MAS TRM

Technology Risk Management Guidelines

Framework

MAS TRM

Authority

MAS (Monetary Authority of Singapore)

Mapped Controls

1192

About MAS TRM
Monetary Authority of Singapore - Technology Risk Management (TRM) Guidelines
SCF Control Crosswalk Mapping
Showing 1192 SCF controls mapped to MAS TRM
SCF ControlControl NameDomainMAS TRM RequirementWeightActions
GOV-01
Cybersecurity & Data Protection Governance ProgramCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

10
GOV-01.1
Steering Committee & Program OversightCybersecurity & Data Protection GovernanceN/A7
GOV-01.2
Status Reporting To Governing BodyCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

5
GOV-01.3
Commitment To Continual ImprovementsCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

7
GOV-02
Publishing Cybersecurity & Data Protection DocumentationCybersecurity & Data Protection GovernanceN/A10
GOV-02.1
Exception ManagementCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

8
GOV-03
Periodic Review & Update of Cybersecurity & Data Protection ProgramCybersecurity & Data Protection GovernanceN/A7
GOV-04
Assigned Cybersecurity & Data Protection ResponsibilitiesCybersecurity & Data Protection GovernanceN/A10
GOV-04.1
Stakeholder Accountability StructureCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

8
GOV-04.2
Authoritative Chain of CommandCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

7
GOV-05
Measures of PerformanceCybersecurity & Data Protection GovernanceN/A6
GOV-05.1
Key Performance Indicators (KPIs)Cybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

6
GOV-05.2
Key Risk Indicators (KRIs)Cybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

6
GOV-06
Contacts With AuthoritiesCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

5
GOV-07
Contacts With Groups & AssociationsCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

7
GOV-08
Defining Business Context & MissionCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

5
GOV-09
Define Control ObjectivesCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

5
GOV-10
Data GovernanceCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

9
GOV-11
Purpose ValidationCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

5
GOV-12
Forced Technology Transfer (FTT)Cybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

10
GOV-13
State-Sponsored EspionageCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

10
GOV-14
Business As Usual (BAU) Secure PracticesCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

6
GOV-15
Operationalizing Cybersecurity & Data Protection PracticesCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

9
GOV-15.1
Select ControlsCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

8
GOV-15.2
Implement ControlsCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

9
GOV-15.3
Assess ControlsCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

8
GOV-15.4
Authorize Technology Assets, Applications and/or Services (TAAS)Cybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

8
GOV-15.5
Monitor ControlsCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

8
GOV-16
Materiality DeterminationCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

7
GOV-16.1
Material RisksCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

7
GOV-16.2
Material ThreatsCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

7
GOV-17
Cybersecurity & Data Protection Status ReportingCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

8
GOV-18
Quality Management System (QMS)Cybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

4
GOV-19
AssuranceCybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

7
GOV-19.1
Assurance Levels (AL)Cybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

7
GOV-19.2
Assessment Objectives (AO)Cybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

7
GOV-20
Mergers, Acquisitions & Divestitures (MA&D)Cybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

6
GOV-20.1
Virtual Data Room (VDR)Cybersecurity & Data Protection Governance

Section 3.1

Section 3.1: Role of the Board of Directors and Senior Management - The Board and senior management ...

6
AST-01
Asset GovernanceAsset ManagementN/A10
AST-01.1
Asset-Service DependenciesAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
AST-01.2
Stakeholder Identification & InvolvementAsset ManagementN/A5
AST-01.3
Standardized Naming ConventionAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
AST-01.4
Approved TechnologiesAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

7
AST-02
Asset InventoriesAsset ManagementN/A10
AST-02.1
Updates During Installations / RemovalsAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

7
AST-02.2
Automated Unauthorized Component DetectionAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

3
AST-02.3
Component Duplication AvoidanceAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

2
AST-02.4
Approved Baseline DeviationsAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
AST-02.5
Network Access Control (NAC)Asset ManagementN/A4
AST-02.6
Dynamic Host Configuration Protocol (DHCP) Server LoggingAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

3
AST-02.7
Software Licensing RestrictionsAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
AST-02.8
Data Action MappingAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
AST-02.9
Configuration Management Database (CMDB)Asset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
AST-02.10
Automated Location TrackingAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
AST-02.11
Component AssignmentAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

3
AST-03
Asset Ownership AssignmentAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
AST-03.1
Accountability InformationAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
AST-03.2
ProvenanceAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
AST-04
Network Diagrams & Data Flow Diagrams (DFDs)Asset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

10
AST-04.1
Asset Scope ClassificationAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
AST-04.2
Control Applicability Boundary Graphical RepresentationAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

6
AST-04.3
Compliance-Specific Asset IdentificationAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

6
AST-05
Security of Assets & MediaAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
AST-05.1
Management Approval For External Media TransferAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
AST-06
Unattended End-User EquipmentAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
AST-06.1
Asset Storage In AutomobilesAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

7
AST-07
Kiosks & Point of Interaction (PoI) DevicesAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
AST-08
Physical Tampering DetectionAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
AST-09
Secure Disposal, Destruction or Re-Use of EquipmentAsset ManagementN/A10
AST-10
Return of AssetsAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
AST-11
Removal of AssetsAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
AST-12
Use of Personal DevicesAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

10
AST-13
Use of Third-Party DevicesAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
AST-14
Usage ParametersAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

7
AST-14.1
Bluetooth & Wireless DevicesAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

7
AST-14.2
Infrared CommunicationsAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
AST-15
Logical Tampering ProtectionAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

6
AST-15.1
Technology Asset InspectionsAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

6
AST-16
Bring Your Own Device (BYOD) UsageAsset ManagementN/A10
AST-17
Prohibited Equipment & ServicesAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
AST-18
Roots of Trust ProtectionAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

4
AST-19
Telecommunications EquipmentAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
AST-20
Video Teleconference (VTC) SecurityAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
AST-21
Voice Over Internet Protocol (VoIP) SecurityAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
AST-22
Microphones & Web CamerasAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
AST-23
Multi-Function Devices (MFD)Asset ManagementN/A8
AST-24
Travel-Only DevicesAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
AST-25
Re-Imaging Devices After TravelAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
AST-26
System Administrative ProcessesAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
AST-27
Jump ServerAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

7
AST-28
Database Administrative ProcessesAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
AST-28.1
Database Management System (DBMS)Asset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

6
AST-29
Radio Frequency Identification (RFID) SecurityAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

3
AST-29.1
Contactless Access Control SystemsAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

3
AST-30
DecommissioningAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

4
AST-31
Asset CategorizationAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
AST-31.1
Categorize Artificial Intelligence (AI)-Related TechnologiesAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
AST-31.2
High-Risk Asset CategorizationAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
AST-31.3
Asset AttributesAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
AST-32
Automated Network Asset DiscoveryAsset Management

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

3
BCD-01
Business Continuity Management System (BCMS)Business Continuity & Disaster RecoveryN/A10
BCD-01.1
Coordinate with Related PlansBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-01.2
Coordinate With External Service ProvidersBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-01.3
Transfer to Alternate Processing / Storage SiteBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-01.4
Recovery Time / Point Objectives (RTO / RPO)Business Continuity & Disaster RecoveryN/A5
BCD-01.5
Recovery Operations CriteriaBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

6
BCD-01.6
Recovery Operations CommunicationsBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

3
BCD-02
Identify Critical AssetsBusiness Continuity & Disaster RecoveryN/A9
BCD-02.1
Resume All Missions & Business FunctionsBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

8
BCD-02.2
Continue Essential Mission & Business FunctionsBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

8
BCD-02.3
Resume Essential Missions & Business FunctionsBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

8
BCD-02.4
Data Storage Location ReviewsBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

8
BCD-03
Contingency TrainingBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-03.1
Simulated EventsBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

3
BCD-03.2
Automated Training EnvironmentsBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

1
BCD-04
Contingency Plan Testing & ExercisesBusiness Continuity & Disaster RecoveryN/A6
BCD-04.1
Coordinated Testing with Related PlansBusiness Continuity & Disaster RecoveryN/A3
BCD-04.2
Alternate Storage & Processing SitesBusiness Continuity & Disaster RecoveryN/A5
BCD-05
Contingency Plan Root Cause Analysis (RCA) & Lessons LearnedBusiness Continuity & Disaster RecoveryN/A9
BCD-06
Ongoing Contingency PlanningBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

8
BCD-06.1
Contingency Planning ComponentsBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

8
BCD-06.2
Contingency Plan Update NotificationsBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-07
Alternative Security MeasuresBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

9
BCD-08
Alternate Storage SiteBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

9
BCD-08.1
Separation from Primary SiteBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

7
BCD-08.2
AccessibilityBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-09
Alternate Processing SiteBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

9
BCD-09.1
Separation from Primary SiteBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

7
BCD-09.2
AccessibilityBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-09.3
Alternate Site Priority of ServiceBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

6
BCD-09.4
Preparation for UseBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-09.5
Inability to Return to Primary SiteBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-10
Telecommunications Services AvailabilityBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

6
BCD-10.1
Telecommunications Priority of Service ProvisionsBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

6
BCD-10.2
Separation of Primary / Alternate ProvidersBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-10.3
Provider Contingency PlanBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-10.4
Alternate Communications ChannelsBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-11
Data BackupsBusiness Continuity & Disaster RecoveryN/A10
BCD-11.1
Testing for Reliability & IntegrityBusiness Continuity & Disaster RecoveryN/A9
BCD-11.2
Separate Storage for Critical InformationBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

8
BCD-11.3
Recovery ImagesBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

8
BCD-11.4
Cryptographic ProtectionBusiness Continuity & Disaster RecoveryN/A9
BCD-11.5
Test Restoration Using SamplingBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-11.6
Transfer to Alternate Storage SiteBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-11.7
Redundant Secondary SystemBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-11.8
Dual Authorization For Backup Media DestructionBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-11.9
Backup AccessBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

9
BCD-11.10
Backup Modification and/or DestructionBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

9
BCD-12
Technology Assets, Applications and/or Services (TAAS) Recovery & ReconstitutionBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

9
BCD-12.1
Transaction RecoveryBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

9
BCD-12.2
Failover CapabilityBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

8
BCD-12.3
Electronic Discovery (eDiscovery)Business Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

8
BCD-12.4
Restore Within Time PeriodBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-13
Backup & Restoration Hardware ProtectionBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

8
BCD-13.1
Restoration Integrity VerificationBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

7
BCD-14
Isolated Recovery EnvironmentBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

5
BCD-15
Reserve HardwareBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

7
BCD-16
AI & Autonomous Technologies IncidentsBusiness Continuity & Disaster Recovery

Section 8.2

Section 8.2: System Recoverability - Systems should be recoverable within defined recovery time obje...

10
CAP-01
Capacity & Performance ManagementCapacity & Performance PlanningN/A8
CAP-02
Resource PriorityCapacity & Performance Planning

Section 7.3

Section 7.3: Technology Refresh Management - Technology assets should be regularly reviewed and refr...

8
CAP-03
Capacity PlanningCapacity & Performance PlanningN/A8
CAP-04
Performance MonitoringCapacity & Performance Planning

Section 7.3

Section 7.3: Technology Refresh Management - Technology assets should be regularly reviewed and refr...

7
CAP-05
Elastic ExpansionCapacity & Performance Planning

Section 7.3

Section 7.3: Technology Refresh Management - Technology assets should be regularly reviewed and refr...

5
CAP-06
Regional DeliveryCapacity & Performance Planning

Section 7.3

Section 7.3: Technology Refresh Management - Technology assets should be regularly reviewed and refr...

1
CHG-01
Change Management ProgramChange ManagementN/A10
CHG-02
Configuration Change ControlChange Management

Section 7.5

Section 7.5: Change Management - Changes to technology systems should be managed through formal chan...

8
CHG-02.1
Prohibition Of ChangesChange ManagementN/A10
CHG-02.2
Test, Validate & Document ChangesChange ManagementN/A9
CHG-02.3
Cybersecurity & Data Protection Representative for Asset Lifecycle ChangesChange ManagementN/A7
CHG-02.4
Automated Security ResponseChange Management

Section 7.5

Section 7.5: Change Management - Changes to technology systems should be managed through formal chan...

5
CHG-02.5
Cryptographic ManagementChange Management

Section 7.5

Section 7.5: Change Management - Changes to technology systems should be managed through formal chan...

5
CHG-03
Security Impact Analysis for ChangesChange ManagementN/A9
CHG-04
Access Restriction For ChangeChange Management

Section 7.5

Section 7.5: Change Management - Changes to technology systems should be managed through formal chan...

8
CHG-04.1
Automated Access Enforcement / AuditingChange Management

Section 7.5

Section 7.5: Change Management - Changes to technology systems should be managed through formal chan...

3
CHG-04.2
Signed ComponentsChange Management

Section 7.5

Section 7.5: Change Management - Changes to technology systems should be managed through formal chan...

3
CHG-04.3
Dual Authorization for ChangeChange Management

Section 7.5

Section 7.5: Change Management - Changes to technology systems should be managed through formal chan...

6
CHG-04.4
Permissions To Implement ChangesChange Management

Section 7.5

Section 7.5: Change Management - Changes to technology systems should be managed through formal chan...

6
CHG-04.5
Library PrivilegesChange Management

Section 7.5

Section 7.5: Change Management - Changes to technology systems should be managed through formal chan...

8
CHG-05
Stakeholder Notification of ChangesChange Management

Section 7.5

Section 7.5: Change Management - Changes to technology systems should be managed through formal chan...

9
CHG-06
Control Functionality VerificationChange ManagementN/A9
CHG-06.1
Report Verification ResultsChange Management

Section 7.5

Section 7.5: Change Management - Changes to technology systems should be managed through formal chan...

5
CHG-07
Emergency ChangesChange Management

Section 7.5

Section 7.5: Change Management - Changes to technology systems should be managed through formal chan...

9
CHG-07.1
Documenting Emergency ChangesChange Management

Section 7.5

Section 7.5: Change Management - Changes to technology systems should be managed through formal chan...

7
CLD-01
Cloud ServicesCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

10
CLD-01.1
Cloud Infrastructure OnboardingCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

9
CLD-01.2
Cloud Infrastructure OffboardingCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

9
CLD-02
Cloud Security ArchitectureCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

8
CLD-03
Cloud Infrastructure Security SubnetCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

6
CLD-04
Application Programming Interface (API) SecurityCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

9
CLD-04.1
API GatewayCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

7
CLD-05
Virtual Machine ImagesCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

8
CLD-06
Multi-Tenant EnvironmentsCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

9
CLD-06.1
Customer Responsibility Matrix (CRM)Cloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

8
CLD-06.2
Multi-Tenant Event Logging CapabilitiesCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

8
CLD-06.3
Multi-Tenant Forensics CapabilitiesCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

8
CLD-06.4
Multi-Tenant Incident Response CapabilitiesCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

8
CLD-07
Data Handling & PortabilityCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

4
CLD-08
Standardized Virtualization FormatsCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

4
CLD-09
Geolocation Requirements for Processing, Storage and Service LocationsCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

10
CLD-10
Sensitive Data In Public Cloud ProvidersCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

6
CLD-11
Cloud Access Security Broker (CASB)Cloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

7
CLD-12
Side Channel Attack PreventionCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

3
CLD-13
Hosted Assets, Applications & ServicesCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

9
CLD-13.1
Authorized Individuals For Hosted Assets, Applications & ServicesCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

9
CLD-13.2
Sensitive / Regulated Data On Hosted Assets, Applications & ServicesCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

9
CLD-14
Prohibition On Unverified Hosted Assets, Applications & ServicesCloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

8
CLD-15
Software Defined Storage (SDS)Cloud Security

Section 11.4

Section 11.4: Virtualisation Security - Virtualization environments should be secured with appropria...

3
CPL-01
Statutory, Regulatory & Contractual ComplianceComplianceN/A10
CPL-01.1
Non-Compliance OversightComplianceN/A9
CPL-01.2
Compliance ScopeCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

10
CPL-01.3
Ability To Demonstrate ConformityCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

8
CPL-01.4
Conformity AssessmentCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

9
CPL-01.5
Declaration of ConformityCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

1
CPL-02
Cybersecurity & Data Protection Controls OversightComplianceN/A10
CPL-02.1
Internal Audit FunctionComplianceN/A5
CPL-02.2
Periodic AuditsCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

8
CPL-02.3
Corrective ActionCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

7
CPL-03
Cybersecurity & Data Protection AssessmentsComplianceN/A10
CPL-03.1
Independent AssessorsCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

6
CPL-03.2
Functional Review Of Cybersecurity & Data Protection ControlsComplianceN/A8
CPL-03.3
Assessor AccessCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

7
CPL-03.4
Assessment MethodsCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

7
CPL-03.5
Assessment RigorCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

7
CPL-03.6
Evidence Request List (ERL)Compliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

7
CPL-03.7
Evidence SamplingCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

7
CPL-04
Audit ActivitiesCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

5
CPL-05
Legal Assessment of Investigative InquiresCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

2
CPL-05.1
Investigation Request NotificationsCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

2
CPL-05.2
Investigation Access RestrictionsCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

2
CPL-06
Government SurveillanceCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

10
CPL-07
GrievancesCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

5
CPL-07.1
Grievance ResponseCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

5
CPL-08
Localized RepresentationCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

2
CPL-09
Control ReciprocityCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

5
CPL-10
Control InheritanceCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

5
CPL-11
Dual Use TechnologyCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

8
CPL-11.1
USML or CCL IdentificationCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

8
CPL-11.2
Export-Controlled Access RestrictionsCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

8
CPL-11.3
Export Activities DocumentationCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

8
CPL-08.1
Representative PowersCompliance

Section 3.2

Section 3.2: Policies, Standards and Procedures - Financial institutions should establish comprehens...

2
CFG-01
Configuration Management ProgramConfiguration ManagementN/A9
CFG-01.1
Assignment of ResponsibilityConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

5
CFG-02
Secure Baseline ConfigurationsConfiguration ManagementN/A10
CFG-02.1
Reviews & UpdatesConfiguration ManagementN/A8
CFG-02.2
Automated Central Management & VerificationConfiguration ManagementN/A7
CFG-02.3
Retention Of Previous ConfigurationsConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

3
CFG-02.4
Development & Test Environment ConfigurationsConfiguration ManagementN/A5
CFG-02.5
Configure Technology Assets, Applications and/or Services (TAAS) for High-Risk AreasConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

8
CFG-02.6
Network Device Configuration File SynchronizationConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

7
CFG-02.7
Approved Configuration DeviationsConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

9
CFG-02.8
Respond To Unauthorized ChangesConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

9
CFG-02.9
Baseline TailoringConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

9
CFG-03
Least FunctionalityConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

10
CFG-03.1
Periodic ReviewConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

8
CFG-03.2
Prevent Unauthorized Software ExecutionConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

7
CFG-03.3
Explicitly Allow / Deny ApplicationsConfiguration ManagementN/A5
CFG-03.4
Split TunnelingConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

8
CFG-04
Software Usage RestrictionsConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

9
CFG-04.1
Open Source SoftwareConfiguration ManagementN/A9
CFG-04.2
Unsupported Internet Browsers & Email ClientsConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

7
CFG-05
User-Installed SoftwareConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

10
CFG-05.1
Unauthorized Installation AlertsConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

8
CFG-05.2
Restrict Roles Permitted To Install SoftwareConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

9
CFG-06
Configuration EnforcementConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

7
CFG-06.1
Integrity Assurance & Enforcement (IAE)Configuration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

3
CFG-07
Zero-Touch Provisioning (ZTP)Configuration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

8
CFG-08
Sensitive / Regulated Data Access EnforcementConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

7
CFG-08.1
Sensitive / Regulated Data ActionsConfiguration Management

Section 7.2

Section 7.2: Configuration Management - Configuration items should be identified, controlled, and ma...

7
MON-01
Continuous MonitoringContinuous MonitoringN/A10
MON-01.1
Intrusion Detection & Prevention Systems (IDS & IPS)Continuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

9
MON-01.2
Automated Tools for Real-Time AnalysisContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

9
MON-01.3
Inbound & Outbound Communications TrafficContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

9
MON-01.4
System Generated AlertsContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

7
MON-01.5
Wireless Intrusion Detection System (WIDS)Continuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-01.6
Host-Based DevicesContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

8
MON-01.7
File Integrity Monitoring (FIM)Continuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

9
MON-01.8
Security Event MonitoringContinuous MonitoringN/A10
MON-01.9
Proxy LoggingContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

8
MON-01.10
Deactivated Account ActivityContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

9
MON-01.11
Automated Response to Suspicious EventsContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-01.12
Automated AlertsContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-01.13
Alert Threshold TuningContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-01.14
Individuals Posing Greater RiskContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-01.15
Privileged User OversightContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-01.16
Analyze and Prioritize Monitoring RequirementsContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-01.17
Real-Time Session MonitoringContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

4
MON-02
Centralized Collection of Security Event LogsContinuous MonitoringN/A10
MON-02.1
Correlate Monitoring InformationContinuous MonitoringN/A9
MON-02.2
Central Review & AnalysisContinuous MonitoringN/A5
MON-02.3
Integration of Scanning & Other Monitoring InformationContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-02.4
Correlation with Physical MonitoringContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-02.5
Permitted ActionsContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-02.6
Audit Level AdjustmentsContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-02.7
System-Wide / Time-Correlated Audit TrailContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-02.8
Changes by Authorized IndividualsContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-02.9
Inventory of Technology Asset Event LoggingContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

7
MON-03
Content of Event LogsContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

10
MON-03.1
Sensitive Audit InformationContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

8
MON-03.2
Audit TrailsContinuous MonitoringN/A10
MON-03.3
Privileged Functions LoggingContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

8
MON-03.4
Verbosity Logging for Boundary DevicesContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-03.5
Limit Personal Data (PD) In Audit RecordsContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

8
MON-03.6
Centralized Management of Planned Audit Record ContentContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-03.7
Database LoggingContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

8
MON-04
Event Log Storage CapacityContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

8
MON-05
Response To Event Log Processing FailuresContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

8
MON-05.1
Real-Time Alerts of Event Logging FailureContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

6
MON-05.2
Event Log Storage Capacity AlertingContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-06
Monitoring ReportingContinuous MonitoringN/A7
MON-06.1
Query Parameter Audits of Personal Data (PD)Continuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

3
MON-06.2
Trend Analysis ReportingContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-07
Time StampsContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

10
MON-07.1
Synchronization With Authoritative Time SourceContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

8
MON-08
Protection of Event LogsContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

10
MON-08.1
Event Log Backup on Separate Physical Systems / ComponentsContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-08.2
Access by Subset of Privileged UsersContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

8
MON-08.3
Cryptographic Protection of Event Log InformationContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-08.4
Dual Authorization for Event Log MovementContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-09
Non-RepudiationContinuous MonitoringN/A8
MON-09.1
Identity BindingContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

4
MON-10
Event Log RetentionContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

10
MON-11
Monitoring For Information DisclosureContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

8
MON-11.1
Analyze Traffic for Covert ExfiltrationContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-11.2
Unauthorized Network ServicesContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-11.3
Monitoring for Indicators of Compromise (IOC)Continuous MonitoringN/A5
MON-12
Session AuditContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

7
MON-13
Alternate Event Logging CapabilityContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

3
MON-14
Cross-Organizational MonitoringContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

3
MON-14.1
Sharing of Event LogsContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
MON-15
Covert Channel AnalysisContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

3
MON-16
Anomalous BehaviorContinuous MonitoringN/A10
MON-16.1
Insider ThreatsContinuous MonitoringN/A8
MON-16.2
Third-Party ThreatsContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

8
MON-16.3
Unauthorized ActivitiesContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

8
MON-16.4
Account Creation and Modification LoggingContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

7
MON-17
Event Log Analysis & TriageContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

7
MON-17.1
Event Log Review Escalation MatrixContinuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

7
MON-18
File Activity Monitoring (FAM)Continuous Monitoring

Section 4.5

Section 4.5: Risk Monitoring, Review and Reporting - Technology risks should be continuously monitor...

5
CRY-01
Use of Cryptographic ControlsCryptographic ProtectionsN/A10
CRY-01.1
Alternate Physical ProtectionCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

5
CRY-01.2
Export-Controlled CryptographyCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

5
CRY-01.3
Pre/Post Transmission HandlingCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

5
CRY-01.4
Conceal / Randomize CommunicationsCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

5
CRY-01.5
Cryptographic Cipher Suites and Protocols InventoryCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

9
CRY-02
Cryptographic Module AuthenticationCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

8
CRY-03
Transmission ConfidentialityCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

10
CRY-04
Transmission IntegrityCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

10
CRY-05
Encrypting Data At RestCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

10
CRY-05.1
Storage MediaCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

8
CRY-05.2
Offline StorageCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

5
CRY-05.3
Database EncryptionCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

8
CRY-06
Non-Console Administrative AccessCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

9
CRY-07
Wireless Access Authentication & EncryptionCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

9
CRY-08
Public Key Infrastructure (PKI)Cryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

9
CRY-08.1
AvailabilityCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

9
CRY-09
Cryptographic Key ManagementCryptographic ProtectionsN/A10
CRY-09.1
Symmetric KeysCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

9
CRY-09.2
Asymmetric KeysCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

9
CRY-09.3
Cryptographic Key Loss or ChangeCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

8
CRY-09.4
Control & Distribution of Cryptographic KeysCryptographic ProtectionsN/A9
CRY-09.5
Assigned OwnersCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

8
CRY-09.6
Third-Party Cryptographic KeysCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

7
CRY-09.7
External System Cryptographic Key ControlCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

5
CRY-10
Transmission of Cybersecurity & Data Protection AttributesCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

5
CRY-11
Certificate AuthoritiesCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

8
CRY-12
Certificate MonitoringCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

5
CRY-13
Cryptographic HashCryptographic Protections

Section 10.1

Section 10.1: Cryptographic Algorithm and Protocol - Cryptographic algorithms and protocols should b...

5
DCH-01
Data ProtectionData Classification & HandlingN/A10
DCH-01.1
Data StewardshipData Classification & HandlingN/A10
DCH-01.2
Sensitive / Regulated Data ProtectionData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
DCH-01.3
Sensitive / Regulated Media RecordsData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

6
DCH-01.4
Defining Access Authorizations for Sensitive / Regulated DataData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
DCH-02
Data & Asset ClassificationData Classification & HandlingN/A10
DCH-02.1
Highest Classification LevelData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-03
Media AccessData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-03.1
Disclosure of InformationData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

10
DCH-03.2
Masking Displayed DataData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

7
DCH-03.3
Controlled ReleaseData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

4
DCH-04
Media MarkingData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

7
DCH-04.1
Automated MarkingData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

2
DCH-05
Cybersecurity & Data Protection AttributesData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

2
DCH-05.1
Dynamic Attribute AssociationData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

2
DCH-05.2
Attribute Value Changes By Authorized IndividualsData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-05.3
Maintenance of Attribute Associations By SystemData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

2
DCH-05.4
Association of Attributes By Authorized IndividualsData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

2
DCH-05.5
Attribute Displays for Output DevicesData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-05.6
Data Subject Attribute AssociationsData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

2
DCH-05.7
Consistent Attribute InterpretationData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

2
DCH-05.8
Identity Association Techniques & TechnologiesData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

2
DCH-05.9
Attribute ReassignmentData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

7
DCH-05.10
Attribute Configuration By Authorized IndividualsData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-05.11
Audit ChangesData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

7
DCH-06
Media StorageData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-06.1
Physically Secure All MediaData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
DCH-06.2
Sensitive Data InventoriesData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
DCH-06.3
Periodic Scans for Sensitive / Regulated DataData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

7
DCH-06.4
Making Sensitive Data Unreadable In StorageData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
DCH-06.5
Storing Authentication DataData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
DCH-07
Media TransportationData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
DCH-07.1
CustodiansData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
DCH-07.2
Encrypting Data In Storage MediaData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
DCH-08
Physical Media DisposalData Classification & HandlingN/A10
DCH-09
System Media SanitizationData Classification & HandlingN/A10
DCH-09.1
System Media Sanitization DocumentationData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

7
DCH-09.2
Equipment TestingData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
DCH-09.3
Sanitization of Personal Data (PD)Data Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
DCH-09.4
First Time Use SanitizationData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
DCH-09.5
Dual Authorization for Sensitive Data DestructionData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
DCH-10
Media UseData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-10.1
Limitations on UseData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

10
DCH-10.2
Prohibit Use Without OwnerData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
DCH-11
Data ReclassificationData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-12
Removable Media SecurityData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

10
DCH-13
Use of External Technology Assets, Applications and/or Services (TAAS)Data Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
DCH-13.1
Limits of Authorized UseData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-13.2
Portable Storage DevicesData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
DCH-13.3
Protecting Sensitive / Regulated Data on External Technology Assets, Applications and/or Services (TAAS)Data Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

10
DCH-13.4
Non-Organizationally Owned Technology Assets, Applications and/or Services (TAAS)Data Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
DCH-14
Information SharingData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
DCH-14.1
Information Search & RetrievalData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
DCH-14.2
Transfer AuthorizationsData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-14.3
Data Access MappingData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
DCH-15
Publicly Accessible ContentData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

10
DCH-16
Data Mining ProtectionData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

7
DCH-17
Ad-Hoc TransfersData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-18
Media & Data RetentionData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-18.1
Minimize Sensitive / Regulated DataData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-18.2
Limit Sensitive / Regulated Data In Testing, Training & ResearchData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-18.3
Temporary Files Containing Personal Data (PD)Data Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

5
DCH-19
Geographic Location of DataData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

9
DCH-20
Archived Data SetsData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-21
Information DisposalData Classification & HandlingN/A10
DCH-22
Data Quality OperationsData Classification & HandlingN/A5
DCH-22.1
Updating & Correcting Personal Data (PD)Data Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

6
DCH-22.2
Data TagsData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

3
DCH-22.3
Primary Source Personal Data (PD) CollectionData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-23
De-Identification (Anonymization)Data Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-23.1
De-Identify Dataset Upon CollectionData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-23.2
ArchivingData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-23.3
ReleaseData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-23.4
Removal, Masking, Encryption, Hashing or Replacement of Direct IdentifiersData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

8
DCH-23.5
Statistical Disclosure ControlData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

1
DCH-23.6
Differential Data PrivacyData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

1
DCH-23.7
Automated De-Identification of Sensitive DataData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

1
DCH-23.8
Motivated IntruderData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

3
DCH-23.9
Code NamesData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

1
DCH-24
Information LocationData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

10
DCH-24.1
Automated Tools to Support Information LocationData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

6
DCH-25
Transfer of Sensitive and/or Regulated DataData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

10
DCH-25.1
Transfer Activity LimitsData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

7
DCH-26
Data LocalizationData Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

10
DCH-27
Data Rights Management (DRM)Data Classification & Handling

Section 3.3

Section 3.3: Management of Information Assets - Information assets should be properly identified, cl...

6
EMB-01
Embedded Technology Security ProgramEmbedded TechnologyN/A10
EMB-02
Internet of Things (IOT)Embedded TechnologyN/A9
EMB-03
Operational Technology (OT)Embedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

9
EMB-04
Interface SecurityEmbedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

4
EMB-05
Embedded Technology Configuration MonitoringEmbedded TechnologyN/A6
EMB-06
Prevent AlterationsEmbedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

6
EMB-07
Embedded Technology MaintenanceEmbedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

6
EMB-08
Resilience To OutagesEmbedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

2
EMB-09
Power Level MonitoringEmbedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

4
EMB-10
Embedded Technology ReviewsEmbedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

8
EMB-11
Message Queuing Telemetry Transport (MQTT) SecurityEmbedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

7
EMB-12
Restrict CommunicationsEmbedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

8
EMB-13
Authorized CommunicationsEmbedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

8
EMB-14
Operating Environment CertificationEmbedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

9
EMB-15
Safety AssessmentEmbedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

9
EMB-16
Certificate-Based AuthenticationEmbedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

5
EMB-17
Chip-To-Cloud SecurityEmbedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

6
EMB-18
Real-Time Operating System (RTOS) SecurityEmbedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

5
EMB-19
Safe OperationsEmbedded Technology

Section 11.5

Section 11.5: Internet of Things - IoT devices should be subject to security controls including secu...

9
END-01
Endpoint Device Management (EDM)Endpoint SecurityN/A10
END-01.1
Unified Endpoint Device Management (UEDM)Endpoint SecurityN/A6
END-02
Endpoint Protection MeasuresEndpoint SecurityN/A9
END-03
Prohibit Installation Without Privileged StatusEndpoint SecurityN/A9
END-03.1
Software Installation AlertsEndpoint SecurityN/A8
END-03.2
Governing Access Restriction for ChangeEndpoint Security

Section 6.5

Section 6.5: Management of End User Computing and Applications - End user computing and applications...

8
END-04
Malicious Code Protection (Anti-Malware)Endpoint SecurityN/A10
END-04.1
Automatic Antimalware Signature UpdatesEndpoint SecurityN/A9
END-04.2
Documented Protection MeasuresEndpoint SecurityN/A3
END-04.3
Centralized Management of Antimalware TechnologiesEndpoint SecurityN/A8
END-04.4
Heuristic / Nonsignature-Based DetectionEndpoint SecurityN/A8
END-04.5
Malware Protection Mechanism TestingEndpoint SecurityN/A5
END-04.6
Evolving Malware ThreatsEndpoint SecurityN/A3
END-04.7
Always On ProtectionEndpoint SecurityN/A9
END-05
Software FirewallEndpoint SecurityN/A9
END-06
Endpoint File Integrity Monitoring (FIM)Endpoint SecurityN/A8
END-06.1
Integrity ChecksEndpoint SecurityN/A6
END-06.2
Endpoint Detection & Response (EDR)Endpoint SecurityN/A9
END-06.3
Automated Notifications of Integrity ViolationsEndpoint SecurityN/A5
END-06.4
Automated Response to Integrity ViolationsEndpoint SecurityN/A5
END-06.5
Boot Process IntegrityEndpoint SecurityN/A5
END-06.6
Protection of Boot FirmwareEndpoint SecurityN/A5
END-06.7
Binary or Machine-Executable CodeEndpoint SecurityN/A5
END-06.8
Extended Detection & Response (XDR)Endpoint SecurityN/A5
END-07
Host Intrusion Detection and Prevention Systems (HIDS / HIPS)Endpoint SecurityN/A9
END-08
Phishing & Spam ProtectionEndpoint SecurityN/A10
END-08.1
Central ManagementEndpoint SecurityN/A5
END-08.2
Automatic Spam and Phishing Protection UpdatesEndpoint SecurityN/A8
END-09
Trusted PathEndpoint SecurityN/A9
END-10
Mobile CodeEndpoint SecurityN/A4
END-11
Thin NodesEndpoint SecurityN/A4
END-12
Port & Input / Output (I/O) Device AccessEndpoint SecurityN/A6
END-13
Sensor CapabilityEndpoint SecurityN/A7
END-13.1
Authorized UseEndpoint SecurityN/A8
END-13.2
Notice of CollectionEndpoint SecurityN/A6
END-13.3
Collection MinimizationEndpoint SecurityN/A8
END-13.4
Sensor Delivery VerificationEndpoint SecurityN/A4
END-14
Collaborative Computing DevicesEndpoint SecurityN/A9
END-14.1
Disabling / Removal In Secure Work AreasEndpoint SecurityN/A5
END-14.2
Explicitly Indicate Current ParticipantsEndpoint SecurityN/A5
END-14.3
Participant Identity VerificationEndpoint SecurityN/A7
END-14.4
Participant Connection ManagementEndpoint SecurityN/A5
END-14.5
Malicious Link & File ProtectionsEndpoint SecurityN/A7
END-14.6
Explicit Indication Of UseEndpoint SecurityN/A6
END-15
Hypervisor AccessEndpoint SecurityN/A9
END-16
Restrict Access To Security FunctionsEndpoint SecurityN/A7
END-16.1
Host-Based Security Function IsolationEndpoint SecurityN/A7
HRS-01
Human Resources Security ManagementHuman Resources SecurityN/A10
HRS-01.1
Onboarding, Transferring & Offboarding PersonnelHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

9
HRS-02
Position CategorizationHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

8
HRS-02.1
Users With Elevated PrivilegesHuman Resources SecurityN/A10
HRS-02.2
Probationary PeriodsHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

1
HRS-03
Defined Roles & ResponsibilitiesHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

10
HRS-03.1
User AwarenessHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

9
HRS-03.2
Competency Requirements for Security-Related PositionsHuman Resources SecurityN/A9
HRS-04
Personnel ScreeningHuman Resources SecurityN/A10
HRS-04.1
Roles With Special Protection MeasuresHuman Resources SecurityN/A9
HRS-04.2
Formal IndoctrinationHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

7
HRS-04.3
Citizenship RequirementsHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

5
HRS-04.4
Citizenship IdentificationHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

3
HRS-05
Terms of EmploymentHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

10
HRS-05.1
Rules of BehaviorHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

10
HRS-05.2
Social Media & Social Networking RestrictionsHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

9
HRS-05.3
Technology Use RestrictionsHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

10
HRS-05.4
Use of Critical TechnologiesHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

9
HRS-05.5
Use of Mobile DevicesHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

9
HRS-05.6
Security-Minded Dress CodeHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

1
HRS-05.7
Policy Familiarization & AcknowledgementHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

8
HRS-06
Access AgreementsHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

10
HRS-06.1
Confidentiality AgreementsHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

10
HRS-06.2
Post-Employment Requirements AwarenessHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

5
HRS-07
Personnel SanctionsHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

9
HRS-07.1
Workplace InvestigationsHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

8
HRS-07.2
Updating Disciplinary ProcessesHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

3
HRS-07.3
Preventative Access RestrictionHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

5
HRS-08
Personnel TransferHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

9
HRS-09
Personnel TerminationHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

9
HRS-09.1
Asset CollectionHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

9
HRS-09.2
High-Risk TerminationsHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

9
HRS-09.3
Post-Employment Requirements NotificationHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

8
HRS-09.4
Automated Employment Status NotificationsHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

5
HRS-10
Third-Party Personnel SecurityHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

10
HRS-11
Separation of Duties (SoD)Human Resources SecurityN/A7
HRS-12
Incompatible RolesHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

8
HRS-12.1
Two-Person RuleHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

7
HRS-13
Identify Critical Skills & GapsHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

5
HRS-13.1
Remediate Identified Skills DeficienciesHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

5
HRS-13.2
Identify Vital Cybersecurity & Data Privacy StaffHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

5
HRS-13.3
Establish Redundancy for Vital Cybersecurity & Data Privacy StaffHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

5
HRS-13.4
Perform Succession PlanningHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

5
HRS-14
Identifying Authorized Work LocationsHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

8
HRS-14.1
Communicating Authorized Work LocationsHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

8
HRS-15
Reporting Suspicious ActivitiesHuman Resources Security

Section 3.5

Section 3.5: Competency and Background Review - Personnel involved in technology operations should p...

7
IAC-01
Identity & Access Management (IAM)Identification & AuthenticationN/A10
IAC-01.1
Retain Access RecordsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

3
IAC-01.2
Authenticate, Authorize and Audit (AAA)Identification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-01.3
User & Service Account InventoriesIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-02
Identification & Authentication for Organizational UsersIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-02.1
Group AuthenticationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

7
IAC-02.2
Replay-Resistant AuthenticationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-02.3
Acceptance of PIV CredentialsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

2
IAC-02.4
Out-of-Band Authentication (OOBA)Identification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-03
Identification & Authentication for Non-Organizational UsersIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-03.1
Acceptance of PIV Credentials from Other OrganizationsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

2
IAC-03.2
Acceptance of Third-Party CredentialsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

2
IAC-03.3
Use of FICAM-Issued ProfilesIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

2
IAC-03.4
DisassociabilityIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

2
IAC-03.5
Acceptance of External AuthenticatorsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

4
IAC-04
Identification & Authentication for DevicesIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-04.1
Device AttestationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-04.2
Device Authorization EnforcementIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-05
Identification & Authentication for Third-Party Technology Assets, Applications and/or Services (TAAS)Identification & AuthenticationN/A9
IAC-05.1
Sharing Identification & Authentication InformationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-05.2
Privileged Access by Non-Organizational UsersIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-06
Multi-Factor Authentication (MFA)Identification & AuthenticationN/A9
IAC-06.1
Network Access to Privileged AccountsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-06.2
Network Access to Non-Privileged AccountsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

7
IAC-06.3
Local Access to Privileged AccountsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-06.4
Out-of-Band Multi-Factor AuthenticationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-06.5
Alternative Multi-Factor AuthenticationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-07
User Provisioning & De-ProvisioningIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-07.1
Change of Roles & DutiesIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-07.2
Termination of EmploymentIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-08
Role-Based Access Control (RBAC)Identification & AuthenticationN/A9
IAC-09
Identifier Management (User Names)Identification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-09.1
User Identity (ID) ManagementIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-09.2
Identity User StatusIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

7
IAC-09.3
Dynamic ManagementIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-09.4
Cross-Organization ManagementIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-09.5
Privileged Account IdentifiersIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-09.6
Pairwise Pseudonymous Identifiers (PPID)Identification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

1
IAC-10
Authenticator ManagementIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-10.1
Password-Based AuthenticationIdentification & AuthenticationN/A9
IAC-10.2
PKI-Based AuthenticationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-10.3
In-Person or Trusted Third-Party RegistrationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-10.4
Automated Support For Password StrengthIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-10.5
Protection of AuthenticatorsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-10.6
No Embedded Unencrypted Static AuthenticatorsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-10.7
Hardware Token-Based AuthenticationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-10.8
Default AuthenticatorsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-10.9
Multiple System AccountsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-10.10
Expiration of Cached AuthenticatorsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-10.11
Password ManagersIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

8
IAC-10.12
Biometric AuthenticationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-10.13
Events Requiring Authenticator ChangeIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-10.14
PasskeysIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

8
IAC-11
Authenticator FeedbackIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

6
IAC-12
Cryptographic Module AuthenticationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

8
IAC-12.1
Hardware Security Modules (HSM)Identification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

3
IAC-13
Adaptive Identification & AuthenticationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-13.1
Single Sign-On (SSO) Transparent AuthenticationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-13.2
Federated Credential ManagementIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

4
IAC-13.3
Continuous AuthenticationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

2
IAC-14
Re-AuthenticationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

8
IAC-15
Account ManagementIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-15.1
Automated System Account Management (Directory Services)Identification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-15.2
Removal of Temporary / Emergency AccountsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-15.3
Disable Inactive AccountsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-15.4
Automated Audit ActionsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-15.5
Restrictions on Shared Groups / AccountsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-15.6
Account Disabling for High Risk IndividualsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-15.7
System Account ReviewsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-15.8
Usage ConditionsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-15.9
Emergency AccountsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-16
Privileged Account Management (PAM)Identification & AuthenticationN/A10
IAC-16.1
Privileged Account InventoriesIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-16.2
Privileged Account SeparationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

4
IAC-16.3
Privileged Command ExecutionIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-16.4
Dedicated Privileged AccountIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

7
IAC-17
Periodic Review of Account PrivilegesIdentification & AuthenticationN/A10
IAC-18
User Responsibilities for Account ManagementIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-19
Credential SharingIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-20
Access EnforcementIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-20.1
Access To Sensitive / Regulated DataIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-20.2
Database AccessIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-20.3
Use of Privileged Utility ProgramsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-20.4
Dedicated Administrative MachinesIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

8
IAC-20.5
Dual Authorization for Privileged CommandsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-20.6
Revocation of Access AuthorizationsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-20.7
Authorized System AccountsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-21
Least PrivilegeIdentification & AuthenticationN/A10
IAC-21.1
Authorize Access to Security FunctionsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-21.2
Non-Privileged Access for Non-Security FunctionsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-21.3
Management Approval For Privileged AccountsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-21.4
Auditing Use of Privileged FunctionsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-21.5
Prohibit Non-Privileged Users from Executing Privileged FunctionsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-21.6
Network Access to Privileged CommandsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-21.7
Privilege Levels for Code ExecutionIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-22
Account LockoutIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-23
Concurrent Session ControlIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

6
IAC-24
Session LockIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-24.1
Pattern-Hiding DisplaysIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-25
Session TerminationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

9
IAC-25.1
User-Initiated Logouts / Message DisplaysIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-26
Permitted Actions Without Identification or AuthorizationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

8
IAC-27
Reference MonitorIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

1
IAC-28
Identity Proofing (Identity Verification)Identification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-28.1
Management Approval For New or Changed AccountsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

10
IAC-28.2
Identity EvidenceIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-28.3
Identity Evidence Validation & VerificationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-28.4
In-Person Validation & VerificationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-28.5
Address ConfirmationIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

1
IAC-29
Attribute-Based Access Control (ABAC)Identification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IAC-29.1
Real-Time Access DecisionsIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

3
IAC-29.2
Access Profile RulesIdentification & Authentication

Section 9.1

Section 9.1: User Access Management - User access should be managed through formal processes includi...

5
IRO-01
Incident Response OperationsIncident ResponseN/A9
IRO-02
Incident HandlingIncident ResponseN/A10
IRO-02.1
Automated Incident Handling ProcessesIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

1
IRO-02.2
Insider Threat Response CapabilityIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

5
IRO-02.3
Dynamic ReconfigurationIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

5
IRO-02.4
Incident Classification & PrioritizationIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

5
IRO-02.5
Correlation with External OrganizationsIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

5
IRO-02.6
Automatic Disabling of Technology Assets, Applications and/or Services (TAAS)Incident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

6
IRO-03
Indicators of Compromise (IOC)Incident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

8
IRO-04
Incident Response Plan (IRP)Incident ResponseN/A9
IRO-04.1
Data BreachIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

8
IRO-04.2
IRP UpdateIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

8
IRO-04.3
Continuous Incident Response ImprovementsIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

3
IRO-05
Incident Response TrainingIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

9
IRO-05.1
Simulated IncidentsIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

5
IRO-05.2
Automated Incident Response Training EnvironmentsIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

5
IRO-06
Incident Response TestingIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

9
IRO-06.1
Coordination with Related PlansIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

7
IRO-07
Integrated Security Incident Response Team (ISIRT)Incident ResponseN/A9
IRO-08
Chain of Custody & ForensicsIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

9
IRO-09
Situational Awareness For IncidentsIncident ResponseN/A8
IRO-09.1
Automated Tracking, Data Collection & AnalysisIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

1
IRO-09.2
Recurring Incident AnalysisIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

5
IRO-10
Incident Stakeholder ReportingIncident ResponseN/A9
IRO-10.1
Automated ReportingIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

9
IRO-10.2
Cyber Incident Reporting for Sensitive / Regulated DataIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

9
IRO-10.3
Vulnerabilities Related To IncidentsIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

8
IRO-10.4
Supply Chain CoordinationIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

7
IRO-10.5
Serious Incident ReportingIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

5
IRO-11
Incident Reporting AssistanceIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

5
IRO-11.1
Automation Support of Availability of Information / SupportIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

1
IRO-11.2
Coordination With External ProvidersIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

5
IRO-12
Sensitive / Regulated Data Spill ResponseIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

8
IRO-12.1
Sensitive / Regulated Data Spill Responsible PersonnelIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

8
IRO-12.2
Sensitive / Regulated Data Spill TrainingIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

8
IRO-12.3
Post-Sensitive / Regulated Data Spill OperationsIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

8
IRO-12.4
Sensitive / Regulated Data Exposure to Unauthorized PersonnelIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

8
IRO-13
Root Cause Analysis (RCA) & Lessons LearnedIncident ResponseN/A8
IRO-14
Regulatory & Law Enforcement ContactsIncident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

9
IRO-15
Detonation Chambers (Sandboxes)Incident Response

Section 7.7

Section 7.7: Incident Management - Technology incidents should be promptly detected, responded to, a...

5
IRO-16
Public Relations & Reputation RepairIncident ResponseN/A6
IAO-01
Information Assurance (IA) OperationsInformation AssuranceN/A10
IAO-01.1
Assessment BoundariesInformation AssuranceN/A9
IAO-02
AssessmentsInformation AssuranceN/A10
IAO-02.1
Assessor IndependenceInformation Assurance

Section 8.1

Section 8.1: System Availability - Critical systems should be designed and operated to meet availabi...

9
IAO-02.2
Specialized AssessmentsInformation AssuranceN/A9
IAO-02.3
Third-Party AssessmentsInformation Assurance

Section 8.1

Section 8.1: System Availability - Critical systems should be designed and operated to meet availabi...

9
IAO-02.4
Security Assessment Report (SAR)Information AssuranceN/A7
IAO-03
System Security & Privacy Plan (SSPP)Information Assurance

Section 8.1

Section 8.1: System Availability - Critical systems should be designed and operated to meet availabi...

7
IAO-03.1
Plan / Coordinate with Other Organizational EntitiesInformation Assurance

Section 8.1

Section 8.1: System Availability - Critical systems should be designed and operated to meet availabi...

5
IAO-03.2
Adequate Security for Sensitive / Regulated Data In Support of ContractsInformation AssuranceN/A7
IAO-04
Threat Analysis & Flaw Remediation During DevelopmentInformation AssuranceN/A10
IAO-05
Plan of Action & Milestones (POA&M)Information AssuranceN/A9
IAO-05.1
Plan of Action & Milestones (POA&M) AutomationInformation Assurance

Section 8.1

Section 8.1: System Availability - Critical systems should be designed and operated to meet availabi...

2
IAO-06
Technical VerificationInformation Assurance

Section 8.1

Section 8.1: System Availability - Critical systems should be designed and operated to meet availabi...

8
IAO-07
Security AuthorizationInformation Assurance

Section 8.1

Section 8.1: System Availability - Critical systems should be designed and operated to meet availabi...

10
MDM-04
Mobile Device TamperingMobile Device ManagementN/A9
MDM-06
Personally-Owned Mobile DevicesMobile Device ManagementN/A8
MDM-07
Organization-Owned Mobile DevicesMobile Device ManagementN/A8
NET-01
Network Security Controls (NSC)Network SecurityN/A10
NET-01.1
Zero Trust Architecture (ZTA)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-02
Layered Network DefensesNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-02.1
Denial of Service (DoS) ProtectionNetwork SecurityN/A9
NET-02.2
Guest NetworksNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

6
NET-02.3
Cross Domain Solution (CDS)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

6
NET-03
Boundary ProtectionNetwork SecurityN/A10
NET-03.1
Limit Network ConnectionsNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-03.2
External Telecommunications ServicesNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

7
NET-03.3
Prevent Discovery of Internal InformationNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

7
NET-03.4
Personal Data (PD)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

7
NET-03.5
Prevent Unauthorized ExfiltrationNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-03.6
Dynamic Isolation & Segregation (Sandboxing)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-03.7
Isolation of System ComponentsNetwork SecurityN/A5
NET-03.8
Separate Subnet for Connecting to Different Security DomainsNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-04
Data Flow Enforcement – Access Control Lists (ACLs)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

10
NET-04.1
Deny Traffic by Default & Allow Traffic by ExceptionNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

10
NET-04.2
Object Security AttributesNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-04.3
Content Check for Encrypted DataNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

4
NET-04.4
Embedded Data TypesNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

2
NET-04.5
MetadataNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

2
NET-04.6
Human ReviewsNetwork SecurityN/A9
NET-04.7
Policy Decision Point (PDP)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-04.8
Data Type IdentifiersNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-04.9
Decomposition Into Policy-Related SubcomponentsNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-04.10
Detection of Unsanctioned InformationNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-04.11
Approved SolutionsNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-04.12
Cross Domain AuthenticationNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-04.13
Metadata ValidationNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

2
NET-04.14
Application ProxyNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

7
NET-05
Interconnection Security Agreements (ISAs)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-05.1
External System ConnectionsNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-05.2
Internal System ConnectionsNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

7
NET-06
Network Segmentation (macrosegementation)Network SecurityN/A10
NET-06.1
Security Management SubnetsNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-06.2
Virtual Local Area Network (VLAN) SeparationNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-06.3
Sensitive / Regulated Data Enclave (Secure Zone)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

10
NET-06.4
Segregation From Enterprise ServicesNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

4
NET-06.5
Direct Internet Access RestrictionsNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

6
NET-06.6
MicrosegmentationNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

2
NET-06.7
Software Defined Networking (SDN)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-07
Network Connection TerminationNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-08
Network Intrusion Detection / Prevention Systems (NIDS / NIPS)Network SecurityN/A9
NET-08.1
DMZ NetworksNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-08.2
Wireless Intrusion Detection / Prevention Systems (WIDS / WIPS)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-08.3
Host ContainmentNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

3
NET-08.4
Resource ContainmentNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

3
NET-09
Session IntegrityNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-09.1
Invalidate Session Identifiers at LogoutNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-09.2
Unique System-Generated Session IdentifiersNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

3
NET-10
Domain Name Service (DNS) ResolutionNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

10
NET-10.1
Architecture & Provisioning for Name / Address Resolution ServiceNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-10.2
Secure Name / Address Resolution Service (Recursive or Caching Resolver)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-10.3
Sender Policy Framework (SPF)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-10.4
Domain Registrar SecurityNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-11
Out-of-Band ChannelsNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-12
Safeguarding Data Over Open NetworksNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-12.1
Wireless Link ProtectionNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-12.2
End-User Messaging TechnologiesNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-13
Electronic MessagingNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

10
NET-14
Remote AccessNetwork SecurityN/A10
NET-14.1
Automated Monitoring & ControlNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

1
NET-14.2
Protection of Confidentiality / Integrity Using EncryptionNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-14.3
Managed Access Control PointsNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-14.4
Remote Privileged Commands & Sensitive Data AccessNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-14.5
Work From Anywhere (WFA) - Telecommuting SecurityNetwork SecurityN/A10
NET-14.6
Third-Party Remote Access GovernanceNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-14.7
Endpoint Security ValidationNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

6
NET-14.8
Expeditious Disconnect / Disable CapabilityNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-15
Wireless NetworkingNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-15.1
Authentication & EncryptionNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-15.2
Disable Wireless NetworkingNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-15.3
Restrict Configuration By UsersNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-15.4
Wireless BoundariesNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-15.5
Rogue Wireless DetectionNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-16
IntranetsNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-17
Data Loss Prevention (DLP)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-18
DNS & Content FilteringNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-18.1
Route Internal Traffic to Proxy ServersNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

9
NET-18.2
Visibility of Encrypted CommunicationsNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-18.3
Route Privileged Network AccessNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

1
NET-18.4
Protocol Compliance EnforcementNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-18.5
Domain Name VerificationNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-18.6
Internet Address DenylistingNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

8
NET-18.7
Bandwidth ControlNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

2
NET-18.8
Authenticated ProxyNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

3
NET-18.9
Certificate DenylistingNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

7
NET-19
Content Disarm and Reconstruction (CDR)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

6
NET-20
Email Content ProtectionsNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

10
NET-20.1
Email Domain Reputation ProtectionsNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

1
NET-20.2
Sender DenylistingNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

7
NET-20.3
Authenticated Received Chain (ARC)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

2
NET-20.4
Domain-Based Message Authentication Reporting and Conformance (DMARC)Network Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

3
NET-20.5
User Digital Signatures for Outgoing EmailNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

6
NET-20.6
Encryption for Outgoing EmailNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

6
NET-20.7
Adaptive Email ProtectionsNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

1
NET-20.8
Email LabelingNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

5
NET-20.9
User Threat ReportingNetwork Security

Section 9.3

Section 9.3: Remote Access Management - Remote access should be secured through strong authenticatio...

1
PES-01
Physical & Environmental ProtectionsPhysical & Environmental SecurityN/A9
PES-02
Physical Access AuthorizationsPhysical & Environmental SecurityN/A7
PES-03
Physical Access ControlPhysical & Environmental SecurityN/A10
PES-03.1
Controlled Ingress & Egress PointsPhysical & Environmental SecurityN/A9
PES-03.2
Lockable Physical CasingsPhysical & Environmental SecurityN/A5
PES-03.4
Access To Critical SystemsPhysical & Environmental SecurityN/A5
PES-04
Physical Security of Offices, Rooms & FacilitiesPhysical & Environmental SecurityN/A10
PES-04.1
Working in Secure AreasPhysical & Environmental SecurityN/A10
PES-05
Monitoring Physical AccessPhysical & Environmental SecurityN/A7
PES-05.2
Monitoring Physical Access To Critical SystemsPhysical & Environmental SecurityN/A5
PES-06
Visitor ControlPhysical & Environmental SecurityN/A9
PES-07
Supporting UtilitiesPhysical & Environmental SecurityN/A9
PES-08
Fire ProtectionPhysical & Environmental SecurityN/A7
PES-08.1
Fire Detection DevicesPhysical & Environmental SecurityN/A9
PES-10
Delivery & RemovalPhysical & Environmental SecurityN/A8
PRI-01
Data Privacy ProgramData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

10
PRI-01.1
Chief Privacy Officer (CPO)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

3
PRI-01.2
Privacy Act StatementsData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

2
PRI-01.3
Dissemination of Data Privacy Program InformationData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-01.4
Data Protection Officer (DPO)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

7
PRI-01.5
Binding Corporate Rules (BCR)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-01.6
Security of Personal Data (PD)Data PrivacyN/A7
PRI-01.7
Limiting Personal Data (PD) DisclosuresData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

7
PRI-01.8
Data FiduciaryData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

7
PRI-01.9
Personal Data (PD) Process ManagerData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-01.10
Financial Incentives For Personal Data (PD)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

3
PRI-02
Data Privacy NoticeData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

7
PRI-02.1
Purpose SpecificationData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

7
PRI-02.2
Automated Data Management ProcessesData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

1
PRI-02.3
Computer Matching Agreements (CMA)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

1
PRI-02.4
System of Records Notice (SORN)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

1
PRI-02.5
System of Records Notice (SORN) Review ProcessData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

1
PRI-02.6
Privacy Act ExemptionsData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

1
PRI-02.7
Real-Time or Layered NoticeData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

2
PRI-03
Choice & ConsentData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

7
PRI-03.1
Tailored ConsentData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

1
PRI-03.2
Just-In-Time Notice & Updated ConsentData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

1
PRI-03.3
Prohibition of Selling, Processing and/or Sharing Personal Data (PD)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-03.4
Revoke ConsentData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

3
PRI-03.5
Product or Service Delivery RestrictionsData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

7
PRI-03.6
Authorized AgentData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

6
PRI-03.7
Active Participation By Data SubjectsData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

3
PRI-03.8
Global Privacy Control (GPC)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-03.9
Continued Use of Personal Data (PD)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-03.10
Cease Processing, Storing and/or Sharing Personal Data (PD)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

6
PRI-03.11
Communicating Processing ChangesData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-04
Restrict Collection To Identified PurposeData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

7
PRI-04.1
Authority To Collect, Process, Store & Share Personal Data (PD)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

7
PRI-04.2
Primary SourcesData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

7
PRI-04.3
Identifiable Image CollectionData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

7
PRI-04.4
Acquired Personal Data (PD)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

6
PRI-04.5
Validate Collected Personal Data (PD)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

1
PRI-04.6
Re-Validate Collected Personal Data (PD)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

1
PRI-04.7
Personal Data (PD) Collection MethodsData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

3
PRI-05
Personal Data (PD) Retention & DisposalData PrivacyN/A8
PRI-05.1
Internal Use of Personal Data (PD) For Testing, Training and ResearchData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

8
PRI-05.2
Personal Data (PD) Accuracy & IntegrityData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-05.3
Data MaskingData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

8
PRI-05.4
Usage Restrictions of Personal Data (PD)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

8
PRI-05.5
Inventory of Personal Data (PD)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

8
PRI-05.6
Personal Data (PD) Inventory Automation SupportData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

1
PRI-05.7
Personal Data (PD) CategoriesData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-05.8
Personal Data (PD) FormatsData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

4
PRI-06
Data Subject EmpowermentData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

6
PRI-06.1
Correcting Inaccurate Personal Data (PD)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-06.2
Notice of Correction or Processing ChangeData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

4
PRI-06.3
Appeal Adverse DecisionData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

4
PRI-06.4
User Feedback ManagementData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-06.5
Right to ErasureData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-06.6
Data PortabilityData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

3
PRI-06.7
Personal Data (PD) ExportsData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-07
Information Sharing With Third PartiesData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

9
PRI-07.1
Data Privacy Requirements for Contractors & Service ProvidersData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

10
PRI-07.2
Joint Processing of Personal Data (PD)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-07.3
Obligation To Inform Third-PartiesData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-07.4
Reject Unauthenticated or Untrustworthy Disclosure RequestsData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-07.5
Justification To Reject Disclosure RequestsData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-08
Testing, Training & MonitoringData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

8
PRI-09
Personal Data (PD) LineageData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-10
Data Quality ManagementData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-10.1
AutomationData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

1
PRI-10.2
Data Analytics BiasData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-11
Data TaggingData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

3
PRI-12
Updating Personal Data (PD)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

9
PRI-12.1
Enabling Data Subjects To Update Personal Data (PD)Data Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

4
PRI-13
Data Management BoardData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

3
PRI-14
Documenting Data Processing ActivitiesData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

8
PRI-14.1
Accounting of DisclosuresData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

8
PRI-14.2
Notification of Disclosure Request To Data SubjectData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

5
PRI-15
Register As A Data Controller and/or Data ProcessorData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

3
PRI-16
Potential Human Rights AbusesData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

10
PRI-17
Data Subject CommunicationsData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

6
PRI-17.1
Conspicuous Link To Data Privacy NoticeData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

4
PRI-17.2
Notice of Financial IncentiveData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

2
PRI-18
Data Controller CommunicationsData Privacy

Section 9.2

Section 9.2: Privileged Access Management - Privileged access should be subject to enhanced controls...

7
PRM-01
Cybersecurity & Data Protection Portfolio ManagementProject & Resource ManagementN/A8
PRM-01.1
Strategic Plan & ObjectivesProject & Resource ManagementN/A5
PRM-01.2
Targeted Capability Maturity LevelsProject & Resource Management

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

5
PRM-02
Cybersecurity & Data Protection Resource ManagementProject & Resource ManagementN/A8
PRM-02.1
Prioritization To Address Evolving Risks & ThreatsProject & Resource Management

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

5
PRM-03
Allocation of ResourcesProject & Resource ManagementN/A8
PRM-04
Cybersecurity & Data Protection In Project ManagementProject & Resource ManagementN/A10
PRM-05
Cybersecurity & Data Protection Requirements DefinitionProject & Resource ManagementN/A9
PRM-06
Business Process DefinitionProject & Resource ManagementN/A7
PRM-07
Secure Development Life Cycle (SDLC) ManagementProject & Resource ManagementN/A10
PRM-08
Manage Organizational KnowledgeProject & Resource Management

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

5
RSK-01
Risk Management ProgramRisk ManagementN/A10
RSK-01.1
Risk FramingRisk ManagementN/A9
RSK-01.2
Risk Management ResourcingRisk Management

Section 4.1

Section 4.1: Risk Management Framework - A comprehensive technology risk management framework should...

8
RSK-01.3
Risk ToleranceRisk Management

Section 4.1

Section 4.1: Risk Management Framework - A comprehensive technology risk management framework should...

9
RSK-01.4
Risk ThresholdRisk Management

Section 4.1

Section 4.1: Risk Management Framework - A comprehensive technology risk management framework should...

9
RSK-01.5
Risk AppetiteRisk Management

Section 4.1

Section 4.1: Risk Management Framework - A comprehensive technology risk management framework should...

9
RSK-02
Risk-Based Security CategorizationRisk ManagementN/A9
RSK-02.1
Impact-Level PrioritizationRisk ManagementN/A9
RSK-03
Risk IdentificationRisk ManagementN/A9
RSK-03.1
Risk CatalogRisk Management

Section 4.1

Section 4.1: Risk Management Framework - A comprehensive technology risk management framework should...

5
RSK-04
Risk AssessmentRisk ManagementN/A10
RSK-04.1
Risk RegisterRisk ManagementN/A10
RSK-04.2
Risk Assessment MethodologyRisk Management

Section 4.1

Section 4.1: Risk Management Framework - A comprehensive technology risk management framework should...

8
RSK-05
Risk RankingRisk ManagementN/A9
RSK-06
Risk RemediationRisk ManagementN/A10
RSK-06.1
Risk ResponseRisk ManagementN/A9
RSK-06.2
Compensating CountermeasuresRisk ManagementN/A9
RSK-07
Risk Assessment UpdateRisk ManagementN/A9
RSK-08
Business Impact Analysis (BIA)Risk ManagementN/A8
RSK-09
Supply Chain Risk Management (SCRM) PlanRisk ManagementN/A10
RSK-09.1
Supply Chain Risk AssessmentRisk Management

Section 4.1

Section 4.1: Risk Management Framework - A comprehensive technology risk management framework should...

9
RSK-09.2
AI & Autonomous Technologies Supply Chain ImpactsRisk Management

Section 4.1

Section 4.1: Risk Management Framework - A comprehensive technology risk management framework should...

8
RSK-10
Data Protection Impact Assessment (DPIA)Risk ManagementN/A9
RSK-11
Risk MonitoringRisk Management

Section 4.1

Section 4.1: Risk Management Framework - A comprehensive technology risk management framework should...

9
RSK-12
Risk CultureRisk Management

Section 4.1

Section 4.1: Risk Management Framework - A comprehensive technology risk management framework should...

4
SEA-01
Secure Engineering PrinciplesSecure Engineering & ArchitectureN/A10
SEA-01.1
Centralized Management of Cybersecurity & Data Protection ControlsSecure Engineering & ArchitectureN/A9
SEA-01.2
Achieving Resilience RequirementsSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

4
SEA-01.3
Resilience CapabilitiesSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

5
SEA-02
Alignment With Enterprise ArchitectureSecure Engineering & ArchitectureN/A9
SEA-02.1
Standardized TerminologySecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

3
SEA-02.2
Outsourcing Non-Essential Functions or ServicesSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

3
SEA-02.3
Technical Debt ReviewsSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

9
SEA-03
Defense-In-Depth (DiD) ArchitectureSecure Engineering & ArchitectureN/A10
SEA-03.1
System PartitioningSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

8
SEA-03.2
Application PartitioningSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

8
SEA-04
Process IsolationSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

7
SEA-04.1
Security Function IsolationSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

7
SEA-04.2
Hardware SeparationSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

7
SEA-04.3
Thread SeparationSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

7
SEA-04.4
System Privileges IsolationSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

5
SEA-05
Information In Shared ResourcesSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

8
SEA-06
Prevent Program ExecutionSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

8
SEA-07
Predictable Failure AnalysisSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

5
SEA-07.1
Technology Lifecycle ManagementSecure Engineering & ArchitectureN/A7
SEA-07.2
Fail SecureSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

8
SEA-07.3
Fail SafeSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

8
SEA-08
Non-PersistenceSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

9
SEA-08.1
Refresh from Trusted SourcesSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

5
SEA-09
Information Output FilteringSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

8
SEA-09.1
Limit Personal Data (PD) DisseminationSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

8
SEA-10
Memory ProtectionSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

8
SEA-11
HoneypotsSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

3
SEA-12
HoneyclientsSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

3
SEA-13
HeterogeneitySecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

3
SEA-13.1
Virtualization TechniquesSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

6
SEA-14
Concealment & MisdirectionSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

2
SEA-14.1
RandomnessSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

5
SEA-14.2
Change Processing & Storage LocationsSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

5
SEA-15
Distributed Processing & StorageSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

4
SEA-16
Non-Modifiable Executable ProgramsSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

1
SEA-17
Secure Log-On ProceduresSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

8
SEA-18
System Use Notification (Logon Banner)Secure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

9
SEA-18.1
Standardized Microsoft Windows BannerSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

9
SEA-18.2
Truncated BannerSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

9
SEA-19
Previous Logon NotificationSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

3
SEA-20
Clock SynchronizationSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

9
SEA-21
Application ContainerSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

5
SEA-22
Privileged EnvironmentsSecure Engineering & Architecture

Section 5.4

Section 5.4: System Development Life Cycle and Security-By-Design - Security should be integrated th...

5
OPS-01
Operations SecuritySecurity OperationsN/A8
OPS-01.1
Standardized Operating Procedures (SOP)Security Operations

Section 12

Section 12: Cyber Security Operations - Cyber security operations should include continuous monitori...

9
OPS-02
Security Concept Of Operations (CONOPS)Security Operations

Section 12

Section 12: Cyber Security Operations - Cyber security operations should include continuous monitori...

9
OPS-03
Service Delivery (Business Process Support)Security OperationsN/A7
OPS-04
Security Operations Center (SOC)Security OperationsN/A8
OPS-05
Secure Practices GuidelinesSecurity Operations

Section 12

Section 12: Cyber Security Operations - Cyber security operations should include continuous monitori...

7
OPS-06
Security Orchestration, Automation, and Response (SOAR)Security Operations

Section 12

Section 12: Cyber Security Operations - Cyber security operations should include continuous monitori...

5
OPS-07
Shadow Information Technology DetectionSecurity Operations

Section 12

Section 12: Cyber Security Operations - Cyber security operations should include continuous monitori...

8
SAT-01
Cybersecurity & Data Protection-Minded WorkforceSecurity Awareness & TrainingN/A8
SAT-01.1
Maintaining Workforce Development RelevancySecurity Awareness & Training

Section 3.6

Section 3.6: Security Awareness and Training - Regular security awareness programs and training shou...

6
SAT-02
Cybersecurity & Data Protection Awareness TrainingSecurity Awareness & TrainingN/A8
SAT-02.1
Simulated Cyber Attack Scenario TrainingSecurity Awareness & Training

Section 3.6

Section 3.6: Security Awareness and Training - Regular security awareness programs and training shou...

3
SAT-02.2
Social Engineering & MiningSecurity Awareness & Training

Section 3.6

Section 3.6: Security Awareness and Training - Regular security awareness programs and training shou...

5
SAT-03
Role-Based Cybersecurity & Data Protection TrainingSecurity Awareness & TrainingN/A8
SAT-03.1
Practical ExercisesSecurity Awareness & Training

Section 3.6

Section 3.6: Security Awareness and Training - Regular security awareness programs and training shou...

3
SAT-03.2
Suspicious Communications & Anomalous System BehaviorSecurity Awareness & TrainingN/A9
SAT-03.3
Sensitive / Regulated Data Storage, Handling & ProcessingSecurity Awareness & TrainingN/A9
SAT-03.4
Vendor Cybersecurity & Data Protection TrainingSecurity Awareness & Training

Section 3.6

Section 3.6: Security Awareness and Training - Regular security awareness programs and training shou...

7
SAT-03.5
Privileged UsersSecurity Awareness & TrainingN/A9
SAT-03.6
Cyber Threat EnvironmentSecurity Awareness & Training

Section 3.6

Section 3.6: Security Awareness and Training - Regular security awareness programs and training shou...

8
SAT-03.7
Continuing Professional Education (CPE) - Cybersecurity & Data Protection PersonnelSecurity Awareness & Training

Section 3.6

Section 3.6: Security Awareness and Training - Regular security awareness programs and training shou...

8
SAT-03.8
Continuing Professional Education (CPE) - DevOps PersonnelSecurity Awareness & Training

Section 3.6

Section 3.6: Security Awareness and Training - Regular security awareness programs and training shou...

8
SAT-03.9
Counterintelligence TrainingSecurity Awareness & Training

Section 3.6

Section 3.6: Security Awareness and Training - Regular security awareness programs and training shou...

1
SAT-04
Cybersecurity & Data Protection Training RecordsSecurity Awareness & Training

Section 3.6

Section 3.6: Security Awareness and Training - Regular security awareness programs and training shou...

9
SAT-05
Cybersecurity Knowledge SharingSecurity Awareness & Training

Section 3.6

Section 3.6: Security Awareness and Training - Regular security awareness programs and training shou...

3
TDA-01
Technology Development & AcquisitionTechnology Development & AcquisitionN/A10
TDA-01.1
Product ManagementTechnology Development & AcquisitionN/A10
TDA-01.2
Integrity Mechanisms for Software / Firmware UpdatesTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

5
TDA-01.3
Malware Testing Prior to ReleaseTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

9
TDA-01.4
DevSecOpsTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

6
TDA-02
Minimum Viable Product (MVP) Security RequirementsTechnology Development & AcquisitionN/A9
TDA-02.1
Ports, Protocols & Services In UseTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

8
TDA-02.2
Information Assurance Enabled ProductsTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

2
TDA-02.3
Development Methods, Techniques & ProcessesTechnology Development & AcquisitionN/A5
TDA-02.4
Pre-Established Secure ConfigurationsTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

8
TDA-02.5
Identification & Justification of Ports, Protocols & ServicesTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

8
TDA-02.6
Insecure Ports, Protocols & ServicesTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

9
TDA-02.7
Cybersecurity & Data Privacy Representatives For Product ChangesTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

10
TDA-02.8
Minimizing Attack SurfacesTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

9
TDA-02.9
Ongoing Product Security SupportTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

9
TDA-02.10
Product Testing & ReviewsTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

9
TDA-02.11
Disclosure of VulnerabilitiesTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

5
TDA-02.12
Products With Digital ElementsTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

6
TDA-02.13
Reporting Exploitable VulnerabilitiesTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

8
TDA-02.14
Logging SyntaxTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

8
TDA-03
Commercial Off-The-Shelf (COTS) Security SolutionsTechnology Development & AcquisitionN/A5
TDA-03.1
Supplier DiversityTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

3
TDA-04
Documentation RequirementsTechnology Development & AcquisitionN/A8
TDA-04.1
Functional PropertiesTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

8
TDA-04.2
Software Bill of Materials (SBOM)Technology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

9
TDA-05
Developer Architecture & DesignTechnology Development & AcquisitionN/A8
TDA-05.1
Physical Diagnostic & Test InterfacesTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

5
TDA-05.2
Diagnostic & Test Interface MonitoringTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

3
TDA-06
Secure Software Development Practices (SSDP)Technology Development & AcquisitionN/A10
TDA-06.1
Criticality AnalysisTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

9
TDA-06.2
Threat ModelingTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

7
TDA-06.3
Software Assurance Maturity Model (SAMM)Technology Development & AcquisitionN/A9
TDA-06.4
Supporting ToolchainTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

6
TDA-06.5
Software Design ReviewTechnology Development & AcquisitionN/A10
TDA-06.6
Software Design Root Cause AnalysisTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

5
TDA-07
Secure Development EnvironmentsTechnology Development & AcquisitionN/A9
TDA-08
Separation of Development, Testing and Operational EnvironmentsTechnology Development & AcquisitionN/A10
TDA-08.1
Secure Migration PracticesTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

8
TDA-09
Cybersecurity & Data Protection Testing Throughout DevelopmentTechnology Development & AcquisitionN/A9
TDA-09.1
Continuous Monitoring PlanTechnology Development & AcquisitionN/A9
TDA-09.2
Static Code AnalysisTechnology Development & AcquisitionN/A9
TDA-09.3
Dynamic Code AnalysisTechnology Development & AcquisitionN/A9
TDA-09.4
Malformed Input TestingTechnology Development & AcquisitionN/A7
TDA-09.5
Application Penetration TestingTechnology Development & AcquisitionN/A9
TDA-09.6
Secure Settings By DefaultTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

9
TDA-09.7
Manual Code ReviewTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

5
TDA-10
Use of Live DataTechnology Development & AcquisitionN/A9
TDA-10.1
Test Data IntegrityTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

8
TDA-11
Product Tampering and Counterfeiting (PTC)Technology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

9
TDA-11.1
Anti-Counterfeit TrainingTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

6
TDA-11.2
Component DisposalTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

0
TDA-12
Customized Development of Critical ComponentsTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

8
TDA-13
Developer ScreeningTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

9
TDA-14
Developer Configuration ManagementTechnology Development & AcquisitionN/A9
TDA-14.1
Software / Firmware Integrity VerificationTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

8
TDA-14.2
Hardware Integrity VerificationTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

5
TDA-15
Developer Threat Analysis & Flaw RemediationTechnology Development & AcquisitionN/A9
TDA-16
Developer-Provided TrainingTechnology Development & AcquisitionN/A9
TDA-17
Unsupported Technology Assets, Applications and/or Services (TAAS)Technology Development & AcquisitionN/A10
TDA-17.1
Alternate Sources for Continued SupportTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

8
TDA-18
Input Data ValidationTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

9
TDA-19
Error HandlingTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

9
TDA-20
Access to Program Source CodeTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

9
TDA-20.1
Software Release Integrity VerificationTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

6
TDA-20.2
Archiving Software ReleasesTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

8
TDA-20.3
Software EscrowTechnology Development & AcquisitionN/A7
TDA-20.4
Approved CodeTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

8
TDA-21
Product Conformity GovernanceTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

9
TDA-22
Technical Documentation ArtifactsTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

7
TDA-22.1
Product-Specific Risk Assessment ArtifactsTechnology Development & Acquisition

Section 5.1

Section 5.1: Project Management Framework - A structured project management framework should govern ...

4
TPM-01
Third-Party ManagementThird-Party ManagementN/A10
TPM-01.1
Third-Party InventoriesThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

8
TPM-02
Third-Party Criticality AssessmentsThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

9
TPM-03
Supply Chain Risk Management (SCRM)Third-Party ManagementN/A9
TPM-03.1
Acquisition Strategies, Tools & MethodsThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

9
TPM-03.2
Limit Potential HarmThird-Party ManagementN/A9
TPM-03.3
Processes To Address Weaknesses or DeficienciesThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

9
TPM-03.4
Adequate SupplyThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

9
TPM-04
Third-Party ServicesThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

10
TPM-04.1
Third-Party Risk Assessments & ApprovalsThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

9
TPM-04.2
External Connectivity Requirements - Identification of Ports, Protocols & ServicesThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

7
TPM-04.3
Conflict of InterestsThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

8
TPM-04.4
Third-Party Processing, Storage and Service LocationsThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

10
TPM-05
Third-Party Contract RequirementsThird-Party ManagementN/A10
TPM-05.1
Security Compromise Notification AgreementsThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

9
TPM-05.2
Contract Flow-Down RequirementsThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

9
TPM-05.3
Third-Party Authentication PracticesThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

8
TPM-05.4
Responsible, Accountable, Supportive, Consulted & Informed (RASCI) MatrixThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

8
TPM-05.5
Third-Party Scope ReviewThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

10
TPM-05.6
First-Party Declaration (1PD)Third-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

7
TPM-05.7
Break ClausesThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

9
TPM-05.8
Third-Party Attestation (3PA)Third-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

5
TPM-06
Third-Party Personnel SecurityThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

9
TPM-07
Monitoring for Third-Party Information DisclosureThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

8
TPM-08
Review of Third-Party ServicesThird-Party ManagementN/A9
TPM-09
Third-Party Deficiency RemediationThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

9
TPM-10
Managing Changes To Third-Party ServicesThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

8
TPM-11
Third-Party Incident Response & Recovery CapabilitiesThird-Party Management

Section 3.4

Section 3.4: Management of Third Party Services - Third-party service providers should be subject to...

8
THR-01
Threat Intelligence ProgramThreat ManagementN/A8
THR-02
Indicators of Exposure (IOE)Threat ManagementN/A8
THR-03
Threat Intelligence FeedsThreat ManagementN/A8
THR-03.1
Threat Intelligence ReportingThreat ManagementN/A8
THR-04
Insider Threat ProgramThreat ManagementN/A8
THR-05
Insider Threat AwarenessThreat ManagementN/A8
THR-06
Vulnerability Disclosure Program (VDP)Threat ManagementN/A8
THR-06.1
Security Disclosure Contact InformationThreat ManagementN/A1
THR-07
Threat HuntingThreat ManagementN/A4
THR-08
TaintingThreat ManagementN/A1
THR-09
Threat CatalogThreat ManagementN/A5
THR-10
Threat AnalysisThreat ManagementN/A7
THR-11
Behavioral BaseliningThreat ManagementN/A5
VPM-01
Vulnerability & Patch Management Program (VPMP)Vulnerability & Patch ManagementN/A9
VPM-01.1
Attack Surface ScopeVulnerability & Patch ManagementN/A5
VPM-02
Vulnerability Remediation ProcessVulnerability & Patch ManagementN/A10
VPM-03
Vulnerability RankingVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

8
VPM-03.1
Vulnerability Exploitation AnalysisVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

5
VPM-04
Continuous Vulnerability Remediation ActivitiesVulnerability & Patch ManagementN/A8
VPM-04.1
Stable VersionsVulnerability & Patch ManagementN/A8
VPM-04.2
Flaw Remediation with Personal Data (PD)Vulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

8
VPM-04.3
Deferred Patching DecisionsVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

2
VPM-05
Software & Firmware PatchingVulnerability & Patch ManagementN/A10
VPM-05.1
Centralized Management of Flaw Remediation ProcessesVulnerability & Patch ManagementN/A9
VPM-05.2
Automated Remediation StatusVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

9
VPM-05.3
Time To Remediate / Benchmarks For Corrective ActionVulnerability & Patch ManagementN/A6
VPM-05.4
Automated Software & Firmware UpdatesVulnerability & Patch ManagementN/A5
VPM-05.5
Removal of Previous VersionsVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

5
VPM-05.6
Pre-Deployment Patch TestingVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

7
VPM-05.7
Out-of-Cycle PatchingVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

7
VPM-05.8
Software Patch IntegrityVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

9
VPM-06
Vulnerability ScanningVulnerability & Patch ManagementN/A9
VPM-06.1
Update Tool CapabilityVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

8
VPM-06.2
Breadth / Depth of CoverageVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

8
VPM-06.3
Privileged AccessVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

9
VPM-06.4
Trend AnalysisVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

9
VPM-06.5
Review Historical event logsVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

9
VPM-06.6
External Vulnerability Assessment ScansVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

9
VPM-06.7
Internal Vulnerability Assessment ScansVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

9
VPM-06.8
Acceptable Discoverable InformationVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

5
VPM-06.9
Correlate Scanning InformationVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

5
VPM-07
Penetration TestingVulnerability & Patch ManagementN/A9
VPM-07.1
Independent Penetration Agent or TeamVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

6
VPM-08
Technical Surveillance Countermeasures SecurityVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

1
VPM-09
Reviewing Vulnerability Scanner UsageVulnerability & Patch Management

Section 7.4

Section 7.4: Patch Management - Security patches and updates should be promptly evaluated, tested, a...

3
VPM-10
Red Team ExercisesVulnerability & Patch ManagementN/A3
WEB-01
Web SecurityWeb SecurityN/A8
WEB-01.1
Unauthorized CodeWeb SecurityN/A9
WEB-02
Use of Demilitarized Zones (DMZ)Web SecurityN/A9
WEB-03
Web Application Firewall (WAF)Web SecurityN/A8
WEB-04
Client-Facing Web ServicesWeb SecurityN/A10
WEB-05
Cookie ManagementWeb SecurityN/A5
WEB-06
Strong Customer Authentication (SCA)Web SecurityN/A8
WEB-07
Web Security StandardWeb SecurityN/A9
WEB-08
Web Application FrameworkWeb SecurityN/A9
WEB-09
Validation & SanitizationWeb SecurityN/A9
WEB-10
Secure Web TrafficWeb SecurityN/A9
WEB-11
Output EncodingWeb SecurityN/A9
WEB-12
Web Browser SecurityWeb SecurityN/A9
WEB-13
Website Change DetectionWeb SecurityN/A8
WEB-14
Publicly Accessible Content ReviewsWeb SecurityN/A7