CAF Outcome B3.d: Mobile Data
From the UK NCSC's Cyber Assessment Framework (version 3.1):
You have protected data important to the operation of the essential function on mobile devices.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
NCSC CAF Mapped to NIST CSF
B3.d: Mobile Data to CSF mappings generated from UK Cabinet Office table.
Control ID | Description |
---|---|
ID.AM-4 | External information systems are catalogued |
PR.IP-6 | Data is destroyed according to policy |
PR.DS-3 | Assets are formally managed throughout removal, transfers, and disposition |
DE.CM-5 | Unauthorized mobile code is detected |
PR.PT-2 | Removable media is protected and its use restricted according to policy |
Related ISO 27001 Controls
Clauses and controls from ISO 27001 (2013) which are related to this CAF outcome, taken from mappings by Ofgem.
-
Physical media transfer (8.3.3)
ISO 27001:2013
Related SP800-53 Controls
Generated from NISTs SP800-53/CSF Crosswalk mappings.