πΌ FedRAMP High Security Controls β πΌ RA-7 Risk Response (L)(M)(H) | | | | |
πΌ FedRAMP Low Security Controls β πΌ RA-7 Risk Response (L)(M)(H) | | | | |
πΌ NIST CSF v2.0 β πΌ GV.OC-05: Outcomes, capabilities, and services that the organization depends on are understood and communicated | | | 3 | |
πΌ NIST CSF v2.0 β πΌ GV.OV-01: Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction | | | 3 | |
πΌ NIST CSF v2.0 β πΌ GV.OV-02: The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks | | | | |
πΌ NIST CSF v2.0 β πΌ GV.OV-03: Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed | | | | |
πΌ NIST CSF v2.0 β πΌ GV.RM-01: Risk management objectives are established and agreed to by organizational stakeholders | | | | |
πΌ NIST CSF v2.0 β πΌ GV.RM-03: Cybersecurity risk management activities and outcomes are included in enterprise risk management processes | | | | |
πΌ NIST CSF v2.0 β πΌ GV.SC-03: Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes | | | 10 | |
πΌ NIST CSF v2.0 β πΌ GV.SC-09: Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle | | | | |
πΌ NIST CSF v2.0 β πΌ GV.SC-10: Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement | | | | |
πΌ NIST CSF v2.0 β πΌ ID.IM-01: Improvements are identified from evaluations | | | 20 | |
πΌ NIST CSF v2.0 β πΌ ID.IM-02: Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties | | | 33 | |
πΌ NIST CSF v2.0 β πΌ ID.IM-03: Improvements are identified from execution of operational processes, procedures, and activities | | | 34 | |
πΌ NIST CSF v2.0 β πΌ ID.RA-05: Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization | | | 7 | |
πΌ NIST CSF v2.0 β πΌ ID.RA-06: Risk responses are chosen, prioritized, planned, tracked, and communicated | | | 7 | |
πΌ NIST CSF v2.0 β πΌ RS.AN-08: An incident's magnitude is estimated and validated | | | 1 | |