CAF Outcome B1.a: Policy and Process Development

From the UK NCSC's Cyber Assessment Framework (version 3.1):

You have developed and continue to improve a set of cyber security and resilience policies and processes that manage and mitigate the risk of adverse impact on the essential function.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

NCSC CAF Mapped to NIST CSF

B1.a: Policy and Process Development to CSF mappings generated from UK Cabinet Office table.

ATT&CK Mitigations

MITRE ATT&CK mitigations which map to this CAF outcome, based on mappings by Ofgem.

Related ISA/IEC 62443 Controls

Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CAF outcome, taken from mappings by Ofgem.

  • Develop security procedures (4.3.2.6.2)
    ISA/IEC 62443-2-1:2009
  • Define information classification levels (4.3.4.4.2)
    ISA/IEC 62443-2-1:2009
  • Disable access account after failed remote login attempts (4.3.3.6.7)
    ISA/IEC 62443-2-1:2009
  • Establish triggers to evaluate CSMS (4.4.3.3)
    ISA/IEC 62443-2-1:2009
  • Develop a policy for remote login and connections (4.3.3.6.6)
    ISA/IEC 62443-2-1:2009
  • Develop an authentication strategy (4.3.3.6.1)
    ISA/IEC 62443-2-1:2009
  • Develop lifecycle management processes for IACS information (4.3.4.4.1)
    ISA/IEC 62443-2-1:2009
  • Address security responsibilities (4.3.3.2.4)
    ISA/IEC 62443-2-1:2009
  • Evaluate the CSMS periodically (4.4.3.2)
    ISA/IEC 62443-2-1:2009
  • Integrate cyber security and process safety management (PSM) change management procedures (4.3.4.3.5)
    ISA/IEC 62443-2-1:2009
  • Personnel security (4.3.3.2.1)
    ISA/IEC 62443-2-1:2009
  • Request and report employee feedback on security suggestions (4.4.3.8)
    ISA/IEC 62443-2-1:2009
  • Develop security policies (4.3.2.6.1)
    ISA/IEC 62443-2-1:2009
  • Review and maintain policies and procedures (4.3.4.3.6)
    ISA/IEC 62443-2-1:2009
  • Maintain consistency between risk management systems (4.3.2.6.3)
    ISA/IEC 62443-2-1:2009
  • Require security policies for system development or maintenance changes (4.3.4.3.4)
    ISA/IEC 62443-2-1:2009
  • Require re-authentication after remote system inactivity (4.3.3.6.8)
    ISA/IEC 62443-2-1:2009
  • Define an authorization security policy (4.3.3.7.1)
    ISA/IEC 62443-2-1:2009
  • Access accounts implement authorization security policy (4.3.3.5.1)
    ISA/IEC 62443-2-1:2009
  • Ensure appropriate records control (4.3.4.4.4)
    ISA/IEC 62443-2-1:2009
  • Review and update the cyber security policies and procedures (4.3.2.6.7)
    ISA/IEC 62443-2-1:2009

Related ISO 27001 Controls

Clauses and controls from ISO 27001 (2013) which are related to this CAF outcome, taken from mappings by Ofgem.

  • Technical compliance review (18.2.3)
    ISO 27001:2013
  • Policy on the use of cryptographic controls (10.1.1)
    ISO 27001:2013
  • Secure development policy (14.2.1)
    ISO 27001:2013
  • Key management (10.1.2)
    ISO 27001:2013
  • Handling of assets (8.2.3)
    ISO 27001:2013
  • Information backup (12.3.1)
    ISO 27001:2013
  • Labelling of information (8.2.2)
    ISO 27001:2013
  • Regulation of cryptographic controls (18.1.5)
    ISO 27001:2013
  • Implementing information security continuity (17.1.2)
    ISO 27001:2013
  • Intellectual property rights (18.1.2)
    ISO 27001:2013
  • Information security requirements analysis and specification (14.1.1)
    ISO 27001:2013
  • Independent review of information security (18.2.1)
    ISO 27001:2013
  • Identification of applicable legislation and contractual requirements (18.1.1)
    ISO 27001:2013
  • Clear desk and clear screen policy (11.2.9)
    ISO 27001:2013
  • Verify, review, and evaluate information security continuity (17.1.3)
    ISO 27001:2013
  • System acceptance testing (14.2.9)
    ISO 27001:2013
  • Review of the policies for information security (5.1.2)
    ISO 27001:2013
  • Use of secret authentication information (9.3.1)
    ISO 27001:2013
  • Secure system engineering principles (14.2.5)
    ISO 27001:2013
  • Policies for information Security (5.1.1)
    ISO 27001:2013
  • Documented operating procedures (12.1.1)
    ISO 27001:2013
  • Change management (12.1.2)
    ISO 27001:2013
  • Access control policy (9.1.1)
    ISO 27001:2013

Related SP800-53 Controls

Generated from NISTs SP800-53/CSF Crosswalk mappings.

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against. This is based on the above mappings to ATT&CK mitigations by Ofgem.