πΌ SA-14 CRITICALITY ANALYSIS
Descriptionβ
The organization identifies critical information system components and functions by performing a criticality analysis for [Assignment: organization-defined information systems, information system components, or information system services] at [Assignment: organization-defined decision points in the system development life cycle].
Similarβ
Similar Sections (Give Policies To)β
Section | Sub Sections | Internal Rules | Policies | Flags |
---|
πΌ NIST CSF v1.1 β πΌ ID.AM-5: Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their classification, criticality, and business value | | | | |
πΌ NIST CSF v1.1 β πΌ ID.BE-3: Priorities for organizational mission, objectives, and activities are established and communicated | | | | |
πΌ NIST CSF v1.1 β πΌ ID.BE-4: Dependencies and critical functions for delivery of critical services are established | | | 4 | |
πΌ NIST CSF v1.1 β πΌ ID.BE-5: Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress/attack, during recovery, normal operations) | | 4 | 4 | |
πΌ NIST CSF v1.1 β πΌ ID.RA-4: Potential business impacts and likelihoods are identified | | 7 | 7 | |
πΌ NIST CSF v1.1 β πΌ ID.RM-3: The organization's determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis | | | | |
πΌ NIST CSF v1.1 β πΌ ID.SC-2: Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process | | 7 | 7 | |
πΌ NIST CSF v1.1 β πΌ PR.PT-5: Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations | | 4 | 4 | |
Sub Sectionsβ