ControImplementationMatrix
ControImplementationMatrix
security
Controls related to managing who can access network resources and systems,
including remote access, session controls, and privileged access.
Description: AC-3 Access Enforcement requires organizations to enforce approved authorizations for
logical access to information systems. This control ensures that access rights and permissions are
properly implemented, allowing users to access only the resources for which they have been
authorized based on the organization's access control policies.
Description: AC-4 Information Flow Enforcement requires organizations to regulate the flow of
information within and between information systems based on predefined policies. This control
ensures that data is transmitted only through authorized pathways and prevents unauthorized
disclosure, modification, or destruction of information by controlling how data moves across networks
and systems.
Description: AU-2 Event Logging requires organizations to generate audit records for significant
events that affect the security and operations of information systems. This control ensures that actions
such as user activities, system accesses, and security incidents are recorded. The collected logs
facilitate monitoring, analysis, investigation, and reporting of events to support accountability and
detect potential security issues.
Confidentiality Integrity Availability
Event logging helps detect By logging events related to Recording system events, such
unauthorized access attempts or data creation, modification, and as resource usage and error
data breaches by recording deletion, AU-2 helps identify messages, assists in identifying
access to sensitive information. unauthorized changes to issues that may affect system
This enables organizations to information. This ensures that performance or lead to
respond promptly to protect any tampering or alteration of downtime. Early detection
confidential data from data can be detected and through logs allows for timely
exposure. addressed, maintaining data remediation to ensure that
accuracy and trustworthiness. systems and services remain
available to authorized users.
Description: AU-6 requires organizations to regularly review and analyze audit records to detect
inappropriate or unusual activity. This control ensures that collected audit logs are examined for signs
of security incidents, policy violations, or operational issues. Findings from the analysis are reported to
designated personnel for timely response and remediation, enhancing the organization's security
posture.
Description: AU-8 Time Stamps requires organizations to ensure that their information systems use
consistent and accurate time stamps in audit records. This control emphasizes the importance of
synchronizing system clocks across the network to facilitate reliable logging, event correlation, and
forensic analysis by providing a precise sequence of events.
Description: SC-7 Boundary Protection requires organizations to monitor and control communications
at external and internal system boundaries. This control ensures that information systems have
mechanisms in place to prevent unauthorized access, data leakage, and cyber attacks by implementing
protective measures such as firewalls, gateways, and intrusion detection systems at critical points
within the network architecture.
This family is critical for ensuring that only authorized users and devices can
access the network.
Description: IA-2 requires organizations to uniquely identify and authenticate organizational users (or
processes acting on behalf of users) before granting access to information systems. This control
ensures that access is restricted to authorized individuals by verifying their identities using approved
authentication methods, such as passwords, tokens, biometrics, or multi-factor authentication.
Description: IA-3 requires organizations to uniquely identify and authenticate devices before allowing
them to connect to information systems. This control ensures that only authorized devices can access
the network and system resources, preventing unauthorized or compromised devices from establishing
connections. Device identification and authentication can be implemented using methods like digital
certificates, MAC address filtering, secure tokens, or device fingerprints.
Description: IA-5 requires organizations to manage authenticators (e.g., passwords, tokens, biometric
data) effectively throughout their lifecycle. This control ensures that the creation, distribution, storage,
use, and destruction of authentication credentials are conducted securely. It involves implementing
policies for password complexity, expiration, reuse, and safeguarding authenticator information to
prevent unauthorized access and credential compromise.
ISO/IEC
NIST SP 800-53
27001:2022 Comment
Control
Control
AC-3: Access A.5.15 - Access Ensures access control policies are
Enforcement control enforced.
No direct match. ISO A.8.22
AC-4: Information Flow Segregation of networks covers network
-
Enforcement segmentation but doesn’t address specific
information flow controls like AC-4.
A.6.7 - Remote Controls secure access to organizational
AC-17: Remote Access
working systems when working remotely
Requires logging of system events for
AU-2: Event Logging A.8.15 - Logging
audit and accountability purposes.
No direct match. ISO addresses logging
AU-6: Audit Record
and monitoring (8.15 and 8.16) but lacks
Review, Analysis, and -
a control specifically for audit review
Reporting
and analysis like in AU-6.
Both ensure time stamps are
A.8.17 - Clock
AU-8: Time Stamps synchronized to ensure accurate
synchronization
recording of events across systems.
A.8.23 relates to controlling access to
external websites, which can include
SC-7: Boundary A.8.23 - Web
boundary protection. SC-7 covers
Protection filtering
broader boundary defense (firewalls,
IDS).
SC-8: Transmission Ensures confidentiality and integrity of
A.8.21 - Security of
Confidentiality and information transmitted across networks,
network services
Integrity similar to SC-8.
Both ensure that session establishment is
SC-23: Session A.8.5 - Secure
secure and authenticated to prevent
Authenticity authentication
unauthorized access.
IA-2: Identification and Manages user identities to ensure that
A.5.16 - Identity
Authentication only authorized users have access to
management
(Organizational Users) systems.
Ensures secure management of user
IA-3: Device
A.8.1 - User endpoint devices, including
Identification and
endpoint devices authenticating devices before they
Authentication
connect to the network.
A.5.17 - Manages the secure allocation, usage,
IA-5: Authenticator
Authentication and management of authenticators, such
Management
information as passwords, tokens, etc.
List of the controls from ISO/IEC 27001:2022, that are relevant to
network security
Description: Rules to control physical and logical access to information and other associated assets
shall be established and implemented based on business and information security requirements.
Description: groups of information services, users and information systems shall be segregated in the
organization’s networks.
Description: Security measures shall be implemented when personnel are working remotely to protect
information accessed, processed or stored outside the organization’s premises.
A.8.15 - Logging
Description: Logs that record activities, exceptions, faults and other relevant events shall be produced,
stored, protected and analysed.
Description: Networks, systems and applications shall be monitored for anomalous behaviour and
appropriate actions taken to evaluate potential information security incidents.
Description: The clocks of information processing systems used by the organization shall be
synchronized to approved time sources.
Confidentiality Integrity Availability
Accurate time synchronization Consistent and synchronized Clock synchronization helps in
aids in promptly detecting and clocks are essential for diagnosing and resolving
responding to unauthorized maintaining the integrity of system issues that may affect
access or data breaches. By audit logs and system records. performance or lead to
providing precise timing of They ensure that events are downtime. Accurate time
events, organizations can recorded in the correct stamps enable quicker
identify suspicious activities sequence, allowing for accurate troubleshooting of incidents,
and mitigate potential threats to reconstruction of events and ensuring that systems and
sensitive information before detection of any unauthorized services remain available to
significant damage occurs, thus alterations or tampering with authorized users without
protecting confidentiality. data, thereby upholding data unnecessary interruptions, thus
integrity. supporting availability.
Description: Access to external websites shall be managed to reduce exposure to malicious content.
Description: Security mechanisms, service levels and service requirements of network services shall
be identified, implemented and monitored.
Description: Information stored on, processed by or accessible via user end point devices shall be
protected.