CAF Outcome D2.a: Incident Root Cause Analysis

From the UK NCSC's Cyber Assessment Framework (version 3.1):

When an incident occurs, steps must be taken to understand its root causes and ensure appropriate remediating action is taken.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

NCSC CAF Mapped to NIST CSF

D2.a: Incident Root Cause Analysis to CSF mappings generated from UK Cabinet Office table.

Control ID Description
DE.DP-5 Detection processes are continuously improved
DE.AE-3 Event data are collected and correlated from multiple sources and sensors
RS.AN-2 The impact of the incident is understood
RS.IM-1 Response plans incorporate lessons learned
DE.AE-2 Detected events are analyzed to understand attack targets and methods
RS.CO-3 Information is shared consistent with response plans
DE.DP-4 Event detection information is communicated

Related ISA/IEC 62443 Controls

Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CAF outcome, taken from mappings by Ofgem.

  • Document the details of incidents (4.3.4.5.8)
    ISA/IEC 62443-2-1:2009

Related ISO 27001 Controls

Clauses and controls from ISO 27001 (2013) which are related to this CAF outcome, taken from mappings by Ofgem.

  • Learning from information security incidents (16.1.6)
    ISO 27001:2013
  • Collection of evidence (16.1.7)
    ISO 27001:2013

Related SP800-53 Controls

Generated from NISTs SP800-53/CSF Crosswalk mappings.