AuditRubric
Frameworks

NIST Cybersecurity Framework

Version 2.0

The NIST Cybersecurity Framework 2.0 provides guidance for organizations to manage and reduce cybersecurity risk. It is organized around six core functions (Govern, Identify, Protect, Detect, Respond, and Recover) that apply to any organization regardless of size, sector, or maturity.

Public domain, published by the U.S. National Institute of Standards and Technology
Govern

Establish and monitor the organization's cybersecurity risk management strategy, expectations, and policy.

gv-oc-1 high

The organizational mission is understood and informs cybersecurity risk management

Organizational Context

gv-oc-2 high

Internal and external stakeholders are understood, and their needs and expectations regarding cybersecurity risk management are understood and considered

Organizational Context

gv-oc-3 critical

Legal, regulatory, and contractual requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed

Organizational Context

gv-oc-4 high

Critical objectives, capabilities, and services that external stakeholders depend on or expect from the organization are understood and communicated

Organizational Context

gv-oc-5 high

Outcomes, capabilities, and services that the organization depends on are understood and communicated

Organizational Context

gv-ov-1 high

Cybersecurity risk management strategy outcomes are reviewed to inform and adjust strategy

Oversight

gv-ov-2 high

The cybersecurity risk management strategy is reviewed and adjusted to ensure coverage of organizational requirements and risks

Oversight

gv-ov-3 medium

Organizational cybersecurity risk management performance is evaluated and reviewed for adjustments

Oversight

gv-po-1 critical

A cybersecurity risk management policy is established and enforced

Policy

gv-po-2 high

The cybersecurity policy is reviewed and updated to reflect changes in requirements, threats, and technology

Policy

gv-rm-1 critical

Risk management objectives are established and agreed to by organizational stakeholders

Risk Management Strategy

gv-rm-2 critical

Risk appetite and risk tolerance statements are established, communicated, and maintained

Risk Management Strategy

gv-rm-3 high

Cybersecurity risk management activities and outcomes are included in enterprise risk management processes

Risk Management Strategy

gv-rm-4 high

Strategic direction that describes appropriate risk response options is established and communicated

Risk Management Strategy

gv-rm-5 high

Lines of communication across the organization are established for cybersecurity risks, including risks from suppliers and other third parties

Risk Management Strategy

gv-rm-6 high

A standardized method for calculating, documenting, categorizing, and prioritizing cybersecurity risks is established and communicated

Risk Management Strategy

gv-rm-7 low

Strategic opportunities (positive risks) are characterized and included in organizational cybersecurity risk discussions

Risk Management Strategy

gv-rr-1 critical

Organizational leadership is responsible and accountable for cybersecurity risk

Roles, Responsibilities, and Authorities

gv-rr-2 critical

Cybersecurity roles, responsibilities, and authorities are established and enforced

Roles, Responsibilities, and Authorities

gv-rr-3 high

Adequate resources are allocated to cybersecurity commensurate with risk

Roles, Responsibilities, and Authorities

gv-rr-4 high

Cybersecurity is included in human resources practices

Roles, Responsibilities, and Authorities

gv-sc-1 high

A cybersecurity supply chain risk management program is established

Cybersecurity Supply Chain Risk Management

gv-sc-10 medium

Supply chain risk management plans include provisions for activities after a supplier relationship ends

Cybersecurity Supply Chain Risk Management

gv-sc-2 high

Cybersecurity roles and responsibilities for suppliers and partners are established and coordinated

Cybersecurity Supply Chain Risk Management

gv-sc-3 high

Supply chain risk management is integrated into enterprise risk management processes

Cybersecurity Supply Chain Risk Management

gv-sc-4 high

Suppliers are known and prioritized by criticality

Cybersecurity Supply Chain Risk Management

gv-sc-5 high

Cybersecurity requirements are integrated into contracts with suppliers

Cybersecurity Supply Chain Risk Management

gv-sc-6 high

Due diligence is performed before entering into supplier relationships

Cybersecurity Supply Chain Risk Management

gv-sc-7 high

Risks from suppliers are assessed, monitored, and responded to throughout the relationship

Cybersecurity Supply Chain Risk Management

gv-sc-8 medium

Relevant suppliers are included in incident planning, response, and recovery activities

Cybersecurity Supply Chain Risk Management

gv-sc-9 medium

Supply chain security practices are monitored throughout the technology product and service life cycle

Cybersecurity Supply Chain Risk Management

Identify

Understand the organization's assets, suppliers, and related cybersecurity risks.

id-am-1 critical

Inventories of hardware assets are maintained

Asset Management

id-am-2 high

Inventories of software assets are maintained

Asset Management

id-am-3 high

Authorized network communication and data flow representations are maintained

Asset Management

id-am-4 high

Inventories of services provided by suppliers are maintained

Asset Management

id-am-5 high

Assets are prioritized based on classification, criticality, and mission impact

Asset Management

id-am-7 high

Inventories of data and corresponding metadata for designated data types are maintained

Asset Management

id-am-8 high

Systems, hardware, software, services, and data are managed throughout their life cycles

Asset Management

id-im-1 medium

Improvements are identified from evaluations

Improvement

id-im-2 medium

Improvements are identified from security tests and exercises

Improvement

id-im-3 medium

Improvements are identified from execution of operational processes and activities

Improvement

id-im-4 critical

Incident response plans and cybersecurity plans are established, maintained, and improved

Improvement

id-ra-1 critical

Vulnerabilities in assets are identified, validated, and recorded

Risk Assessment

id-ra-10 high

Critical suppliers are assessed prior to acquisition

Risk Assessment

id-ra-2 medium

Cyber threat intelligence is received from information sharing forums and sources

Risk Assessment

id-ra-3 high

Internal and external threats to the organization are identified and recorded

Risk Assessment

id-ra-4 high

Potential impacts and likelihoods of threats exploiting vulnerabilities are identified and recorded

Risk Assessment

id-ra-5 high

Risk information is used to understand inherent risk and prioritize responses

Risk Assessment

id-ra-6 high

Risk responses are chosen, prioritized, planned, tracked, and communicated

Risk Assessment

id-ra-7 medium

Changes and exceptions are managed, assessed for risk impact, and tracked

Risk Assessment

id-ra-8 high

Processes for receiving, analyzing, and responding to vulnerability disclosures are established

Risk Assessment

id-ra-9 high

The authenticity and integrity of hardware and software are assessed prior to acquisition and use

Risk Assessment

Protect

Use safeguards to prevent or reduce cybersecurity risks.

pr-aa-1 critical

Identities and credentials are managed for authorized users and devices

Identity Management, Authentication, and Access Control

pr-aa-2 critical

Identities are proofed and bound to credentials based on the context of interactions

Identity Management, Authentication, and Access Control

pr-aa-3 critical

Users, services, and hardware are authenticated

Identity Management, Authentication, and Access Control

pr-aa-4 high

Identity assertions are protected, conveyed, and verified

Identity Management, Authentication, and Access Control

pr-aa-5 critical

Access permissions are defined in policy, enforced, and reviewed using least privilege and separation of duties

Identity Management, Authentication, and Access Control

pr-aa-6 medium

Physical access to assets is managed, monitored, and enforced commensurate with risk

Identity Management, Authentication, and Access Control

pr-at-1 high

Personnel are provided with security awareness training to perform their work with cybersecurity risks in mind

Awareness and Training

pr-at-2 high

Individuals in specialized roles receive role-specific cybersecurity training

Awareness and Training

pr-ds-1 critical

The confidentiality, integrity, and availability of data-at-rest are protected

Data Security

pr-ds-2 critical

The confidentiality, integrity, and availability of data-in-transit are protected

Data Security

pr-ds-3 medium

Data are destroyed according to policy when no longer needed

Data Security

pr-ds-4 critical

Backups of data are created, protected, maintained, and tested

Data Security

pr-ir-1 critical

Networks and environments are protected from unauthorized logical access

Technology Infrastructure Resilience

pr-ir-2 medium

Technology assets are protected from environmental threats

Technology Infrastructure Resilience

pr-ir-3 high

Mechanisms are implemented to achieve resilience requirements in normal and adverse situations

Technology Infrastructure Resilience

pr-ir-4 high

Adequate resource capacity to ensure availability is maintained

Technology Infrastructure Resilience

pr-ps-1 high

The hardware and firmware of platforms are managed

Platform Security

pr-ps-2 critical

The software of platforms is managed, including operating systems and applications

Platform Security

pr-ps-3 medium

Data are destroyed according to policy when platforms or storage media are decommissioned

Platform Security

pr-ps-4 high

Log records are generated and made available for continuous monitoring

Platform Security

pr-ps-5 high

Installation and execution of unauthorized software are prevented

Platform Security

pr-ps-6 high

Secure software development practices are integrated and their security is evaluated

Platform Security

Detect

Find and analyze possible cybersecurity attacks and compromises.

de-ae-1 high

A baseline of network operations and expected data flows is established and managed

Adverse Event Analysis

de-ae-2 high

Potentially adverse events are analyzed to better understand associated activities

Adverse Event Analysis

de-ae-3 high

Information is correlated from multiple sources

Adverse Event Analysis

de-ae-4 high

The estimated impact and scope of adverse events are understood

Adverse Event Analysis

de-ae-5 medium

Alert thresholds are established

Adverse Event Analysis

de-ae-6 high

Information on adverse events is provided to authorized staff and tools

Adverse Event Analysis

de-ae-7 high

Cyber threat intelligence and other contextual information are integrated into the analysis

Adverse Event Analysis

de-ae-8 high

Incidents are declared when adverse events meet the defined criteria

Adverse Event Analysis

de-cm-1 high

Networks and network services are monitored to detect adverse events

Continuous Monitoring

de-cm-2 medium

The physical environment is monitored to detect potential cybersecurity events

Continuous Monitoring

de-cm-3 high

Personnel activity and technology usage are monitored to detect potentially adverse events

Continuous Monitoring

de-cm-4 critical

Malicious code is detected

Continuous Monitoring

de-cm-5 high

Unauthorized network connections are detected

Continuous Monitoring

de-cm-6 high

External service provider activities and services are monitored to detect potentially adverse events

Continuous Monitoring

de-cm-7 high

Monitoring for unauthorized personnel, connections, devices, and software is performed

Continuous Monitoring

de-cm-8 critical

Vulnerability scans are performed

Continuous Monitoring

de-cm-9 critical

Computing hardware and software, runtime environments, and their data are monitored to find potentially adverse events

Continuous Monitoring

Respond

Take action regarding a detected cybersecurity incident.

Recover

Restore assets and operations that were impacted by a cybersecurity incident.