NIST Framework v1.1
NIST Framework v1.1
Version 1.1
As with Version 1.0, Version 1.1 users are encouraged to customize the Framework to maximize
individual organizational value.
Acknowledgements
This publication is the result of an ongoing collaborative effort involving industry, academia, and
government. The National Institute of Standards and Technology (NIST) launched the project by
convening private- and public-sector organizations and individuals in 2013. Published in 2014
and revised during 2017 and 2018, this Framework for Improving Critical Infrastructure
Cybersecurity has relied upon eight public workshops, multiple Requests for Comment or
Information, and thousands of direct interactions with stakeholders from across all sectors of the
United States along with many sectors from around the world.
The impetus to change Version 1.0 and the changes that appear in this Version 1.1 were based
on:
• Feedback and frequently asked questions to NIST since release of Framework Version
1.0;
• 105 responses to the December 2015 request for information (RFI), Views on the
Framework for Improving Critical Infrastructure Cybersecurity;
• Over 85 comments on a December 5, 2017 proposed second draft of Version 1.1; Over
120 comments on a January 10, 2017, proposed first draft Version 1.1; and Input from
over 1,200 attendees at the 2016 and 2017 Framework workshops.
In addition, NIST previously released Version 1.0 of the Cybersecurity Framework with a
companion document, NIST Roadmap for Improving Critical Infrastructure Cybersecurity. This
Roadmap highlighted key “areas of improvement” for further development, alignment, and
collaboration. Through private and public-sector efforts, some areas of improvement have
advanced enough to be included in this Framework Version 1.1.
NIST acknowledges and thanks all of those who have contributed to this Framework.
Executive Summary
The United States depends on the reliable functioning of critical infrastructure. Cybersecurity
threats exploit the increased complexity and connectivity of critical infrastructure systems,
placing the Nation’s security, economy, and public safety and health at risk. Similar to financial
and reputational risks, cybersecurity risk affects a company’s bottom line. It can drive up costs
and affect revenue. It can harm an organization’s ability to innovate and to gain and maintain
customers. Cybersecurity can be an important and amplifying component of an organization’s
overall risk management.
To better address these risks, the Cybersecurity Enhancement Act of 2014 1 (CEA) updated the
role of the National Institute of Standards and Technology (NIST) to include identifying and
developing cybersecurity risk frameworks for voluntary use by critical infrastructure owners and
operators. Through CEA, NIST must identify “a prioritized, flexible, repeatable,
performancebased, and cost-effective approach, including information security measures and
1
See 15 U.S.C. § 272(e)(1)(A)(i). The Cybersecurity Enhancement Act of 2014 (S.1353) became public law
113274 on December 18, 2014 and may be found at: https://www.congress.gov/bill/113th-
congress/senatebill/1353/text.
controls that may be voluntarily adopted by owners and operators of critical infrastructure to help
them identify, assess, and manage cyber risks.” This formalized NIST’s previous work
developing Framework Version 1.0 under Executive Order (EO) 13636, “Improving Critical
Infrastructure
Cybersecurity” (February 2013), and provided guidance for future Framework evolution. The
Framework that was developed under EO 13636, and continues to evolve according to CEA,
uses a common language to address and manage cybersecurity risk in a cost-effective way based
on business and organizational needs without placing additional regulatory requirements on
businesses.
The Framework focuses on using business drivers to guide cybersecurity activities and
considering cybersecurity risks as part of the organization’s risk management processes. The
Framework consists of three parts: the Framework Core, the Implementation Tiers, and the
Framework Profiles. The Framework Core is a set of cybersecurity activities, outcomes, and
informative references that are common across sectors and critical infrastructure. Elements of the
Core provide detailed guidance for developing individual organizational Profiles. Through use of
Profiles, the Framework will help an organization to align and prioritize its cybersecurity
activities with its business/mission requirements, risk tolerances, and resources. The Tiers
provide a mechanism for organizations to view and understand the characteristics of their
approach to managing cybersecurity risk, which will help in prioritizing and achieving
cybersecurity objectives.
While this document was developed to improve cybersecurity risk management in critical
infrastructure, the Framework can be used by organizations in any sector or community. The
Framework enables organizations – regardless of size, degree of cybersecurity risk, or
cybersecurity sophistication – to apply the principles and best practices of risk management to
improving security and resilience.
The Framework provides a common organizing structure for multiple approaches to
cybersecurity by assembling standards, guidelines, and practices that are working effectively
today. Moreover, because it references globally recognized standards for cybersecurity, the
Framework can serve as a model for international cooperation on strengthening cybersecurity in
critical infrastructure as well as other sectors and communities.
The Framework offers a flexible way to address cybersecurity, including cybersecurity’s effect
on physical, cyber, and people dimensions. It is applicable to organizations relying on
technology, whether their cybersecurity focus is primarily on information technology (IT),
industrial control systems (ICS), cyber-physical systems (CPS), or connected devices more
generally, including the Internet of Things (IoT). The Framework can assist organizations in
addressing cybersecurity as it affects the privacy of customers, employees, and other parties.
Additionally, the Framework’s outcomes serve as targets for workforce development and
evolution activities.
The Framework is not a one-size-fits-all approach to managing cybersecurity risk for critical
infrastructure. Organizations will continue to have unique risks – different threats, different
vulnerabilities, different risk tolerances. They also will vary in how they customize practices
described in the Framework. Organizations can determine activities that are important to critical
service delivery and can prioritize investments to maximize the impact of each dollar spent.
Ultimately, the Framework is aimed at reducing and better managing cybersecurity risks.
To account for the unique cybersecurity needs of organizations, there are a wide variety of ways
to use the Framework. The decision about how to apply it is left to the implementing
organization. For example, one organization may choose to use the Framework Implementation
Tiers to articulate envisioned risk management practices. Another organization may use the
Framework’s five Functions to analyze its entire risk management portfolio; that analysis may or
may not rely on more detailed companion guidance, such as controls catalogs. There sometimes
is discussion about “compliance” with the Framework, and the Framework has utility as a
structure and language for organizing and expressing compliance with an organization’s own
cybersecurity requirements. Nevertheless, the variety of ways in which the Framework can be
used by an organization means that phrases like “compliance with the Framework” can be
confusing and mean something very different to various stakeholders.
The Framework is a living document and will continue to be updated and improved as industry
provides feedback on implementation. NIST will continue coordinating with the private sector
and government agencies at all levels. As the Framework is put into greater practice, additional
lessons learned will be integrated into future versions. This will ensure the Framework is meeting
the needs of critical infrastructure owners and operators in a dynamic and challenging
environment of new threats, risks, and solutions.
Expanded and more effective use and sharing of best practices of this voluntary Framework are
the next steps to improve the cybersecurity of our Nation’s critical infrastructure – providing
evolving guidance for individual organizations while increasing the cybersecurity posture of the
Nation’s critical infrastructure and the broader economy and society.
Table of Contents
Note to Readers on the Update ........................................................................................................ i
Acknowledgements........................................................................................................................ iii
Executive Summary ....................................................................................................................... iii
1.0 Framework Introduction ...........................................................................................................1
2.0 Framework Basics .....................................................................................................................6
3.0 How to Use the Framework ....................................................................................................12
4.0 Self-Assessing Cybersecurity Risk with the Framework .......................................................19
Appendix A: Framework Core ......................................................................................................21
Appendix B: Glossary....................................................................................................................47
Appendix C: Acronyms .................................................................................................................50
List of Figures
Figure 1: Framework Core Structure ..............................................................................................
6
Figure 2: Notional Information and Decision Flows within an Organization ..............................
12
Figure 3: Cyber Supply Chain Relationships................................................................................ 17
List of Tables
Table 1: Function and Category Unique Identifiers ..................................................................... 23
Table 2: Framework Core .............................................................................................................
24
Table 3: Framework Glossary .......................................................................................................
45
2
See 15 U.S.C. § 272(e)(1)(A)(i). The Cybersecurity Enhancement Act of 2014 (S.1353) became public law 113274
on December 18, 2014 and may be found at: https://www.congress.gov/bill/113th-congress/senatebill/1353/text.
3
Executive Order no. 13636, Improving Critical Infrastructure Cybersecurity, DCPD-201300091, February 12,
4
. https://www.gpo.gov/fdsys/pkg/CFR-2014-title3-vol1/pdf/CFR-2014-title3-vol1-eo13636.pdf
5
The Department of Homeland Security (DHS) Critical Infrastructure program provides a listing of the sectors and
their associated critical functions and value chains. http://www.dhs.gov/critical-infrastructure-sectors
6
See 42 U.S.C. § 5195c(e)). The U.S. Patriot Act of 2001 (H.R.3162) became public law 107-56 on October 26,
7
and may be found at: https://www.congress.gov/bill/107th-congress/house-bill/3162
organization, the health and safety of individuals, the environment, communities, and the broader
economy and society should be considered.
To manage cybersecurity risks, a clear understanding of the organization’s business drivers and
security considerations specific to its use of technology is required. Because each organization’s
risks, priorities, and systems are unique, the tools and methods used to achieve the outcomes
described by the Framework will vary.
Recognizing the role that the protection of privacy and civil liberties plays in creating greater
public trust, the Framework includes a methodology to protect individual privacy and civil
liberties when critical infrastructure organizations conduct cybersecurity activities. Many
organizations already have processes for addressing privacy and civil liberties. The methodology
is designed to complement such processes and provide guidance to facilitate privacy risk
management consistent with an organization’s approach to cybersecurity risk management.
Integrating privacy and cybersecurity can benefit organizations by increasing customer
confidence, enabling more standardized sharing of information, and simplifying operations
across legal regimes.
The Framework remains effective and supports technical innovation because it is technology
neutral, while also referencing a variety of existing standards, guidelines, and practices that
evolve with technology. By relying on those global standards, guidelines, and practices
developed, managed, and updated by industry, the tools and methods available to achieve the
Framework outcomes will scale across borders, acknowledge the global nature of cybersecurity
risks, and evolve with technological advances and business requirements. The use of existing and
emerging standards will enable economies of scale and drive the development of effective
products, services, and practices that meet identified market needs. Market competition also
promotes faster diffusion of these technologies and practices and realization of many benefits by
the stakeholders in these sectors.
Building from those standards, guidelines, and practices, the Framework provides a common
taxonomy and mechanism for organizations to:
1) Describe their current cybersecurity posture;
2) Describe their target state for cybersecurity;
3) Identify and prioritize opportunities for improvement within the context of a
continuous and repeatable process;
4) Assess progress toward the target state;
5) Communicate among internal and external stakeholders about cybersecurity risk.
The Framework is not a one-size-fits-all approach to managing cybersecurity risk for critical
infrastructure. Organizations will continue to have unique risks – different threats, different
vulnerabilities, different risk tolerances. They also will vary in how they customize practices
described in the Framework. Organizations can determine activities that are important to critical
service delivery and can prioritize investments to maximize the impact of each dollar spent.
Ultimately, the Framework is aimed at reducing and better managing cybersecurity risks.
To account for the unique cybersecurity needs of organizations, there are a wide variety of ways
to use the Framework. The decision about how to apply it is left to the implementing
organization. For example, one organization may choose to use the Framework Implementation
Tiers to articulate envisioned risk management practices. Another organization may use the
Framework’s five Functions to analyze its entire risk management portfolio; that analysis may or
may not rely on more detailed companion guidance, such as controls catalogs. There sometimes
is discussion about “compliance” with the Framework, and the Framework has utility as a
structure and language for organizing and expressing compliance with an organization’s own
cybersecurity requirements. Nevertheless, the variety of ways in which the Framework can be
used by an organization means that phrases like “compliance with the Framework” can be
confusing and mean something very different to various stakeholders.
The Framework complements, and does not replace, an organization’s risk management process
and cybersecurity program. The organization can use its current processes and leverage the
Framework to identify opportunities to strengthen and communicate its management of
cybersecurity risk while aligning with industry practices. Alternatively, an organization without
an existing cybersecurity program can use the Framework as a reference to establish one.
While the Framework has been developed to improve cybersecurity risk management as it relates
to critical infrastructure, it can be used by organizations in any sector of the economy or society.
It is intended to be useful to companies, government agencies, and not-for-profit organizations
regardless of their focus or size. The common taxonomy of standards, guidelines, and practices
that it provides also is not country-specific. Organizations outside the United States may also use
the Framework to strengthen their own cybersecurity efforts, and the Framework can contribute
to developing a common language for international cooperation on critical infrastructure
cybersecurity.
8
International Organization for Standardization, Risk management – Principles and guidelines, ISO 31000:2009,
2009. http://www.iso.org/iso/home/standards/iso31000.htm
9
International Organization for Standardization/International Electrotechnical Commission, Information technology
– Security techniques – Information security risk management, ISO/IEC 27005:2011, 2011.
https://www.iso.org/standard/56742.html
10
Joint Task Force Transformation Initiative, Managing Information Security Risk: Organization, Mission, and
Information System View, NIST Special Publication 800-39, March 2011.
https://doi.org/10.6028/NIST.SP.80039
11
U.S. Department of Energy, Electricity Subsector Cybersecurity Risk Management Process, DOE/OE-0003, May
2012. https://energy.gov/sites/prod/files/Cybersecurity Risk Management Process Guideline - Final - May
2012.pdf
The Respond Function supports the ability to contain the impact of a potential
cybersecurity incident. Examples of outcome Categories within this Function include:
Response Planning; Communications; Analysis; Mitigation; and Improvements.
• Recover – Develop and implement appropriate activities to maintain plans for resilience
and to restore any capabilities or services that were impaired due to a cybersecurity
incident.
The Recover Function supports timely recovery to normal operations to reduce the
impact from a cybersecurity incident. Examples of outcome Categories within this
Function include: Recovery Planning; Improvements; and Communications.
formal (e.g. agreements) and informal mechanisms to develop and maintain strong supply
chain relationships.
12
NIST Special Publication 800-160 Volume 1, System Security Engineering, Considerations for a
cybersecurity specifications match the needs and risk disposition of the organization as captured
in a Framework Profile. The desired cybersecurity outcomes prioritized in a Target Profile
should be incorporated when a) developing the system during the build phase and b) purchasing
or outsourcing the system during the buy phase. That same Target Profile serves as a list of
system cybersecurity features that should be assessed when deploying the system to verify all
features are implemented. The cybersecurity outcomes determined by using the Framework then
should serve as a basis for ongoing operation of the system. This includes occasional
reassessment, capturing results in a Current Profile, to verify that cybersecurity requirements are
still fulfilled. Typically, a complex web of dependencies (e.g., compensating and common
controls) among systems means the outcomes documented in Target Profiles of related systems
should be carefully considered as systems are decommissioned.
The following sections present different ways in which organizations can use the Framework.
Step 1: Prioritize and Scope. The organization identifies its business/mission objectives and
high-level organizational priorities. With this information, the organization makes strategic
decisions regarding cybersecurity implementations and determines the scope of systems and
assets that support the selected business line or process. The Framework can be adapted to
Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems, Ross et al, November 2016 (updated
March 21, 2018), https://doi.org/10.6028/NIST.SP.800-160v1
support the different business lines or processes within an organization, which may have
different business needs and associated risk tolerance. Risk tolerances may be reflected in a
target Implementation Tier.
Step 2: Orient. Once the scope of the cybersecurity program has been determined for the
business line or process, the organization identifies related systems and assets, regulatory
requirements, and overall risk approach. The organization then consults sources to identify
threats and vulnerabilities applicable to those systems and assets.
Step 3: Create a Current Profile. The organization develops a Current Profile by indicating
which Category and Subcategory outcomes from the Framework Core are currently being
achieved. If an outcome is partially achieved, noting this fact will help support subsequent steps
by providing baseline information.
Step 4: Conduct a Risk Assessment. This assessment could be guided by the organization’s
overall risk management process or previous risk assessment activities. The organization
analyzes the operational environment in order to discern the likelihood of a cybersecurity event
and the impact that the event could have on the organization. It is important that organizations
identify emerging risks and use cyber threat information from internal and external sources to
gain a better understanding of the likelihood and impact of cybersecurity events.
Step 5: Create a Target Profile. The organization creates a Target Profile that focuses on the
assessment of the Framework Categories and Subcategories describing the organization’s desired
cybersecurity outcomes. Organizations also may develop their own additional Categories and
Subcategories to account for unique organizational risks. The organization may also consider
influences and requirements of external stakeholders such as sector entities, customers, and
business partners when creating a Target Profile. The Target Profile should appropriately reflect
criteria within the target Implementation Tier.
Step 6: Determine, Analyze, and Prioritize Gaps. The organization compares the Current
Profile and the Target Profile to determine gaps. Next, it creates a prioritized action plan to
address gaps – reflecting mission drivers, costs and benefits, and risks – to achieve the outcomes
in the Target Profile. The organization then determines resources, including funding and
workforce, necessary to address the gaps. Using Profiles in this manner encourages the
organization to make informed decisions about cybersecurity activities, supports risk
management, and enables the organization to perform cost-effective, targeted improvements.
Step 7: Implement Action Plan. The organization determines which actions to take to address
the gaps, if any, identified in the previous step and then adjusts its current cybersecurity practices
in order to achieve the Target Profile. For further guidance, the Framework identifies example
Informative References regarding the Categories and Subcategories, but organizations should
determine which standards, guidelines, and practices, including those that are sector specific,
work best for their needs.
An organization repeats the steps as needed to continuously assess and improve its cybersecurity.
For instance, organizations may find that more frequent repetition of the orient step improves the
quality of risk assessments. Furthermore, organizations may monitor progress through iterative
updates to the Current Profile, subsequently comparing the Current Profile to the Target Profile.
Organizations may also use this process to align their cybersecurity program with their desired
Framework Implementation Tier.
13
Communicating Cybersecurity Requirements (Section 3.3) and Buying Decisions (Section 3.4) address only two
uses of the Framework for cyber SCRM and are not intended to address cyber SCRM comprehensively.
14
NIST Special Publication 800-161, Supply Chain Risk Management Practices for Federal Information Systems
and Organizations, Boyens et al, April 2015, https://doi.org/10.6028/NIST.SP.800-161
services provided to the Buyer. These terms are applicable for both technology-based and
nontechnology-based products and services.
Whether considering individual Subcategories of the Core or the comprehensive considerations
of a Profile, the Framework offers organizations and their partners a method to help ensure the
new product or service meets critical security outcomes. By first selecting outcomes that are
relevant to the context (e.g., transmission of Personally Identifiable Information (PII), mission
critical service delivery, data verification services, product or service integrity) the organization
then can evaluate partners against those criteria. For example, if a system is being purchased that
will monitor Operational Technology (OT) for anomalous network communication, availability
may be a particularly important cybersecurity objective to achieve and should drive a
Technology Supplier evaluation against applicable Subcategories (e.g., ID.BE-4, ID.SC-3,
ID.SC-4, ID.SC-5, PR.DS-4, PR.DS-6, PR.DS-7, PR.DS-8, PR.IP-1, DE.AE-5).
3.4 Buying Decisions
Since a Framework Target Profile is a prioritized list of organizational cybersecurity
requirements, Target Profiles can be used to inform decisions about buying products and
services. This transaction varies from Communicating Cybersecurity Requirements with
Stakeholders (addressed in Section 3.3) in that it may not be possible to impose a set of
cybersecurity requirements on the supplier. The objective should be to make the best buying
decision among multiple suppliers, given a carefully determined list of cybersecurity
requirements. Often, this means some degree of trade-off, comparing multiple products or
services with known gaps to the Target Profile.
Once a product or service is purchased, the Profile also can be used to track and address residual
cybersecurity risk. For example, if the service or product purchased did not meet all the
objectives described in the Target Profile, the organization can address the residual risk through
other management actions. The Profile also provides the organization a method for assessing if
the product meets cybersecurity outcomes through periodic review and testing mechanisms.
Steps are taken to identify and address the privacy implications of identity management
and access control measures to the extent that they involve collection, disclosure, or use
of personal information.
Awareness and training measures
• Service providers that provide cybersecurity-related services for the organization are
informed about the organization’s applicable privacy policies.
Anomalous activity detection and system and assets monitoring
Process is in place to conduct a privacy review of an organization’s anomalous activity
detection and cybersecurity monitoring.
Response activities, including information sharing or other mitigation efforts
• Process is in place to assess and address whether, when, how, and the extent to which
personal information is shared outside the organization as part of cybersecurity
information sharing activities.
• Process is in place to conduct a privacy review of an organization’s cybersecurity
mitigation efforts.
4.0 Self-Assessing Cybersecurity Risk with the Framework
The Cybersecurity Framework is designed to reduce risk by improving the management of
cybersecurity risk to organizational objectives. Ideally, organizations using the Framework will
be able to measure and assign values to their risk along with the cost and benefits of steps taken
to reduce risk to acceptable levels. The better an organization is able to measure its risk, costs,
and benefits of cybersecurity strategies and steps, the more rational, effective, and valuable its
cybersecurity approach and investments will be.
Over time, self-assessment and measurement should improve decision making about investment
priorities. For example, measuring – or at least robustly characterizing – aspects of an
organization’s cybersecurity state and trends over time can enable that organization to
understand and convey meaningful risk information to dependents, suppliers, buyers, and other
parties. An organization can accomplish this internally or by seeking a third-party assessment. If
done properly and with an appreciation of limitations, these measurements can provide a basis
for strong trusted relationships, both inside and outside of an organization.
To examine the effectiveness of investments, an organization must first have a clear
understanding of its organizational objectives, the relationship between those objectives and
supportive cybersecurity outcomes, and how those discrete cybersecurity outcomes are
implemented and managed. While measurements of all those items is beyond the scope of the
Framework, the cybersecurity outcomes of the Framework Core support self-assessment of
investment effectiveness and cybersecurity activities in the following ways:
• Making choices about how different portions of the cybersecurity operation should
influence the selection of Target Implementation Tiers,
• Evaluating the organization’s approach to cybersecurity risk management by determining
Current Implementation Tiers,
• Prioritizing cybersecurity outcomes by developing Target Profiles,
• Determining the degree to which specific cybersecurity steps achieve desired
cybersecurity outcomes by assessing Current Profiles, and
• Measuring the degree of implementation for controls catalogs or technical guidance listed
as Informative References.
IDENTIFY Asset Management (ID.AM): ID.AM-1: Physical devices and systems CIS CSC 1
(ID) The data, personnel, devices, within the organization are inventoried COBIT 5 BAI09.01, BAI09.02
systems, and facilities that enable ISA 62443-2-1:2009 4.2.3.4
the organization to achieve
ISA 62443-3-3:2013 SR 7.8
business purposes are identified
ISO/IEC 27001:2013 A.8.1.1, A.8.1.2
and managed consistent with their
relative importance to NIST SP 800-53 Rev. 4 CM-8, PM-5
organizational objectives and the ID.AM-2: Software platforms and CIS CSC 2
organization’s risk strategy. applications within the organization are COBIT 5 BAI09.01, BAI09.02, BAI09.05
inventoried ISA 62443-2-1:2009 4.2.3.4
ISA 62443-3-3:2013 SR 7.8
ISO/IEC 27001:2013 A.8.1.1, A.8.1.2, A.12.5.1
NIST SP 800-53 Rev. 4 CM-8, PM-5
ID.AM-3: Organizational communication CIS CSC 12
and data flows are mapped COBIT 5 DSS05.02
ISA 62443-2-1:2009 4.2.3.4
ISO/IEC 27001:2013 A.13.2.1, A.13.2.2
NIST SP 800-53 Rev. 4 AC-4, CA-3, CA-9, PL-8
ID.AM-4: External information systems CIS CSC 12
are catalogued COBIT 5 APO02.02, APO10.04, DSS01.02
ISO/IEC 27001:2013 A.11.2.6
NIST SP 800-53 Rev. 4 AC-20, SA-9
ID.AM-5: Resources (e.g., hardware, CIS CSC 13, 14
devices, data, time, personnel, and COBIT 5 APO03.03, APO03.04, APO12.01,
software) are prioritized based on their BAI04.02, BAI09.02
classification, criticality, and business ISA 62443-2-1:2009 4.2.3.6
value ISO/IEC 27001:2013 A.8.2.1
NIST SP 800-53 Rev. 4 CP-2, RA-2, SA-14, SC-6
Risk Assessment (ID.RA): The ID.RA-1: Asset vulnerabilities are CIS CSC 4
organization understands the identified and documented COBIT 5 APO12.01, APO12.02, APO12.03,
cybersecurity risk to APO12.04, DSS05.01, DSS05.02
organizational operations ISA 62443-2-1:2009 4.2.3, 4.2.3.7, 4.2.3.9,
(including mission, functions, 4.2.3.12
image, or reputation),
organizational assets, and ISO/IEC 27001:2013 A.12.6.1, A.18.2.3
individuals. NIST SP 800-53 Rev. 4 CA-2, CA-7, CA-8, RA3,
RA-5, SA-5, SA-11, SI-2, SI-4, SI-5
ID.RA-2: Cyber threat intelligence is CIS CSC 4
received from information sharing forums COBIT 5 BAI08.01
and sources ISA 62443-2-1:2009 4.2.3, 4.2.3.9, 4.2.3.12
ISO/IEC 27001:2013 A.6.1.4
NIST SP 800-53 Rev. 4 SI-5, PM-15, PM-16
established and implemented the ID.SC-2: Suppliers and third party partners COBIT 5 APO10.01, APO10.02, APO10.04,
processes to identify, assess and of information systems, components, and APO10.05, APO12.01, APO12.02, APO12.03,
manage supply chain risks. services are identified, prioritized, and APO12.04, APO12.05, APO12.06, APO13.02,
assessed using a cyber supply chain risk BAI02.03
assessment process ISA 62443-2-1:2009 4.2.3.1, 4.2.3.2, 4.2.3.3,
4.2.3.4, 4.2.3.6, 4.2.3.8, 4.2.3.9, 4.2.3.10, 4.2.3.12,
4.2.3.13, 4.2.3.14
ISO/IEC 27001:2013 A.15.2.1, A.15.2.2
NIST SP 800-53 Rev. 4 RA-2, RA-3, SA-12,
SA14, SA-15, PM-9
ID.SC-3: Contracts with suppliers and COBIT 5 APO10.01, APO10.02, APO10.03,
third-party partners are used to implement APO10.04, APO10.05
appropriate measures designed to meet the ISA 62443-2-1:2009 4.3.2.6.4, 4.3.2.6.7
objectives of an organization’s ISO/IEC 27001:2013 A.15.1.1, A.15.1.2, A.15.1.3
cybersecurity program and Cyber Supply NIST SP 800-53 Rev. 4 SA-9, SA-11, SA-12, PM9
Chain Risk Management Plan.
Maintenance (PR.MA): PR.MA-1: Maintenance and repair of COBIT 5 BAI03.10, BAI09.02, BAI09.03,
Maintenance and repairs of organizational assets are performed and DSS01.05
industrial control and information logged, with approved and controlled tools ISA 62443-2-1:2009 4.3.3.3.7
system components are performed ISO/IEC 27001:2013 A.11.1.2, A.11.2.4,
consistent with policies and A.11.2.5, A.11.2.6
procedures. NIST SP 800-53 Rev. 4 MA-2, MA-3, MA-5, MA-
6
PR.MA-2: Remote maintenance of CIS CSC 3, 5
organizational assets is approved, logged, COBIT 5 DSS05.04
and performed in a manner that prevents ISA 62443-2-1:2009 4.3.3.6.5, 4.3.3.6.6, 4.3.3.6.7,
unauthorized access 4.3.3.6.8
ISO/IEC 27001:2013 A.11.2.4, A.15.1.1, A.15.2.1
NIST SP 800-53 Rev. 4 MA-4
Protective Technology (PR.PT): PR.PT-1: Audit/log records are CIS CSC 1, 3, 5, 6, 14, 15, 16
Technical security solutions are determined, documented, implemented, COBIT 5 APO11.04, BAI03.05, DSS05.04,
managed to ensure the security and reviewed in accordance with policy DSS05.07, MEA02.01
and resilience of systems and ISA 62443-2-1:2009 4.3.3.3.9, 4.3.3.5.8, 4.3.4.4.7,
assets, consistent with related 4.4.2.1, 4.4.2.2, 4.4.2.4
policies, procedures, and
ISA 62443-3-3:2013 SR 2.8, SR 2.9, SR 2.10, SR
agreements.
2.11, SR 2.12
ISO/IEC 27001:2013 A.12.4.1, A.12.4.2,
A.12.4.3, A.12.4.4, A.12.7.1
NIST SP 800-53 Rev. 4 AU Family
PR.PT-2: Removable media is protected CIS CSC 8, 13
and its use restricted according to policy COBIT 5 APO13.01, DSS05.02, DSS05.06
ISA 62443-3-3:2013 SR 2.3
ISO/IEC 27001:2013 A.8.2.1, A.8.2.2, A.8.2.3,
A.8.3.1, A.8.3.3, A.11.2.9
and the potential impact of events users and systems is established and ISO/IEC 27001:2013 A.12.1.1, A.12.1.2,
is understood. managed A.13.1.1, A.13.1.2
NIST SP 800-53 Rev. 4 AC-4, CA-3, CM-2, SI-4
DE.AE-2: Detected events are analyzed to CIS CSC 3, 6, 13, 15
understand attack targets and methods COBIT 5 DSS05.07
ISA 62443-2-1:2009 4.3.4.5.6, 4.3.4.5.7, 4.3.4.5.8
ISA 62443-3-3:2013 SR 2.8, SR 2.9, SR 2.10, SR
2.11, SR 2.12, SR 3.9, SR 6.1, SR 6.2
ISO/IEC 27001:2013 A.12.4.1, A.16.1.1, A.16.1.4
NIST SP 800-53 Rev. 4 AU-6, CA-7, IR-4, SI-4
DE.AE-3: Event data are collected and CIS CSC 1, 3, 4, 5, 6, 7, 8, 11, 12, 13, 14, 15, 16
correlated from multiple sources and COBIT 5 BAI08.02
sensors ISA 62443-3-3:2013 SR 6.1
ISO/IEC 27001:2013 A.12.4.1, A.16.1.7
NIST SP 800-53 Rev. 4 AU-6, CA-7, IR-4, IR-5,
IR-8, SI-4
DE.AE-4: Impact of events is determined CIS CSC 4, 6
COBIT 5 APO12.06, DSS03.01
ISO/IEC 27001:2013 A.16.1.4
NIST SP 800-53 Rev. 4 CP-2, IR-4, RA-3, SI-4
DE.AE-5: Incident alert thresholds are CIS CSC 6, 19
established COBIT 5 APO12.06, DSS03.01
ISA 62443-2-1:2009 4.2.3.10
ISO/IEC 27001:2013 A.16.1.4
NIST SP 800-53 Rev. 4 IR-4, IR-5, IR-8
Security Continuous DE.CM-1: The network is monitored to CIS CSC 1, 7, 8, 12, 13, 15, 16
Monitoring (DE.CM): The detect potential cybersecurity events COBIT 5 DSS01.03, DSS03.05, DSS05.07
information system and assets are ISA 62443-3-3:2013 SR 6.2
monitored to identify
NIST SP 800-53 Rev. 4 AC-2, AU-12, CA-7,
cybersecurity events and verify
CM3, SC-5, SC-7, SI-4
the effectiveness of protective DE.CM-2: The physical environment is COBIT 5 DSS01.04, DSS01.05
measures. monitored to detect potential cybersecurity ISA 62443-2-1:2009 4.3.3.3.8
events ISO/IEC 27001:2013 A.11.1.1, A.11.1.2
NIST SP 800-53 Rev. 4 CA-7, PE-3, PE-6, PE-20
DE.CM-3: Personnel activity is monitored CIS CSC 5, 7, 14, 16
to detect potential cybersecurity events COBIT 5 DSS05.07
ISA 62443-3-3:2013 SR 6.2
ISO/IEC 27001:2013 A.12.4.1, A.12.4.3
NIST SP 800-53 Rev. 4 AC-2, AU-12, AU-13,
CA-7, CM-10, CM-11
DE.CM-4: Malicious code is detected CIS CSC 4, 7, 8, 12
COBIT 5 DSS05.01
ISA 62443-2-1:2009 4.3.4.3.8
ISA 62443-3-3:2013 SR 3.2
ISO/IEC 27001:2013 A.12.2.1
NIST SP 800-53 Rev. 4 SI-3, SI-8
DE.CM-5: Unauthorized mobile code is CIS CSC 7, 8
detected COBIT 5 DSS05.01
ISA 62443-3-3:2013 SR 2.4
ISO/IEC 27001:2013 A.12.5.1, A.12.6.2
NIST SP 800-53 Rev. 4 SC-18, SI-4, SC-44
DE.CM-6: External service provider COBIT 5 APO07.06, APO10.05
activity is monitored to detect potential ISO/IEC 27001:2013 A.14.2.7, A.15.2.1
cybersecurity events NIST SP 800-53 Rev. 4 CA-7, PS-7, SA-4, SA-9,
SI-4
DE.CM-7: Monitoring for unauthorized CIS CSC 1, 2, 3, 5, 9, 12, 13, 15, 16
personnel, connections, devices, and COBIT 5 DSS05.02, DSS05.05
software is performed ISO/IEC 27001:2013 A.12.4.1, A.14.2.7, A.15.2.1
NIST SP 800-53 Rev. 4 AU-12, CA-7, CM-3,
CM-8, PE-3, PE-6, PE-20, SI-4
DE.CM-8: Vulnerability scans are CIS CSC 4, 20
performed
RESPOND (RS) Response Planning (RS.RP): RS.RP-1: Response plan is executed CIS CSC 19
Response processes and during or after an incident COBIT 5 APO12.06, BAI01.10
procedures are executed and ISA 62443-2-1:2009 4.3.4.5.1
maintained, to ensure response to ISO/IEC 27001:2013 A.16.1.5
detected cybersecurity incidents.
NIST SP 800-53 Rev. 4 CP-2, CP-10, IR-4, IR-8
Communications (RS.CO): RS.CO-1: Personnel know their roles and CIS CSC 19
Response activities are order of operations when a response is COBIT 5 EDM03.02, APO01.02, APO12.03
coordinated with internal and needed ISA 62443-2-1:2009 4.3.4.5.2, 4.3.4.5.3, 4.3.4.5.4
external stakeholders (e.g. ISO/IEC 27001:2013 A.6.1.1, A.7.2.2, A.16.1.1
external support from law
enforcement agencies). NIST SP 800-53 Rev. 4 CP-2, CP-3, IR-3, IR-8
RS.CO-2: Incidents are reported consistent CIS CSC 19
with established criteria COBIT 5 DSS01.03
ISA 62443-2-1:2009 4.3.4.5.5
ISO/IEC 27001:2013 A.6.1.3, A.16.1.2
NIST SP 800-53 Rev. 4 AU-6, IR-6, IR-8
RS.CO-3: Information is shared consistent CIS CSC 19
with response plans COBIT 5 DSS03.04
ISA 62443-2-1:2009 4.3.4.5.2
ISO/IEC 27001:2013 A.16.1.2, Clause 7.4, Clause
16.1.2
NIST SP 800-53 Rev. 4 CA-2, CA-7, CP-2, IR-4,
IR-8, PE-6, RA-5, SI-4
RECOVER (RC) Recovery Planning (RC.RP): RC.RP-1: Recovery plan is executed CIS CSC 10
Recovery processes and during or after a cybersecurity incident COBIT 5 APO12.06, DSS02.05, DSS03.04
procedures are executed and ISO/IEC 27001:2013 A.16.1.5
maintained to ensure restoration of
NIST SP 800-53 Rev. 4 CP-10, IR-4, IR-8
systems or assets affected by
cybersecurity incidents.
Improvements (RC.IM): RC.IM-1: Recovery plans incorporate COBIT 5 APO12.06, BAI05.07, DSS04.08
Recovery planning and processes lessons learned ISA 62443-2-1:2009 4.4.3.4
are improved by incorporating ISO/IEC 27001:2013 A.16.1.6, Clause 10
lessons learned into future NIST SP 800-53 Rev. 4 CP-2, IR-4, IR-8
activities.
RC.IM-2: Recovery strategies are updated COBIT 5 APO12.06, BAI07.08
ISO/IEC 27001:2013 A.16.1.6, Clause 10
NIST SP 800-53 Rev. 4 CP-2, IR-4, IR-8
Function Category Subcategory Informative References
Information regarding Informative References described in Appendix A may be found at the following locations:
• Control Objectives for Information and Related Technology (COBIT): http://www.isaca.org/COBIT/Pages/default.aspx
• CIS Critical Security Controls for Effective Cyber Defense (CIS Controls): https://www.cisecurity.org
• American National Standards Institute/International Society of Automation (ANSI/ISA)-62443-2-1 (99.02.01)-2009, Security
for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program:
https://www.isa.org/templates/one-column.aspx?pageid=111294&productId=116731
• ANSI/ISA-62443-3-3 (99.03.03)-2013, Security for Industrial Automation and Control Systems: System Security Requirements
and Security Levels: https://www.isa.org/templates/one-column.aspx?pageid=111294&productId=116785
• ISO/IEC 27001, Information technology -- Security techniques -- Information security management systems -- Requirements:
https://www.iso.org/standard/54534.html
• NIST SP 800-53 Rev. 4 - NIST Special Publication 800-53 Revision 4, Security and Privacy Controls for Federal Information
Systems and Organizations, April 2013 (including updates as of January 22, 2015). https://doi.org/10.6028/NIST.SP.800-53r4.
Informative References are only mapped to the control level, though any control enhancement might be found useful in
achieving a subcategory outcome.
Mappings between the Framework Core Subcategories and the specified sections in the Informative References are not intended to
definitively determine whether the specified sections in the Informative References provide the desired Subcategory outcome.
Informative References are not exhaustive, in that not every element (e.g., control, requirement) of a given Informative Reference is
mapped to Framework Core Subcategories.
Appendix B: Glossary
This appendix defines selected terms used in the publication.
Table 3: Framework Glossary
Buyer The people or organizations that consume a given product or service.
Appendix C: Acronyms