CAF Outcome D2.b: Using Incidents to Drive Improvements
From the UK NCSC's Cyber Assessment Framework (version 3.1):
Your organisation uses lessons learned from incidents to improve your security measures.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
NCSC CAF Mapped to NIST CSF
D2.b: Using Incidents to Drive Improvements to CSF mappings generated from UK Cabinet Office table.
Control ID | Description |
---|---|
RS.AN-2 | The impact of the incident is understood |
DE.DP-5 | Detection processes are continuously improved |
RC.IM-2 | Recovery strategies are updated |
PR.IP-8 | Effectiveness of protection technologies is shared |
RS.IM-2 | Response strategies are updated |
PR.IP-7 | Protection processes are improved |
RC.IM-1 | Recovery plans incorporate lessons learned |
RS.IM-1 | Response plans incorporate lessons learned |
Related ISA/IEC 62443 Controls
Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CAF outcome, taken from mappings by Ofgem.
-
Document the details of incidents (4.3.4.5.8)
ISA/IEC 62443-2-1:2009 -
Address and correct issues discovered (4.3.4.5.10)
ISA/IEC 62443-2-1:2009
Related ISO 27001 Controls
Clauses and controls from ISO 27001 (2013) which are related to this CAF outcome, taken from mappings by Ofgem.
-
Learning from information security incidents (16.1.6)
ISO 27001:2013
Related SP800-53 Controls
Generated from NISTs SP800-53/CSF Crosswalk mappings.