NIST Cybersecurity Framework to CISA Cybersecurity Performance Goals Mapping
62 topic areas are covered by both frameworks. Controls are matched by shared topic tags. A control may appear in multiple topics.
113
NIST Cybersecurity Framework controls
62
shared topics
37
CISA Cybersecurity Performance Goals controls
governance
25 controlsThe organizational mission is understood and informs cybersecurity risk management
Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered
Legal, regulatory, and contractual requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed
Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated
Outcomes, capabilities, and services that the organization depends on are understood and communicated
Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy
The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks
Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments
A cybersecurity risk management policy is established and enforced
The cybersecurity policy is reviewed and updated to reflect changes in requirements, threats, and technology
Risk management objectives are established and agreed to by organizational stakeholders
Risk appetite and risk tolerance statements are established, communicated, and maintained
Cybersecurity risk management activities and outcomes are included in enterprise risk management processes
Strategic direction that describes appropriate risk response options is established and communicated
Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties
A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated
Strategic opportunities (positive risks) are characterized and included in organizational cybersecurity risk discussions
Organizational leadership is responsible and accountable for cybersecurity risk
Cybersecurity roles, responsibilities, and authorities are established and enforced
Adequate resources are allocated to cybersecurity commensurate with risk
A cybersecurity supply chain risk management program is established
Cybersecurity roles and responsibilities for suppliers and partners are established and coordinated
Supply chain risk management is integrated into enterprise risk management processes
Changes and exceptions are managed, assessed for risk impact, and tracked
incident-response
17 controlsThe estimated impact and scope of adverse events are understood
Information on adverse events is provided to authorized staff and tools
Incidents are declared when adverse events meet the defined criteria
Cybersecurity roles and responsibilities for suppliers and partners are established and coordinated
Relevant suppliers are included in incident planning, response, and recovery activities
Incident response plans and cybersecurity plans are established, maintained, and improved
Recovery activities and progress in restoring operational capabilities are communicated to designated internal and external stakeholders
Public updates on the incident and ongoing recovery are shared using approved methods and messaging
The integrity of restored assets is verified, the asset is deemed secure, and normal operating status is confirmed
Forensics are performed
Execute the incident response plan in coordination with relevant third parties
Incidents are contained
Incidents are eradicated
supply-chain
16 controlsExternal service provider activities and services are monitored to detect potentially adverse events
A cybersecurity supply chain risk management program is established
Supply chain risk management plans include provisions for activities after a supplier relationship ends
Cybersecurity roles and responsibilities for suppliers and partners are established and coordinated
Supply chain risk management is integrated into enterprise risk management processes
Suppliers are known and prioritized by criticality
Cybersecurity requirements are integrated into contracts with suppliers
Due diligence is performed before entering into supplier relationships
Risks from suppliers are assessed, monitored, and responded to throughout the relationship
Relevant suppliers are included in incident planning, response, and recovery activities
Supply chain security practices are monitored throughout the technology product and service life cycle
Critical suppliers are assessed prior to acquisition
The authenticity and integrity of hardware and software are assessed prior to acquisition and use
siem
7 controlsInformation is correlated from multiple sources
Alert thresholds are established
Networks and network services are monitored to detect adverse events
Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events
Log records are generated and made available for continuous monitoring
monitoring
6 controlsNetworks and network services are monitored to detect adverse events
Monitoring for unauthorized personnel, connections, devices, and software is performed
Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events
Log records are generated and made available for continuous monitoring
third-party
6 controlsExternal service provider activities and services are monitored to detect potentially adverse events
Outcomes, capabilities, and services that the organization depends on are understood and communicated
Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties
Inventories of services provided by suppliers are maintained
detection
5 controlsInformation is correlated from multiple sources
Alert thresholds are established
Networks and network services are monitored to detect adverse events
Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events
escalation
5 controlsInformation on adverse events is provided to authorized staff and tools
Incidents are declared when adverse events meet the defined criteria
Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties
Escalate or elevate incidents as needed
edr
5 controlsremediation
5 controlslegal
5 controlsLegal, regulatory, and contractual requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed
Public updates on the incident and ongoing recovery are shared using approved methods and messaging
Actions performed during an investigation are recorded, and the records' integrity and provenance are preserved
Escalate or elevate incidents as needed
recovery
5 controlsExecute the recovery plan once the incident response process initiates recovery
The integrity of restored assets is verified, the asset is deemed secure, and normal operating status is confirmed
The end of incident recovery is declared based on criteria, and incident-related documentation is completed
forensics
5 controlsInvestigate contributing factors to confirmed incidents
Forensics are performed
Actions performed during an investigation are recorded, and the records' integrity and provenance are preserved
Incident data and metadata are collected, and their integrity and provenance are preserved
social-engineering
2 controlsPersonnel are provided with security awareness training to perform their work with cybersecurity risks in mind
Employees are trained to recognize and report phishing attempts