NIST CSF 2.0 and ISO 27001 - 2022 (Mapping)
NIST CSF 2.0 and ISO 27001 - 2022 (Mapping)
ISO 27001 ISO/IEC 27001:2022 Information security, cybersecurity and privacy protection
— Information security management systems — Requirements
https://www.iso.org/standard/27001
CSF Core: A taxonomy of high-level cybersecurity outcomes that can help any organization manage its
cybersecurity risks. Its components are a hierarchy of Functions, Categories, and Subcategories that detail each
outcome.
CSF Function: The highest level of organization for cybersecurity outcomes. There are six CSF Functions:
Govern, Identify, Protect, Detect, Respond, and Recover.
CSF Category: A group of related cybersecurity outcomes that collectively comprise a CSF Function.
CSF Subcategory: A group of more specific outcomes of technical and management cybersecurity activities
that comprise a CSF Category.
See also:
CSF 2.0 Informative References and Implementation Examples - https://www.nist.gov/informative-references
1. GV.OC-01: The organizational mission is understood 4.1 Understanding the organization and its context
and informs cybersecurity risk management 4.2 Understanding the needs and expectations of
interested parties
4.3 Determining the scope of the information security
management system
4.4 Information security management system
5.2 Policy
2. GV.OC-02: Internal and external stakeholders are 4.2 Understanding the needs and expectations of
understood, and their needs and expectations interested parties
regarding cybersecurity risk management are
understood and considered A.5.5. Contact with authorities
A.5.6. Contact with special interest groups
3. GV.OC-03: Legal, regulatory, and contractual 4.1 Understanding the organization and its context
requirements regarding cybersecurity — including 4.2 Understanding the needs and expectations of
privacy and civil liberties obligations — are interested parties
understood and managed
A.5.31. Legal, statutory, regulatory and contractual
requirements
A.5.32. Intellectual property rights
A.5.34. Privacy and protection of PII
4. GV.OC-04: Critical objectives, capabilities, and 4.2 Understanding the needs and expectations of
services that external stakeholders depend on or interested parties
expect from the organization are understood and 7.4 Communication
communicated
5. GV.OC-05: Outcomes, capabilities, and services that 4.2 Understanding the needs and expectations of
the organization depends on are understood and interested parties
communicated 7.4 Communication
8.1 Operational planning and control
A.6.1. Screening
A.6.2. Terms and conditions of employment
A.6.3. Information security awareness, educationand
training
A.6.4. Disciplinary process
A.6.5. Responsibilities after termination or change of
employment
A.6.6. Confidentiality or non-disclosure agreements
Policy (GV.PO):
Organizational cybersecurity policy is established, communicated, and enforced
39. ID.RA-01: Vulnerabilities in assets are identified, A.8.8. Management of technical vulnerabilities
validated, and recorded
49. ID.IM-01: Improvements are identified from 9.1 Monitoring, measurement, analysis and evaluation
evaluations 10.1 Continual improvement
50. ID.IM-02: Improvements are identified from security 9.2 Internal audit
tests and exercises, including those done in 10.2 Nonconformity and corrective action
coordination with suppliers and relevant third parties
A.5.35. Independent review of information security
A.5.36. Compliance with policies, rules and standards for
information security
51. ID.IM-03: Improvements are identified from 9.2 Internal audit
execution of operational processes, procedures, and 10.2 Nonconformity and corrective action
activities
A.5.35. Independent review of information security
A.5.36. Compliance with policies, rules and standards for
information security
52. ID.IM-04: Incident response plans and other A.5.24. Information security incident management
cybersecurity plans that affect operations are planning and preparation
established, communicated, maintained, and
improved
53. PR.AA-01: Identities and credentials for authorized A.5.15. Access control
users, services, and hardware are managed by the A.5.16. Identity management
organization A.5.17. Authentication information
A.5.18. Access rights
A.8.2. Privileged access rights
A.8.3. Information access restriction
A.8.4. Access to source code
A.8.5. Secure authentication
54. PR.AA-02: Identities are proofed and bound to A.5.16. Identity management
credentials based on the context of interactions
55. PR.AA-03: Users, services, and hardware are A.5.17. Authentication information
authenticated A.8.5. Secure authentication
56. PR.AA-04: Identity assertions are protected, A.5.16. Identity management
conveyed, and verified A.8.11. Data masking
57. PR.AA-05: Access permissions, entitlements, and A.5.3. Segregation of duties
authorizations are defined in a policy, managed, A.5.18. Access rights
enforced, and reviewed, and incorporate the A.8.2. Privileged access rights
principles of least privilege and separation of duties
A.8.3. Information access restriction
58. PR.AA-06: Physical access to assets is managed, A.5.37. Documented operating procedures
monitored, and enforced commensurate with risk A.7.1. Physical security perimeter
A.7.2. Physical entry
A.7.3. Securing offices, rooms and facilities
A.7.4. Physical security monitoring
A.7.6. Working in secure areas
Awareness and Training (PR.AT):
The organization’s personnel are provided with cybersecurity awareness and training so that they can perform their cybersecurity-related tasks
59. PR.AT-01: Personnel are provided with awareness 7.2 Competence
and training so that they possess the knowledge and 7.3 Awareness
skills to perform general tasks with cybersecurity
risks in mind
A.6.3. Information security awareness, education and
training
60. PR.AT-02: Individuals in specialized roles are 7.2 Competence
provided with awareness and training so that they 7.3 Awareness
possess the knowledge and skills to perform
relevant tasks with cybersecurity risks in mind
A.6.3. Information security awareness, education and
training
Data Security (PR.DS):
Data are managed consistent with the organization’s risk strategy to protect the confidentiality, integrity, and availability of information
61. PR.DS-01: The confidentiality, integrity, and A.8.1. User end point devices
availability of data-at-rest are protected A.8.3. Information access restriction
A.8.4. Access to source code
A.8.7. Protection against malware
A.8.10. Information deletion
A.8.11. Data masking
A.8.12. Data leakage prevention
A.8.18. Use of privileged utility programs
A.8.19. Installation of software on operational systems
A.8.24. Use of cryptography
A.8.26. Application security requirements
A.8.32. Change management
65. PR.PS-01: Configuration management practices are A.5.37. Documented operating procedures
established and applied A.8.9. Configuration management
A.8.32. Change management
66. PR.PS-02: Software is maintained, replaced, and A.5.37. Documented operating procedures
removed commensurate with risk A.8.9. Configuration management
A.8.18. Use of privileged utility programs
A.8.19. Installation of software on operational systems
A.8.32. Change management
67. PR.PS-03: Hardware is maintained, replaced, and A.5.37. Documented operating procedures
removed commensurate with risk A.7.6. Working in secure areas
A.7.7. Clear desk and clear screen
A.7.8. Equipment siting and protection
A.7.13. Equipment maintenance
A.7.14. Secure disposal or re-use of equipment
A.8.32. Change management
68. PR.PS-04: Log records are generated and made A.5.37. Documented operating procedures
available for continuous monitoring A.8.15. Logging
A.8.16. Monitoring activities
A.8.17. Clock synchronization
69. PR.PS-05: Installation and execution of unauthorized A.5.37. Documented operating procedures
software are prevented A.8.2. Privileged access rights
A.8.7. Protection against malware
A.8.18. Use of privileged utility programs
A.8.19. Installation of software on operational systems
75. DE.CM-01: Networks and network services are A.5.25. Assessment and decision on information security
monitored to find potentially adverse events events
A.5.37. Documented operating procedures
A.8.16. Monitoring activities
76. DE.CM-02: The physical environment is monitored to A.5.37. Documented operating procedures
find potentially adverse events A.7.4. Physical security monitoring
77. DE.CM-03: Personnel activity and technology usage A.5.37. Documented operating procedures
are monitored to find potentially adverse events A.6.8. Information security event reporting
A.8.12. Data leakage prevention
A.8.16. Monitoring activities
80. DE.AE-02: Potentially adverse events are analyzed A.5.7. Threat intelligence
to better understand associated activities A.5.25. Assessment and decision on information security
events
81. DE.AE-03: Information is correlated from multiple A.6.8. Information security event reporting
sources A.8.15. Logging
A.8.16. Monitoring activities
82. DE.AE-04: The estimated impact and scope of A.5.25. Assessment and decision on information security
adverse events are understood events
83. DE.AE-06: Information on adverse events is A.5.7. Threat intelligence
provided to authorized staff and tools A.5.24. Information security incident management
planning and preparation
84. DE.AE-07: Cyber threat intelligence and other A.5.7. Threat intelligence
contextual information are integrated into the A.5.25. Assessment and decision on information security
analysis events
85. DE.AE-08: Incidents are declared when adverse A.5.25. Assessment and decision on information security
events meet the defined incident criteria events
Incident Management (RS.MA):
Responses to detected cybersecurity incidents are managed
86. RS.MA-01: The incident response plan is executed in A.5.26. Response to information security incidents
coordination with relevant third parties once an A.5.37. Documented operating procedures
incident is declared
87. RS.MA-02: Incident reports are triaged and validated A.5.26. Response to information security incidents
A.5.27. Learning from information security incidents
A.5.28. Collection of evidence
88. RS.MA-03: Incidents are categorized and prioritized A.5.25. Assessment and decision on information security
events
A.5.26. Response to information security incidents
89. RS.MA-04: Incidents are escalated or elevated as A.5.26. Response to information security incidents
needed
90. RS.MA-05: The criteria for initiating incident A.5.24. Information security incident management
recovery are applied planning and preparation
A.5.26. Response to information security incidents
Incident Analysis (RS.AN):
Investigations are conducted to ensure effective response and support forensics and recovery activities
91. RS.AN-03: Analysis is performed to establish what A.5.27. Learning from information security incidents
has taken place during an incident and the root
cause of the incident
92. RS.AN-06: Actions performed during an investigation A.5.27. Learning from information security incidents
are recorded, and the records’ integrity and A.5.28. Collection of evidence
provenance are preserved
93. RS.AN-07: Incident data and metadata are collected, A.5.27. Learning from information security incidents
and their integrity and provenance are preserved A.5.28. Collection of evidence
97. RS.MI-01: Incidents are contained A.5.26. Response to information security incidents
98. RS.MI-02: Incidents are eradicated A.5.26. Response to information security incidents
Incident Recovery Plan Execution (RC.RP):
Restoration activities are performed to ensure operational availability of systems and services affected by cybersecurity incidents
99. RC.RP-01: The recovery portion of the incident A.5.26. Response to information security incidents
response plan is executed once initiated from the
incident response process
100. RC.RP-02: Recovery actions are selected, scoped, A.5.26. Response to information security incidents
prioritized, and performed
101. RC.RP-03: The integrity of backups and other A.5.30. ICT readiness for business continuity
restoration assets is verified before using them for A.5.37. Documented operating procedures
restoration A.8.13. Information backup
102. RC.RP-04: Critical mission functions and A.5.30. ICT readiness for business continuity
cybersecurity risk management are considered to
establish post-incident operational norms
103. RC.RP-05: The integrity of restored assets is A.5.30. ICT readiness for business continuity
verified, systems and services are restored, and A.5.37. Documented operating procedures
normal operating status is confirmed A.8.13. Information backup
104. RC.RP-06: The end of incident recovery is declared A.5.26. Response to information security incidents
based on criteria, and incident-related A.5.27. Learning from information security incidents
documentation is completed
Incident Recovery Communication (RC.CO):
Restoration activities are coordinated with internal and external parties