CAF Outcome B1.b: Policy and Process Implementation
From the UK NCSC's Cyber Assessment Framework (version 3.1):
You have successfully implemented your security policies and processes and can demonstrate the security benefits achieved.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
NCSC CAF Mapped to NIST CSF
B1.b: Policy and Process Implementation to CSF mappings generated from UK Cabinet Office table.
ATT&CK Mitigations
MITRE ATT&CK mitigations which map to this CAF outcome, based on mappings by Ofgem.
Related ISA/IEC 62443 Controls
Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CAF outcome, taken from mappings by Ofgem.
-
System use notification (SR 1.12)
ISA/IEC 62443-3-3:2013 -
Document and communicate security expectations and responsibilities (4.3.3.2.5)
ISA/IEC 62443-2-1:2009 -
Communicate the policies and procedures to the organisation (4.3.2.6.6)
ISA/IEC 62443-2-1:2009 -
Establish complimentary physical and cyber security policies (4.3.3.3.1)
ISA/IEC 62443-2-1:2009 -
Identify and implement corrective and preventive actions (4.4.3.4)
ISA/IEC 62443-2-1:2009 -
Require employees to follow security procedures (4.3.3.3.5)
ISA/IEC 62443-2-1:2009 -
Define cyber security policies and procedure compliance requirements (4.3.2.6.4)
ISA/IEC 62443-2-1:2009
Related ISO 27001 Controls
Clauses and controls from ISO 27001 (2013) which are related to this CAF outcome, taken from mappings by Ofgem.
-
Working in secure areas (11.1.5)
ISO 27001:2013 -
Teleworking (6.2.2)
ISO 27001:2013 -
Clear desk and clear screen policy (11.2.9)
ISO 27001:2013 -
Access control policy (9.1.1)
ISO 27001:2013 -
Secure system engineering principles (14.2.5)
ISO 27001:2013 -
Information access restriction (9.4.1)
ISO 27001:2013 -
Handling of assets (8.2.3)
ISO 27001:2013 -
Management of secret authentication information of users (9.2.4)
ISO 27001:2013 -
Acceptable use of assets (8.1.3)
ISO 27001:2013 -
Key management (10.1.2)
ISO 27001:2013 -
Information transfer policies and procedures (13.2.1)
ISO 27001:2013 -
User access provisioning (9.2.2)
ISO 27001:2013 -
Collection of evidence (16.1.7)
ISO 27001:2013 -
Labelling of information (8.2.2)
ISO 27001:2013 -
Documented operating procedures (12.1.1)
ISO 27001:2013 -
Mobile Device Policy (6.2.1)
ISO 27001:2013 -
Management responsibilities (7.2.1)
ISO 27001:2013 -
Secure log-on procedures (9.4.2)
ISO 27001:2013 -
Use of secret authentication information (9.3.1)
ISO 27001:2013 -
Secure development policy (14.2.1)
ISO 27001:2013 -
Disciplinary process (7.2.3)
ISO 27001:2013 -
Management of removable media (8.3.1)
ISO 27001:2013 -
Compliance with security policies and standards (18.2.2)
ISO 27001:2013 -
Policy on the use of cryptographic controls (10.1.1)
ISO 27001:2013 -
User registration and de-registration (9.2.1)
ISO 27001:2013 -
Policies for information Security (5.1.1)
ISO 27001:2013
Related SP800-53 Controls
Generated from NISTs SP800-53/CSF Crosswalk mappings.
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against. This is based on the above mappings to ATT&CK mitigations by Ofgem.