NIST CSF: PR.IP-11 Subcategory
From NIST's Cyber Security Framework (version 1):
Cybersecurity is included in human resources practices (e.g., deprovisioning, personnel screening)
Cyber Threat Graph Context
Explore how this control relates to the wider threat graph
CSF Mapped to SP800-53 Controls
Generated from NIST's SP800-53/CSF Crosswalk mappings.
Related ISO 27001 Controls
Annex A controls from ISO 27001 (2013) which are related to this CSF subcategory, taken from mappings by NIST and additional data from Ofgem.
-
Disciplinary process (7.2.3)
ISO 27001:2013 -
Termination or change of employment responsibilities (7.3.1)
ISO 27001:2013 -
Terms and conditions of employment (7.1.2)
ISO 27001:2013 -
Return of assets (8.1.4)
ISO 27001:2013 -
Screening (7.1.1)
ISO 27001:2013 -
Management responsibilities (7.2.1)
ISO 27001:2013 -
Information security, awareness, education, and training (7.2.2)
ISO 27001:2013
Related ISA/IEC 62443 Controls
Clauses and controls from IEC 62443 (62443-2-1 and 62443-3-3) which are related to this CSF subcategory, taken from mappings by NIST and additional data from Ofgem.
-
Personnel security (4.3.3.2.1)
ISA/IEC 62443-2-1:2009 -
Screen personnel initially (4.3.3.2.2)
ISA/IEC 62443-2-1:2009 -
Screen personnel on an ongoing basis (4.3.3.2.3)
ISA/IEC 62443-2-1:2009
CSF Mapped to the NCSC CAF
Cyber Assessment Framework mappings generated from UK Cabinet Office data.
Control ID | Name | Description |
---|---|---|
B2.d | Identity and Access Management (IdAM) | You closely manage and maintain identity and access control for users, devices and systems accessing the networks and information systems supporting the essential function. |
B1.b | Policy and Process Implementation | You have successfully implemented your security policies and processes and can demonstrate the security benefits achieved. |
B6.a | Cyber Security Culture | You develop and pursue a positive cyber security culture. |
B6.b | Cyber Security Training | The people who support the operation of your essential function are appropriately trained in cyber security. A range of approaches to cyber security training, awareness and communications are employed. |