forked from intuitem/ciso-assistant-community
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathncsc-caf-3.2.yaml
1932 lines (1930 loc) · 91.3 KB
/
ncsc-caf-3.2.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
urn: urn:intuitem:risk:library:ncsc-caf-3.2
locale: en
ref_id: ncsc-caf-3.2
name: Cyber Assessment Framework
description: 'National Cyber Security Centre - Cyber Assessment Framework
https://www.ncsc.gov.uk/collection/cyber-assessment-framework'
copyright: NCSC https://www.ncsc.gov.uk/collection/cyber-assessment-framework
version: 1
provider: NCSC
packager: intuitem
objects:
framework:
urn: urn:intuitem:risk:framework:ncsc-caf-3.2
ref_id: ncsc-caf-3.2
name: Cyber Assessment Framework
description: 'National Cyber Security Centre - Cyber Assessment Framework
https://www.ncsc.gov.uk/collection/cyber-assessment-framework'
requirement_nodes:
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a
assessable: false
depth: 1
ref_id: A
name: Managing security risk
description: Appropriate organisational structures, policies, processes and
procedures in place to understand, assess and systematically manage security
risks to the network and information systems supporting essential functions.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a
ref_id: A1
name: Governance
description: The organisation has appropriate management policies, processes
and procedures in place to govern its approach to the security of network
and information systems.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.a
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1
ref_id: A1.a
name: Board Direction
description: You have effective organisational security management led at board
level and articulated clearly in corresponding policies.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.a.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.a
ref_id: A1.a.1
description: Your organisation's approach and policy relating to the security
of network and information systems supporting the operation of your essential
function(s) are owned and managed at board-level. These are communicated,
in a meaningful way, to risk management decision-makers across the organisation.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.a.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.a
ref_id: A1.a.2
description: Regular board-level discussions on the security of network and
information systems supporting the operation of your essential function(s)
take place, based on timely and accurate information and informed by expert
guidance.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.a.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.a
ref_id: A1.a.3
description: There is a board-level individual who has overall accountability
for the security of network and information systems and drives regular discussion
at board-level.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.a.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.a
ref_id: A1.a.4
description: Direction set at board-level is translated into effective organisational
practices that direct and control the security of the network and information
systems supporting your essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.b
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1
ref_id: A1.b
name: Roles and Responsibilities
description: Your organisation has established roles and responsibilities for
the security of network and information systems at all levels, with clear
and well-understood channels for communicating and escalating risks.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.b.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.b
ref_id: A1.b.1
description: Key roles and responsibilities for the security of network and
information systems supporting your essential function(s) have been identified.
These are reviewed regularly to ensure they remain fit for purpose.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.b.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.b
ref_id: A1.b.2
description: Appropriately capable and knowledgeable staff fill those roles
and are given the time, authority, and resources to carry out their duties.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.b.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.b
ref_id: A1.b.3
description: There is clarity on who in your organisation has overall accountability
for the security of the network and information systems supporting your essential
function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.c
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1
ref_id: A1.c
name: Decision-making
description: You have senior-level accountability for the security of network
and information systems, and delegate decision-making authority appropriately
and effectively. Risks to network and information systems related to the operation
of your essential function(s) are considered in the context of other organisational
risks.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.c.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.c
ref_id: A1.c.1
description: Senior management have visibility of key risk decisions made throughout
the organisation.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.c.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.c
ref_id: A1.c.2
description: Risk management decision-makers understand their responsibilities
for making effective and timely decisions in the context of the risk appetite
regarding the essential function(s), as set by senior management.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.c.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.c
ref_id: A1.c.3
description: Risk management decision-making is delegated and escalated where
necessary, across the organisation, to people who have the skills, knowledge,
tools and authority they need.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.c.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a1.c
ref_id: A1.c.4
description: Risk management decisions are regularly reviewed to ensure their
continued relevance and validity.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a
ref_id: A2
name: Risk Management
description: The organisation takes appropriate steps to identify, assess and
understand security risks to the network and information systems supporting
the operation of essential functions. This includes an overall organisational
approach to risk management.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2
ref_id: A2.a
name: Risk Management Process
description: Your organisation has effective internal processes for managing
risks to the security of network and information systems related to the operation
of your essential function(s) and communicating associated activities.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a
ref_id: A2.a.1
description: Your organisational process ensures that security risks to network
and information systems relevant to essential function(s) are identified,
analysed, prioritised, and managed.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a
ref_id: A2.a.2
description: Your approach to risk is focused on the possibility of adverse
impact to your essential function(s), leading to a detailed understanding
of how such impact might arise as a consequence of possible attacker actions
and the security properties of your network and information systems.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a
ref_id: A2.a.3
description: Your risk assessments are based on a clearly understood set of
threat assumptions, informed by an up-to-date understanding of security threats
to your essential function(s) and your sector.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a
ref_id: A2.a.4
description: Your risk assessments are informed by an understanding of the vulnerabilities
in the network and information systems supporting your essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a.5
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a
ref_id: A2.a.5
description: The output from your risk management process is a clear set of
security requirements that will address the risks in line with your organisational
approach to security.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a.6
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a
ref_id: A2.a.6
description: Significant conclusions reached in the course of your risk management
process are communicated to key security decision-makers and accountable individuals.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a.7
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a
ref_id: A2.a.7
description: Your risk assessments are dynamic and updated in the light of relevant
changes which may include technical changes to network and information systems,
change of use and new threat information.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a.8
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a
ref_id: A2.a.8
description: The effectiveness of your risk management process is reviewed regularly,
and improvements made as required.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a.9
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.a
ref_id: A2.a.9
description: You perform detailed threat analysis and understand how this applies
to your organisation in the context of the threat to your sector and the wider
CNI.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.b
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2
ref_id: A2.b
name: Assurance
description: You have gained confidence in the effectiveness of the security
of your technology, people, and processes relevant to your essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.b.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.b
ref_id: A2.b.1
description: "You validate that the security measures in place to protect the\
\ network and information systems\Lare effective and remain effective for\
\ the lifetime over which they are needed."
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.b.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.b
ref_id: A2.b.2
description: You understand the assurance methods available to you and choose
appropriate methods to gain confidence in the security of essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.b.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.b
ref_id: A2.b.3
description: "Your confidence in the security as it relates to your technology,\
\ people, and processes can be\Ljustified to, and verified by, a third party."
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.b.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.b
ref_id: A2.b.4
description: Security deficiencies uncovered by assurance activities are assessed,
prioritised and remedied when necessary in a timely and effective way.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.b.5
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a2.b
ref_id: A2.b.5
description: The methods used for assurance are reviewed to ensure they are
working as intended and remain the most appropriate method to use.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a3
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a
ref_id: A3
name: Asset Management
description: Everything required to deliver, maintain or support network and
information systems necessary for the operation of essential functions is
determined and understood. This includes data, people and systems, as well
as any supporting infrastructure (such as power or cooling).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a3.a
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a3
ref_id: A3.a
name: Asset Management
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a3.a.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a3.a
ref_id: A3.a.1
description: All assets relevant to the secure operation of essential function(s)
are identified and inventoried (at a suitable level of detail). The inventory
is kept up-to-date.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a3.a.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a3.a
ref_id: A3.a.2
description: Dependencies on supporting infrastructure (e.g. power, cooling
etc) are recognised and recorded.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a3.a.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a3.a
ref_id: A3.a.3
description: You have prioritised your assets according to their importance
to the operation of the essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a3.a.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a3.a
ref_id: A3.a.4
description: You have assigned responsibility for managing all assets, including
physical assets, relevant to the operation of the essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a3.a.5
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a3.a
ref_id: A3.a.5
description: Assets relevant to the essential function(s) are managed with cyber
security in mind throughout their lifecycle, from creation through to eventual
decommissioning or disposal.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a
ref_id: A4
name: Supply Chain
description: The organisation understands and manages security risks to network
and information systems supporting the operation of essential functions that
arise as a result of dependencies on external suppliers. This includes ensuring
that appropriate measures are employed where third party services are used.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4.a
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4
ref_id: A4.a
name: Supply Chain
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4.a.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4.a
ref_id: A4.a.1
description: "You have a deep understanding of your supply chain, including\
\ sub- contractors and the wider risks it faces. You consider factors such\
\ as supplier\u2019s partnerships, competitors, nationality and other organisations\
\ with which they sub- contract. This informs your risk assessment and procurement\
\ processes."
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4.a.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4.a
ref_id: A4.a.2
description: Your approach to supply chain risk management considers the risks
to your essential function(s) arising from supply chain subversion by capable
and well-resourced attackers.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4.a.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4.a
ref_id: A4.a.3
description: You have confidence that information shared with suppliers that
is essential to the operation of your function(s) is appropriately protected
from sophisticated attacks.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4.a.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4.a
ref_id: A4.a.4
description: You understand which contracts are relevant and you include appropriate
security obligations in relevant contracts. You have a proactive approach
to contract management which may include a contract management plan for relevant
contracts.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4.a.5
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4.a
ref_id: A4.a.5
description: Customer / supplier ownership of responsibilities is laid out in
contracts.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4.a.6
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4.a
ref_id: A4.a.6
description: All network connections and data sharing with third parties are
managed effectively and proportionately.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4.a.7
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:a4.a
ref_id: A4.a.7
description: When appropriate, your incident management process and that of
your suppliers provide mutual support in the resolution of incidents.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b
assessable: false
depth: 1
ref_id: B
name: Protecting against cyber attack
description: Proportionate security measures are in place to protect the network
and information systems supporting essential functions from cyber attack.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b
ref_id: B1
name: Service Protection Policies, Processes and Procedures
description: The organisation defines, implements, communicates and enforces
appropriate policies, processes and procedures that direct its overall approach
to securing systems and data that support operation of essential functions.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.a
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1
ref_id: B1.a
name: Policy, Process and Procedure Development
description: You have developed and continue to improve a set of cyber security
and resilience policies, processes and procedures that manage and mitigate
the risk of adverse impact on your essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.a.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.a
ref_id: B1.a.1
description: You fully document your overarching security governance and risk
management approach, technical security practice and specific regulatory compliance.
Cyber security is integrated and embedded throughout policies, processes and
procedures and key performance indicators are reported to your executive management.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.a.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.a
ref_id: B1.a.2
description: "Your organisation\u2019s policies, processes and procedures are\
\ developed to be practical, usable and appropriate for your essential function(s)\
\ and your technologies."
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.a.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.a
ref_id: B1.a.3
description: Policies, processes and procedures that rely on user behaviour
are practical, appropriate and achievable.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.a.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.a
ref_id: B1.a.4
description: You review and update policies, processes and procedures at suitably
regular intervals to ensure they remain relevant. This is in addition to reviews
following a major cyber security incident.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.a.5
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.a
ref_id: B1.a.5
description: Any changes to the essential function(s) or the threat it faces
triggers a review of policies, processes and procedures.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.a.6
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.a
ref_id: B1.a.6
description: Your systems are designed so that they remain secure even when
user security policies, processes and procedures are not always followed.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.b
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1
ref_id: B1.b
name: Policy, Process and Procedure Implementation
description: You have successfully implemented your security policies, processes
and procedures and can demonstrate the security benefits achieved.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.b.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.b
ref_id: B1.b.1
description: All your policies, processes and procedures are followed, their
correct application and security effectiveness is evaluated.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.b.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.b
ref_id: B1.b.2
description: Your policies, processes and procedures are integrated with other
organisational policies, processes and procedures, including HR assessments
of individuals' trustworthiness.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.b.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.b
ref_id: B1.b.3
description: Your policies, processes and procedures are effectively and appropriately
communicated across all levels of the organisation resulting in good staff
awareness of their responsibilities.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.b.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b1.b
ref_id: B1.b.4
description: Appropriate action is taken to address all breaches of policies,
processes and procedures with potential to adversely impact the essential
function(s) including aggregated breaches.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b
ref_id: B2
name: Identity and Access Control
description: The organisation understands, documents and manages access to network
and information systems supporting the operation of essential functions. Users
(or automated functions) that can access data or systems are appropriately
verified, authenticated and authorised.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.a
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2
ref_id: B2.a
name: Identity Verification, Authentication and Authorisation
description: You robustly verify, authenticate and authorise access to the network
and information systems supporting your essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.a.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.a
ref_id: B2.a.1
description: "Your process of initial identity verification is robust enough\
\ to provide a high level of confidence of a user\u2019s identity profile\
\ before allowing an authorised user access to network and information systems\
\ that support your essential function(s)."
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.a.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.a
ref_id: B2.a.2
description: Only authorised and individually authenticated users can physically
access and logically connect to your network or information systems on which
your essential function(s) depends.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.a.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.a
ref_id: B2.a.3
description: The number of authorised users and systems that have access to
all your network and information systems supporting the essential function(s)
is limited to the minimum necessary.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.a.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.a
ref_id: B2.a.4
description: "You use additional authentication mechanisms, such as multi-factor\L\
(MFA), for all user access, including remote access, to all network and information\
\ systems that operate or support your essential function(s)."
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.a.5
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.a
ref_id: B2.a.5
description: The list of users and systems with access to network and information
systems supporting and delivering the essential function(s) is reviewed on
a regular basis, at least every six months.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.a.6
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.a
ref_id: B2.a.6
description: Your approach to authenticating users, devices and systems follows
up to date best practice.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.b
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2
ref_id: B2.b
name: Device Management
description: You fully know and have trust in the devices that are used to access
your networks, information systems and data that support your essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.b.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.b
ref_id: B2.b.1
description: All privileged operations performed on your network and information
systems supporting your essential function(s) are conducted from highly trusted
devices, such as Privileged Access Workstations, dedicated solely to those
operations.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.b.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.b
ref_id: B2.b.2
description: You either obtain independent and professional assurance of the
security of third-party devices or networks before they connect to your network
and information systems, or you only allow third-party devices or networks
that are dedicated to supporting your network and information systems to connect.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.b.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.b
ref_id: B2.b.3
description: You perform certificate-based device identity management and only
allow known devices to access systems necessary for the operation of your
essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.b.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.b
ref_id: B2.b.4
description: You perform regular scans to detect unknown devices and investigate
any findings.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.c
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2
ref_id: B2.c
name: Privileged User Management
description: You closely manage privileged user access to network and information
systems supporting your essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.c.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.c
ref_id: B2.c.1
description: Privileged user access to network and information systems supporting
your essential function(s) is carried out from dedicated separate accounts
that are closely monitored and managed.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.c.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.c
ref_id: B2.c.2
description: The issuing of temporary, time- bound rights for privileged user
access and / or external third- party support access is in place.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.c.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.c
ref_id: B2.c.3
description: Privileged user access rights are regularly reviewed and always
updated as part of your joiners, movers and leavers process.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.c.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.c
ref_id: B2.c.4
description: All privileged user activity is routinely reviewed, validated and
recorded for offline analysis and investigation.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.d
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2
ref_id: B2.d
name: Identity and Access Management (IdAM)
description: You closely manage and maintain identity and access control for
users, devices and systems accessing the network and information systems supporting
your essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.d.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.d
ref_id: B2.d.1
description: You follow a robust procedure to verify each user and issue the
minimum required access rights, and the application of the procedure is regularly
audited.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.d.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.d
ref_id: B2.d.2
description: User access rights are reviewed both when people change roles via
your joiners, leavers and movers process and at regular intervals - at least
annually.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.d.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.d
ref_id: B2.d.3
description: All user, device and systems access to the systems supporting the
essential function(s) is logged and monitored.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.d.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.d
ref_id: B2.d.4
description: You regularly review access logs and correlate this data with other
access records and expected activity.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.d.5
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b2.d
ref_id: B2.d.5
description: Attempts by unauthorised users, devices or systems to connect to
the systems supporting the essential function(s) are alerted, promptly assessed
and investigated.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b
ref_id: B3
name: Data Security
description: Data stored or transmitted electronically is protected from actions
such as unauthorised access, modification, or deletion that may cause an adverse
impact on essential functions. Such protection extends to the means by which
authorised users, devices and systems access critical data necessary for the
operation of essential functions. It also covers information that would assist
an attacker, such as design details of network and information systems.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3
ref_id: B3.a
name: Understanding Data
description: You have a good understanding of data important to the operation
of your essential function(s), where it is stored, where it travels and how
unavailability or unauthorised access, modification or deletion would adversely
impact the essential function(s). This also applies to third parties storing
or accessing data important to the operation of your essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a
ref_id: B3.a.1
description: You have identified and catalogued all the data important to the
operation of the essential function(s), or that would assist an attacker.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a
ref_id: B3.a.2
description: You have identified and catalogued who has access to the data important
to the operation of the essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a
ref_id: B3.a.3
description: You maintain a current understanding of the location, quantity
and quality of data important to the operation of the essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a
ref_id: B3.a.4
description: You take steps to remove or minimise unnecessary copies or unneeded
historic data.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a.5
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a
ref_id: B3.a.5
description: You have identified all mobile devices and media that may hold
data important to the operation of the essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a.6
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a
ref_id: B3.a.6
description: You maintain a current understanding of the data links used to
transmit data that is important to your essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a.7
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a
ref_id: B3.a.7
description: You understand the context, limitations and dependencies of your
important data.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a.8
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a
ref_id: B3.a.8
description: You understand and document the impact on your essential function(s)
of all relevant scenarios, including unauthorised data access, modification
or deletion, or when authorised users are unable to appropriately access this
data.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a.9
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.a
ref_id: B3.a.9
description: You validate these documented impact statements regularly, at least
annually.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.b
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3
ref_id: B3.b
name: Data in Transit
description: You have protected the transit of data important to the operation
of your essential function(s). This includes the transfer of data to third
parties.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.b.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.b
ref_id: B3.b.1
description: You have identified and protected (effectively and proportionately)
all the data links that carry data important to the operation of your essential
function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.b.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.b
ref_id: B3.b.2
description: You apply appropriate physical and / or technical means to protect
data that travels over non-trusted or openly accessible carriers, with justified
confidence in the robustness of the protection applied.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.b.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.b
ref_id: B3.b.3
description: Suitable alternative transmission paths are available where there
is a significant risk of impact on the operation of the essential function(s)
due to resource limitation (e.g. transmission equipment or function failure,
or important data being blocked or jammed).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.c
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3
ref_id: B3.c
name: Stored Data
description: You have protected stored soft and hard copy data important to
the operation of your essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.c.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.c
ref_id: B3.c.1
description: All copies of data important to the operation of your essential
function(s) are necessary. Where this important data is transferred to less
secure systems, the data is provided with limited detail and / or as a read-only
copy.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.c.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.c
ref_id: B3.c.2
description: You have applied suitable physical and / or technical means to
protect this important stored data from unauthorised access, modification
or deletion.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.c.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.c
ref_id: B3.c.3
description: If cryptographic protections are used you apply suitable technical
and procedural means, and you have justified confidence in the robustness
of the protection applied.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.c.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.c
ref_id: B3.c.4
description: You have suitable, secured backups of data to allow the operation
of the essential function(s) to continue should the original data not be available.
This may include off- line or segregated backups, or appropriate alternative
forms such as paper copies.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.c.5
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.c
ref_id: B3.c.5
description: Necessary historic or archive data is suitably secured in storage.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.d
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3
ref_id: B3.d
name: Mobile Data
description: You have protected data important to the operation of your essential
function(s) on mobile devices.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.d.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.d
ref_id: B3.d.1
description: Mobile devices that hold data that is important to the operation
of the essential function(s) are catalogued, are under your organisation's
control and configured according to best practice for the platform, with appropriate
technical and procedural policies in place.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.d.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.d
ref_id: B3.d.2
description: Your organisation can remotely wipe all mobile devices holding
data important to the operation of the essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.d.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.d
ref_id: B3.d.3
description: You have minimised this data on these mobile devices. Some data
may be automatically deleted off mobile devices after a certain period.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.e
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3
ref_id: B3.e
name: Media / Equipment Sanitisation
description: Before reuse and / or disposal you appropriately sanitise devices,
equipment and removable media holding data important to the operation of your
essential function(s).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.e.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.e
ref_id: B3.e.1
description: You catalogue and track all devices that contain data important
to the operation of the essential function(s) (whether a specific storage
device or one with integral storage).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.e.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b3.e
ref_id: B3.e.2
description: Data important to the operation of the essential function(s) is
removed from all devices, equipment and removable media before reuse and /
or disposal using an assured product or service.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b4
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b
ref_id: B4
name: System Security
description: Network and information systems and technology critical for the
operation of essential functions are protected from cyber attack. An organisational
understanding of risk to essential functions informs the use of robust and
reliable protective security measures to effectively limit opportunities for
attackers to compromise networks and systems.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b4.a
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b4
ref_id: B4.a
name: Secure by Design
description: You design security into the network and information systems that
support the operation of your essential function(s). You minimise their attack
surface and ensure that the operation of your essential function(s) should
not be impacted by the exploitation of any single vulnerability.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b4.a.1
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b4.a
ref_id: B4.a.1
description: You employ appropriate expertise to design network and information
systems.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b4.a.2
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b4.a
ref_id: B4.a.2
description: Your network and information systems are segregated into appropriate
security zones (e.g. systems supporting the essential function(s) are segregated
in a highly trusted, more secure zone).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b4.a.3
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b4.a
ref_id: B4.a.3
description: The network and information systems supporting your essential function(s)
are designed to have simple data flows between components to support effective
security monitoring.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b4.a.4
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b4.a
ref_id: B4.a.4
description: The network and information systems supporting your essential function(s)
are designed to be easy to recover.
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b4.a.5
assessable: true
depth: 4
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b4.a
ref_id: B4.a.5
description: Content-based attacks are mitigated for all inputs to network and
information systems that affect the essential function(s) (e.g. via transformation
and inspection).
- urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b4.b
assessable: false
depth: 3
parent_urn: urn:intuitem:risk:req_node:ncsc-caf-3.2:b4