NIST CSF: RS.AN-5 Subcategory

From NIST's Cyber Security Framework (version 1):

Processes are established to receive, analyze and respond to vulnerabilities disclosed to the organization from internal and external sources (e.g. internal testing, security bulletins, or security researchers)

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

CSF Mapped to SP800-53 Controls

Generated from NIST's SP800-53/CSF Crosswalk mappings.

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against. This is based on mappings to associated SP800-53 controls.

ATT&CK ID Title Associated Tactics
T1210 Exploitation of Remote Services Lateral Movement
T1068 Exploitation for Privilege Escalation Privilege Escalation
T1212 Exploitation for Credential Access Credential Access
T1211 Exploitation for Defense Evasion Defense Evasion

CSF Mapped to the NCSC CAF

Cyber Assessment Framework mappings generated from UK Cabinet Office data.

Control ID Name Description
B4.b Secure Configuration You securely configure the network and information systems that support the operation of essential functions.
C1.d Identifying Security Incidents You contextualise alerts with knowledge of the threat and your systems, to identify those security incidents that require some form of response.
B1.a Policy and Process Development You have developed and continue to improve a set of cyber security and resilience policies and processes that manage and mitigate the risk of adverse impact on the essential function.
B4.d Vulnerability Management You manage known vulnerabilities in your network and information systems to prevent adverse impact on the essential function.
B5.a Resilience Preparation You are prepared to restore the operation of your essential function following adverse impact.