CAF Outcome A2.b: Assurance
From the UK NCSC's Cyber Assessment Framework (version 3.1):
You have gained confidence in the effectiveness of the security of your technology, people, and processes relevant to essential functions.
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
NCSC CAF Mapped to NIST CSF
A2.b: Assurance to CSF mappings generated from UK Cabinet Office table.
Control ID | Description |
---|---|
ID.RA-5 | Threats, vulnerabilities, likelihoods, and impacts are used to determine risk |
DE.DP-2 | Detection activities comply with all applicable requirements |
DE.DP-3 | Detection processes are tested |
ID.RA-1 | Asset vulnerabilities are identified and documented |
ID.RA-6 | Risk responses are identified and prioritized |
ID.GV-4 | Governance and risk management processes address cybersecurity risks |
PR.PT-1 | Audit/log records are determined, documented, implemented, and reviewed in accordance with policy |
PR.IP-12 | A vulnerability management plan is developed and implemented |
Related ISA/IEC 62443 Controls
Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CAF outcome, taken from mappings by Ofgem.
-
Conduct periodic IACS audits (4.4.2.2)
ISA/IEC 62443-2-1:2009 -
Establish conformance metrics (4.4.2.3)
ISA/IEC 62443-2-1:2009 -
Audit the information and document management process (4.3.4.4.7)
ISA/IEC 62443-2-1:2009 -
Specify the methodology of the audit process (4.4.2.1)
ISA/IEC 62443-2-1:2009
Related ISO 27001 Controls
Clauses and controls from ISO 27001 (2013) which are related to this CAF outcome, taken from mappings by Ofgem.
-
Information systems audit controls (12.7.1)
ISO 27001:2013 -
Technical compliance review (18.2.3)
ISO 27001:2013 -
System security testing (14.2.8)
ISO 27001:2013
Related SP800-53 Controls
Generated from NISTs SP800-53/CSF Crosswalk mappings.