CAF Outcome B6.a: Cyber Security Culture

From the UK NCSC's Cyber Assessment Framework (version 3.1):

You develop and pursue a positive cyber security culture.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

NCSC CAF Mapped to NIST CSF

B6.a: Cyber Security Culture to CSF mappings generated from UK Cabinet Office table.

Related ISA/IEC 62443 Controls

Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CAF outcome, taken from mappings by Ofgem.

  • Educate employees on reporting cyber security incidents (4.3.4.5.4)
    ISA/IEC 62443-2-1:2009
  • Document and communicate security expectations and responsibilities (4.3.3.2.5)
    ISA/IEC 62443-2-1:2009
  • Report cyber security incidents in a timely manner (4.3.4.5.5)
    ISA/IEC 62443-2-1:2009
  • Establish a reporting procedure for unusual activities and events (4.3.4.5.3)
    ISA/IEC 62443-2-1:2009

Related ISO 27001 Controls

Clauses and controls from ISO 27001 (2013) which are related to this CAF outcome, taken from mappings by Ofgem.

  • Management responsibilities (7.2.1)
    ISO 27001:2013
  • Information security, awareness, education, and training (7.2.2)
    ISO 27001:2013
  • Reporting information security weaknesses (16.1.3)
    ISO 27001:2013
  • Reporting information security events (16.1.2)
    ISO 27001:2013

Related SP800-53 Controls

Generated from NISTs SP800-53/CSF Crosswalk mappings.