NIST CSF Vs ISO
NIST CSF Vs ISO
DE.AE-2: Detected events are analyzed to understand attack ISO/IEC 27001:2013 A.12.4.1,
targets and methods A.16.1.1, A.16.1.4
DE.AE-3: Event data are collected and correlated from multiple ISO/IEC 27001:2013 A.12.4.1,
sources and sensors A.16.1.7
Communications (RS.CO):
Response activities are
coordinated with internal
and
external stakeholders (e.g.
external support from law
enforcement agencies).
RS.CO-1: Personnel know their roles and order of operations when a response ISO/IEC 27001:2013 A.6.1.1,
is A.7.2.2, A.16.1.1
needed
RS.CO-2: Incidents are reported consistent with established criteria ISO/IEC 27001:2013 A.6.1.3,
A.16.1.2
RS.CO-3: Information is shared consistent with response plans ISO/IEC 27001:2013 A.16.1.2,
Clause 7.4, Clause 16.1.2
RS.CO-4: Coordination with stakeholders occurs consistent with response plans ISO/IEC 27001:2013 Clause 7.4
RS.CO-5: Voluntary information sharing occurs with external stakeholders to ISO/IEC 27001:2013 A.6.1.4
achieve broader cybersecurity situational awareness
RS.AN-1: Notifications from detection systems are investigated ISO/IEC 27001:2013 A.12.4.1,
A.12.4.3, A.16.1.5
Communications (RC.CO):
Restoration activities are
coordinated with internal
and external parties (e.g.
coordinating centers,
Internet Service Providers,
owners of attacking
systems, victims, other
CSIRTs, and vendors).
Subcategory ISO 27001 Reference
RC.RP-1: Recovery plan is executed ISO/IEC 27001:2013
during or after a cybersecurity incident A.16.1.5