NIST Cybersecurity Framework to CISA Cybersecurity Performance Goals Mapping

62 topic areas are covered by both frameworks. Controls are matched by shared topic tags. A control may appear in multiple topics.

113

NIST Cybersecurity Framework controls

62

shared topics

37

CISA Cybersecurity Performance Goals controls

NIST Cybersecurity Framework
CISA Cybersecurity Performance Goals

governance

25 controls
gv-oc-1

The organizational mission is understood and informs cybersecurity risk management

gv-oc-2

Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered

gv-oc-3

Legal, regulatory, and contractual requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed

gv-oc-4

Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated

gv-oc-5

Outcomes, capabilities, and services that the organization depends on are understood and communicated

gv-ov-1

Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy

gv-ov-2

The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks

gv-ov-3

Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments

gv-po-1

A cybersecurity risk management policy is established and enforced

gv-po-2

The cybersecurity policy is reviewed and updated to reflect changes in requirements, threats, and technology

gv-rm-1

Risk management objectives are established and agreed to by organizational stakeholders

gv-rm-2

Risk appetite and risk tolerance statements are established, communicated, and maintained

gv-rm-3

Cybersecurity risk management activities and outcomes are included in enterprise risk management processes

gv-rm-4

Strategic direction that describes appropriate risk response options is established and communicated

gv-rm-5

Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties

gv-rm-6

A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated

gv-rm-7

Strategic opportunities (positive risks) are characterized and included in organizational cybersecurity risk discussions

gv-rr-1

Organizational leadership is responsible and accountable for cybersecurity risk

gv-rr-2

Cybersecurity roles, responsibilities, and authorities are established and enforced

gv-rr-3

Adequate resources are allocated to cybersecurity commensurate with risk

gv-sc-1

A cybersecurity supply chain risk management program is established

gv-sc-2

Cybersecurity roles and responsibilities for suppliers and partners are established and coordinated

gv-sc-3

Supply chain risk management is integrated into enterprise risk management processes

id-ra-7

Changes and exceptions are managed, assessed for risk impact, and tracked

supply-chain

16 controls

siem

7 controls

monitoring

6 controls

third-party

6 controls

detection

5 controls

escalation

5 controls

edr

5 controls

remediation

5 controls

recovery

5 controls

forensics

5 controls

tabletop

4 controls

logging

4 controls

patching

4 controls

ir-plan

4 controls

mfa

4 controls

authentication

4 controls

encryption

4 controls

insider-threat

3 controls

cve

3 controls

policy

3 controls

offboarding

3 controls

mdm

3 controls

sbom

3 controls

cisa

3 controls

phishing

3 controls

documentation

3 controls

baseline

2 controls

alerting

2 controls

dlp

2 controls

malware

2 controls

sla

2 controls

roles

2 controls

contracts

2 controls

red-team

2 controls

passwords

2 controls

training

2 controls

data-at-rest

2 controls

kms

2 controls

tls

2 controls

backups

2 controls

firewall

2 controls

zero-trust

2 controls

vpc

2 controls

log-management

2 controls