NIST CSF: PR.AC-1 Subcategory

From NIST's Cyber Security Framework (version 1):

Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

CSF Mapped to SP800-53 Controls

Generated from NIST's SP800-53/CSF Crosswalk mappings.

Related ISO 27001 Controls

Annex A controls from ISO 27001 (2013) which are related to this CSF subcategory, taken from mappings by NIST and additional data from Ofgem.

  • User access provisioning (9.2.2)
    ISO 27001:2013
  • User registration and de-registration (9.2.1)
    ISO 27001:2013
  • Secure log-on procedures (9.4.2)
    ISO 27001:2013
  • Removal or adjustment of access rights (9.2.6)
    ISO 27001:2013
  • Management of privileged access rights (9.2.3)
    ISO 27001:2013
  • Use of secret authentication information (9.3.1)
    ISO 27001:2013
  • Password management system (9.4.3)
    ISO 27001:2013
  • Management of secret authentication information of users (9.2.4)
    ISO 27001:2013

Related ISA/IEC 62443 Controls

Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CSF subcategory, taken from mappings by NIST and additional data from Ofgem.

  • Identifier management (SR 1.4)
    ISA/IEC 62443-3-3:2013
  • Authenticator management (SR 1.5)
    ISA/IEC 62443-3-3:2013
  • Strength of password-based authentication (SR 1.7)
    ISA/IEC 62443-3-3:2013
  • Strength of public key authentication (SR 1.9)
    ISA/IEC 62443-3-3:2013
  • Access accounts implement authorization security policy (4.3.3.5.1)
    ISA/IEC 62443-2-1:2009
  • Public key infrastructure (PKI) certificates (SR 1.8)
    ISA/IEC 62443-3-3:2013
  • Account management (SR 1.3)
    ISA/IEC 62443-3-3:2013
  • Software process and device identification and authentication (SR 1.2)
    ISA/IEC 62443-3-3:2013
  • Human User Identification and Authentication (SR 1.1)
    ISA/IEC 62443-3-3:2013

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against. This is based on mappings to associated SP800-53 controls.

CSF Mapped to the NCSC CAF

Cyber Assessment Framework mappings generated from UK Cabinet Office data.