NIST CSF: PR.PT-3 Subcategory
From NIST's Cyber Security Framework (version 1):
The principle of least functionality is incorporated by configuring systems to provide only essential capabilities
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
CSF Mapped to SP800-53 Controls
Generated from NIST's SP800-53/CSF Crosswalk mappings.
Related ISO 27001 Controls
Annex A controls from ISO 27001 (2013) which are related to this CSF subcategory, taken from mappings by NIST and additional data from Ofgem.
-
Access to networks and network services (9.1.2)
ISO 27001:2013
Related ISA/IEC 62443 Controls
Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CSF subcategory, taken from mappings by NIST and additional data from Ofgem.
-
Develop a policy for remote login and connections (4.3.3.6.6)
ISA/IEC 62443-2-1:2009 -
Access via untrusted networks (SR 1.13)
ISA/IEC 62443-3-3:2013 -
Strength of password-based authentication (SR 1.7)
ISA/IEC 62443-3-3:2013 -
Establish appropriate logical and physical permission methods to access IACS devices (4.3.3.7.2)
ISA/IEC 62443-2-1:2009 -
Public key infrastructure (PKI) certificates (SR 1.8)
ISA/IEC 62443-3-3:2013 -
Control access to information or systems via role-based access accounts (4.3.3.7.3)
ISA/IEC 62443-2-1:2009 -
Authenticator management (SR 1.5)
ISA/IEC 62443-3-3:2013 -
Require re-authentication after remote system inactivity (4.3.3.6.8)
ISA/IEC 62443-2-1:2009 -
Develop an authentication strategy (4.3.3.6.1)
ISA/IEC 62443-2-1:2009 -
Authorization enforcement (SR 2.1)
ISA/IEC 62443-3-3:2013 -
Strength of public key authentication (SR 1.9)
ISA/IEC 62443-3-3:2013 -
Account management (SR 1.3)
ISA/IEC 62443-3-3:2013 -
Authenticate all users before system use (4.3.3.6.2)
ISA/IEC 62443-2-1:2009 -
Identifier management (SR 1.4)
ISA/IEC 62443-3-3:2013 -
Human User Identification and Authentication (SR 1.1)
ISA/IEC 62443-3-3:2013 -
Remote session termination (SR 2.6)
ISA/IEC 62443-3-3:2013 -
Require strong authentication methods for system administration and application configuration (4.3.3.6.3)
ISA/IEC 62443-2-1:2009 -
Authenticator feedback (SR 1.10)
ISA/IEC 62443-3-3:2013 -
Session lock (SR 2.5)
ISA/IEC 62443-3-3:2013 -
Concurrent session control (SR 2.7)
ISA/IEC 62443-3-3:2013 -
Employ authentication for task-to task communication (4.3.3.6.9)
ISA/IEC 62443-2-1:2009 -
Use control for portable and mobile devices (SR 2.3)
ISA/IEC 62443-3-3:2013 -
Mobile code (SR 2.4)
ISA/IEC 62443-3-3:2013 -
Employ multiple authorization methods for critical IACS (4.3.3.7.4)
ISA/IEC 62443-2-1:2009 -
Wireless access management (SR 1.6)
ISA/IEC 62443-3-3:2013 -
Define an authorization security policy (4.3.3.7.1)
ISA/IEC 62443-2-1:2009 -
Unsuccessful login attempts (SR 1.11)
ISA/IEC 62443-3-3:2013 -
Change default passwords (4.3.3.5.7)
ISA/IEC 62443-2-1:2009 -
Review account permissions (4.3.3.5.6)
ISA/IEC 62443-2-1:2009 -
Identify individuals (4.3.3.5.2)
ISA/IEC 62443-2-1:2009 -
System use notification (SR 1.12)
ISA/IEC 62443-3-3:2013 -
Software process and device identification and authentication (SR 1.2)
ISA/IEC 62443-3-3:2013 -
Suspend or remove unneeded accounts (4.3.3.5.5)
ISA/IEC 62443-2-1:2009 -
Authenticate all remote users at the appropriate level (4.3.3.6.5)
ISA/IEC 62443-2-1:2009 -
Disable access account after failed remote login attempts (4.3.3.6.7)
ISA/IEC 62443-2-1:2009 -
Wireless use control (SR 2.2)
ISA/IEC 62443-3-3:2013 -
Audit account administration (4.3.3.5.8)
ISA/IEC 62443-2-1:2009 -
Log and review all access attempts to critical systems (4.3.3.6.4)
ISA/IEC 62443-2-1:2009 -
Authorize account access (4.3.3.5.3)
ISA/IEC 62443-2-1:2009 -
Access accounts implement authorization security policy (4.3.3.5.1)
ISA/IEC 62443-2-1:2009 -
Record access accounts (4.3.3.5.4)
ISA/IEC 62443-2-1:2009
MITRE ATT&CK Techniques
See which MITRE ATT&CK techniques this control helps to protect against. This is based on mappings to associated SP800-53 controls.
CSF Mapped to the NCSC CAF
Cyber Assessment Framework mappings generated from UK Cabinet Office data.