CAF Outcome B6.a: Cyber Security Culture

From the UK NCSC's Cyber Assessment Framework (version 3.1):

You develop and pursue a positive cyber security culture.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

NCSC CAF Mapped to NIST CSF

B6.a: Cyber Security Culture to CSF mappings generated from UK Cabinet Office table.

Control ID Description
RS.CO-2 Incidents are reported consistent with established criteria
PR.AT-2 Privileged users understand their roles and responsibilities
PR.AT-4 Senior executives understand their roles and responsibilities
RS.CO-3 Information is shared consistent with response plans
ID.BE-3 Priorities for organizational mission, objectives, and activities are established and communicated
DE.DP-4 Event detection information is communicated
PR.AT-5 Physical and cybersecurity personnel understand their roles and responsibilities
PR.IP-11 Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening)
DE.DP-1 Roles and responsibilities for detection are well defined to ensure accountability
ID.GV-2 Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners
PR.AT-1 All users are informed and trained

Related ISA/IEC 62443 Controls

Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CAF outcome, taken from mappings by Ofgem.

  • Educate employees on reporting cyber security incidents (4.3.4.5.4)
    ISA/IEC 62443-2-1:2009
  • Document and communicate security expectations and responsibilities (4.3.3.2.5)
    ISA/IEC 62443-2-1:2009
  • Report cyber security incidents in a timely manner (4.3.4.5.5)
    ISA/IEC 62443-2-1:2009
  • Establish a reporting procedure for unusual activities and events (4.3.4.5.3)
    ISA/IEC 62443-2-1:2009

Related ISO 27001 Controls

Clauses and controls from ISO 27001 (2013) which are related to this CAF outcome, taken from mappings by Ofgem.

  • Management responsibilities (7.2.1)
    ISO 27001:2013
  • Information security, awareness, education, and training (7.2.2)
    ISO 27001:2013
  • Reporting information security weaknesses (16.1.3)
    ISO 27001:2013
  • Reporting information security events (16.1.2)
    ISO 27001:2013

Related SP800-53 Controls

Generated from NISTs SP800-53/CSF Crosswalk mappings.