NIST Framework v1.1 Core1
NIST Framework v1.1 Core1
· CIS CSC 1
· COBIT 5 BAI09.01, BAI09.02
ID.AM-1: Physical devices and systems within · ISA 62443-2-1:2009 4.2.3.4
the organization are inventoried · ISA 62443-3-3:2013 SR 7.8
· ISO/IEC 27001:2013 A.8.1.1, A.8.1.2
· NIST SP 800-53 Rev. 4 CM-8, PM-5
· CIS CSC 2
· COBIT 5 BAI09.01, BAI09.02, BAI09.05
ID.AM-2: Software platforms and applications · ISA 62443-2-1:2009 4.2.3.4
within the organization are inventoried · ISA 62443-3-3:2013 SR 7.8
· ISO/IEC 27001:2013 A.8.1.1, A.8.1.2, A.12.5.1
· NIST SP 800-53 Rev. 4 CM-8, PM-5
· CIS CSC 12
Asset Management (ID.AM): The data, · COBIT 5 DSS05.02
personnel, devices, systems, and facilities that ID.AM-3: Organizational communication and · ISA 62443-2-1:2009 4.2.3.4
enable the organization to achieve business data flows are mapped
· ISO/IEC 27001:2013 A.13.2.1, A.13.2.2
purposes are identified and managed consistent
with their relative importance to organizational · NIST SP 800-53 Rev. 4 AC-4, CA-3, CA-9, PL-8
objectives and the organization’s risk strategy. · CIS CSC 12
ID.AM-4: External information systems are · COBIT 5 APO02.02, APO10.04, DSS01.02
catalogued · ISO/IEC 27001:2013 A.11.2.6
· NIST SP 800-53 Rev. 4 AC-20, SA-9
· CIS CSC 13, 14
ID.AM-5: Resources (e.g., hardware, devices, · COBIT 5 APO03.03, APO03.04, APO12.01, BAI04.02, BAI09.02
data, time, personnel, and software) are
· ISA 62443-2-1:2009 4.2.3.6
prioritized based on their classification,
criticality, and business value · ISO/IEC 27001:2013 A.8.2.1
· NIST SP 800-53 Rev. 4 CP-2, RA-2, SA-14, SC-6
· CIS CSC 17, 19
ID.AM-6: Cybersecurity roles and · COBIT 5 APO01.02, APO07.06, APO13.01, DSS06.03
responsibilities for the entire workforce and
· ISA 62443-2-1:2009 4.3.2.3.3
third-party stakeholders (e.g., suppliers,
customers, partners) are established · ISO/IEC 27001:2013 A.6.1.1
· NIST SP 800-53 Rev. 4 CP-2, PS-7, PM-11
· COBIT 5 APO08.01, APO08.04, APO08.05, APO10.03, APO10.04, APO10.05
ID.BE-1: The organization’s role in the supply
· ISO/IEC 27001:2013 A.15.1.1, A.15.1.2, A.15.1.3, A.15.2.1, A.15.2.2
chain is identified and communicated
· NIST SP 800-53 Rev. 4 CP-2, SA-12
ID.BE-2: The organization’s place in critical · COBIT 5 APO02.06, APO03.01
infrastructure and its industry sector is · ISO/IEC 27001:2013 Clause 4.1
identified and communicated · NIST SP 800-53 Rev. 4 PM-8
Business Environment (ID.BE): The
organization’s mission, objectives, · COBIT 5 APO02.01, APO02.06, APO03.01
ID.BE-3: Priorities for organizational mission,
stakeholders, and activities are understood and
objectives, and activities are established and · ISA 62443-2-1:2009 4.2.2.1, 4.2.3.6
prioritized; this information is used to inform
communicated · NIST SP 800-53 Rev. 4 PM-11, SA-14
cybersecurity roles, responsibilities, and risk
management decisions. · COBIT 5 APO10.01, BAI04.02, BAI09.02
ID.BE-4: Dependencies and critical functions
· ISO/IEC 27001:2013 A.11.2.2, A.11.2.3, A.12.1.3
for delivery of critical services are established
· NIST SP 800-53 Rev. 4 CP-8, PE-9, PE-11, PM-8, SA-14
ID.BE-5: Resilience requirements to support · COBIT 5 BAI03.02, DSS04.02
delivery of critical services are established for
· ISO/IEC 27001:2013 A.11.1.4, A.17.1.1, A.17.1.2, A.17.2.1
all operating states (e.g. under duress/attack,
during recovery, normal operations) · NIST SP 800-53 Rev. 4 CP-2, CP-11, SA-13, SA-14
· CIS CSC 19
· COBIT 5 APO01.03, APO13.01, EDM01.01, EDM01.02
ID.GV-1: Organizational cybersecurity policy
· ISA 62443-2-1:2009 4.3.2.6
is established and communicated
· ISO/IEC 27001:2013 A.5.1.1
· NIST SP 800-53 Rev. 4 -1 controls from all security control families
· CIS CSC 19
ID.GV-2: Cybersecurity roles and · COBIT 5 APO01.02, APO10.03, APO13.02, DSS05.04
Governance (ID.GV): The policies, responsibilities are coordinated and aligned · ISA 62443-2-1:2009 4.3.2.3.3
procedures, and processes to manage and with internal roles and external partners · ISO/IEC 27001:2013 A.6.1.1, A.7.2.1, A.15.1.1
monitor the organization’s regulatory, legal,
· NIST SP 800-53 Rev. 4 PS-7, PM-1, PM-2
risk, environmental, and operational
requirements are understood and inform the · CIS CSC 19
management of cybersecurity risk. ID.GV-3: Legal and regulatory requirements · COBIT 5 BAI02.01, MEA03.01, MEA03.04
regarding cybersecurity, including privacy and
· ISA 62443-2-1:2009 4.4.3.7
civil liberties obligations, are understood and
managed · ISO/IEC 27001:2013 A.18.1.1, A.18.1.2, A.18.1.3, A.18.1.4, A.18.1.5
· NIST SP 800-53 Rev. 4 -1 controls from all security control families
· COBIT 5 EDM03.02, APO12.02, APO12.05, DSS04.02
ID.GV-4: Governance and risk management · ISA 62443-2-1:2009 4.2.3.1, 4.2.3.3, 4.2.3.8, 4.2.3.9, 4.2.3.11, 4.3.2.4.3, 4.3.2.6.3
processes address cybersecurity risks · ISO/IEC 27001:2013 Clause 6
IDENTIFY (ID) · NIST SP 800-53 Rev. 4 SA-2, PM-3, PM-7, PM-9, PM-10, PM-11
· CIS CSC 4
· COBIT 5 APO12.01, APO12.02, APO12.03, APO12.04, DSS05.01, DSS05.02
ID.RA-1: Asset vulnerabilities are identified
and documented · ISA 62443-2-1:2009 4.2.3, 4.2.3.7, 4.2.3.9, 4.2.3.12
· ISO/IEC 27001:2013 A.12.6.1, A.18.2.3
· NIST SP 800-53 Rev. 4 CA-2, CA-7, CA-8, RA-3, RA-5, SA-5, SA-11, SI-2, SI-4, SI-5
· CIS CSC 4
· COBIT 5 BAI08.01
ID.RA-2: Cyber threat intelligence is received
· ISA 62443-2-1:2009 4.2.3, 4.2.3.9, 4.2.3.12
from information sharing forums and sources
· ISO/IEC 27001:2013 A.6.1.4
· NIST SP 800-53 Rev. 4 SI-5, PM-15, PM-16