CSF Controls Dashboard

Organizational Context GV.OC
CID Subcategory Nature Type Frequency Opinion Risk Action
GV.OC-01 The organizational mission is understood and informs cybersecurity risk management. Add Detail
GV.OC-02 Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered. Add Detail
GV.OC-03 Legal, regulatory, and contractual requirements regarding cybersecurity – including privacy and civil liberties obligations – are understood and managed. Add Detail
GV.OC-04 Critical objectives, capabilities, and services that stakeholders depend on or expect from the organization are understood and communicated. Add Detail
GV.OC-05 Outcomes, capabilities, and services that the organization depends on are understood and communicated. Add Detail
Risk Management Strategy GV.RM
CID Subcategory Nature Type Frequency Opinion Risk Action
GV.RM-01 Risk management objectives are established and agreed to by organizational stakeholders. Add Detail
GV.RM-02 Risk appetite and risk tolerance statements are established, communicated, and maintained. Add Detail
GV.RM-03 Cybersecurity risk management activities and outcomes are included in enterprise risk management processes. Add Detail
GV.RM-04 Strategic direction that describes appropriate risk response options is established and communicated. Add Detail
GV.RM-05 Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties. Add Detail
GV.RM-06 A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated. Add Detail
GV.RM-07 Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions. Add Detail
Roles, Responsibilities, and Authorities GV.RR
CID Subcategory Nature Type Frequency Opinion Risk Action
GV.RR-01 Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving. Add Detail
GV.RR-02 Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced. Add Detail
GV.RR-03 Adequate resources are allocated commensurate with cybersecurity risk strategy, roles and responsibilities, and policies. Add Detail
GV.RR-04 Cybersecurity is included in human resources practices. Add Detail
Policy GV.PO
CID Subcategory Nature Type Frequency Opinion Risk Action
GV.PO-01 Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced. Add Detail
GV.PO-02 Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission. Add Detail
Oversight GV.OV
CID Subcategory Nature Type Frequency Opinion Risk Action
GV.OV-01 Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction. Add Detail
GV.OV-02 The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks. Add Detail
GV.OV-03 Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed. Add Detail
Cybersecurity Supply Chain Risk Management GV.SC
CID Subcategory Nature Type Frequency Opinion Risk Action
GV.SC-01 A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders. Add Detail
GV.SC-02 Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally. Add Detail
GV.SC-03 Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes. Add Detail
GV.SC-04 Suppliers are known and prioritized by criticality. Add Detail
GV.SC-05 Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and agreements. Add Detail
GV.SC-06 Planning and due diligence are performed before entering supplier relationships. Add Detail
GV.SC-07 Supplier risks are understood, recorded, prioritized, assessed, responded to, and monitored. Add Detail
GV.SC-08 Suppliers are included in incident planning, response, and recovery activities. Add Detail
GV.SC-09 Supply chain security practices are integrated into cybersecurity and enterprise risk management programs. Add Detail
GV.SC-10 Supply chain risk management includes post-termination activities. Add Detail
Asset Management ID.AM
CID Subcategory Nature Type Frequency Opinion Risk Action
ID.AM-01 Inventories of hardware managed by the organization are maintained. Add Detail
ID.AM-02 Inventories of software, services, and systems managed by the organization are maintained. Add Detail
ID.AM-03 Representations of authorized network communication and data flows are maintained. Add Detail
ID.AM-04 Inventories of services provided by suppliers are maintained. Add Detail
ID.AM-05 Assets are prioritized based on classification, criticality, resources, and impact on the mission. Add Detail
ID.AM-07 Inventories of data and corresponding metadata for designated data types are maintained. Add Detail
ID.AM-08 Systems, hardware, software, services, and data are managed throughout their life cycles. Add Detail
Risk Assessment ID.RA
CID Subcategory Nature Type Frequency Opinion Risk Action
ID.RA-01 Vulnerabilities in assets are identified, validated, and recorded. Add Detail
ID.RA-02 Cyber threat intelligence is received from information sharing forums and sources. Add Detail
ID.RA-03 Internal and external threats to the organization are identified and recorded. Add Detail
ID.RA-04 Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded. Add Detail
ID.RA-05 Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization. Add Detail
ID.RA-06 Risk responses are chosen from the available options, prioritized, planned, tracked, and communicated. Add Detail
ID.RA-07 Changes and exceptions are managed, assessed for risk impact, recorded, and tracked. Add Detail
ID.RA-08 Processes for receiving, analyzing, and responding to vulnerability disclosures are established. Add Detail
ID.RA-09 The authenticity and integrity of hardware and software are assessed prior to acquisition and use. Add Detail
ID.RA-10 Critical suppliers are assessed prior to acquisition. Add Detail
Improvement ID.IM
CID Subcategory Nature Type Frequency Opinion Risk Action
ID.IM-01 Improvements are identified from continuous evaluation. Add Detail
ID.IM-02 Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties. Add Detail
ID.IM-03 Improvements are identified from execution of operational processes, procedures, and activities. Add Detail
ID.IM-04 Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved. Add Detail
Identity Management, Authentication, and Access Control PR.AA
CID Subcategory Nature Type Frequency Opinion Risk Action
PR.AA-01 Identities and credentials for authorized users, services, and hardware are managed by the organization. Add Detail
PR.AA-02 Identities are proofed and bound to credentials based on the context of interactions. Add Detail
PR.AA-03 Users, services, and hardware are authenticated. Add Detail
PR.AA-04 Identity assertions are protected, conveyed, and verified. Add Detail
PR.AA-05 Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties. Add Detail
PR.AA-06 Physical access to assets is managed, monitored, and enforced commensurate with risk. Add Detail
Awareness and Training PR.AT
CID Subcategory Nature Type Frequency Opinion Risk Action
PR.AT-01 Personnel are provided awareness and training so they possess the knowledge and skills to perform general tasks with security risks in mind. Add Detail
PR.AT-02 Individuals in specialized roles are provided awareness and training so they possess the knowledge and skills to perform relevant tasks with security risks in mind. Add Detail
Data Security PR.DS
CID Subcategory Nature Type Frequency Opinion Risk Action
PR.DS-01 The confidentiality, integrity, and availability of data-at-rest are protected. Add Detail
PR.DS-02 The confidentiality, integrity, and availability of data-in-transit are protected. Add Detail
PR.DS-10 The confidentiality, integrity, and availability of data-in-use are protected. Add Detail
PR.DS-11 Backups of data are created, protected, maintained, and tested. Add Detail
Platform Security PR.PS
CID Subcategory Nature Type Frequency Opinion Risk Action
PR.PS-01 Configuration management practices are established and applied. Add Detail
PR.PS-02 Software is maintained, replaced, and removed commensurate with risk. Add Detail
PR.PS-03 Hardware is maintained, replaced, and removed commensurate with risk. Add Detail
PR.PS-04 Log records are generated and made available for continuous monitoring. Add Detail
PR.PS-05 Installation and execution of unauthorized software are prevented. Add Detail
PR.PS-06 Secure software development practices are integrated, and their performance is monitored throughout the software development life cycle. Add Detail
Technology Infrastructure Resilience PR.IR
CID Subcategory Nature Type Frequency Opinion Risk Action
PR.IR-01 Networks and environments are protected from unauthorized logical access and usage. Add Detail
PR.IR-02 The organization's technology assets are protected from environmental threats. Add Detail
PR.IR-03 Mechanisms are implemented to achieve resilience requirements in normal and adverse situations. Add Detail
PR.IR-04 Adequate resource capacity to ensure availability is maintained. Add Detail
Continuous Monitoring DE.CM
CID Subcategory Nature Type Frequency Opinion Risk Action
DE.CM-01 Networks and network services are monitored to find potentially adverse events. Add Detail
DE.CM-02 The physical environment is monitored to find potentially adverse events. Add Detail
DE.CM-03 Personnel activity and technology usage are monitored to find potentially adverse events. Add Detail
DE.CM-06 External service provider activities and services are monitored to find potentially adverse events. Add Detail
DE.CM-09 Computing hardware, software, runtime environments, and their data are monitored to find potentially adverse events. Add Detail
Adverse Event Analysis DE.AE
CID Subcategory Nature Type Frequency Opinion Risk Action
DE.AE-02 Potentially adverse events are analyzed to better understand associated activities. Add Detail
DE.AE-03 Information is correlated from multiple sources. Add Detail
DE.AE-04 The estimated impact and scope of adverse events are understood. Add Detail
DE.AE-06 Information on adverse events is provided to authorized staff and tools. Add Detail
DE.AE-07 Cyber threat intelligence and contextual information are integrated into analysis. Add Detail
DE.AE-08 Incidents are declared when adverse events meet criteria. Add Detail
Incident Management RS.MA
CID Subcategory Nature Type Frequency Opinion Risk Action
RS.MA-01 The incident response plan is executed in coordination with relevant third parties once an incident is declared. Add Detail
RS.MA-02 Incident reports are triaged and validated. Add Detail
RS.MA-03 Incidents are categorized and prioritized. Add Detail
RS.MA-04 Incidents are escalated or elevated as needed. Add Detail
RS.MA-05 The criteria for initiating incident recovery are applied. Add Detail
Incident Analysis RS.AN
CID Subcategory Nature Type Frequency Opinion Risk Action
RS.AN-03 Analysis is performed to establish what has taken place during an incident and the root cause of the incident. Add Detail
RS.AN-06 Actions performed during an investigation are recorded, and the records' integrity and provenance are preserved. Add Detail
RS.AN-07 Incident data and metadata are collected, and their integrity and provenance are preserved. Add Detail
RS.AN-08 An incident's magnitude is estimated and validated. Add Detail
Incident Response Reporting and Communication RS.CO
CID Subcategory Nature Type Frequency Opinion Risk Action
RS.CO-02 Internal and external stakeholders are notified of incidents. Add Detail
RS.CO-03 Information is shared with designated internal and external stakeholders. Add Detail
Incident Mitigation RS.MI
CID Subcategory Nature Type Frequency Opinion Risk Action
RS.MI-01 Incidents are contained. Add Detail
RS.MI-02 Incidents are eradicated. Add Detail
Incident Recovery Plan Execution RC.RP
CID Subcategory Nature Type Frequency Opinion Risk Action
RC.RP-01 The recovery portion of the incident response plan is executed once initiated from the incident response process. Add Detail
RC.RP-02 Recovery actions are selected, scoped, prioritized, and performed. Add Detail
RC.RP-03 The integrity of backups and other restoration assets is verified before using them for restoration. Add Detail
RC.RP-04 Critical mission functions and cybersecurity risk management are considered to establish post-incident operational norms. Add Detail
RC.RP-05 The integrity of restored assets is verified, systems and services are restored, and normal operating status is confirmed. Add Detail
RC.RP-06 The end of incident recovery is declared based on criteria, and incident-related documentation is completed. Add Detail
Incident Recovery Communication RC.CO
CID Subcategory Nature Type Frequency Opinion Risk Action
RC.CO-03 Recovery activities and progress in restoring operational capabilities are communicated to designated internal and external stakeholders. Add Detail
RC.CO-04 Public updates on incident recovery are shared using approved methods and messaging. Add Detail