💼 Adverse Event Analysis (DE.AE) | 6 | | | |
💼 DE.AE-02: Potentially adverse events are analyzed to better understand associated activities | | | 26 | |
💼 DE.AE-03: Information is correlated from multiple sources | | | 26 | |
💼 DE.AE-04: The estimated impact and scope of adverse events are understood | | | 14 | |
💼 DE.AE-06: Information on adverse events is provided to authorized staff and tools | | | 33 | |
💼 DE.AE-07: Cyber threat intelligence and other contextual information are integrated into the analysis | | | 22 | |
💼 DE.AE-08: Incidents are declared when adverse events meet the defined incident criteria | | | | |
💼 Asset Management (ID.AM) | 7 | | | |
💼 ID.AM-01: Inventories of hardware managed by the organization are maintained | | | 3 | |
💼 ID.AM-02: Inventories of software, services, and systems managed by the organization are maintained | | | 7 | |
💼 ID.AM-03: Representations of the organization's authorized network communication and internal and external network data flows are maintained | | | 31 | |
💼 ID.AM-04: Inventories of services provided by suppliers are maintained | | | | |
💼 ID.AM-05: Assets are prioritized based on classification, criticality, resources, and impact on the mission | | | | |
💼 ID.AM-07: Inventories of data and corresponding metadata for designated data types are maintained | | | | |
💼 ID.AM-08: Systems, hardware, software, services, and data are managed throughout their life cycles | | | 3 | |
💼 Awareness and Training (PR.AT) | 2 | | | |
💼 PR.AT-01: Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind | | | 7 | |
💼 PR.AT-02: Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks with cybersecurity risks in mind | | | | |
💼 Continuous Monitoring (DE.CM) | 5 | | | |
💼 DE.CM-01: Networks and network services are monitored to find potentially adverse events | | | 83 | |
💼 DE.CM-02: The physical environment is monitored to find potentially adverse events | | | 8 | |
💼 DE.CM-03: Personnel activity and technology usage are monitored to find potentially adverse events | | | 59 | |
💼 DE.CM-06: External service provider activities and services are monitored to find potentially adverse events | | | 27 | |
💼 DE.CM-09: Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events | | | 89 | |
💼 Cybersecurity Supply Chain Risk Management (GV.SC) | 10 | | | |
💼 GV.SC-01: A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders | | | | |
💼 GV.SC-02: Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally | | | | |
💼 GV.SC-03: Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes | | | 7 | |
💼 GV.SC-04: Suppliers are known and prioritized by criticality | | | 7 | |
💼 GV.SC-05: Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties | | | | |
💼 GV.SC-06: Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships | | | | |
💼 GV.SC-07: The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship | | | 26 | |
💼 GV.SC-08: Relevant suppliers and other third parties are included in incident planning, response, and recovery activities | | | 1 | |
💼 GV.SC-09: Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle | | | | |
💼 GV.SC-10: Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement | | | | |
💼 Data Security (PR.DS) | 4 | | | |
💼 PR.DS-01: The confidentiality, integrity, and availability of data-at-rest are protected | | | 82 | |
💼 PR.DS-02: The confidentiality, integrity, and availability of data-in-transit are protected | | | 69 | |
💼 PR.DS-10: The confidentiality, integrity, and availability of data-in-use are protected | | | 67 | |
💼 PR.DS-11: Backups of data are created, protected, maintained, and tested | | | 6 | |
💼 Identity Management, Authentication, and Access Control (PR.AA) | 6 | | | |
💼 PR.AA-01: Identities and credentials for authorized users, services, and hardware are managed by the organization | | | 23 | |
💼 PR.AA-02: Identities are proofed and bound to credentials based on the context of interactions | | | 8 | |
💼 PR.AA-03: Users, services, and hardware are authenticated | | | 22 | |
💼 PR.AA-04: Identity assertions are protected, conveyed, and verified | | | | |
💼 PR.AA-05: Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties | | | 58 | |
💼 PR.AA-06: Physical access to assets is managed, monitored, and enforced commensurate with risk | | | 13 | |
|