ENISA Controls Meta Framework
ENISA Controls Meta Framework
CobiT [I27]
Control areas and sub-domains
1. Governance and Risk Management
1.1. Analyse and document organizational objectives, 00598, 00604
1 3 3
functions, and activities.
1.2. Establish and maintain the organizational compliance 01241, 00688,
27 00689, 00691-00694,
27 2701260, 00695, 01636, 008
framework and controls for your organization.
1.3. Establish, maintain and adopt a high-level IT plan. 00628, 00608-00609,
17 01179,
17 00633-00634,
17 01609, 00871, 014
1.4. Define an IT security policy. 00812, 00820,
34 00823, 01362-01363
34 34
1.5. Establish usage and proper behaviour policies. 01350 24 24 24
1.6. Establish and maintain formalized operations procedures. 00831, 00867,
21 00838, 04536
21 21
9.3. Establish and maintain systems continuity plans. 00752 SM4.7.2, CB2DS4.2 § 5.12
9.4. Exercise the systems continuity plan. 00755 CB2.5.3(d), DS4.5 § 5.10, § 7.
9.5. Maintain and review the systems continuity plan. 00754 DS4.4
9.6. Establish and maintain a disaster recovery capability.
10. Monitoring and Security Testing
10.1. Define the roles and responsibilities, in a clear manner, 00678 SM3.2.2(f), CB5.3.2, CI5.4.3, NW4.4.3
of all personnel involved in the monitoring and security testing
process.
10.2. Establish and maintain monitoring and logging policies.
10.3. Establish monitoring and logging operations for all key 00637-00638SM6.5.3(c), ME1.1 § 6.14.10, §
systems according to the defined policies.
10.4. Establish and maintain a security testing and 00654 § 6.3.10, § 7.5.9, § 7.16.2
assessment policy.
10.5. Establish and maintain a compliance monitoring and 00671 ME2.4, ME3.3, ME3.4
audit policy.
10.6. Establish and maintain a plan of action for correcting 00675 PO9.6, ME1.6, ME2.7
deficiencies that were found in audits.
10.7. Report to management the periodic reviews of 01159 § 6.14.6.3
compliance checklists, audit reports, sign-off sheets, and
others.
9
1
8
3
18
14
43
16
21
52
21
24
34
17
27
ISO/IEC 27001 [I23]
9
1
8
3
18
14
43
16
21
52
21
24
34
17
27
ISO/IEC 27002 [I24]
9
1
8
3
18
14
43
16
21
52
21
24
34
17
27
ITIL Service Support [I15]
9
1
8
3
18
14
43
16
21
52
21
24
34
17
27
ITIL Security Management [I15]
9
1
8
3
18
14
43
16
21
52
21
24
34
17
27
IT Baseline Protection Manual Germany
[G10]
9
1
8
3
18
14
43
16
21
52
21
24
34
17
27
BS 25999-1 Guide to Business
Continuity Management [I10]
9
1
8
3
18
14
43
16
21
52
21
24
34
17
27
9
1
8
3
18
14
43
16
21
52
21
24
34
17
27
9
1
8
3
18
14
43
16
21
52
21
24
34
17
27
§ 7.3.3, § 7.3.4
§ 7.3.8, § 7.3.9
Annex A.11.4.2
5.4.3, NW4.4.3
§6
9
1
8
3
18
14
43
16
21
52
21
24
34
17
27
FIPS-200 [M50]
9
1
8
3
18
14
43
16
21
52
21
24
34
17
27
ITU-T X.1056 (01/2009) [I18]
9
1
8
3
18
14
43
16
21
52
21
24
34
17
27
ITU-T X.800 (1991) [I21]
9
1
8
3
18
14
43
16
21
52
21
24
34
17
27
ITU-T X.805 (10/2003) [I31]
9
1
8
3
18
14
43
16
21
52
21
24
34
17
27
UK NICC ND 1643 [M46]
§ 3 Awarene7.3.3.5
§3 5.2
§3
8.1
§3
9.1
8.2
§3
8.3
§ 3 Access Control (AC), § 3 Certification, Accreditation, and Security Assessments (CA)
§3
§3 7.3.1.3-4 10.1
§3 3-7
§3 6-7
6-7 11.1
12.1
§3
§3 7.3.2.3
7.3.2.3 13.1
§3