Scoping decisions for mapping The CRI Profile diagnostic statements are documented below. These scoping decisions were used for diagnostic statement review and selection for mapping according to the Mapping Methodology.
The CRI Profile scoping decisions are captured below at the function and category level along with our rationale for diagnostic statements in those categories being in or out of scope:
Function: Category | In Scope | Rationale |
---|---|---|
Govern: Organizational Context (GV.OC) | No | Management elements for establishing organizational circumstances are not in scope. |
Govern: Risk Management Strategy (GV.RM) | No | Management elements for organizational strategies are not in scope. |
Govern: Roles, Responsibilities, and Authorities (GV.RR) | No | Management elements focused on organization specific roles, responsibilities, and authorities are not in scope. |
Govern: Policies, Processes, and Procedures (GV.PO) | No | Management elements focused on organization specific policies and procedures are not in scope. |
Govern: Oversight (GV.OV) | No | Management elements for organizational strategy are not in scope. |
Govern: Supply Chain Risk Management (GV.SC) | No | Management elements focused on organization specific policies and procedures are not in scope. |
Govern: Independent Risk Management Function (GV.IR) | No | Management elements for establishing organizational guidelines are not in scope. |
Govern: Independent Audit Function (GV.AU) | No | Management elements for establishing organizational guidelines are not in scope. |
Identify: Asset Management (ID.AM) | Partial | Diagnostic statements involving operational and technical controls for data protection and lifecycle management are in scope. |
Identify: Risk Assessment (ID.RA) | Partial | Diagnostic statements for remediation of identified vulnerabilities before implementation or following changes are in scope. |
Identify: Improvement (ID.IM) | Partial | Diagnostic statements providing operational and technical controls for data protection are in scope. |
Protect: Identity Management, Authentication, and Access Control (PR.AA) | Partial | Diagnostic statements providing operational and technical controls for identification and authentication of network and system users and devices are in scope. |
Protect: Awareness and Training (PR.AT) | No | Awareness and training activities are not applicable as they are for general security awareness training and not specific threat mitigations. |
Protect: Data Security (PR.DS) | Yes | Diagnostic statements providing operational and technical controls for data protection are in scope. |
Protect: Platform Security (PR.PS) | Partial | Diagnostic statements providing operational and technical controls for hardware, software, and systems are in scope. |
Protect: Technology Infrastructure Resilience (PR.IR) | Partial | Diagnostic statements providing operational and technical controls for hardware, software, and systems are in scope. |
Detect: Continuous Monitoring (DE.CM) | Partial | Diagnostic statements providing operational and technical controls for protecting assets are in scope. |
Detect: Adverse Event Analysis (DE.AE) | No | Incident analysis elements are not applicable as they do not provide mitigations of specific threats but rather provide actions for detected security incident occurrences. |
Respond: Incident Management (RS.MA) | No | Response elements are not applicable as they do not provide mitigations of specific threats but rather provide actions for detected security incident occurrences. |
Respond: Incident Analysis (RS.AN) | No | Response elements are not applicable as they do not provide mitigations of specific threats but rather provide actions for detected security incident occurrences. |
Respond: Incident Response Reporting and Communication (RS.CO) | No | Response elements are not applicable as they do not provide mitigations of specific threats but rather provide actions for detected security incident occurrences. |
Respond: Incident Mitigation (RS.MI) | No | Response elements are not applicable as they do not provide mitigations of specific threats but rather provide actions for detected security incident occurrences. |
Recover: Incident Recovery Plan Execution (RC.RP) | No | Recover elements are not applicable as they do not provide mitigations of specific threats but rather provide restoration actions after security incident occurrences. |
Recover: Incident Recovery Communication (RC.CO) | No | Recover elements are not applicable as they do not provide mitigations of specific threats but rather provide restoration actions after security incident occurrences. |
Extend: Procurement Planning and Due Diligence (EX.DD) | Partial | Diagnostic statements providing operational and technical controls for third-party systems and software are in scope. |
Extend: Third-Party Contracts and Agreements (EX.CN) | No | Management elements focused on organization specific policies and procedures are not in scope. |
Extend: Monitoring and Managing Suppliers (EX.MM) | Partial | Diagnostic statements providing operational and technical controls for third-party systems and software are in scope. |
Extend: Relationship Termination (EX.TR) | No | Management elements focused on organization specific policies and procedures are not in scope. |