Skip to main content

💼 Information Protection Processes and Procedures (PR.IP)

  • ID: /frameworks/nist-csf-v1.1/pr-ip

Description​

Security policies (that address purpose, scope, roles, responsibilities, management commitment, and coordination among organizational entities), processes, and procedures are maintained and used to manage protection of information systems and assets.

Similar​

  • Internal
    • ID: dec-b-d064a5fc

Sub Sections​

SectionSub SectionsInternal RulesPoliciesFlagsCompliance
💼 PR.IP-1: A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality)426no data
💼 PR.IP-2: A System Development Life Cycle to manage systems is implemented69no data
💼 PR.IP-3: Configuration change control processes are in place55no data
💼 PR.IP-4: Backups of information are conducted, maintained, and tested48no data
💼 PR.IP-5: Policy and regulations regarding the physical operating environment for organizational assets are metno data
💼 PR.IP-6: Data is destroyed according to policy5no data
💼 PR.IP-7: Protection processes are improved2no data
💼 PR.IP-8: Effectiveness of protection technologies is shared67no data
💼 PR.IP-9: Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed33no data
💼 PR.IP-10: Response and recovery plans are tested11no data
💼 PR.IP-11: Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening)no data
💼 PR.IP-12: A vulnerability management plan is developed and implemented79no data