πΌ NIST CSF v2.0 β πΌ DE.AE-04: The estimated impact and scope of adverse events are understood | | | 14 | |
πΌ NIST CSF v2.0 β πΌ GV.OC-02: Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered | | | 7 | |
πΌ NIST CSF v2.0 β πΌ GV.OV-01: Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction | | | | |
πΌ NIST CSF v2.0 β πΌ GV.OV-02: The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks | | | | |
πΌ NIST CSF v2.0 β πΌ GV.RM-01: Risk management objectives are established and agreed to by organizational stakeholders | | | | |
πΌ NIST CSF v2.0 β πΌ GV.RM-02: Risk appetite and risk tolerance statements are established, communicated, and maintained | | | | |
πΌ NIST CSF v2.0 β πΌ GV.RM-03: Cybersecurity risk management activities and outcomes are included in enterprise risk management processes | | | | |
πΌ NIST CSF v2.0 β πΌ GV.RM-04: Strategic direction that describes appropriate risk response options is established and communicated | | | | |
πΌ NIST CSF v2.0 β πΌ GV.RM-05: Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties | | | | |
πΌ NIST CSF v2.0 β πΌ GV.RM-06: A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated | | | | |
πΌ NIST CSF v2.0 β πΌ GV.RM-07: Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions | | | | |
πΌ NIST CSF v2.0 β πΌ GV.SC-03: Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes | | | 7 | |
πΌ NIST CSF v2.0 β πΌ GV.SC-09: Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle | | | | |
πΌ NIST CSF v2.0 β πΌ ID.RA-04: Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded | | | 7 | |
πΌ NIST CSF v2.0 β πΌ ID.RA-06: Risk responses are chosen, prioritized, planned, tracked, and communicated | | | 7 | |
πΌ NIST CSF v2.0 β πΌ PR.IR-04: Adequate resource capacity to ensure availability is maintained | | | 1 | |
πΌ NIST CSF v2.0 β πΌ RC.RP-04: Critical mission functions and cybersecurity risk management are considered to establish post-incident operational norms | | | | |