NIST CSF to ISO 27001 Mappings

The NIST's Cybersecurity Framework v1.1 (CSF) was developed to help organizations begin, or develop, their cybersecurity programme. The table below details NIST Mappings to ISO 27001 with additional data from Ofgem. ISO 27001 is an IT security standard for establishing, implementing maintaining and continually improving and information security management system (ISMS). To see more detailed information and additional mappings, click through to individual outcomes.

CSF ID CSF Description ISO 27001 (2013)
DE.AE-1 A baseline of network operations and expected data flows for users and systems is established and managed 12.1.1: Documented operating procedures
12.1.2: Change management
13.1.1: Network controls
13.1.2: Security of network services
DE.AE-2 Detected events are analyzed to understand attack targets and methods 12.4.1: Event Logging
16.1.1: Responsibilities and procedures
16.1.4: Assessment of and decision on information security events
DE.AE-3 Event data are collected and correlated from multiple sources and sensors 12.4.1: Event Logging
16.1.7: Collection of evidence
DE.AE-4 Impact of events is determined 16.1.4: Assessment of and decision on information security events
DE.AE-5 Incident alert thresholds are established 16.1.4: Assessment of and decision on information security events
DE.CM-1 The network is monitored to detect potential cybersecurity events
DE.CM-2 The physical environment is monitored to detect potential cybersecurity events 11.1.1: Physical security perimeter
11.1.2: Physical entry controls
DE.CM-3 Personnel activity is monitored to detect potential cybersecurity events 12.4.1: Event Logging
12.4.3: Administrator and operator logs
DE.CM-4 Malicious code is detected 12.2.1: Controls against malware
DE.CM-5 Unauthorized mobile code is detected 12.5.1: Installation of software on operational systems
12.6.2: Restrictions on software installation
DE.CM-6 External service provider activity is monitored to detect potential cybersecurity events 14.2.7: Outsourced development
15.2.1: Monitoring and review of supplier services
DE.CM-7 Monitoring for unauthorized personnel, connections, devices, and software is performed 12.4.1: Event Logging
14.2.7: Outsourced development
15.2.1: Monitoring and review of supplier services
DE.CM-8 Vulnerability scans are performed 12.6.1: Management of technical vulnerabilities
DE.DP-1 Roles and responsibilities for detection are well defined to ensure accountability 6.1.1: Information security roles and responsibilities
7.2.2: Information security, awareness, education, and training
DE.DP-2 Detection activities comply with all applicable requirements 18.1.4: Privacy and protection of personally identifiable information
18.2.2: Compliance with security policies and standards
18.2.3: Technical compliance review
DE.DP-3 Detection processes are tested 14.2.8: System security testing
DE.DP-4 Event detection information is communicated 16.1.2: Reporting information security events
16.1.3: Reporting information security weaknesses
DE.DP-5 Detection processes are continuously improved 16.1.6: Learning from information security incidents
ID.AM-1 Physical devices and systems within the organization are inventoried 8.1.1: Inventory of assets
8.1.2: Ownership of assets
ID.AM-2 Software platforms and applications within the organization are inventoried 12.5.1: Installation of software on operational systems
8.1.1: Inventory of assets
8.1.2: Ownership of assets
ID.AM-3 Organizational communication and data flows are mapped 13.2.1: Information transfer policies and procedures
13.2.2: Agreements on information transfer
ID.AM-4 External information systems are catalogued 11.2.6: Security of equipment and assets off-premises
ID.AM-5 Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their classification, criticality, and business value 8.2.1: Classification of information
ID.AM-6 Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established 6.1.1: Information security roles and responsibilities
ID.BE-1 The organization’s role in the supply chain is identified and communicated 15.1.1: Information security policy for supplier relationships
15.1.2: Addressing security within supplier agreements
15.1.3: Information and communication technology supply chain
15.2.1: Monitoring and review of supplier services
15.2.2: Managing changes to supplier services
ID.BE-2 The organization’s place in critical infrastructure and its industry sector is identified and communicated
ID.BE-3 Priorities for organizational mission, objectives, and activities are established and communicated
ID.BE-4 Dependencies and critical functions for delivery of critical services are established 11.2.2: Supporting utilities
11.2.3: Cabling security
12.1.3: Capacity management
ID.BE-5 Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress/attack, during recovery, normal operations) 11.1.4: Protecting against external and environmental threats
17.1.1: Planning information security continuity
17.1.2: Implementing information security continuity
17.2.1: Availability of information processing facilities
ID.GV-1 Organizational cybersecurity policy is established and communicated 5.1.1: Policies for information Security
ID.GV-2 Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and external partners 15.1.1: Information security policy for supplier relationships
6.1.1: Information security roles and responsibilities
7.2.1: Management responsibilities
ID.GV-3 Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood and managed 18.1.1: Identification of applicable legislation and contractual requirements
18.1.2: Intellectual property rights
18.1.3: Protection of records
18.1.4: Privacy and protection of personally identifiable information
18.1.5: Regulation of cryptographic controls
ID.GV-4 Governance and risk management processes address cybersecurity risks
ID.RA-1 Asset vulnerabilities are identified and documented 12.6.1: Management of technical vulnerabilities
18.2.3: Technical compliance review
ID.RA-2 Cyber threat intelligence is received from information sharing forums and sources 6.1.4: Contact with special interest groups
ID.RA-3 Threats, both internal and external, are identified and documented 6.1.2: Segregation of duties
ID.RA-4 Potential business impacts and likelihoods are identified 16.1.6: Learning from information security incidents
6.1.2: Segregation of duties
ID.RA-5 Threats, vulnerabilities, likelihoods, and impacts are used to determine risk 12.6.1: Management of technical vulnerabilities
ID.RA-6 Risk responses are identified and prioritized 6.1.3: Contact with authorities
ID.RM-1 Risk management processes are established, managed, and agreed to by organizational stakeholders 6.1.3: Contact with authorities
ID.RM-2 Organizational risk tolerance is determined and clearly expressed 6.1.3: Contact with authorities
ID.RM-3 The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis 6.1.3: Contact with authorities
ID.SC-1 Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders 15.1.1: Information security policy for supplier relationships
15.1.2: Addressing security within supplier agreements
15.1.3: Information and communication technology supply chain
15.2.1: Monitoring and review of supplier services
15.2.2: Managing changes to supplier services
ID.SC-2 Suppliers and third party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process 15.2.1: Monitoring and review of supplier services
15.2.2: Managing changes to supplier services
ID.SC-3 Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan. 15.1.1: Information security policy for supplier relationships
15.1.2: Addressing security within supplier agreements
15.1.3: Information and communication technology supply chain
ID.SC-4 Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations. 15.2.1: Monitoring and review of supplier services
15.2.2: Managing changes to supplier services
ID.SC-5 Response and recovery planning and testing are conducted with suppliers and third-party providers 17.1.3: Verify, review, and evaluate information security continuity
PR.AC-1 Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes 9.2.1: User registration and de-registration
9.2.2: User access provisioning
9.2.3: Management of privileged access rights
9.2.4: Management of secret authentication information of users
9.2.6: Removal or adjustment of access rights
9.3.1: Use of secret authentication information
9.4.2: Secure log-on procedures
9.4.3: Password management system
PR.AC-2 Physical access to assets is managed and protected 11.1.1: Physical security perimeter
11.1.2: Physical entry controls
11.1.3: Securing offices, rooms, and facilities
11.1.4: Protecting against external and environmental threats
11.1.5: Working in secure areas
11.1.6: Delivery and loading areas
11.2.1: Equipment siting and protection
11.2.3: Cabling security
11.2.5: Removal of assets
11.2.6: Security of equipment and assets off-premises
11.2.7: Secure disposal or re-use of equipment
11.2.8: Unattended user equipment
PR.AC-3 Remote access is managed 11.2.6: Security of equipment and assets off-premises
13.1.1: Network controls
13.2.1: Information transfer policies and procedures
6.2.1: Mobile Device Policy
6.2.2: Teleworking
PR.AC-4 Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties 6.1.2: Segregation of duties
9.1.2: Access to networks and network services
9.2.3: Management of privileged access rights
9.4.1: Information access restriction
9.4.4: Use of privileged utility programs
9.4.5: Access control to program source code
PR.AC-5 Network integrity is protected (e.g., network segregation, network segmentation) 13.1.1: Network controls
13.1.3: Segregation in networks
13.2.1: Information transfer policies and procedures
14.1.2: Securing application services on public networks
14.1.3: Protecting application services transactions
PR.AC-6 Identities are proofed and bound to credentials and asserted in interactions 7.1.1: Screening
9.2.1: User registration and de-registration
PR.AC-7 Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks) 18.1.4: Privacy and protection of personally identifiable information
9.2.1: User registration and de-registration
9.2.4: Management of secret authentication information of users
9.3.1: Use of secret authentication information
9.4.2: Secure log-on procedures
9.4.3: Password management system
PR.AT-1 All users are informed and trained 12.2.1: Controls against malware
7.2.2: Information security, awareness, education, and training
PR.AT-2 Privileged users understand their roles and responsibilities 6.1.1: Information security roles and responsibilities
7.2.2: Information security, awareness, education, and training
PR.AT-3 Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities 6.1.1: Information security roles and responsibilities
7.2.1: Management responsibilities
7.2.2: Information security, awareness, education, and training
PR.AT-4 Senior executives understand their roles and responsibilities 6.1.1: Information security roles and responsibilities
7.2.2: Information security, awareness, education, and training
PR.AT-5 Physical and cybersecurity personnel understand their roles and responsibilities 6.1.1: Information security roles and responsibilities
7.2.2: Information security, awareness, education, and training
PR.DS-1 Data-at-rest is protected 8.2.3: Handling of assets
PR.DS-2 Data-in-transit is protected 13.1.1: Network controls
13.2.1: Information transfer policies and procedures
13.2.3: Electronic messaging
14.1.2: Securing application services on public networks
14.1.3: Protecting application services transactions
8.2.3: Handling of assets
PR.DS-3 Assets are formally managed throughout removal, transfers, and disposition 11.2.5: Removal of assets
11.2.7: Secure disposal or re-use of equipment
8.2.3: Handling of assets
8.3.1: Management of removable media
8.3.2: Disposal of media
8.3.3: Physical media transfer
PR.DS-4 Adequate capacity to ensure availability is maintained 12.1.3: Capacity management
17.2.1: Availability of information processing facilities
PR.DS-5 Protections against data leaks are implemented 10.1.1: Policy on the use of cryptographic controls
11.1.4: Protecting against external and environmental threats
11.1.5: Working in secure areas
11.2.1: Equipment siting and protection
13.1.1: Network controls
13.1.3: Segregation in networks
13.2.1: Information transfer policies and procedures
13.2.3: Electronic messaging
13.2.4: Confidentiality or non-disclosure agreement
14.1.2: Securing application services on public networks
14.1.3: Protecting application services transactions
6.1.2: Segregation of duties
7.1.1: Screening
7.1.2: Terms and conditions of employment
7.3.1: Termination or change of employment responsibilities
8.2.2: Labelling of information
8.2.3: Handling of assets
9.1.1: Access control policy
9.1.2: Access to networks and network services
9.2.3: Management of privileged access rights
9.4.1: Information access restriction
9.4.4: Use of privileged utility programs
9.4.5: Access control to program source code
PR.DS-6 Integrity checking mechanisms are used to verify software, firmware, and information integrity 12.2.1: Controls against malware
12.5.1: Installation of software on operational systems
14.1.2: Securing application services on public networks
14.1.3: Protecting application services transactions
14.2.4: Restrictions on changes to software packages
PR.DS-7 The development and testing environment(s) are separate from the production environment 12.1.4: Separation of development, testing, and operational environments
PR.DS-8 Integrity checking mechanisms are used to verify hardware integrity 11.2.4: Equipment maintenance
PR.IP-1 A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles (e.g. concept of least functionality) 12.1.2: Change management
12.5.1: Installation of software on operational systems
12.6.2: Restrictions on software installation
14.2.2: System changes control procedures
14.2.3: Technical review of applications after operating platform changes
14.2.4: Restrictions on changes to software packages
PR.IP-10 Response and recovery plans are tested 17.1.3: Verify, review, and evaluate information security continuity
PR.IP-11 Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening) 7.1.1: Screening
7.1.2: Terms and conditions of employment
7.2.1: Management responsibilities
7.2.2: Information security, awareness, education, and training
7.2.3: Disciplinary process
7.3.1: Termination or change of employment responsibilities
8.1.4: Return of assets
PR.IP-12 A vulnerability management plan is developed and implemented 12.6.1: Management of technical vulnerabilities
14.2.3: Technical review of applications after operating platform changes
16.1.3: Reporting information security weaknesses
18.2.2: Compliance with security policies and standards
18.2.3: Technical compliance review
PR.IP-2 A System Development Life Cycle to manage systems is implemented 14.1.1: Information security requirements analysis and specification
14.2.1: Secure development policy
14.2.5: Secure system engineering principles
6.1.5: Information security in project management
PR.IP-3 Configuration change control processes are in place 12.1.2: Change management
12.5.1: Installation of software on operational systems
12.6.2: Restrictions on software installation
14.2.2: System changes control procedures
14.2.3: Technical review of applications after operating platform changes
14.2.4: Restrictions on changes to software packages
PR.IP-4 Backups of information are conducted, maintained, and tested 12.3.1: Information backup
17.1.2: Implementing information security continuity
17.1.3: Verify, review, and evaluate information security continuity
18.1.3: Protection of records
PR.IP-5 Policy and regulations regarding the physical operating environment for organizational assets are met 11.1.4: Protecting against external and environmental threats
11.2.1: Equipment siting and protection
11.2.2: Supporting utilities
11.2.3: Cabling security
PR.IP-6 Data is destroyed according to policy 11.2.7: Secure disposal or re-use of equipment
8.2.3: Handling of assets
8.3.1: Management of removable media
8.3.2: Disposal of media
PR.IP-7 Protection processes are improved 16.1.6: Learning from information security incidents
PR.IP-8 Effectiveness of protection technologies is shared 16.1.6: Learning from information security incidents
PR.IP-9 Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed 16.1.1: Responsibilities and procedures
17.1.1: Planning information security continuity
17.1.2: Implementing information security continuity
17.1.3: Verify, review, and evaluate information security continuity
PR.MA-1 Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools 11.1.2: Physical entry controls
11.2.4: Equipment maintenance
11.2.5: Removal of assets
11.2.6: Security of equipment and assets off-premises
PR.MA-2 Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access 11.2.4: Equipment maintenance
15.1.1: Information security policy for supplier relationships
15.2.1: Monitoring and review of supplier services
PR.PT-1 Audit/log records are determined, documented, implemented, and reviewed in accordance with policy 12.4.1: Event Logging
12.4.2: Protection of log information
12.4.3: Administrator and operator logs
12.4.4: Clock synchronisation
12.7.1: Information systems audit controls
PR.PT-2 Removable media is protected and its use restricted according to policy 11.2.9: Clear desk and clear screen policy
8.2.1: Classification of information
8.2.2: Labelling of information
8.2.3: Handling of assets
8.3.1: Management of removable media
8.3.3: Physical media transfer
PR.PT-3 The principle of least functionality is incorporated by configuring systems to provide only essential capabilities 9.1.2: Access to networks and network services
PR.PT-4 Communications and control networks are protected 13.1.1: Network controls
13.2.1: Information transfer policies and procedures
14.1.3: Protecting application services transactions
PR.PT-5 Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience requirements in normal and adverse situations 17.1.2: Implementing information security continuity
17.2.1: Availability of information processing facilities
RC.CO-1 Public relations are managed 6.1.4: Contact with special interest groups
RC.CO-2 Reputation is repaired after an incident
RC.CO-3 Recovery activities are communicated to internal and external stakeholders as well as executive and management teams
RC.IM-1 Recovery plans incorporate lessons learned 16.1.6: Learning from information security incidents
RC.IM-2 Recovery strategies are updated 16.1.6: Learning from information security incidents
RC.RP-1 Recovery plan is executed during or after a cybersecurity incident 16.1.5: Response to information security incidents
RS.AN-1 Notifications from detection systems are investigated 12.4.1: Event Logging
12.4.3: Administrator and operator logs
16.1.5: Response to information security incidents
RS.AN-2 The impact of the incident is understood 16.1.4: Assessment of and decision on information security events
16.1.6: Learning from information security incidents
RS.AN-3 Forensics are performed 16.1.7: Collection of evidence
RS.AN-4 Incidents are categorized consistent with response plans 16.1.4: Assessment of and decision on information security events
RS.AN-5 Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)
RS.CO-1 Personnel know their roles and order of operations when a response is needed 16.1.1: Responsibilities and procedures
6.1.1: Information security roles and responsibilities
7.2.2: Information security, awareness, education, and training
RS.CO-2 Incidents are reported consistent with established criteria 16.1.2: Reporting information security events
6.1.3: Contact with authorities
RS.CO-3 Information is shared consistent with response plans 16.1.2: Reporting information security events
RS.CO-4 Coordination with stakeholders occurs consistent with response plans
RS.CO-5 Voluntary information sharing occurs with external stakeholders to achieve broader cybersecurity situational awareness 6.1.4: Contact with special interest groups
RS.IM-1 Response plans incorporate lessons learned 16.1.6: Learning from information security incidents
RS.IM-2 Response strategies are updated 16.1.6: Learning from information security incidents
RS.MI-1 Incidents are contained 12.2.1: Controls against malware
16.1.5: Response to information security incidents
RS.MI-2 Incidents are mitigated 12.2.1: Controls against malware
16.1.5: Response to information security incidents
RS.MI-3 Newly identified vulnerabilities are mitigated or documented as accepted risks 12.6.1: Management of technical vulnerabilities
RS.RP-1 Response plan is executed during or after an incident 16.1.5: Response to information security incidents