diff --git a/templates/standards/nist-csf/v2.0.0 b/templates/standards/nist-csf/v2.0.0 new file mode 100644 index 0000000..aade3ce --- /dev/null +++ b/templates/standards/nist-csf/v2.0.0 @@ -0,0 +1,1099 @@ +{ + "standard": "NIST CSF 2.0", + "version": "1.0", + "webLink": "https://www.nist.gov/cyberframework/framework", + "domains": [ + { + "title": "(GV.OC) Govern: Organzational Context", + "description": "The organization’s cybersecurity risk management strategy, expectations, and policy are established, communicated, and monitored.", + "controls": [ + { + "ref": "GV.OC-01", + "summary": "The organizational mission is understood and informs cybersecurity risk management.", + "mappedControls" : [ + ] + }, + { + "ref": "GV.OC-02", + "summary": "Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered.", + "mappedControls" : [ + ] + }, + { + "ref": "GV.OC-03", + "summary": "Legal, regulatory, and contractual requirements regarding cybersecurity — including privacy and civil liberties obligations — are understood and managed.", + "mappedControls" : [ + ] + }, + { + "ref": "GV.OC-04", + "summary": "Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated.", + "mappedControls" : [ + ] + }, + { + "ref": "GV.OC-05", + "summary": "Outcomes, capabilities, and services that the organization depends on are understood and communicated.", + "mappedControls" : [ + ] + } + ] + }, + { + "title": "(GV.RM) Govern: Risk Management Strategy", + "description": "The organization’s priorities, constraints, risk tolerance and appetite statements, and assumptions are established, communicated, and used to support operational risk decisions.", + "controls": [ + { + "ref": "GV.RM-01", + "summary": "Risk management objectives are established and agreed to by organizational stakeholders." + }, + { + "ref": "GV.RM-02", + "summary": "Risk appetite and risk tolerance statements are established, communicated, and maintained.", + "mappedControls" : [ + ] + }, + { + "ref": "GV.RM-03", + "summary": "Cybersecurity risk management activities and outcomes are included in enterprise risk management processes.", + "mappedControls" : [ + ] + }, + { + "ref": "GV.RM-04", + "summary": "Strategic direction that describes appropriate risk response options is established and communicated.", + "mappedControls" : [ + ] + }, + { + "ref": "GV.RM-05", + "summary": "Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties.", + "mappedControls" : [ + ] + }, + { + "ref": "GV.RM-06", + "summary": "A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated.", + "mappedControls" : [ + ] + }, + { + "ref": "GV.RM-07", + "summary": "Strategic opportunities (i.e., positive risks) are characterized and are included in organizational cybersecurity risk discussions.", + "mappedControls" : [ + ] + } + ] + }, + { + "title": "(GV.RR) Govern: Roles, Responsibilities, and Authorities", + "description": "Cybersecurity roles, responsibilities, and authorities to foster accountability, performance assessment, and continuous improvement are established and communicated.", + "controls": [ + { + "ref": "GV.RR-01", + "summary": "Organizational leadership is responsible and accountable for cybersecurity risk and fosters a culture that is risk-aware, ethical, and continually improving.", + "mappedControls" : [ + ] + }, + { + "ref": "GV.RR-02", + "summary": "Roles, responsibilities, and authorities related to cybersecurity risk management are established, communicated, understood, and enforced.", + "mappedControls" : [ + ] + }, + { + "ref": "GV.RR-03", + "summary": "Adequate resources are allocated commensurate with the cybersecurity risk strategy, roles, responsibilities, and policies.", + "mappedControls" : [ + ] + }, + { + "ref": "GV.RR-04", + "summary": "Cybersecurity is included in human resources practices.", + "mappedControls" : [ + ] + } + ] + }, + { + "title": "(GV.PO) Govern: Policy", + "description": "The organization understands the cybersecurity risk to organizational operations (including mission, functions, image, or reputation), organizational assets, and individuals.", + "controls": [ + { + "ref": "GV.PO-01", + "summary": "Policy for managing cybersecurity risks is established based on organizational context, cybersecurity strategy, and priorities and is communicated and enforced.", + "mappedControls" : [ + "cp-risk-assess", + "cp-risk-registry" + ] + }, + { + "ref": "GV.PO-02", + "summary": "Policy for managing cybersecurity risks is reviewed, updated, communicated, and enforced to reflect changes in requirements, threats, technology, and organizational mission.", + "mappedControls" : [ + ] + } + ] + }, + { + "title": "(GV.OV) Govern: Oversight", + "description": "Results of organization-wide cybersecurity risk management activities and performance are used to inform, improve, and adjust the risk management strategy.", + "controls": [ + { + "ref": "GV.OV-01", + "summary": "Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy and direction.", + "mappedControls" : [ + "cp-risk-mgmt" + ] + }, + { + "ref": "GV.OV-02", + "summary": "The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks.", + "mappedControls" : [ + "cp-risk-mgmt-objectives" + ] + }, + { + "ref": "GV.OV-03:", + "summary": "Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments needed.", + "mappedControls" : [ + "cp-risk-mgmt-objectives" + ] + } + ] + }, + { + "title": "(GV.SC) Govern: Cybersecurity Supply Chain Risk Management", + "description": "Cyber supply chain risk management processes are identified, established, managed, monitored, and improved by organizational stakeholders.", + "controls": [ + { + "ref": "GV.SC-01", + "summary": "A cybersecurity supply chain risk management program, strategy, objectives, policies, and processes are established and agreed to by organizational stakeholders." + }, + { + "ref": "GV.SC-02", + "summary": "Cybersecurity roles and responsibilities for suppliers, customers, and partners are established, communicated, and coordinated internally and externally." + }, + { + "ref": "GV.SC-03", + "summary": "Cybersecurity supply chain risk management is integrated into cybersecurity and enterprise risk management, risk assessment, and improvement processes." + }, + { + "ref": "GV.SC-04", + "summary": "Suppliers are known and prioritized by criticality." + }, + { + "ref": "GV.SC-05", + "summary": "Requirements to address cybersecurity risks in supply chains are established, prioritized, and integrated into contracts and other types of agreements with suppliers and other relevant third parties." + }, + { + "ref": "GV.SC-06", + "summary": "Planning and due diligence are performed to reduce risks before entering into formal supplier or other third-party relationships." + }, + { + "ref": "GV.SC-07", + "summary": "The risks posed by a supplier, their products and services, and other third parties are understood, recorded, prioritized, assessed, responded to, and monitored over the course of the relationship." + }, + { + "ref": "GV.SC-08", + "summary": "Relevant suppliers and other third parties are included in incident planning, response, and recovery activities." + }, + { + "ref": "GV.SC-09", + "summary": "Supply chain security practices are integrated into cybersecurity and enterprise risk management programs, and their performance is monitored throughout the technology product and service life cycle." + }, + { + "ref": "GV.SC-10", + "summary": "Cybersecurity supply chain risk management plans include provisions for activities that occur after the conclusion of a partnership or service agreement." + } + ] + }, + { + "title": "(ID.AM) Identify: Asset Management", + "description": "Assets (e.g., data, hardware, software, systems, facilities, services, people) that enable the organization to achieve business purposes are identified and managed consistent with their relative importance to organizational objectives and the organization’s risk strategy.", + "controls": [ + { + "ref": "ID.AM-01", + "summary": "Inventories of hardware managed by the organization are maintained.", + "mappedControls" : [ + "cp-asset-physical" + ] + }, + { + "ref": "ID.AM-02", + "summary": "Inventories of software, services, and systems managed by the organization are maintained.", + "mappedControls" : [ + "cp-asset-digital" + ] + }, + { + "ref": "ID.AM-03", + "summary": "Representations of the organization’s authorized network communication and internal and external network data flows are maintained.", + "mappedControls" : [ + "cp-data-lifecycle" + ] + }, + { + "ref": "ID.AM-04", + "summary": "Inventories of services provided by suppliers are maintained.", + "mappedControls" : [ + ] + }, + { + "ref": "ID.AM-05", + "summary": "Assets are prioritized based on classification, criticality, resources, and impact on the mission.", + "mappedControls" : [ + "cp-asset-physical", + "cp-asset-digital", + "cp-data-classification", + "cp-data-lifecycle" + ] + }, + { + "ref": "ID.AM-06", + "summary": "Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established.", + "mappedControls" : [ + "cp-role-assignment", + "cp-breach-customer", + "cp-vendor-vtr" + ] + }, + { + "ref": "ID.AM-07", + "summary": "Inventories of data and corresponding metadata for designated data types are maintained." + }, + { + "ref": "ID.AM-08", + "summary": "Systems, hardware, software, services, and data are managed throughout their life cycles." + } + ] + }, + { + "title": "(ID.RA) Identify: Risk Assessment", + "description": "The cybersecurity risk to the organization, assets, and individuals is understood by the organization.", + "controls": [ + { + "ref": "ID.RA-01", + "summary": "Vulnerabilities in assets are identified, validated, and recorded.", + "mappedControls" : [ + "cp-risk-assess", + "cp-risk-registry" + ] + }, + { + "ref": "ID.RA-02:", + "summary": "Cyber threat intelligence is received from information sharing forums and sources.", + "mappedControls" : [ + "cp-threat-intel" + ] + }, + { + "ref": "ID.RA-03", + "summary": "Internal and external threats to the organization are identified and recorded.", + "mappedControls" : [ + "cp-risk-assess", + "cp-risk-registry" + ] + }, + { + "ref": "ID.RA-04", + "summary": "Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded.", + "mappedControls" : [ + "cp-risk-assess", + "cp-bcdr", + "cp-risk-mgmt-objectives" + ] + }, + { + "ref": "ID.RA-05", + "summary": "Threats, vulnerabilities, likelihoods, and impacts are used to understand inherent risk and inform risk response prioritization.", + "mappedControls" : [ + "cp-risk-mgmt", + "cp-risk-mgmt-objectives" + ] + }, + { + "ref": "ID.RA-06", + "summary": "Risk responses are chosen, prioritized, planned, tracked, and communicated.", + "mappedControls" : [ + "cp-risk-mgmt", + "cp-risk-assess", + "cp-risk-mitigation", + "cp-risk-registry" + ] + }, + { + "ref": "ID.RA-07", + "summary": "Changes and exceptions are managed, assessed for risk impact, recorded, and tracked.", + "mappedControls" : [ + "cp-role-assignment" + ] + }, + { + "ref": "ID.RA-08", + "summary": "Processes for receiving, analyzing, and responding to vulnerability disclosures are established.", + "mappedControls" : [ + "cp-role-assignment" + ] + }, + { + "ref": "ID.RA-09", + "summary": "The authenticity and integrity of hardware and software are assessed prior to acquisition and use.", + "mappedControls" : [ + "cp-role-assignment" + ] + }, + { + "ref": "ID.RA-10", + "summary": "Critical suppliers are assessed prior to acquisition.", + "mappedControls" : [ + "cp-role-assignment" + ] + } + ] + }, + { + "title": "(ID.IM)Identify: Improvement", + "description": "Improvements to organizational cybersecurity risk management processes, procedures and activities are identified across all CSF Functions.", + "controls": [ + { + "ref": "ID.IM-01", + "summary": "Improvements are identified from evaluations.", + "mappedControls" : [ + ] + }, + { + "ref": "ID.IM-02", + "summary": "Improvements are identified from security tests and exercises, including those done in coordination with suppliers and relevant third parties.", + "mappedControls" : [ + ] + }, + { + "ref": "ID.IM-03", + "summary": "Improvements are identified from execution of operational processes, procedures, and activities.", + "mappedControls" : [ + ] + }, + { + "ref": "ID.IM-04", + "summary": "Incident response plans and other cybersecurity plans that affect operations are established, communicated, maintained, and improved.", + "mappedControls" : [ + ] + } + ] + }, + { + "title": "(PR.AA) Protect: Identity Management, Authentication, and Access Control", + "description": "Access to physical and logical assets is limited to authorized users, services, and hardware and managed commensurate with the assessed risk of unauthorized access.", + "controls": [ + { + "ref": "PR.AA-01", + "summary": "Identities and credentials for authorized users, services, and hardware are managed by the organization.", + "mappedControls" : [ + ] + }, + { + "ref": "PR.AA-02", + "summary": "Identities are proofed and bound to credentials based on the context of interactions.", + "mappedControls" : [ + ] + }, + { + "ref": "PR.AA-03", + "summary": "Users, services, and hardware are authenticated.", + "mappedControls" : [ + ] + }, + { + "ref": "PR.AA-04", + "summary": "Identity assertions are protected, conveyed, and verified.", + "mappedControls" : [ + ] + }, + { + "ref": "PR.AA-05", + "summary": "Access permissions, entitlements, and authorizations are defined in a policy, managed, enforced, and reviewed, and incorporate the principles of least privilege and separation of duties.", + "mappedControls" : [ + ] + }, + { + "ref": "PR.AA-06", + "summary": "Physical access to assets is managed, monitored, and enforced commensurate with risk.", + "mappedControls" : [ + ] + } + ] + }, + { + "title": "(PR.AT) Protect: Awareness and Training", + "description": "The organization’s personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks.", + "controls": [ + { + "ref": "PR.AT-01:", + "summary": "Personnel are provided with awareness and training so that they possess the knowledge and skills to perform general tasks with cybersecurity risks in mind.", + "mappedControls" : [ + "cp-training-policy", + "cp-training-awareness" + ] + }, + { + "ref": "PR.AT-02", + "summary": "Individuals in specialized roles are provided with awareness and training so that they possess the knowledge and skills to perform relevant tasks with cybersecurity risks in mind.", + "mappedControls" : [ + "cp-role-assignment", + "cp-training-policy", + "cp-training-awareness", + "cp-access-privileged" + ] + } + ] + }, + { + "title": "(PR.DS) Protect: Data Security", + "description": "Data are managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and availability of information.", + "controls": [ + { + "ref": "PR.DS-01", + "summary": "The confidentiality, integrity, and availability of data-at-rest are protected.", + "mappedControls" : [ + "cp-data-protection-at-rest" + ] + }, + { + "ref": "PR.DS-02", + "summary": "The confidentiality, integrity, and availability of data-in-transit are protected.", + "mappedControls" : [ + "cp-data-protection-in-transit" + ] + }, + { + "ref": "PR.DS-03", + "summary": "Assets are formally managed throughout removal, transfers, and disposition.", + "mappedControls" : [ + "cp-asset-physical", + "cp-asset-digital" + ] + }, + { + "ref": "PR.DS-04", + "summary": "Adequate capacity to ensure availability is maintained.", + "mappedControls" : [ + "cp-data-backup", + "cp-bcdr-recovery", + "cp-bcdr-app", + "cp-bcdr-data" + ] + }, + { + "ref": "PR.DS-05", + "summary": "Protections against data leaks are implemented.", + "mappedControls" : [ + "cp-data-protection-at-rest", + "cp-data-protection-in-transit", + "cp-data-protection-in-use", + "cp-data-protection-integrity", + "cp-sdlc-scm", + "cp-sdlc-appsec-req", + "cp-sdlc-design", + "cp-sdlc-foss", + "cp-sdlc-sast", + "cp-sdlc-dast", + "cp-sdlc-pentest", + "cp-vuln-scan" + ] + }, + { + "ref": "PR.DS-06", + "summary": "Integrity checking mechanisms are used to verify software, firmware, and information integrity.", + "mappedControls" : [ + "cp-audit-trails-integrity", + "cp-data-protection-integrity" + ] + }, + { + "ref": "PR.DS-07", + "summary": "The development and testing environment(s) are separate from the production environment.", + "mappedControls" : [ + "cp-sdlc-dev", + "cp-ccm-prodcm" + ] + }, + { + "ref": "PR.DS-08", + "summary": "Integrity checking mechanisms are used to verify hardware integrity" + }, + { + "ref": "PR.DS-10", + "summary": "The principle of least functionality is incorporated by configuring systems to provide only essential capabilities.", + "mappedControls" : [ + "cp-data-protection-in-use" + ] + }, + { + "ref": "PR.DS-11", + "summary": "Backups of data are created, protected, maintained, and tested.", + "mappedControls" : [ + "cp-data-backup", + "cp-bcdr-recovery" + ] + } + ] + }, + { + "title": "(PR.PS) Protect: Platform Security", + "description": "The hardware, software (e.g., firmware, operating systems, applications), and services of physical and virtual platforms are managed consistent with the organization’s risk strategy to protect their confidentiality, integrity, and availability.", + "controls": [ + { + "ref": "PR.PS-01", + "summary": "Configuration management practices are established and applied.", + "mappedControls" : [ + ] + }, + { + "ref": "PR.PS-02", + "summary": "Software is maintained, replaced, and removed commensurate with risk.", + "mappedControls" : [ + ] + }, + { + "ref": "PR.PS-03:", + "summary": "Hardware is maintained, replaced, and removed commensurate with risk.", + "mappedControls" : [ + ] + }, + { + "ref": "PR.PS-04", + "summary": "Log records are generated and made available for continuous monitoring.", + "mappedControls" : [ + ] + }, + { + "ref": "PR.PS-05", + "summary": "Installation and execution of unauthorized software are prevented." + }, + { + "ref": "PR.PS-06", + "summary": "Secure software development practices are integrated, and their performance is monitored throughout the software development life cycle.", + "mappedControls" : [ + "cp-sdlc-monitor" + ] + } + ] + }, + { + "title": "(PR.IR) Protect: Technology Infrastructure Resilience", + "description": "Security architectures are managed with the organization’s risk strategy to protect asset confidentiality, integrity, and availability, and organizational resilience.", + "controls": [ + { + "ref": "PR.IR-01", + "summary": "Networks and environments are protected from unauthorized logical access and usage.", + "mappedControls" : [ + ] + }, + { + "ref": "PR.IR-02", + "summary": "The organization’s technology assets are protected from environmental threat.", + "mappedControls" : [ + ] + }, + { + "ref": "PR.IR-03", + "summary": "Mechanisms are implemented to achieve resilience requirements in normal and adverse situations.", + "mappedControls" : [ + ] + }, + { + "ref": "PR.IR-04", + "summary": "Adequate resource capacity to ensure availability is maintained.", + "mappedControls" : [ + ] + } + ] + }, + { + "title": "(DE.CM) Detect: Security Continuous Monitoring", + "description": "Assets are monitored to find anomalies, indicators of compromise, and other potentially adverse events.", + "controls": + [ + { + "ref": "DE.CM-01", + "summary": "Networks and network services are monitored to find potentially adverse events.", + "mappedControls" : [ + "cp-threat-firewall", + "cp-threat-nids", + "cp-threat-webapp" + ] + }, + { + "ref": "DE.CM-02", + "summary": "The physical environment is monitored to find potentially adverse events.", + "mappedControls" : [ + "cp-physical", + "cp-physical-datacenter" + ] + }, + { + "ref": "DE.CM-03", + "summary": "Personnel activity and technology usage are monitored to find potentially adverse events.", + "mappedControls" : [ + "cp-access-privileged", + "cp-access-review", + "cp-access-endpoints", + "cp-ccm-provision-endpoint", + "cp-threat-hids", + "cp-threat-malware", + "cp-threat-siem" + ] + }, + { + "ref": "DE.CM-04", + "summary": "Malicious code is detected.", + "mappedControls" : [ + "cp-access-endpoints", + "cp-sdlc-sast", + "cp-sdlc-dast", + "cp-ccm-provision-endpoint", + "cp-ccm-provision-server", + "cp-threat-malware", + "cp-threat-webapp" + ] + }, + { + "ref": "DE.CM-05", + "summary": "Unauthorized mobile code is detected.", + "mappedControls" : [ + "cp-access-endpoints", + "cp-ccm-provision-endpoint", + "cp-ccm-provision-server", + "cp-threat-malware", + "cp-mdm-usb", + "cp-mdm-byod" + ] + }, + { + "ref": "DE.CM-06", + "summary": "External service provider activities and services are monitored to find potentially adverse events.", + "mappedControls" : [ + "cp-vendor-monitor" + ] + }, + { + "ref": "DE.CM-07", + "summary": "Monitoring for unauthorized personnel, connections, devices, and software is performed.", + "mappedControls" : [ + "cp-threat-hids", + "cp-threat-nids", + "cp-threat-webapp" + ] + }, + { + "ref": "DE.CM-08", + "summary": "Vulnerability scans are performed.", + "mappedControls" : [ + "cp-vuln-scan" + ] + }, + { + "ref": "DE.CM-09", + "summary": "Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events.", + "mappedControls" : [ + "cp-vuln-scan" + ] + } + ] + }, + { + "title": "(DE.AE) Detect: Anomalies and Events", + "description": "Anomalous activity is detected in a timely manner and the potential impact of events is understood.", + "controls": + [ + { + "ref": "DE.AE-01", + "summary": "A baseline of network operations and expected data flows for users and systems is established and managed.", + "mappedControls" : [ + "cp-sdlc-monitor" + ] + }, + { + "ref": "DE.AE-02", + "summary": "Potentially adverse events are analyzed to better understand associated activities.", + "mappedControls" : [ + "cp-threat-intel", + "cp-ir-process", + "cp-ir-records" + ] + }, + { + "ref": "DE.AE-03", + "summary": "Event data are aggregated and correlated from multiple sources and sensors.", + "mappedControls" : [ + "cp-threat-firewall", + "cp-threat-hids", + "cp-threat-nids", + "cp-threat-malware", + "cp-threat-intel", + "cp-threat-siem" + ] + }, + { + "ref": "DE.AE-04", + "summary": "The estimated impact and scope of adverse events are understood.", + "mappedControls" : [ + "cp-ir-process" + ] + }, + { + "ref": "DE.AE-05", + "summary": "Incident alert thresholds are established.", + "mappedControls" : [ + "cp-ir-process", + "cp-ir-playbook" + ] + }, + { + "ref": "DE.AE-06", + "summary": "Information on adverse events is provided to authorized staff and tools.", + "mappedControls" : [ + ] + }, + { + "ref": "DE.AE-07", + "summary": "Cyber threat intelligence and other contextual information are integrated into the analysis.", + "mappedControls" : [ + ] + }, + { + "ref": "DE.AE-08", + "summary": "Incidents are declared when adverse events meet the defined incident criteria.", + "mappedControls" : [ + ] + } + ] + }, + { + "title": "(RS.MA) Respond: Incident Management", + "description": "Responses to detected cybersecurity incidents are managed.", + "controls": + [ + { + "ref": "RS.MA-01", + "summary": "The incident response plan is executed in coordination with relevant third parties once an incident is declared.", + "mappedControls" : [ + "cp-bcdr-recovery", + "cp-ir-process", + "cp-breach-investigate" + ] + }, + { + "ref": "RS.MA-02", + "summary": "Incident reports are triaged and validated.", + "mappedControls" : [ + "cp-ir-process" + ] + }, + { + "ref": "RS.MA-03", + "summary": "Incidents are categorized and prioritized.", + "mappedControls" : [ + "cp-ir-process" + ] + }, + { + "ref": "RS.MA-04", + "summary": "Incidents are escalated or elevated as needed.", + "mappedControls" : [ + "cp-breach-investigate" + ] + }, + { + "ref": "RS.MA-05", + "summary": "The criteria for initiating incident recovery are applied.", + "mappedControls" : [ + "cp-ir-process", + "cp-breach-investigate" + ] + } + ] + }, + { + "title": "(RS.AN) Respond: Analysis", + "description": "Analysis is conducted to ensure adequate response and support recovery activities.", + "controls": + [ + { + "ref": "RS.AN-01", + "summary": "Notifications from detection systems are investigated.", + "mappedControls" : [ + "cp-threat-hids", + "cp-threat-nids", + "cp-threat-intel", + "cp-threat-siem", + "cp-ir-playbook" + ] + }, + { + "ref": "RS.AN-02", + "summary": "The impact of the incident is understood.", + "mappedControls" : [ + "cp-ir-process", + "cp-ir-playbook" + ] + }, + { + "ref": "RS.AN-03", + "summary": "Analysis is performed to establish what has taken place during an incident and the root cause of the incident.", + "mappedControls" : [ + "cp-ir-process", + "cp-ir-playbook" + ] + }, + { + "ref": "RS.AN-04", + "summary": "Incidents are categorized consistent with response plans.", + "mappedControls" : [ + "cp-ir-playbook" + ] + }, + { + "ref": "RS.AN-05", + "summary": "Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)" + }, + { + "ref": "RS.AN-06", + "summary": "Actions performed during an investigation are recorded, and the records’ integrity and provenance are preserved.", + "mappedControls" : [ + "cp-ir-playbook" + ] + }, + { + "ref": "RS.AN-07", + "summary": "Incident data and metadata are collected, and their integrity and provenance are preserved.", + "mappedControls" : [ + "cp-ir-playbook" + ] + }, + { + "ref": "RS.AN-08", + "summary": "An incident’s magnitude is estimated and validated.", + "mappedControls" : [ + "cp-ir-playbook" + ] + } + ] + }, + { + "title": "(RS.CO) Respond: Communications", + "description": "Response activities are coordinated with internal and external stakeholders, as appropriate, to include external support from law enforcement agencies.", + "controls": + [ + { + "ref": "RS.CO-01", + "summary": "Personnel know their roles and order of operations when a response is needed.", + "mappedControls" : [ + "cp-bcdr", + "cp-ir-sirt" + ] + }, + { + "ref": "RS.CO-02", + "summary": "Internal and external stakeholders are notified of incidents.", + "mappedControls" : [ + "cp-ir-process", + "cp-breach-investigate" + ] + }, + { + "ref": "RS.CO-03", + "summary": "Information is shared with designated internal and external stakeholders.", + "mappedControls" : [ + "cp-bcdr-recovery", + "cp-ir-process", + "cp-breach-investigate" + ] + }, + { + "ref": "RS.CO-04", + "summary": "Coordination with stakeholders occurs consistent with response plans.", + "mappedControls" : [ + "cp-bcdr", + "cp-ir-sirt", + "cp-breach-authorities", + "cp-breach-customer" + ] + }, + { + "ref": "RS.CO-05", + "summary": "Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness.", + "mappedControls" : [ + "cp-breach-authorities", + "cp-breach-letter" + ] + } + ] + }, + { + "title": "(RS.MI) Respond: Incident Mitigation", + "description": "Activities are performed to prevent expansion of an event and mitigate its effects.", + "controls": + [ + { + "ref": "RS.MI-01", + "summary": "Incidents are contained.", + "mappedControls" : [ + "cp-ir-process", + "cp-ir-playbook" + ] + }, + { + "ref": "RS.MI-02", + "summary": "Incidents are eradicated.", + "mappedControls" : [ + "cp-ir-process", + "cp-ir-playbook" + ] + }, + { + "ref": "RS.MI-03", + "summary": "Newly identified vulnerabilities are mitigated or documented as accepted risks.", + "mappedControls" : [ + "cp-vuln-scan", + "cp-vuln-remediation" + ] + } + ] + }, + { + "title": "[RS.IM] Respond: Improvements", + "description": "Organizational response activities are improved by incorporating lessons learned from current and previous detection/response activities.", + "controls": + [ + { + "ref": "RS.IM-1", + "summary": "Response plans incorporate lessons learned.", + "mappedControls" : [ + "cp-ir-tabletop", + "cp-ir-records" + ] + }, + { + "ref": "RS.IM-2", + "summary": "Response strategies are updated." + } + ] + }, + { + "title": "(RC.RP) Recover: Recovery Plan and Execution", + "description": "Restoration activities are performed to ensure operational availability of systems and services affected by cybersecurity incidents.", + "controls": + [ + { + "ref": "RC.RP-01", + "summary": "The recovery portion of the incident response plan is executed once initiated from the incident response process.", + "mappedControls" : [ + "cp-data-backup", + "cp-bcdr-recovery", + "cp-bcdr-site", + "cp-bcdr-app", + "cp-bcdr-data" + ] + }, + { + "ref": "RC.RP-02", + "summary": "Recovery actions are selected, scoped, prioritized, and performed.", + "mappedControls" : [ + "cp-data-backup", + "cp-bcdr-recovery", + "cp-bcdr-site", + "cp-bcdr-app", + "cp-bcdr-data" + ] + }, + { + "ref": "RC.RP-03", + "summary": "The integrity of backups and other restoration assets is verified before using them for restoration.", + "mappedControls" : [ + "cp-data-backup", + "cp-bcdr-recovery", + "cp-bcdr-site", + "cp-bcdr-app", + "cp-bcdr-data" + ] + }, + { + "ref": "RC.RP-04", + "summary": "Critical mission functions and cybersecurity risk management are considered to establish post-incident operational norms.", + "mappedControls" : [ + "cp-data-backup", + "cp-bcdr-recovery", + "cp-bcdr-site", + "cp-bcdr-app", + "cp-bcdr-data" + ] + }, + { + "ref": "RC.RP-05", + "summary": "The integrity of restored assets is verified, systems and services are restored, and normal operating status is confirmed", + "mappedControls" : [ + "cp-data-backup", + "cp-bcdr-recovery", + "cp-bcdr-site", + "cp-bcdr-app", + "cp-bcdr-data" + ] + }, + { + "ref": "RC.RP-06", + "summary": "The end of incident recovery is declared based on criteria, and incidentrelated documentation is completed.", + "mappedControls" : [ + "cp-data-backup", + "cp-bcdr-recovery", + "cp-bcdr-site", + "cp-bcdr-app", + "cp-bcdr-data" + ] + } + ] + }, + { + "title": "(RC.CO) Recover: Incident Recovery Communication", + "description": "Restoration activities are coordinated with internal and external parties, such as coordinating centers, Internet Service Providers, owners of attacking systems, victims, other CSIRTs, and vendors.", + "controls": + [ + { + "ref": "RC.CO-01", + "summary": "Public relations are managed.", + "mappedControls" : [ + "cp-breach-investigate", + "cp-breach-authorities", + "cp-breach-letter" + ] + }, + { + "ref": "RC.CO-02", + "summary": "Reputation after an event is repaired.", + "mappedControls" : [ + "cp-breach-investigate", + "cp-breach-authorities", + "cp-breach-letter" + ] + }, + { + "ref": "RC.CO-03", + "summary": "Recovery activities and progress in restoring operational capabilities are communicated to designated internal and external stakeholders.", + "mappedControls" : [ + "cp-bcdr", + "cp-ir-sirt", + "cp-ir-process", + "cp-breach-investigate" + ] + }, + { + "ref": "RC.CO-04", + "summary": "Public updates on incident recovery are shared using approved methods and messaging.", + "mappedControls" : [ + ] + } + ] + } + ] +}