CAF Outcome A2.a: Risk Management Process

From the UK NCSC's Cyber Assessment Framework (version 3.1):

Your organisation has effective internal processes for managing risks to the security of network and information systems related to the operation of essential functions and communicating associated activities.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

NCSC CAF Mapped to NIST CSF

A2.a: Risk Management Process to CSF mappings generated from UK Cabinet Office table.

Control ID Description
ID.GV-4 Governance and risk management processes address cybersecurity risks
ID.RM-2 Organizational risk tolerance is determined and clearly expressed
ID.RA-3 Threats, both internal and external, are identified and documented
RS.MI-3 Newly identified vulnerabilities are mitigated or documented as accepted risks
ID.RA-4 Potential business impacts and likelihoods are identified
ID.RA-6 Risk responses are identified and prioritized
ID.BE-2 The organization’s place in critical infrastructure and its industry sector is identified and communicated
PR.IP-2 A System Development Life Cycle to manage systems is implemented
ID.RM-3 The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis
ID.RA-1 Asset vulnerabilities are identified and documented
ID.RM-1 Risk management processes are established, managed, and agreed to by organizational stakeholders
DE.AE-4 Impact of events is determined

ATT&CK Mitigations

MITRE ATT&CK mitigations which map to this CAF outcome, based on mappings by Ofgem.

Related ISA/IEC 62443 Controls

Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CAF outcome, taken from mappings by Ofgem.

  • Integrate physical, HSE and cyber security risk assessments (4.2.3.11)
    ISA/IEC 62443-2-1:2009
  • Assess all the risks of changing the IACS (4.3.4.3.3)
    ISA/IEC 62443-2-1:2009
  • Identify a detailed risk assessment methodology (4.2.3.8)
    ISA/IEC 62443-2-1:2009
  • Conduct a detailed risk assessment (4.2.3.9)
    ISA/IEC 62443-2-1:2009
  • Conduct risk assessments throughout the lifecycle of the IACs (4.2.3.12)
    ISA/IEC 62443-2-1:2009
  • Define the scope of the CSMS (4.3.2.2.1)
    ISA/IEC 62443-2-1:2009
  • Select a risk assessment methodology (4.2.3.1)
    ISA/IEC 62443-2-1:2009
  • Conduct a high-level risk assessment (4.2.3.3)
    ISA/IEC 62443-2-1:2009
  • Identify the reassessment frequency and triggering criteria (4.2.3.10)
    ISA/IEC 62443-2-1:2009
  • Define the scope content (4.3.2.2.2)
    ISA/IEC 62443-2-1:2009
  • Document the Risk Assessment (4.2.3.13)
    ISA/IEC 62443-2-1:2009
  • Manage IACS risk on an ongoing basis (4.3.4.2.1)
    ISA/IEC 62443-2-1:2009
  • Determine the organisations tolerance for risk (4.3.2.6.5)
    ISA/IEC 62443-2-1:2009
  • Review risk tolerance (4.4.3.5)
    ISA/IEC 62443-2-1:2009
  • Employ a common set of countermeasures (4.3.4.2.2)
    ISA/IEC 62443-2-1:2009
  • Provide risk assessment background information (4.2.3.2)
    ISA/IEC 62443-2-1:2009
  • Maintain vulnerability assessment records (4.2.3.14)
    ISA/IEC 62443-2-1:2009
  • Monitor and evaluate industry CSMS strategies (4.4.3.6)
    ISA/IEC 62443-2-1:2009

Related ISO 27001 Controls

Clauses and controls from ISO 27001 (2013) which are related to this CAF outcome, taken from mappings by Ofgem.

  • Information security in project management (6.1.5)
    ISO 27001:2013

Related SP800-53 Controls

Generated from NISTs SP800-53/CSF Crosswalk mappings.

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against. This is based on the above mappings to ATT&CK mitigations by Ofgem.

ATT&CK ID Title Associated Tactics
T1656 Impersonation Defense Evasion
T1210 Exploitation of Remote Services Lateral Movement
T1211 Exploitation for Defense Evasion Defense Evasion
T1212 Exploitation for Credential Access Credential Access
T1068 Exploitation for Privilege Escalation Privilege Escalation