Assessment
Submission
AI Processing
& Analysis
Key Controls
Review
4
Final
Results
Search & Add Controls
AI-powered search finds controls based on meaning and context
AI Search Results

Found semantically similar controls

0 results

Current Key Controls

101 Total
Scoping Question 1

Will the entity’s personnel require specialized clearances or certifications? Determines if staff need background checks, professional licenses, or industry certifications before starting work. Delays onboarding if certifications lapse; compliance risk if unauthorised staff perform regulated tasks. Credential-verification process Expiration-tracking of certifications Backup resource plan for lapsed clearances

30 Controls
CIS 5.1 Found
Establish and Maintain an Inventory of Accounts

Establish and maintain an inventory of all accounts managed in the enterprise. The inventory must at a minimum include user, administrator accounts, and service accounts. The inventory, at a minimum, ...

Auto-Generated Generated during job processing
Control 5.1 is relevant to the scoping question because maintaining an accurate inventory of accounts enables the organization to verify that only personnel with the required clearances or certifications have active access. This control is important ...
CIS 2.2 Found
Ensure Authorized Software is Currently Supported

Ensure that only currently supported software is designated as authorized in the software inventory for enterprise assets. If software is unsupported, yet necessary for the fulfillment of the enterpri...

Auto-Generated Generated during job processing
Control 2.2 is relevant to the scoping question because personnel often require specialized software to perform regulated tasks, and using only authorized, supported software helps ensure that staff meet certification and clearance requirements. This...
NIST PE-3 Found
Physical Access Control

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas...

Auto-Generated Generated during job processing
PE-3 Physical Access Control is directly relevant to the scoping question because it ensures that only personnel with the required specialized clearances or certifications are granted access to sensitive or restricted areas. This control is important...
NIST AT-3 Found
Role-based Training

Organizations determine the content of training based on the assigned roles and responsibilities of individuals as well as the security and privacy requirements of organizations and the systems to whi...

Auto-Generated Generated during job processing
Control AT-3 (Role-based Training) is relevant to the scoping question because it ensures personnel receive training tailored to their specific roles, including any specialized clearances or certifications required for compliance with regulatory or o...
NIST SA-21 Found
Developer Screening

Developer screening is directed at external developers. Internal developer screening is addressed by PS-3. Because the system, system component, or system service may be used in critical activities es...

Auto-Generated Generated during job processing
Control SA-21 (Developer Screening) directly addresses the scoping question by requiring verification that external developers possess the necessary clearances, background checks, and certifications before engaging in critical system activities. This...
NIST CP-3 Found
Contingency Training

Contingency training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail is included i...

Auto-Generated Generated during job processing
CP-3 (Contingency Training) is relevant to the scoping question because it ensures that personnel assigned to contingency roles receive training appropriate to their responsibilities, which may include specialized clearances or certifications. This c...
NIST CA-6 Found
Authorization

Authorizations are official management decisions by senior officials to authorize operation of systems, authorize the use of common controls for inheritance by organizational systems, and explicitly a...

Auto-Generated Generated during job processing
Control CA-6 (Authorization) is relevant to the scoping question because it requires senior management to formally authorize system operations, including verifying that personnel meet all necessary clearances and certifications before granting access...
NIST PE-2 Found
Physical Access Authorizations

Physical access authorizations apply to employees and visitors. Individuals with permanent physical access authorization credentials are not considered visitors. Authorization credentials include ID b...

Auto-Generated Generated during job processing
PE-2 Physical Access Authorizations is directly relevant to the scoping question because it ensures that only personnel with the required clearances or certifications are granted physical access to sensitive areas. This control is important for compl...
NIST PM-10 Found
Authorization Process

Authorization processes for organizational systems and environments of operation require the implementation of an organization-wide risk management process and associated security and privacy standard...

Auto-Generated Generated during job processing
PM-10 (Authorization Process) is directly relevant to the scoping question because it ensures that only personnel with the required clearances, certifications, and authorizations are permitted to access organizational systems and perform regulated ta...
NIST PS-3 Found
Personnel Screening

Personnel screening and rescreening activities reflect applicable laws, executive orders, directives, regulations, policies, standards, guidelines, and specific criteria established for the risk desig...

Auto-Generated Generated during job processing
1. Control PS-3 (Personnel Screening) directly addresses the scoping question by requiring organizations to conduct background checks and verify that personnel meet any necessary clearances or certifications before granting access to sensitive system...
NIST CP-9 Found
System Backup

System-level information includes system state information, operating system software, middleware, application software, and licenses. User-level information includes information other than system-lev...

Auto-Generated Generated during job processing
1. Control CP-9 (System Backup) is relevant to the scoping question because it ensures that critical personnel records—such as clearances, certifications, and credentialing documentation—are securely backed up and recoverable in case of data loss. 2....
NIST PT-2 Found
Authority to Process Personally Identifiable Information

The processing of personally identifiable information is an operation or set of operations that the information system or organization performs with respect to personally identifiable information acro...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that only personnel with the proper authority, clearances, or certifications are permitted to process personally identifiable information (PII), as required by laws and organizational policie...
NIST AC-2 Found
Account Management

Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specificat...

Auto-Generated Generated during job processing
1. AC-2 Account Management addresses the scoping question by requiring organizations to identify and authorize system users based on specific attributes, such as specialized clearances or certifications, before granting access to accounts. 2. This co...
NIST PS-2 Found
Position Risk Designation

Position risk designations reflect Office of Personnel Management (OPM) policy and guidance. Proper position designation is the foundation of an effective and consistent suitability and personnel secu...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PS-2 (Position Risk Designation) directly addresses whether personnel require specialized clearances or certifications by mandating a formal assessment of each position’s duties and associated...
NIST MA-5 Found
Maintenance Personnel

Maintenance personnel refers to individuals who perform hardware or software maintenance on organizational systems, while PE-2 addresses physical access for individuals whose maintenance duties place ...

Auto-Generated Generated during job processing
1. Control MA-5 addresses the scoping question by requiring that maintenance personnel possess appropriate access authorizations and, where necessary, specialized credentials or clearances before performing maintenance activities on organizational sy...
NIST PT-7 Found
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
1. Control PT-7 is relevant to the scoping question because verifying personnel clearances or certifications often involves collecting and handling sensitive categories of personally identifiable information (PII), such as background check results or...
NIST IA-7 Found
Cryptographic Module Authentication

Authentication mechanisms may be required within a cryptographic module to authenticate an operator accessing the module and to verify that the operator is authorized to assume the requested role and ...

Auto-Generated Generated during job processing
Control IA-7 (Cryptographic Module Authentication) is relevant to the scoping question because it ensures that only personnel with the appropriate clearances or certifications can access sensitive cryptographic modules and perform authorized function...
NIST PS-4 Found
Personnel Termination

System property includes hardware authentication tokens, system administration technical manuals, keys, identification cards, and building passes. Exit interviews ensure that terminated individuals un...

Auto-Generated Generated during job processing
1. The Personnel Termination control (PS-4) addresses the scoping question by ensuring that when staff with specialized clearances or certifications leave the organization, their access to sensitive systems and physical assets is promptly revoked and...
NIST AC-5 Found
Separation of Duties

Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or...

Auto-Generated Generated during job processing
1. AC-5 (Separation of Duties) addresses the scoping question by ensuring that personnel assigned to sensitive roles possess the appropriate clearances or certifications, and that critical functions are divided among qualified individuals to prevent ...
NIST PT-3 Found
Personally Identifiable Information Processing Purposes

Identifying and documenting the purpose for processing provides organizations with a basis for understanding why personally identifiable information may be processed. The term process includes every s...

Auto-Generated Generated during job processing
1. This control (PT-3) addresses the scoping question by requiring the organization to identify and document the purpose for processing personally identifiable information (PII), such as background checks or credential verification, which are necessa...
NIST CA-1 Found
Policy and Procedures

Assessment, authorization, and monitoring policy and procedures address the controls in the CA family that are implemented within systems and organizations. The risk management strategy is an importan...

Auto-Generated Generated during job processing
CA-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to formally establish and document policies and procedures for assessment, authorization, and monitoring—including those governing personnel clearan...
NIST IA-1 Found
Policy and Procedures

Identification and authentication policy and procedures address the controls in the IA family that are implemented within systems and organizations. The risk management strategy is an important factor...

Auto-Generated Generated during job processing
1. IA-1 (Policy and Procedures) ensures the organization formally defines and documents requirements for identification and authentication, including specialized clearances and certifications for personnel, directly addressing whether staff need back...
NIST PS-1 Found
Policy and Procedures

Personnel security policy and procedures for the controls in the PS family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
Control PS-1 (Policy and Procedures) is directly relevant to the scoping question because it requires the organization to formally define and document personnel security policies and procedures, including those for verifying specialized clearances or...
NIST PM-11 Found
Mission and Business Process Definition

Protection needs are technology-independent capabilities that are required to counter threats to organizations, individuals, systems, and the Nation through the compromise of information (i.e., loss o...

Auto-Generated Generated during job processing
1. PM-11 (Mission and Business Process Definition) ensures that protection needs—including personnel clearances and certifications—are identified based on the organization's mission and business processes, directly addressing whether specialized staf...
NIST RA-3 Found
Risk Assessment

Risk assessments consider threats, vulnerabilities, likelihood, and impact to organizational operations and assets, individuals, other organizations, and the Nation. Risk assessments also consider ris...

Auto-Generated Generated during job processing
1. The RA-3 Risk Assessment control addresses the scoping question by requiring the organization to evaluate risks associated with personnel clearances and certifications, including the potential impact of unauthorized or unqualified staff accessing ...
NIST PL-4 Found
Rules of Behavior

Rules of behavior represent a type of access agreement for organizational users. Other types of access agreements include nondisclosure agreements, conflict-of-interest agreements, and acceptable use ...

Auto-Generated Generated during job processing
PL-4 (Rules of Behavior) is relevant to the scoping question because it ensures that personnel with specialized clearances or certifications formally acknowledge and agree to comply with organizational policies, including those governing credential r...
NIST PS-9 Found
Position Descriptions

Specification of security and privacy roles in individual organizational position descriptions facilitates clarity in understanding the security or privacy responsibilities associated with the roles a...

Auto-Generated Generated during job processing
Control PS-9 (Position Descriptions) is relevant to the scoping question because it ensures that security and privacy responsibilities—including requirements for specialized clearances, certifications, or licenses—are explicitly defined in job descri...
NIST CA-2 Found
Control Assessments

Organizations ensure that control assessors possess the required skills and technical expertise to develop effective assessment plans and to conduct assessments of system-specific, hybrid, common, and...

Auto-Generated Generated during job processing
1. Control CA-2 ensures that personnel conducting control assessments possess the necessary skills, certifications, and expertise, directly addressing the scoping question regarding specialized clearances or certifications required for staff. 2. This...
NIST AT-1 Found
Policy and Procedures

Awareness and training policy and procedures address the controls in the AT family that are implemented within systems and organizations. The risk management strategy is an important factor in establi...

Auto-Generated Generated during job processing
Control AT-1 (Policy and Procedures) is directly relevant to the scoping question because it requires the organization to formally establish and document policies and procedures for verifying personnel credentials, tracking certification expirations,...
NIST IA-12 Found
Identity Proofing

Identity proofing is the process of collecting, validating, and verifying a user’s identity information for the purposes of establishing credentials for accessing a system. Identity proofing is ...

Auto-Generated Generated during job processing
1. Control IA-12 (Identity Proofing) addresses the scoping question by ensuring that personnel’s identities are thoroughly verified before granting access, which is a prerequisite for issuing specialized clearances or certifications. 2. This control ...
Scoping Question 2

Will the entity have physical access to the entity’s managed devices (e.g., laptops, smartphones, tablets)? Determines if the entity’s personnel will handle or use corporate-owned endpoints, which may store sensitive data. Direct device access can lead to data leakage, malware introduction, or unauthorised configuration changes. Device inventory and tracking Endpoint security policies (e.g., MDM enforcement) Access logging and tamper-evident seals

32 Controls
CIS 4.11 Found
Enforce Remote Wipe Capability on Portable End-User Devices

Remotely wipe enterprise data from enterprise-owned portable end-user devices when deemed appropriate such as lost or stolen devices, or when an individual no longer supports the enterprise.

Auto-Generated Generated during job processing
1. This control is relevant to the scoping question because it ensures that if personnel have physical access to managed devices, the organization can remotely remove sensitive data in the event of loss, theft, or personnel changes. 2. Enforcing remo...
CIS 3.14 Found
Log Sensitive Data Access

Log sensitive data access, including modification and disposal.

Auto-Generated Generated during job processing
Control 3.14, "Log Sensitive Data Access," is relevant to the scoping question because it ensures that any access, modification, or disposal of sensitive data on managed devices is recorded. This control is important for compliance as it provides an ...
CIS 1.1 Found
Establish and Maintain Detailed Enterprise Asset Inventory

Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the potential to store or process data, to include: end-user devices (including portable and mobile...

Auto-Generated Generated during job processing
Control 1.1 is directly relevant to the scoping question because maintaining a detailed asset inventory ensures the organization knows which devices are physically accessible to personnel and may store sensitive data. This control is important for co...
CIS 4.1 Found
Establish and Maintain a Secure Configuration Process

Establish and maintain a documented secure configuration process for enterprise assets (end-user devices, including portable and mobile, non-computing/IoT devices, and servers) and software (operating...

Auto-Generated Generated during job processing
Control 4.1 is directly relevant to the scoping question because it ensures that all managed devices with which personnel have physical access are configured securely, reducing the risk of data leakage, malware introduction, or unauthorized changes. ...
NIST PE-3 Found
Physical Access Control

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas...

Auto-Generated Generated during job processing
PE-3 Physical Access Control is directly relevant to the scoping question because it governs who can physically access managed devices such as laptops, smartphones, and tablets within an organization’s premises. This control is important for complian...
NIST PE-2 Found
Physical Access Authorizations

Physical access authorizations apply to employees and visitors. Individuals with permanent physical access authorization credentials are not considered visitors. Authorization credentials include ID b...

Auto-Generated Generated during job processing
PE-2 (Physical Access Authorizations) is directly relevant to the scoping question because it governs who is permitted to physically access managed devices, such as laptops and smartphones, within an organization’s facilities. This control is importa...
NIST AC-3 Found
Access Enforcement

Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains)...

Auto-Generated Generated during job processing
AC-3 (Access Enforcement) is relevant to the scoping question because it ensures that only authorized personnel can access managed devices, whether through logical or system-level controls. This control is important for compliance as it helps prevent...
NIST CM-5 Found
Access Restrictions for Change

Changes to the hardware, software, or firmware components of systems or the operational procedures related to the system can potentially have significant effects on the security of the systems or indi...

Auto-Generated Generated during job processing
CM-5 (Access Restrictions for Change) is relevant to the scoping question because it ensures that only authorized personnel can make changes to managed devices, whether through physical or logical access. This control is important for compliance as i...
NIST SC-42 Found
Sensor Capability and Data

Sensor capability and data applies to types of systems or system components characterized as mobile devices, such as cellular telephones, smart phones, and tablets. Mobile devices often include sensor...

Auto-Generated Generated during job processing
SC-42 is relevant to the scoping question because it addresses the risks associated with physical access to managed devices that contain embedded sensors (e.g., cameras, microphones, GPS). This control is important for compliance as it ensures organi...
NIST PE-6 Found
Monitoring Physical Access

Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PE-6 (Monitoring Physical Access) is directly relevant because it ensures that any physical access to managed devices—such as laptops, smartphones, or tablets—is monitored and logged, helping ...
NIST CP-9 Found
System Backup

System-level information includes system state information, operating system software, middleware, application software, and licenses. User-level information includes information other than system-lev...

Auto-Generated Generated during job processing
1. The CP-9 System Backup control is relevant to the scoping question because physical access to managed devices increases the risk of data loss or corruption, making reliable system backups essential for recovery and continuity. 2. This control is i...
NIST PT-2 Found
Authority to Process Personally Identifiable Information

The processing of personally identifiable information is an operation or set of operations that the information system or organization performs with respect to personally identifiable information acro...

Auto-Generated Generated during job processing
Control PT-2 is relevant to the scoping question because physical access to managed devices increases the risk of unauthorized processing of personally identifiable information (PII) stored or accessed on those endpoints. This control ensures that on...
NIST SC-28 Found
Protection of Information at Rest

Information at rest refers to the state of information when it is not in process or in transit and is located on system components. Such components include internal or external hard disk drives, stora...

Auto-Generated Generated during job processing
SC-28 (Protection of Information at Rest) is directly relevant to the scoping question because physical access to managed devices increases the risk of unauthorized access to sensitive data stored on those devices. This control ensures that informati...
NIST MP-5 Found
Media Transport

System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state and magnetic), compact d...

Auto-Generated Generated during job processing
MP-5 (Media Transport) is relevant to the scoping question because it ensures that any physical access to managed devices—including removable media within those devices—is strictly controlled and monitored during transport. This control is important ...
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
PS-7 (External Personnel Security) is relevant to the scoping question because it ensures that external personnel who may have physical access to managed devices are subject to defined security requirements, including proper credentialing and timely ...
NIST MP-7 Found
Media Use

System media includes both digital and non-digital media. Digital media includes diskettes, magnetic tapes, flash drives, compact discs, digital versatile discs, and removable hard disk drives. Non-di...

Auto-Generated Generated during job processing
MP-7 (Media Use) is relevant to the scoping question because it governs the use of removable media on managed devices to which personnel have physical access. This control is important for compliance as it helps prevent data leakage, malware introduc...
NIST PT-7 Found
Specific Categories of Personally Identifiable Information

Organizations apply any conditions or protections that may be necessary for specific categories of personally identifiable information. These conditions may be required by laws, executive orders, dire...

Auto-Generated Generated during job processing
Control PT-7 is relevant to the scoping question because physical access to managed devices increases the risk of exposure or compromise of specific categories of personally identifiable information (PII) stored on those endpoints. This control ensur...
NIST IA-3 Found
Device Identification and Authentication

Devices that require unique device-to-device identification and authentication are defined by type, device, or a combination of type and device. Organization-defined device types include devices that ...

Auto-Generated Generated during job processing
Control IA-3 (Device Identification and Authentication) is relevant to the scoping question because it ensures that only authorized and uniquely identified devices can access the organization’s network and resources. This control is important for com...
NIST AC-19 Found
Access Control for Mobile Devices

A mobile device is a computing device that has a small form factor such that it can easily be carried by a single individual; is designed to operate without a physical connection; possesses local, non...

Auto-Generated Generated during job processing
**Justification:** 1. AC-19 (Access Control for Mobile Devices) directly addresses the scoping question by establishing requirements for restricting and managing physical access to mobile devices, such as laptops, smartphones, and tablets, that may ...
NIST IA-11 Found
Re-authentication

In addition to the re-authentication requirements associated with device locks, organizations may require re-authentication of individuals in certain situations, including when roles, authenticators o...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that individuals with physical access to managed devices must periodically re-authenticate, reducing the risk of unauthorized access if a device is left unattended or compromised. 2. Re-authe...
NIST AC-16 Found
Security and Privacy Attributes

Information is represented internally within systems using abstractions known as data structures. Internal data structures can represent different types of entities, both active and passive. Active en...

Auto-Generated Generated during job processing
**Justification:** 1. **How this control addresses the scoping question:** AC-16 ensures that security and privacy attributes are assigned to both devices (active entities) and the data they store (passive entities), enabling granular control over a...
NIST PE-20 Found
Asset Monitoring and Tracking

Asset location technologies can help ensure that critical assets—including vehicles, equipment, and system components—remain in authorized locations. Organizations consult with the Office ...

Auto-Generated Generated during job processing
PE-20 Asset Monitoring and Tracking is directly relevant to the scoping question because it ensures that managed devices, such as laptops and smartphones, remain in authorized locations and are not subject to unauthorized physical access. This contro...
NIST PE-5
Access Control for Output Devices

Controlling physical access to output devices includes placing output devices in locked rooms or other secured areas with keypad or card reader access controls and allowing access to authorized indivi...

Auto-Generated Generated during job processing
Control PE-5 is relevant to the scoping question because it ensures that only authorized personnel have physical access to output devices connected to managed endpoints, such as printers and monitors, which may display or process sensitive data. This...
NIST AC-25 Found
Reference Monitor

A reference monitor is a set of design requirements on a reference validation mechanism that, as a key component of an operating system, enforces an access control policy over all subjects and objects...

Auto-Generated Generated during job processing
The AC-25 Reference Monitor control is relevant to the scoping question because it ensures that access to managed devices and the sensitive data they store is strictly enforced and cannot be bypassed, even when personnel have physical access. This co...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
AC-4 (Information Flow Enforcement) is relevant to the scoping question because physical access to managed devices increases the risk of unauthorized data transfers or information leakage between systems or domains. This control ensures that informat...
NIST SI-7 Found
Software, Firmware, and Information Integrity

Unauthorized changes to software, firmware, and information can occur due to errors or malicious activity. Software includes operating systems (with key internal components, such as kernels or drivers...

Auto-Generated Generated during job processing
Control SI-7 is relevant to the scoping question because it ensures the integrity of software, firmware, and information on managed devices that personnel can physically access. This control is important for compliance as it helps detect and prevent ...
NIST PE-22 Found
Component Marking

Hardware components that may require marking include input and output devices. Input devices include desktop and notebook computers, keyboards, tablets, and smart phones. Output devices include printe...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PE-22 (Component Marking) ensures that all managed devices, such as laptops, smartphones, and tablets, are clearly marked to indicate their classification or sensitivity level, directly addres...
NIST PE-16 Found
Delivery and Removal

Enforcing authorizations for entry and exit of system components may require restricting access to delivery areas and isolating the areas from the system and media libraries.

Auto-Generated Generated during job processing
PE-16 (Delivery and Removal) is relevant to the scoping question because it ensures that only authorized personnel can physically access managed devices during their entry or exit from the organization. This control is important for compliance as it ...
NIST IA-4 Found
Identifier Management

Common device identifiers include Media Access Control (MAC) addresses, Internet Protocol (IP) addresses, or device-unique token identifiers. The management of individual identifiers is not applicable...

Auto-Generated Generated during job processing
Control IA-4 (Identifier Management) is relevant to the scoping question because it ensures that each managed device with physical access is uniquely identified and tracked, preventing unauthorized reuse or misattribution of device identities. This c...
NIST AC-11 Found
Device Lock

Device locks are temporary actions taken to prevent logical access to organizational systems when users stop work and move away from the immediate vicinity of those systems but do not want to log out ...

Auto-Generated Generated during job processing
AC-11 (Device Lock) is relevant to the scoping question because it mitigates risks associated with physical access to managed devices by ensuring that unattended endpoints automatically restrict logical access. This control is important for complianc...
NIST AC-14 Found
Permitted Actions Without Identification or Authentication

Specific user actions may be permitted without identification or authentication if organizations determine that identification and authentication are not required for the specified user actions. Organ...

Auto-Generated Generated during job processing
AC-14 (Permitted Actions Without Identification or Authentication) is relevant to the scoping question because it governs which actions can be performed on managed devices without verifying user identity. This control is important for compliance as i...
NIST SC-37 Found
Out-of-band Channels

Out-of-band channels include local, non-network accesses to systems; network paths physically separate from network paths used for operational traffic; or non-electronic paths, such as the U.S. Postal...

Auto-Generated Generated during job processing
SC-37 (Out-of-band Channels) is relevant to the scoping question because it addresses the risks associated with direct, physical access to managed devices by ensuring that sensitive operations—such as configuration changes, credential delivery, or se...
Scoping Question 3

Will the entity host entity, partner, or customer data in their own network environment? Determines if your data will reside on the provider’s infrastructure rather than your controlled systems. Loss of direct control over data storage, potential co-tenant risks, and challenges in meeting data-sovereignty or compliance requirements. Contractual data-hosting SLA and security requirements Data-segregation (logical/physical) and encryption at rest Periodic network and configuration audits Defined backup, retention, and e-discovery procedures

10 Controls
CIS 3.1 Found
Establish and Maintain a Data Management Process

Establish and maintain a documented data management process. In the process, address data sensitivity, data owner, handling of data, data retention limits, and disposal requirements, based on sensitiv...

Auto-Generated Generated during job processing
Control 3.1 is directly relevant to the scoping question because it ensures that the entity has a formal process for managing data, including identifying where data is stored, its sensitivity, and who is responsible for it. This control is important ...
CIS 3.5 Found
Securely Dispose of Data

Securely dispose of data as outlined in the enterprise’s documented data management process. Ensure the disposal process and method are commensurate with the data sensitivity.

Auto-Generated Generated during job processing
Control 3.5 (Securely Dispose of Data) is relevant to the scoping question because, when data is hosted on a provider’s infrastructure, the entity must ensure that sensitive information is properly and securely disposed of at the end of its lifecycle...
NIST CP-9 Found
System Backup

System-level information includes system state information, operating system software, middleware, application software, and licenses. User-level information includes information other than system-lev...

Auto-Generated Generated during job processing
Control CP-9 (System Backup) is directly relevant to the scoping question because when an entity hosts data in its own network environment, it assumes responsibility for securely backing up both system-level and user-level information. This control i...
NIST SC-28 Found
Protection of Information at Rest

Information at rest refers to the state of information when it is not in process or in transit and is located on system components. Such components include internal or external hard disk drives, stora...

Auto-Generated Generated during job processing
SC-28 (Protection of Information at Rest) directly addresses the scoping question by ensuring that any entity, partner, or customer data hosted in the provider’s network environment is protected through mechanisms such as encryption and integrity con...
NIST PM-23 Found
Data Governance Body

A Data Governance Body can help ensure that the organization has coherent policies and the ability to balance the utility of data with security and privacy requirements. The Data Governance Body estab...

Auto-Generated Generated during job processing
The PM-23 Data Governance Body control addresses the scoping question by ensuring that a formal group oversees and enforces policies for managing data hosted in external or provider environments. This control is important for compliance because it es...
NIST CA-3 Found
Information Exchange

System information exchange requirements apply to information exchanges between two or more systems. System information exchanges include connections via leased lines or virtual private networks, conn...

Auto-Generated Generated during job processing
CA-3 (Information Exchange) is directly relevant to the scoping question because it governs the requirements and risk management for exchanging data between systems, including when entity, partner, or customer data is hosted in a provider’s network e...
NIST CP-6
Alternate Storage Site

Alternate storage sites are geographically distinct from primary storage sites and maintain duplicate copies of information and data if the primary storage site is not available. Similarly, alternate ...

Auto-Generated Generated during job processing
Control CP-6 (Alternate Storage Site) is directly relevant to the scoping question because it ensures that data hosted on the provider’s infrastructure remains available and protected even if the primary storage location becomes inaccessible. This co...
NIST AC-4 Found
Information Flow Enforcement

Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses ...

Auto-Generated Generated during job processing
AC-4 Information Flow Enforcement is directly relevant to the scoping question because it governs how data moves within and between network environments, including those managed by third-party providers. This control is essential for compliance as it...
NIST AC-21 Found
Information Sharing

Information sharing applies to information that may be restricted in some manner based on some formal or administrative determination. Examples of such information include, contract-sensitive informat...

Auto-Generated Generated during job processing
Control AC-21 (Information Sharing) is directly relevant to the scoping question because hosting data in a provider’s network environment introduces the need to formally define and restrict how sensitive information is shared and accessed by third pa...
NIST SC-20 Found
Secure Name/Address Resolution Service (Authoritative Source)

Providing authoritative source information enables external clients, including remote Internet clients, to obtain origin authentication and integrity verification assurances for the host/service name ...

Auto-Generated Generated during job processing
SC-20 is relevant to the scoping question because hosting data in the provider’s network environment requires secure and trustworthy name/address resolution to ensure clients connect to the correct systems. This control is important for compliance as...
Scoping Question 4

Does the service require handling or custody of the entity’s physical assets (e.g., hardware, inventory)? Flags responsibility for equipment, shipments, or on-site physical items under the entity’s care. Asset damage, loss, or theft can disrupt operations and lead to replacement costs or insurance claims. Asset-tagging and inventory management system Insurance and liability clauses Chain-of-custody documentation for transfers

8 Controls
CIS 1.1 Found
Establish and Maintain Detailed Enterprise Asset Inventory

Establish and maintain an accurate, detailed, and up-to-date inventory of all enterprise assets with the potential to store or process data, to include: end-user devices (including portable and mobile...

Auto-Generated Generated during job processing
Control 1.1 is directly relevant to the scoping question because it requires the organization to maintain a comprehensive and up-to-date inventory of all physical assets, including hardware and devices, under its custody. This control is important fo...
NIST MP-5 Found
Media Transport

System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state and magnetic), compact d...

Auto-Generated Generated during job processing
Control MP-5 (Media Transport) is relevant to the scoping question because it establishes requirements for securely handling and tracking physical assets—specifically system media—during transport, directly addressing the risks of asset damage, loss,...
NIST SR-3 Found
Supply Chain Controls and Processes

Supply chain elements include organizations, entities, or tools employed for the research and development, design, manufacturing, acquisition, delivery, integration, operations and maintenance, and di...

Auto-Generated Generated during job processing
Control SR-3 is directly relevant to the scoping question because it establishes requirements for managing and securing physical assets throughout their lifecycle within the supply chain, including acquisition, handling, and disposal. This control is...
NIST MA-6
Timely Maintenance

Organizations specify the system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by th...

Auto-Generated Generated during job processing
Control MA-6 (Timely Maintenance) is relevant to the scoping question because it ensures that physical assets such as hardware and inventory are maintained and operational, reducing the risk of asset damage, loss, or theft. This control is important ...
NIST PE-20 Found
Asset Monitoring and Tracking

Asset location technologies can help ensure that critical assets—including vehicles, equipment, and system components—remain in authorized locations. Organizations consult with the Office ...

Auto-Generated Generated during job processing
PE-20 Asset Monitoring and Tracking is directly relevant to the scoping question because it ensures that physical assets under the entity’s custody are continuously tracked and remain in authorized locations, mitigating risks of loss, theft, or unaut...
NIST MA-2 Found
Controlled Maintenance

Controlling system maintenance addresses the information security aspects of the system maintenance program and applies to all types of maintenance to system components conducted by local or nonlocal ...

Auto-Generated Generated during job processing
Control MA-2 (Controlled Maintenance) is relevant to the scoping question because it ensures that all maintenance activities involving physical assets—such as hardware or inventory—are properly documented and controlled, including tracking equipment ...
NIST SR-4
Provenance

Every system and system component has a point of origin and may be changed throughout its existence. Provenance is the chronology of the origin, development, ownership, location, and changes to a syst...

Auto-Generated Generated during job processing
Control SR-4 (Provenance) is relevant to the scoping question because it ensures that the origin, ownership, location, and changes to physical assets are thoroughly documented and tracked throughout their lifecycle. This control is important for comp...
NIST CM-8 Found
System Component Inventory

System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories...

Auto-Generated Generated during job processing
Control CM-8 (System Component Inventory) is directly relevant to the scoping question because it requires organizations to maintain a detailed and accurate inventory of all physical IT assets, including hardware, under their custody. This control is...
Scoping Question 5

Will the service integrate directly with core business processes or systems? Identifies if the entity’s outputs plug into mission-critical workflows (order processing, billing, manufacturing, etc.). A faulty integration can cascade failures into critical operations, causing downtime, data corruption, or billing errors. Formal change-management process Pre-/post-integration validation testing Role-based access controls on integrated interfaces

11 Controls
CIS 3.8
Document Data Flows

Document data flows. Data flow documentation includes service provider data flows and should be based on the enterprise’s data management process. Review and update documentation annually, or when sig...

Auto-Generated Generated during job processing
1. Documenting data flows (Control 3.8) directly addresses the scoping question by providing a clear understanding of how the service integrates with core business processes and systems, mapping where and how data moves between critical workflows. ...
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 (External System Services) is directly relevant to the scoping question because integrating external services with core business processes introduces dependencies and risks that must be managed, especially when the organization cannot di...
NIST SA-23
Specialization

It is often necessary for a system or system component that supports mission-essential services or functions to be enhanced to maximize the trustworthiness of the resource. Sometimes this enhancement ...

Auto-Generated Generated during job processing
1. Control SA-23 (Specialization) addresses the scoping question by requiring enhancements to systems that integrate with core business processes, ensuring these mission-critical integrations are trustworthy and resilient. 2. This control is importan...
NIST CA-9 Found
Internal System Connections

Internal system connections are connections between organizational systems and separate constituent system components (i.e., connections between components that are part of the same system) including ...

Auto-Generated Generated during job processing
CA-9 (Internal System Connections) is directly relevant to the scoping question because it ensures that all internal connections between the service and core business systems are properly authorized, managed, and periodically reviewed for their neces...
NIST MA-6
Timely Maintenance

Organizations specify the system components that result in increased risk to organizational operations and assets, individuals, other organizations, or the Nation when the functionality provided by th...

Auto-Generated Generated during job processing
1. MA-6 (Timely Maintenance) addresses the scoping question by ensuring that system components integrated with core business processes remain operational and receive prompt maintenance, reducing the risk of cascading failures in mission-critical work...
NIST SI-22
Information Diversity

Actions taken by a system service or a function are often driven by the information it receives. Corruption, fabrication, modification, or deletion of that information could impact the ability of the ...

Auto-Generated Generated during job processing
The SI-22 Information Diversity control is directly relevant to the scoping question because it ensures that mission-critical integrations are resilient to failures or corruption in data sources, reducing the risk of cascading disruptions in core bus...
NIST CM-3 Found
Configuration Change Control

Configuration change control for organizational systems involves the systematic proposal, justification, implementation, testing, review, and disposition of system changes, including system upgrades a...

Auto-Generated Generated during job processing
1. CM-3 (Configuration Change Control) directly addresses the scoping question by ensuring that any integration with core business processes or systems is systematically managed, reviewed, and tested before implementation, reducing the risk of cascad...
NIST CP-7
Alternate Processing Site

Alternate processing sites are geographically distinct from primary processing sites and provide processing capability if the primary processing site is not available. The alternate processing capabil...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-7 (Alternate Processing Site) is relevant because if the service integrates directly with core business processes or systems, any disruption at the primary site could halt mission-critical ...
NIST IA-9 Found
Service Identification and Authentication

Services that may require identification and authentication include web applications using digital certificates or services or applications that query a database. Identification and authentication met...

Auto-Generated Generated during job processing
Control IA-9 (Service Identification and Authentication) is directly relevant to the scoping question because it ensures that only authorized services and applications can integrate with core business processes or systems. This control is important f...
NIST RA-9 Found
Criticality Analysis

Not all system components, functions, or services necessarily require significant protections. For example, criticality analysis is a key tenet of supply chain risk management and informs the prioriti...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** RA-9 (Criticality Analysis) directly supports the scoping question by systematically identifying which system components and integrations are mission-critical, ensuring that any service integr...
NIST PL-9 Found
Central Management

Central management refers to organization-wide management and implementation of selected controls and processes. This includes planning, implementing, assessing, authorizing, and monitoring the organi...

Auto-Generated Generated during job processing
PL-9 (Central Management) is relevant to the scoping question because integrating a service with core business processes requires consistent, organization-wide oversight of security controls to prevent cascading failures and ensure reliability. Centr...
Scoping Question 6

Will the entity’s services be subject to periodic audits by us or third parties? Identifies whether you must audit their performance, controls, or compliance on a recurring basis. Audit preparation consumes internal resources; findings may require remediation and renegotiation of contract terms. Audit schedule and scoping document Right-to-audit clauses in contract Remediation-tracking and closure reporting

13 Controls
NIST AU-6 Found
Audit Record Review, Analysis, and Reporting

Audit record review, analysis, and reporting covers information security- and privacy-related logging performed by organizations, including logging that results from the monitoring of account usage, r...

Auto-Generated Generated during job processing
Control AU-6 is directly relevant to the scoping question because it ensures that the entity maintains and reviews audit records, enabling effective periodic audits by your organization or third parties. This control is important for compliance as it...
NIST AU-16 Found
Cross-organizational Audit Logging

When organizations use systems or services of external organizations, the audit logging capability necessitates a coordinated, cross-organization approach. For example, maintaining the identity of ind...

Auto-Generated Generated during job processing
AU-16 Cross-organizational Audit Logging is directly relevant to the scoping question because it ensures that audit logs are coordinated and accessible across organizational boundaries, supporting periodic audits by your organization or third parties...
NIST AU-5 Found
Response to Audit Logging Process Failures

Audit logging process failures include software and hardware errors, failures in audit log capturing mechanisms, and reaching or exceeding audit log storage capacity. Organization-defined actions incl...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by ensuring that audit logs remain available and reliable for periodic audits, even in the event of logging process failures. 2. It is important for compliance because uninterrupted and complete audit lo...
NIST AU-11 Found
Audit Record Retention

Organizations retain audit records until it is determined that the records are no longer needed for administrative, legal, audit, or other operational purposes. This includes the retention and availab...

Auto-Generated Generated during job processing
Control AU-11 (Audit Record Retention) is directly relevant to the scoping question because it ensures that audit records are retained and available for review during periodic audits conducted by your organization or third parties. This control is im...
NIST AU-1 Found
Policy and Procedures

Audit and accountability policy and procedures address the controls in the AU family that are implemented within systems and organizations. The risk management strategy is an important factor in estab...

Auto-Generated Generated during job processing
1. AU-1 (Policy and Procedures) is directly relevant to the scoping question because it requires the organization to establish and maintain formal audit and accountability policies and procedures, which are foundational for supporting periodic audits...
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
1. Control SR-8 (Notification Agreements) addresses the scoping question by ensuring that supply chain entities have established procedures to communicate audit results, including findings and potential compromises, in a timely manner. 2. This contro...
NIST AU-3
Content of Audit Records

Audit record content that may be necessary to support the auditing function includes event descriptions (item a), time stamps (item b), source and destination addresses (item c), user or process ident...

Auto-Generated Generated during job processing
1. Control AU-3 ensures that audit records contain sufficient detail—such as event descriptions, timestamps, user identifiers, and outcomes—to support effective periodic audits as identified in the scoping question. 2. This control is important for c...
NIST AU-9 Found
Protection of Audit Information

Audit information includes all information needed to successfully audit system activity, such as audit records, audit log settings, audit reports, and personally identifiable information. Audit loggin...

Auto-Generated Generated during job processing
1. Control AU-9 addresses the scoping question by ensuring that audit information—such as logs and reports—remains protected and accessible only to authorized personnel, which is essential when periodic audits are required by your organization or thi...
NIST PM-21
Accounting of Disclosures

The purpose of accounting of disclosures is to allow individuals to learn to whom their personally identifiable information has been disclosed, to provide a basis for subsequently advising recipients ...

Auto-Generated Generated during job processing
1. Control PM-21 (Accounting of Disclosures) directly supports the scoping question by providing a documented audit trail of all disclosures of personally identifiable information, which is essential for periodic audits by your organization or third ...
NIST AU-4 Found
Audit Log Storage Capacity

Organizations consider the types of audit logging to be performed and the audit log processing requirements when allocating audit log storage capacity. Allocating sufficient audit log storage capacity...

Auto-Generated Generated during job processing
1. AU-4 (Audit Log Storage Capacity) is relevant to the scoping question because periodic audits require access to comprehensive audit logs, and sufficient storage ensures these logs are retained and available for review. 2. This control is important...
NIST AU-14 Found
Session Audit

Session audits can include monitoring keystrokes, tracking websites visited, and recording information and/or file transfers. Session audit capability is implemented in addition to event logging and m...

Auto-Generated Generated during job processing
AU-14 (Session Audit) is relevant to the scoping question because it enables detailed monitoring and recording of user sessions, which provides critical evidence for periodic audits of the entity’s performance and compliance. This control is importan...
NIST AU-7
Audit Record Reduction and Report Generation

Audit record reduction is a process that manipulates collected audit log information and organizes it into a summary format that is more meaningful to analysts. Audit record reduction and report gener...

Auto-Generated Generated during job processing
Control AU-7 is directly relevant to the scoping question because it ensures that audit records can be efficiently reduced and summarized, enabling the generation of meaningful reports for periodic audits conducted by your organization or third parti...
NIST AU-2 Found
Event Logging

An event is an observable occurrence in a system. The types of events that require logging are those events that are significant and relevant to the security of systems and the privacy of individuals....

Auto-Generated Generated during job processing
1. AU-2 (Event Logging) directly supports the scoping question by ensuring that all significant system events are recorded, which is essential for conducting periodic audits of the entity’s performance, controls, and compliance. 2. This control is im...
Scoping Question 7

Will the entity’s staff operate on-site at entity facilities? Determines whether the entity’s personnel need to be co-located with your teams, impacting coordination and oversight. Increases insider/physical-security risk (tailgating, unauthorised access); adds complexity for facility management and supervision. Badge-based physical access controls Escort and visitor logging policy Segregated work areas with monitoring cameras

16 Controls
NIST PE-3 Found
Physical Access Control

Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas...

Auto-Generated Generated during job processing
PE-3 Physical Access Control is directly relevant to the scoping question because it establishes procedures and mechanisms—such as badge-based access, visitor logging, and monitored work areas—to manage and restrict on-site personnel movement within ...
NIST AT-3 Found
Role-based Training

Organizations determine the content of training based on the assigned roles and responsibilities of individuals as well as the security and privacy requirements of organizations and the systems to whi...

Auto-Generated Generated during job processing
1. AT-3 (Role-based Training) addresses the scoping question by ensuring that staff operating on-site receive training tailored to their specific roles, including physical security protocols relevant to facility access and insider threat mitigation. ...
NIST CA-6 Found
Authorization

Authorizations are official management decisions by senior officials to authorize operation of systems, authorize the use of common controls for inheritance by organizational systems, and explicitly a...

Auto-Generated Generated during job processing
1. Control CA-6 (Authorization) is relevant to the scoping question because it requires senior management to formally assess and accept the risks associated with staff operating on-site, including physical and insider threats introduced by co-locatio...
NIST PE-2 Found
Physical Access Authorizations

Physical access authorizations apply to employees and visitors. Individuals with permanent physical access authorization credentials are not considered visitors. Authorization credentials include ID b...

Auto-Generated Generated during job processing
PE-2 (Physical Access Authorizations) is directly relevant to the scoping question because it establishes requirements for granting and managing physical access credentials for staff operating on-site at entity facilities. This control is important f...
NIST AC-3 Found
Access Enforcement

Access control policies control access between active entities or subjects (i.e., users or processes acting on behalf of users) and passive entities or objects (i.e., devices, files, records, domains)...

Auto-Generated Generated during job processing
AC-3 (Access Enforcement) is relevant to the scoping question because it ensures that only authorized personnel can access systems and data when staff operate on-site, directly addressing insider and physical security risks. This control is important...
NIST PM-10 Found
Authorization Process

Authorization processes for organizational systems and environments of operation require the implementation of an organization-wide risk management process and associated security and privacy standard...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PM-10 (Authorization Process) ensures that any decision to allow staff to operate on-site is subject to a formal risk management and authorization process, which evaluates and approves physica...
NIST IA-2 Found
Identification and Authentication (Organizational Users)

Organizations can satisfy the identification and authentication requirements by complying with the requirements in HSPD 12. Organizational users include employees or individuals who organizations cons...

Auto-Generated Generated during job processing
Control IA-2 is directly relevant to the scoping question because it ensures that only authorized organizational users—such as staff operating on-site—can be uniquely identified and authenticated before accessing systems or sensitive areas. This cont...
NIST PE-6 Found
Monitoring Physical Access

Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i...

Auto-Generated Generated during job processing
1. This control is directly relevant to the scoping question because when staff operate on-site at entity facilities, monitoring physical access (PE-6) helps manage the increased risk of unauthorized entry and insider threats. 2. Implementing physica...
NIST AC-2 Found
Account Management

Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specificat...

Auto-Generated Generated during job processing
1. AC-2 (Account Management) is relevant to the scoping question because when staff operate on-site, their physical presence must be matched with appropriate system account provisioning, ensuring only authorized personnel have access to systems and d...
NIST MA-5 Found
Maintenance Personnel

Maintenance personnel refers to individuals who perform hardware or software maintenance on organizational systems, while PE-2 addresses physical access for individuals whose maintenance duties place ...

Auto-Generated Generated during job processing
1. Control MA-5 is relevant to the scoping question because it governs how maintenance personnel—who may be on-site at entity facilities—are authorized, supervised, and granted access, directly impacting the risks associated with staff operating on-s...
NIST PE-17
Alternate Work Site

Alternate work sites include government facilities or the private residences of employees. While distinct from alternative processing sites, alternate work sites can provide readily available alternat...

Auto-Generated Generated during job processing
Control PE-17 (Alternate Work Site) is relevant to the scoping question because it ensures that security and contingency controls are defined and implemented for staff operating at locations other than the primary entity facilities, such as remote of...
NIST PE-18
Location of System Components

Physical and environmental hazards include floods, fires, tornadoes, earthquakes, hurricanes, terrorism, vandalism, an electromagnetic pulse, electrical interference, and other forms of incoming elect...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** PE-18 requires organizations to assess and manage the physical location of system components, particularly in relation to where staff are present on-site. This directly addresses the scoping q...
NIST AC-5 Found
Separation of Duties

Separation of duties addresses the potential for abuse of authorized privileges and helps to reduce the risk of malevolent activity without collusion. Separation of duties includes dividing mission or...

Auto-Generated Generated during job processing
The AC-5 Separation of Duties control is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized or collusive activities due to physical proximity and access to sensitive areas. This control is imp...
NIST SC-50 Found
Software-enforced Separation and Policy Enforcement

System owners may require additional strength of mechanism to ensure domain separation and policy enforcement for specific types of threats and environments of operation.

Auto-Generated Generated during job processing
SC-50 (Software-enforced Separation and Policy Enforcement) is relevant to the scoping question because when staff operate on-site, there is increased risk of unauthorized access to sensitive systems and data. This control ensures that even within sh...
NIST PS-1 Found
Policy and Procedures

Personnel security policy and procedures for the controls in the PS family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing su...

Auto-Generated Generated during job processing
Control PS-1 (Policy and Procedures) is relevant to the scoping question because it requires the organization to establish and maintain personnel security policies and procedures that address risks associated with staff operating on-site. This contro...
NIST PE-16 Found
Delivery and Removal

Enforcing authorizations for entry and exit of system components may require restricting access to delivery areas and isolating the areas from the system and media libraries.

Auto-Generated Generated during job processing
PE-16 (Delivery and Removal) is relevant to the scoping question because when staff operate on-site, there is increased movement of system components and media within the facility, raising the risk of unauthorized delivery or removal. This control en...
Scoping Question 8

Does the entity use third parties to deliver services outside the United States? Identifies whether any part of service delivery is outsourced internationally, beyond your direct oversight. Offshore third parties can fall under different regulatory regimes, complicate compliance, data-sovereignty, and oversight. International due-diligence and risk assessments Flow-down contract clauses for compliance and data handling Regular third-party audits and SLAs

5 Controls
NIST SA-9 Found
External System Services

External system services are provided by an external provider, and the organization has no direct control over the implementation of the required controls or the assessment of control effectiveness. O...

Auto-Generated Generated during job processing
Control SA-9 (External System Services) is directly relevant to the scoping question because it requires organizations to manage and document the risks associated with using third-party service providers, particularly those located outside the United...
NIST SR-6 Found
Supplier Assessments and Reviews

An assessment and review of supplier risk includes security and supply chain risk management processes, foreign ownership, control or influence (FOCI), and the ability of the supplier to effectively a...

Auto-Generated Generated during job processing
1. This control addresses the scoping question by requiring formal assessments and reviews of third-party suppliers, including those located outside the United States, to identify and manage risks associated with international outsourcing. 2. It is i...
NIST PS-7 Found
External Personnel Security

External provider refers to organizations other than the organization operating or acquiring the system. External providers include service bureaus, contractors, and other organizations that provide s...

Auto-Generated Generated during job processing
Control PS-7 (External Personnel Security) is directly relevant to the scoping question because it ensures that organizations impose and manage personnel security requirements for third-party providers, including those delivering services outside the...
NIST SR-8 Found
Notification Agreements

The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentia...

Auto-Generated Generated during job processing
SR-8 (Notification Agreements) is directly relevant to the scoping question because it ensures that offshore third-party service providers are contractually obligated to promptly notify the entity of any security compromises or incidents. This contro...
NIST SI-5 Found
Security Alerts, Advisories, and Directives

The Cybersecurity and Infrastructure Security Agency (CISA) generates security alerts and advisories to maintain situational awareness throughout the Federal Government. Security directives are issued...

Auto-Generated Generated during job processing
1. SI-5 is relevant to the scoping question because it ensures that third-party service providers, including those located outside the United States, receive and act on critical security alerts, advisories, and directives that may impact service deli...
Scoping Question 9

Is continuous (24/7) availability required for this service? Establishes whether the service must run without interruption (e.g., call center, global e-commerce). Leaves little maintenance window, higher ops burden, risk of slip-ups or fatigue-related errors in support shifts. SLAs with uptime guarantees Geographically redundant infrastructure Automated alerting and escalation paths

2 Controls
NIST CA-7 Found
Continuous Monitoring

Continuous monitoring at the system level facilitates ongoing awareness of the system security and privacy posture to support organizational risk management decisions. The terms continuous and ongoing...

Auto-Generated Generated during job processing
CA-7 Continuous Monitoring is directly relevant to the scoping question regarding 24/7 service availability because it ensures ongoing awareness of system security and operational status, enabling rapid detection and response to incidents that could ...
NIST CP-8
Telecommunications Services

Telecommunications services (for data and voice) for primary and alternate processing and storage sites are in scope for CP-8. Alternate telecommunications services reflect the continuity requirements...

Auto-Generated Generated during job processing
1. **How this control addresses the scoping question:** CP-8 ensures that telecommunications services are resilient and redundant, directly supporting the requirement for continuous (24/7) availability by maintaining connectivity even if primary se...
Scoping Question 10

Does the entity’s performance depend on access to proprietary processes or intellectual property? Clarifies whether the entity needs to understand or use your unique methodologies, algorithms, or trade secrets. Exposure of IP risks theft or leakage, eroding competitive advantage and complicating future provider transitions. NDAs and IP assignment clauses ACLs on sensitive repositories Periodic IP-use audits

1 Controls
NIST IA-8 Found
Identification and Authentication (Non-organizational Users)

Non-organizational users include system users other than organizational users explicitly covered by IA-2. Non-organizational users are uniquely identified and authenticated for accesses other than tho...

Auto-Generated Generated during job processing
Control IA-8 is relevant to the scoping question because it ensures that only authorized, uniquely identified non-organizational users can access proprietary processes or intellectual property, directly mitigating the risk of IP theft or leakage. Thi...
Processing...

Please wait while we process your request