| Framework Standard | Category | Controls Satisfied | 800-53r4 Controls | ISO/SEC 27001 | Audit Controls |
|---|---|---|---|---|---|
| NIST 800-171 | None | None | None | None | None |
| Date | Comment | Who |
|---|---|---|
| 8/12/2019 | Added Template Fields and FIPS 199, Format Updates | Tharp |
| 8/13/2019 | Added NIST 800-53r4 to ISO/IEC Matrix | Tharp |
| Framework Standard | Category | Controls Satisfied | 800-53r4 Controls | ISO/SEC 27001 | Audit Controls |
|---|---|---|---|---|---|
| NIST 800-171 | Can Name | Controls Covered | NIST Sections | ISO Topics | A-lign Topics |
| Date | Comment | Who |
|---|---|---|
| 1/1/2000 | Change Notes | Change Author |
Purpose and Scope====
Background====
Policies====
n.nn===
Response Plan
Plan # Name====
A===
B===
| Term | Definition |
|---|---|
| Policy | Policies are the statements of the specific framework being referenced |
| Plans | Are DLZP Group's implementation documentation to achieve the corresponding policy |
| NIST SP 800-53 CONTROLS | NIST SP 800-53 CONTROLS | “ISO/IEC 27001 CONTROLS Note: An asterisk (*) indicates that the ISO/IEC control does not fully satisfy the intent of the NIST control. ” |
|---|---|---|
| AC-1 | Access Control Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.9.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| AC-2 | Account Management | A.9.2.1; A.9.2.2; A.9.2.3; A.9.2.5; A.9.2.6 |
| AC-3 | Access Enforcement | A.6.2.2; A.9.1.2; A.9.4.1; A.9.4.4; A.9.4.5; A.13.1.1; A.14.1.2; A.14.1.3; A.18.1.3 |
| AC-4 | Information Flow Enforcement | A.13.1.3; A.13.2.1; A.14.1.2; A.14.1.3 |
| AC-5 | Separation of Duties | A.6.1.2 |
| AC-6 | Least Privilege | A.9.1.2; A.9.2.3; A.9.4.4; A.9.4.5 |
| AC-7 | Unsuccessful Logon Attempts | A.9.4.2 |
| AC-8 | System Use Notification | A.9.4.2 |
| AC-9 | Previous Logon (Access) Notification | A.9.4.2 |
| AC-10 | Concurrent Session Control | None |
| AC-11 | Session Lock | A.11.2.8; A.11.2.9 |
| AC-12 | Session Termination | None |
| AC-13 | Withdrawn | — |
| AC-14 | Permitted Actions without Identification or Authentication | None |
| AC-15 | Withdrawn | — |
| AC-16 | Security Attributes | None |
| AC-17 | Remote Access | A.6.2.1; A.6.2.2; A.13.1.1; A.13.2.1; A.14.1.2 |
| AC-18 | Wireless Access | A.6.2.1; A.13.1.1; A.13.2.1 |
| AC-19 | Access Control for Mobile Devices | A.6.2.1; A.11.2.6; A.13.2.1 |
| AC-20 | Use of External Information Systems | A.11.2.6; A.13.1.1; A.13.2.1 |
| AC-21 | Information Sharing | None |
| AC-22 | Publicly Accessible Content | None |
| AC-23 | Data Mining Protection | None |
| AC-24 | Access Control Decisions | A.9.4.1* |
| AC-25 | Reference Monitor | None |
| AT-1 | Security Awareness and Training Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| AT-2 | Security Awareness Training | A.7.2.2; A.12.2.1 |
| AT-3 | Role-Based Security Training | A.7.2.2* |
| AT-4 | Security Training Records | None |
| AT-5 | Withdrawn | — |
| AU-1 | Audit and Accountability Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| AU-2 | Audit Events | None |
| AU-3 | Content of Audit Records | A.12.4.1* |
| AU-4 | Audit Storage Capacity | A.12.1.3 |
| AU-5 | Response to Audit Processing Failures | None |
| AU-6 | Audit Review; Analysis; and Reporting | A.12.4.1; A.16.1.2; A.16.1.4 |
| AU-7 | Audit Reduction and Report Generation | None |
| AU-8 | Time Stamps | A.12.4.4 |
| AU-9 | Protection of Audit Information | A.12.4.2; A.12.4.3; A.18.1.3 |
| AU-10 | Non-repudiation | None |
| AU-11 | Audit Record Retention | A.12.4.1; A.16.1.7 |
| AU-12 | Audit Generation | A.12.4.1; A.12.4.3 |
| AU-13 | Monitoring for Information Disclosure | None |
| AU-14 | Session Audit | A.12.4.1* |
| AU-15 | Alternate Audit Capability | None |
| AU-16 | Cross-Organizational Auditing | None |
| CA-1 | Security Assessment and Authorization Policies and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| CA-2 | Security Assessments | A.14.2.8; A.18.2.2; A.18.2.3 |
| CA-3 | System Interconnections | A.13.1.2; A.13.2.1; A.13.2.2 |
| CA-4 | Withdrawn | — |
| CA-5 | Plan of Action and Milestones | None |
| CA-6 | Security Authorization | None |
| CA-7 | Continuous Monitoring | None |
| CA-8 | Penetration Testing | None |
| CA-9 | Internal System Connections | None |
| CM-1 | Configuration Management Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| CM-2 | Baseline Configuration | None |
| CM-3 | Configuration Change Control | A.12.1.2; A.14.2.2; A.14.2.3; A.14.2.4 |
| CM-4 | Security Impact Analysis | A.14.2.3 |
| CM-5 | Access Restrictions for Change | A.9.2.3; A.9.4.5; A.12.1.2; A.12.1.4; A.12.5.1 |
| CM-6 | Configuration Settings | None |
| CM-7 | Least Functionality | A.12.5.1* |
| CM-8 | Information System Component Inventory | A.8.1.1; A.8.1.2 |
| CM-9 | Configuration Management Plan | A.6.1.1* |
| CM-10 | Software Usage Restrictions | A.18.1.2 |
| CM-11 | User-Installed Software | A.12.5.1; A.12.6.2 |
| CP-1 | Contingency Planning Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| CP-2 | Contingency Plan | A.6.1.1; A.17.1.1; A.17.2.1 |
| CP-3 | Contingency Training | A.7.2.2* |
| CP-4 | Contingency Plan Testing | A.17.1.3 |
| CP-5 | Withdrawn | — |
| CP-6 | Alternate Storage Site | A.11.1.4; A.17.1.2; A.17.2.1 |
| CP-7 | Alternate Processing Site | A.11.1.4; A.17.1.2; A.17.2.1 |
| CP-8 | Telecommunications Services | A.11.2.2; A.17.1.2 |
| CP-9 | Information System Backup | A.12.3.1; A.17.1.2; A.18.1.3 |
| CP-10 | Information System Recovery and Reconstitution | A.17.1.2 |
| CP-11 | Alternate Communications Protocols | A.17.1.2* |
| CP-12 | Safe Mode | None |
| CP-13 | Alternative Security Mechanisms | A.17.1.2* |
| IA-1 | Identification and Authentication Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| IA-2 | Identification and Authentication (Organizational Users) | A.9.2.1 |
| IA-3 | Device Identification and Authentication | None |
| IA-4 | Identifier Management | A.9.2.1 |
| IA-5 | Authenticator Management | A.9.2.1; A.9.2.4; A.9.3.1; A.9.4.3 |
| IA-6 | Authenticator Feedback | A.9.4.2 |
| IA-7 | Cryptographic Module Authentication | A.18.1.5 |
| IA-8 | Identification and Authentication (Non-Organizational Users) | A.9.2.1 |
| IA-9 | Service Identification and Authentication | None |
| IA-10 | Adaptive Identification and Authentication | None |
| IA-11 | Re-authentication | None |
| IR-1 | Incident Response Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1 A.18.1.1; A.18.2.2 |
| IR-2 | Incident Response Training | A.7.2.2* |
| IR-3 | Incident Response Testing | None |
| IR-4 | Incident Handling | A.16.1.4; A.16.1.5; A.16.1.6 |
| IR-5 | Incident Monitoring | None |
| IR-6 | Incident Reporting | A.6.1.3; A.16.1.2 |
| IR-7 | Incident Response Assistance | None |
| IR-8 | Incident Response Plan | A.16.1.1 |
| IR-9 | Information Spillage Response | None |
| IR-10 | Integrated Information Security Analysis Team | None |
| MA-1 | System Maintenance Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| MA-2 | Controlled Maintenance | A.11.2.4*; A.11.2.5* |
| MA-3 | Maintenance Tools | None |
| MA-4 | Nonlocal Maintenance | None |
| MA-5 | Maintenance Personnel | None |
| MA-6 | Timely Maintenance | A.11.2.4 |
| MP-1 | Media Protection Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| MP-2 | Media Access | A.8.2.3; A.8.3.1; A.11.2.9 |
| MP-3 | Media Marking | A.8.2.2 |
| MP-4 | Media Storage | A.8.2.3; A.8.3.1; A.11.2.9 |
| MP-5 | Media Transport | A.8.2.3; A.8.3.1; A.8.3.3; A.11.2.5; A.11.2.6 |
| MP-6 | Media Sanitization | A.8.2.3; A.8.3.1; A.8.3.2; A.11.2.7 |
| MP-7 | Media Use | A.8.2.3; A.8.3.1 |
| MP-8 | Media Downgrading | None |
| PE-1 | Physical and Environmental Protection Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| PE-2 | Physical Access Authorizations | A.11.1.2* |
| PE-3 | Physical Access Control | A.11.1.1; A.11.1.2; A.11.1.3 |
| PE-4 | Access Control for Transmission Medium | A.11.1.2; A.11.2.3 |
| PE-5 | Access Control for Output Devices | A.11.1.2; A.11.1.3 |
| PE-6 | Monitoring Physical Access | None |
| PE-7 | Withdrawn | — |
| PE-8 | Visitor Access Records | None |
| PE-9 | Power Equipment and Cabling | A.11.1.4; A.11.2.1; A.11.2.2; A.11.2.3 |
| PE-10 | Emergency Shutoff | A.11.2.2* |
| PE-11 | Emergency Power | A.11.2.2 |
| PE-12 | Emergency Lighting | A.11.2.2* |
| PE-13 | Fire Protection | A.11.1.4; A.11.2.1 |
| PE-14 | Temperature and Humidity Controls | A.11.1.4; A.11.2.1; A.11.2.2 |
| PE-15 | Water Damage Protection | A.11.1.4; A.11.2.1; A.11.2.2 |
| PE-16 | Delivery and Removal | A.8.2.3; A.11.1.6; A.11.2.5 |
| PE-17 | Alternate Work Site | A.6.2.2; A.11.2.6; A.13.2.1 |
| PE-18 | Location of Information System Components | A.8.2.3; A.11.1.4; A.11.2.1 |
| PE-19 | Information Leakage | A.11.1.4; A.11.2.1 |
| PE-20 | Asset Monitoring and Tracking | A.8.2.3* |
| PL-1 | Security Planning Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| PL-2 | System Security Plan | A.14.1.1 |
| PL-3 | Withdrawn | — |
| PL-4 | Rules of Behavior | A.7.1.2; A.7.2.1; A.8.1.3 |
| PL-5 | Withdrawn | — |
| PL-6 | Withdrawn | — |
| PL-7 | Security Concept of Operations | A.14.1.1* |
| PL-8 | Information Security Architecture | A.14.1.1* |
| PL-9 | Central Management | None |
| PS-1 | Personnel Security Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| PS-2 | Position Risk Designation | None |
| PS-3 | Personnel Screening | A.7.1.1 |
| PS-4 | Personnel Termination | A.7.3.1; A.8.1.4 |
| PS-5 | Personnel Transfer | A.7.3.1; A.8.1.4 |
| PS-6 | Access Agreements | A.7.1.2; A.7.2.1; A.13.2.4 |
| PS-7 | Third-Party Personnel Security | A.6.1.1*; A.7.2.1* |
| PS-8 | Personnel Sanctions | A.7.2.3 |
| RA-1 | Risk Assessment Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| RA-2 | Security Categorization | A.8.2.1 |
| RA-3 | Risk Assessment | A.12.6.1* |
| RA-4 | Withdrawn | — |
| RA-5 | Vulnerability Scanning | A.12.6.1* |
| RA-6 | Technical Surveillance Countermeasures Survey | None |
| SA-1 | System and Services Acquisition Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| SA-2 | Allocation of Resources | None |
| SA-3 | System Development Life Cycle | A.6.1.1; A.6.1.5; A.14.1.1; A.14.2.1; A.14.2.6 |
| SA-4 | Acquisition Process | A.14.1.1; A.14.2.7; A.14.2.9; A.15.1.2 |
| SA-5 | Information System Documentation | A.12.1.1* |
| SA-6 | Withdrawn | — |
| SA-7 | Withdrawn | — |
| SA-8 | Security Engineering Principles | A.14.2.5 |
| SA-9 | External Information System Services | A.6.1.1; A.6.1.5; A.7.2.1; A.13.1.2; A.13.2.2; A.15.2.1; A.15.2.2 |
| SA-10 | Developer Configuration Management | A.12.1.2; A.14.2.2; A.14.2.4; A.14.2.7 |
| SA-11 | Developer Security Testing and Evaluation | A.14.2.7; A.14.2.8 |
| SA-12 | Supply Chain Protections | A.14.2.7; A.15.1.1; A.15.1.2; A.15.1.3 |
| SA-13 | Trustworthiness | None |
| SA-14 | Criticality Analysis | None |
| SA-15 | Development Process; Standards; and Tools | A.6.1.5; A.14.2.1; |
| SA-16 | Developer-Provided Training | None |
| SA-17 | Developer Security Architecture and Design | A.14.2.1; A.14.2.5 |
| SA-18 | Tamper Resistance and Detection | None |
| SA-19 | Component Authenticity | None |
| SA-20 | Customized Development of Critical Components | None |
| SA-21 | Developer Screening | A.7.1.1 |
| SA-22 | Unsupported System Components | None |
| SC-1 | System and Communications Protection Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| SC-2 | Application Partitioning | None |
| SC-3 | Security Function Isolation | None |
| SC-4 | Information In Shared Resources | None |
| SC-5 | Denial of Service Protection | None |
| SC-6 | Resource Availability | None |
| SC-7 | Boundary Protection | A.13.1.1; A.13.1.3; A.13.2.1; A.14.1.3 |
| SC-8 | Transmission Confidentiality and Integrity | A.8.2.3; A.13.1.1; A.13.2.1; A.13.2.3; A.14.1.2; A.14.1.3 |
| SC-9 | Withdrawn | — |
| SC-10 | Network Disconnect | A.13.1.1 |
| SC-11 | Trusted Path | None |
| SC-12 | Cryptographic Key Establishment and Management | A.10.1.2 |
| SC-13 | Cryptographic Protection | A.10.1.1; A.14.1.2; A.14.1.3; A.18.1.5 |
| SC-14 | Withdrawn | — |
| SC-15 | Collaborative Computing Devices | A.13.2.1* |
| SC-16 | Transmission of Security Attributes | None |
| SC-17 | Public Key Infrastructure Certificates | A.10.1.2 |
| SC-18 | Mobile Code | None |
| SC-19 | Voice Over Internet Protocol | None |
| SC-20 | Secure Name/Address Resolution Service (Authoritative Source) | None |
| SC-21 | Secure Name/Address Resolution Service (Recursive or Caching Resolver) | None |
| SC-22 | Architecture and Provisioning for Name/Address Resolution Service | None |
| SC-23 | Session Authenticity | None |
| SC-24 | Fail in Known State | None |
| SC-25 | Thin Nodes | None |
| SC-26 | Honeypots | None |
| SC-27 | Platform-Independent Applications | None |
| SC-28 | Protection of Information at Rest | A.8.2.3* |
| SC-29 | Heterogeneity | None |
| SC-30 | Concealment and Misdirection | None |
| SC-31 | Covert Channel Analysis | None |
| SC-32 | Information System Partitioning | None |
| SC-33 | Withdrawn | — |
| SC-34 | Non-Modifiable Executable Programs | None |
| SC-35 | Honeyclients | None |
| SC-36 | Distributed Processing and Storage | None |
| SC-37 | Out-of-Band Channels | None |
| SC-38 | Operations Security | A.12.x |
| SC-39 | Process Isolation | None |
| SC-40 | Wireless Link Protection | None |
| SC-41 | Port and I/O Device Access | None |
| SC-42 | Sensor Capability and Data | None |
| SC-43 | Usage Restrictions | None |
| SC-44 | Detonation Chambers | None |
| SI-1 | System and Information Integrity Policy and Procedures | A.5.1.1; A.5.1.2; A.6.1.1; A.12.1.1; A.18.1.1; A.18.2.2 |
| SI-2 | Flaw Remediation | A.12.6.1; A.14.2.2; A.14.2.3; A.16.1.3 |
| SI-3 | Malicious Code Protection | A.12.2.1 |
| SI-4 | Information System Monitoring | None |
| SI-5 | Security Alerts; Advisories; and Directives | A.6.1.4* |
| SI-6 | Security Function Verification | None |
| SI-7 | Software; Firmware; and Information Integrity | None |
| SI-8 | Spam Protection | None |
| SI-9 | Withdrawn | – |
| SI-10 | Information Input Validation | None |
| SI-11 | Error Handling | None |
| SI-12 | Information Handling and Retention | None |
| SI-13 | Predictable Failure Prevention | None |
| SI-14 | Non-Persistence | None |
| SI-15 | Information Output Filtering | None |
| SI-16 | Memory Protection | None |
| SI-17 | Fail-Safe Procedures | None |
| PM-1 | Information Security Program Plan | A.5.1.1; A.5.1.2; A.6.1.1; A.18.1.1; A.18.2.2 |
| PM-2 | Senior Information Security Officer | A.6.1.1* |
| PM-3 | Information Security Resources | None |
| PM-4 | Plan of Action and Milestones Process | None |
| PM-5 | Information System Inventory | None |
| PM-6 | Information Security Measures of Performance | None |
| PM-7 | Enterprise Architecture | None |
| PM-8 | Critical Infrastructure Plan | None |
| PM-9 | Risk Management Strategy | None |
| PM-10 | Security Authorization Process | A.6.1.1* |
| PM-11 | Mission/Business Process Definition | None |
| PM-12 | Insider Threat Program | None |
| PM-13 | Information Security Workforce | A.7.2.2* |
| PM-14 | Testing; Training; and Monitoring | None |
| PM-15 | Contacts with Security Groups and Associations | A.6.1.4 |
| PM-16 | Threat Awareness Program | None |