CAF Outcome B4.b: Secure Configuration

From the UK NCSC's Cyber Assessment Framework (version 3.1):

You securely configure the network and information systems that support the operation of essential functions.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

NCSC CAF Mapped to NIST CSF

B4.b: Secure Configuration to CSF mappings generated from UK Cabinet Office table.

ATT&CK Mitigations

MITRE ATT&CK mitigations which map to this CAF outcome, based on mappings by Ofgem.

Related ISA/IEC 62443 Controls

Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CAF outcome, taken from mappings by Ofgem.

  • Strength of password-based authentication (SR 1.7)
    ISA/IEC 62443-3-3:2013
  • Authenticator feedback (SR 1.10)
    ISA/IEC 62443-3-3:2013
  • Mobile code (SR 2.4)
    ISA/IEC 62443-3-3:2013
  • General purpose person-to-person communication restrictions (SR 5.3)
    ISA/IEC 62443-3-3:2013
  • Authenticator management (SR 1.5)
    ISA/IEC 62443-3-3:2013
  • Unsuccessful login attempts (SR 1.11)
    ISA/IEC 62443-3-3:2013
  • Least functionality (SR 7.7)
    ISA/IEC 62443-3-3:2013
  • Input validation (SR 3.5)
    ISA/IEC 62443-3-3:2013
  • Disable access account after failed remote login attempts (4.3.3.6.7)
    ISA/IEC 62443-2-1:2009
  • Identify the industrial automation and control systems (4.2.3.4)
    ISA/IEC 62443-2-1:2009
  • Establish and document a patch management procedure (4.3.4.3.7)
    ISA/IEC 62443-2-1:2009
  • Integrate cyber security and process safety management (PSM) change management procedures (4.3.4.3.5)
    ISA/IEC 62443-2-1:2009
  • Change default passwords (4.3.3.5.7)
    ISA/IEC 62443-2-1:2009
  • Require re-authentication after remote system inactivity (4.3.3.6.8)
    ISA/IEC 62443-2-1:2009
  • Define and test security functions and capabilities (4.3.4.3.1)
    ISA/IEC 62443-2-1:2009
  • Control system component inventory (SR 7.8)
    ISA/IEC 62443-3-3:2013
  • Concurrent session control (SR 2.7)
    ISA/IEC 62443-3-3:2013
  • Network and security configuration settings (SR 7.6)
    ISA/IEC 62443-3-3:2013
  • Wireless use control (SR 2.2)
    ISA/IEC 62443-3-3:2013
  • Session lock (SR 2.5)
    ISA/IEC 62443-3-3:2013
  • Use control for portable and mobile devices (SR 2.3)
    ISA/IEC 62443-3-3:2013
  • Software and information integrity (SR 3.4)
    ISA/IEC 62443-3-3:2013

Related ISO 27001 Controls

Clauses and controls from ISO 27001 (2013) which are related to this CAF outcome, taken from mappings by Ofgem.

  • Restrictions on software installation (12.6.2)
    ISO 27001:2013
  • System changes control procedures (14.2.2)
    ISO 27001:2013
  • Verify, review, and evaluate information security continuity (17.1.3)
    ISO 27001:2013
  • Network controls (13.1.1)
    ISO 27001:2013
  • Technical review of applications after operating platform changes (14.2.3)
    ISO 27001:2013
  • Installation of software on operational systems (12.5.1)
    ISO 27001:2013
  • Restrictions on changes to software packages (14.2.4)
    ISO 27001:2013
  • Controls against malware (12.2.1)
    ISO 27001:2013
  • Secure development environment (14.2.6)
    ISO 27001:2013
  • Change management (12.1.2)
    ISO 27001:2013

Related SP800-53 Controls

Generated from NISTs SP800-53/CSF Crosswalk mappings.

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against. This is based on the above mappings to ATT&CK mitigations by Ofgem.