CAF Outcome D1.c: Testing and Exercising

From the UK NCSC's Cyber Assessment Framework (version 3.1):

Your organisation carries out exercises to test response plans, using past incidents that affected your (and other) organisation, and scenarios that draw on threat intelligence and your risk assessment.

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

NCSC CAF Mapped to NIST CSF

D1.c: Testing and Exercising to CSF mappings generated from UK Cabinet Office table.

Control ID Description
ID.SC-5 Response and recovery planning and testing are conducted with suppliers and third-party providers
RC.IM-2 Recovery strategies are updated
RC.IM-1 Recovery plans incorporate lessons learned
PR.IP-4 Backups of information are conducted, maintained, and tested
PR.IP-10 Response and recovery plans are tested

ATT&CK Mitigations

MITRE ATT&CK mitigations which map to this CAF outcome, based on mappings by Ofgem.

Related ISA/IEC 62443 Controls

Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CAF outcome, taken from mappings by Ofgem.

  • Conduct drills (4.3.4.5.11)
    ISA/IEC 62443-2-1:2009

Related SP800-53 Controls

Generated from NISTs SP800-53/CSF Crosswalk mappings.

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against. This is based on the above mappings to ATT&CK mitigations by Ofgem.

ATT&CK ID Title Associated Tactics
T1656 Impersonation Defense Evasion
T1210 Exploitation of Remote Services Lateral Movement
T1211 Exploitation for Defense Evasion Defense Evasion
T1212 Exploitation for Credential Access Credential Access
T1068 Exploitation for Privilege Escalation Privilege Escalation