CIS Controls v7.1 Mapping To NIST CSF
CIS Controls v7.1 Mapping To NIST CSF
CIS Controls v7.1 Mapping To NIST CSF
Contact Information
CIS
31 Tech Valley Drive
East Greenbush, NY 12061
518.266.3460
[email protected]
License for Use
This work is licensed under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 International Public
https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode
To further clarify the Creative Commons license related to the CIS ControlsTM content, you are authorized to copy a
organization and outside of your organization for non-commercial purposes only, provided that (i) appropriate credit
you remix, transform or build upon the CIS Controls, you may not distribute the modified materials. Users of the CIS
(http://www.cisecurity.org/controls/) when referring to the CIS Controls in order to ensure that users are employing th
subject to the prior approval of CIS® (Center for Internet Security, Inc.).
atives 4.0 International Public License (the link can be found at
you are authorized to copy and redistribute the content as a framework for use by you, within your
ed that (i) appropriate credit is given to CIS, and (ii) a link to the license is provided. Additionally, if
d materials. Users of the CIS Controls framework are also required to refer to
e that users are employing the most up-to-date guidance. Commercial use of the CIS Controls is
CIS CIS Sub- Security
Asset Type Title
Control Control Function
Perform Authenticated
3 3.2 Applications Detect
Vulnerability Scanning
Protect Dedicated Assessment
3 3.3 Users Protect
Accounts
Deploy Automated Operating
3 3.4 Applications Protect
System Patch Management Tools
Deploy Automated Software Patch
3 3.5 Applications Protect
Management Tools
Compare Back-to-back
3 3.6 Applications Respond
Vulnerability Scans
Implement Automated
5 5.5 Applications Detect
Configuration Monitoring Systems
Subscribe to URL-Categorization
7 7.5 Network Protect
Service
7 7.6 Network Detect Log all URL requester
8 Malware Defenses
12 Boundary Defense
13 Data Protection
Maintain an Inventory of
15 15.1 Network Identify
Authorized Wireless Access Points
Maintain an Inventory of
16 16.1 Users Identify
Authentication Systems
Configure Centralized Point of
16 16.2 Users Protect
Authentication
Require Multi-Factor
16 16.3 Users Protect
Authentication
Devise Organization-wide
19 19.4 N/A N/A
Standards for Reporting Incidents
of Hardware Assets
tory, track, and correct) all hardware devices on the network so that only authorized devices are
uthorized and unmanaged devices are found and prevented from gaining access.
Utilize an active discovery tool to identify devices connected to the organization's network and
update the hardware asset inventory.
Utilize a passive discovery tool to identify devices connected to the organization's network and
automatically update the organization's hardware asset inventory.
Use Dynamic Host Configuration Protocol (DHCP) logging on all DHCP servers or IP address
management tools to update the organization's hardware asset inventory.
Maintain an accurate and up-to-date inventory of all technology assets with the potential to
store or process information. This inventory shall include all hardware assets, whether
connected to the organization's network or not.
Ensure that the hardware asset inventory records the network address, hardware address,
machine name, data asset owner, and department for each asset and whether the hardware
asset has been approved to connect to the network.
Ensure that unauthorized assets are either removed from the network, quarantined or the
inventory is updated in a timely manner.
Utilize port level access control, following 802.1x standards, to control which devices can
authenticate to the network. The authentication system shall be tied into the hardware asset
inventory data to ensure only authorized devices can connect to the network.
Use client certificates to authenticate hardware assets connecting to the organization's trusted
network.
of Software Assets
tory, track, and correct) all software on the network so that only authorized software is installed
hat unauthorized and unmanaged software is found and prevented from installation or execution.
Maintain an up-to-date list of all authorized software that is required in the enterprise for any
business purpose on any business system.
Ensure that only software applications or operating systems currently supported by the
software's vendor are added to the organization's authorized software inventory. Unsupported
software should be tagged as unsupported in the inventory system.
Utilize software inventory tools throughout the organization to automate the documentation of
all software on business systems.
The software inventory system should track the name, version, publisher, and install date for all
software, including operating systems authorized by the organization.
The software inventory system should be tied into the hardware asset inventory so all devices
and associated software are tracked from a single location.
Ensure that unauthorized software is either removed or the inventory is updated in a timely
manner
Utilize application whitelisting technology on all assets to ensure that only authorized software
executes and all unauthorized software is blocked from executing on assets.
The organization's application whitelisting software must ensure that only authorized software
libraries (such as *.dll, *.ocx, *.so, etc.) are allowed to load into a system process.
The organization's application whitelisting software must ensure that only authorized, digitally
signed scripts (such as *.ps1,
*.py, macros, etc.) are allowed to run on a system.
Physically or logically segregated systems should be used to isolate and run software that is
required for business operations but incur higher risk for the organization.
ty Management
assess, and take action on new information in order to identify vulnerabilities, remediate, and
f opportunity for attackers.
nistrative Privileges
Use multi-factor authentication and encrypted channels for all administrative account access.
Ensure administrators use a dedicated machine for all administrative tasks or tasks requiring
administrative access. This machine will be segmented from the organization's primary network
and not be allowed Internet access. This machine will not be used for reading e-mail,
composing documents, or browsing the Internet.
Limit access to scripting tools (such as Microsoft PowerShell and Python) to only administrative
or development users with the need to access those capabilities.
Configure systems to issue a log entry and alert when an account is added to or removed from
any group assigned administrative privileges.
Configure systems to issue a log entry and alert on unsuccessful logins to an administrative
account.
nd actively manage (track, report on, correct) the security configuration of mobile devices,
orkstations using a rigorous configuration management and change control process in order to
exploiting vulnerable services and settings.
Maintain documented, standard security configuration standards for all authorized operating
systems and software.
Maintain secure images or templates for all systems in the enterprise based on the
organization's approved configuration standards. Any new system deployment or existing
system that becomes compromised should be imaged using one of those images or templates.
Store the master images and templates on securely configured servers, validated with integrity
monitoring tools, to ensure that only authorized changes to the images are possible.
Deploy system configuration management tools that will automatically enforce and redeploy
configuration settings to systems at regularly scheduled intervals.
Utilize a Security Content Automation Protocol (SCAP) compliant configuration monitoring
system to verify all security configuration elements, catalog approved exceptions, and alert
when unauthorized changes occur.
Use at least three synchronized time sources from which all servers and network devices
retrieve time information on a regular basis so that timestamps in logs are consistent.
Ensure that local logging has been enabled on all systems and networking devices.
Enable system logging to include detailed information such as a event source, date, user,
timestamp, source addresses, destination addresses, and other useful elements.
Ensure that all systems that store logs have adequate storage space for the logs generated.
Ensure that appropriate logs are being aggregated to a central log management system for
analysis and review.
Deploy Security Information and Event Management (SIEM) or log analytic tool for log
correlation and analysis.
On a regular basis, tune your SIEM system to better identify actionable events and decrease
event noise.
r Protections
face and the opportunities for attackers to manipulate human behavior though their interaction
email systems.
Ensure that only fully supported web browsers and email clients are allowed to execute in the
organization, ideally only using the latest version of the browsers and email clients provided by
the vendor.
Uninstall or disable any unauthorized browser or email client plugins or add-on applications.
Ensure that only authorized scripting languages are able to run in all web browsers and email
clients.
Enforce network-based URL filters that limit a system's ability to connect to websites not
approved by the organization. This filtering shall be enforced for each of the organization's
systems, whether they are physically at an organization's facilities or not.
Subscribe to URL categorization services to ensure that they are up-to-date with the most
recent website category definitions available. Uncategorized sites shall be blocked by default.
Log all URL requests from each of the organization's systems, whether on-site or a mobile
device, in order to identify potentially malicious activity and assist incident handlers with
identifying potentially compromised systems.
Use DNS filtering services to help block access to known malicious domains.
To lower the chance of spoofed or modified emails from valid domains, implement Domain-
based Message Authentication, Reporting and Conformance (DMARC) policy and verification,
starting by implementing the Sender Policy Framework (SPF) and the Domain Keys Identified
Mail(DKIM) standards.
Block all e-mail attachments entering the organization's email gateway if the file types are
unnecessary for the organization's business.
Use sandboxing to analyze and block inbound email attachments with malicious behavior.
, spread, and execution of malicious code at multiple points in the enterprise, while optimizing the
nable rapid updating of defense, data gathering, and corrective action.
Utilize centrally managed anti-malware software to continuously monitor and defend each of
the organization's workstations and servers.
Ensure that the organization's anti-malware software updates its scanning engine and
signature database on a regular basis.
Enable anti-exploitation features such as Data Execution Prevention (DEP) or Address Space
Layout Randomization (ASLR) that are available in an operating system or deploy appropriate
toolkits that can be configured to apply protection to a broader set of applications and
executables.
Send all malware detection events to enterprise anti-malware administration tools and event
log servers for analysis and alerting.
Enable Domain Name System (DNS) query logging to detect hostname lookups for known
malicious domains.
Enable command-line audit logging for command shells, such as Microsoft PowerShell and
Bash.
Associate active ports, services and protocols to the hardware assets in the asset inventory.
Ensure that only network ports, protocols, and services listening on a system with validated
business needs are running on each system.
Perform automated port scans on a regular basis against all systems and alert if unauthorized
ports are detected on a system.
Apply host-based firewalls or port filtering tools on end systems, with a default-deny rule that
drops all traffic except those services and ports that are explicitly allowed.
Place application firewalls in front of any critical servers to verify and validate the traffic going
to the server. Any unauthorized traffic should be blocked and logged.
ls used to properly back up critical information with a proven methodology for timely recovery of
Ensure that all of the organization's key systems are backed up as a complete system, through
processes such as imaging, to enable the quick recovery of an entire system.
Test data integrity on backup media on a regular basis by performing a data restoration
process to ensure that the backup is properly working.
Ensure that backups are properly protected via physical security or encryption when they are
stored, as well as when they are moved across the network. This includes remote backups and
cloud services.
Ensure that all backups have at least one backup destination that is not continuously
addressable through operating system calls.
nd actively manage (track, report on, correct) the security configuration of network infrastructure
us configuration management and change control process in order to prevent attackers from
ervices and settings.
Maintain standard, documented security configuration standards for all authorized network
devices.
All configuration rules that allow traffic to flow through network devices should be documented
in a configuration management system with a specific business reason for each rule, a specific
individual’s name responsible for that business need, and an expected duration of the need.
Compare all network device configuration against approved security configurations defined for
each network device in use and alert when any deviations are discovered.
Install the latest stable version of any security-related updates on all network devices.
Manage all network devices using multi-factor authentication and encrypted sessions.
Ensure network engineers use a dedicated machine for all administrative tasks or tasks
requiring elevated access. This machine shall be segmented from the organization's primary
network and not be allowed Internet access. This machine shall not be used for reading e-mail,
composing documents, or surfing the Internet.
Manage the network infrastructure across network connections that are separated from the
business use of that network, relying on separate VLANs or, preferably, on entirely different
physical connectivity for management sessions for network devices.
the flow of information transferring networks of different trust levels with a focus on security-
Perform regular scans from outside each trusted network boundary to detect any unauthorized
connections which are accessible across the boundary.
Deny communications with known malicious or unused Internet IP addresses and limit access
only to trusted and necessary IP address ranges at each of the organization's network
boundaries,.
Deny communication over unauthorized TCP or UDP ports or application traffic to ensure that
only authorized protocols are allowed to cross the network boundary in or out of the network at
each of the organization's network boundaries.
Configure monitoring systems to record network packets passing through the boundary at each
of the organization's network boundaries.
Deploy network-based Intrusion Detection Systems (IDS) sensors to look for unusual attack
mechanisms and detect compromise of these systems at each of the organization's network
boundaries.
Deploy network-based Intrusion Prevention Systems (IPS) to block malicious network traffic at
each of the organization's network boundaries.
Enable the collection of NetFlow and logging data on all network boundary devices.
Ensure that all network traffic to or from the Internet passes through an authenticated
application layer proxy that is configured to filter unauthorized connections.
Decrypt all encrypted network traffic at the boundary proxy prior to analyzing the content.
However, the organization may use whitelists of allowed sites that can be accessed through
the proxy without decrypting the traffic.
Require all remote login access to the organization's network to encrypt data in transit and use
multi-factor authentication.
Scan all enterprise devices remotely logging into the organization's network prior to accessing
the network to ensure that each of the organization's security policies has been enforced in the
same manner as local network devices.
ls used to prevent data exfiltration, mitigate the effects of exfiltrated data, and ensure the privacy
ve information.
Maintain an inventory of all sensitive information stored, processed, or transmitted by the
organization's technology systems, including those located on-site or at a remote service
provider.
Remove sensitive data or systems not regularly accessed by the organization from the
network. These systems shall only be used as stand alone systems (disconnected from the
network) by the business unit needing to occasionally use the system or completely virtualized
and powered off until needed.
Deploy an automated tool on network perimeters that monitors for unauthorized transfer of
sensitive information and blocks such transfers while alerting information security
professionals.
Only allow access to authorized cloud storage or email providers.
Monitor all traffic leaving the organization and detect any unauthorized use of encryption.
Utilize approved whole disk encryption software to encrypt the hard drive of all mobile devices.
If USB storage devices are required, enterprise software should be used that can configure
systems to allow the use of specific devices. An inventory of such devices should be
maintained.
Configure systems not to write data to external removable media, if there is no business need
for supporting such devices.
If USB storage devices are required, all data stored on such devices must be encrypted while
at rest.
ed on the Need to Know
Utilize an active discovery tool to identify all sensitive information stored, processed, or
transmitted by the organization's technology systems, including those located on-site or at a
remote service provider, and update the organization's sensitive information inventory.
Protect all information stored on systems with file system, network share, claims, application,
or database specific access control lists. These controls will enforce the principle that only
authorized individuals should have access to the information based on their need to access the
information as a part of their responsibilities.
Use an automated tool, such as host-based Data Loss Prevention, to enforce access controls
to data even when data is copied off a system.
Encrypt all sensitive information at rest using a tool that requires a secondary authentication
mechanism not integrated into the operating system, in order to access the information.
Enforce detailed audit logging for access to sensitive data or changes to sensitive data
(utilizing tools such as File Integrity Monitoring or Security Information and Event Monitoring).
ls used to track/control/prevent/correct the security use of wireless local area networks (WLANs),
eless client systems.
Maintain an inventory of authorized wireless access points connected to the wired network.
Configure network vulnerability scanning tools to detect and alert on unauthorized wireless
access points connected to the wired network.
Use a wireless intrusion detection system (WIDS) to detect and alert on unauthorized wireless
access points connected to the network.
Disable wireless access on devices that do not have a business purpose for wireless access.
Configure wireless access on client machines that do have an essential wireless business
purpose, to allow access only to authorized wireless networks and to restrict access to other
wireless networks.
Leverage the Advanced Encryption Standard (AES) to encrypt wireless data in transit.
Ensure that wireless networks use authentication protocols such as Extensible Authentication
Protocol-Transport Layer Security (EAP/TLS), which requires mutual, multi-factor
authentication.
Disable wireless peripheral access of devices (such as Bluetooth and NFC), unless such
access is required for a business purpose.
Create a separate wireless network for personal or untrusted devices. Enterprise access from
this network should be treated as untrusted and filtered and audited accordingly.
d Control
e cycle of system and application accounts - their creation, use, dormancy, deletion - in order to
for attackers to leverage them.
Require multi-factor authentication for all user accounts, on all systems, whether managed on-
site or by a third-party provider.
Ensure that all account usernames and authentication credentials are transmitted across
networks using encrypted channels.
Establish and follow an automated process for revoking system access by disabling accounts
immediately upon termination or change of responsibilities of an employee or contractor .
Disabling these accounts, instead of deleting accounts, allows preservation of audit trails.
Disable any account that cannot be associated with a business process or business owner.
Ensure that all accounts have an expiration date that is monitored and enforced.
Alert when users deviate from normal login behavior, such as time-of-day, workstation location
and duration.
in the organization (prioritizing those mission-critical to the business and its security), identify the
lls and abilities needed to support defense of the enterprise; develop and execute an integrated
gaps, and remediate through policy, organizational planning, training, and awareness programs.
Perform a skills gap analysis to understand the skills and behaviors workforce members are
not adhering to, using this information to build a baseline education roadmap.
Deliver training to address the skills gap identified to positively impact workforce members'
security behavior.
Create a security awareness program for all workforce members to complete on a regular
basis to ensure they understand and exhibit the necessary behaviors and skills to help ensure
the security of the organization. The organization's security awareness program should be
communicated in a continuous and engaging manner.
Ensure that the organization's security awareness program is updated frequently (at least
annually) to address new technologies, threats, standards and business requirements.
Train workforce members on the importance of enabling and utilizing secure authentication.
Train the workforce on how to identify different forms of social engineering attacks, such as
phishing, phone scams and impersonation calls.
Train workforce on how to identify and properly store, transfer, archive and destroy sensitive
information.
Train workforce members to be aware of causes for unintentional data exposures, such as
losing their mobile devices or emailing the wrong person due to autocomplete in email.
Train employees to be able to identify the most common indicators of an incident and be able
to report such an incident.
ecurity
e cycle of all in-house developed and acquired software in order to prevent, detect, and correct
Establish secure coding practices appropriate to the programming language and development
environment being used.
For in-house developed software, ensure that explicit error checking is performed and
documented for all input, including for size, data type, and acceptable ranges or formats.
Verify that the version of all software acquired from outside your organization is still supported
by the developer or appropriately hardened based on developer security recommendations.
Only use up-to-date and trusted third-party components for the software developed by the
organization.
Ensure that all software development personnel receive training in writing secure code for their
specific development environment and responsibilities.
Apply static and dynamic analysis tools to verify that secure coding practices are being
adhered to for internally developed software.
Protect web applications by deploying web application firewalls (WAFs) that inspect all traffic
flowing to the web application for common web application attacks. For applications that are
not web-based, specific application firewalls should be deployed if such tools are available for
the given application type. If the traffic is encrypted, the device should either sit behind the
encryption or be capable of decrypting the traffic prior to analysis. If neither option is
appropriate, a host-based web application firewall should be deployed.
For applications that rely on a database, use standard hardening configuration templates. All
systems that are part of critical business processes should also be tested.
Management
n's information, as well as its reputation, by developing and implementing an incident response
ns, defined roles, training, communications, management oversight) for quickly discovering an
ely containing the damage, eradicating the attacker's presence, and restoring the integrity of the
Ensure that there are written incident response plans that define roles of personnel as well as
phases of incident handling/management.
Assign job titles and duties for handling computer and network incidents to specific individuals
and ensure tracking and documentation throughout the incident through resolution.
Designate management personnel, as well as backups, who will support the incident handling
process by acting in key decision-making roles.
Devise organization-wide standards for the time required for system administrators and other
workforce members to report anomalous events to the incident handling team, the
mechanisms for such reporting, and the kind of information that should be included in the
incident notification.
Assemble and maintain information on third-party contact information to be used to report a
security incident, such as Law Enforcement, relevant government departments, vendors, and
ISAC partners.
Publish information for all workforce members, regarding reporting computer anomalies and
incidents to the incident handling team. Such information should be included in routine
employee awareness activities.
Plan and conduct routine incident, response exercises and scenarios for the workforce
involved in the incident response to maintain awareness and comfort in responding to real
world threats. Exercises should test communication channels, decision making, and incident
responders technical capabilities using tools and data available to them.
Create incident scoring and prioritization schema based on known or potential impact to your
organization. Utilize score to define frequency of status updates and escalation procedures.
h of an organization's defense (the technology, the processes, and the people) by simulating the
of an attacker.
Establish a program for penetration tests that includes a full scope of blended attacks, such as
wireless, client-based, and web application attacks.
Conduct regular external and internal penetration tests to identify vulnerabilities and attack
vectors that can be used to exploit enterprise systems successfully.
Perform periodic Red Team exercises to test organizational readiness to identify and stop
attacks or to respond quickly and effectively.
Include tests for the presence of unprotected system information and artifacts that would be
useful to attackers, including network diagrams, configuration files, older penetration test
reports, e-mails or documents containing passwords or other information critical to system
operation.
Create a test bed that mimics a production environment for specific penetration tests and Red
Team attacks against elements that are not typically tested in production, such as attacks
against supervisory control and data acquisition and other control systems.
Use vulnerability scanning and penetration testing tools in concert. The results of vulnerability
scanning assessments should be used as a starting point to guide and focus penetration
testing efforts.
Wherever possible, ensure that Red Team results are documented using open, machine-
readable standards (e.g., SCAP). Devise a scoring method for determining the results of Red
Team exercises so that results can be compared over time.
Any user or system accounts used to perform penetration testing should be controlled and
monitored to make sure they are only being used for legitimate purposes, and are removed or
restored to normal function after testing is over.
NIST CSF
DE.CM-7
DE.CM-7
DE.CM-7
ID.AM-1
PR.DS-3
PR.DS-3
PR.DS-3
PR.AC-1
PR.AC-6
ID.AM-2
ID.AM-2
DE.CM-7
ID.AM-2
ID.AM-1
ID.AM-2
DE.CM-7
PR.DS-6
DE.CM-7
PR.DS-6
DE.CM-7
PR.DS-6
DE.CM-7
ID.RA-1
DE.CM-8
DE.CM-8
RS.MI-3
ID.RA-5
PR.IP-12
PR.AC-1
PR.AC-1
PR.AC-4
PR.AC-7
PR.PT-3
DE.CM-7
DE.CM-7
PR.IP-1
PR.IP-1
PR.IP-1
DE.CM-8
PR.PT-1
DE.AE-3
PR.PT-1
PR.DS-4
PR.PT-1
DE.AE-3
DE.AE-3
DE.AE-3
PR.PT-1
RS.AN-1
DE.AE-2
DE.AE-5
PR.IP-1
PR.IP-1
PR.IP-1
DE.CM-7
DE.CM-7
DE.AE-3
DE.CM-1
DE.CM-7
PR.IP-1
DE.CM-7
DE.CM-4
DE.CM-4
DE.CM-4
PR.IP-1
DE.CM-4
PR.PT-2
DE.AE-3
DE.AE-3
DE.CM-1
DE.AE-3
PR.IP-1
DE.CM-8
PR.IP-1
PR.IP-1
PR.IP-4
PR.IP-4
PR.DS-6
PR.IP-4
PR.DS-1
PR.DS-1
PR.PT-5
PR.IP-1
ID.AM-3
PR.IP-3
DE.CM-8
PR.IP-1
PR.AC-7
PR.AC-5
PR.AC-5
ID.AM-4
ID.AM-4
DE.CM-7
PR.IP-1
PR.IP-1
DE.CM-1
DE.CM-1
DE.CM-1
DE.CM-1
DE.CM-1
DE.CM-7
DE.CM-1
DE.CM-7
PR.AC-3
PR.MA-2
PR.AC-3
ID.AM-5
PR.DS-3
PR.DS-5
PR.DS-5
DE.CM-7
PR.DS-1
PR.PT-2
PR.PT-2
PR.PT-2
PR.AC-5
PR.AC-5
PR.AC-5
PR.DS-2
PR.AC-4
PR.DS-5
PR.DS-1
PR.DS-6
ID.AM-3
DE.AE-1
DE.CM-7
DE.CM-1
PR.IP-1
PR.IP-1
PR.IP-1
PR.DS-2
PR.AC-7
PR.IP-1
PR.AC-5
PR.AC-1
PR.AC-7
PR.AC-1
PR.DS-2
PR.AC-1
PR.AC-1
PR.IP-11
PR.AC-1
PR.AC-1
PR.AC-1
PR.IP-1
DE.CM-3
DE.CM-3
PR.AT-5
PR.AT-4
PR.AT-3
PR.AT-2
PR.AT-1
PR.AT-1
ID.AM-6
PR.AT-1
PR.AT-1
PR.AT-1
PR.AT-1
PR.AT-1
PR.DS-1
PR.DS-2
RS.AN-5
PR.DS-7
PR.IP-1
PR.IP-9
PR.IP-9
ID.GV-2
RS.CO-1
DE.DP-1
PR.IP-9
DE.DP-1
RS.CO-2
ID.SC-5
DE.DP-4
RS.CO-4
PR.IP-10
RS.AN-4
PR.AC-1
Subcategory Name
Identities and credentials are issued, managed, verified, revoked, and audited for authorized
devices, users and processes
Access permissions and authorizations are managed, incorporating the principles of least
privilege and separation of duties
Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor)
commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and
other organizational risks)
Event data are collected and correlated from multiple sources and sensors
Event data are collected and correlated from multiple sources and sensors
Audit/log records are determined, documented, implemented, and reviewed in accordance
with policy
Notifications from detection systems are investigated
Detected events are analyzed to understand attack targets and methods
Event data are collected and correlated from multiple sources and sensors
Event data are collected and correlated from multiple sources and sensors
Event data are collected and correlated from multiple sources and sensors
A baseline configuration of information technology/industrial control systems is created and
maintained incorporating security principles (e.g. concept of least functionality)
Data-at-rest is protected
Data-at-rest is protected
Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience
requirements in normal and adverse situations
Users, devices, and other assets are authenticated (e.g., single-factor, multifactor)
commensurate with the risk of the risks) transaction (e.g., individuals’ security and privacy
risks and other organizational
Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based
on their classification, criticality, and business value
Data-at-rest is protected
Data-in-transit is protected
Access permissions and authorizations are managed, incorporating the principles of least
privilege and separation of duties
Data-at-rest is protected
Integrity checking mechanisms are used to verify software, firmware, and information integrity
Data-in-transit is protected
Users, devices, and other assets are authenticated (e.g., single-factor, multifactor)
commensurate with the risk of the transaction (e.g., individuals’ security and
privacy risks and other organizational risks)
Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor)
commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and
other organizational risks)
Identities and credentials are issued, managed, verified, revoked, and audited for authorized
devices, users and processes
Data-in-transit is protected
Identities and credentials are issued, managed, verified, revoked, and audited for authorized
devices, users and processes
Identities and credentials are issued, managed, verified, revoked, and audited for authorized
devices, users and processes
Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel
screening)
Identities and credentials are issued, managed, verified, revoked, and audited for authorized
devices, users and processes
Identities and credentials are issued, managed, verified, revoked, and audited for authorized
devices, users and processes
Identities and credentials are issued, managed, verified, revoked, and audited for authorized
devices, users and processes
A baseline configuration of information technology/industrial control systems is created and
maintained incorporating security principles (e.g. concept of least functionality)
Data-at-rest is protected
Data-in-transit is protected
Processes are established to receive, analyze and respond to vulnerabilities disclosed to the
organization from internal and external sources (e.g. internal testing, security bulletins, or
security researchers)
The development and testing environment(s) are separate from the production environment
Response and recovery planning and testing are conducted with suppliers and third-party
providers
Event detection information is communicated
Coordination with stakeholders occurs consistent with response plans