Mapping Nist CSF To Iso 27001-2022
Mapping Nist CSF To Iso 27001-2022
Mar-23
Function Category
PROTECT (PR)
Information Protection Processes and Procedures
(PR.IP): Security policies (that address purpose, scope,
roles, responsibilities, management commitment, and
coordination among organizational entities), processes,
and procedures are maintained and used to manage
protection of information systems and assets.
Maintenance (PR.MA): Maintenance and repairs of
industrial control and information system components is
performed consistent with policies and procedures.
DETECT (DE)
RESPOND (RS)
PR.AC-2: Physical access to assets is managed and protected A.11.1.1, A.11.1.2, A.11.1.4, A.11.1.6,
(Physical Security) A.11.2.3
PR.AC-6: Identities are proofed and bound to credentials, and A.6.1.2, A.7.1.1, A.9.1.2, A.9.2.2,
asserted in interactions when appropriate (Unique accounts, no A.9.2.3, A.9.2.5, A.9.2.6, A.9.4.1,
sharing) A.9.4.4
PR.DS-3: Assets are formally managed throughout removal, A.8.2.3, A.8.3.1, A.8.3.2, A.8.3.3,
transfers, and disposition (Assets Disposal Policy) A.11.2.7
PR.IP-3: Configuration change control processes are in place A.12.1.2, A.12.5.1, A.12.6.2, A.14.2.2,
(Change Management, restriction of software installed) A.14.2.3, A.14.2.4
PR.PT-1: Audit/log records are determined, documented, A.12.4.1, A.12.4.2, A.12.4.3, A.12.4.4,
implemented, and reviewed in accordance with policy A.12.7.1
PR.PT-2: Removable media is protected and its use A.8.2.2, A.8.2.3, A.8.3.1, A.8.3.3,
restricted according to policy (Removable Media Policy) A.11.2.9
5.9
5.9
5.14
7.9
5.12
5.2
5.21, 5.22
7.4, 7.11, 7.12, 8.6
5.1
5.2, 5.4
5.31,5.32,5.33
8.8
8.8
8.16, 5.7
8.8
5.22
5.19, 5.20,5.21
5.22
5.29
7.1,7.2,7.3,7.4, 7.12
6.3
5.2, 6.3
5.2, 6.3
5.2, 6.3
7.4
8.8
8.8
8.13
8.31
7.13
5.27
5.3
8.8, 5.36
5.15
5.15
8.20, 5.14
5.29, 8.14
8.16
5.24, 5.25
8.16
7.4
8.15
8.15
8.7
8.16, 8.19
8.30, 5.22
8.16
8.8
5.2
5.34
8.29
6.8
5.27
5.26
5.2, 5.24
6.8,
6.8
8.15, 8.16,5.26
5.27
5.28
5.25
5.25
5.26
8.7, 5.26
8.8
5.27
5.26