7
GOV-05
Measures of PerformanceCybersecurity & Data Protection GovernanceN/A6
GOV-05.1
Key Performance Indicators (KPIs)Cybersecurity & Data Protection GovernanceN/A6
GOV-05.2
Key Risk Indicators (KRIs)Cybersecurity & Data Protection GovernanceN/A6
GOV-06
Contacts With AuthoritiesCybersecurity & Data Protection GovernanceN/A5
GOV-07
Contacts With Groups & AssociationsCybersecurity & Data Protection GovernanceN/A7
GOV-08
Defining Business Context & MissionCybersecurity & Data Protection GovernanceN/A5
GOV-09
Define Control ObjectivesCybersecurity & Data Protection GovernanceN/A5
GOV-10
Data GovernanceCybersecurity & Data Protection GovernanceN/A9
GOV-11
Purpose ValidationCybersecurity & Data Protection GovernanceN/A5
GOV-12
Forced Technology Transfer (FTT)Cybersecurity & Data Protection GovernanceN/A10
GOV-13
State-Sponsored EspionageCybersecurity & Data Protection GovernanceN/A10
GOV-14
Business As Usual (BAU) Secure PracticesCybersecurity & Data Protection GovernanceN/A6
GOV-15
Operationalizing Cybersecurity & Data Protection PracticesCybersecurity & Data Protection GovernanceN/A9
GOV-15.1
Select ControlsCybersecurity & Data Protection GovernanceN/A8
GOV-15.2
Implement ControlsCybersecurity & Data Protection GovernanceN/A9
GOV-15.3
Assess ControlsCybersecurity & Data Protection GovernanceN/A8
GOV-15.4
Authorize Technology Assets, Applications and/or Services (TAAS)Cybersecurity & Data Protection GovernanceN/A8
GOV-15.5
Monitor ControlsCybersecurity & Data Protection GovernanceN/A8
GOV-16
Materiality DeterminationCybersecurity & Data Protection GovernanceN/A7
GOV-16.1
Material RisksCybersecurity & Data Protection GovernanceN/A7
GOV-16.2
Material ThreatsCybersecurity & Data Protection GovernanceN/A7
GOV-17
Cybersecurity & Data Protection Status ReportingCybersecurity & Data Protection GovernanceN/A8
GOV-18
Quality Management System (QMS)Cybersecurity & Data Protection GovernanceN/A4
GOV-19
AssuranceCybersecurity & Data Protection GovernanceN/A7
GOV-19.1
Assurance Levels (AL)Cybersecurity & Data Protection GovernanceN/A7
GOV-19.2
Assessment Objectives (AO)Cybersecurity & Data Protection GovernanceN/A7
GOV-20
Mergers, Acquisitions & Divestitures (MA&D)Cybersecurity & Data Protection GovernanceN/A6
GOV-20.1
Virtual Data Room (VDR)Cybersecurity & Data Protection GovernanceN/A6
AAT-29.6
Privileged Role & Delegation BoundariesArtificial & Autonomous TechnologiesN/A5
AST-01
Asset GovernanceAsset ManagementN/A10
AST-01.1
Asset-Service DependenciesAsset ManagementN/A5
AST-01.2
Stakeholder Identification & InvolvementAsset ManagementN/A5
AST-01.3
Standardized Naming ConventionAsset ManagementN/A5
AST-01.4
Approved TechnologiesAsset ManagementN/A7
AST-02
Asset InventoriesAsset ManagementN/A10
AST-02.1
Updates During Installations / RemovalsAsset ManagementN/A7
AST-02.2
Automated Unauthorized Component DetectionAsset ManagementN/A3
AST-02.3
Component Duplication AvoidanceAsset ManagementN/A2
AST-02.4
Approved Baseline DeviationsAsset ManagementN/A8
AST-02.5
Network Access Control (NAC)Asset ManagementN/A4
AST-02.6
Dynamic Host Configuration Protocol (DHCP) Server LoggingAsset ManagementN/A3
AST-02.7
Software Licensing RestrictionsAsset ManagementN/A8
AST-02.8
Data Action MappingAsset ManagementN/A9
AST-02.9
Configuration Management Database (CMDB)Asset ManagementN/A5
AST-02.10
Automated Location TrackingAsset ManagementN/A5
AST-02.11
Component AssignmentAsset ManagementN/A3
AST-03
Asset Ownership AssignmentAsset ManagementN/A8
AST-03.1
Accountability InformationAsset ManagementN/A5
AST-03.2
ProvenanceAsset ManagementN/A8
AST-04
Network Diagrams & Data Flow Diagrams (DFDs)Asset ManagementN/A10
AST-04.1
Asset Scope ClassificationAsset ManagementN/A8
AST-04.2
Control Applicability Boundary Graphical RepresentationAsset ManagementN/A6
AST-04.3
Compliance-Specific Asset IdentificationAsset ManagementN/A6
AST-05
Security of Assets & MediaAsset ManagementN/A8
AST-05.1
Management Approval For External Media TransferAsset ManagementN/A8
AST-06
Unattended End-User EquipmentAsset ManagementN/A9
AST-06.1
Asset Storage In AutomobilesAsset ManagementN/A7
AST-07
Kiosks & Point of Interaction (PoI) DevicesAsset ManagementN/A8
AST-08
Physical Tampering DetectionAsset ManagementN/A9
AST-09
Secure Disposal, Destruction or Re-Use of EquipmentAsset ManagementN/A10
AST-10
Return of AssetsAsset ManagementN/A8
AST-11
Removal of AssetsAsset ManagementN/A8
AST-12
Use of Personal DevicesAsset ManagementN/A10
AST-13
Use of Third-Party DevicesAsset ManagementN/A9
AST-14
Usage ParametersAsset ManagementN/A7
AST-14.1
Bluetooth & Wireless DevicesAsset ManagementN/A7
AST-14.2
Infrared CommunicationsAsset ManagementN/A5
AST-15
Logical Tampering ProtectionAsset ManagementN/A6
AST-15.1
Technology Asset InspectionsAsset ManagementN/A6
AST-16
Bring Your Own Device (BYOD) UsageAsset ManagementN/A10
AST-17
Prohibited Equipment & ServicesAsset ManagementN/A9
AST-18
Roots of Trust ProtectionAsset ManagementN/A4
AST-19
Telecommunications EquipmentAsset ManagementN/A9
AST-20
Video Teleconference (VTC) SecurityAsset ManagementN/A8
AST-21
Voice Over Internet Protocol (VoIP) SecurityAsset ManagementN/A8
AST-22
Microphones & Web CamerasAsset ManagementN/A8
AST-23
Multi-Function Devices (MFD)Asset ManagementN/A8
AST-24
Travel-Only DevicesAsset ManagementN/A8
AST-25
Re-Imaging Devices After TravelAsset ManagementN/A8
AST-26
System Administrative ProcessesAsset ManagementN/A9
AST-27
Jump ServerAsset ManagementN/A7
AST-28
Database Administrative ProcessesAsset ManagementN/A9
AST-28.1
Database Management System (DBMS)Asset ManagementN/A6
AST-29
Radio Frequency Identification (RFID) SecurityAsset ManagementN/A3
AST-29.1
Contactless Access Control SystemsAsset ManagementN/A3
AST-30
DecommissioningAsset ManagementN/A4
AST-31
Asset CategorizationAsset ManagementN/A9
AST-31.1
Categorize Artificial Intelligence (AI)-Related TechnologiesAsset ManagementN/A9
AST-31.2
High-Risk Asset CategorizationAsset ManagementN/A9
AST-31.3
Asset AttributesAsset ManagementN/A5
AST-32
Automated Network Asset DiscoveryAsset ManagementN/A3
BCD-01
Business Continuity Management System (BCMS)Business Continuity & Disaster RecoveryN/A10
BCD-01.1
Coordinate with Related PlansBusiness Continuity & Disaster RecoveryN/A5
BCD-01.2
Coordinate With External Service ProvidersBusiness Continuity & Disaster RecoveryN/A5
BCD-01.3
Transfer to Alternate Processing / Storage SiteBusiness Continuity & Disaster RecoveryN/A5
BCD-01.4
Recovery Time / Point Objectives (RTO / RPO)Business Continuity & Disaster RecoveryN/A5
BCD-01.5
Recovery Operations CriteriaBusiness Continuity & Disaster RecoveryN/A6
BCD-01.6
Recovery Operations CommunicationsBusiness Continuity & Disaster RecoveryN/A3
BCD-02
Identify Critical AssetsBusiness Continuity & Disaster RecoveryN/A9
BCD-02.1
Resume All Missions & Business FunctionsBusiness Continuity & Disaster RecoveryN/A8
BCD-02.2
Continue Essential Mission & Business FunctionsBusiness Continuity & Disaster RecoveryN/A8
BCD-02.3
Resume Essential Missions & Business FunctionsBusiness Continuity & Disaster RecoveryN/A8
BCD-02.4
Data Storage Location ReviewsBusiness Continuity & Disaster RecoveryN/A8
BCD-03
Contingency TrainingBusiness Continuity & Disaster RecoveryN/A5
BCD-03.1
Simulated EventsBusiness Continuity & Disaster RecoveryN/A3
BCD-03.2
Automated Training EnvironmentsBusiness Continuity & Disaster RecoveryN/A1
BCD-04
Contingency Plan Testing & ExercisesBusiness Continuity & Disaster RecoveryN/A6
BCD-04.1
Coordinated Testing with Related PlansBusiness Continuity & Disaster RecoveryN/A3
BCD-04.2
Alternate Storage & Processing SitesBusiness Continuity & Disaster RecoveryN/A5
BCD-05
Contingency Plan Root Cause Analysis (RCA) & Lessons LearnedBusiness Continuity & Disaster RecoveryN/A9
BCD-06
Ongoing Contingency PlanningBusiness Continuity & Disaster RecoveryN/A8
BCD-06.1
Contingency Planning ComponentsBusiness Continuity & Disaster RecoveryN/A8
BCD-06.2
Contingency Plan Update NotificationsBusiness Continuity & Disaster RecoveryN/A5
BCD-07
Alternative Security MeasuresBusiness Continuity & Disaster RecoveryN/A9
BCD-08
Alternate Storage SiteBusiness Continuity & Disaster RecoveryN/A9
BCD-08.1
Separation from Primary SiteBusiness Continuity & Disaster RecoveryN/A7
BCD-08.2
AccessibilityBusiness Continuity & Disaster RecoveryN/A5
BCD-09
Alternate Processing SiteBusiness Continuity & Disaster RecoveryN/A9
BCD-09.1
Separation from Primary SiteBusiness Continuity & Disaster RecoveryN/A7
BCD-09.2
AccessibilityBusiness Continuity & Disaster RecoveryN/A5
BCD-09.3
Alternate Site Priority of ServiceBusiness Continuity & Disaster RecoveryN/A6
BCD-09.4
Preparation for UseBusiness Continuity & Disaster RecoveryN/A5
BCD-09.5
Inability to Return to Primary SiteBusiness Continuity & Disaster RecoveryN/A5
BCD-10
Telecommunications Services AvailabilityBusiness Continuity & Disaster RecoveryN/A6
BCD-10.1
Telecommunications Priority of Service ProvisionsBusiness Continuity & Disaster RecoveryN/A6
BCD-10.2
Separation of Primary / Alternate ProvidersBusiness Continuity & Disaster RecoveryN/A5
BCD-10.3
Provider Contingency PlanBusiness Continuity & Disaster RecoveryN/A5
BCD-10.4
Alternate Communications ChannelsBusiness Continuity & Disaster RecoveryN/A5
BCD-11
Data BackupsBusiness Continuity & Disaster RecoveryN/A10
BCD-11.1
Testing for Reliability & IntegrityBusiness Continuity & Disaster RecoveryN/A9
BCD-11.2
Separate Storage for Critical InformationBusiness Continuity & Disaster RecoveryN/A8
BCD-11.3
Recovery ImagesBusiness Continuity & Disaster RecoveryN/A8
BCD-11.4
Cryptographic ProtectionBusiness Continuity & Disaster RecoveryN/A9
BCD-11.5
Test Restoration Using SamplingBusiness Continuity & Disaster RecoveryN/A5
BCD-11.6
Transfer to Alternate Storage SiteBusiness Continuity & Disaster RecoveryN/A5
BCD-11.7
Redundant Secondary SystemBusiness Continuity & Disaster RecoveryN/A5
BCD-11.8
Dual Authorization For Backup Media DestructionBusiness Continuity & Disaster RecoveryN/A5
BCD-11.9
Backup AccessBusiness Continuity & Disaster RecoveryN/A9
BCD-11.10
Backup Modification and/or DestructionBusiness Continuity & Disaster RecoveryN/A9
BCD-12
Technology Assets, Applications and/or Services (TAAS) Recovery & ReconstitutionBusiness Continuity & Disaster RecoveryN/A9
BCD-12.1
Transaction RecoveryBusiness Continuity & Disaster RecoveryN/A9
BCD-12.2
Failover CapabilityBusiness Continuity & Disaster RecoveryN/A8
BCD-12.3
Electronic Discovery (eDiscovery)Business Continuity & Disaster RecoveryN/A8
BCD-12.4
Restore Within Time PeriodBusiness Continuity & Disaster RecoveryN/A5
BCD-13
Backup & Restoration Hardware ProtectionBusiness Continuity & Disaster RecoveryN/A8
BCD-13.1
Restoration Integrity VerificationBusiness Continuity & Disaster RecoveryN/A7
BCD-14
Isolated Recovery EnvironmentBusiness Continuity & Disaster RecoveryN/A5
BCD-15
Reserve HardwareBusiness Continuity & Disaster RecoveryN/A7
BCD-16
AI & Autonomous Technologies IncidentsBusiness Continuity & Disaster RecoveryN/A10
CHG-02.5
Cryptographic ManagementChange ManagementN/A5
CPL-01
Statutory, Regulatory & Contractual ComplianceComplianceN/A10
CPL-01.1
Non-Compliance OversightComplianceN/A9
CPL-01.2
Compliance ScopeComplianceN/A10
CPL-01.3
Ability To Demonstrate ConformityComplianceN/A8
CPL-01.4
Conformity AssessmentComplianceN/A9
CPL-01.5
Declaration of ConformityComplianceN/A1
CPL-02
Cybersecurity & Data Protection Controls OversightComplianceN/A10
CPL-02.1
Internal Audit FunctionComplianceN/A5
CPL-02.2
Periodic AuditsComplianceN/A8
CPL-02.3
Corrective ActionComplianceN/A7
CPL-03
Cybersecurity & Data Protection AssessmentsComplianceN/A10
CPL-03.1
Independent AssessorsComplianceN/A6
CPL-03.2
Functional Review Of Cybersecurity & Data Protection ControlsComplianceN/A8
CPL-03.3
Assessor AccessComplianceN/A7
CPL-03.4
Assessment MethodsComplianceN/A7
CPL-03.5
Assessment RigorComplianceN/A7
CPL-03.6
Evidence Request List (ERL)ComplianceN/A7
CPL-03.7
Evidence SamplingComplianceN/A7
CPL-04
Audit ActivitiesComplianceN/A5
CPL-05
Legal Assessment of Investigative InquiresComplianceN/A2
CPL-05.1
Investigation Request NotificationsComplianceN/A2
CPL-05.2
Investigation Access RestrictionsComplianceN/A2
CPL-06
Government SurveillanceComplianceN/A10
CPL-07
GrievancesComplianceN/A5
CPL-07.1
Grievance ResponseComplianceN/A5
CPL-08
Localized RepresentationComplianceN/A2
CPL-09
Control ReciprocityComplianceN/A5
CPL-10
Control InheritanceComplianceN/A5
CPL-11
Dual Use TechnologyComplianceN/A8
CPL-11.1
USML or CCL IdentificationComplianceN/A8
CPL-11.2
Export-Controlled Access RestrictionsComplianceN/A8
CPL-11.3
Export Activities DocumentationComplianceN/A8
CPL-08.1
Representative PowersComplianceN/A2
CFG-02.6
Network Device Configuration File SynchronizationConfiguration ManagementN/A7
MON-01
Continuous MonitoringContinuous MonitoringN/A10
MON-01.1
Intrusion Detection & Prevention Systems (IDS & IPS)Continuous MonitoringN/A9
MON-01.2
Automated Tools for Real-Time AnalysisContinuous MonitoringN/A9
MON-01.3
Inbound & Outbound Communications TrafficContinuous MonitoringN/A9
MON-01.4
System Generated AlertsContinuous MonitoringN/A7
MON-01.5
Wireless Intrusion Detection System (WIDS)Continuous MonitoringN/A5
MON-01.6
Host-Based DevicesContinuous MonitoringN/A8
MON-01.7
File Integrity Monitoring (FIM)Continuous MonitoringN/A9
MON-01.8
Security Event MonitoringContinuous MonitoringN/A10
MON-01.9
Proxy LoggingContinuous MonitoringN/A8
MON-01.10
Deactivated Account ActivityContinuous MonitoringN/A9
MON-01.11
Automated Response to Suspicious EventsContinuous MonitoringN/A5
MON-01.12
Automated AlertsContinuous MonitoringN/A5
MON-01.13
Alert Threshold TuningContinuous MonitoringN/A5
MON-01.14
Individuals Posing Greater RiskContinuous MonitoringN/A5
MON-01.15
Privileged User OversightContinuous MonitoringN/A5
MON-01.16
Analyze and Prioritize Monitoring RequirementsContinuous MonitoringN/A5
MON-01.17
Real-Time Session MonitoringContinuous MonitoringN/A4
MON-02
Centralized Collection of Security Event LogsContinuous MonitoringN/A10
MON-02.1
Correlate Monitoring InformationContinuous MonitoringN/A9
MON-02.2
Central Review & AnalysisContinuous MonitoringN/A5
MON-02.3
Integration of Scanning & Other Monitoring InformationContinuous MonitoringN/A5
MON-02.4
Correlation with Physical MonitoringContinuous MonitoringN/A5
MON-02.5
Permitted ActionsContinuous MonitoringN/A5
MON-02.6
Audit Level AdjustmentsContinuous MonitoringN/A5
MON-02.7
System-Wide / Time-Correlated Audit TrailContinuous MonitoringN/A5
MON-02.8
Changes by Authorized IndividualsContinuous MonitoringN/A5
MON-02.9
Inventory of Technology Asset Event LoggingContinuous MonitoringN/A7
MON-03
Content of Event LogsContinuous MonitoringN/A10
MON-03.1
Sensitive Audit InformationContinuous MonitoringN/A8
MON-03.2
Audit TrailsContinuous MonitoringN/A10
MON-03.3
Privileged Functions LoggingContinuous MonitoringN/A8
MON-03.4
Verbosity Logging for Boundary DevicesContinuous MonitoringN/A5
MON-03.5
Limit Personal Data (PD) In Audit RecordsContinuous MonitoringN/A8
MON-03.6
Centralized Management of Planned Audit Record ContentContinuous MonitoringN/A5
MON-03.7
Database LoggingContinuous MonitoringN/A8
MON-04
Event Log Storage CapacityContinuous MonitoringN/A8
MON-05
Response To Event Log Processing FailuresContinuous MonitoringN/A8
MON-05.1
Real-Time Alerts of Event Logging FailureContinuous MonitoringN/A6
MON-05.2
Event Log Storage Capacity AlertingContinuous MonitoringN/A5
MON-06
Monitoring ReportingContinuous MonitoringN/A7
MON-06.1
Query Parameter Audits of Personal Data (PD)Continuous MonitoringN/A3
MON-06.2
Trend Analysis ReportingContinuous MonitoringN/A5
MON-07
Time StampsContinuous MonitoringN/A10
MON-07.1
Synchronization With Authoritative Time SourceContinuous MonitoringN/A8
MON-08
Protection of Event LogsContinuous MonitoringN/A10
MON-08.1
Event Log Backup on Separate Physical Systems / ComponentsContinuous MonitoringN/A5
MON-08.2
Access by Subset of Privileged UsersContinuous MonitoringN/A8
MON-08.3
Cryptographic Protection of Event Log InformationContinuous MonitoringN/A5
MON-08.4
Dual Authorization for Event Log MovementContinuous MonitoringN/A5
MON-09
Non-RepudiationContinuous MonitoringN/A8
MON-09.1
Identity BindingContinuous MonitoringN/A4
MON-10
Event Log RetentionContinuous MonitoringN/A10
MON-11
Monitoring For Information DisclosureContinuous MonitoringN/A8
MON-11.1
Analyze Traffic for Covert ExfiltrationContinuous MonitoringN/A5
MON-11.2
Unauthorized Network ServicesContinuous MonitoringN/A5
MON-11.3
Monitoring for Indicators of Compromise (IOC)Continuous MonitoringN/A5
MON-12
Session AuditContinuous MonitoringN/A7
MON-13
Alternate Event Logging CapabilityContinuous MonitoringN/A3
MON-14
Cross-Organizational MonitoringContinuous MonitoringN/A3
MON-14.1
Sharing of Event LogsContinuous MonitoringN/A5
MON-15
Covert Channel AnalysisContinuous MonitoringN/A3
MON-16
Anomalous BehaviorContinuous MonitoringN/A10
MON-16.1
Insider ThreatsContinuous MonitoringN/A8
MON-16.2
Third-Party ThreatsContinuous MonitoringN/A8
MON-16.3
Unauthorized ActivitiesContinuous MonitoringN/A8
MON-16.4
Account Creation and Modification LoggingContinuous MonitoringN/A7
MON-17
Event Log Analysis & TriageContinuous MonitoringN/A7
MON-17.1
Event Log Review Escalation MatrixContinuous MonitoringN/A7
MON-18
File Activity Monitoring (FAM)Continuous MonitoringN/A5
CRY-01
Use of Cryptographic ControlsCryptographic ProtectionsN/A10
CRY-01.1
Alternate Physical ProtectionCryptographic ProtectionsN/A5
CRY-01.2
Export-Controlled CryptographyCryptographic ProtectionsN/A5
CRY-01.3
Pre/Post Transmission HandlingCryptographic ProtectionsN/A5
CRY-01.4
Conceal / Randomize CommunicationsCryptographic ProtectionsN/A5
CRY-01.5
Cryptographic Cipher Suites and Protocols InventoryCryptographic ProtectionsN/A9
CRY-02
Cryptographic Module AuthenticationCryptographic ProtectionsN/A8
CRY-03
Transmission ConfidentialityCryptographic ProtectionsN/A10
CRY-04
Transmission IntegrityCryptographic ProtectionsN/A10
CRY-05
Encrypting Data At RestCryptographic ProtectionsN/A10
CRY-05.1
Storage MediaCryptographic ProtectionsN/A8
CRY-05.2
Offline StorageCryptographic ProtectionsN/A5
CRY-05.3
Database EncryptionCryptographic ProtectionsN/A8
CRY-06
Non-Console Administrative AccessCryptographic ProtectionsN/A9
CRY-07
Wireless Access Authentication & EncryptionCryptographic ProtectionsN/A9
CRY-08
Public Key Infrastructure (PKI)Cryptographic ProtectionsN/A9
CRY-08.1
AvailabilityCryptographic ProtectionsN/A9
CRY-09
Cryptographic Key ManagementCryptographic ProtectionsN/A10
CRY-09.1
Symmetric KeysCryptographic ProtectionsN/A9
CRY-09.2
Asymmetric KeysCryptographic ProtectionsN/A9
CRY-09.3
Cryptographic Key Loss or ChangeCryptographic ProtectionsN/A8
CRY-09.4
Control & Distribution of Cryptographic KeysCryptographic ProtectionsN/A9
CRY-09.5
Assigned OwnersCryptographic ProtectionsN/A8
CRY-09.6
Third-Party Cryptographic KeysCryptographic ProtectionsN/A7
CRY-09.7
External System Cryptographic Key ControlCryptographic ProtectionsN/A5
CRY-10
Transmission of Cybersecurity & Data Protection AttributesCryptographic ProtectionsN/A5
CRY-11
Certificate AuthoritiesCryptographic ProtectionsN/A8
CRY-12
Certificate MonitoringCryptographic ProtectionsN/A5
CRY-13
Cryptographic HashCryptographic ProtectionsN/A5
DCH-01
Data ProtectionData Classification & HandlingN/A10
DCH-01.1
Data StewardshipData Classification & HandlingN/A10
DCH-01.2
Sensitive / Regulated Data ProtectionData Classification & HandlingN/A9
DCH-01.3
Sensitive / Regulated Media RecordsData Classification & HandlingN/A6
DCH-01.4
Defining Access Authorizations for Sensitive / Regulated DataData Classification & HandlingN/A9
DCH-02
Data & Asset ClassificationData Classification & HandlingN/A10
DCH-02.1
Highest Classification LevelData Classification & HandlingN/A8
DCH-03
Media AccessData Classification & HandlingN/A8
DCH-03.1
Disclosure of InformationData Classification & HandlingN/A10
DCH-03.2
Masking Displayed DataData Classification & HandlingN/A7
DCH-03.3
Controlled ReleaseData Classification & HandlingN/A4
DCH-04
Media MarkingData Classification & HandlingN/A7
DCH-04.1
Automated MarkingData Classification & HandlingN/A2
DCH-05
Cybersecurity & Data Protection AttributesData Classification & HandlingN/A2
DCH-05.1
Dynamic Attribute AssociationData Classification & HandlingN/A2
DCH-05.2
Attribute Value Changes By Authorized IndividualsData Classification & HandlingN/A8
DCH-05.3
Maintenance of Attribute Associations By SystemData Classification & HandlingN/A2
DCH-05.4
Association of Attributes By Authorized IndividualsData Classification & HandlingN/A2
DCH-05.5
Attribute Displays for Output DevicesData Classification & HandlingN/A8
DCH-05.6
Data Subject Attribute AssociationsData Classification & HandlingN/A2
DCH-05.7
Consistent Attribute InterpretationData Classification & HandlingN/A2
DCH-05.8
Identity Association Techniques & TechnologiesData Classification & HandlingN/A2
DCH-05.9
Attribute ReassignmentData Classification & HandlingN/A7
DCH-05.10
Attribute Configuration By Authorized IndividualsData Classification & HandlingN/A8
DCH-05.11
Audit ChangesData Classification & HandlingN/A7
DCH-06
Media StorageData Classification & HandlingN/A8
DCH-06.1
Physically Secure All MediaData Classification & HandlingN/A9
DCH-06.2
Sensitive Data InventoriesData Classification & HandlingN/A9
DCH-06.3
Periodic Scans for Sensitive / Regulated DataData Classification & HandlingN/A7
DCH-06.4
Making Sensitive Data Unreadable In StorageData Classification & HandlingN/A9
DCH-06.5
Storing Authentication DataData Classification & HandlingN/A5
DCH-07
Media TransportationData Classification & HandlingN/A9
DCH-07.1
CustodiansData Classification & HandlingN/A9
DCH-07.2
Encrypting Data In Storage MediaData Classification & HandlingN/A5
DCH-08
Physical Media DisposalData Classification & HandlingN/A10
DCH-09
System Media SanitizationData Classification & HandlingN/A10
DCH-09.1
System Media Sanitization DocumentationData Classification & HandlingN/A7
DCH-09.2
Equipment TestingData Classification & HandlingN/A5
DCH-09.3
Sanitization of Personal Data (PD)Data Classification & HandlingN/A9
DCH-09.4
First Time Use SanitizationData Classification & HandlingN/A5
DCH-09.5
Dual Authorization for Sensitive Data DestructionData Classification & HandlingN/A5
DCH-10
Media UseData Classification & HandlingN/A8
DCH-10.1
Limitations on UseData Classification & HandlingN/A10
DCH-10.2
Prohibit Use Without OwnerData Classification & HandlingN/A5
DCH-11
Data ReclassificationData Classification & HandlingN/A8
DCH-12
Removable Media SecurityData Classification & HandlingN/A10
DCH-13
Use of External Technology Assets, Applications and/or Services (TAAS)Data Classification & HandlingN/A9
DCH-13.1
Limits of Authorized UseData Classification & HandlingN/A8
DCH-13.2
Portable Storage DevicesData Classification & HandlingN/A9
DCH-13.3
Protecting Sensitive / Regulated Data on External Technology Assets, Applications and/or Services (TAAS)Data Classification & HandlingN/A10
DCH-13.4
Non-Organizationally Owned Technology Assets, Applications and/or Services (TAAS)Data Classification & HandlingN/A5
DCH-14
Information SharingData Classification & HandlingN/A9
DCH-14.1
Information Search & RetrievalData Classification & HandlingN/A5
DCH-14.2
Transfer AuthorizationsData Classification & HandlingN/A8
DCH-14.3
Data Access MappingData Classification & HandlingN/A9
DCH-15
Publicly Accessible ContentData Classification & HandlingN/A10
DCH-16
Data Mining ProtectionData Classification & HandlingN/A7
DCH-17
Ad-Hoc TransfersData Classification & HandlingN/A8
DCH-18
Media & Data RetentionData Classification & HandlingN/A8
DCH-18.1
Minimize Sensitive / Regulated DataData Classification & HandlingN/A8
DCH-18.2
Limit Sensitive / Regulated Data In Testing, Training & ResearchData Classification & HandlingN/A8
DCH-18.3
Temporary Files Containing Personal Data (PD)Data Classification & HandlingN/A5
DCH-19
Geographic Location of DataData Classification & HandlingN/A9
DCH-20
Archived Data SetsData Classification & HandlingN/A8
DCH-21
Information DisposalData Classification & HandlingN/A10
DCH-22
Data Quality OperationsData Classification & HandlingN/A5
DCH-22.1
Updating & Correcting Personal Data (PD)Data Classification & HandlingN/A6
DCH-22.2
Data TagsData Classification & HandlingN/A3
DCH-22.3
Primary Source Personal Data (PD) CollectionData Classification & HandlingN/A8
DCH-23
De-Identification (Anonymization)Data Classification & HandlingN/A8
DCH-23.1
De-Identify Dataset Upon CollectionData Classification & HandlingN/A8
DCH-23.2
ArchivingData Classification & HandlingN/A8
DCH-23.3
ReleaseData Classification & HandlingN/A8
DCH-23.4
Removal, Masking, Encryption, Hashing or Replacement of Direct IdentifiersData Classification & HandlingN/A8
DCH-23.5
Statistical Disclosure ControlData Classification & HandlingN/A1
DCH-23.6
Differential Data PrivacyData Classification & HandlingN/A1
DCH-23.7
Automated De-Identification of Sensitive DataData Classification & HandlingN/A1
DCH-23.8
Motivated IntruderData Classification & HandlingN/A3
DCH-23.9
Code NamesData Classification & HandlingN/A1
DCH-24
Information LocationData Classification & HandlingN/A10
DCH-24.1
Automated Tools to Support Information LocationData Classification & HandlingN/A6
DCH-25
Transfer of Sensitive and/or Regulated DataData Classification & HandlingN/A10
DCH-25.1
Transfer Activity LimitsData Classification & HandlingN/A7
DCH-26
Data LocalizationData Classification & HandlingN/A10
DCH-27
Data Rights Management (DRM)Data Classification & HandlingN/A6
END-03.2
Governing Access Restriction for ChangeEndpoint SecurityN/A8
HRS-01
Human Resources Security ManagementHuman Resources SecurityN/A10
HRS-01.1
Onboarding, Transferring & Offboarding PersonnelHuman Resources SecurityN/A9
HRS-02
Position CategorizationHuman Resources SecurityN/A8
HRS-02.1
Users With Elevated PrivilegesHuman Resources SecurityN/A10
HRS-02.2
Probationary PeriodsHuman Resources SecurityN/A1
HRS-03
Defined Roles & ResponsibilitiesHuman Resources SecurityN/A10
HRS-03.1
User AwarenessHuman Resources SecurityN/A9
HRS-03.2
Competency Requirements for Security-Related PositionsHuman Resources SecurityN/A9
HRS-04
Personnel ScreeningHuman Resources SecurityN/A10
HRS-04.1
Roles With Special Protection MeasuresHuman Resources SecurityN/A9
HRS-04.2
Formal IndoctrinationHuman Resources SecurityN/A7
HRS-04.3
Citizenship RequirementsHuman Resources SecurityN/A5
HRS-04.4
Citizenship IdentificationHuman Resources SecurityN/A3
HRS-05
Terms of EmploymentHuman Resources SecurityN/A10
HRS-05.1
Rules of BehaviorHuman Resources SecurityN/A10
HRS-05.2
Social Media & Social Networking RestrictionsHuman Resources SecurityN/A9
HRS-05.3
Technology Use RestrictionsHuman Resources SecurityN/A10
HRS-05.4
Use of Critical TechnologiesHuman Resources SecurityN/A9
HRS-05.5
Use of Mobile DevicesHuman Resources SecurityN/A9
HRS-05.6
Security-Minded Dress CodeHuman Resources SecurityN/A1
HRS-05.7
Policy Familiarization & AcknowledgementHuman Resources SecurityN/A8
HRS-06
Access AgreementsHuman Resources SecurityN/A10
HRS-06.1
Confidentiality AgreementsHuman Resources SecurityN/A10
HRS-06.2
Post-Employment Requirements AwarenessHuman Resources SecurityN/A5
HRS-07
Personnel SanctionsHuman Resources SecurityN/A9
HRS-07.1
Workplace InvestigationsHuman Resources SecurityN/A8
HRS-07.2
Updating Disciplinary ProcessesHuman Resources SecurityN/A3
HRS-07.3
Preventative Access RestrictionHuman Resources SecurityN/A5
HRS-08
Personnel TransferHuman Resources SecurityN/A9
HRS-09
Personnel TerminationHuman Resources SecurityN/A9
HRS-09.1
Asset CollectionHuman Resources SecurityN/A9
HRS-09.2
High-Risk TerminationsHuman Resources SecurityN/A9
HRS-09.3
Post-Employment Requirements NotificationHuman Resources SecurityN/A8
HRS-09.4
Automated Employment Status NotificationsHuman Resources SecurityN/A5
HRS-10
Third-Party Personnel SecurityHuman Resources SecurityN/A10
HRS-11
Separation of Duties (SoD)Human Resources SecurityN/A7
HRS-12
Incompatible RolesHuman Resources SecurityN/A8
HRS-12.1
Two-Person RuleHuman Resources SecurityN/A7
HRS-13
Identify Critical Skills & GapsHuman Resources SecurityN/A5
HRS-13.1
Remediate Identified Skills DeficienciesHuman Resources SecurityN/A5
HRS-13.2
Identify Vital Cybersecurity & Data Privacy StaffHuman Resources SecurityN/A5
HRS-13.3
Establish Redundancy for Vital Cybersecurity & Data Privacy StaffHuman Resources SecurityN/A5
HRS-13.4
Perform Succession PlanningHuman Resources SecurityN/A5
HRS-14
Identifying Authorized Work LocationsHuman Resources SecurityN/A8
HRS-14.1
Communicating Authorized Work LocationsHuman Resources SecurityN/A8
HRS-15
Reporting Suspicious ActivitiesHuman Resources SecurityN/A7
IAC-01
Identity & Access Management (IAM)Identification & AuthenticationN/A10
IAC-01.1
Retain Access RecordsIdentification & AuthenticationN/A3
IAC-01.2
Authenticate, Authorize and Audit (AAA)Identification & AuthenticationN/A9
IAC-01.3
User & Service Account InventoriesIdentification & AuthenticationN/A10
IAC-02
Identification & Authentication for Organizational UsersIdentification & AuthenticationN/A9
IAC-02.1
Group AuthenticationIdentification & AuthenticationN/A7
IAC-02.2
Replay-Resistant AuthenticationIdentification & AuthenticationN/A9
IAC-02.3
Acceptance of PIV CredentialsIdentification & AuthenticationN/A2
IAC-02.4
Out-of-Band Authentication (OOBA)Identification & AuthenticationN/A5
IAC-03
Identification & Authentication for Non-Organizational UsersIdentification & AuthenticationN/A9
IAC-03.1
Acceptance of PIV Credentials from Other OrganizationsIdentification & AuthenticationN/A2
IAC-03.2
Acceptance of Third-Party CredentialsIdentification & AuthenticationN/A2
IAC-03.3
Use of FICAM-Issued ProfilesIdentification & AuthenticationN/A2
IAC-03.4
DisassociabilityIdentification & AuthenticationN/A2
IAC-03.5
Acceptance of External AuthenticatorsIdentification & AuthenticationN/A4
IAC-04
Identification & Authentication for DevicesIdentification & AuthenticationN/A9
IAC-04.1
Device AttestationIdentification & AuthenticationN/A5
IAC-04.2
Device Authorization EnforcementIdentification & AuthenticationN/A5
IAC-05
Identification & Authentication for Third-Party Technology Assets, Applications and/or Services (TAAS)Identification & AuthenticationN/A9
IAC-05.1
Sharing Identification & Authentication InformationIdentification & AuthenticationN/A5
IAC-05.2
Privileged Access by Non-Organizational UsersIdentification & AuthenticationN/A9
IAC-06
Multi-Factor Authentication (MFA)Identification & AuthenticationN/A9
IAC-06.1
Network Access to Privileged AccountsIdentification & AuthenticationN/A9
IAC-06.2
Network Access to Non-Privileged AccountsIdentification & AuthenticationN/A7
IAC-06.3
Local Access to Privileged AccountsIdentification & AuthenticationN/A5
IAC-06.4
Out-of-Band Multi-Factor AuthenticationIdentification & AuthenticationN/A5
IAC-06.5
Alternative Multi-Factor AuthenticationIdentification & AuthenticationN/A5
IAC-07
User Provisioning & De-ProvisioningIdentification & AuthenticationN/A10
IAC-07.1
Change of Roles & DutiesIdentification & AuthenticationN/A10
IAC-07.2
Termination of EmploymentIdentification & AuthenticationN/A10
IAC-08
Role-Based Access Control (RBAC)Identification & AuthenticationN/A9
IAC-09
Identifier Management (User Names)Identification & AuthenticationN/A9
IAC-09.1
User Identity (ID) ManagementIdentification & AuthenticationN/A9
IAC-09.2
Identity User StatusIdentification & AuthenticationN/A7
IAC-09.3
Dynamic ManagementIdentification & AuthenticationN/A5
IAC-09.4
Cross-Organization ManagementIdentification & AuthenticationN/A5
IAC-09.5
Privileged Account IdentifiersIdentification & AuthenticationN/A9
IAC-09.6
Pairwise Pseudonymous Identifiers (PPID)Identification & AuthenticationN/A1
IAC-10
Authenticator ManagementIdentification & AuthenticationN/A10
IAC-10.1
Password-Based AuthenticationIdentification & AuthenticationN/A9
IAC-10.2
PKI-Based AuthenticationIdentification & AuthenticationN/A9
IAC-10.3
In-Person or Trusted Third-Party RegistrationIdentification & AuthenticationN/A9
IAC-10.4
Automated Support For Password StrengthIdentification & AuthenticationN/A5
IAC-10.5
Protection of AuthenticatorsIdentification & AuthenticationN/A10
IAC-10.6
No Embedded Unencrypted Static AuthenticatorsIdentification & AuthenticationN/A10
IAC-10.7
Hardware Token-Based AuthenticationIdentification & AuthenticationN/A9
IAC-10.8
Default AuthenticatorsIdentification & AuthenticationN/A10
IAC-10.9
Multiple System AccountsIdentification & AuthenticationN/A5
IAC-10.10
Expiration of Cached AuthenticatorsIdentification & AuthenticationN/A5
IAC-10.11
Password ManagersIdentification & AuthenticationN/A8
IAC-10.12
Biometric AuthenticationIdentification & AuthenticationN/A5
IAC-10.13
Events Requiring Authenticator ChangeIdentification & AuthenticationN/A9
IAC-10.14
PasskeysIdentification & AuthenticationN/A8
IAC-11
Authenticator FeedbackIdentification & AuthenticationN/A6
IAC-12
Cryptographic Module AuthenticationIdentification & AuthenticationN/A8
IAC-12.1
Hardware Security Modules (HSM)Identification & AuthenticationN/A3
IAC-13
Adaptive Identification & AuthenticationIdentification & AuthenticationN/A5
IAC-13.1
Single Sign-On (SSO) Transparent AuthenticationIdentification & AuthenticationN/A5
IAC-13.2
Federated Credential ManagementIdentification & AuthenticationN/A4
IAC-13.3
Continuous AuthenticationIdentification & AuthenticationN/A2
IAC-14
Re-AuthenticationIdentification & AuthenticationN/A8
IAC-15
Account ManagementIdentification & AuthenticationN/A10
IAC-15.1
Automated System Account Management (Directory Services)Identification & AuthenticationN/A5
IAC-15.2
Removal of Temporary / Emergency AccountsIdentification & AuthenticationN/A9
IAC-15.3
Disable Inactive AccountsIdentification & AuthenticationN/A10
IAC-15.4
Automated Audit ActionsIdentification & AuthenticationN/A5
IAC-15.5
Restrictions on Shared Groups / AccountsIdentification & AuthenticationN/A10
IAC-15.6
Account Disabling for High Risk IndividualsIdentification & AuthenticationN/A10
IAC-15.7
System Account ReviewsIdentification & AuthenticationN/A10
IAC-15.8
Usage ConditionsIdentification & AuthenticationN/A5
IAC-15.9
Emergency AccountsIdentification & AuthenticationN/A5
IAC-16
Privileged Account Management (PAM)Identification & AuthenticationN/A10
IAC-16.1
Privileged Account InventoriesIdentification & AuthenticationN/A10
IAC-16.2
Privileged Account SeparationIdentification & AuthenticationN/A4
IAC-16.3
Privileged Command ExecutionIdentification & AuthenticationN/A5
IAC-16.4
Dedicated Privileged AccountIdentification & AuthenticationN/A7
IAC-17
Periodic Review of Account PrivilegesIdentification & AuthenticationN/A10
IAC-18
User Responsibilities for Account ManagementIdentification & AuthenticationN/A10
IAC-19
Credential SharingIdentification & AuthenticationN/A10
IAC-20
Access EnforcementIdentification & AuthenticationN/A10
IAC-20.1
Access To Sensitive / Regulated DataIdentification & AuthenticationN/A10
IAC-20.2
Database AccessIdentification & AuthenticationN/A10
IAC-20.3
Use of Privileged Utility ProgramsIdentification & AuthenticationN/A9
IAC-20.4
Dedicated Administrative MachinesIdentification & AuthenticationN/A8
IAC-20.5
Dual Authorization for Privileged CommandsIdentification & AuthenticationN/A5
IAC-20.6
Revocation of Access AuthorizationsIdentification & AuthenticationN/A9
IAC-20.7
Authorized System AccountsIdentification & AuthenticationN/A9
IAC-21
Least PrivilegeIdentification & AuthenticationN/A10
IAC-21.1
Authorize Access to Security FunctionsIdentification & AuthenticationN/A9
IAC-21.2
Non-Privileged Access for Non-Security FunctionsIdentification & AuthenticationN/A9
IAC-21.3
Management Approval For Privileged AccountsIdentification & AuthenticationN/A10
IAC-21.4
Auditing Use of Privileged FunctionsIdentification & AuthenticationN/A9
IAC-21.5
Prohibit Non-Privileged Users from Executing Privileged FunctionsIdentification & AuthenticationN/A9
IAC-21.6
Network Access to Privileged CommandsIdentification & AuthenticationN/A5
IAC-21.7
Privilege Levels for Code ExecutionIdentification & AuthenticationN/A5
IAC-22
Account LockoutIdentification & AuthenticationN/A9
IAC-23
Concurrent Session ControlIdentification & AuthenticationN/A6
IAC-24
Session LockIdentification & AuthenticationN/A9
IAC-24.1
Pattern-Hiding DisplaysIdentification & AuthenticationN/A9
IAC-25
Session TerminationIdentification & AuthenticationN/A9
IAC-25.1
User-Initiated Logouts / Message DisplaysIdentification & AuthenticationN/A5
IAC-26
Permitted Actions Without Identification or AuthorizationIdentification & AuthenticationN/A8
IAC-27
Reference MonitorIdentification & AuthenticationN/A1
IAC-28
Identity Proofing (Identity Verification)Identification & AuthenticationN/A10
IAC-28.1
Management Approval For New or Changed AccountsIdentification & AuthenticationN/A10
IAC-28.2
Identity EvidenceIdentification & AuthenticationN/A5
IAC-28.3
Identity Evidence Validation & VerificationIdentification & AuthenticationN/A5
IAC-28.4
In-Person Validation & VerificationIdentification & AuthenticationN/A5
IAC-28.5
Address ConfirmationIdentification & AuthenticationN/A1
IAC-29
Attribute-Based Access Control (ABAC)Identification & AuthenticationN/A5
IAC-29.1
Real-Time Access DecisionsIdentification & AuthenticationN/A3
IAC-29.2
Access Profile RulesIdentification & AuthenticationN/A5
IRO-01
Incident Response OperationsIncident ResponseN/A9
IRO-02
Incident HandlingIncident ResponseN/A10
IRO-02.1
Automated Incident Handling ProcessesIncident ResponseN/A1
IRO-02.2
Insider Threat Response CapabilityIncident ResponseN/A5
IRO-02.3
Dynamic ReconfigurationIncident ResponseN/A5
IRO-02.4
Incident Classification & PrioritizationIncident ResponseN/A5
IRO-02.5
Correlation with External OrganizationsIncident ResponseN/A5
IRO-02.6
Automatic Disabling of Technology Assets, Applications and/or Services (TAAS)Incident ResponseN/A6
IRO-03
Indicators of Compromise (IOC)Incident ResponseN/A8
IRO-04
Incident Response Plan (IRP)Incident ResponseN/A9
IRO-04.1
Data BreachIncident ResponseN/A8
IRO-04.2
IRP UpdateIncident ResponseN/A8
IRO-04.3
Continuous Incident Response ImprovementsIncident ResponseN/A3
IRO-05
Incident Response TrainingIncident ResponseN/A9
IRO-05.1
Simulated IncidentsIncident ResponseN/A5
IRO-05.2
Automated Incident Response Training EnvironmentsIncident ResponseN/A5
IRO-06
Incident Response TestingIncident ResponseN/A9
IRO-06.1
Coordination with Related PlansIncident ResponseN/A7
IRO-07
Integrated Security Incident Response Team (ISIRT)Incident ResponseN/A9
IRO-08
Chain of Custody & ForensicsIncident ResponseN/A9
IRO-09
Situational Awareness For IncidentsIncident ResponseN/A8
IRO-09.1
Automated Tracking, Data Collection & AnalysisIncident ResponseN/A1
IRO-09.2
Recurring Incident AnalysisIncident ResponseN/A5
IRO-10
Incident Stakeholder ReportingIncident ResponseN/A9
IRO-10.1
Automated ReportingIncident ResponseN/A9
IRO-10.2
Cyber Incident Reporting for Sensitive / Regulated DataIncident ResponseN/A9
IRO-10.3
Vulnerabilities Related To IncidentsIncident ResponseN/A8
IRO-10.4
Supply Chain CoordinationIncident ResponseN/A7
IRO-10.5
Serious Incident ReportingIncident ResponseN/A5
IRO-11
Incident Reporting AssistanceIncident ResponseN/A5
IRO-11.1
Automation Support of Availability of Information / SupportIncident ResponseN/A1
IRO-11.2
Coordination With External ProvidersIncident ResponseN/A5
IRO-12
Sensitive / Regulated Data Spill ResponseIncident ResponseN/A8
IRO-12.1
Sensitive / Regulated Data Spill Responsible PersonnelIncident ResponseN/A8
IRO-12.2
Sensitive / Regulated Data Spill TrainingIncident ResponseN/A8
IRO-12.3
Post-Sensitive / Regulated Data Spill OperationsIncident ResponseN/A8
IRO-12.4
Sensitive / Regulated Data Exposure to Unauthorized PersonnelIncident ResponseN/A8
IRO-13
Root Cause Analysis (RCA) & Lessons LearnedIncident ResponseN/A8
IRO-14
Regulatory & Law Enforcement ContactsIncident ResponseN/A9
IRO-15
Detonation Chambers (Sandboxes)Incident ResponseN/A5
IRO-16
Public Relations & Reputation RepairIncident ResponseN/A6
IAO-01
Information Assurance (IA) OperationsInformation AssuranceN/A10
IAO-01.1
Assessment BoundariesInformation AssuranceN/A9
IAO-02
AssessmentsInformation AssuranceN/A10
IAO-02.1
Assessor IndependenceInformation AssuranceN/A9
IAO-02.2
Specialized AssessmentsInformation AssuranceN/A9
IAO-02.3
Third-Party AssessmentsInformation AssuranceN/A9
IAO-02.4
Security Assessment Report (SAR)Information AssuranceN/A7
IAO-03
System Security & Privacy Plan (SSPP)Information AssuranceN/A7
IAO-03.1
Plan / Coordinate with Other Organizational EntitiesInformation AssuranceN/A5
IAO-03.2
Adequate Security for Sensitive / Regulated Data In Support of ContractsInformation AssuranceN/A7
IAO-04
Threat Analysis & Flaw Remediation During DevelopmentInformation AssuranceN/A10
IAO-05
Plan of Action & Milestones (POA&M)Information AssuranceN/A9
IAO-05.1
Plan of Action & Milestones (POA&M) AutomationInformation AssuranceN/A2
IAO-06
Technical VerificationInformation AssuranceN/A8
IAO-07
Security AuthorizationInformation AssuranceN/A10
NET-01
Network Security Controls (NSC)Network SecurityN/A10
NET-01.1
Zero Trust Architecture (ZTA)Network SecurityN/A8
NET-02
Layered Network DefensesNetwork SecurityN/A9
NET-02.1
Denial of Service (DoS) ProtectionNetwork SecurityN/A9
NET-02.2
Guest NetworksNetwork SecurityN/A6
NET-02.3
Cross Domain Solution (CDS)Network SecurityN/A6
NET-03
Boundary ProtectionNetwork SecurityN/A10
NET-03.1
Limit Network ConnectionsNetwork SecurityN/A9
NET-03.2
External Telecommunications ServicesNetwork SecurityN/A7
NET-03.3
Prevent Discovery of Internal InformationNetwork SecurityN/A7
NET-03.4
Personal Data (PD)Network SecurityN/A7
NET-03.5
Prevent Unauthorized ExfiltrationNetwork SecurityN/A5
NET-03.6
Dynamic Isolation & Segregation (Sandboxing)Network SecurityN/A5
NET-03.7
Isolation of System ComponentsNetwork SecurityN/A5
NET-03.8
Separate Subnet for Connecting to Different Security DomainsNetwork SecurityN/A5
NET-04
Data Flow Enforcement – Access Control Lists (ACLs)Network SecurityN/A10
NET-04.1
Deny Traffic by Default & Allow Traffic by ExceptionNetwork SecurityN/A10
NET-04.2
Object Security AttributesNetwork SecurityN/A5
NET-04.3
Content Check for Encrypted DataNetwork SecurityN/A4
NET-04.4
Embedded Data TypesNetwork SecurityN/A2
NET-04.5
MetadataNetwork SecurityN/A2
NET-04.6
Human ReviewsNetwork SecurityN/A9
NET-04.7
Policy Decision Point (PDP)Network SecurityN/A5
NET-04.8
Data Type IdentifiersNetwork SecurityN/A5
NET-04.9
Decomposition Into Policy-Related SubcomponentsNetwork SecurityN/A5
NET-04.10
Detection of Unsanctioned InformationNetwork SecurityN/A5
NET-04.11
Approved SolutionsNetwork SecurityN/A5
NET-04.12
Cross Domain AuthenticationNetwork SecurityN/A5
NET-04.13
Metadata ValidationNetwork SecurityN/A2
NET-04.14
Application ProxyNetwork SecurityN/A7
NET-05
Interconnection Security Agreements (ISAs)Network SecurityN/A9
NET-05.1
External System ConnectionsNetwork SecurityN/A8
NET-05.2
Internal System ConnectionsNetwork SecurityN/A7
NET-06
Network Segmentation (macrosegementation)Network SecurityN/A10
NET-06.1
Security Management SubnetsNetwork SecurityN/A9
NET-06.2
Virtual Local Area Network (VLAN) SeparationNetwork SecurityN/A9
NET-06.3
Sensitive / Regulated Data Enclave (Secure Zone)Network SecurityN/A10
NET-06.4
Segregation From Enterprise ServicesNetwork SecurityN/A4
NET-06.5
Direct Internet Access RestrictionsNetwork SecurityN/A6
NET-06.6
MicrosegmentationNetwork SecurityN/A2
NET-06.7
Software Defined Networking (SDN)Network SecurityN/A5
NET-07
Network Connection TerminationNetwork SecurityN/A8
NET-08
Network Intrusion Detection / Prevention Systems (NIDS / NIPS)Network SecurityN/A9
NET-08.1
DMZ NetworksNetwork SecurityN/A8
NET-08.2
Wireless Intrusion Detection / Prevention Systems (WIDS / WIPS)Network SecurityN/A8
NET-08.3
Host ContainmentNetwork SecurityN/A3
NET-08.4
Resource ContainmentNetwork SecurityN/A3
NET-09
Session IntegrityNetwork SecurityN/A8
NET-09.1
Invalidate Session Identifiers at LogoutNetwork SecurityN/A5
NET-09.2
Unique System-Generated Session IdentifiersNetwork SecurityN/A3
NET-10
Domain Name Service (DNS) ResolutionNetwork SecurityN/A10
NET-10.1
Architecture & Provisioning for Name / Address Resolution ServiceNetwork SecurityN/A9
NET-10.2
Secure Name / Address Resolution Service (Recursive or Caching Resolver)Network SecurityN/A9
NET-10.3
Sender Policy Framework (SPF)Network SecurityN/A8
NET-10.4
Domain Registrar SecurityNetwork SecurityN/A9
NET-11
Out-of-Band ChannelsNetwork SecurityN/A9
NET-12
Safeguarding Data Over Open NetworksNetwork SecurityN/A8
NET-12.1
Wireless Link ProtectionNetwork SecurityN/A8
NET-12.2
End-User Messaging TechnologiesNetwork SecurityN/A9
NET-13
Electronic MessagingNetwork SecurityN/A10
NET-14
Remote AccessNetwork SecurityN/A10
NET-14.1
Automated Monitoring & ControlNetwork SecurityN/A1
NET-14.2
Protection of Confidentiality / Integrity Using EncryptionNetwork SecurityN/A9
NET-14.3
Managed Access Control PointsNetwork SecurityN/A9
NET-14.4
Remote Privileged Commands & Sensitive Data AccessNetwork SecurityN/A8
NET-14.5
Work From Anywhere (WFA) - Telecommuting SecurityNetwork SecurityN/A10
NET-14.6
Third-Party Remote Access GovernanceNetwork SecurityN/A8
NET-14.7
Endpoint Security ValidationNetwork SecurityN/A6
NET-14.8
Expeditious Disconnect / Disable CapabilityNetwork SecurityN/A8
NET-15
Wireless NetworkingNetwork SecurityN/A9
NET-15.1
Authentication & EncryptionNetwork SecurityN/A9
NET-15.2
Disable Wireless NetworkingNetwork SecurityN/A5
NET-15.3
Restrict Configuration By UsersNetwork SecurityN/A8
NET-15.4
Wireless BoundariesNetwork SecurityN/A5
NET-15.5
Rogue Wireless DetectionNetwork SecurityN/A8
NET-16
IntranetsNetwork SecurityN/A8
NET-17
Data Loss Prevention (DLP)Network SecurityN/A8
NET-18
DNS & Content FilteringNetwork SecurityN/A9
NET-18.1
Route Internal Traffic to Proxy ServersNetwork SecurityN/A9
NET-18.2
Visibility of Encrypted CommunicationsNetwork SecurityN/A5
NET-18.3
Route Privileged Network AccessNetwork SecurityN/A1
NET-18.4
Protocol Compliance EnforcementNetwork SecurityN/A5
NET-18.5
Domain Name VerificationNetwork SecurityN/A8
NET-18.6
Internet Address DenylistingNetwork SecurityN/A8
NET-18.7
Bandwidth ControlNetwork SecurityN/A2
NET-18.8
Authenticated ProxyNetwork SecurityN/A3
NET-18.9
Certificate DenylistingNetwork SecurityN/A7
NET-19
Content Disarm and Reconstruction (CDR)Network SecurityN/A6
NET-20
Email Content ProtectionsNetwork SecurityN/A10
NET-20.1
Email Domain Reputation ProtectionsNetwork SecurityN/A1
NET-20.2
Sender DenylistingNetwork SecurityN/A7
NET-20.3
Authenticated Received Chain (ARC)Network SecurityN/A2
NET-20.4
Domain-Based Message Authentication Reporting and Conformance (DMARC)Network SecurityN/A3
NET-20.5
User Digital Signatures for Outgoing EmailNetwork SecurityN/A6
NET-20.6
Encryption for Outgoing EmailNetwork SecurityN/A6
NET-20.7
Adaptive Email ProtectionsNetwork SecurityN/A1
NET-20.8
Email LabelingNetwork SecurityN/A5
NET-20.9
User Threat ReportingNetwork SecurityN/A1
PES-04.2
SearchesPhysical & Environmental SecurityN/A1
PES-05
Monitoring Physical AccessPhysical & Environmental SecurityN/A7
PES-05.2
Monitoring Physical Access To Critical SystemsPhysical & Environmental SecurityN/A5
PES-09.1
Monitoring with Alarms / NotificationsPhysical & Environmental SecurityN/A8
PRI-01
Data Privacy ProgramData PrivacyN/A10
PRI-01.1
Chief Privacy Officer (CPO)Data PrivacyN/A3
PRI-01.2
Privacy Act StatementsData PrivacyN/A2
PRI-01.3
Dissemination of Data Privacy Program InformationData PrivacyN/A5
PRI-01.4
Data Protection Officer (DPO)Data PrivacyN/A7
PRI-01.5
Binding Corporate Rules (BCR)Data PrivacyN/A5
PRI-01.6
Security of Personal Data (PD)Data PrivacyN/A7
PRI-01.7
Limiting Personal Data (PD) DisclosuresData PrivacyN/A7
PRI-01.8
Data FiduciaryData PrivacyN/A7
PRI-01.9
Personal Data (PD) Process ManagerData PrivacyN/A5
PRI-01.10
Financial Incentives For Personal Data (PD)Data PrivacyN/A3
PRI-02
Data Privacy NoticeData PrivacyN/A7
PRI-02.1
Purpose SpecificationData PrivacyN/A7
PRI-02.2
Automated Data Management ProcessesData PrivacyN/A1
PRI-02.3
Computer Matching Agreements (CMA)Data PrivacyN/A1
PRI-02.4
System of Records Notice (SORN)Data PrivacyN/A1
PRI-02.5
System of Records Notice (SORN) Review ProcessData PrivacyN/A1
PRI-02.6
Privacy Act ExemptionsData PrivacyN/A1
PRI-02.7
Real-Time or Layered NoticeData PrivacyN/A2
PRI-03
Choice & ConsentData PrivacyN/A7
PRI-03.1
Tailored ConsentData PrivacyN/A1
PRI-03.2
Just-In-Time Notice & Updated ConsentData PrivacyN/A1
PRI-03.3
Prohibition of Selling, Processing and/or Sharing Personal Data (PD)Data PrivacyN/A5
PRI-03.4
Revoke ConsentData PrivacyN/A3
PRI-03.5
Product or Service Delivery RestrictionsData PrivacyN/A7
PRI-03.6
Authorized AgentData PrivacyN/A6
PRI-03.7
Active Participation By Data SubjectsData PrivacyN/A3
PRI-03.8
Global Privacy Control (GPC)Data PrivacyN/A5
PRI-03.9
Continued Use of Personal Data (PD)Data PrivacyN/A5
PRI-03.10
Cease Processing, Storing and/or Sharing Personal Data (PD)Data PrivacyN/A6
PRI-03.11
Communicating Processing ChangesData PrivacyN/A5
PRI-04
Restrict Collection To Identified PurposeData PrivacyN/A7
PRI-04.1
Authority To Collect, Process, Store & Share Personal Data (PD)Data PrivacyN/A7
PRI-04.2
Primary SourcesData PrivacyN/A7
PRI-04.3
Identifiable Image CollectionData PrivacyN/A7
PRI-04.4
Acquired Personal Data (PD)Data PrivacyN/A6
PRI-04.5
Validate Collected Personal Data (PD)Data PrivacyN/A1
PRI-04.6
Re-Validate Collected Personal Data (PD)Data PrivacyN/A1
PRI-04.7
Personal Data (PD) Collection MethodsData PrivacyN/A3
PRI-05
Personal Data (PD) Retention & DisposalData PrivacyN/A8
PRI-05.1
Internal Use of Personal Data (PD) For Testing, Training and ResearchData PrivacyN/A8
PRI-05.2
Personal Data (PD) Accuracy & IntegrityData PrivacyN/A5
PRI-05.3
Data MaskingData PrivacyN/A8
PRI-05.4
Usage Restrictions of Personal Data (PD)Data PrivacyN/A8
PRI-05.5
Inventory of Personal Data (PD)Data PrivacyN/A8
PRI-05.6
Personal Data (PD) Inventory Automation SupportData PrivacyN/A1
PRI-05.7
Personal Data (PD) CategoriesData PrivacyN/A5
PRI-05.8
Personal Data (PD) FormatsData PrivacyN/A4
PRI-06
Data Subject EmpowermentData PrivacyN/A6
PRI-06.1
Correcting Inaccurate Personal Data (PD)Data PrivacyN/A5
PRI-06.2
Notice of Correction or Processing ChangeData PrivacyN/A4
PRI-06.3
Appeal Adverse DecisionData PrivacyN/A4
PRI-06.4
User Feedback ManagementData PrivacyN/A5
PRI-06.5
Right to ErasureData PrivacyN/A5
PRI-06.6
Data PortabilityData PrivacyN/A3
PRI-06.7
Personal Data (PD) ExportsData PrivacyN/A5
PRI-07
Information Sharing With Third PartiesData PrivacyN/A9
PRI-07.1
Data Privacy Requirements for Contractors & Service ProvidersData PrivacyN/A10
PRI-07.2
Joint Processing of Personal Data (PD)Data PrivacyN/A5
PRI-07.3
Obligation To Inform Third-PartiesData PrivacyN/A5
PRI-07.4
Reject Unauthenticated or Untrustworthy Disclosure RequestsData PrivacyN/A5
PRI-07.5
Justification To Reject Disclosure RequestsData PrivacyN/A5
PRI-08
Testing, Training & MonitoringData PrivacyN/A8
PRI-09
Personal Data (PD) LineageData PrivacyN/A5
PRI-10
Data Quality ManagementData PrivacyN/A5
PRI-10.1
AutomationData PrivacyN/A1
PRI-10.2
Data Analytics BiasData PrivacyN/A5
PRI-11
Data TaggingData PrivacyN/A3
PRI-12
Updating Personal Data (PD)Data PrivacyN/A9
PRI-12.1
Enabling Data Subjects To Update Personal Data (PD)Data PrivacyN/A4
PRI-13
Data Management BoardData PrivacyN/A3
PRI-14
Documenting Data Processing ActivitiesData PrivacyN/A8
PRI-14.1
Accounting of DisclosuresData PrivacyN/A8
PRI-14.2
Notification of Disclosure Request To Data SubjectData PrivacyN/A5
PRI-15
Register As A Data Controller and/or Data ProcessorData PrivacyN/A3
PRI-16
Potential Human Rights AbusesData PrivacyN/A10
PRI-17
Data Subject CommunicationsData PrivacyN/A6
PRI-17.1
Conspicuous Link To Data Privacy NoticeData PrivacyN/A4
PRI-17.2
Notice of Financial IncentiveData PrivacyN/A2
PRI-18
Data Controller CommunicationsData PrivacyN/A7
PRM-02.1
Prioritization To Address Evolving Risks & ThreatsProject & Resource ManagementN/A5
RSK-01
Risk Management ProgramRisk ManagementN/A10
RSK-01.1
Risk FramingRisk ManagementN/A9
RSK-01.2
Risk Management ResourcingRisk ManagementN/A8
RSK-01.3
Risk ToleranceRisk ManagementN/A9
RSK-01.4
Risk ThresholdRisk ManagementN/A9
RSK-01.5
Risk AppetiteRisk ManagementN/A9
RSK-02
Risk-Based Security CategorizationRisk ManagementN/A9
RSK-02.1
Impact-Level PrioritizationRisk ManagementN/A9
RSK-03
Risk IdentificationRisk ManagementN/A9
RSK-03.1
Risk CatalogRisk ManagementN/A5
RSK-04
Risk AssessmentRisk ManagementN/A10
RSK-04.1
Risk RegisterRisk ManagementN/A10
RSK-04.2
Risk Assessment MethodologyRisk ManagementN/A8
RSK-05
Risk RankingRisk ManagementN/A9
RSK-06
Risk RemediationRisk ManagementN/A10
RSK-06.1
Risk ResponseRisk ManagementN/A9
RSK-06.2
Compensating CountermeasuresRisk ManagementN/A9
RSK-07
Risk Assessment UpdateRisk ManagementN/A9
RSK-08
Business Impact Analysis (BIA)Risk ManagementN/A8
RSK-09
Supply Chain Risk Management (SCRM) PlanRisk ManagementN/A10
RSK-09.1
Supply Chain Risk AssessmentRisk ManagementN/A9
RSK-09.2
AI & Autonomous Technologies Supply Chain ImpactsRisk ManagementN/A8
RSK-10
Data Protection Impact Assessment (DPIA)Risk ManagementN/A9
RSK-11
Risk MonitoringRisk ManagementN/A9
RSK-12
Risk CultureRisk ManagementN/A4
SEA-01
Secure Engineering PrinciplesSecure Engineering & ArchitectureN/A10
SEA-01.1
Centralized Management of Cybersecurity & Data Protection ControlsSecure Engineering & ArchitectureN/A9
SEA-01.2
Achieving Resilience RequirementsSecure Engineering & ArchitectureN/A4
SEA-01.3
Resilience CapabilitiesSecure Engineering & ArchitectureN/A5
SEA-02
Alignment With Enterprise ArchitectureSecure Engineering & ArchitectureN/A9
SEA-02.1
Standardized TerminologySecure Engineering & ArchitectureN/A3
SEA-02.2
Outsourcing Non-Essential Functions or ServicesSecure Engineering & ArchitectureN/A3
SEA-02.3
Technical Debt ReviewsSecure Engineering & ArchitectureN/A9
SEA-03
Defense-In-Depth (DiD) ArchitectureSecure Engineering & ArchitectureN/A10
SEA-03.1
System PartitioningSecure Engineering & ArchitectureN/A8
SEA-03.2
Application PartitioningSecure Engineering & ArchitectureN/A8
SEA-04
Process IsolationSecure Engineering & ArchitectureN/A7
SEA-04.1
Security Function IsolationSecure Engineering & ArchitectureN/A7
SEA-04.2
Hardware SeparationSecure Engineering & ArchitectureN/A7
SEA-04.3
Thread SeparationSecure Engineering & ArchitectureN/A7
SEA-04.4
System Privileges IsolationSecure Engineering & ArchitectureN/A5
SEA-05
Information In Shared ResourcesSecure Engineering & ArchitectureN/A8
SEA-06
Prevent Program ExecutionSecure Engineering & ArchitectureN/A8
SEA-07
Predictable Failure AnalysisSecure Engineering & ArchitectureN/A5
SEA-07.1
Technology Lifecycle ManagementSecure Engineering & ArchitectureN/A7
SEA-07.2
Fail SecureSecure Engineering & ArchitectureN/A8
SEA-07.3
Fail SafeSecure Engineering & ArchitectureN/A8
SEA-08
Non-PersistenceSecure Engineering & ArchitectureN/A9
SEA-08.1
Refresh from Trusted SourcesSecure Engineering & ArchitectureN/A5
SEA-09
Information Output FilteringSecure Engineering & ArchitectureN/A8
SEA-09.1
Limit Personal Data (PD) DisseminationSecure Engineering & ArchitectureN/A8
SEA-10
Memory ProtectionSecure Engineering & ArchitectureN/A8
SEA-11
HoneypotsSecure Engineering & ArchitectureN/A3
SEA-12
HoneyclientsSecure Engineering & ArchitectureN/A3
SEA-13
HeterogeneitySecure Engineering & ArchitectureN/A3
SEA-13.1
Virtualization TechniquesSecure Engineering & ArchitectureN/A6
SEA-14
Concealment & MisdirectionSecure Engineering & ArchitectureN/A2
SEA-14.1
RandomnessSecure Engineering & ArchitectureN/A5
SEA-14.2
Change Processing & Storage LocationsSecure Engineering & ArchitectureN/A5
SEA-15
Distributed Processing & StorageSecure Engineering & ArchitectureN/A4
SEA-16
Non-Modifiable Executable ProgramsSecure Engineering & ArchitectureN/A1
SEA-17
Secure Log-On ProceduresSecure Engineering & ArchitectureN/A8
SEA-18
System Use Notification (Logon Banner)Secure Engineering & ArchitectureN/A9
SEA-18.1
Standardized Microsoft Windows BannerSecure Engineering & ArchitectureN/A9
SEA-18.2
Truncated BannerSecure Engineering & ArchitectureN/A9
SEA-19
Previous Logon NotificationSecure Engineering & ArchitectureN/A3
SEA-20
Clock SynchronizationSecure Engineering & ArchitectureN/A9
SEA-21
Application ContainerSecure Engineering & ArchitectureN/A5
SEA-22
Privileged EnvironmentsSecure Engineering & ArchitectureN/A5
SAT-03.5
Privileged UsersSecurity Awareness & TrainingN/A9
TDA-01
Technology Development & AcquisitionTechnology Development & AcquisitionN/A10
TDA-01.1
Product ManagementTechnology Development & AcquisitionN/A10
TDA-01.2
Integrity Mechanisms for Software / Firmware UpdatesTechnology Development & AcquisitionN/A5
TDA-01.3
Malware Testing Prior to ReleaseTechnology Development & AcquisitionN/A9
TDA-01.4
DevSecOpsTechnology Development & AcquisitionN/A6
TDA-02
Minimum Viable Product (MVP) Security RequirementsTechnology Development & AcquisitionN/A9
TDA-02.1
Ports, Protocols & Services In UseTechnology Development & AcquisitionN/A8
TDA-02.2
Information Assurance Enabled ProductsTechnology Development & AcquisitionN/A2
TDA-02.3
Development Methods, Techniques & ProcessesTechnology Development & AcquisitionN/A5
TDA-02.4
Pre-Established Secure ConfigurationsTechnology Development & AcquisitionN/A8
TDA-02.5
Identification & Justification of Ports, Protocols & ServicesTechnology Development & AcquisitionN/A8
TDA-02.6
Insecure Ports, Protocols & ServicesTechnology Development & AcquisitionN/A9
TDA-02.7
Cybersecurity & Data Privacy Representatives For Product ChangesTechnology Development & AcquisitionN/A10
TDA-02.8
Minimizing Attack SurfacesTechnology Development & AcquisitionN/A9
TDA-02.9
Ongoing Product Security SupportTechnology Development & AcquisitionN/A9
TDA-02.10
Product Testing & ReviewsTechnology Development & AcquisitionN/A9
TDA-02.11
Disclosure of VulnerabilitiesTechnology Development & AcquisitionN/A5
TDA-02.12
Products With Digital ElementsTechnology Development & AcquisitionN/A6
TDA-02.13
Reporting Exploitable VulnerabilitiesTechnology Development & AcquisitionN/A8
TDA-02.14
Logging SyntaxTechnology Development & AcquisitionN/A8
TDA-03
Commercial Off-The-Shelf (COTS) Security SolutionsTechnology Development & AcquisitionN/A5
TDA-03.1
Supplier DiversityTechnology Development & AcquisitionN/A3
TDA-04
Documentation RequirementsTechnology Development & AcquisitionN/A8
TDA-04.1
Functional PropertiesTechnology Development & AcquisitionN/A8
TDA-04.2
Software Bill of Materials (SBOM)Technology Development & AcquisitionN/A9
TDA-05
Developer Architecture & DesignTechnology Development & AcquisitionN/A8
TDA-05.1
Physical Diagnostic & Test InterfacesTechnology Development & AcquisitionN/A5
TDA-05.2
Diagnostic & Test Interface MonitoringTechnology Development & AcquisitionN/A3
TDA-06
Secure Software Development Practices (SSDP)Technology Development & AcquisitionN/A10
TDA-06.1
Criticality AnalysisTechnology Development & AcquisitionN/A9
TDA-06.2
Threat ModelingTechnology Development & AcquisitionN/A7
TDA-06.3
Software Assurance Maturity Model (SAMM)Technology Development & AcquisitionN/A9
TDA-06.4
Supporting ToolchainTechnology Development & AcquisitionN/A6
TDA-06.5
Software Design ReviewTechnology Development & AcquisitionN/A10
TDA-06.6
Software Design Root Cause AnalysisTechnology Development & AcquisitionN/A5
TDA-07
Secure Development EnvironmentsTechnology Development & AcquisitionN/A9
TDA-08
Separation of Development, Testing and Operational EnvironmentsTechnology Development & AcquisitionN/A10
TDA-08.1
Secure Migration PracticesTechnology Development & AcquisitionN/A8
TDA-09
Cybersecurity & Data Protection Testing Throughout DevelopmentTechnology Development & AcquisitionN/A9
TDA-09.1
Continuous Monitoring PlanTechnology Development & AcquisitionN/A9
TDA-09.2
Static Code AnalysisTechnology Development & AcquisitionN/A9
TDA-09.3
Dynamic Code AnalysisTechnology Development & AcquisitionN/A9
TDA-09.4
Malformed Input TestingTechnology Development & AcquisitionN/A7
TDA-09.5
Application Penetration TestingTechnology Development & AcquisitionN/A9
TDA-09.6
Secure Settings By DefaultTechnology Development & AcquisitionN/A9
TDA-09.7
Manual Code ReviewTechnology Development & AcquisitionN/A5
TDA-10
Use of Live DataTechnology Development & AcquisitionN/A9
TDA-10.1
Test Data IntegrityTechnology Development & AcquisitionN/A8
TDA-11
Product Tampering and Counterfeiting (PTC)Technology Development & AcquisitionN/A9
TDA-11.1
Anti-Counterfeit TrainingTechnology Development & AcquisitionN/A6
TDA-11.2
Component DisposalTechnology Development & AcquisitionN/A0
TDA-12
Customized Development of Critical ComponentsTechnology Development & AcquisitionN/A8
TDA-13
Developer ScreeningTechnology Development & AcquisitionN/A9
TDA-14
Developer Configuration ManagementTechnology Development & AcquisitionN/A9
TDA-14.1
Software / Firmware Integrity VerificationTechnology Development & AcquisitionN/A8
TDA-14.2
Hardware Integrity VerificationTechnology Development & AcquisitionN/A5
TDA-15
Developer Threat Analysis & Flaw RemediationTechnology Development & AcquisitionN/A9
TDA-16
Developer-Provided TrainingTechnology Development & AcquisitionN/A9
TDA-17
Unsupported Technology Assets, Applications and/or Services (TAAS)Technology Development & AcquisitionN/A10
TDA-17.1
Alternate Sources for Continued SupportTechnology Development & AcquisitionN/A8
TDA-18
Input Data ValidationTechnology Development & AcquisitionN/A9
TDA-19
Error HandlingTechnology Development & AcquisitionN/A9
TDA-20
Access to Program Source CodeTechnology Development & AcquisitionN/A9
TDA-20.1
Software Release Integrity VerificationTechnology Development & AcquisitionN/A6
TDA-20.2
Archiving Software ReleasesTechnology Development & AcquisitionN/A8
TDA-20.3
Software EscrowTechnology Development & AcquisitionN/A7
TDA-20.4
Approved CodeTechnology Development & AcquisitionN/A8
TDA-21
Product Conformity GovernanceTechnology Development & AcquisitionN/A9
TDA-22
Technical Documentation ArtifactsTechnology Development & AcquisitionN/A7
TDA-22.1
Product-Specific Risk Assessment ArtifactsTechnology Development & AcquisitionN/A4
TPM-01
Third-Party ManagementThird-Party ManagementN/A10
TPM-01.1
Third-Party InventoriesThird-Party ManagementN/A8
TPM-02
Third-Party Criticality AssessmentsThird-Party ManagementN/A9
TPM-03
Supply Chain Risk Management (SCRM)Third-Party ManagementN/A9
TPM-03.1
Acquisition Strategies, Tools & MethodsThird-Party ManagementN/A9
TPM-03.2
Limit Potential HarmThird-Party ManagementN/A9
TPM-03.3
Processes To Address Weaknesses or DeficienciesThird-Party ManagementN/A9
TPM-03.4
Adequate SupplyThird-Party ManagementN/A9
TPM-04
Third-Party ServicesThird-Party ManagementN/A10
TPM-04.1
Third-Party Risk Assessments & ApprovalsThird-Party ManagementN/A9
TPM-04.2
External Connectivity Requirements - Identification of Ports, Protocols & ServicesThird-Party ManagementN/A7
TPM-04.3
Conflict of InterestsThird-Party ManagementN/A8
TPM-04.4
Third-Party Processing, Storage and Service LocationsThird-Party ManagementN/A10
TPM-05
Third-Party Contract RequirementsThird-Party ManagementN/A10
TPM-05.1
Security Compromise Notification AgreementsThird-Party ManagementN/A9
TPM-05.2
Contract Flow-Down RequirementsThird-Party ManagementN/A9
TPM-05.3
Third-Party Authentication PracticesThird-Party ManagementN/A8
TPM-05.4
Responsible, Accountable, Supportive, Consulted & Informed (RASCI) MatrixThird-Party ManagementN/A8
TPM-05.5
Third-Party Scope ReviewThird-Party ManagementN/A10
TPM-05.6
First-Party Declaration (1PD)Third-Party ManagementN/A7
TPM-05.7
Break ClausesThird-Party ManagementN/A9
TPM-05.8
Third-Party Attestation (3PA)Third-Party ManagementN/A5
TPM-06
Third-Party Personnel SecurityThird-Party ManagementN/A9
TPM-07
Monitoring for Third-Party Information DisclosureThird-Party ManagementN/A8
TPM-08
Review of Third-Party ServicesThird-Party ManagementN/A9
TPM-09
Third-Party Deficiency RemediationThird-Party ManagementN/A9
TPM-10
Managing Changes To Third-Party ServicesThird-Party ManagementN/A8
TPM-11
Third-Party Incident Response & Recovery CapabilitiesThird-Party ManagementN/A8
VPM-06.3
Privileged AccessVulnerability & Patch ManagementN/A9