bmad-plus 0.4.4 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +31 -0
- package/README.md +3 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +43 -12
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +21 -8
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,153 @@
|
|
|
1
|
+
# NIS2 Article 21 — Cybersecurity Risk Management Measures
|
|
2
|
+
|
|
3
|
+
Directive (EU) 2022/2555, Art. 21 requires essential and important entities to take "appropriate and proportionate technical, operational and organisational measures" to manage risks and protect network and information systems. Proportionality is assessed against the entity's size, exposure, and the severity of potential impact.
|
|
4
|
+
|
|
5
|
+
---
|
|
6
|
+
|
|
7
|
+
## Measure 1 — Risk Analysis & Information Security Policies
|
|
8
|
+
|
|
9
|
+
**Requirement:** Documented policies covering risk analysis methodology and information security governance.
|
|
10
|
+
|
|
11
|
+
**Implementation guidance:**
|
|
12
|
+
- Adopt a formal risk management methodology (ISO 27005, NIST RMF, or equivalent)
|
|
13
|
+
- Produce and maintain an asset inventory covering in-scope network and information systems
|
|
14
|
+
- Define risk acceptance criteria aligned to business impact
|
|
15
|
+
- Review risk assessments at least annually and after significant incidents or changes
|
|
16
|
+
- Ensure the management body approves the risk management policy (Art. 20 link)
|
|
17
|
+
|
|
18
|
+
---
|
|
19
|
+
|
|
20
|
+
## Measure 2 — Incident Handling
|
|
21
|
+
|
|
22
|
+
**Requirement:** Procedures for detection, analysis, containment, eradication, and recovery.
|
|
23
|
+
|
|
24
|
+
**Implementation guidance:**
|
|
25
|
+
- Maintain a written Incident Response Plan (IRP) covering all NIS2 significant incident scenarios
|
|
26
|
+
- Define "significant incident" thresholds in line with Art. 23(3): substantial disruption to service delivery, financial loss to the entity, or material/non-material damage to other natural or legal persons
|
|
27
|
+
- Establish 24h/72h/1-month reporting workflows with pre-drafted notification templates for the national CSIRT or competent authority
|
|
28
|
+
- Conduct post-incident reviews; feed lessons learned back into risk assessment
|
|
29
|
+
- Test IRP at least annually via tabletop exercises or simulations
|
|
30
|
+
|
|
31
|
+
**Significant incident indicators (Art. 23(3)):**
|
|
32
|
+
- Service disruption affecting a significant number of users
|
|
33
|
+
- Duration > a few hours for critical services
|
|
34
|
+
- Geographic spread affecting other Member States
|
|
35
|
+
- Reputational, financial, or safety impact
|
|
36
|
+
|
|
37
|
+
---
|
|
38
|
+
|
|
39
|
+
## Measure 3 — Business Continuity, Backup & Disaster Recovery
|
|
40
|
+
|
|
41
|
+
**Requirement:** Plans for service continuity, backup management, disaster recovery (DR), and crisis management during and after incidents.
|
|
42
|
+
|
|
43
|
+
**Implementation guidance:**
|
|
44
|
+
- Define Recovery Time Objective (RTO) and Recovery Point Objective (RPO) per critical service
|
|
45
|
+
- Implement automated, encrypted, offsite backups; test restoration quarterly
|
|
46
|
+
- Maintain DR runbooks and infrastructure failover playbooks
|
|
47
|
+
- Define a crisis management structure with clear roles, decision authorities, and escalation paths
|
|
48
|
+
- Test BCP/DR at least annually; involve management body in crisis management exercises
|
|
49
|
+
|
|
50
|
+
---
|
|
51
|
+
|
|
52
|
+
## Measure 4 — Supply Chain Security
|
|
53
|
+
|
|
54
|
+
**Requirement:** Address security in supply chain relationships, including between entities and their direct suppliers and service providers.
|
|
55
|
+
|
|
56
|
+
**Implementation guidance:**
|
|
57
|
+
- Maintain a register of critical ICT suppliers and third-party service providers
|
|
58
|
+
- Perform pre-onboarding security assessments (questionnaires, certifications, audits)
|
|
59
|
+
- Include NIS2/security requirements as contractual obligations (right-to-audit, incident notification SLAs, minimum security baselines)
|
|
60
|
+
- Assess supply chain risks as part of the annual risk assessment
|
|
61
|
+
- Monitor ENISA and national authority supply chain risk assessments (Art. 26 coordinated risk assessments)
|
|
62
|
+
- Apply enhanced due diligence to high-risk ICT vendors identified by Member States
|
|
63
|
+
|
|
64
|
+
---
|
|
65
|
+
|
|
66
|
+
## Measure 5 — Secure Acquisition, Development & Maintenance
|
|
67
|
+
|
|
68
|
+
**Requirement:** Security in the acquisition, development, and maintenance of network and information systems, including vulnerability handling and disclosure.
|
|
69
|
+
|
|
70
|
+
**Implementation guidance:**
|
|
71
|
+
- Apply Secure SDLC practices: threat modelling, code review, SAST/DAST, penetration testing
|
|
72
|
+
- Establish a vulnerability management programme with defined SLAs for patching by severity (e.g., critical ≤ 7 days, high ≤ 30 days)
|
|
73
|
+
- Maintain a coordinated vulnerability disclosure (CVD) policy (aligned with ENISA CVD guidelines)
|
|
74
|
+
- Track CVEs relevant to in-scope systems using threat intelligence feeds
|
|
75
|
+
- Include security acceptance criteria in vendor contracts for purchased systems
|
|
76
|
+
|
|
77
|
+
---
|
|
78
|
+
|
|
79
|
+
## Measure 6 — Effectiveness Assessment
|
|
80
|
+
|
|
81
|
+
**Requirement:** Policies and procedures to assess the effectiveness of cybersecurity risk management measures.
|
|
82
|
+
|
|
83
|
+
**Implementation guidance:**
|
|
84
|
+
- Define KPIs/KRIs for each Art. 21 measure (e.g., mean time to detect, patch compliance rate, training completion rate)
|
|
85
|
+
- Conduct internal audits or management reviews at least annually
|
|
86
|
+
- Engage independent third-party assessors or penetration testers as appropriate
|
|
87
|
+
- Report effectiveness metrics to the management body
|
|
88
|
+
- Map findings to the risk register and trigger remediation plans
|
|
89
|
+
|
|
90
|
+
---
|
|
91
|
+
|
|
92
|
+
## Measure 7 — Cyber Hygiene & Training
|
|
93
|
+
|
|
94
|
+
**Requirement:** Basic cyber hygiene practices and cybersecurity training for staff.
|
|
95
|
+
|
|
96
|
+
**Implementation guidance:**
|
|
97
|
+
- Deploy mandatory security awareness training for all staff at least annually
|
|
98
|
+
- Cover: phishing, social engineering, password hygiene, incident reporting, BYOD/remote working
|
|
99
|
+
- Provide role-based training for IT/OT administrators, incident responders, and the management body
|
|
100
|
+
- Management body must complete cybersecurity training specific to Art. 20 governance obligations
|
|
101
|
+
- Track completion rates; address gaps before audit cycles
|
|
102
|
+
|
|
103
|
+
---
|
|
104
|
+
|
|
105
|
+
## Measure 8 — Cryptography & Encryption
|
|
106
|
+
|
|
107
|
+
**Requirement:** Policies and procedures on the use of cryptography and, where appropriate, encryption.
|
|
108
|
+
|
|
109
|
+
**Implementation guidance:**
|
|
110
|
+
- Define approved cryptographic algorithms (AES-256 for data at rest, TLS 1.2+ for data in transit, SHA-256/SHA-384 for hashing)
|
|
111
|
+
- Establish a key management lifecycle: generation, storage (HSM recommended for critical keys), rotation, and destruction
|
|
112
|
+
- Require encryption of sensitive data stored in cloud environments and on portable media
|
|
113
|
+
- Review cryptographic standards annually given evolving threats (e.g., post-quantum readiness)
|
|
114
|
+
- Document exceptions and compensating controls where encryption is not feasible
|
|
115
|
+
|
|
116
|
+
---
|
|
117
|
+
|
|
118
|
+
## Measure 9 — Human Resources Security, Access Control & Asset Management
|
|
119
|
+
|
|
120
|
+
**Requirement:** HR security, access control policies and asset management.
|
|
121
|
+
|
|
122
|
+
**Implementation guidance:**
|
|
123
|
+
- Apply least-privilege and need-to-know principles for system access
|
|
124
|
+
- Implement role-based access control (RBAC); review permissions quarterly
|
|
125
|
+
- Conduct background screening for roles with privileged access (subject to applicable employment law)
|
|
126
|
+
- Maintain an authoritative asset inventory (hardware, software, data assets)
|
|
127
|
+
- Enforce joiners/movers/leavers process with same-day revocation for leavers
|
|
128
|
+
- Apply identity lifecycle management; disable dormant accounts after 30–90 days inactivity
|
|
129
|
+
|
|
130
|
+
---
|
|
131
|
+
|
|
132
|
+
## Measure 10 — MFA, Secure Communications & Emergency Systems
|
|
133
|
+
|
|
134
|
+
**Requirement:** Use of multi-factor authentication (MFA) or continuous authentication solutions, secured voice, video, and text communications, and secured emergency communication systems.
|
|
135
|
+
|
|
136
|
+
**Implementation guidance:**
|
|
137
|
+
- Require MFA for all remote access, privileged accounts, and cloud management consoles
|
|
138
|
+
- Apply phishing-resistant MFA (FIDO2/hardware tokens) for highest-privilege accounts
|
|
139
|
+
- Enforce MFA for email access, VPN, and SaaS platforms holding sensitive data
|
|
140
|
+
- Use end-to-end encrypted channels for sensitive internal communications (e.g., incident coordination)
|
|
141
|
+
- Maintain a separate, documented emergency communication plan with out-of-band channels in case primary systems are compromised
|
|
142
|
+
|
|
143
|
+
---
|
|
144
|
+
|
|
145
|
+
## Proportionality Principle
|
|
146
|
+
|
|
147
|
+
Art. 21(1) requires measures to be "appropriate and proportionate" taking into account:
|
|
148
|
+
- The entity's exposure to risks
|
|
149
|
+
- The entity's size
|
|
150
|
+
- The likelihood and severity of incidents including societal and economic impact
|
|
151
|
+
- The cost of implementation
|
|
152
|
+
|
|
153
|
+
Essential Entities face more rigorous supervisory scrutiny (Art. 32 proactive) and should apply controls at the higher end of the proportionality spectrum. Important Entities are subject to reactive supervision (Art. 33) but face the same 10-measure obligations.
|
|
@@ -0,0 +1,68 @@
|
|
|
1
|
+
# ISO 27001:2022 to NIS2 Art. 21 Cross-Reference
|
|
2
|
+
|
|
3
|
+
ISO/IEC 27001:2022 certification provides strong evidence of NIS2 compliance for many Art. 21 measures. However, ISO 27001 certification does NOT substitute NIS2 obligations — entities remain responsible for meeting Art. 21, Art. 20, and Art. 23 requirements directly.
|
|
4
|
+
|
|
5
|
+
Key gaps where NIS2 goes beyond ISO 27001:
|
|
6
|
+
- **Art. 21(2)(d)**: NIS2 explicitly mandates supply chain security obligations tied to ENISA coordinated risk assessments (Art. 26)
|
|
7
|
+
- **Art. 21(2)(j)**: NIS2 explicitly mandates MFA — ISO 27001 Annex A.8.5 covers authentication but MFA is not universally required
|
|
8
|
+
- **Art. 20**: Management body personal liability has no ISO 27001 equivalent
|
|
9
|
+
- **Art. 23**: Incident reporting timelines (24h/72h/1 month) are more prescriptive than ISO 27001's general incident management controls
|
|
10
|
+
|
|
11
|
+
---
|
|
12
|
+
|
|
13
|
+
## Mapping Table
|
|
14
|
+
|
|
15
|
+
| NIS2 Art. 21 Measure | NIS2 Requirement | ISO 27001:2022 Annex A Controls |
|
|
16
|
+
|---|---|---|
|
|
17
|
+
| **M1** Risk Analysis & Policies | Risk analysis methodology, IS policies | A.5.1 Policies; A.6.1 IS roles; A.8.8 Vuln mgmt; Clause 6.1 Risk assessment; Clause 8.2 IS risk assessment |
|
|
18
|
+
| **M2** Incident Handling | Detection, response, recovery procedures | A.5.24 IS incident planning; A.5.25 Assessment of IS events; A.5.26 Response; A.5.27 Post-incident review; A.5.28 Evidence collection |
|
|
19
|
+
| **M3** BCP / DR / Crisis | Backup, DR, crisis management | A.5.29 IS during disruption; A.5.30 ICT readiness; A.8.13 Backup; A.8.14 Redundancy |
|
|
20
|
+
| **M4** Supply Chain Security | Supplier/service-provider risk | A.5.19 IS in supplier relationships; A.5.20 Supplier agreements; A.5.21 ICT supply chain; A.5.22 Supplier monitoring; A.5.23 Cloud services |
|
|
21
|
+
| **M5** Secure Acquisition & Dev | SDLC security, vulnerability disclosure | A.8.25 Secure dev lifecycle; A.8.26 App security; A.8.27 Secure architecture; A.8.28 Secure coding; A.8.29 Testing; A.8.30 Outsourced dev; A.5.8 IS in PM |
|
|
22
|
+
| **M6** Effectiveness Assessment | KPIs, audits, management review | A.5.35 Independent IS review; A.5.36 Policy compliance; Clause 9.1 Monitoring; Clause 9.2 Internal audit; Clause 9.3 Management review |
|
|
23
|
+
| **M7** Cyber Hygiene & Training | Awareness and training | A.6.3 IS awareness/training; A.5.7 Threat intelligence; A.6.8 IS event reporting |
|
|
24
|
+
| **M8** Cryptography | Crypto policies, key management | A.8.24 Use of cryptography |
|
|
25
|
+
| **M9** HR, Access Control, Asset Mgmt | Least privilege, RBAC, asset inventory | A.5.9 Asset inventory; A.5.10 Asset use; A.5.11 Asset return; A.8.2 Privileged access; A.8.3 Access restriction; A.8.4 Source code; A.6.1 Screening; A.6.5 Responsibilities on termination |
|
|
26
|
+
| **M10** MFA & Secure Comms | MFA, phishing-resistant auth, encrypted comms | A.8.5 Secure authentication; A.8.20 Network security; A.8.26 App security; A.8.24 Cryptography |
|
|
27
|
+
|
|
28
|
+
---
|
|
29
|
+
|
|
30
|
+
## ISO 27001 Controls With No Direct NIS2 Measure Equivalent
|
|
31
|
+
|
|
32
|
+
The following ISO 27001:2022 Annex A controls are important for overall security posture but do not map to a specific Art. 21 measure. They may still be relevant for NIS2 governance and compliance evidence:
|
|
33
|
+
|
|
34
|
+
- **A.5.2** IS roles and responsibilities
|
|
35
|
+
- **A.5.31** Legal, statutory, regulatory, contractual requirements
|
|
36
|
+
- **A.5.32** Intellectual property rights
|
|
37
|
+
- **A.5.33** Protection of records
|
|
38
|
+
- **A.5.34** Privacy and PII protection (→ see also GDPR)
|
|
39
|
+
- **A.6.4** Disciplinary process
|
|
40
|
+
- **A.8.1** User endpoint devices
|
|
41
|
+
- **A.8.9** Configuration management
|
|
42
|
+
- **A.8.10** Information deletion
|
|
43
|
+
|
|
44
|
+
---
|
|
45
|
+
|
|
46
|
+
## NIS2 Requirements With Limited ISO 27001 Coverage
|
|
47
|
+
|
|
48
|
+
| NIS2 Requirement | Gap vs ISO 27001 | Recommended Action |
|
|
49
|
+
|---|---|---|
|
|
50
|
+
| Art. 20 — Management body approval and personal liability | No ISO 27001 equivalent | Board cybersecurity policy; training records; documented approval minutes |
|
|
51
|
+
| Art. 23 — 24h early warning | ISO 27001 A.5.24–5.26 cover incident management but not specific timelines | Pre-drafted CSIRT notification templates; automated alerting workflows |
|
|
52
|
+
| Art. 23 — 72h notification | Same as above | Incident triage runbooks with timeline checkpoints |
|
|
53
|
+
| Art. 23 — 1-month final report | Same as above | Post-incident review template with all Art. 23(4) required fields |
|
|
54
|
+
| Art. 26 — ENISA supply chain risk assessments | ISO 27001 A.5.19–5.23 cover supplier security generally | Monitor ENISA and national authority supply chain advisories; integrate into supplier risk register |
|
|
55
|
+
| Art. 21(2)(j) — MFA mandate | ISO 27001 A.8.5 covers authentication; MFA not universal | Deploy MFA for remote access, privileged accounts, cloud consoles as minimum |
|
|
56
|
+
|
|
57
|
+
---
|
|
58
|
+
|
|
59
|
+
## Practical Guidance for ISO 27001-Certified Entities
|
|
60
|
+
|
|
61
|
+
If your organisation holds ISO 27001:2022 certification, you are well-positioned for NIS2 but should:
|
|
62
|
+
|
|
63
|
+
1. **Confirm entity classification** — verify whether you are an EE or IE under Art. 3 and your Member State's transposition law
|
|
64
|
+
2. **Address Art. 20 governance** — document board-level approval of cybersecurity measures and ensure training records are maintained
|
|
65
|
+
3. **Implement the Art. 23 reporting workflow** — your IRP likely needs an explicit NIS2 notification track with pre-drafted CSIRT templates and 24h/72h/1-month checkpoints
|
|
66
|
+
4. **Review supply chain coverage** — map your supplier security controls to Art. 21(2)(d) and integrate ENISA coordinated risk assessment outputs
|
|
67
|
+
5. **Mandate MFA** — if not already universal, deploy MFA for remote access and privileged accounts
|
|
68
|
+
6. **Register with your national competent authority** — most Member States require in-scope entities to self-register
|
|
@@ -0,0 +1,349 @@
|
|
|
1
|
+
# NIST SP 800-53 — Assessment, RMF, ConMon, and Framework Mapping Reference
|
|
2
|
+
|
|
3
|
+
## SP 800-53A Rev 5 — Assessment Procedures
|
|
4
|
+
|
|
5
|
+
### Purpose
|
|
6
|
+
|
|
7
|
+
SP 800-53A Rev 5 (January 2022) provides **assessment procedures** for every control in SP 800-53 Rev 5. Each procedure specifies:
|
|
8
|
+
|
|
9
|
+
1. **Objectives** — what the assessment must determine
|
|
10
|
+
2. **Methods** — Examine, Interview, or Test
|
|
11
|
+
3. **Objects** — what to examine/interview/test
|
|
12
|
+
|
|
13
|
+
### The Three Assessment Methods
|
|
14
|
+
|
|
15
|
+
| Method | Description | Examples |
|
|
16
|
+
|--------|-------------|---------|
|
|
17
|
+
| **Examine** | Review artifacts and documentation | Policy documents, SSP, configuration files, system logs, architecture diagrams, audit records, training records |
|
|
18
|
+
| **Interview** | Discuss implementation with personnel | ISSO, system owner, help desk, IT administrators, end users, senior leaders |
|
|
19
|
+
| **Test** | Exercise mechanisms directly | Vulnerability scans, penetration tests, configuration checks, firewall rule reviews, backup restoration tests |
|
|
20
|
+
|
|
21
|
+
### Assessment Depth
|
|
22
|
+
|
|
23
|
+
| Depth | Description | When Used |
|
|
24
|
+
|-------|-------------|----------|
|
|
25
|
+
| **Basic** | Check for existence of controls | Initial assessments; Low impact systems |
|
|
26
|
+
| **Focused** | Evaluate implementation | Most common approach |
|
|
27
|
+
| **Comprehensive** | Thorough, in-depth assessment | High impact systems; 3PAO assessments |
|
|
28
|
+
|
|
29
|
+
### Security Assessment Report (SAR) Structure
|
|
30
|
+
|
|
31
|
+
The SAR documents assessment results:
|
|
32
|
+
|
|
33
|
+
1. **Executive Summary** — High-level findings and authorization recommendation
|
|
34
|
+
2. **Assessment Scope** — Systems, components, controls assessed
|
|
35
|
+
3. **Assessment Methodology** — Methods used, depth, timeframe
|
|
36
|
+
4. **Findings** — Control-by-control results
|
|
37
|
+
5. **Weaknesses and Deficiencies** — OTS (Other Than Satisfied) findings
|
|
38
|
+
6. **Risk Exposure** — Risk ratings for identified weaknesses
|
|
39
|
+
7. **Recommendations** — Remediation actions
|
|
40
|
+
|
|
41
|
+
**Finding format:**
|
|
42
|
+
```
|
|
43
|
+
Control: AC-2(3)
|
|
44
|
+
Objective: Determine if inactive accounts are disabled within the defined period.
|
|
45
|
+
Status: Other Than Satisfied
|
|
46
|
+
Finding: Audit of Active Directory accounts identified 47 accounts inactive for >120 days;
|
|
47
|
+
ODV is 90 days. Automated account review process is not functioning correctly.
|
|
48
|
+
Risk: Moderate — dormant accounts represent attack surface for credential-based attacks.
|
|
49
|
+
Recommendation: Fix automated review process; immediately disable the 47 identified accounts.
|
|
50
|
+
```
|
|
51
|
+
|
|
52
|
+
---
|
|
53
|
+
|
|
54
|
+
## Plan of Action and Milestones (POA&M)
|
|
55
|
+
|
|
56
|
+
### POA&M Purpose
|
|
57
|
+
|
|
58
|
+
The POA&M (CA-5) is a living document tracking all security weaknesses found during assessments, continuous monitoring, and self-assessment. Required for all federal systems.
|
|
59
|
+
|
|
60
|
+
### POA&M Required Fields
|
|
61
|
+
|
|
62
|
+
| Field | Description |
|
|
63
|
+
|-------|-------------|
|
|
64
|
+
| POA&M ID | Unique identifier |
|
|
65
|
+
| Weakness/Deficiency | Description of the finding |
|
|
66
|
+
| Source | How discovered (scan, audit, assessment, pen test) |
|
|
67
|
+
| Control ID | Related SP 800-53 control |
|
|
68
|
+
| Risk Level | Critical / High / Moderate / Low |
|
|
69
|
+
| Scheduled Completion Date | When remediation will be complete |
|
|
70
|
+
| Milestone Description | Steps to remediate with dates |
|
|
71
|
+
| Resources Required | Staff, tools, budget |
|
|
72
|
+
| Status | Open / Completed / Delayed / Risk Accepted |
|
|
73
|
+
|
|
74
|
+
### POA&M Timelines (FedRAMP Guidance)
|
|
75
|
+
|
|
76
|
+
| Risk Level | Remediation Deadline |
|
|
77
|
+
|-----------|---------------------|
|
|
78
|
+
| Critical | 30 days |
|
|
79
|
+
| High | 90 days |
|
|
80
|
+
| Moderate | 180 days |
|
|
81
|
+
| Low | 1 year |
|
|
82
|
+
| Operational Requirement | Risk accepted; ISSO/SO signature required |
|
|
83
|
+
|
|
84
|
+
### Risk Acceptance
|
|
85
|
+
|
|
86
|
+
When a weakness cannot be remediated within the standard timeline:
|
|
87
|
+
- Document a **Risk Acceptance** with business justification
|
|
88
|
+
- ISSO and System Owner must sign off
|
|
89
|
+
- Authorizing Official (AO) may need to approve for High/Critical
|
|
90
|
+
- Review at each ConMon cycle
|
|
91
|
+
- Cannot be risk-accepted indefinitely for High/Critical findings
|
|
92
|
+
|
|
93
|
+
---
|
|
94
|
+
|
|
95
|
+
## Risk Management Framework (RMF) — SP 800-37 Rev 2
|
|
96
|
+
|
|
97
|
+
### Step 1 — Prepare
|
|
98
|
+
|
|
99
|
+
**Purpose:** Establish the organizational and system context for managing security and privacy risk.
|
|
100
|
+
|
|
101
|
+
**Key tasks:**
|
|
102
|
+
- Assign roles: Authorizing Official (AO), System Owner (SO), ISSO, Senior Agency IS Official (SAISO)
|
|
103
|
+
- Develop or update organizational risk management strategy (PM-9)
|
|
104
|
+
- Identify common controls (PM-10)
|
|
105
|
+
- Conduct mission/business process analysis (PM-11)
|
|
106
|
+
- Perform organization-level risk assessment (RA-3)
|
|
107
|
+
- Establish information life cycle for the system
|
|
108
|
+
|
|
109
|
+
**Output:** Risk management roles assigned; organization-level risk assessment completed; common control inventory established.
|
|
110
|
+
|
|
111
|
+
### Step 2 — Categorize
|
|
112
|
+
|
|
113
|
+
**Purpose:** Categorize the system and information processed, stored, and transmitted based on FIPS 199.
|
|
114
|
+
|
|
115
|
+
**Key tasks:**
|
|
116
|
+
- Describe the system (SSP Section 1 and 2)
|
|
117
|
+
- Identify information types using SP 800-60
|
|
118
|
+
- Determine impact levels for C, I, A
|
|
119
|
+
- Determine overall system impact level (high-water mark)
|
|
120
|
+
- Document in the Security Categorization document
|
|
121
|
+
|
|
122
|
+
**Output:** System Security Categorization document (signed by AO and SO).
|
|
123
|
+
|
|
124
|
+
### Step 3 — Select
|
|
125
|
+
|
|
126
|
+
**Purpose:** Select, tailor, and document the controls for the system.
|
|
127
|
+
|
|
128
|
+
**Key tasks:**
|
|
129
|
+
- Select starting baseline from SP 800-53B (Low/Moderate/High)
|
|
130
|
+
- Apply tailoring (common controls, scoping, ODVs, compensating controls)
|
|
131
|
+
- Document all tailoring decisions in the SSP
|
|
132
|
+
- Develop continuous monitoring strategy (CA-7)
|
|
133
|
+
- Review and approve control selection (AO concurrence)
|
|
134
|
+
|
|
135
|
+
**Output:** SSP with control selection; ConMon strategy.
|
|
136
|
+
|
|
137
|
+
### Step 4 — Implement
|
|
138
|
+
|
|
139
|
+
**Purpose:** Implement the controls and document how they are deployed in the operational environment.
|
|
140
|
+
|
|
141
|
+
**Key tasks:**
|
|
142
|
+
- Implement the selected controls
|
|
143
|
+
- Document implementation in SSP (one narrative per control)
|
|
144
|
+
- Document design and implementation information for developer controls (SA-4)
|
|
145
|
+
- Identify and address supply chain risks (SR family)
|
|
146
|
+
|
|
147
|
+
**Output:** Implemented controls; completed SSP implementation narratives.
|
|
148
|
+
|
|
149
|
+
### Step 5 — Assess
|
|
150
|
+
|
|
151
|
+
**Purpose:** Determine if the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting security and privacy requirements.
|
|
152
|
+
|
|
153
|
+
**Key tasks:**
|
|
154
|
+
- Develop Security Assessment Plan (SAP) using SP 800-53A
|
|
155
|
+
- Select qualified assessors (independent for Moderate/High; 3PAO for FedRAMP)
|
|
156
|
+
- Conduct assessments (examine, interview, test)
|
|
157
|
+
- Document findings in SAR
|
|
158
|
+
- Develop initial POA&M from SAR findings
|
|
159
|
+
|
|
160
|
+
**Output:** SAP, SAR, initial POA&M.
|
|
161
|
+
|
|
162
|
+
**Independence requirements:**
|
|
163
|
+
- **Low systems:** Self-assessment permitted
|
|
164
|
+
- **Moderate systems:** Independent assessor (different team from implementers)
|
|
165
|
+
- **High systems / FedRAMP:** 3PAO required; must be accredited by A2LA/FedRAMP PMO
|
|
166
|
+
|
|
167
|
+
### Step 6 — Authorize
|
|
168
|
+
|
|
169
|
+
**Purpose:** Provide organizational accountability by requiring a senior official to determine if the security and privacy risk to organizational operations/assets is acceptable.
|
|
170
|
+
|
|
171
|
+
**Authorization package contents:**
|
|
172
|
+
1. System Security Plan (SSP)
|
|
173
|
+
2. Security Assessment Report (SAR)
|
|
174
|
+
3. Plan of Action and Milestones (POA&M)
|
|
175
|
+
4. Executive Summary (for AO review)
|
|
176
|
+
|
|
177
|
+
**Authorization decisions:**
|
|
178
|
+
- **Authorization to Operate (ATO)** — risk is acceptable; typically granted for 3 years
|
|
179
|
+
- **Common Control Authorization (CCA)** — for common control providers
|
|
180
|
+
- **Denial of Authorization to Operate (DATO)** — risk is not acceptable; system must be shut down or remediated
|
|
181
|
+
- **Authorization to Use (ATU)** — for external systems/services
|
|
182
|
+
|
|
183
|
+
**Ongoing authorization:** Continuous authorization (preferred for Moderate/High) replaces periodic re-authorization with real-time risk management.
|
|
184
|
+
|
|
185
|
+
### Step 7 — Monitor
|
|
186
|
+
|
|
187
|
+
**Purpose:** Maintain ongoing situational awareness about the security and privacy posture of the system.
|
|
188
|
+
|
|
189
|
+
**Key tasks:**
|
|
190
|
+
- Implement ConMon strategy (CA-7)
|
|
191
|
+
- Conduct ongoing assessments of selected controls
|
|
192
|
+
- Respond to changes in system and threat environment
|
|
193
|
+
- Report security status to AO
|
|
194
|
+
- Update SSP, SAR, POA&M as changes occur
|
|
195
|
+
- Conduct ongoing risk determination and acceptance
|
|
196
|
+
|
|
197
|
+
**FedRAMP ConMon requirements:**
|
|
198
|
+
- Monthly vulnerability scans (OS, databases, web apps)
|
|
199
|
+
- Annual penetration test (conducted by 3PAO)
|
|
200
|
+
- Monthly POA&M updates
|
|
201
|
+
- Significant change request before major system changes
|
|
202
|
+
- Annual security reviews
|
|
203
|
+
|
|
204
|
+
---
|
|
205
|
+
|
|
206
|
+
## Continuous Monitoring (ConMon) Strategy
|
|
207
|
+
|
|
208
|
+
### ConMon Frequencies (SP 800-137 / CA-7)
|
|
209
|
+
|
|
210
|
+
| Activity | Recommended Frequency | FedRAMP Frequency |
|
|
211
|
+
|----------|----------------------|------------------|
|
|
212
|
+
| Vulnerability scans (OS) | Monthly | Monthly |
|
|
213
|
+
| Vulnerability scans (Web app) | Monthly | Monthly |
|
|
214
|
+
| Vulnerability scans (Database) | Monthly | Weekly |
|
|
215
|
+
| Control assessments (selected) | Ongoing/quarterly | Annually |
|
|
216
|
+
| Security awareness training | Annual | Annual |
|
|
217
|
+
| Contingency plan testing | Annual | Annual |
|
|
218
|
+
| Full control assessment | Every 3 years / at reauthorization | Annual (3PAO) |
|
|
219
|
+
| Penetration testing | Annual (Moderate+) | Annual (3PAO) |
|
|
220
|
+
|
|
221
|
+
### ConMon Automation
|
|
222
|
+
|
|
223
|
+
Support tools for ConMon implementation:
|
|
224
|
+
- **SCAP (Security Content Automation Protocol)** — standardized vulnerability scanning
|
|
225
|
+
- **CVE/CVSS** — common vulnerability scoring
|
|
226
|
+
- **OVAL/XCCDF** — configuration checking
|
|
227
|
+
- **NVD (National Vulnerability Database)** — NIST vulnerability repository
|
|
228
|
+
- **CDM (Continuous Diagnostics and Mitigation)** — DHS/CISA program for federal agencies
|
|
229
|
+
- **OSCAL** — machine-readable security control documentation
|
|
230
|
+
|
|
231
|
+
---
|
|
232
|
+
|
|
233
|
+
## OSCAL — Open Security Controls Assessment Language
|
|
234
|
+
|
|
235
|
+
OSCAL (developed by NIST) provides machine-readable representations of SP 800-53 content:
|
|
236
|
+
|
|
237
|
+
### OSCAL Layers
|
|
238
|
+
|
|
239
|
+
| Layer | Purpose | Formats |
|
|
240
|
+
|-------|---------|---------|
|
|
241
|
+
| **Catalog** | Control definitions (SP 800-53 catalog) | JSON, XML, YAML |
|
|
242
|
+
| **Profile** | Baseline selection and tailoring | JSON, XML, YAML |
|
|
243
|
+
| **Component Definition** | Reusable component implementations | JSON, XML, YAML |
|
|
244
|
+
| **System Security Plan** | SSP in machine-readable format | JSON, XML, YAML |
|
|
245
|
+
| **Assessment Plan** | SAP in machine-readable format | JSON, XML, YAML |
|
|
246
|
+
| **Assessment Results** | SAR findings in machine-readable format | JSON, XML, YAML |
|
|
247
|
+
| **POA&M** | Plan of action in machine-readable format | JSON, XML, YAML |
|
|
248
|
+
|
|
249
|
+
**FedRAMP OSCAL adoption:** FedRAMP has been moving toward OSCAL-based SSP submissions. Tools supporting OSCAL: Trestle (IBM), Xacta 360, Atlasity, Empower.
|
|
250
|
+
|
|
251
|
+
---
|
|
252
|
+
|
|
253
|
+
## Cross-Framework Mapping
|
|
254
|
+
|
|
255
|
+
### SP 800-53 Rev 5 → ISO 27001:2022
|
|
256
|
+
|
|
257
|
+
| SP 800-53 Family | ISO 27001:2022 Annex A Controls |
|
|
258
|
+
|-----------------|-------------------------------|
|
|
259
|
+
| AC (Access Control) | 5.15–5.18 (Access, privilege), 8.2–8.5 |
|
|
260
|
+
| AT (Awareness & Training) | 6.3 (Security awareness) |
|
|
261
|
+
| AU (Audit) | 8.15 (Logging), 8.16 (Monitoring) |
|
|
262
|
+
| CA (Assessment) | 5.35 (IS review), 5.36 (Compliance) |
|
|
263
|
+
| CM (Config Mgmt) | 8.8–8.9 (Vulnerability, config), 8.32 |
|
|
264
|
+
| CP (Contingency) | 5.29 (BCP), 8.13 (Backup) |
|
|
265
|
+
| IA (Authentication) | 5.17 (Authentication), 8.5 (MFA) |
|
|
266
|
+
| IR (Incident Response) | 5.24–5.28 (Incident management) |
|
|
267
|
+
| PE (Physical) | 7.1–7.14 (Physical controls) |
|
|
268
|
+
| RA (Risk Assessment) | 5.1 (Risk treatment), 6.1 (Risk process) |
|
|
269
|
+
| SC (Comms Protection) | 5.14 (Transfer), 8.20–8.26 (Network) |
|
|
270
|
+
| SI (Integrity) | 8.7 (Malware), 8.8 (Vulnerability), 8.19 |
|
|
271
|
+
| SR (Supply Chain) | 5.19–5.22 (Supplier security) |
|
|
272
|
+
|
|
273
|
+
### SP 800-53 Rev 5 → NIST CSF 2.0
|
|
274
|
+
|
|
275
|
+
The CSF 2.0 (February 2024) maps to SP 800-53:
|
|
276
|
+
|
|
277
|
+
| CSF Function | Key SP 800-53 Families |
|
|
278
|
+
|-------------|----------------------|
|
|
279
|
+
| **GV (Govern)** | PM, PL, AT, RA |
|
|
280
|
+
| **ID (Identify)** | RA, CA, CM, PM |
|
|
281
|
+
| **PR (Protect)** | AC, AT, CM, IA, MA, MP, PE, SC, SI, SR |
|
|
282
|
+
| **DE (Detect)** | AU, CA, IR, RA, SI |
|
|
283
|
+
| **RS (Respond)** | IR, CA |
|
|
284
|
+
| **RC (Recover)** | CP, IR |
|
|
285
|
+
|
|
286
|
+
Full mapping: SP 800-53B Appendix B provides CSF subcategory → SP 800-53 control mapping.
|
|
287
|
+
|
|
288
|
+
### SP 800-53 Rev 5 → CMMC 2.0
|
|
289
|
+
|
|
290
|
+
CMMC 2.0 is based on **NIST SP 800-171 Rev 2**, which derives from SP 800-53:
|
|
291
|
+
|
|
292
|
+
| CMMC Level | SP 800-53 Basis |
|
|
293
|
+
|-----------|----------------|
|
|
294
|
+
| Level 1 (Foundational) | Subset of 800-171 practices (17 practices from FAR clause) |
|
|
295
|
+
| Level 2 (Advanced) | Full SP 800-171 Rev 2 (110 practices = ~320 SP 800-53 controls) |
|
|
296
|
+
| Level 3 (Expert) | SP 800-171 + selected SP 800-172 controls |
|
|
297
|
+
|
|
298
|
+
SP 800-171 Appendix D provides the mapping from each 800-171 requirement to the SP 800-53 source controls.
|
|
299
|
+
|
|
300
|
+
### SP 800-53 Rev 5 → FedRAMP
|
|
301
|
+
|
|
302
|
+
FedRAMP uses the SP 800-53 Moderate or High baseline with overlay parameters:
|
|
303
|
+
|
|
304
|
+
| FedRAMP Difference | Detail |
|
|
305
|
+
|-------------------|--------|
|
|
306
|
+
| Specific ODV values | Defined in FedRAMP baseline documentation |
|
|
307
|
+
| Additional requirements | Incident reporting to US-CERT; 3PAO requirement |
|
|
308
|
+
| Cryptography | FIPS 140-2/140-3 validated modules explicitly required |
|
|
309
|
+
| ConMon | Specific monthly/annual frequencies required |
|
|
310
|
+
| SSP format | FedRAMP SSP template must be used |
|
|
311
|
+
| Authorization types | Agency ATO or JAB P-ATO |
|
|
312
|
+
|
|
313
|
+
---
|
|
314
|
+
|
|
315
|
+
## Key Roles in the RMF / SP 800-53 Context
|
|
316
|
+
|
|
317
|
+
| Role | Abbreviation | Responsibility |
|
|
318
|
+
|------|-------------|---------------|
|
|
319
|
+
| Authorizing Official | AO | Accepts risk; grants/denies ATO |
|
|
320
|
+
| Authorizing Official Designated Representative | AODR | Acts on behalf of AO |
|
|
321
|
+
| Chief Information Officer | CIO | Overall IT governance |
|
|
322
|
+
| Senior Agency Information Security Official | SAISO | Agency-wide IS oversight |
|
|
323
|
+
| Information System Security Officer | ISSO | Day-to-day security operations for system |
|
|
324
|
+
| Information System Security Manager | ISSM | Manages multiple ISSOs |
|
|
325
|
+
| System Owner | SO | Responsible for system operation |
|
|
326
|
+
| Common Control Provider | CCP | Implements shared/inherited controls |
|
|
327
|
+
| Security Control Assessor | SCA | Conducts independent assessment |
|
|
328
|
+
| Privacy Officer / CPO | CPO | Privacy program lead |
|
|
329
|
+
|
|
330
|
+
---
|
|
331
|
+
|
|
332
|
+
## Key NIST Publications Related to SP 800-53
|
|
333
|
+
|
|
334
|
+
| Publication | Title | Role |
|
|
335
|
+
|-------------|-------|------|
|
|
336
|
+
| SP 800-53 Rev 5 | Security and Privacy Controls | Main control catalog |
|
|
337
|
+
| SP 800-53A Rev 5 | Assessing Security and Privacy Controls | Assessment procedures |
|
|
338
|
+
| SP 800-53B | Control Baselines | Baseline definitions |
|
|
339
|
+
| SP 800-37 Rev 2 | Risk Management Framework | RMF steps |
|
|
340
|
+
| SP 800-60 Vol I/II | Information Types / Impact Levels | Categorization guidance |
|
|
341
|
+
| SP 800-30 Rev 1 | Risk Assessment | Risk assessment methodology |
|
|
342
|
+
| SP 800-137A | ConMon | Continuous monitoring |
|
|
343
|
+
| SP 800-63 Rev 3 | Digital Identity | Authentication assurance |
|
|
344
|
+
| SP 800-82 Rev 3 | OT Security | ICS/SCADA guide |
|
|
345
|
+
| SP 800-88 Rev 1 | Media Sanitization | Media disposal |
|
|
346
|
+
| SP 800-115 | Security Testing | Penetration testing methodology |
|
|
347
|
+
| FIPS 199 | Security Categorization | Impact level determination |
|
|
348
|
+
| FIPS 200 | Minimum Security Requirements | Baseline requirement |
|
|
349
|
+
| FIPS 140-3 | Cryptographic Modules | Cryptography standard |
|