NCSC CAF to NIST Mappings

Mappings to NIST CSF are taken from the mapping spreadsheet available at UK Government Security whilst mappings from CSF to SP800-53 are from NIST.

Explore the CAF further here.

CAF ID CAF Outcome NIST CSF NIST SP800-53 Controls
A1.a Board Direction ID.RM-2, ID.BE-3, ID.GV-4 PM-9, SA-14, PM-11, SA-2, PM-3, PM-10, PM-7
A1.b Roles and Responsibilities ID.GV-2, PR.AT-5, DE.DP-1, PR.AT-3, ID.GV-4, PR.AT-1, RS.CO-1, PR.AT-2, ID.AM-6, PR.AT-4 PS-7, PM-2, PM-1, PM-13, AT-3, IR-2, CA-7, CA-2, PM-14, SA-16, SA-9, SA-2, PM-3, PM-10, PM-7, PM-9, PM-11, AT-2, CP-2, IR-3, IR-8, CP-3
A1.c Decision-making ID.RM-2, ID.GV-4, ID.RM-1, ID.GV-2 PM-9, SA-2, PM-3, PM-10, PM-7, PM-11, PS-7, PM-2, PM-1
A2.a Risk Management Process ID.GV-4, ID.RM-2, ID.RA-3, RS.MI-3, ID.RA-4, ID.RA-6, ID.BE-2, PR.IP-2, ID.RM-3, ID.RA-1, ID.RM-1, DE.AE-4 SA-2, PM-3, PM-10, PM-7, PM-9, PM-11, PM-16, PM-12, SI-5, RA-3, RA-5, CA-7, RA-2, SA-14, PM-4, PM-8, SA-8, SI-14, SI-13, SA-10, SA-11, SA-3, SA-12, SI-12, SI-17, SA-17, SI-16, PL-8, SA-4, SA-15, SI-2, SI-4, SA-5, CA-8, CA-2, CP-2, IR-4
A2.b Assurance ID.RA-5, DE.DP-2, DE.DP-3, ID.RA-1, ID.RA-6, ID.GV-4, PR.IP-12 RA-3, RA-2, PM-16, SA-18, CA-7, PM-14, CA-2, AC-25, SI-4, PE-3, SI-3, RA-5, SI-2, SI-5, SA-5, CA-8, SA-11, PM-9, PM-4, SA-2, PM-3, PM-10, PM-7, PM-11
A3.a Asset Management PR.AC-2, PR.IP-6, PR.IP-5, PR.DS-4, PR.DS-3, ID.AM-2, ID.AM-1, PR.MA-1, ID.AM-5, ID.BE-4 PE-8, PE-5, PE-3, PE-6, PE-4, PE-2, MP-6, PE-13, PE-14, PE-15, PE-10, PE-18, PE-12, SC-5, CP-2, AU-4, CM-8, PE-16, PM-5, MA-3, MA-5, MA-2, MA-6, SA-14, RA-2, SC-6, CP-8, PE-11, PE-9, PM-8
A4.a Supply Chain ID.SC-4, RS.MI-1, RS.CO-4, ID.RA-4, PR.AC-3, RS.MI-2, ID.SC-2, DE.AE-1, PR.AT-2, DE.DP-4, RS.CO-3, ID.SC-5, DE.CM-6, DE.DP-1, ID.GV-2, ID.AM-6, RS.CO-1, ID.BE-1, ID.SC-1, ID.AM-3, ID.SC-3, PR.AT-3, PR.MA-2, DE.CM-7 SA-12, SA-9, AU-12, AU-2, PS-7, AU-16, AU-6, IR-4, IR-8, CP-2, PM-11, RA-3, PM-9, RA-2, SA-14, SC-15, AC-1, AC-20, AC-17, AC-19, SA-15, SI-4, CA-3, CM-2, AC-4, AT-3, PM-13, RA-5, CA-2, CA-7, PE-6, IR-3, IR-6, CP-4, IR-9, SA-4, PM-14, PM-2, PM-1, CP-3, PL-8, CA-9, SA-11, SA-16, MA-4, CM-3, PE-3, PE-20, CM-8
B1.a Policy and Process Development RS.AN-5, PR.IP-7, RC.IM-1, DE.DP-2, RC.IM-2 PM-15, SI-5, PM-6, CP-2, IR-8, CA-2, CA-7, PL-2, IR-4, SA-18, PM-14, AC-25, SI-4
B1.b Policy and Process Implementation PR.IP-8, RS.CO-1, PR.IP-11, RC.CO-3, ID.GV-2, PR.AT-1 SI-4, CA-7, AC-21, CP-2, IR-3, IR-8, CP-3, PS-3, PS-6, PS-7, PS-2, SA-21, PS-1, PS-8, PS-4, PS-5, IR-4, PM-2, PM-1, PM-13, AT-2
B2.a Identity Verification, Authentication and Authorisation PR.DS-5, PR.AC-1, PR.AC-7, PR.AC-4, PR.AC-6, PR.AC-3, DE.AE-1, PR.PT-3, PR.MA-2, DE.CM-2 PE-19, SC-31, AC-5, AC-6, AC-4, SI-4, SC-7, PS-6, SC-13, SC-8, PS-3, AC-2, IA-1, AC-1, IA-7, IA-11, IA-8, IA-6, IA-9, IA-3, IA-4, IA-5, IA-10, IA-2, AC-14, AC-9, AC-12, AC-8, AC-7, AC-11, AC-24, AC-3, AC-16, AC-19, PE-2, SC-15, AC-20, AC-17, CA-3, CM-2, CM-7, MA-4, PE-3, CA-7, PE-6, PE-20
B2.b Device Management PR.MA-2, PR.AC-1, PR.AC-3, DE.CM-6, PR.AC-4, PR.AC-7, PR.PT-3 MA-4, AC-2, IA-1, AC-1, IA-7, IA-11, IA-8, IA-6, IA-9, IA-3, IA-4, IA-5, IA-10, IA-2, SC-15, AC-20, AC-17, AC-19, SA-9, PS-7, SA-4, SI-4, CA-7, AC-24, AC-3, AC-5, AC-14, AC-6, AC-16, AC-9, AC-12, AC-8, AC-7, AC-11, CM-7
B2.c Privileged User Management DE.CM-3, PR.MA-2, PR.AC-5, DE.CM-6, RS.AN-1, PR.AC-3, PR.PT-3, PR.AC-6, PR.AC-1, PR.AC-7, PR.DS-5, PR.AC-4, DE.CM-7 AU-12, CM-10, CA-7, AC-2, CM-11, AU-13, MA-4, SC-7, AC-4, AC-10, SA-9, PS-7, SA-4, SI-4, IR-5, PE-6, IR-4, AU-6, SC-15, AC-1, AC-20, AC-17, AC-19, CM-7, AC-3, IA-5, IA-2, IA-4, PE-2, PS-3, AC-24, AC-16, IA-1, IA-8, IA-7, IA-11, IA-6, IA-9, IA-3, IA-10, AC-14, AC-9, AC-12, AC-8, AC-7, AC-11, PE-19, SC-31, AC-5, AC-6, PS-6, SC-13, SC-8, CM-3, PE-3, PE-20, CM-8
B2.d Identity and Access Management (IdAM) DE.CM-7, PR.IP-11, PR.AC-6, PR.AC-4, PR.MA-2, DE.CM-3, DE.AE-3, DE.CM-1, PR.DS-5, PR.PT-3, PR.AC-1, RS.AN-1, PR.AC-7 CM-3, CA-7, PE-3, PE-20, PE-6, AU-12, CM-8, SI-4, PS-3, PS-6, PS-7, PS-2, SA-21, PS-1, PS-8, PS-4, PS-5, IA-5, AC-19, IA-2, IA-4, AC-3, PE-2, AC-1, AC-24, AC-2, AC-16, IA-1, IA-8, AC-5, AC-14, AC-6, MA-4, CM-10, CM-11, AU-13, IR-4, AU-6, IR-5, IR-8, SC-5, SC-7, PE-19, SC-31, AC-4, SC-13, SC-8, CM-7, IA-7, IA-11, IA-6, IA-9, IA-3, IA-10, AC-9, AC-12, AC-8, AC-7, AC-11
B3.a Understanding Data PR.IP-6, ID.RA-3, PR.DS-5, ID.AM-4, PR.PT-2, ID.BE-4, ID.AM-2, ID.AM-3, PR.DS-4, ID.AM-1 MP-6, PM-16, PM-12, SI-5, RA-3, PE-19, SC-31, AC-5, AC-6, AC-4, SI-4, SC-7, PS-6, SC-13, SC-8, PS-3, SA-9, AC-20, MP-5, MP-4, MP-3, MP-8, MP-2, MP-7, SA-14, CP-8, PE-11, PE-9, PM-8, PM-5, CM-8, PL-8, CA-9, CA-3, SC-5, CP-2, AU-4
B3.b Data in Transit PR.DS-2, DE.AE-1, PR.DS-5, PR.IP-5, PR.DS-4, PR.DS-6, PR.AC-5, PR.PT-5, ID.BE-4, PR.PT-4, ID.AM-3 SC-11, SC-8, SC-12, SI-4, CA-3, CM-2, AC-4, PE-19, SC-31, AC-5, AC-6, SC-7, PS-6, SC-13, PS-3, PE-13, PE-14, PE-15, PE-10, PE-18, PE-12, SC-5, CP-2, AU-4, SC-16, SI-7, AC-10, SC-6, CP-8, CP-11, CP-13, PL-8, SA-14, CP-7, PE-11, PE-9, PM-8, SC-37, SC-36, SC-40, SC-25, SC-32, SC-20, SC-22, AC-18, SC-19, SC-23, SC-41, SC-39, AC-17, SC-29, SC-21, SC-24, SC-38, SC-43, CA-9
B3.c Stored Data PR.PT-2, PR.AC-2, PR.IP-5, PR.IP-4, PR.PT-5, PR.DS-5, PR.DS-1, PR.AC-7 MP-5, MP-4, MP-3, MP-8, MP-2, MP-7, PE-8, PE-5, PE-3, PE-6, PE-4, PE-2, PE-13, PE-14, PE-15, PE-10, PE-18, PE-12, CP-4, CP-6, CP-9, SC-6, CP-8, CP-11, CP-13, PL-8, SA-14, CP-7, PE-19, SC-31, AC-5, AC-6, AC-4, SI-4, SC-7, PS-6, SC-13, SC-8, PS-3, SC-12, SC-28, IA-4, IA-1, AC-14, AC-9, IA-10, AC-12, IA-3, IA-5, AC-8, IA-9, IA-11, AC-7, IA-2, AC-11, IA-8
B3.d Mobile Data ID.AM-4, PR.IP-6, PR.DS-3, DE.CM-5, PR.PT-2 SA-9, AC-20, MP-6, CM-8, PE-16, SC-18, SI-4, SC-44, MP-5, MP-4, MP-3, MP-8, MP-2, MP-7
B3.e Media Equipment Sanitisation PR.IP-6, PR.DS-3, PR.PT-2 MP-6, CM-8, PE-16, MP-5, MP-4, MP-3, MP-8, MP-2, MP-7
B4.a Secure by Design PR.PT-4, PR.PT-5, DE.CM-4, RS.MI-2, PR.DS-5, PR.DS-1, PR.DS-2, DE.CM-7, PR.DS-7, DE.CM-6, RS.MI-1, PR.IP-2, PR.DS-6, PR.AC-5, DE.AE-1 SC-37, SC-36, AC-4, SC-40, SC-25, SC-32, SC-20, SC-22, AC-18, SC-19, SC-23, SC-41, SC-39, AC-17, SC-29, SC-7, SC-21, SC-24, CP-8, SC-38, SC-43, SC-6, CP-11, CP-13, PL-8, SA-14, CP-7, SI-8, SI-3, IR-4, PE-19, SC-31, AC-5, AC-6, SI-4, PS-6, SC-13, SC-8, PS-3, SC-12, MP-8, SC-28, SC-11, CM-3, CA-7, PE-3, PE-20, PE-6, AU-12, CM-8, CM-2, SA-9, PS-7, SA-4, SA-8, SI-14, SI-13, SA-10, SA-11, SA-3, SA-12, SI-12, SI-17, SA-17, SI-16, SA-15, SC-16, SI-7, AC-10, CA-3
B4.b Secure Configuration PR.IP-12, PR.PT-4, PR.DS-5, DE.CM-5, ID.AM-4, PR.DS-6, PR.IP-3, RS.AN-5, PR.IP-1, PR.MA-1, PR.DS-8, PR.AC-5, DE.AE-1 RA-5, RA-3, SI-2, SC-37, SC-36, AC-4, SC-40, SC-25, SC-32, SC-20, SC-22, AC-18, SC-19, SC-23, SC-41, SC-39, AC-17, SC-29, SC-7, SC-21, SC-24, CP-8, SC-38, SC-43, PE-19, SC-31, AC-5, AC-6, SI-4, PS-6, SC-13, SC-8, PS-3, SC-18, SC-44, SA-9, AC-20, SC-16, SI-7, CM-3, CM-4, SA-10, PM-15, SI-5, CM-5, CM-9, CM-7, CM-2, CM-6, MA-3, MA-5, MA-2, MA-6, AC-10, CA-3
B4.c Secure Management PR.DS-5, DE.CM-7, PR.MA-1, DE.CM-4, PR.PT-4, RS.MI-1, DE.CM-5, PR.IP-1, PR.AC-7, RS.MI-2, PR.DS-6 PE-19, SC-31, AC-5, AC-6, AC-4, SI-4, SC-7, PS-6, SC-13, SC-8, PS-3, CM-3, CA-7, PE-3, PE-20, PE-6, AU-12, CM-8, MA-3, MA-5, MA-2, MA-6, SI-8, SI-3, SC-37, SC-36, SC-40, SC-25, SC-32, SC-20, SC-22, AC-18, SC-19, SC-23, SC-41, SC-39, AC-17, SC-29, SC-21, SC-24, CP-8, SC-38, SC-43, IR-4, SC-18, SC-44, CM-5, CM-4, CM-9, CM-7, CM-2, SA-10, CM-6, IA-4, IA-1, AC-14, AC-9, IA-10, AC-12, IA-3, IA-5, AC-8, IA-9, IA-11, AC-7, IA-2, AC-11, IA-8, SC-16, SI-7
B4.d Vulnerability Management PR.DS-6, DE.CM-4, DE.CM-8, ID.RA-1, RS.MI-2, RS.MI-1, ID.RA-3, PR.IP-12, PR.PT-4, PR.IP-3, RS.MI-3, PR.DS-8, ID.RA-5, PR.IP-1, RS.AN-5, DE.DP-3 SC-16, SI-7, SI-8, SI-3, RA-5, SI-2, SI-5, SI-4, SA-5, RA-3, CA-8, SA-11, CA-2, CA-7, IR-4, PM-16, PM-12, SC-37, SC-36, AC-4, SC-40, SC-25, SC-32, SC-20, SC-22, AC-18, SC-19, SC-23, SC-41, SC-39, AC-17, SC-29, SC-7, SC-21, SC-24, CP-8, SC-38, SC-43, CM-3, CM-4, SA-10, RA-2, CM-5, CM-9, CM-7, CM-2, CM-6, PM-15, PM-14, PE-3
B5.a Resilience Preparation PR.IP-9, DE.CM-4, RS.MI-1, RS.CO-1, PR.PT-5, ID.SC-5, PR.IP-4, PR.IP-10, PR.IP-3, ID.RA-2, RS.AN-5 IR-8, CP-2, PE-17, IR-7, CP-7, CP-13, CP-12, IR-9, SI-8, SI-3, IR-4, IR-3, CP-3, SC-6, CP-8, CP-11, PL-8, SA-14, IR-6, CP-4, CP-6, CP-9, PM-14, CM-3, CM-4, SA-10, PM-16, PM-15, SI-5
B5.b Design for Resilience PR.PT-5, PR.DS-4, PR.IP-5, PR.DS-5, PR.DS-7, PR.AC-5, ID.BE-4, PR.DS-2, RS.MI-1, PR.AC-2, RS.MI-2 SC-6, CP-8, CP-11, CP-13, PL-8, SA-14, CP-7, SC-5, CP-2, AU-4, PE-13, PE-14, PE-15, PE-10, PE-18, PE-12, PE-19, SC-31, AC-5, AC-6, AC-4, SI-4, SC-7, PS-6, SC-13, SC-8, PS-3, CM-2, AC-10, PE-11, PE-9, PM-8, SC-11, SC-12, IR-4, PE-8, PE-5, PE-3, PE-6, PE-4, PE-2
B5.c Backups PR.PT-5, PR.IP-4 SC-6, CP-8, CP-11, CP-13, PL-8, SA-14, CP-7, CP-4, CP-6, CP-9
B6.a Cyber Security Culture RS.CO-2, PR.AT-2, PR.AT-4, RS.CO-3, ID.BE-3, DE.DP-4, PR.AT-5, PR.IP-11, DE.DP-1, ID.GV-2, PR.AT-1 IR-8, AU-6, IR-6, AT-3, PM-13, RA-5, IR-4, CA-2, CP-2, PE-6, CA-7, SI-4, SA-14, PM-11, IR-2, PS-3, PS-6, PS-7, PS-2, SA-21, PS-1, PS-8, PS-4, PS-5, PM-14, PM-2, PM-1, AT-2
B6.b Cyber Security Training DE.DP-1, PR.AT-2, PR.AT-4, PR.AT-5, PR.AT-1, PR.IP-11 CA-7, CA-2, PM-14, AT-3, PM-13, IR-2, AT-2, PS-3, PS-6, PS-7, PS-2, SA-21, PS-1, PS-8, PS-4, PS-5
C1.a Monitoring Coverage DE.CM-7, DE.CM-4, DE.CM-1, DE.CM-5, DE.AE-1, DE.AE-3, DE.CM-6, DE.CM-3, RS.MI-1, PR.DS-6, DE.CM-2 CM-3, CA-7, PE-3, PE-20, PE-6, AU-12, CM-8, SI-4, SI-8, SI-3, SC-5, SC-7, AC-2, SC-18, SC-44, CA-3, CM-2, AC-4, IR-4, AU-6, IR-5, IR-8, SA-9, PS-7, SA-4, CM-10, CM-11, AU-13, SC-16, SI-7
C1.b Securing Logs DE.AE-3, DE.CM-3 IR-4, AU-6, IR-5, CA-7, SI-4, IR-8, AU-12, CM-10, AC-2, CM-11, AU-13
C1.c Generating Alerts DE.AE-2, DE.CM-2, DE.CM-3, RS.AN-1, DE.AE-5, RS.MI-1, DE.AE-3, DE.CM-1, DE.DP-3, DE.CM-7 CA-7, IR-4, SI-4, AU-6, PE-3, PE-6, PE-20, AU-12, CM-10, AC-2, CM-11, AU-13, IR-5, IR-8, SC-5, SC-7, CM-3, PM-14, SI-3, CA-2, CM-8
C1.d Identifying Security Incidents PR.IP-8, RS.MI-1, RS.AN-5, DE.DP-5, ID.RA-2, DE.DP-4 SI-4, CA-7, AC-21, IR-4, PM-15, SI-5, PM-14, PL-2, RA-5, CA-2, PM-16, AU-6
C1.e Monitoring Tools and Skills RS.CO-3, DE.AE-2, DE.DP-5, RS.CO-2, RS.AN-1 RA-5, IR-4, CA-2, IR-8, CP-2, PE-6, CA-7, SI-4, AU-6, PM-14, PL-2, IR-6, IR-5
C2.a System Abnormalities for Attack Detection
C2.b Proactive Attack Discovery DE.CM-4, DE.CM-5 SI-8, SI-3, SC-18, SI-4, SC-44
D1.a Response Plan PR.IP-9, RS.AN-4, RS.CO-3, RC.CO-3, ID.GV-2, ID.SC-5, RS.CO-4, RC.RP-1, DE.AE-2, RS.CO-1 IR-8, CP-2, PE-17, IR-7, CP-7, CP-13, CP-12, IR-9, IR-5, IR-4, RA-5, CA-2, PE-6, CA-7, SI-4, PS-7, PM-2, PM-1, IR-3, IR-6, CP-4, CP-10, AU-6, CP-3
D1.b Response and Recovery Capability ID.SC-5, PR.IP-9, RS.AN-3, RS.CO-1, PR.PT-5, RS.CO-3 IR-4, IR-3, IR-6, CP-4, IR-8, CP-2, IR-9, PE-17, IR-7, CP-7, CP-13, CP-12, AU-7, CP-3, SC-6, CP-8, CP-11, PL-8, SA-14, RA-5, CA-2, PE-6, CA-7, SI-4
D1.c Testing and Exercising ID.SC-5, RC.IM-2, RC.IM-1, PR.IP-4, PR.IP-10 IR-4, IR-3, IR-6, CP-4, IR-8, CP-2, IR-9, CP-6, CP-9, PM-14
D2.a Incident Root Cause Analysis DE.DP-5, DE.AE-3, RS.AN-2, RS.IM-1, DE.AE-2, RS.CO-3, DE.DP-4 CA-7, PM-14, SI-4, PL-2, RA-5, CA-2, IR-4, AU-6, IR-5, IR-8, CP-2, PE-6
D2.b Using Incidents to Drive Improvements RS.AN-2, DE.DP-5, RC.IM-2, PR.IP-8, RS.IM-2, PR.IP-7, RC.IM-1, RS.IM-1 IR-4, CP-2, CA-7, PM-14, SI-4, PL-2, RA-5, CA-2, IR-8, AC-21, PM-6