| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| GV.OC-01 | The organizational mission is understood and informs cybersecurity risk management. | Add Detail | |||||
| GV.OC-02 | Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered. | Add Detail | |||||
| GV.OC-03 | Legal, regulatory, and contractual requirements regarding cybersecurity – including privacy and civil liberties obligations – are understood and managed. | Add Detail | |||||
| GV.OC-04 | Critical objectives, capabilities, and services that stakeholders depend on or expect from the organization are understood and communicated. | Add Detail | |||||
| GV.OC-05 | Outcomes, capabilities, and services that the organization depends on are understood and communicated. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| GV.RM-01 | Risk management objectives are established and agreed to by organizational stakeholders. | Add Detail | |||||
| GV.RM-02 | Risk appetite and risk tolerance statements are established, communicated, and maintained. | Add Detail | |||||
| GV.RM-03 | Cybersecurity risk management activities and outcomes are included in enterprise risk management processes. | Add Detail | |||||
| GV.RM-04 | Strategic direction that describes appropriate risk response options is established and communicated. | Add Detail | |||||
| GV.RM-05 | Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties. | Add Detail | |||||
| GV.RM-06 | A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated. | Add Detail | |||||
| GV.RM-07 | Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| GV.RR-01 | Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving. | Add Detail | |||||
| GV.RR-02 | Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced. | Add Detail | |||||
| GV.RR-03 | Adequate resources are allocated commensurate with cybersecurity risk strategy, roles and responsibilities, and policies. | Add Detail | |||||
| GV.RR-04 | Cybersecurity is included in human resources practices. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| GV.PO-01 | Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced. | Add Detail | |||||
| GV.PO-02 | Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| GV.OV-01 | Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction. | Add Detail | |||||
| GV.OV-02 | The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks. | Add Detail | |||||
| GV.OV-03 | Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| GV.SC-01 | A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders. | Add Detail | |||||
| GV.SC-02 | Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally. | Add Detail | |||||
| GV.SC-03 | Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes. | Add Detail | |||||
| GV.SC-04 | Suppliers are known and prioritized by criticality. | Add Detail | |||||
| GV.SC-05 | Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and agreements. | Add Detail | |||||
| GV.SC-06 | Planning and due diligence are performed before entering supplier relationships. | Add Detail | |||||
| GV.SC-07 | Supplier risks are understood, recorded, prioritized, assessed, responded to, and monitored. | Add Detail | |||||
| GV.SC-08 | Suppliers are included in incident planning, response, and recovery activities. | Add Detail | |||||
| GV.SC-09 | Supply chain security practices are integrated into cybersecurity and enterprise risk management programs. | Add Detail | |||||
| GV.SC-10 | Supply chain risk management includes post-termination activities. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| ID.AM-01 | Inventories of hardware managed by the organization are maintained. | Add Detail | |||||
| ID.AM-02 | Inventories of software, services, and systems managed by the organization are maintained. | Add Detail | |||||
| ID.AM-03 | Representations of authorized network communication and data flows are maintained. | Add Detail | |||||
| ID.AM-04 | Inventories of services provided by suppliers are maintained. | Add Detail | |||||
| ID.AM-05 | Assets are prioritized based on classification, criticality, resources, and impact on the mission. | Add Detail | |||||
| ID.AM-07 | Inventories of data and corresponding metadata for designated data types are maintained. | Add Detail | |||||
| ID.AM-08 | Systems, hardware, software, services, and data are managed throughout their life cycles. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| ID.RA-01 | Vulnerabilities in assets are identified, validated, and recorded. | Add Detail | |||||
| ID.RA-02 | Cyber threat intelligence is received from information sharing forums and sources. | Add Detail | |||||
| ID.RA-03 | Internal and external threats to the organization are identified and recorded. | Add Detail | |||||
| ID.RA-04 | Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded. | Add Detail | |||||
| ID.RA-05 | Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization. | Add Detail | |||||
| ID.RA-06 | Risk responses are chosen from the available options, prioritized, planned, tracked, and communicated. | Add Detail | |||||
| ID.RA-07 | Changes and exceptions are managed, assessed for risk impact, recorded, and tracked. | Add Detail | |||||
| ID.RA-08 | Processes for receiving, analyzing, and responding to vulnerability disclosures are established. | Add Detail | |||||
| ID.RA-09 | The authenticity and integrity of hardware and software are assessed prior to acquisition and use. | Add Detail | |||||
| ID.RA-10 | Critical suppliers are assessed prior to acquisition. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| ID.IM-01 | Improvements are identified from continuous evaluation. | Add Detail | |||||
| ID.IM-02 | Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties. | Add Detail | |||||
| ID.IM-03 | Improvements are identified from execution of operational processes, procedures, and activities. | Add Detail | |||||
| ID.IM-04 | Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| PR.AA-01 | Identities and credentials for authorized users, services, and hardware are managed by the organization. | Add Detail | |||||
| PR.AA-02 | Identities are proofed and bound to credentials based on the context of interactions. | Add Detail | |||||
| PR.AA-03 | Users, services, and hardware are authenticated. | Add Detail | |||||
| PR.AA-04 | Identity assertions are protected, conveyed, and verified. | Add Detail | |||||
| PR.AA-05 | Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties. | Add Detail | |||||
| PR.AA-06 | Physical access to assets is managed, monitored, and enforced commensurate with risk. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| PR.AT-01 | Personnel are provided awareness and training so they possess the knowledge and skills to perform general tasks with security risks in mind. | Add Detail | |||||
| PR.AT-02 | Individuals in specialized roles are provided awareness and training so they possess the knowledge and skills to perform relevant tasks with security risks in mind. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| PR.DS-01 | The confidentiality, integrity, and availability of data-at-rest are protected. | Add Detail | |||||
| PR.DS-02 | The confidentiality, integrity, and availability of data-in-transit are protected. | Add Detail | |||||
| PR.DS-10 | The confidentiality, integrity, and availability of data-in-use are protected. | Add Detail | |||||
| PR.DS-11 | Backups of data are created, protected, maintained, and tested. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| PR.PS-01 | Configuration management practices are established and applied. | Add Detail | |||||
| PR.PS-02 | Software is maintained, replaced, and removed commensurate with risk. | Add Detail | |||||
| PR.PS-03 | Hardware is maintained, replaced, and removed commensurate with risk. | Add Detail | |||||
| PR.PS-04 | Log records are generated and made available for continuous monitoring. | Add Detail | |||||
| PR.PS-05 | Installation and execution of unauthorized software are prevented. | Add Detail | |||||
| PR.PS-06 | Secure software development practices are integrated, and their performance is monitored throughout the software development life cycle. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| PR.IR-01 | Networks and environments are protected from unauthorized logical access and usage. | Add Detail | |||||
| PR.IR-02 | The organization's technology assets are protected from environmental threats. | Add Detail | |||||
| PR.IR-03 | Mechanisms are implemented to achieve resilience requirements in normal and adverse situations. | Add Detail | |||||
| PR.IR-04 | Adequate resource capacity to ensure availability is maintained. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| DE.CM-01 | Networks and network services are monitored to find potentially adverse events. | Add Detail | |||||
| DE.CM-02 | The physical environment is monitored to find potentially adverse events. | Add Detail | |||||
| DE.CM-03 | Personnel activity and technology usage are monitored to find potentially adverse events. | Add Detail | |||||
| DE.CM-06 | External service provider activities and services are monitored to find potentially adverse events. | Add Detail | |||||
| DE.CM-09 | Computing hardware, software, runtime environments, and their data are monitored to find potentially adverse events. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| DE.AE-02 | Potentially adverse events are analyzed to better understand associated activities. | Add Detail | |||||
| DE.AE-03 | Information is correlated from multiple sources. | Add Detail | |||||
| DE.AE-04 | The estimated impact and scope of adverse events are understood. | Add Detail | |||||
| DE.AE-06 | Information on adverse events is provided to authorized staff and tools. | Add Detail | |||||
| DE.AE-07 | Cyber threat intelligence and contextual information are integrated into analysis. | Add Detail | |||||
| DE.AE-08 | Incidents are declared when adverse events meet criteria. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| RS.MA-01 | The incident response plan is executed in coordination with relevant third parties once an incident is declared. | Add Detail | |||||
| RS.MA-02 | Incident reports are triaged and validated. | Add Detail | |||||
| RS.MA-03 | Incidents are categorized and prioritized. | Add Detail | |||||
| RS.MA-04 | Incidents are escalated or elevated as needed. | Add Detail | |||||
| RS.MA-05 | The criteria for initiating incident recovery are applied. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| RS.AN-03 | Analysis is performed to establish what has taken place during an incident and the root cause of the incident. | Add Detail | |||||
| RS.AN-06 | Actions performed during an investigation are recorded, and the records' integrity and provenance are preserved. | Add Detail | |||||
| RS.AN-07 | Incident data and metadata are collected, and their integrity and provenance are preserved. | Add Detail | |||||
| RS.AN-08 | An incident's magnitude is estimated and validated. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| RS.CO-02 | Internal and external stakeholders are notified of incidents. | Add Detail | |||||
| RS.CO-03 | Information is shared with designated internal and external stakeholders. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| RS.MI-01 | Incidents are contained. | Add Detail | |||||
| RS.MI-02 | Incidents are eradicated. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| RC.RP-01 | The recovery portion of the incident response plan is executed once initiated from the incident response process. | Add Detail | |||||
| RC.RP-02 | Recovery actions are selected, scoped, prioritized, and performed. | Add Detail | |||||
| RC.RP-03 | The integrity of backups and other restoration assets is verified before using them for restoration. | Add Detail | |||||
| RC.RP-04 | Critical mission functions and cybersecurity risk management are considered to establish post-incident operational norms. | Add Detail | |||||
| RC.RP-05 | The integrity of restored assets is verified, systems and services are restored, and normal operating status is confirmed. | Add Detail | |||||
| RC.RP-06 | The end of incident recovery is declared based on criteria, and incident-related documentation is completed. | Add Detail |
| CID | Subcategory | Nature | Type | Frequency | Opinion | Risk | Action |
|---|---|---|---|---|---|---|---|
| RC.CO-03 | Recovery activities and progress in restoring operational capabilities are communicated to designated internal and external stakeholders. | Add Detail | |||||
| RC.CO-04 | Public updates on incident recovery are shared using approved methods and messaging. | Add Detail |
Are you sure you want to delete this tenant?
This will permanently delete ALL tenant data.
This action cannot be undone.